Search results for: food safety and authentication
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6619

Search results for: food safety and authentication

6349 Identify the Traffic Safety Needs among Risky Groups in Iraq

Authors: Aodai Abdul-Illah Ismail

Abstract:

Even though the dramatic progress that has been made in traffic safety, but still millions of peoples get killed or injured as a result of traffic crashes, besides the huge amount of economic losses due to these crashes. So traffic safety continues to be one of the most important serious issues worldwide, and it affects everyone who uses the road network system, whether you drive, walk, cycle, or push a pram. One of the most important sides that offers promise for further progress in relation to traffic safety is related to risky groups (special population groups) who may have higher potential to be involved in accidents. Traffic safety needs of risky groups are different from each other and also from the average population. Due to the various limitations between these special groups from each other and from the average population, it is not possible to address all the issues –at the same time- raising the importance ranking among the other safety issues. This paper explains a procedure used to identify the most critical traffic safety issues of five risky groups, which include younger, older and female drivers, people with disabilities and school aged children. Multi criteria used in selecting the critical issues because the single criteria is not sufficient. Highway safety professionals were surveyed to obtain the ranking of importance among the risky groups and then to develop the final ranking among issues by applying weight for each of the criteria.

Keywords: traffic safety, risky groups, old drivers, young drivers

Procedia PDF Downloads 328
6348 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 290
6347 Change in Food Choice Behavior: Trend and Challenges

Authors: Gargi S. Kumar, Mrinmoyi Kulkarni

Abstract:

Food choice behavior is complex and determined by biological, psychological, socio-cultural, and economic factors. The past two decades, have seen dramatic changes in food consumption patterns among urban Indian consumers. The objective of the current study was to evaluate perceptions about changes with respect to food choice behavior. Ten participants [urban men and women] ranging in age from 40 to 65 were selected and in-depth interviews were conducted with a set of open ended questions. The recorded interviews were transcribed and thematically analyzed using inductive, open and axial coding. The results identified themes that act as drivers and consequences of change in food choice behavior. Drivers such as globalization [sub themes of urbanization, education, income, and work environment], media and advertising, changing gender roles, women in the workforce, and change in family structure have influenced food choice, both at an individual and national level. The consequences of changes in food choice were health implications, processed food consumption, food decisions driven by children and eating out among others. The study reveals that, over time, food choices change and evolve. However it is interesting to note how market forces and culture interact to influence individual behavior and the overall food environment which subsequently affects food choice and the health of the people.

Keywords: change, consequences, drivers, food choice, globalization

Procedia PDF Downloads 204
6346 Listeria and Spoilage Inhibition Using Neutralized and Sodium Free Vinegar Powder

Authors: E. Heintz, H. J. van Lent, K. Glass, J. Lim

Abstract:

The trend for sodium reduction in food products is clear. Following the World Health Organization (WHO) publication on sodium usage and intake, several countries have introduced initiatives to reduce food-related sodium intake. As salt is a common food preservative, this trend motivates the formulation of a suitable additive with comparable benefits of shelf life extension and microbial safety. Organic acid derivatives like acetates are known as generic microbial growth inhibitors and are commonly applied as additives to meet food safety demands. However, modern consumers have negative perceptions towards -synthetic-derived additives and increasingly prefer natural alternatives. Vinegar, for example, is a well-known natural fermentation product used in food preservation. However, the high acidity of vinegar often makes it impractical for direct use in meat products and a neutralized form would be desirable. This research demonstrates the efficacy of powdered vinegar (Provian DV) in inhibiting Listeria and spoilage organisms (LAB) to increase safety and shelf life of meat products. For this, the efficacy of Provian DV was compared to the efficacy of Provian K, a commonly used sodium free acetate-based preservative, which is known for its inhibition against Listeria. Materials & methods— Cured pork hams: Ingredients: Pork ham muscle, water, salt, dextrose, sodium tripolyphosphate, carrageenan, sodium nitrite, sodium erythorbate, and starch. Targets: 73-74% moisture, 1.75+0.1% salt, and pH 6.4+0.1. Treatments: Control (no antimicrobials), Provian®K 0.5% and 0.75%, Provian®DV 0.5%, 0.65%, 0.8% and 1.0%. Meat formulations in casings were cooked reaching an internal temperature of 73.9oC, cooled overnight and stored for 4 days at 4oC until inoculation. Inoculation: Sliced products were inoculated with approximately 3-log per gram of a cocktail of L. monocytogenes (including serotypes 4b, 1/2a and 1/2b) or LAB-cocktail (C. divergens and L. mesenteroides). Inoculated slices were vacuum packaged and stored at 4oC and 7°C. Samples were incubated 28 days (LAB) or 12 weeks (L. monocytogenes) Microbial analysis: Microbial populations were enumerated in rinsate obtained after adding 100ml of sterile Butterfield’s phosphate buffer to each package and massaging the contents externally by hand. L. monocytogenes populations were determined on triplicate samples by surface plating on Modified Oxford agar whereas LAB plate counts were determined on triplicate samples by surface plating on All Purpose Tween agar with 0.4% bromocresol purple. Proximate analysis: Triplicate non-inoculated ground samples were analyzed for the moisture content, pH, aw, salt, and residual nitrite. Results—The results confirmed the no growth of Listeria on cured ham with 0.5% Provian K stored at 4°C and 7°C for 12 weeks, whereas the no-antimicrobial control showed a 1-log increase within two weeks. 0.5% Provian DV demonstrated similar efficacy towards Listeria inhibition at 4°C while 0.65% Provian DV was required to match the Listeria control at 7°C. 0.75% Provian K and 1% Provian DV were needed to show inhibition of the LAB for 4 weeks at both temperatures. Conclusions—This research demonstrated that it is possible to increase safety and shelf life of cured ready-to-eat ham using preservatives that meet current food trends, like sodium reduction and natural origin.

Keywords: food safety, natural preservation, listeria control, shelf life extension

Procedia PDF Downloads 114
6345 Eating Behaviour and the Nature of Food Consumption in a Malaysian Adults Sample

Authors: Madihah Shukri

Abstract:

Research examining whether eating behaviour is related to unhealthy or healthy eating pattern is required to explain the mechanisms underlying obesity, and to inform health intervention aim to prevent and treat obesity. The purpose of this study was to investigate the relationship between eating behaviours and nature of food consumption. Methods: This was a cross-sectional study of 588 adults (males = 231 and females = 357). The Dutch Eating Behaviour Questionnaire (DEBQ) was used to measure restrained, emotional and external eating. Nature of food consumption was assessed by self-reported consumption of fruit and vegetables, sweet food, junk food and snacking. Results: Results revealed that emotional eating was found to be the principal predictor of the consumption of less healthy food (sweet food, junk food and snacking), while external eating predicted sweet food intake. Intake of fruit and vegetable was associated with restrained eating. In light of the significant associations between eating behaviour and nature of food consumption, acknowledging individuals eating styles can have implications for tailoring effective nutritional programs in the context of obesity and chronic disease epidemic.

Keywords: eating behaviour, food consumption, adult, Malaysia

Procedia PDF Downloads 345
6344 The Internet of Things: A Survey of Authentication Mechanisms, and Protocols, for the Shifting Paradigm of Communicating, Entities

Authors: Nazli Hardy

Abstract:

Multidisciplinary application of computer science, interactive database-driven web application, the Internet of Things (IoT) represents a digital ecosystem that has pervasive technological, social, and economic, impact on the human population. It is a long-term technology, and its development is built around the connection of everyday objects, to the Internet. It is estimated that by 2020, with billions of people connected to the Internet, the number of connected devices will exceed 50 billion, and thus IoT represents a paradigm shift in in our current interconnected ecosystem, a communication shift that will unavoidably affect people, businesses, consumers, clients, employees. By nature, in order to provide a cohesive and integrated service, connected devices need to collect, aggregate, store, mine, process personal and personalized data on individuals and corporations in a variety of contexts and environments. A significant factor in this paradigm shift is the necessity for secure and appropriate transmission, processing and storage of the data. Thus, while benefits of the applications appear to be boundless, these same opportunities are bounded by concerns such as trust, privacy, security, loss of control, and related issues. This poster and presentation look at a multi-factor authentication (MFA) mechanisms that need to change from the login-password tuple to an Identity and Access Management (IAM) model, to the more cohesive to Identity Relationship Management (IRM) standard. It also compares and contrasts messaging protocols that are appropriate for the IoT ecosystem.

Keywords: Internet of Things (IoT), authentication, protocols, survey

Procedia PDF Downloads 278
6343 Safety Management on Construction Sites

Authors: Jonathan Doku

Abstract:

The study's goal was to evaluate construction site safety management in Ghana. The construction sector has long been seen as a high-risk business. It entails a variety of hazardous and challenging labor duties, such as lifting and working at a height, among others. The accident rate is a standard indicator for comparing the safety performance of construction projects. Because of its high-risk and fast-changing work environment, the construction business is regarded as one of the industries with the highest accident rates in the world. Many mishaps and work-related diseases have occurred there, and construction workers are particularly vulnerable to catastrophic calamities such as falls, collapses, and burial. The study's main goals were to discover characteristics that have a substantial impact on construction site safety, to evaluate the safety management methods utilized on construction sites, and to assess the obstacles associated with construction site safety management. The study was conducted using a quantitative research method and a purposive sampling strategy. Google forms were used to distribute self-administered surveys to 85 responders. 72 of the 85 questionnaires were completed and submitted for analysis, accounting for 84.7 percent of the total. The variables were analyzed using descriptive statistics, mean score ranking, and Cronbach's Alpha Coefficient to ensure the scale's reliability. The formal safety organization structure and the Safety checklist were identified as the key practices of safety management on site as part of the study goals. In addition, it was discovered that the most serious problem with safety management is ineffective supervision. To guarantee efficient monitoring and proper implementation of health and safety rules on building sites, management must be on the ball.

Keywords: construction, safety, risk, management

Procedia PDF Downloads 53
6342 Geo-Spatial Methods to Better Understand Urban Food Deserts

Authors: Brian Ceh, Alison Jackson-Holland

Abstract:

Food deserts are a reality in some cities. These deserts can be described as a shortage of healthy food options within close proximity of consumers. The shortage in this case is typically facilitated by a lack of stores in an urban area that provide adequate fruit and vegetable choices. This study explores new avenues to better understand food deserts by examining modes of transportation that are available to shoppers or consumers, e.g. walking, automobile, or public transit. Further, this study is unique in that it not only explores the location of large grocery stores, but small grocery and convenience stores too. In this study, the relationship between some socio-economic indicators, such as personal income, are also explored to determine any possible association with food deserts. In addition, to help facilitate our understanding of food deserts, complex network spatial models that are built on adequate algorithms are used to investigate the possibility of food deserts in the city of Hamilton, Canada. It is found that Hamilton, Canada is adequate serviced by retailers who provide healthy food choices and that the food desert phenomena is almost absent.

Keywords: Canada, desert, food, Hamilton, store

Procedia PDF Downloads 220
6341 Functional Food Industry in Thailand: Perspectives from Government, Education, and Private Sector

Authors: Charintorn Suwannawong, Tananpon Yavilas, Sopida Boonaneksap, Chotika Viriyarattanasak, Chairath Tangduangdee

Abstract:

With increasing aging population and health conscious consumers, the demand for health promoting products such as functional foods, dietary supplements, and nutraceutical products has continuously increased in Thailand. Nevertheless, the strategic framework for regulatory functional food developments in Thailand is still unclear. The objective of this study was to survey stakeholders’ perspectives on three scopes, consisting of 1) the current status 2) obstacles, and 3) future trend for the development and production of functional foods in Thailand. A survey was conducted by interviewing ten experts from governmental organization, industrial sector and academic institute. The obtained results show that there is no established definition for functional foods in Thailand. There is a variety of raw materials that are capable to be potential ingredients for functional food production in Thailand and exported to global market. However, the scaling up technology into a commercial production is limited. Moreover, there is a need to establish the infrastructures, such as testing laboratory, and regulatory standards for quality control and ensuring product safety. This information is useful for government in the development of the strategic framework and policy statement on improvement of functional food industry in Thailand.

Keywords: functional foods, interview, perspective, Thailand

Procedia PDF Downloads 261
6340 Research on Evaluation Method of Urban Road Section Traffic Safety Status Based on Video Information

Authors: Qiang Zhang, Xiaojian Hu

Abstract:

Aiming at the problem of the existing real-time evaluation methods for traffic safety status, a video information-based urban road section traffic safety status evaluation method was established, and the rapid detection method of traffic flow parameters based on video information is analyzed. The concept of the speed dispersion of the road section that affects the traffic safety state of the urban road section is proposed, and the method of evaluating the traffic safety state of the urban road section based on the speed dispersion of the road section is established. Experiments show that the proposed method can reasonably evaluate the safety status of urban roads in real-time, and the evaluation results can provide a corresponding basis for the traffic management department to formulate an effective urban road section traffic safety improvement plan.

Keywords: intelligent transportation system, road traffic safety, video information, vehicle speed dispersion

Procedia PDF Downloads 137
6339 Durian Marker Kit for Durian (Durio zibethinus Murr.) Identity

Authors: Emma K. Sales

Abstract:

Durian is the flagship fruit of Mindanao and there is an abundance of several cultivars with many confusing identities/ names. The project was conducted to develop procedure for reliable and rapid detection and sorting of durian planting materials. Moreover, it is also aimed to establish specific genetic or DNA markers for routine testing and authentication of durian cultivars in question. The project developed molecular procedures for routine testing. SSR primers were also screened and identified for their utility in discriminating durian cultivars collected. Results of the study showed the following accomplishments; 1. Twenty (29) SSR primers were selected and identified based on their ability to discriminate durian cultivars, 2. Optimized and established standard procedure for identification and authentication of Durian cultivars 3. Genetic profile of durian is now available at Biotech Unit. Our results demonstrate the relevance of using molecular techniques in evaluating and identifying durian clones. The most polymorphic primers tested in this study could be useful tools for detecting variation even at the early stage of the plant especially for commercial purposes. The process developed combines the efficiency of the microsatellites development process with the optimization of non-radioactive detection process resulting in a user-friendly protocol that can be performed in two (2) weeks and easily incorporated into laboratories about to start microsatellite development projects. This can be of great importance to extend microsatellite analyses to other crop species where minimal genetic information is currently available. With this, the University can now be a service laboratory for routine testing and authentication of durian clones.

Keywords: DNA, SSR analysis, genotype, genetic diversity, cultivars

Procedia PDF Downloads 431
6338 Microbial Quality Assessment of Indian White Shrimp, Penaeus Indicus from Southwest Bangladesh

Authors: Saima Sharif Nilla, Mahmudur Rahman Khan, Anisur Rahman Khan, Ghulam Mustafa1

Abstract:

The microbial quality of Indian white shrimp (Peneaus indicus) from Bagerhat, Khulna and Satkhira of southwest Bangladesh was assessed where the parameters varied with different sources and the quality was found to be poor for Satkhira shrimp samples. Shrimp samples in fresh condition were collected to perform the microbial assessment and 10 pathogenic isolates for antibiotic sensitivity test to 12 antibiotics. The results show that total bacterial count of all the samples were beyond the acceptable limit 105 cfu/g. In case of total coliform and E. coli density, no substantial difference (p<0.5) was found between the different shrimp samples from different districts and also high quantity of TC exceeding the limit (>102 cfu/g) proves the poor quality of shrimp. The FC abundance found in shrimps of Bagerhat and Satkhira was similar and significantly higher (p<0.5) than that of Khulna samples. No significant difference (p<0.5) was found among the high density of Salmonella-Shigella, Vibrio spp., and Staphylococcus spp. of the shrimp samples from the source places. In case of antibiotic sensitivity patterns, all of them were resistant to ampicillin, Penicillin and sensitive to kanamycin. Most of the isolates were frequently sensitive to ciprofloxacin and streptomycin in the sensitivity test. In case of nutritional composition, no significant difference (t-test, p<0.05) was found among protein, lipid, moisture and ash contents of shrimp samples. The findings prove that shrimp under this study was more or less contaminated and samples from Satkhira were highly privileged with food borne pathogens which confirmed the unhygienic condition of the shrimp farms as well as the presence of antibiotic resistance bacteria in shrimp fish supposed to threat food safety and deteriorate the export quality.

Keywords: food borne pathogens, satkhira, penaeus indicus, antibiotic sensitivity, southwest Bangladesh, food safety

Procedia PDF Downloads 684
6337 A Safety-Door for Earthquake Disaster Prevention - Part II

Authors: Daniel Y. Abebe, Jaehyouk Choi

Abstract:

The safety of door has not given much attention. The main problem of doors during and after earthquake is that they are unable to be opened because deviation from its original position by the lateral load. The aim of this research is to develop and evaluate a safety door that keeps the door frame in its original position or keeps its edge angles perpendicular during and post-earthquake. Nonlinear finite element analysis was conducted in order to evaluate the structural performance and behavior of the proposed door under both monotonic and cyclic loading.

Keywords: safety-door, earthquake disaster, low yield point steel, passive energy dissipating device, FE analysis

Procedia PDF Downloads 449
6336 WHO Surgical Safety Checklist in a Rural Ugandan Hospital, Barriers and Drivers to Implementation

Authors: Lucie Litvack, Malaz Elsaddig, Kevin Jones

Abstract:

There is strong evidence to support the efficacy of the World Health Organization (WHO) Surgical Safety Checklist in improving patient safety; however, its use can be associated with difficulties. This study uses qualitative data collected in Kitovu Healthcare Complex, a rural Ugandan hospital, to identify factors that may influence the use of the checklist in a low-income setting. Potential barriers to and motivators for the hospital’s use of this checklist are identified and explored through observations of current patient safety practices; semi-structured interviews with theatre staff; a focus group with doctors; and trial implementation of the checklist. Barriers identified include the institutional context; knowledge and understanding; patient safety culture; resources and checklist contents. Motivators for correct use include prior knowledge; team attitudes; and a hospital advocate. Challenges are complex and unique to this socioeconomic context. Stepwise change to improve patient safety practices, local champions, whole team training, and checklist modification may assist the implementation and sustainable use of the checklist in an effective way.

Keywords: anaesthesia, patient safety, Uganda, WHO surgical safety checklist

Procedia PDF Downloads 336
6335 Food Bolus Obstruction: A Rural Hospital’s Experience

Authors: Davina Von Hagt, Genevieve Gibbons, Matt Henderson, Tom Bowles

Abstract:

Purpose: Food bolus obstructions are common emergency surgical presentations, but there is no established management guideline in a rural setting. Intervention usually involves endoscopic removal after initial medical management has failed. Within a rural setting, this falls upon the general surgeon. There are varied endoscopic techniques that may be used. Methodology: A review of the past fifty cases of food bolus obstruction managed at Albany Health Campus was retrospectively reviewed to assess endoscopic findings and techniques. Operation notes, histopathology, imaging, and patient notes were reviewed. Results: 50 patients underwent gastroscopy for food bolus obstruction from August 2017 to March 2021. Ages ranged from 11 months to 95 years, with the majority of patients aged between 30-70 years. 88% of patients were male. Meat was the most common bolus (20% unspecified, 20% steak, 10% chicken, 6% lamb, 4% sausage, 2% pork). At endoscopy, 12% were found not to have a food bolus obstruction. Two patients were found to have oesophageal cancer, and four patients had a stricture and required dilatation. A variety of methods were used to relieve oesophageal obstruction ranging from pushing through to stomach (24 patients), using an overtube (10 patients), raptor (13 patients), and less common instruments such as Roth net, basket, guidewire, and pronged grasper. One patient had an unsuccessful endoscopic retrieval and required theatre for laparoscopic assisted removal with rendezvous endoscopic piecemeal removal via oesophagus and gastrostomy. Conclusion: Food bolus obstruction is a common emergency presentation. Within the rural setting, management requires innovation and teamwork within the safety of the local experience.

Keywords: food bolus obstruction, regional hospital, surgical management, innovative surgical treatment

Procedia PDF Downloads 223
6334 Evaluation of the Safety and Performance of Blood Culture Practices Using BD Safety-Lokᵀᴹ Blood Collection Sets in the Emergency Room

Authors: Jeonghyun Chang, Taegeun Lee, Heungsup Sung, Yoon-Seon Lee, Youn-Jung Kim, Mi-Na Kim

Abstract:

Background: Safety device has been applied to improve safety and performance of blood culture practice. BD vacutainer® Safety-Lokᵀᴹ blood collection sets with pre-attached holder (Safety-Lok) (BD, USA) was evaluated in the emergency room (ER) of a tertiary care hospital. Methods: From April to June 2017, interns and nurses in ER were surveyed for blood culture practices with a questionnaire before and after 2 or 3 weeks of experience of Safety-Lok. All of them participated in exercise workshop for 1 hour combined with video education prior to the initial survey. The blood volume, positive and contamination rates of Safety-Lok-drawn (SD) blood cultures were compared to those of overall blood cultures. Results: Eighteen interns and 30 nurses were enrolled. As a result of the initial survey, interns had higher rates of needlestick incidence (27.8%), carriage of the blood-filled syringe with needle (88.9%) and lower rates of vacutainer use (38.9%) than nurses (13.3%, 53.3%, and 60.0%). Interns preferred to use safety devices (88.9%) rather than nurses (40.0%). The number of overall blood cultures and SD blood cultures was 9,053 and 555, respectively. While the overall blood volume of aerobic bottles was 2.6±2.1 mL, those of SD blood cultures were 5.0±3.0 mL in aerobic bottles and 6.0±3.0 mL in anaerobic bottles. Positive and contamination rates were 6.5% and 0.72% with SD blood cultures and 6.2% and 0.3% with overall blood cultures. Conclusions: The introduction of the safety device would encourage healthcare workers to collect adequate blood volume as well as lead to safer practices in the ER.

Keywords: blood culture, needlestick, safety device, volume

Procedia PDF Downloads 179
6333 Evaluation of Knowledge and Acceptance of Food Irradiated by Individual from Food Bank of Brazil

Authors: Juliana Altavista Sagretti Gallo, Susy Frey Sabato

Abstract:

Despite the poverty in the world, a third of all food produced in the world is wasted. FAO, the United Nations Organization of Agriculture and Food, points out the need to combine actions and new technologies to combat hunger and waste in contrast to the high production of food in the world. The energy of ionizing radiation in food brought many positive results, such as increased validity and insect infestation control. The food banks are organizations that act at various points of the food chain to collect and distribute food to the needy. So, the aim of this study was to initiate a partnership between irradiation and the food bank through the development of a questionnaire to evaluate and disseminate the knowledge and acceptance of individuals in the food bank in Brazil. Also, this study aimed to standardize a basis questionnaire for future research assessment of irradiated foods. For the construction of the questionnaire as a measuring instrument, a comprehensive and rigorous literature review was made. It's covered qualitative research, questionnaires, sensory evaluation, and food irradiated. Three stages of pre - tests were necessary, and related fields of experts were consulted. As a result, the questionnaire has three parts, personal issues, assertive issues and questions of multiple choices and finally an informative question. The questionnaire was applied in Ceagesp food bank in the biggest center of food in Brazil. Conclusions. 30 % of participants of Ceagesp bank had already heard of the Food irradiation but did not know about the mechanism, so they rejected the idea to associate with radioactivity and danger. The video showed in the last question and application of the questionnaire disseminated the idea of security. All individuals declare understand the goal of treatment and accept buy and consume irradiated food after them.

Keywords: bank of food, questionary, irradiated food, acceptance of irradiated food

Procedia PDF Downloads 309
6332 Safety Culture Implementation Based on Occupational Health and Safety Assessment

Authors: Nyambayar Davaadorj, Ichiro Koshijima

Abstract:

Safety or the state of being safe can be described as a condition of being not dangerous or not harmful. It is necessary for an individual to avoid dangerous situations every day. Also, an organization is subject to legal requirements for the health and safety of persons inside and around the immediate workplace, or who are exposed to the workplace activities. Although it might be difficult to keep a situation where complete safety is ensured, efforts must nonetheless be made to consider ways of removing any potential danger within an organization. In order to ensure a safe working environment, the capability of responding (i.e., resilience) to signals (i.e., information concerning events that could pose future problems that must be taken into account) that occur in and around corporations is necessary. The ability to evaluate this essential point is thus one way in which safety and security can be managed. This study focuses on OHSAS18001, an internationally applied standard for the construction and operation of occupational health and safety management systems, by using IDEF0 for Function Modeling (IDEF0) and the Resilience Matrix originally made by Bracco. Further, this study discusses a method for evaluating a manner in which Occupational Health and Safety Assessment Series (OHSAS) systematically functions within corporations. Based on the findings, this study clarifies the potential structural objection for corporations when implementing and operating the OHSAS standard.

Keywords: OHSAS18001, IDEF0, resilience engineering, safety culture

Procedia PDF Downloads 220
6331 Design for Safety: Safety Consideration in Planning and Design of Airport Airsides

Authors: Maithem Al-Saadi, Min An

Abstract:

During airport planning and design stages, the major issues of capacity and safety in construction and operation of an airport need to be taken into consideration. The airside of an airport is a major and critical infrastructure that usually consists of runway(s), taxiway system, and apron(s) etc., which have to be designed according to the international standards and recommendations, and local limitations to accommodate the forecasted demands. However, in many cases, airport airsides are suffering from unexpected risks that occurred during airport operations. Therefore, safety risk assessment should be applied in the planning and design of airsides to cope with the probability of risks and their consequences, and to make decisions to reduce the risks to as low as reasonably practicable (ALARP) based on safety risk assessment. This paper presents a combination approach of Failure Modes, Effect, and Criticality Analysis (FMECA), Fuzzy Reasoning Approach (FRA), and Fuzzy Analytic Hierarchy Process (FAHP) to develop a risk analysis model for safety risk assessment. An illustrated example is used to the demonstrate risk assessment process on how the design of an airside in an airport can be analysed by using the proposed safety design risk assessment model.

Keywords: airport airside planning and design, design for safety, fuzzy reasoning approach, fuzzy AHP, risk assessment

Procedia PDF Downloads 343
6330 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi

Authors: Christopher Manyamba

Abstract:

Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.

Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale

Procedia PDF Downloads 343
6329 Identifying Strategies for Improving Railway Services in Bangladesh

Authors: Armana Sabiha Huq, Tahmina Rahman Chowdhury

Abstract:

In this paper, based on the stated preference experiment, the service quality of Bangladesh Railway has been assessed, and particular importance has been given to investigate if there exists a relationship between service quality and safety. For investigation purposes, environmental and organizational factors were assumed to determine the safety performance of the railway. Data collected from the survey has been analyzed by importance-performance analysis (IPA). In this paper, a modification of the well-known importance-performance analysis (IPA) has been done by adopting the importance of the weights determined through a structural equation modeling (SEM) approach and by plotting the gap between importance and performance on a visual graph. It has been found that there exists a relationship between safety and serviceability to some extent. Limited resources are an important factor to improve the safety and serviceability condition of the BD railway. Moreover, it is observed that the limited resources available to monitor and improve the safety performance of railway.

Keywords: importance-performance analysis, GAP-IPA, SEM, serviceability, safety, factor analysis

Procedia PDF Downloads 117
6328 Household Earthquake Absorptive Capacity Impact on Food Security: A Case Study in Rural Costa Rica

Authors: Laura Rodríguez Amaya

Abstract:

The impact of natural disasters on food security can be devastating, especially in rural settings where livelihoods are closely tied to their productive assets. In hazards studies, absorptive capacity is seen as a threshold that impacts the degree of people’s recovery after a natural disaster. Increasing our understanding of households’ capacity to absorb natural disaster shocks can provide the international community with viable measurements for assessing at-risk communities’ resilience to food insecurities. The purpose of this study is to identify the most important factors in determining a household’s capacity to absorb the impact of a natural disaster. This is an empirical study conducted in six communities in Costa Rica affected by earthquakes. The Earthquake Impact Index was developed for the selection of the communities in this study. The households coded as total loss in the selected communities constituted the sampling frame from which the sample population was drawn. Because of the study area geographically dispersion over a large surface, the stratified clustered sampling hybrid technique was selected. Of the 302 households identified as total loss in the six communities, a total of 126 households were surveyed, constituting 42 percent of the sampling frame. A list of indicators compiled based on theoretical and exploratory grounds for the absorptive capacity construct served to guide the survey development. These indicators were included in the following variables: (1) use of informal safety nets, (2) Coping Strategy, (3) Physical Connectivity, and (4) Infrastructure Damage. A multivariate data analysis was conducted using Statistical Package for Social Sciences (SPSS). The results show that informal safety nets such as family and friends assistance exerted the greatest influence on the ability of households to absorb the impact of earthquakes. In conclusion, communities that experienced the highest environmental impact and human loss got disconnected from the social networks needed to absorb the shock’s impact. This resulted in higher levels of household food insecurity.

Keywords: absorptive capacity, earthquake, food security, rural

Procedia PDF Downloads 229
6327 A Voice Signal Encryption Scheme Based on Chaotic Theory

Authors: Hailang Yang

Abstract:

To ensure the confidentiality and integrity of speech signals in communication transmission, this paper proposes a voice signal encryption scheme based on chaotic theory. Firstly, the scheme utilizes chaotic mapping to generate a key stream and then employs the key stream to perform bitwise exclusive OR (XOR) operations for encrypting the speech signal. Additionally, the scheme utilizes a chaotic hash function to generate a Message Authentication Code (MAC), which is appended to the encrypted data to verify the integrity of the data. Subsequently, we analyze the security performance and encryption efficiency of the scheme, comparing and optimizing it against existing solutions. Finally, experimental results demonstrate that the proposed scheme can resist common attacks, achieving high-quality encryption and speed.

Keywords: chaotic theory, XOR encryption, chaotic hash function, Message Authentication Code (MAC)

Procedia PDF Downloads 27
6326 An Investigation of Thai Passengers’ Level of Understanding and Awareness: Cabin Crew Safety Briefing

Authors: Chantarat Manvichien, Kevin Wongleedee

Abstract:

The purpose of this research was to study Thai passengers’ level of understanding and awareness of the cabin crew safety briefing in the airplane during the preparation to take off and landing. It is important to know if Thai passengers pay attention to cabin crew safety briefing and to suggest a better way to draw their attention. The independent variables included gender, age, income, levels of education, travelling purpose, and travelling frequency while the dependent variables was level of awareness. A simple random sampling method was utilized to get 400 respondents. The findings revealed the ranking the first three levels of importance by highest mean to lowest mean as follows: (1) It is important to listen to cabin crew safety briefing; (2) Cabin crew briefing is interesting; (3) Information from cabin crew safety briefing is easy to understand. In addition, the overall means was 3.27 with 0.800 SD.

Keywords: cabin crew, safety briefing, Thai passengers, awareness

Procedia PDF Downloads 385
6325 A Deep Learning Approach to Detect Complete Safety Equipment for Construction Workers Based on YOLOv7

Authors: Shariful Islam, Sharun Akter Khushbu, S. M. Shaqib, Shahriar Sultan Ramit

Abstract:

In the construction sector, ensuring worker safety is of the utmost significance. In this study, a deep learning-based technique is presented for identifying safety gear worn by construction workers, such as helmets, goggles, jackets, gloves, and footwear. The suggested method precisely locates these safety items by using the YOLO v7 (You Only Look Once) object detection algorithm. The dataset utilized in this work consists of labeled images split into training, testing and validation sets. Each image has bounding box labels that indicate where the safety equipment is located within the image. The model is trained to identify and categorize the safety equipment based on the labeled dataset through an iterative training approach. We used custom dataset to train this model. Our trained model performed admirably well, with good precision, recall, and F1-score for safety equipment recognition. Also, the model's evaluation produced encouraging results, with a [email protected] score of 87.7%. The model performs effectively, making it possible to quickly identify safety equipment violations on building sites. A thorough evaluation of the outcomes reveals the model's advantages and points up potential areas for development. By offering an automatic and trustworthy method for safety equipment detection, this research contributes to the fields of computer vision and workplace safety. The proposed deep learning-based approach will increase safety compliance and reduce the risk of accidents in the construction industry.

Keywords: deep learning, safety equipment detection, YOLOv7, computer vision, workplace safety

Procedia PDF Downloads 48
6324 Comparison of Safety Factor Evaluation Methods for Buckling of High Strength Steel Welded Box Section Columns

Authors: Balazs Somodi, Balazs Kovesdi

Abstract:

In the research praxis of civil engineering the statistical evaluation of experimental and numerical investigations is an essential task in order to compare the experimental and numerical resistances of a specific structural problem with the proposed resistances of the standards. However, in the standards and in the international literature there are several different safety factor evaluation methods that can be used to check the necessary safety level (e.g.: 5% quantile level, 2.3% quantile level, 1‰ quantile level, γM partial safety factor, γM* partial safety factor, β reliability index). Moreover, in the international literature different calculation methods could be found even for the same safety factor as well. In the present study the flexural buckling resistance of high strength steel (HSS) welded closed sections are analyzed. The authors investigated the flexural buckling resistances of the analyzed columns by laboratory experiments. In the present study the safety levels of the obtained experimental resistances are calculated based on several safety approaches and compared with the EN 1990. The results of the different safety approaches are compared and evaluated. Based on the evaluation tendencies are identified and the differences between the statistical evaluation methods are explained.

Keywords: flexural buckling, high strength steel, partial safety factor, statistical evaluation

Procedia PDF Downloads 143
6323 Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms

Authors: Lakshmidevi Sreeramareddy, Komalpreet Kaur, Nane Pothier

Abstract:

Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication.

Keywords: authentication, gesture-based passwords, machine learning algorithms, shoulder-surfing attacks, usability

Procedia PDF Downloads 83
6322 Enhanced Automated Teller Machine Using Short Message Service Authentication Verification

Authors: Rasheed Gbenga Jimoh, Akinbowale Nathaniel Babatunde

Abstract:

The use of Automated Teller Machine (ATM) has become an important tool among commercial banks, customers of banks have come to depend on and trust the ATM conveniently meet their banking needs. Although the overwhelming advantages of ATM cannot be over-emphasized, its alarming fraud rate has become a bottleneck in it’s full adoption in Nigeria. This study examined the menace of ATM in the society another cost of running ATM services by banks in the country. The researcher developed a prototype of an enhanced Automated Teller Machine Authentication using Short Message Service (SMS) Verification. The developed prototype was tested by Ten (10) respondents who are users of ATM cards in the country and the data collected was analyzed using Statistical Package for Social Science (SPSS). Based on the results of the analysis, it is being envisaged that the developed prototype will go a long way in reducing the alarming rate of ATM fraud in Nigeria.

Keywords: ATM, ATM fraud, e-banking, prototyping

Procedia PDF Downloads 286
6321 Consumer Choice Determinants in Context of Functional Food

Authors: E. Grochowska-Niedworok, K. Brukało, M. Kardas

Abstract:

The aim of this study was to analyze and evaluate the consumption of functional food by consumers by: age, sex, formal education level, place of residence and diagnosed diseases. The study employed an ad hoc questionnaire in a group of 300 inhabitants of Upper Silesia voivodship. Knowledge of functional food among the group covered in the study was far from satisfactory. The choice of functional food was of intuitive character. In addition, the group covered was more likely to choose pharmacotherapy instead of diet-related prevention then, which can be associated with presumption of too distant effects and a long period of treatment.

Keywords: consumer choice, functional food, healthy lifestyle, consumer knowledge

Procedia PDF Downloads 236
6320 Food Service Waste Management In Nigeria: Emerging Opportunities And Policy Initiatives For Mitigation

Authors: Victor Oyewumi Ogunbiyi

Abstract:

Food waste is recognised as one of the major global challenges in achieving a sustainable future. Currently, very little is known about the multi-stakeholder approach to food waste management downstream of the supply chain, particularly in the foodservice sector. In order to better understand and explain the complex issues of food waste, a qualitative study was conducted on the generation of food waste in food services (restaurants, catering, canteens, and local food vendors) and policy initiatives to mitigate it from the perspective of the stakeholders. A semi-structured interview approach and observation were used to collect data from some 32 selected stakeholders in Garki, Abuja, Nigeria. Thematic analysis was employed to analyse the data from the qualitative instrument adopted in this study. Results revealed that the attitude of stakeholders, poor environmental hygiene, poor food cooking skills and handling, and lack of communication are the major causes of food waste. This study identified seven policy initiatives: regulations, information and education campaigns, economic instruments, mobile applications, stakeholders’ collaboration, firm internal action, and training. Finally, we link policy initiatives to food waste mitigation to provide a response to the damaging shock of food waste.

Keywords: food waste, foodservices, emerging opportunities, policy initiatives, food waste prevention, multistakeholder. garki district-abuja

Procedia PDF Downloads 62