In this research, production of ethanol from waste potatoes fermentation was studied using Saccharmyses cerevisiae. Potato Flour was prepared from potato tubers after cooking and drying at 85°C. Homogenous slurry of potato flour was prepared in water at solid liquid ratio 1:10. Liquefaction of potato flour slurry with α-amylase at 80°C for 40 min followed by saccharification with glucoamylase at 65°C for 2 hr .Fermentation of hydrolysate with Saccharomyces cerevisiae at 35°C for two days resulted in production of 33 g/l ethanol.
The parameters studied were; temperature, time of fermentation and pH. It was found that Saccharification process is affected by enzyme Amylo 300 conc
... Show MoreThe extraction process of chlorophyll from dehydrated and pulverized alfalfa plant were studied by percolation method. Two solvent systems were used for the extraction namely; Ethanol-water and Hexane-Toluene systems . The effect of circulation rate, solvent concentration, and solvent volume to solid weight ratio were studied. In both ethanol water, and Hexane-Toluene systems it appears that solvent concentration is the most effective variable.
A Tonido cloud server provides a private cloud storage solution and synchronizes customers and employees with the required cloud services over the enterprise. Generally, access to any cloud services by users is via the Internet connection, which can face some problems, and then users may encounter in accessing these services due to a weak Internet connection or heavy load sometimes especially with live video streaming applications overcloud. In this work, flexible and inexpensive proposed accessing methods are submitted and implemented concerning real-time applications that enable users to access cloud services locally and regionally. Practically, to simulate our network connection, we proposed to use the Raspberry-pi3 m
... Show MoreThe aim of this paper is to present a new methodology to find the private key of RSA. A new initial value which is generated from a new equation is selected to speed up the process. In fact, after this value is found, brute force attack is chosen to discover the private key. In addition, for a proposed equation, the multiplier of Euler totient function to find both of the public key and the private key is assigned as 1. Then, it implies that an equation that estimates a new initial value is suitable for the small multiplier. The experimental results show that if all prime factors of the modulus are assigned larger than 3 and the multiplier is 1, the distance between an initial value and the private key
... Show MoreIn recent years, there has been a significant increase in research demonstrating the new and diverse uses of non-thermal food processing technologies, including more efficient mixing and blending processes, faster energy and mass transfer, lower temperature and selective extraction, reduced thermal and concentration gradients, reduced equipment size, faster response to extraction control, faster start-up, increased production, and a reduction in the number of steps in preparation and processing. Applications of ultrasound technology have indicated that this technology has a promising and significant future in the food industry and preservation, and there is a wide scope for its use due to the higher purity of final products and the
... Show MoreA new efficient Two Derivative Runge-Kutta method (TDRK) of order five is developed for the numerical solution of the special first order ordinary differential equations (ODEs). The new method is derived using the property of First Same As Last (FSAL). We analyzed the stability of our method. The numerical results are presented to illustrate the efficiency of the new method in comparison with some well-known RK methods.