Use of Orange Residue in Developing Type Cracker Biscuits

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Rheological and qualitative characteristics of pea flour incorporated cracker biscuits

The suitability of pea flour for cracker biscuits production was investigated in this study. Pea flour was characterised by high protein (21.46 %) and ash (3.11 %) content and exhibited relatively high emulsifying (37.50 ml/100 ml) and foaming (53.50 ml/100 ml) capacity. The effect of pea flour incorporation to wheat dough (substitution levels 0, 10, 20 and 30 %) on the rheological properties, ...

متن کامل

: metadiscourse in introduction sections of applied linguistics and physics research articles: exploring variation in frequency and type

abstract in written mode of language, metadiscourse markers are used commonly to help writers in general and academic writers in particular to produce coherent and professional texts. the purpose of the present study was to compare introduction sections of applied linguistics and physics articles regarding their use of interactive and interactional metadiscourse markers based on the model pro...

15 صفحه اول

Noncommutative Polly Cracker-type cryptosystems and chosen-ciphertext security

In this paper we consider chosen-ciphertext attacks against noncommutative Polly Cracker-type cryptosystems. We present several versions of these attacks, as well as techniques to counter them. First we introduce a chosen-ciphertext attack, which assumes a very simple private key. We then present generalizations of this attack which are valid in more general situations, and propose a simple but...

متن کامل

Countering chosen-ciphertext attacks against noncommutative polly cracker-type cryptosystems

In [2], Stanislav Bulygin presents a chosen-ciphertext attack against certain instances of noncommutative polly cracker-type cryptosystems which were proposed in [7] and [9]. In this article, we present generalized versions of this attack, which can be used against virtually all polly cracker-type cryptosystems. We then present a simple but effective techique to counter these attacks. We also p...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Revista Ciencias Exatas e Naturais

سال: 2013

ISSN: 1518-0352

DOI: 10.5935/recen.2013.01.08