Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6320

Search results for: food security and nutrition

2510 The Roles of Health Consciousness, Health Motivation, and Trust in the Purchase Intention of Meat with Traceability

Authors: Kawpong Polyorat, Nathamon Buaprommee

Abstract:

Food safety crises including mad cow disease and bird flu have raised consumers’ concern in meat safety. In response, the meat industry has adopted traceability systems to standardize quality and safety of their meat production. Traceability, however, is still rarely positioned as a marketing tool to persuade consumers who are meat endusers. Therefore, the present study attempts to understand consumer behaviors in the context of meat with traceability system by conducting a study in Thailand where research in this area is scant. The study results, based on structural equation modeling with AMOS, reveal that, while health motivation has a significant, positive impact on traceability trust, health consciousness does not directly affect traceability. Health consciousness, nevertheless, have a positive influence on health motivation. Finally, traceability trust has a positive impact on purchase intention of meat with traceability. Research implications and future study directions conclude the study report.

Keywords: consumer behavior, health consciousness, health motivation, traceability, trust

Procedia PDF Downloads 327
2509 The Impact of Political Events on National Archaeological Heritage and Tourism Industry: Study Case of Egypt after January 25th, 2011

Authors: Sabry A. El Azazy

Abstract:

Tourism plays an essential role in supporting the National Economy. Egypt was ranked as one of the most attractive touristic destinations worldwide. Tourism as a service sector affects political events and unstable conditions. Within the revolution of January 25th, 2011, tourism became below standards, and the archeological heritage sites were subject to threat. Because of the political tension and social instability, Egypt's tourism sector has drastically dropped. Currently, Egypt is working on overcoming the crisis caused by political unrest. However, it is expected to take a long time to get back to where it was, especially in terms of regaining the confidence of travelers in the country's ability to guarantee and maintain security and stability. Recently, many great projects have been done, such as; New Administrative Cairo Capital, New Suez Canal logistic project, New City of Al Alamin, New Grand Egyptian Museum, as well as other great projects that reflect positively on the tourism industry and archaeological heritage development in Egypt.

Keywords: archaeology, archaeological heritage, attractions, national economy, political events, touristic destinations, tourism industry

Procedia PDF Downloads 161
2508 Development of Folding Based Aptasensor for Ochratoxin a Using Different Pulse Voltammetry

Authors: Rupesh K. Mishra, Gaëlle Catanante, Akhtar Hayat, Jean-Louis Marty

Abstract:

Ochratoxins (OTA) are secondary metabolites present in a wide variety of food stuff. They are dangerous by-products mainly produced by several species of storage fungi including the Aspergillus and Penicillium genera. OTA is known to have nephrotoxic, immunotoxic, teratogenic and carcinogenic effects. Thus, needs a special attention for a highly sensitive and selective detection system that can quantify these organic toxins in various matrices such as cocoa beans. This work presents a folding based aptasensors by employing an aptamer conjugated redox probe (methylene blue) specifically designed for OTA. The aptamers were covalently attached to the screen printed carbon electrodes using diazonium grafting. Upon sensing the OTA, it binds with the immobilized aptamer on the electrode surface, which induces the conformational changes of the aptamer, consequently increased in the signal. This conformational change of the aptamer before and after biosensing of target OTA could produce the distinguishable electrochemical signal. The obtained limit of detection was 0.01 ng/ml for OTA samples with recovery of up to 88% in contaminated cocoa samples.

Keywords: ochratoxin A, cocoa, DNA aptamer, labelled probe

Procedia PDF Downloads 283
2507 A Study on 5-11 Year-Old Children's Level of Knowledge about Personal Safety and Protection from Social Dangers

Authors: Özden Kuşcu, Yağmur Kuşcu, Zeynep Çetintaş, S. Sunay Yildirim Doğru

Abstract:

The purpose of this work is to evaluate the effect of the subjects “personal safety” and “protection from dangers” included in primary school curriculum on the students’ levels of knowledge about safety and protection from social dangers. The study group included 469 students between 5–11 years old with 231 preschoolers and 238 primary school students and their parents and teachers. Instruments used to collect data were “Personal Safety Interview Form” for children, “Parent Interview Form” and “Teacher Interview Form”. Forms included 15 open-ended questions about personal safety. The researchers collected the research data through one-on-one interviews with children. Results of the study revealed that preschoolers and 1st, 2nd, and 3rd graders did not know their home addresses and telephone numbers and their families were not aware of that. The study also showed that those who had this information were unsure as to who to share this information with. Accordingly, more should be done to increase the levels of knowledge of preschoolers and 1st, 2nd, and 3rd graders about personal safety and protection from dangers.

Keywords: security, social danger, elementary school, preschool

Procedia PDF Downloads 456
2506 Bio-Oil Production and Chromatographic Characterization from the Pyrolysis of Oil Palm Empty Fruit Bunches

Authors: Arif Ferdiyanto, Fajar Hamida, Arif Hidayat

Abstract:

Oil palm empty fruit bunches, derived biomass available in Indonesia, is one of the potential biomass to produce biofuels like bio-oil due to its abundant supply and favorable physicochemical characteristics. An interesting alternative of utilising the oil palm empty fruit bunches is in the production of bio-oil by pyrolysis. Pyrolysis of oil palm empty fruit bunches to bio-oil is being considered for national energy security and environmental advantages. The aim of this study was to produce bio-oil by pyrolysis of oil palm empty fruit bunches at various temperature and observe its detailed chemical composition. The biomass was submitted to a pyrolysis in a batch reactor. Experiments were carried out at a temperature range of 450–600°C and heating rate range of 10-20°C/min. The yield of bio-oil was found to be maximum at the temperature of 600°C. The bio-oils detailed compositions were investigated using FTIR and GC-MS. The bio-char produced as a co-product can be a potential soil amendment with multiple benefits including soil fertility and for solid fuel applications that also contributes to the preservation of the environment. The present investigation suggests the suitability of oil palm empty fruit bunches as a potential feedstock for exploitation of energy and biomaterials through pyrolysis process.

Keywords: bio-oil, oil palm empty fruit bunches, pyrolysis, renewable energy

Procedia PDF Downloads 340
2505 Characterization of Edible Film from Uwi Starch (Dioscorea alata L.)

Authors: Miksusanti, Herlina, Wiwin

Abstract:

The research about modification uwi starch (Dioscorea alata L) by using propylene oxide has been done. Concentration of propylene oxide were 6%(v/w), 8%(v/w), and 10%(v/w). The amilograf parameters after modification were characteristic breakdown viscosity 43 BU and setback viscosity 975 BU. The modification starch have edible properties according to FDA (Food and Drug Administration) which have degree of modification < 7%, degree of substitution < 0,1 and propylene oxide concentration < 10%(v/w). The best propylene oxide in making of edible film was 8 %( v/w). The starch control can be made into edible film with thickness 0,136 mm, tensile strength 20,4605 MPa and elongation 22%. Modification starch of uwi can be made into edible film with thickness 0,146 mm, tensile strength 25, 3521 Mpa, elongation 30% and water vapor transmission 7, 2651 g/m2/24 hours. FTIR characterization of uwi starch showed the occurrence of hydroxypropylation. The peak spectrum at 2900 cm-1 showed bonding of C-H from methyl group, which is characteristic for modification starch with hydroxypropyl. Characterization with scanning electron microscopy showed that modification of uwi starch has turned the granule of starch to be fully swallon.

Keywords: uwi starch, edible film, propylen oxide, modification

Procedia PDF Downloads 297
2504 A Phishing Email Detection Approach Using Machine Learning Techniques

Authors: Kenneth Fon Mbah, Arash Habibi Lashkari, Ali A. Ghorbani

Abstract:

Phishing e-mails are a security issue that not only annoys online users, but has also resulted in significant financial losses for businesses. Phishing advertisements and pornographic e-mails are difficult to detect as attackers have been becoming increasingly intelligent and professional. Attackers track users and adjust their attacks based on users’ attractions and hot topics that can be extracted from community news and journals. This research focuses on deceptive Phishing attacks and their variants such as attacks through advertisements and pornographic e-mails. We propose a framework called Phishing Alerting System (PHAS) to accurately classify e-mails as Phishing, advertisements or as pornographic. PHAS has the ability to detect and alert users for all types of deceptive e-mails to help users in decision making. A well-known email dataset has been used for these experiments and based on previously extracted features, 93.11% detection accuracy is obtainable by using J48 and KNN machine learning techniques. Our proposed framework achieved approximately the same accuracy as the benchmark while using this dataset.

Keywords: phishing e-mail, phishing detection, anti phishing, alarm system, machine learning

Procedia PDF Downloads 336
2503 Role of Phenylalanine and Glycine in Plant Signaling to Improve Drought Tolerance Potential in Wheat

Authors: Abida Kausar, Shagufta Parveen

Abstract:

The priming of seeds was carried out by two amino acids (phenylalanine and glycine) to improve the drought tolerance potential of two wheat varieties. As wheat is a staple food of more than half of the population of the world, including Pakistan. However, its productivity is mainly adversely affected by abiotic stresses. The current research plan was to investigate the effect of hydropriming and priming by amino acids on wheat varieties under drought stress (50% field capacity). Therefore morphological, biochemical, physiological, and yield attributes were recorded. It was revealed that drought stress significantly decreased the biochemical, morpho-physiological, and growth attributes of the wheat crop. However, the priming treatments have shown a positive correlation with all the studied attributes. It was concluded that priming might involve plant signaling to produce the drought tolerance metabolites under stress conditions which, as a consequence, enhanced the drought tolerance potential of crops.

Keywords: plant biomass, biochemical parameters, chlorophyll contents, yield

Procedia PDF Downloads 86
2502 Usage of Military Continuity Management System for Supporting of Emergency Management

Authors: Radmila Hajkova, Jiri Palecek, Hana Malachova, Alena Oulehlova

Abstract:

Ensuring of continuity of business is the basic strategy of every company. Continuity of organization activities includes comprehensive procedures that help in solving unexpected situations of natural and anthropogenic character (for example flood, blaze, economic situations). Planning of continuity operations is a process that helps identify critical processes and implement plans for the security and recovery of key processes. The aim of this article demonstrates application of system approach to managing business continuity called business continuity management systems in military issues. This article describes the life cycle of business continuity management which is based on the established cycle PDCA (plan-do-check-act). After this is carried out by activities which are making by the University of Defence during activation of forces and means of the Integrated rescue system in case of emergencies - accidents at a nuclear power plant in Czech republic. Activities of various stages of deployment earmarked forces and resources are managed and evaluated by using MCMS application (military continuity management system).

Keywords: business continuity management system, emergency management, military, nuclear safety

Procedia PDF Downloads 454
2501 Investments in Petroleum Industry Abnormally Normal: A Case Study Based on Petroleum and Natural Gas Companies in India

Authors: Radhika Ramanchi

Abstract:

The oil market during 2014-2015 in India with large price fluctuations is very confusing to individual investor. The drop in oil prices supported stocks of some oil marketing companies (OMCs) like Bharat Petroleum Corporation, Hindustan Petroleum Corporation (HPCL) and Indian Oil Corporation etc their shares rose 84.74%, 128.63% and 59.16%, respectively. Lower oil prices, and lower current account, a smaller subsidy burden are the reasons for outperformance. On the other hand, lower crude prices giving downward pressure on upstream companies like Oil and Natural Gas Corp. Ltd (ONGC) and Reliance Petroleum (RIL) Oil India Ltd (OIL). Not having clarity on a subsidy sharing mechanism is the reason for downward trend on these stocks. Shares of ONGC and RIL have underperformed so far in 2015. When the oil price fall profits of the companies will effect, generate less money and may cut their dividends in Long run. In this situation this paper objective is to study investment strategies in oil marketing companies, by applying CAPM and Security Market Line.

Keywords: petrol industry, price fluctuations, sharp single index model, SML, Markowitz model

Procedia PDF Downloads 221
2500 Protein and Lipid Extraction from Microalgae with Ultrasound Assisted Osmotic Shock Method

Authors: Nais Pinta Adetya, H. Hadiyanto

Abstract:

Microalgae has a potential to be utilized as food and natural colorant. The microalgae components consists of three main parts, these are lipid, protein, and carbohydrate. Crucial step in producing lipid and protein from microalgae is extraction. Microalgae has high water level (70-90%), it causes drying process of biomass needs much more energy and also has potential to distract lipid and protein from microalgae. Extraction of lipid from wet biomass is able to take place efficiently with cell disruption of microalgae by osmotic shock method. In this study, osmotic shock method was going to be integrated with ultrasound to maximalize the extraction yield of lipid and protein from wet biomass Spirulina sp. with osmotic shock method assisted ultrasound. This study consisted of two steps, these were osmotic shock process toward wet biomass and ultrasound extraction assisted. NaCl solution was used as osmotic agent, with the variation of concentrations were 10%, 20%, and 30%. Extraction was conducted in 40°C for 20 minutes with frequency of ultrasound wave was 40kHz. The optimal yield of protein (2.7%) and (lipid 38%) were achieved at 20% osmotic agent concentration.

Keywords: extraction, lipid, osmotic shock, protein, ultrasound

Procedia PDF Downloads 356
2499 Synthesis and Characterization of Carboxymethyl Cellulose from Rice Stubble Cellulose

Authors: Rungsinee Sothornvit, Pattrathip Rodsamran

Abstract:

Rice stubble consists of a high content of cellulose and can be synthesized as a cellulose derivative such as carboxymethyl cellulose (CMC) to value added products from agricultural waste. Therefore, the synthesis conditions and characterization the properties of CMC from rice stubble (CMCr) were investigated. Hemicellulose and lignin were first removed from the rice stubble using 10% NaOH at 55 C for 3 h and 5% NaOCl at 75 C for 15 min, respectively. Rice stubble cellulose was swollen in 30% NaOH and isopropanol as a solvent. The content of chloroacetic acid (5–7 g in 5 g of alkali cellulose), reaction temperature (50 and 70 C) and time (180, 270 and 360 min) were explored to obtain CMC. It was found that synthesis conditions did not affect significantly on moisture content and pH of CMCr. The best quality of CMCr was synthesized by using 7 g of chloroacetic acid and reacted at 50 C for 180 min based on 5 g of rice stubble cellulose. Degree of substitution (DS), viscosity and purity of CMCr were 0.64, 36.03 cP and 90.18 %, respectively. Furthermore, Fourier transform infrared (FT–IR) spectroscopy confirmed the presence of carboxymethyl substituents. CMCr was categorized in commercial scale as a low viscosity material and it can be used as film forming packaging materials for food and pharmaceutical product applications.

Keywords: rice stubble, cellulose, carboxymethyl cellulose, degree of substitution, purity

Procedia PDF Downloads 391
2498 The Evaluation of Islamic Concept in Contemporary Mosque Design with the Case of Study: Jogokariyan Mosque Yogyakarta Indonesia

Authors: Ibrahim Malik, M. Ikramullah al Kambuna

Abstract:

Today the crisis of understanding in Islamic values has been extended to the architectural design. The majority of Muslim Architects when they designed Islamic Architectural building always stuck in cultural symbols, forms of facade, carvings calligraphy, and all of things which intimately associated with middle eastern culture. As well as the interpretation of symbols form, by designing a dome in every mosque, calligraphy carving in the interior of the mosque, and the other elements in the building which interpreted to the middle east culture. So here there are problems in understanding the meaning of Islam with Kaffah (overall), which appeared a distortion of understanding to distinguish between cultural and theological values in a design. This paper will try to evaluate the design of a contemporary mosque in Indonesia, with case studies in Jogokariyan Mosque Yogyakarta Indonesia. The building evaluation are focused in building function , aesthetic, comfort, and security. And finally from this research should be found the results of the integrated design evaluation of a contemporary mosque which based on the study of the Quran and Hadith.

Keywords: evaluation, islamic concept, mosque, Hadith, Quran

Procedia PDF Downloads 499
2497 Mobile WiMAX Network based Wireless Communication on Rail: An Analysis

Authors: Vinod Kumar Jatav, Dr. Vrijendra Singh

Abstract:

WiMAX is an emerging wireless technology designed by WiMAX forum. WiMAX technology delivers broadband internet access with QoS, mobility and robust security. WiMAX is among the prominent mobile broadband wireless technology which laid the foundation for the next generation networks (NGN). The next-generation communication system for railway should facilitate high level network availability, fast mobility for high speed trains with reliability, high handover rate, the firmness of train operations, and high QoS. The system should also be capable to provide various railway services by transmitting big data efficiently. One of the most promising technologies for the next generation railway wireless communication is Mobile WiMAX. This paper analyses some of the network architectures for railway wireless communication and considers the elementary concepts to facilitate the users with broadband internet access on trains. The paper aims to recognize the suitability of Mobile WiMAX technology for the special requirements of broadband internet facilities and wireless telecommunication services of Railways.

Keywords: Broadband internet, IEEE 802.16e, mobile WiMAX, Railway wireless communication

Procedia PDF Downloads 523
2496 Big Data Applications for Transportation Planning

Authors: Antonella Falanga, Armando Cartenì

Abstract:

"Big data" refers to extremely vast and complex sets of data, encompassing extraordinarily large and intricate datasets that require specific tools for meaningful analysis and processing. These datasets can stem from diverse origins like sensors, mobile devices, online transactions, social media platforms, and more. The utilization of big data is pivotal, offering the chance to leverage vast information for substantial advantages across diverse fields, thereby enhancing comprehension, decision-making, efficiency, and fostering innovation in various domains. Big data, distinguished by its remarkable attributes of enormous volume, high velocity, diverse variety, and significant value, represent a transformative force reshaping the industry worldwide. Their pervasive impact continues to unlock new possibilities, driving innovation and advancements in technology, decision-making processes, and societal progress in an increasingly data-centric world. The use of these technologies is becoming more widespread, facilitating and accelerating operations that were once much more complicated. In particular, big data impacts across multiple sectors such as business and commerce, healthcare and science, finance, education, geography, agriculture, media and entertainment and also mobility and logistics. Within the transportation sector, which is the focus of this study, big data applications encompass a wide variety, spanning across optimization in vehicle routing, real-time traffic management and monitoring, logistics efficiency, reduction of travel times and congestion, enhancement of the overall transportation systems, but also mitigation of pollutant emissions contributing to environmental sustainability. Meanwhile, in public administration and the development of smart cities, big data aids in improving public services, urban planning, and decision-making processes, leading to more efficient and sustainable urban environments. Access to vast data reservoirs enables deeper insights, revealing hidden patterns and facilitating more precise and timely decision-making. Additionally, advancements in cloud computing and artificial intelligence (AI) have further amplified the potential of big data, enabling more sophisticated and comprehensive analyses. Certainly, utilizing big data presents various advantages but also entails several challenges regarding data privacy and security, ensuring data quality, managing and storing large volumes of data effectively, integrating data from diverse sources, the need for specialized skills to interpret analysis results, ethical considerations in data use, and evaluating costs against benefits. Addressing these difficulties requires well-structured strategies and policies to balance the benefits of big data with privacy, security, and efficient data management concerns. Building upon these premises, the current research investigates the efficacy and influence of big data by conducting an overview of the primary and recent implementations of big data in transportation systems. Overall, this research allows us to conclude that big data better provide to enhance rational decision-making for mobility choices and is imperative for adeptly planning and allocating investments in transportation infrastructures and services.

Keywords: big data, public transport, sustainable mobility, transport demand, transportation planning

Procedia PDF Downloads 60
2495 Vibrancy in The City: The Problem of Sidi-Gaber Station Zone in Alexandria, Egypt

Authors: Gihan Mosaad, Bakr Gomaa, Rana Elbadri

Abstract:

Modern parts of Alexandria city lack in vibrancy, causing a number of problems such as urban areas with poor security measures as well as weak economic state. Vibrancy provides a livable, attractive and secure environments; it also boosts the city’s economy and social life. Vibrant city is a city full of energy and life. To achieve this, a number of resources are needed; namely specific urban density, the availability of alternative modes of transportation and finally diversity of land-uses. Literature review shows no comprehensive study that assesses vibrancy in the streets of modern Alexandria. This study aims to measure the vibrancy potential in Sidi-Gaber station area thought the assessment of existing resources performance. Methods include literature reviews, surveying of existing case, questionnaire as well as GIS techniques. Expected results include GIS maps defining the vibrancy potentials in land use, density and statistical study regarding public transportation use in the area.

Keywords: Alexandria, density, mixed use, transportation, vibrancy

Procedia PDF Downloads 292
2494 Iran and the Security of the Gulf Cooperation Council States

Authors: Ibrahim Alshalan

Abstract:

The Islamic Republic of Iran is one of the greatest and most powerful countries, not only in the Arabian Gulf but in the entire Middle East region. However, the Iranian regime, which came to power as a result of the 1979 revolution that resulted in overthrowing the Shah Mohammad Reza Pahlavi, has been the biggest source of threat to the stability of the Middle East since the revolution until this day. It has ambitions to dominate the neighboring Arab countries, especially Iraq, Syria, Lebanon, Yemen and Bahrain. Iran has bad relationships with countries of the Gulf Cooperation Council (GCC), which includes Saudi Arabia, United Arab Emirates, Kuwait, Qatar, Oman and Bahrain. The main objective of this paper is to shed light on the deteriorating political relations between the Iranian regime on one hand and the GCC on the other, especially Saudi Arabia which is witnessing more challenges as a result of Iran's determination to develop its nuclear program. Another important objective of this paper is to identify the Iranian role in the creation of the hotbeds of conflict in addition to its responsibility for some of the region's problems. It also aims to answer the question; why does Iran insist on developing its controversial nuclear program?

Keywords: Iran, GCC, Gulf, Saudi Arabia

Procedia PDF Downloads 571
2493 Species Diversity of Migratory Birds along Boat Touring Routes in Klong Kone Sub-District, Muang District, Samut Songkram Province, Thailand

Authors: P. Chitman, N. Charoenpokaraj

Abstract:

This research aims to study the species, feeding behavior and activity characteristics of birds which reap benefits from the research area in boat touring routes in Klong Kone Sub-district, Muang District, Samut Songkram Province, Thailand from October 2013 – May 2014. The results from the survey of birds on all three routes found that there are 11 families and 22 species. Route 1 (Klong Kone canal) had the most species, 20 species. According to feeding behavior, there were insectivorous, piscivorous and aquatic invertebrate feeder birds. Activity characteristics of birds which reap benefits from the research were finding food, nesting and raise nestlings along boat touring routes.

Keywords: bird species diversity, boat touring routes, Samut Songkram, feeding behavior

Procedia PDF Downloads 326
2492 A Framework for Blockchain Vulnerability Detection and Cybersecurity Education

Authors: Hongmei Chi

Abstract:

The Blockchain has become a necessity for many different societal industries and ordinary lives including cryptocurrency technology, supply chain, health care, public safety, education, etc. Therefore, training our future blockchain developers to know blockchain programming vulnerability and I.T. students' cyber security is in high demand. In this work, we propose a framework including learning modules and hands-on labs to guide future I.T. professionals towards developing secure blockchain programming habits and mitigating source code vulnerabilities at the early stages of the software development lifecycle following the concept of Secure Software Development Life Cycle (SSDLC). In this research, our goal is to make blockchain programmers and I.T. students aware of the vulnerabilities of blockchains. In summary, we develop a framework that will (1) improve students' skills and awareness of blockchain source code vulnerabilities, detection tools, and mitigation techniques (2) integrate concepts of blockchain vulnerabilities for IT students, (3) improve future IT workers’ ability to master the concepts of blockchain attacks.

Keywords: software vulnerability detection, hands-on lab, static analysis tools, vulnerabilities, blockchain, active learning

Procedia PDF Downloads 97
2491 Microwave Accelerated Simultaneous Distillation –Extraction: Preparative Recovery of Volatiles from Food Products

Authors: Ferhat Mohamed, Boukhatem Mohamed Nadjib, Chemat Farid

Abstract:

Simultaneous distillation–extraction (SDE) is routinely used by analysts for sample preparation prior to gas chromatography analysis. In this work, a new process design and operation for microwave assisted simultaneous distillation – solvent extraction (MW-SDE) of volatile compounds was developed. Using the proposed method, isolation, extraction and concentration of volatile compounds can be carried out in a single step. To demonstrate its feasibility, MW-SDE was compared with the conventional technique, Simultaneous distillation–extraction (SDE), for gas chromatography-mass spectrometry (GC-MS) analysis of volatile compounds in a fresh orange juice and a dry spice “carvi seeds”. SDE method required long time (3 h) to isolate the volatile compounds, and large amount of organic solvent (200 mL of hexane) for further extraction, while MW-SDE needed little time (only 30 min) to prepare sample, and less amount of organic solvent (10 mL of hexane). These results show that MW-SDE–GC-MS is a simple, rapid and solvent-less method for determination of volatile compounds from aromatic plants.

Keywords: essential oil, extraction, distillation, carvi seeds

Procedia PDF Downloads 558
2490 Evaluating The Effects of Fundamental Analysis on Earnings Per Share Concept in Stock Valuation in the Zimbabwe Stock Exchange Market

Authors: Brian Basvi

Abstract:

A technique for analyzing a security's intrinsic value is called fundamental analysis. It involves looking at relevant financial, economic, and other qualitative and quantitative aspects. Earnings Per Share (EPS), a crucial metric in fundamental analysis, is calculated by dividing a company's net income by the total number of outstanding shares. With more than 70 listed businesses, the Zimbabwe Stock Exchange (ZSE) is the primary stock exchange in Zimbabwe. This study applies the EPS financial ratio and stock valuation techniques to historical stock data from 68 companies listed on the Zimbabwe Stock Exchange. According to a ZSE study, EPS significantly affects share prices that are listed on the market. The study's objective was to assess how fundamental analysis affected the idea of EPS in ZSE stock valuation. It concluded that EPS is an important consideration for investors when they make judgments about their investments. According to the study's findings, fundamental analysis is a useful tool for ZSE investors since it offers insightful information about a company's financial performance and aids in decision-making. Investors can have a better understanding of a company's underlying worth and prospects for future growth by looking into EPS and other basic aspects.

Keywords: fundamental analysis, stock valuation, EPS, share pricing

Procedia PDF Downloads 42
2489 Characterization and Antimicrobial Properties of Functional Polypropylene Films Incorporated with AgSiO2, AgZn, and AgZ Useful as Returnable Packaging in Seafood Distribution

Authors: Suman Singh, Myungho Lee, Insik Park, Yangjai Shin, Youn Suk Lee

Abstract:

Active antimicrobial films prepared by incorporating AgSiO2, AgZn, and AgZ at 1%, 3%, 5%, 10% (w/w) into polypropylene (PP) matrix. Complete thermal, structural, mechanical and functional characterization were carried out of all formulations and determined the antimicrobial efficiency and returnable antimicrobial efficiency according to the Japanese Industrial Standard method. The morphology of the films showed agglomerates of particles in the composites. The active formulation had decreased elongation compared to the pure PP sample. Thermal analyses indicated that the active formulation compositions had increased thermal stability. The films showed 50% antimicrobial properties after the fifth wash against the tested microorganisms, presenting better activity against Gram negative organisms than Gram positive ones. These findings suggest that PP films with AgSiO2, AgZn, and AgZ particles could provide a significant contribution to the quality and safety of seafood in the distribution chain.

Keywords: antimicrobial film, properties and characterization, returnable packaging, sea food

Procedia PDF Downloads 363
2488 Energy Consumption Modeling for Strawberry Greenhouse Crop by Adaptive Nero Fuzzy Inference System Technique: A Case Study in Iran

Authors: Azar Khodabakhshi, Elham Bolandnazar

Abstract:

Agriculture as the most important food manufacturing sector is not only the energy consumer, but also is known as energy supplier. Using energy is considered as a helpful parameter for analyzing and evaluating the agricultural sustainability. In this study, the pattern of energy consumption of strawberry greenhouses of Jiroft in Kerman province of Iran was surveyed. The total input energy required in the strawberries production was calculated as 113314.71 MJ /ha. Electricity with 38.34% contribution of the total energy was considered as the most energy consumer in strawberry production. In this study, Neuro Fuzzy networks was used for function modeling in the production of strawberries. Results showed that the best model for predicting the strawberries function had a correlation coefficient, root mean square error (RMSE) and mean absolute percentage error (MAPE) equal to 0.9849, 0.0154 kg/ha and 0.11% respectively. Regards to these results, it can be said that Neuro Fuzzy method can be well predicted and modeled the strawberry crop function.

Keywords: crop yield, energy, neuro-fuzzy method, strawberry

Procedia PDF Downloads 379
2487 Cloud Computing in Data Mining: A Technical Survey

Authors: Ghaemi Reza, Abdollahi Hamid, Dashti Elham

Abstract:

Cloud computing poses a diversity of challenges in data mining operation arising out of the dynamic structure of data distribution as against the use of typical database scenarios in conventional architecture. Due to immense number of users seeking data on daily basis, there is a serious security concerns to cloud providers as well as data providers who put their data on the cloud computing environment. Big data analytics use compute intensive data mining algorithms (Hidden markov, MapReduce parallel programming, Mahot Project, Hadoop distributed file system, K-Means and KMediod, Apriori) that require efficient high performance processors to produce timely results. Data mining algorithms to solve or optimize the model parameters. The challenges that operation has to encounter is the successful transactions to be established with the existing virtual machine environment and the databases to be kept under the control. Several factors have led to the distributed data mining from normal or centralized mining. The approach is as a SaaS which uses multi-agent systems for implementing the different tasks of system. There are still some problems of data mining based on cloud computing, including design and selection of data mining algorithms.

Keywords: cloud computing, data mining, computing models, cloud services

Procedia PDF Downloads 479
2486 Data Hiding by Vector Quantization in Color Image

Authors: Yung Gi Wu

Abstract:

With the growing of computer and network, digital data can be spread to anywhere in the world quickly. In addition, digital data can also be copied or tampered easily so that the security issue becomes an important topic in the protection of digital data. Digital watermark is a method to protect the ownership of digital data. Embedding the watermark will influence the quality certainly. In this paper, Vector Quantization (VQ) is used to embed the watermark into the image to fulfill the goal of data hiding. This kind of watermarking is invisible which means that the users will not conscious the existing of embedded watermark even though the embedded image has tiny difference compared to the original image. Meanwhile, VQ needs a lot of computation burden so that we adopt a fast VQ encoding scheme by partial distortion searching (PDS) and mean approximation scheme to speed up the data hiding process. The watermarks we hide to the image could be gray, bi-level and color images. Texts are also can be regarded as watermark to embed. In order to test the robustness of the system, we adopt Photoshop to fulfill sharpen, cropping and altering to check if the extracted watermark is still recognizable. Experimental results demonstrate that the proposed system can resist the above three kinds of tampering in general cases.

Keywords: data hiding, vector quantization, watermark, color image

Procedia PDF Downloads 363
2485 Global Gender Differences in Job Satisfaction in the Hospitality Industry

Authors: Jonathan Hinton Westover, Maureen S. Andrade, Doug Miller

Abstract:

Research has been inconclusive in determining if men or women experience more job satisfaction. A global comparison examining extrinsic and intrinsic factors, work relations, and work-life balance determinants found few differences; however, work relations and work-life balance factors were more significant for male than female workers across occupations. The current study uses International Social Survey Program data representing 37 countries to explore gender differences in job satisfaction in the hospitality industry. Findings demonstrate that mean job satisfaction scores for females are lower across hospitality occupations except for hotel receptionists, housekeeping supervisors, and hotel cleaners. Regression results revealed additional differences such as the significance of co-worker relations, the negative impact of being discriminated against and harassed at work, working weekends, marital status, and supervisory status for women with autonomy, work stress, education, and employment relationship being more salient for men. Interesting work, work being useful to society, job security, pay, relations with management, and work interfering with family were significant for both males and females.

Keywords: job satisfaction, gender, hospitality, global comparisons

Procedia PDF Downloads 133
2484 Optimization, Yield and Chemical Composition of Essential Oil from Cymbopogon citratus: Comparative Study with Microwave Assisted Extraction and Hydrodistillation

Authors: Irsha Dhotre

Abstract:

Cymbopogon citratus is generally known as Indian Lemongrass and is widely applicable in the cosmetic, pharmaceutical, dairy puddings, and food industries. To enhance the quality of extraction, microwave-oven-aided hydro distillation processes were implemented. The basic parameter which influences the rate of extraction is considered, such as the temperature of extraction, the time required for extraction, and microwave-oven power applied. Locally available CKP 25 Cymbopogon citratus was used for the extraction of essential oil. Optimization of Extractions Parameters and full factorial Box–Behnken design (BBD) evaluated by using Design expert 13 software. The regression model revealed that the optimum parameters required for extractions are a temperature of 35℃, a time of extraction of 130 minutes, and microwave-oven power of 700 W. The extraction efficiency of yield is 4.76%. Gas Chromatography-Mass Spectroscopy (GC-MS) analysis confirmed the significant components present in the extraction of lemongrass oil.

Keywords: Box–Behnken design, Cymbopogon citratus, hydro distillation, microwave-oven, response surface methodology

Procedia PDF Downloads 92
2483 Artificial Bee Colony Based Modified Energy Efficient Predictive Routing in MANET

Authors: Akhil Dubey, Rajnesh Singh

Abstract:

In modern days there occur many rapid modifications in field of ad hoc network. These modifications create many revolutionary changes in the routing. Predictive energy efficient routing is inspired on the bee’s behavior of swarm intelligence. Predictive routing improves the efficiency of routing in the energetic point of view. The main aim of this routing is the minimum energy consumption during communication and maximized intermediate node’s remaining battery power. This routing is based on food searching behavior of bees. There are two types of bees for the exploration phase the scout bees and for the evolution phase forager bees use by this routing. This routing algorithm computes the energy consumption, fitness ratio and goodness of the path. In this paper we review the literature related with predictive routing, presenting modified routing and simulation result of this algorithm comparison with artificial bee colony based routing schemes in MANET and see the results of path fitness and probability of fitness.

Keywords: mobile ad hoc network, artificial bee colony, PEEBR, modified predictive routing

Procedia PDF Downloads 415
2482 Targeting Violent Extremist Narratives: Applying Network Targeting Techniques to the Communication Functions of Terrorist Groups

Authors: John Hardy

Abstract:

Over the last decade, the increasing utility of extremist narratives to the operational effectiveness of terrorist organizations has been evidenced by the proliferation of inspired or affiliated attacks across the world. Famous examples such as regional al-Qaeda affiliates and the self-styled “Islamic State” demonstrate the effectiveness of leveraging communication technologies to disseminate propaganda, recruit members, and orchestrate attacks. Terrorist organizations with the capacity to harness the communicative power offered by digital communication technologies and effective political narratives have held an advantage over their targets in recent years. Terrorists have leveraged the perceived legitimacy of grass-roots actors to appeal to a global audience of potential supporters and enemies alike, and have wielded a proficiency in profile-raising which remains unmatched by counter terrorism narratives around the world. In contrast, many attempts at propagating official counter-narratives have been received by target audiences as illegitimate, top-down and impersonally bureaucratic. However, the benefits provided by widespread communication and extremist narratives have come at an operational cost. Terrorist organizations now face a significant challenge in protecting their access to communications technologies and authority over the content they create and endorse. The dissemination of effective narratives has emerged as a core function of terrorist organizations with international reach via inspired or affiliated attacks. As such, it has become a critical function which can be targeted by intelligence and security forces. This study applies network targeting principles which have been used by coalition forces against a range of non-state actors in the Middle East and South Asia to the communicative function of terrorist organizations. This illustrates both a conceptual link between functional targeting and operational disruption in the abstract and a tangible impact on the operational effectiveness of terrorists by degrading communicative ability and legitimacy. Two case studies highlight the utility of applying functional targeting against terrorist organizations. The first case is the targeted killing of Anwar al-Awlaki, an al-Qaeda propagandist who crafted a permissive narrative and effective propaganda videos to attract recruits who committed inspired terrorist attacks in the US and overseas. The second is a series of operations against Islamic State propagandists in Syria, including the capture or deaths of a cadre of high profile Islamic State members, including Junaid Hussain, Abu Mohammad al-Adnani, Neil Prakash, and Rachid Kassim. The group of Islamic State propagandists were linked to a significant rise in affiliated and enabled terrorist attacks and were subsequently targeted by law enforcement and military agencies. In both cases, the disruption of communication between the terrorist organization and recruits degraded both communicative and operational functions. Effective functional targeting on member recruitment and operational tempo suggests that narratives are a critical function which can be leveraged against terrorist organizations. Further application of network targeting methods to terrorist narratives may enhance the efficacy of a range of counter terrorism techniques employed by security and intelligence agencies.

Keywords: countering violent extremism, counter terrorism, intelligence, terrorism, violent extremism

Procedia PDF Downloads 289
2481 A Review of Routing Protocols for Mobile Ad-Hoc NETworks (MANET)

Authors: Hafiza Khaddija Saman, Muhammad Sufyan

Abstract:

The increase in availability and popularity of mobile wireless devices has led researchers to develop a wide variety of Mobile Ad-hoc Networking (MANET) protocols to exploit the unique communication opportunities presented by these devices. Devices are able to communicate directly using the wireless spectrum in a peer-to-peer fashion, and route messages through intermediate nodes, however, the nature of wireless shared communication and mobile devices result in many routing and security challenges which must be addressed before deploying a MANET. In this paper, we investigate the range of MANET routing protocols available and discuss the functionalities of several ranging from early protocols such as DSDV to more advanced such as MAODV, our protocol study focuses upon works by Perkins in developing and improving MANET routing. A range of literature relating to the field of MANET routing was identified and reviewed, we also reviewed literature on the topic of securing AODV based MANETs as this may be the most popular MANET protocol. The literature review identified a number of trends within research papers such as exclusive use of the random waypoint mobility model, excluding key metrics from simulation results and not comparing protocol performance against available alternatives.

Keywords: protocol, MANET, ad-Hoc, communication

Procedia PDF Downloads 260