Optimization of autoclave pumpkin seed bread using response surface methodology
Bread is one of the major products of baked foods and is consumed worldwide. Autoclave of pumpkin seed help to increase the nutrient content of the bread. The objective of this study was to optimize the refined wheat flour, autoclave pumpkin seed powder and butter with respect to bread-making quality. The optimal Design was employed with the following variables of weight loss, porosity and specific volume of the bread. Models developed adequately described the relationships and were confirmed by validation studies. Refined wheat flour showed the greatest effect on models, which effect impaired porosity and specific volume of autoclave pumpkin seed bread. The optimum set of the independent variables was obtained graphically in order to obtain the desired levels of 100g for refined wheat flour, 10g for autoclave pumpkin seed and 6g for butter. Organoleptic evaluation of autoclave pumpkin seed bread shows that variation 4 with 100g refined wheat flour; 10g autoclave pumpkin seed and 6 g of butter had obtained high score for overall acceptability.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Potential of Pigeonpea (Cajanus Cajan) Intercropping on Mid Hills of North Eastern Region of India
The field experiment was conducted during two consecutive kharif seasons of 2012-13 and 2013-14 at the research farm of College of Agriculture, Lembucherra, Tripura to find out the potentiality of pigeonpea intercropping for mid hills of northeastern region. The treatment comprised 9 intercropping systems apart from sole of intercrops. Intercropping system of single row main crop (pigeonpea) with two rows for cowpea, blackgram, greengram and sesame, where 1:1 system have blackgram, greengram, sesame and groundnut at 30cm apart respectively. The investigational results exhibited that pigeonpea + black gram (1:1) intercropping performed better than other combinations followed by pigeonpea + green gram (1:1) with reference to PEY (pigeonpea equivalent yield) and net return. Growing of pigeonpea under intercropping system with blackgram found to be highly remunerative with proper utilization of land under rainfed mid hills of northeastern region.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Presenting Appropriate Analytical Model Based on the Status of Tourism
Today, due to the effects of tourism activities in the economy of the tourist receptive areas on leaves, Great attention to this field of activity is focused. West of Islamabad city with great tourist potential and the potential remains for tourists unfamiliar, Therefore, tourist attractions in this city And planning with special geographical conditions appear to be necessary. For this purpose the paper uses a descriptive method and analytical and strategic models of SWOT, and field studies to determine the strengths, weaknesses, to provide a strategy to develop tourism opportunities and threats are discussed. After reviewing data collected barriers such as lack of facilities along with other attractions, Weak advertising, the neglect of infrastructure to attract tourists in this city and to provide guidelines for tourism development Use of modern methods of advertising west has been building facilities in the city of Islamabad. According to obtained results, strategies city near Islamabad, the West is aggressive strategies the authorities should try to take advantage of the strengths and opportunities and to take steps towards these strategies.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Production of Marine Microalgal Biomass for Biodiesel and Study the Efficiency of its Blends in Diesel Engines
Microalgae are considered as raw materials for biodiesel production as a part-substitute for diesel. Eight microalgal strains such as, Tetraselmis sp., Dunaliella sp., Chlorella sp., Synechocystis sp., Nannochloropsis sp., Gloeocapsa sp., Synechococcus sp. and Oscillatoria sp. having lipid accumulation potential were used in the present study. Estimation of Chlorophyll a and carotenoid contents in algal strains grown under red fluorescent light revealed that there was an increase in biomass and oil yield respectively. Dunaliella sp. and Tetraselmis sp. cultured in tubular photobioreactor showed a maximum biomass of 1.38 g/l and higher percentage (72.6 %) of lipid accumulation respectively. Fatty Acid Methyl Ester (FAME) analysis of algal biodiesel showed the presence of saturated fattyacids peaks. AO10D was found as best algal biodiesel blend among algal biodiesel blends tested for their fuel properties, performance in engine and emission characteristics.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Rainfall characteristic under meteorological drought condition using CDS analysis in Vindhyan zone (Mirzapur District), U.P
The occurrence of drought leads to reduction in reservoir and tank levels and depletion of soil moisture and groundwater. There is a need to develop suitable criteria for planning supplemental irrigation to crops for increasing and stabilizing crop yields during non-drought conditions, and minimizing crop damages during drought. The present study is aimed to study metrological drought and agriculture aspects of drought in Mirzapur districts the recurrence of drought in these parts of the country in recent years have caused unprecedented economic losses and great suffering to the affected areas. The study is based on the analysis of rainfall and critical dry spell (CDS). In this study, crop water requirement and irrigation requirement for the crop during the drought situation is also analyzed and introducing the supplemental irrigation under drought condition. In Mirzapur district the deficiency of annual rainfall is observed up to 16%. In the district approximately one out of every four to five year is drought year. The year 2007 and 2009 was most severely affected as most of the area of the district was under drought and major area of the district is found as drought prone. In the district on an average three critical dry spells (CDS) have been observed during the monsoon season.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Review of the meaning and concept of reality for Nietzsche
The issue of truth and reality is one of the main conscientious issues in philosophy. The propagators and interpreters are different in reality over the historical period. For example, in the ancient times, philosophers such as Plato were interpreted as truth by Elisa that is what reveals itself. But most philosophers have assumed the truth to be true but Nietzsche has a different interpretation of the truth, in his opinion, the truth is myth.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Rough fuzzy ideals in near-rings
The purpose of this paper is to introduce the idea of rough fuzzy sets in nearrings. We introduce the notion of rough fuzzy sets with respect to an ideal of a nearring which is an extended notion of an ideal of a ring and we derive some properties of the lower and upper approximations in a nearring.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Secure and Robust Cloud Storage with Cryptography and Access Control
Cloud computing is a new evolving paradigm to a wide range of users like individuals, businesses and governments to provide resources in an on-demand environment. Enterprises store their incredible abundance of data on cloud to reduce data management cost. In addition, an emerging class of entrepreneurs is taking advantage of clouds as they might not have enough finance to purchase resources or ensure the necessary security. As the data is stored on cloud service providers' servers, confidentiality, authentication and access control are the most challenging factors in data security. Cloud providers should provide adequate security measures on their data and applications. Cryptography access control architecture overcomes the issue of data security in cloud environment. In this paper, we illustrate a secure and robust cloud storage architecture by combining cryptography and access control with two layered encryption.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Security of Data in the Utilization of E-Government
Both the computer and the software and data essential elements of a system of information in the digital environment associated with e-government. Computer may be associated with devices and services in the communication network terminal ends or other accounts or specific network facilities. Computing network may be a LAN or private network extended the scope of the government department or ministry concerned as a network intranet, or wide area WAN network as extranet or international information network such as the Internet, may also be linked to external contact is open to any individual provider technological means that enable access to her. The aim of this research is the security of information systems, protection and availability of resources and its components and work their confidentiality and integrity. Where in the absence of adequate security systems and information and communication technologies, do not use all their capacities and energies. The absence or lack of security in a loss of confidence in the system to stop and not to make the most of it, making it a burden on the organization. On this basis it must protect the system and information from damage that can lead to system failures and loss dating back to their organizations and their staff. You can identify three main dimensions of the target of various information in security systems, (I) definition: who is allowed to enter the system? Must check it out through three main entrances (II) dependence: once you learn the rules of the real user, the natural next question is what allowed for this person? Thus, an accreditation process based access to resources for this user (iii) Management: representing management saving the user attributes, in addition to the security of a given resource definition. It includes on activities such as the exclusion of the advantages of the arrival of the user or employee leaving the service. The search results are in four axes task, first (Security Policy: The purpose of information security policy relates to provide appropriate guidance and administrative support to the security of the information and recommendation (II) Security organization: This dimension aims information security management focus in the organization (iii) the security of individuals: the purpose of the after the security of individuals to reduce the risk of human error, theft, embezzlement or misuse of facilities (iv) control of access to information). Concludes research is the establishment of political, regulatory and legal frameworks to address the matters relating to the dangers of security such as piracy and management of domain names and the protection of citizens, the development of information security policy and encourage the application and adaptation programs and records of e-government, strengthen the expertise and Practice better for the security of information systems through the development of guidance and technical standards on a large scale and use including is a global developer, organize public campaigns to raise awareness aims to improve public knowledge and understanding of the importance of information and intellectual property rights and the protection of security software.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Self awareness curiculum activities and effectiveness to youth
This article discusses the self-consciousness of youth in co-curricular activities forming their personality. In addition, this article also discussed the core curriculum which has been outlined by the Ministry of Education (MOE) to adolescents who are still studying in higher education institutions as well as the effectiveness of the curriculum in shaping the personality of adolescents including studies that have been done in connection with extra-curricular activities. This article also touched on the education system nowadays.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]