241 research outputs found

    Production of Different Mushroom Protein Hydrolysates as Potential Flavourings in Chicken Soup Using Stem Bromelain Hydrolysis

    Get PDF
    Jestive su gljive, zbog njihovog ugodnog okusa koji se pripisuje visokom udjelu proteina, privlačna sirovina za proizvodnju hidrolizata proteina. U ovom su radu hidrolizom bromelaina iz stabljike u omjeru enzima i supstrata od 0,5 % (m/m) pri pH=6,5 i 40 °C tijekom 20 h dobiveni hidrolizati proteina sljedećih gljiva: shiitake, bukovače, bunashimeji i enoki. Dobiveni je tekući hidrolizat proteina gljiva sadržavao 0,77-0,92 % sirovih proteina (p>0,05). Hidrolizat proteina gljive bunashimeji bio je najsvjetliji, a onaj gljive shiitake najtamniji (p0,05), pri čemu je najviše hidrolizata proizvedeno iz gljive bunashimeji, a najmanje iz gljive shiitake (p0.05). Bunashimeji mushroom protein hydrolysate was the lightest in colour, while shiitake mushroom protein hydrolysate was the darkest (p0.05), with the highest yield of bunashimeji and the lowest of shiitake mushroom protein hydrolysate (p<0.05). Preference test of chicken soup with added different mushroom protein hydrolysates was performed using 58 untrained panellists to evaluate their taste-enhancing effect, compared to monosodium glutamate (MSG). Soup with MSG had the highest score for the tested attributes, while soups with bunashimeji and oyster mushroom protein hydrolysates showed higher aroma, taste, mouthfeel and overall preference scores than negative control, which contained neither MSG nor any of the hydrolysates (p<0.05). This finding suggests that bunashimeji and oyster mushroom protein hydrolysate have the potential to be used as taste enhancers in food applications

    Enhanced FPGA Implementation of the Hummingbird Cryptographic Algorithm

    Get PDF
    Hummingbird is a novel ultra-lightweight cryptographic algorithm aiming at resource-constrained devices. In this work, an enhanced hardware implementation of the Hummingbird cryptographic algorithm for low-cost Spartan-3 FPGA family is described. The enhancement is due to the introduction of the coprocessor approach. Note that all Virtex and Spartan FPGAs consist of many embedded memory blocks and this work explores the use of these functional blocks. The intrinsic serialism of the algorithm is exploited so that each step performs just one operation on the data. We compare our performance results with other reported FPGA implementations of the lightweight cryptographic algorithms. As far as author’s knowledge, this work presents the smallest and the most efficient FPGA implementation of the Hummingbird cryptographic algorithm

    Pluralistic Islamic cities and the significance of Marrakesh declaration

    Get PDF
    If Quran offers the timeless guidance and Sunnah (the way of Prophet Muhammad) is the truthful way, the study on how to improve the planning methods according to Islamic Principles would be of immense help to a nation. Without a doubt Exemplary Islamic City is the goal we are aiming for. But how are we going to deal with pluralism in our planning methods while balancing between modern and Islamic notions? Traditionally in Islam, Muslims are obliged to respect and protect the people regardless of their faith and background. For the very reason that it promotes peace and tolerance, many other groups joined for Islamic path even in the hardest of times according to the history. A peaceful nation state is where everyone can be included in managing the affairs of their own society, in accordance with their rights and duties, to be outlined by a reasonable constitution that seeks harmonious living, the rule of law. Does Islam recognized those values? Yes it does, and even more so, the very first functioning constitution was developed in early days of Islam which later known as The Medina Charter (Shahifat al-Medina). The Medina Charter, prepared as the basis of the Medina city-state established by Prophet Muhammad, was the first written constitution in Islam and arguably the first instance of constitutional law in society. It was an agreement that was reached without war, fighting, violence, or compulsion; it was an agreement that all of its parties arrived at voluntarily due to their commitment to the shared principles contained therein, within the sphere of positive cooperation, the context of their conditions, and the various elements of the Medinan society. It was a step towards the realization of social peace based upon their mutual recognition of rights and responsibilities and of accepting the demands of their diversity, their various religious affiliations, benefits, and lifestyles. Medina was a multi-ethnic and multi-religious society that was not founded as the result of a conquest. There, the Prophet composed a document governing the relations between the Muslims and other religious communities that would come to be known as “the Constitution of Medina.” This document was, for all intents and purposes, a just constitution that established a type of contractual citizenship. It affirmed that those who were under its authority were one, cohesive, unified polity with all of its citizens enjoying equal rights and having the same duties. This document affirmed the unity of the society in terms of religious pluralism and freedom of religion, but, despite its obvious importance, it has not garnered much study. Revival of Medina Charter and to make thorough study to be applicable to our constitution is rather very important factor nowadays. That is why a major conference was hosted in Marrakesh in the Kingdom of Morocco early this year of 2016. A large number of personals from more than 100 predominantly Muslim countries participated in this conference. It called upon other scholars of the world to initiate more on this concern. The Objective of this study is to revive Medina Charter for the modern day Islamic City planning which would enable the states to develop better and more appropriate planning methods for pluralistic Islamic societies and highlight the importance of Marrakesh Declaration. A qualitative method will be implemented in this study with content analysis method

    An analysis of intentions to reduce ICT- waste among MSC Malaysia Status Companies / Ng Tuan-Hock...[et.al]

    Get PDF
    An upsurge in consumption of information and communication technology (ICT) products has ignited conflicting debate about the impacts of ICT. On the one hand, ICT accelerates productivity, but on the other hand, environmental degradation issues associated with the rise in the amount of ICT-waste are a matter of deep concern for all. When waste issues come into focus, there is a growing need for long-term solutions. In this context, ‘reduce’ has been hailed as an effective ICT-waste prevention method by environmentalists and policymakers. Nonetheless, empirical evidence in this discussion remains sparse. The primary objective of this study is to investigate the determining factors of ‘reduce’ intention among employees in companies with MSC Malaysia status. Premised on the classic theory of planned behaviour (TPB) and survey analysis, this study reports that attitude, subjective norms and perceived behavioural controls are significant predictors of ‘reduce’ intention. The recommendations put forth in this study consider governmental policies and corporate actions that potentially bring ICT-waste under control

    Curie-point depths, geothermal gradients and sub-surface heat flow estimation from spectral analysis of high-resolution aeromagnetic data over Gongola Basin and its environs, Northeastern Nigeria

    Get PDF
    Geothermal energy resources have been established globally to be among the sustainable and environmentally harmless means of energy generation. Curie-point depths (CPD), temperature gradients, and heat flow data over the study area were computed using a spectral analysis method in order to have a preliminary view of the geothermal implications (prospect) of the current area. Aeromagnetic data acquired by the Nigerian Geological Survey Agency (NGSA) in the year 2009 was used for the research. The results showed the minimum, maximum, and the average CPD values as 8.18 km, 31.48 km, and 13.0 km, respectively. The minimum, maximum and average thermal gradients obtained were 18.42 °C/km, 70.91 °C/km, and 50.2 °C/km, respectively. The heat flow data obtained ranged from 33.15 mW/m2 to 177.28 mW/m2, with an average value of 110.65 mW/m2. Locations depicting shallow CPDs anomalies (Alkaleri, Darazo, Dukku, Misau, Wuyo, Deba, and Tula), also showed conformity with high heat flow areas. As such, they are regarded as areas of promising geothermal prospects and are recommended for further detailed investigation. Locations depicting a high magnetic susceptibility contrast from a generated analytic signal map, as well as high temperature gradients, high heat flow, and shallow CPDs are attributed to crustal thinning along the sedimentary basin and magmatic intrusions along basement areas, respectively. The magnetic depth to the basement calculated for the study area using the source parameter imaging (SPI) method ranges from 0.610 km to 3.055 km. The present study has provided an insight on preliminary information, regarding new areas of possible geothermal prospects for further detailed investigation

    A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function Grøstl

    Get PDF
    This article describes the design of an 8-bit coprocessor for the AES (encryption, decryption, and key expansion) and the cryptographic hash function Grøstl on several Xilinx FPGAs. Our Arithmetic and Logic Unit performs a single instruction that allows for implementing AES encryption, AES decryption, AES key expansion, and Grøstl at all levels of security. Thanks to a careful organization of AES and Grøstl internal states in the register file, we manage to generate all read and write addresses by means of a modulo-128 counter and a modulo-256 counter. A fully autonomous implementation of Grøstl and AES on a Virtex-6 FPGA requires 169 slices and a single 36k memory block, and achieves a competitive throughput. Assuming that the security guarantees of Grøstl are at least as good as the ones of the other SHA-3 finalists, our results show that Grøstl is the best candidate for low-area cryptographic coprocessors
    corecore