Search Results

Food poisoning

This work researches food poisoning,bacterial involved, how food poison takes place, control and treatment of food poisoning. 

BACTERIOCIN IN FOOD PRESERVATION

INTRODUCTION In the production of food, it is crucial to take proper measures to ensure its safety and stability during the shelf-life. At present, many food industries are faced with different microbiological problems such as emergence of new pathogens and pathogens not previously associated withfood consumption, as well as the ability of microorganism to adapt and its resultant mutation that has given rise to altered food safety (Galvez et al., 2007). The empirical use of microorganism...

Products Contamination And Quality Control Analysis

SYNOPSIS Quality control can be seen as the activities that sustain the quality of a product in order to satisfy a given requirement or meet certain standards. (McGraw-Hill Dictionary, 2003). It is applicable in all phases of the production cycle. In food products, qualities such as composition, structure (molecular, microscopic and macroscopic), physicochemical and sensory attributes are all analyzed.  These analyses are carried out both to satisfy customers’ and meet regulatory stan...

Effects Of Integrated Tree Based Food-Energy System On The Livelihoods Of Small-Holder Farmers’ Perceptions In Tharaka Nithi County, Kenya

ABSTRACT Tree Based Integrated Food-energy System is a farming system that combines food crops and trees for wood energy production on the same farm. This farming system aims at producing both food and wood energy on the same piece of land through sustainable crop integration and agro-systems. Therefore, this study was aimed at examining how this system can promote the livelihoods of small-holder farmers in Kenya, with particular focus on Chuka Igambang’ombe Sub-county in Tharaka Nithi Cou...

DESIGNING AND IMPLEMENTING SECURITY SOFTWARE USING CRYPTOGRAPHY METHOD

ABSTRACTIt is due to insecurity in files and data that this project is designed using cryptograph method (conversion of plain text into cipher text (encrypted text)) and conversion of cipher text into plain text (decryption) using key that is known to both sender and receiver of such file or data. When a file is encrypted, only the intended user (receiver or sender) can view it by decrypting it using their symmetric key (password) otherwise, it will be displayed as a corrupted file and a mess...

The Impact of Health And Nutrition On The Performance Of Pre-Primary School Cidldren In Thegu Location, Kieni East District, Kenya

Abstract It is a fact that all people need food and cannot live long without eating enough of it. It is this fact that the researcher has decided to establish the Impact on Health and Nutrition on the Performance of Pre-Primary School in Thegu location Kieni East District; the research is based on finding out the relationship that exist between feeding and the academic performance of the ECE children. The researcher based her research in children Thegu location randomly selected schools and ...

QUALITY ASSURANCE AND QUALITY CONTROL FOR WATER AND FOOD ANALYSIS

Great attention has been paid to food and water quality for centuries. The requirements have been changed according to the development of human knowledge in the field of nutrition, chemistry, microbiology, and analysis. It is necessary first to point out that the term food and water quality is a complex one that includes many indicators. For food and water to be classified as good, it has to fulfill the requirements, especially from the nutritional, sensory, hygienic-toxicological, and techn...

An Analysis Of How Small Scale Arable Farmers Are Adapting To The Impacts Of Climate Variability: A Case Study Of Chisare Village In Cherangani, Transnzoia East Sub-County

ABSTRACT The recent irregular trends in weather patterns have brought about challenges and opportunities in key sectors of the economy especially in developing countries. Agriculture and tourism are just but examples of these sectors that have been widely impacted by climate variability. Countries as Kenya where agriculture and tourism are the leading earners of the economy has seen a downhill scale in the recent years and climate variability is one of the factors that can held responsible. ...

The influence of cash transfer programmes on socio-economic wellbeing of recipient households in Migori county, Kenya

Abstract/Overview Conditional cash transfers are increasingly becoming a best practice in the social sector for developing countries. In 2004, Orphans and Vulnerable Children Cash Transfer was introduced on pilot basis in Kenya. This was in response to the impact of HIV/Aids on children. A study carried out by Kenya National Bureau of Statistics (2006) show poverty rates tend to be higher among vulnerable groups such as children (53.5%), including orphans and vulnerable children (54.1%). Ken...

The Influence of Cash Transfer Programmes on Socio-Economic Wellbeing of Recipient Households In Migori County, Kenya

Abstract/Overview Conditional cash transfers are increasingly becoming best practice in the social sector for developing countries. In 2004, Orphans and Vulnerable Children Cash Transfer was introduced on pilot basis in Kenya. This was in response to the impact of HIV/Aids on children. A study carried out by Kenya National Bureau of Statistics (2006) show poverty rates tend to be higher among vulnerable groups such as children (53.5%), including orphans and vulnerable children (54.1%). Kenya...

MONITR: A Mobile Application for Monitoring Online Accounts' Security

Abstract The 21st century has seen a world where almost everything is carried out by digital or electronic means—signalling an end to the traditional approaches. People nowadays transact businesses over the internet due to convenience and accessibility. Taking full advantage of the internet, most institutions especially the financial institutions have also digitalized their services. For this reason, there has been a dramatic increase in the number of online banking and shopping customers....

A SECURITY GATEWAY

ABSTRACT In the context of computer networking, an application-level gateway (also known as ALG or application layer gateway) consists of a security component that augments a firewall or NAT employed in a computer network. It allows customized NAT traversal filters to be plugged into the gateway to support address and port translation for certain application layer "control/data" protocols such as FTP, Bit-Torrent, SIP, RTSP, file transfer in IM applications etc. In order for these protocols ...

Design And Implementation Of Online Real Estate Management System Case Study: Avrack Real Estate Agents And Brokers

ABSTRACT With the advent of digital age, it is inevitable for Real estate’s organizations to reinforce securitr measures to protect data form loss, unauthorized viewing or corruption. The need to secure stored data and data on transit in a nenvork birthed, and also to ensure data is managed and controlled with efficient measures, to avoid redundancy, inconsistency, mcompatible file formats and fixed queries among other limitations of paperwork. The gist of this project revolves around data...

THE EFFECT OF SMALL SCALE ENTERPRISE ON SOCIO-ECONOMIC DEVELOPMENT IN VANDEIKYA TOWN OF BENUE STATE

ABSTRACT This research work structured in five chapters is centered on the effects of small scale enterprises on socioeconomic development of Vandeikya town of Benue state, Nigeria. Findings have revealed that individual and group enterprises are the common types of small scale enterprises operated in Vandeikya town. It also showed that the start up capital of these enterprises mostly come from personal savings, loan from banks and support from the government. Findings had discovered proble...

INSURGENCY IN NORTH-EASTERN NIGERIA: IMPLICATIONS ON NATIONAL DEVELOPMENT 2007 – 2014

Background to the study  Globally, the issue of security, peace and development is at the centre stage of local,national  and international  discourse.   States,  especially   developing   ones   are   constantly   insearch for security, (Barry, 1983). Nigeria is post-colonial state in its form and Post – colonialstate is tied to the offshoot of imperialism. Over the years, different governments, individualsand   institutions   in   Nigeria   have   systematically�...


91 - 105 Of 159 Results