Search Results

Regeneration And RNAi-Mediated Downregulation Of Cyano-Glycoside Biosynthesis In Cassava (Manihot Esculenta, Crantz)

ABSTRACT Cassava (Manihot esculenta, Crantz) is an important perennial tropical crop for millions of people around the world particularly in Sub-Saharan Africa. It is preferred due to its agronomical attributes such as ability to grow in poor soils and drought resistance. Cassava storage roots are also a good source of starch. In addition, cassava leaves and tender shoots are eaten as vegetables in many parts of Africa, Kenya included and are an excellent source of vitamins, minerals and pro...

Causes Of Social Security Contribution Evasion In Zimbabwe

ABSTRACT This study sought to investigate the causes of social security contribution evasion in Zimbabwe. In this study 228 social security contributors were used. The researcher used questionnaires as research instruments. The study showed that the main causes of social security contribution evasion in Zimbabwe are the negative macroeconomic fundamentals, planned behaviour and poor compliance culture. The study revealed that Economic deterrents do not influence the social security contribut...

The Production Of Yam Flour

ABSTRACT The project dealt on the production of yam flour from yam chips. The yams were peeled and washed, 100grams samples coded sample A to G were subjected to two different drying conditions. Some were dried using the sun drying method while the others were dried through oven drying method kept at constant temperature of 500C, sodium bi-carbonate was added to some of the samples, all these were done to obtain a flour with the best colour and texture quality. From the results obtained, it w...

DESIGN AND CONSTRUCTION OF A CASSAVA GRATING MACHINE

ABSTRACT There is need for the hygienic processing of cassava prevalent conditions in the commercial grating areas of this staple food show a susceptibility to food contamination.  A home scale cassava grater was improved on in a design and fabrication.  Machine efficiency, safety factors, and portability were considered in this research.  The grating hopper and clinte were modified using stainless steel sheet, the machine runs on single phase 6.5hp (horse power) diesel engine at a speed o...

PRODUCTS CONTAMINATION AND QUALITY CONTROL ANALYSIS

SYNOPSIS Quality control can be seen as the activities that sustain the quality of a product in order to satisfy a given requirement or meet certain standards. (McGraw-Hill Dictionary, 2003). It is applicable in all phases of the production cycle. In food products, qualities such as composition, structure (molecular, microscopic and macroscopic), physicochemical and sensory attributes are all analyzed.  These analyses are carried out both to satisfy customers’ and meet regulatory standards...

THE ELECTRONIC PAYMENT SECURITY SYSTEM

ABSTRACTThe financial institutions seek to cut the cost of mediators through direct deal with the consumers and share information with the Internet users as well as encourage customers to pay on-line. One of the main problems faced by Organizations in terms of dealing and paying on-line that Internet users are worried and unwilling to send sensitive information through the Internet. In fact customers are scared that during the transactions hackers and Internet interlopers will steal their inf...

Assessment of Food Safety in the Bread Supply Chain in Ekiti State, Nigeria

ABSTRACT Bread is an important staple food that does not require further processing before consumption. Despite the awareness created and efforts of government to ensure that quality bread are available for consumption of all, there are several routes through which bread is being contaminated. Problems such as accelerating bread production, unsafe packaging and unhygienic handIing of finished bread is emphasis in the study so therefore, assessments of sanitation and hygiene practices among ba...

MICROBIAL QUALITY OF READY TO EAT FOODS AND SOME VEGETABLES SOLD AT AFOR-ULE MARKET, ABA.

Bacteria are group of microorganisms all of which lack a distinct nuclear membrane (and hence are considered more primitive than animal and plant cells) and of most which have a cell wall of unique composition. Most bacteria are unicellular; the cells maybe spherical (coccu), rod-shaped (bacillus), spiral (spirillum), comma-shaped (vibrio) or corkscrew-shaped (spierocheate). Generally, they range in size between 0.5 and 5um. (Elizabeth and Martin, 2003). Food is any substance that people or ...

The Impact Of Collateral Security On Bank Lending (A Case Study Of First Bank Of Nigeria Plc,)

ABSTRACT To secure   a better understanding of the impact of collateral security on bank lending. The objective of this work therefore is to examine the factors the necessitated the impact of collateral security in the Bank Lending with particular reference to the borrow and also to researchers. Primary data was generated through the administration of questionnaires among the employees of First Bank of Nigeria Plc. Responses from the questionnaires were classified according, Responses table...

THE HEALTH IMPLICATION OF POOR FOOD INTAKE ON PRESCHOOL CHILDREN IN AFIKPO NORTH LOCAL GOVERNMENT

Abstract This work focused on the health implication of  poor food intake on preschool children in Afikpo North Local Government Area of Ebonyi State, the main purpose of the study was to identify the food intake, to examine the effect of poor nutrition on an intellectual performance, to determine the influence of junk foods on a child health. The significant or relevant of this study was also stated in this research chapter. Lastly the scope of the study was drowned and the term used were p...

DESIGN AND SIMULATION OF A SECURED WIRELESS NETWORK (A CASE STUDY OF HOUDEGBE NORTH AMERICAN UNIVERSITY BENIN)

ABSTRACT This project topic “Secured Wireless Network” was carried out with a view to deploying effective security for wireless networks. The project developed a system that lets typical users easily build a highly secured wireless network. My aim is to show how user interface can be applied to provide a complete solution for securing wireless networks. Securing a wireless network is an important issue since they are wireless broadcasting a signal out over an area, any computer within t...

THE IMPLICATION OF TERRORISM ON REGIONAL PEACE AND SECURITY: CASE STUDY OF BOKO HARAM

The terrorization of the Northern region by the Boko-Haram sect since 2009 have created fear in Nigeria and has brought about restlessness and insecurity in the country. The study examines the growth of this sect, efforts that has been made in addressing the challenges brought about by their nefarious activities but more importantly the implication on regional peace and security.The study is descriptive and the data obtained were both primary but mostly secondary sources. It was found that th...

Design And Implementation Of A Network Based Security Information System

ABSTRACT The fundamental aim of this project “Design and Implementation of Network Based Security Information System†is to emphasize how a system of information network aids the government and police administration in decision taking through a range of statistical data as collected and analyzed in an existing information system. It also airs the different machines used in information processing system to reduce the much-engaged manual efforts.  The system design is also introduce...

THE ROLE OF JOB SATISFACTION ON WORKERS PRODUCTIVITY IN THE HOSPITALITY SECTOR

Abstract The nature of hospitality refers to the sharing of food, drink and accommodation to the people who are not regular members of a household. These people here can be strangers, neighbours, outsiders etc. basically, the host provides food, drink and shelter in their own home and share them with guest without concern for financial payback. Telfer (1996) The hospitality industry is comprised of commercial organizations that specialize in providing accommodation and/or food and/or drinks,...

Information Security Adherence in Institutions of Higher Education; A Case Study of American University of Nigeria

Abstract Institution of higher education face a higher level of information security incidence and compromise such as data and information theft, malicious program infection, attack on the information systems infrastructure and computer network. The antagonistic impact of information security incidence includes compromise of confidential data and intellectual property, massive financial losses and increased level of information security vulnerability and threat. This study aims to determine ...


106 - 120 Of 134 Results