Search results for: global food security index
10772 Social Media Factor in Security Environment
Authors: Cetin Arslan, Senol Tayan
Abstract:
Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.Keywords: democracy, disorder, security, Social Media
Procedia PDF Downloads 36810771 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security
Authors: Shanshan Zhu, Mohammad Nasim
Abstract:
Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection
Procedia PDF Downloads 5110770 Substitution Effects of Baijiu and Cigarette Consumption on Anti-Corruption Campaigns: Evidence from China
Authors: Xiaohan Gu
Abstract:
China is perceived as one of the most politically corrupt countries in the world. The 2021 Transparency International Corruption Perceptions Index China (RPC) ranks the country in 66th place out of 180 countries in the Index, where the 180 countries are perceived to have the most corrupt public sector. This paper proposes a theory on the impact of corruption on the consumption of luxury goods. We test the theory and evaluate the effectiveness of China’s anti-corruption campaign in 2012 by conducting a difference-in-differences analysis of product-city-level alcohol and cigarette consumption from 2013 to 2022. We find that the campaign increased sales of middle-end baijiu and cigarettes but decreased sales of luxury baijiu and cigarettes, contrasting with the trend for low-end products. This substitution pattern may be attributable to decreased public spending on luxury goods. This substitution pattern is moderated by officials’ wages and anti-corruption efforts, which supports the theoretical predictions.Keywords: substitution effect, baijiu, corruption, anti-corruption, chinese political connection
Procedia PDF Downloads 9310769 South African Multiple Deprivation-Concentration Index Quantiles Differentiated by Components of Success and Impediment to Tuberculosis Control Programme Using Mathematical Modelling in Rural O. R. Tambo District Health Facilities
Authors: Ntandazo Dlatu, Benjamin Longo-Mbenza, Andre Renzaho, Ruffin Appalata, Yolande Yvonne Valeria Matoumona Mavoungou, Mbenza Ben Longo, Kenneth Ekoru, Blaise Makoso, Gedeon Longo Longo
Abstract:
Background: The gap between complexities related to the integration of Tuberculosis /HIV control and evidence-based knowledge motivated the initiation of the study. Therefore, the objective of this study was to explore correlations between national TB management guidelines, multiple deprivation indexes, quantiles, components and levels of Tuberculosis control programme using mathematical modeling in rural O.R. Tambo District Health Facilities, South Africa. Methods: The study design used mixed secondary data analysis and cross-sectional analysis between 2009 and 2013 across O.R Tambo District, Eastern Cape, South Africa using univariate/ bivariate analysis, linear multiple regression models, and multivariate discriminant analysis. Health inequalities indicators and component of an impediment to the tuberculosis control programme were evaluated. Results: In total, 62 400 records for TB notification were analyzed for the period 2009-2013. There was a significant but negative between Financial Year Expenditure (r= -0.894; P= 0.041) Seropositive HIV status(r= -0.979; P= 0.004), Population Density (r = -0.881; P= 0.048) and the number of TB defaulter in all TB cases. It was shown unsuccessful control of TB management program through correlations between numbers of new PTB smear positive, TB defaulter new smear-positive, TB failure all TB, Pulmonary Tuberculosis case finding index and deprivation-concentration-dispersion index. It was shown successful TB program control through significant and negative associations between declining numbers of death in co-infection of HIV and TB, TB deaths all TB and SMIAD gradient/ deprivation-concentration-dispersion index. The multivariate linear model was summarized by unadjusted r of 96%, adjusted R2 of 95 %, Standard Error of estimate of 0.110, R2 changed of 0.959 and significance for variance change for P=0.004 to explain the prediction of TB defaulter in all TB with equation y= 8.558-0.979 x number of HIV seropositive. After adjusting for confounding factors (PTB case finding the index, TB defaulter new smear-positive, TB death in all TB, TB defaulter all TB, and TB failure in all TB). The HIV and TB death, as well as new PTB smear positive, were identified as the most important, significant, and independent indicator to discriminate most deprived deprivation index far from other deprivation quintiles 2-5 using discriminant analysis. Conclusion: Elimination of poverty such as overcrowding, lack of sanitation and environment of highest burden of HIV might end the TB threat in O.R Tambo District, Eastern Cape, South Africa. Furthermore, ongoing adequate budget comprehensive, holistic and collaborative initiative towards Sustainable Developmental Goals (SDGs) is necessary for complete elimination of TB in poor O.R Tambo District.Keywords: tuberculosis, HIV/AIDS, success, failure, control program, health inequalities, South Africa
Procedia PDF Downloads 17610768 Heavy Metal Contamination and Environmental Risk in Surface Sediments along the Coasts of Suez and Aqaba Gulfs, Egypt
Authors: Alaa M. Younis, Ismail S. Ismail, Lamiaa I. Mohamedein, Shimaa F. Ahmed
Abstract:
Sandy surface sediments collected from fourteen sites along the gulfs of Suez and Aqaba coasts, Egypt were analyzed for heavy metals including Iron, Manganese, Zinc, Chromium, Nickel, Lead, Copper and Cadmium in order to evaluate the pollution status and environmental risk assessment of the study area. The obtained results showed that the concentrations of investigated metals are represented in the following sequence; For Gulf of Aqaba sediments Fe > Mn > Zn > Pb > Cr > Ni > Cu > Cd. While for Gulf of Suez Sediments Fe > Mn > Pb > Zn > Cu > Cr > Ni > Cd. The degree of surface sediment contamination using Geo-accumulation index (I geo) and Metal Pollution Index (MPI) was computed. Higher MPI values were observed at the sites III (Nama Bay) and VIII (Rex Beach). According to Sediment quality guidelines (SQGs) approach, Pb and Cu in the gulf of Suez at station IX (Kabanon Beach) had probably adverse ecological effects to marine organisms.Keywords: heavy metal, environmental risk, Suez gulf, Aqaba gulf
Procedia PDF Downloads 44710767 Utilization of Mustard Leaves (Brassica juncea) Powder for the Development of Cereal Based Extruded Snacks
Authors: Maya S. Rathod, Bahadur Singh Hathan
Abstract:
Mustard leaves are rich in folates, vitamin A, K and B-complex. Mustard greens are low in calories and fats and rich in dietary fiber. They are rich in potassium, manganese, iron, copper, calcium, magnesium and low in sodium. It is very rich in antioxidants and Phytonutrients. For the optimization of process variables (moisture content and mustard leave powder), the experiments were conducted according to central composite Face Centered Composite design of RSM. The mustard leaves powder was replaced with composite flour (a combination of rice, chickpea and corn in the ratio of 70:15:15). The extrudate was extruded in a twin screw extruder at a barrel temperature of 120°C. The independent variables were mustard leaves powder (2-10 %) and moisture content (12-20 %). Responses analyzed were bulk density, water solubility index, water absorption index, lateral expansion, hardness, antioxidant activity, total phenolic content and overall acceptability. The optimum conditions obtained were 7.19 g mustard leaves powder in 100 g premix having 16.8 % moisture content (w.b).Keywords: extrusion, mustard leaves powder, optimization, response surface methodology
Procedia PDF Downloads 54910766 Information Technology and the Challenges Facing the Legal Profession in Nigeria
Authors: Odoh Ben Uruchi
Abstract:
Information Technology is an outcome of the nexus between the computer technology and the communication technology which has grown as silver fiber in Nigeria. Information Technology represents the fourth generation of human communication after sight, oral and written communications. The internet, as with all path-breaking technological developments gives us all the ample privileges to act as a global community; advertise and operate across all frontiers; over boarders and beyond the control of any government. The security concerns, computer abuse and the side effects of this technology have moved to the forefront of the consciousness of law enforcement agencies. Unfortunately, Nigeria is one of the very few countries in the world to have not legislated Cyber Laws, although several unsuccessful attempts have been made in recent times at providing the legal framework for regulating the activities in Nigerian cyberspace. Traditional legal systems have led to great difficulty in keeping pace with the rapid growth of the internet and its impact throughout Nigeria. The only existing legal frameworks are constantly being challenged by technological advancement. This has created a need to constantly update and adapt the way in which we organize ourselves as Legal Practitioners in order to maintain overall control of its domestic and national interests. This paper seeks to appraise the challenges facing the legal profession in Nigeria because of want of Cyber Laws. In doing this, the paper shall highlight the loopholes in the existing laws and recommends the way forward.Keywords: information technology, challenges, legal profession, Nigeria
Procedia PDF Downloads 51910765 Developing Logistics Indices for Turkey as an an Indicator of Economic Activity
Authors: Gizem İntepe, Eti Mizrahi
Abstract:
Investment and financing decisions are influenced by various economic features. Detailed analysis should be conducted in order to make decisions not only by companies but also by governments. Such analysis can be conducted either at the company level or on a sectoral basis to reduce risks and to maximize profits. Sectoral disaggregation caused by seasonality effects, subventions, data advantages or disadvantages may appear in sectors behaving parallel to BIST (Borsa Istanbul stock exchange) Index. Proposed logistic indices could serve market needs as a decision parameter in sectoral basis and also helps forecasting activities in import export volume changes. Also it is an indicator of logistic activity, which is also a sign of economic mobility at the national level. Publicly available data from “Ministry of Transport, Maritime Affairs and Communications” and “Turkish Statistical Institute” is utilized to obtain five logistics indices namely as; exLogistic, imLogistic, fLogistic, dLogistic and cLogistic index. Then, efficiency and reliability of these indices are tested.Keywords: economic activity, export trade data, import trade data, logistics indices
Procedia PDF Downloads 33910764 Comparative Analysis of Physical Natural Parameters Influencing Baltic Sea Coastal Tourism in the Context of Climate Change
Authors: Akvelina Čuladytė, Inga Dailidienė
Abstract:
Climate change and sustainable development are among the most significant global challenges, directly impacting various economic sectors, including coastal tourism. The United Nations (UN) and its specialized agencies, such as the World Tourism Organization (UNWTO) and the United Nations Convention on the Law of the Sea (UNCLOS), examine coastal tourism from multiple perspectives, emphasizing its economic, social, and environmental importance, as well as the challenges related to sustainability. Sustainability, linked to climate change, is an integral concept requiring a holistic approach to managing natural resources, reducing emissions, protecting ecosystems, and implementing adaptation strategies. Only by integrating these principles can we adapt to the impacts of climate change, reduce the carbon footprint of the tourism sector, and manage tourist flows to prevent excessive strain on marine and coastal ecosystems. Climate change is having an increasing impact on the Baltic Sea region, causing rising temperatures, sea level rise, more frequent extreme weather events, and coastal erosion. These changes can significantly affect the tourism sector, which is important not only economically but also socially. The primary aim of this study is to analyze changes in physical natural parameters (temperature, precipitation, water quality, sea level rise, and coastal erosion) that influence Baltic Sea coastal tourism in order to identify and assess how climate change impacts coastal tourism. The Baltic States, with its long and diverse coastlines, are particularly sensitive to the impacts of climate change, which can influence the geography of coastal tourism. Therefore, the aim is to assess how these factors determine the attractiveness and opportunities for tourism. In studying the effects of climate change on the geography of coastal tourism, methods used in climatology, as well as historical meteorological and hydrological data, are applied. Analyzing historical data on extreme events, such as storms, heatwaves, and floods, helps determine their impact on tourism infrastructure and visitor numbers. Based on the North Atlantic Oscillation (NAO) index, both limiting and enhancing factors for tourism are identified, including the benefits of a longer warm season and the increasing frequency of extreme weather conditions. The expected research results provide insights into how climate change and sustainable development strategies can shape and transform the structure and trends of coastal tourism in the region. The findings indicate that meteorological conditions and climate change play a significant role in regulating tourism flows.Keywords: coastal tourism, climate change impacts, physical natural parameters, NAO index
Procedia PDF Downloads 1310763 Scrum Challenges and Mitigation Practices in Global Software Development of an Integrated Learning Environment: Case Study of Science, Technology, Innovation, Mathematics, Engineering for the Young
Authors: Evgeniia Surkova, Manal Assaad, Hleb Makeyeu, Juho Makio
Abstract:
The main objective of STIMEY (Science, Technology, Innovation, Mathematics, Engineering for the Young) project is the delivery of a hybrid learning environment that combines multi-level components such as social media concepts, robotic artefacts, and radio, among others. It is based on a well-researched pedagogical framework to attract European youths to STEM (science, technology, engineering, and mathematics) education and careers. To develop and integrate these various components, STIMEY is executed in iterative research cycles leading to progressive improvements. Scrum was the development methodology of choice in the project, as studies indicated its benefits as an agile methodology in global software development, especially of e-learning and integrated learning projects. This paper describes the project partners’ experience with the Scrum framework, discussing the challenges faced in its implementation and the mitigation practices employed. The authors conclude with exploring user experience tools and principles for future research, as a novel direction in supporting the Scrum development team.Keywords: e-learning, global software development, scrum, STEM education
Procedia PDF Downloads 18110762 Hydroclean Smartbin Solution for Plastic Pollution Crisis
Authors: Anish Bhargava
Abstract:
By 2050, there will be more plastic than fish in our oceans. 51 trillion micro-plastics pollute our waters and contaminate the food on our plates, increasing the risk of tumours and diseases such as cancer. Our product is a solution to the ever-growing problem of plastic pollution. We call it the SmartBin. The SmartBin is a cylindrical device which will float just below the surface of the water, able to move with the aid of 4 water thrusters situated on the sides. As it floats, our SmartBin will suck water into itself and pump it out through the bottom. All waste is collected into a reusable filter including microplastics measuring down to 1.5mm. A speaker emitting sound at a frequency of 9 hertz ensures marine life stays away from the SmartBin. Featured along with our product is a smartphone app which will enable the user to designate an area for the SmartBin to cover on a satellite image. The SmartBin will then return to its start position near the shore, configured through the app. As global pressure to tackle water pollution continues to increase, environmental spending increases too. As our product provides an effective solution to this issue, we can seize the opportunity and scale our company. Our product is unparalleled. It can move at a high speed, covering a wide area rather than being restricted to one position. We target not only oceans and sea-shores, but also rivers, lakes, reservoirs and canals, as they are much easier to access and control.Keywords: water, plastic, pollution, solution, hydroclean, smartbin, cleanup
Procedia PDF Downloads 21010761 An Informetrics Analysis of Research on Phishing in Scopus and Web of Science Databases from 2012 to 2021
Authors: Nkosingiphile Mbusozayo Zungu
Abstract:
The purpose of the current study is to adopt informetrics methods to analyse the research on phishing from 2012 to 2021 in three selected databases in order to contribute to global cybersecurity through impactful research. The study follows a quantitative research methodology. We opted for the positivist epistemology and objectivist ontology. The analysis focuses on: (i) the productivity of individual authors, institutions, and countries; (ii) the research contributions, using co-authorship as a measure of collaboration; (iii) the altmetrics of selected research contributions; (iv) the citation patterns and research impact of research on phishing; and (v) research contributions by keywords, to discover the concepts that are related to phishing. The preliminary findings favour developed countries in terms of quantity and quality of research in the domain. There are unique research trends and patterns in the developing countries, including those in Africa, that provide opportunities for research development in the domain in the region. This study explores an important research domain by using unexplored method in the region. The study supports the SDG Agenda 2030, such as ending abuse, exploitation, trafficking, and all other forms of violence and torture of children through the use of cyberspace (SDG 16). Further, the results from this study can inform research, teaching, and learning largely in Africa. Invariably, the study contributes to cybersecurity awareness that will mitigate cybersecurity threats against vulnerable communities.Keywords: phishing, cybersecurity, informetrics, information security
Procedia PDF Downloads 12110760 Characteristics of Oil-In-Water Emulsion Stabilized with Pregelatinized Waxy Rice Starch
Authors: R. Yulianingsih, S. Gohtani
Abstract:
Characteristics of pregelatinized waxy rice starch (PWR) gelatinized at different temperatures (65, 75, and 85 °C, abbreviated as PWR 65, 75 and 85 respectively) and their emulsion-stabilizing properties at different starch concentrations (3, 5, 7, and 9%) were studied. The yield stress and consistency index value of PWR solution increased with an increase in starch concentration. The pseudoplasticity of PWR 65 solution increased and that for both PWR 75 and 85 solution decreased with an increase in starch concentration. Small angle X-ray scattering (SAXS) profiles analyzed by Kratky Plot indicated that PWR 65 is natively unfolded particles while PWR 75 and 85 are the globular particles. The characteristics of emulsions stabilized with PWR were influenced by the temperature of gelatinization process and starch concentration. Elevated concentration of starch decreased the value of yield stress and increased the consistency index. PWR 65 produce stable emulsion to creaming at starch concentrations more than 5%, while PWR 85 is able to produce stable emulsion to both creaming and coalescence of droplets.Keywords: emulsion, gelatinization temperature, rheology, small-angle X-ray scattering, waxy rice starch
Procedia PDF Downloads 16210759 Microbial Quality Assessment of Indian White Shrimp, Penaeus Indicus from Southwest Bangladesh
Authors: Saima Sharif Nilla, Mahmudur Rahman Khan, Anisur Rahman Khan, Ghulam Mustafa1
Abstract:
The microbial quality of Indian white shrimp (Peneaus indicus) from Bagerhat, Khulna and Satkhira of southwest Bangladesh was assessed where the parameters varied with different sources and the quality was found to be poor for Satkhira shrimp samples. Shrimp samples in fresh condition were collected to perform the microbial assessment and 10 pathogenic isolates for antibiotic sensitivity test to 12 antibiotics. The results show that total bacterial count of all the samples were beyond the acceptable limit 105 cfu/g. In case of total coliform and E. coli density, no substantial difference (p<0.5) was found between the different shrimp samples from different districts and also high quantity of TC exceeding the limit (>102 cfu/g) proves the poor quality of shrimp. The FC abundance found in shrimps of Bagerhat and Satkhira was similar and significantly higher (p<0.5) than that of Khulna samples. No significant difference (p<0.5) was found among the high density of Salmonella-Shigella, Vibrio spp., and Staphylococcus spp. of the shrimp samples from the source places. In case of antibiotic sensitivity patterns, all of them were resistant to ampicillin, Penicillin and sensitive to kanamycin. Most of the isolates were frequently sensitive to ciprofloxacin and streptomycin in the sensitivity test. In case of nutritional composition, no significant difference (t-test, p<0.05) was found among protein, lipid, moisture and ash contents of shrimp samples. The findings prove that shrimp under this study was more or less contaminated and samples from Satkhira were highly privileged with food borne pathogens which confirmed the unhygienic condition of the shrimp farms as well as the presence of antibiotic resistance bacteria in shrimp fish supposed to threat food safety and deteriorate the export quality.Keywords: food borne pathogens, satkhira, penaeus indicus, antibiotic sensitivity, southwest Bangladesh, food safety
Procedia PDF Downloads 71010758 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 8510757 Extraction and Encapsulation of Carotenoids from Carrot
Authors: Gordana Ćetković, Sanja Podunavac-Kuzmanović, Jasna Čanadanović-Brunet, Vesna Tumbas Šaponjac, Vanja Šeregelj, Jelena Vulić, Slađana Stajčić
Abstract:
The color of food is one of the decisive factors for consumers. Potential toxicity of artificial food colorants has led to the consumers' preference for natural products over products with artificial colors. Natural pigments have many bioactive functions, such as antioxidant, provitamin and many other. Having this in mind, the acceptability of natural colorants by the consumers is much higher. Being present in all photosynthetic plant tissues carotenoids are probably most widespread pigments in nature. Carrot (Daucus carota) is a good source of functional food components. Carrot is especially rich in carotenoids, mainly α- and β-carotene and lutein. For this study, carrot was extracted using classical extraction with hexane and ethyl acetate, as well as supercritical CO₂ extraction. The extraction efficiency was evaluated by estimation of carotenoid yield determined spectrophotometrically. Classical extraction using hexane (18.27 mg β-carotene/100 g DM) was the most efficient method for isolation of carotenoids, compared to ethyl acetate classical extraction (15.73 mg β-carotene/100 g DM) and supercritical CO₂ extraction (0.19 mg β-carotene/100 g DM). Three carrot extracts were tested in terms of antioxidant activity using DPPH and reducing power assay as well. Surprisingly, ethyl acetate extract had the best antioxidant activity on DPPH radicals (AADPPH=120.07 μmol TE/100 g) while hexane extract showed the best reducing power (RP=1494.97 μmol TE/100 g). Hexane extract was chosen as the most potent source of carotenoids and was encapsulated in whey protein by freeze-drying. Carotenoid encapsulation efficiency was found to be high (89.33%). Based on our results it can be concluded that carotenoids from carrot can be efficiently extracted using hexane and classical extraction method. This extract has the potential to be applied in encapsulated form due to high encapsulation efficiency and coloring capacity. Therefore it can be used for dietary supplements development and food fortification.Keywords: carotenoids, carrot, extraction, encapsulation
Procedia PDF Downloads 27410756 Carbon Footprint of Blowmoulded Plastic Parts-Case Study on Automotive Industry
Authors: Mădălina Elena Mavrodin, Gabriela Andreea Despescu, Gheorghe Lăzăroiu
Abstract:
Long term trend of global warming has brought a very deep interest in climate change, which is due most likely to increasing concentrations of anthropogenic greenhouse gases. 0f these, particular attention is paid to carbon dioxide, which has led in desire for obtaining carbon footprint products. Automotive industry is one of the world’s most important economic sectors with a great impact over the environment through all range of activities. Its impact over the environment has been studied, researcher trying as much as possible to reduce it and to offer environmental friendly solution for the using, but also manufacturing cars. In the global endeavour to meet the international commitments in order to reduce the greenhouse gas emissions, many companies integrate environmental issues into their management systems, with potential effects in their entire production chains. Several tools and calculators have been developed to measure the environmental impact of a product in the life cycle perspective of the whole product chain. There were a lot of ways to obtain the carbon footprint of driving a car, but the total carbon footprint of a car includes also the carbon footprint of all the components and accessories. In the automotive industry, one of the challenges is to calculate the carbon footprint of a car from ‘cradle to grave’; this meaning not only for driving the car, but also manufacturing it, so there can be an overview over the entire process of production.Keywords: carbon footprint, global warming potential, greenhouse gases, manufacture, plastic air ducts
Procedia PDF Downloads 32510755 Application of Active Chitosan Coating Incorporated with Spirulina Extract as a Potential Food Packaging Material for Enhancing Quality and Shelf Life of Shrimp
Authors: Rafik Balti, Nourhene Zayoud, Mohamed Ben Mansour, Abdellah Arhaliass, Anthony Masse
Abstract:
Application of edible films and coatings with natural active compounds for enhancing storage stability of food products is a promising active packaging approach. Shrimp are generally known as valuable seafood products around the world because of their delicacy and good nutritional. However, shrimp is highly vulnerable to quality deterioration associated with biochemical, microbiological or physical changes during postmortem storage, which results in the limited shelf life of the product. Chitosan is considered as a functional packaging component for maintaining the quality and increasing the shelf life of perishable foods. The present study was conducted to evaluate edible coating of crab chitosan containing variable levels of ethanolic extract of Spirulina on microbiological (mesophilic aerobic, psychrotrophic, lactic acid bacteria, and enterobacteriacea), chemical (pH, TVB-N, TMA-N, PV, TBARS) and sensory (odor, color, texture, taste, and overall acceptance) properties of shrimp during refrigerated storage. Also, textural and color characteristics of coated shrimp were performed. According to the obtained results, crab chitosan in combination with Spirulina extract was very effective in order to extend the shelf life of shrimp during storage in refrigerated condition.Keywords: food packaging, chitosan, spirulina extract, white shrimp, shelf life
Procedia PDF Downloads 21210754 Assessment of Soil Salinity through Remote Sensing Technique in the Coastal Region of Bangladesh
Abstract:
Soil salinity is a major problem for the coastal region of Bangladesh, which has been increasing for the last four decades. Determination of soil salinity is essential for proper land use planning for agricultural crop production. The aim of the research is to estimate and monitor the soil salinity in the study area. Remote sensing can be an effective tool for detecting soil salinity in data-scarce conditions. In the research, Landsat 8 is used, which required atmospheric and radiometric correction, and nine soil salinity indices are applied to develop a soil salinity map. Ground soil salinity data, i.e., EC value, is collected as a printed map which is then scanned and digitized to develop a point shapefile. Linear regression is made between satellite-based generated map and ground soil salinity data, i.e., EC value. The results show that maximum R² value is found for salinity index SI 7 = G*R/B representing 0.022. This minimal R² value refers that there is a negligible relationship between ground EC value and salinity index generated value. Hence, these indices are not appropriate to assess soil salinity though many studies used those soil salinity indices successfully. Therefore, further research is necessary to formulate a model for determining the soil salinity in the coastal of Bangladesh.Keywords: soil salinity, EC, Landsat 8, salinity indices, linear regression, remote sensing
Procedia PDF Downloads 35210753 Creative Art Practice in Response to Climate Change: How Art Transforms and Frames New Approaches to Speculative Ecological and Sustainable Futures
Authors: Wenwen Liu, Robert Burton, Simon McKeown
Abstract:
Climate change is seriously threatening human security and development, leading to global warming and economic, political, and social chaos. Many artists have created visual responses that challenge perceptions on climate change, actively guiding people to think about the climate issues and potential crises after urban industrialization and explore positive solutions. This project is an interdisciplinary and intertextual study where art practice is informed by culture, philosophy, psychology, ecology, and science. By correlating theory and artistic practice, it studies how art practice creates a new way of understanding climate issues and uses art as a way of exploring speculative futures. In the context of practical-based research, arts-based practice as research and creative practice as interdisciplinary research are applied alternately to seek the original solution and new knowledge. Through creative art practice, this project has established new visual ways of looking at climate change and has developed it into a new model to generate more possibilities, an alternative social imagination. It not only encourages people to think and find a sustainable speculative future conducive to all species but also proves that people have the ability to realize positive futures.Keywords: climate change, creative practice as interdisciplinary research, arts-based practice as research, creative art practice, speculative future
Procedia PDF Downloads 28610752 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 2410751 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 33910750 Resilient Security System with Toll Free Call Services: Case Study of Adama City
Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein
Abstract:
Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.Keywords: smart, safety, crime, call center, security
Procedia PDF Downloads 5910749 The Impact of Technology on Computer Systems and Technology
Authors: Bishoy Abouelsoud Saad Amin
Abstract:
This paper examines the use of computer and its related health hazard among computer users in South-Western zone of Nigeria. Two hundred and eighteen (218) computer users constituted the population used to evaluate association between posture, extensive computer use and related health hazard. The instruments for the study are a questionnaire on demographics, lifestyle, body features and work ability index while mean rating, standard deviation and t test were used for data analysis. Identified health related hazard include damages to the eyesight, bad posture, arthritis, musculoskeletal disorders, headache, stress and so on. The results showed that factors such as work demand, posture, closeness to computer screen and excessive working hours on computers constitute health hazards in both old and young computer users of various gender. It is therefore recommended that total number of hours spent with computer should be monitored and controlled.Keywords: computer game, metaphor, middle school students, virtual environments computer auditing, risk, measures to prevent, information management computer-related health hazard, musculoskeletal disorders, computer usage, work ability index
Procedia PDF Downloads 7310748 The Effects of Different Level Cluster Tip Reduction and Foliar Boric Acid Applications on Yield and Yield Components of Italia Grape Cultivar
Authors: A. Akin
Abstract:
This study was carried out on Italia grape variety (Vitis vinifera L.) in Konya province, Turkey in 2016. The cultivar is five years old and grown on 1103 Paulsen rootstock. It was determined the effects of applications of the Control (C), 1/3 Cluster Tip Reduction (1/3 CTR), 1/6 Cluster Tip Reduction (1/6 CTR), 1/9 Cluster Tip Reduction (1/9 CTR), 1/3 CTR+Boric Acid (BA), 1/6 CTR+BA, 1/9 CTR+BA, on yield and yield components of the Italia grape variety. The results were obtained as the highest fresh grape yield (4.74 g) with 1/9 CTR+BA application; the highest cluster weight (220.08 g) with 1/3 CTR application; the highest 100 berry weight (565.85 g) with 1/9 CTR+BA application; as the highest maturity index (49.28) with 1/9 CTR+BA application; as the highest must yield (685.33 ml/kg) with 1/3 CTR+BA and (685.33 ml/kg) with 1/9 CTR+BA applications. To increase the fresh grape yield, 100 berry weight and maturity index in the Italia grape variety, the 1/9 CTR+BA application can be recommended.Keywords: boric acid, cluster tip reduction, Italia grape variety, yield, yield components
Procedia PDF Downloads 27310747 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations
Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang
Abstract:
Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security
Procedia PDF Downloads 36210746 Efficient Internal Generator Based on Random Selection of an Elliptic Curve
Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche
Abstract:
The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.Keywords: PRNG, security, cryptosystem, ECC
Procedia PDF Downloads 44810745 Mitigating Denial of Service Attacks in Information Centric Networking
Authors: Bander Alzahrani
Abstract:
Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network
Procedia PDF Downloads 20010744 Application of a Confirmatory Composite Model for Assessing the Extent of Agricultural Digitalization: A Case of Proactive Land Acquisition Strategy (PLAS) Farmers in South Africa
Authors: Mazwane S., Makhura M. N., Ginege A.
Abstract:
Digitalization in South Africa has received considerable attention from policymakers. The support for the development of the digital economy by the South African government has been demonstrated through the enactment of various national policies and strategies. This study sought to develop an index for agricultural digitalization by applying composite confirmatory analysis (CCA). Another aim was to determine the factors that affect the development of digitalization in PLAS farms. Data on the indicators of the three dimensions of digitalization were collected from 300 Proactive Land Acquisition Strategy (PLAS) farms in South Africa using semi-structured questionnaires. Confirmatory composite analysis (CCA) was employed to reduce the items into three digitalization dimensions and ultimately to a digitalization index. Standardized digitalization index scores were extracted and fitted to a linear regression model to determine the factors affecting digitalization development. The results revealed that the model shows practical validity and can be used to measure digitalization development as measures of fit (geodesic distance, standardized root mean square residual, and squared Euclidean distance) were all below their respective 95%quantiles of bootstrap discrepancies (HI95 values). Therefore, digitalization is an emergent variable that can be measured using CCA. The average level of digitalization in PLAS farms was 0.2 and varied significantly across provinces. The factors that significantly influence digitalization development in PLAS land reform farms were age, gender, farm type, network type, and cellular data type. This should enable researchers and policymakers to understand the level of digitalization and patterns of development, as well as correctly attribute digitalization development to the contributing factors.Keywords: agriculture, digitalization, confirmatory composite model, land reform, proactive land acquisition strategy, South Africa
Procedia PDF Downloads 6810743 Characterization of Laminar Flow and Power Consumption in Agitated Vessel with Curved Blade Agitator
Authors: Amine Benmoussa, Mohamed Bouanini, Mebrouk Rebhi
Abstract:
Stirring is one of the unifying processes which form part of the mechanical unit operations in process technology such chemical, biotechnological, pharmaceutical, petrochemical, cosmetic, and food processing. Therefore determining the level of mixing and overall behavior and performance of the mixing tanks are crucial from the product quality and process economics point of views. The most fundamental needs for the analysis of these processes from both a theoretical and industrial perspective are the knowledge of the hydrodynamic behavior and the flow structure in such tanks. Depending on the purpose of the operation carried out in mixer, the best choice for geometry of the tank and agitator type can vary widely. Initially, a local and global study namely the velocity and power number on a typical agitation system agitated by a mobile-type two-blade straight (d/D=0.5) allowed us to test the reliability of the CFD, the result were compared with those of experimental literature, a very good concordance was observed. The stream function, the velocity profile, the velocity fields and power number are analyzed. It was shown that the hydrodynamics is modified by the curvature of the mobile which plays a key role.Keywords: agitated vessels, curved blade agitator, laminar flow, finite volume method
Procedia PDF Downloads 290