Search results for: nutrition security
3051 Philippine Foreign Policy in the West Philippine Sea after the 2012 Scarborough Standoff: Implications for National Security
Authors: Rhisan Mae Enriquez-Morales
Abstract:
The primary concern of this study is to answer the question: How does the Philippine government formulate its foreign policy with respect to its territorial claims over areas in the West Philippine Sea after the Scarborough standoff in April 2012? Specifically, the study seeks to provide understanding on the political process in the formulation of foreign policy relating to the Philippine claims in the West Philippine Sea after the 2012 Scarborough Standoff, by looking into the relationship of bureaucracies and how it influences the decision-making process. Secondly, this study aims to determine the long and short term foreign policies of the Philippines with respect to its territorial claims over the West Philippine Sea. Lastly, this study seeks to determine the implication of Philippine foreign policy in settling the West Philippine Sea dispute on the country’s national security. The Bureaucratic Politics Model (BPM) in Foreign Policy Analysis (FPA) is the framework utilized in this study, which focuses primarily on the relationship of bureaucracies in the formulation of foreign policy and how these agencies influence the process of foreign policy formulation. The findings of this study reveal that: first, the Philippines foreign policy in the West Philippine Sea continues to develop to address current developments in the WPS. Second, as the government requires demilitarization there is a shift from traditional to non-traditional security approach. This shift caused inconvenience from the defense sector particularly the Navy thinking that they are being deprived of their traditional roles. Lastly, the Philippine government’s greater emphasis on internal security operation implies the need to reassess its security concerns and look into territorial security.Keywords: bureaucratic politics model, foreign policy analysis, security, West Philippine sea
Procedia PDF Downloads 3983050 Chaos Cryptography in Cloud Architectures with Lower Latency
Authors: Mohammad A. Alia
Abstract:
With the rapid evolution of the internet applications, cloud computing becomes one of today’s hottest research areas due to its ability to reduce costs associated with computing. Cloud is, therefore, increasing flexibility and scalability for computing services in the internet. Cloud computing is Internet based computing due to shared resources and information which are dynamically delivered to consumers. As cloud computing share resources via the open network, hence cloud outsourcing is vulnerable to attack. Therefore, this paper will explore data security of cloud computing by implementing chaotic cryptography. The proposal scenario develops a problem transformation technique that enables customers to secretly transform their information. This work proposes the chaotic cryptographic algorithms have been applied to enhance the security of the cloud computing accessibility. However, the proposed scenario is secure, easy and straightforward process. The chaotic encryption and digital signature systems ensure the security of the proposed scenario. Though, the choice of the key size becomes crucial to prevent a brute force attack.Keywords: chaos, cloud computing, security, cryptography
Procedia PDF Downloads 3483049 Diversity for Safety and Security of Autonomous Vehicles against Accidental and Deliberate Faults
Authors: Anil Ranjitbhai Patel, Clement John Shaji, Peter Liggesmeyer
Abstract:
Safety and security of autonomous vehicles (AVs) is a growing concern, first, due to the increased number of safety-critical functions taken over by automotive embedded systems; second, due to the increased exposure of the software-intensive systems to potential attackers; third, due to dynamic interaction in an uncertain and unknown environment at runtime which results in changed functional and non-functional properties of the system. Frequently occurring environmental uncertainties, random component failures, and compromise security of the AVs might result in hazardous events, sometimes even in an accident, if left undetected. Beyond these technical issues, we argue that the safety and security of AVs against accidental and deliberate faults are poorly understood and rarely implemented. One possible way to overcome this is through a well-known diversity approach. As an effective approach to increase safety and security, diversity has been widely used in the aviation, railway, and aerospace industries. Thus, the paper proposes fault-tolerance by diversity model takes into consideration the mitigation of accidental and deliberate faults by application of structure and variant redundancy. The model can be used to design the AVs with various types of diversity in hardware and software-based multi-version system. The paper evaluates the presented approach by employing an example from adaptive cruise control, followed by discussing the case study with initial findings.Keywords: autonomous vehicles, diversity, fault-tolerance, adaptive cruise control, safety, security
Procedia PDF Downloads 1333048 Main Chaos-Based Image Encryption Algorithm
Authors: Ibtissem Talbi
Abstract:
During the last decade, a variety of chaos-based cryptosystems have been investigated. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by Shannon. Compared with traditional cryptosystems (DES, 3DES, AES, etc.), the chaos-based cryptosystems are more flexible, more modular and easier to be implemented, which make them suitable for large scale-data encyption, such as images and videos. The heart of any chaos-based cryptosystem is the chaotic generator and so, a part of the efficiency (robustness, speed) of the system depends greatly on it. In this talk, we give an overview of the state of the art of chaos-based block ciphers and we describe some of our schemes already proposed. Also we will focus on the essential characteristics of the digital chaotic generator, The needed performance of a chaos-based block cipher in terms of security level and speed of calculus depends on the considered application. There is a compromise between the security and the speed of the calculation. The security of these block block ciphers will be analyzed.Keywords: chaos-based cryptosystems, chaotic generator, security analysis, structure of Fridrich
Procedia PDF Downloads 6883047 Nutrition and Physical Activity in Obese Women
Authors: Shubeska Stratrova S., Muca A., Panovska S. Clinic of endocrinology, diabetes, metabolic disorders, Medical Faculty, Skopje, N. Macedonia
Abstract:
Rationale: Obese subjects have a high energy density diet, low physical activity levels, a sedentary lifestyle, as well as eating disorders, which are considered important risk factors for the development of obesity. Methods: In order to discover the imbalance of energy intake and energy expenditure in obese women (W), two groups of examinees answered questionnaires regarding nutrition and physical activity: 1st group of women with normal body mass index (BMI <25 kg/m²) and 2nd group of obese women with BMI >30 kg/m². Results: 61.11% of obese W from the 2nd group reported good appetite, which was higher than the 1st group (45%). In 55.56% W, frustrations were a provocation for over nutrition. In the 2nd group, 38.89% W ate too much compared to 9.09% W from the 1st group. In the ²ⁿᵈ group, 35.29% W reported consuming food rarely and too much, while 29.41% W reported consuming food often and too much. All examinees from the ²ⁿᵈ group had consumed food in less than 5 hours, compared to only 8.33% W from the ¹ⁿᵈ group and had consumed hyper-caloric food. Consumption of fruits and vegetables was lower in the 2nd group compared to the 1st group. Half of the subjects in the 2nd group were physically inactive, compared to only 8% in the 1st group. All of the examinees in the 2nd group walked for less than 3 hours a day, compared to 54% in the 1st group. In the 2nd group, 67% W reported watching TV very often, 39% reported watching TV longer than 3 hours, which is significantly higher than 8.33% W in the 1st group. Overall, 81.25% of examinees from the 2nd group reported sitting for more than 3 hours a day, which is significantly more compared to the 1st group (45.45%). Conclusions: Obese women are less physically active, have a sedentary lifestyle, good appetite, and consume too much hyper-caloric food very often.Keywords: (W) obese women, BMI(Body mass Index), nutrition, hyper-caloric food
Procedia PDF Downloads 803046 Balancing Security and Human Rights: A Comprehensive Approach to Security and Defense Policy
Authors: Babatunde Osabiya
Abstract:
Cybersecurity has emerged as a pressing policy problem in recent years, affecting individuals, businesses, and governments worldwide. This research paper aims to critically review the literature on cybersecurity policy and apply policy theory to propose a policy approach that balances the freedom to access and use technology with the human rights risks and threats posed by cyber. Drawing on various credible sources, the paper examines the scale and seriousness of cyber threats, highlighting the growing threat posed by cybercriminals, hackers, and nation-states. The paper also identifies the key challenges facing policymakers, including the need for more significant investment in cybersecurity research and development and the importance of balancing the benefits of technological innovation with the risks to privacy, security, and human rights. To address these challenges, the paper proposes a policy approach emphasizing investing in cybersecurity research and development to maintain a technological edge over potential adversaries. This approach also highlights the need for greater collaboration between government, industry, and civil society to develop effective cybersecurity policies and practices that protect the rights and freedoms of people while mitigating the risks posed by cyber threats. This paper will contribute to the growing body of literature on cybersecurity policy and offers a policy framework for addressing this critical policy challenge.Keywords: security risk, legal framework, cyber security and policy, national security
Procedia PDF Downloads 943045 Design of a New Architecture of IDS Called BiIDS (IDS Based on Two Principles of Detection)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security.In this paper we present different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection).Keywords: intrusion detection, architectures, characteristic, tools, security
Procedia PDF Downloads 4673044 Effectiveness of a Sports Nutrition Intervention for High-School Athletes: A Feasibility Study
Authors: Michael Ryan, Rosemary E. Borgerding, Kimberly L. Oliver
Abstract:
The objective of this study was to assess the effectiveness of a sports nutrition intervention on body composition in high-school athletes. The study aimed to improve the food and water intake of high-school athletes, evaluate the cost-effectiveness of the intervention, and assess changes in body fat. Data were collected through observations, questionnaires, and interviews. Additionally, bioelectrical impedance analysis was performed to assess the body composition of athletes both before and after the intervention. Athletes (n=25) participated in researcher-monitored training sessions three times a week over the course of 12 weeks. During these sessions, in addition to completing their auxiliary sports training, participants were exposed to educational interventions aimed at improving their nutrition. These included discussions regarding current eating habits, nutritional guidelines for athletes, and individualized recommendations. Food was also made available to athletes for consumption before and after practice. Meals of balanced macronutrient composition were prepared and provided to athletes on four separate occasions throughout the intervention, either prior to or following a competitive event such as a tournament or game. A paired t-test was used to determine the statistical significance of the changes in body fat percentage. The results showed that there was a statistically significant difference between pre and post-intervention body fat percentage (p= .006). Cohen's d of 0.603 was calculated, indicating a moderate effect size. In conclusion, this study provides evidence that a sports nutrition intervention that combines food availability, explicit prescription, and education can be effective in improving the body composition of high-school athletes. However, it's worth noting that this study had a small sample size, and the conclusions cannot be generalized to a larger population. Further research is needed to assess the scalability of this study. This preliminary study demonstrated the feasibility of this type of nutritional intervention and laid the groundwork for a larger, more extensive study to be conducted in the future.Keywords: bioelectrical impedance, body composition, high-school athletes, sports nutrition, sports pedagogy
Procedia PDF Downloads 973043 Effective Strategies Migrants Adopted to Improve Food Security in a Regional Area of Australia
Authors: Joanne Sin Wei Yeoh, Quynh Lê, Daniel R. Terry, Rosa Mc Manamey
Abstract:
Food security is a global issue and one of the concerns in Australia, particularly in regional and rural areas. Despite Australia’s current ability to produce enough food to feed more than its current population, evidence has been accumulating over the last decade to demonstrate many Australians struggle to feed themselves, including immigrants from cultural and linguistically diverse (CALD) backgrounds. This study aims to identify the acculturation strategies used by migrants to enhance their approach to food security in Tasmania. The study employed a mixed methods approach that used both questionnaires and semi-structured interviews with migrants living in Tasmania. Descriptive and inferential statistics was used to analyse data collected from questionnaire, whereas, thematic analysis was employed to analyse the interview data. Migrants (n=301) completed the questionnaire with a response rate of 50.2% and 33 follow-up interviews were conducted. We found that majority of the migrants (70.0%) replaced food ingredients and went without the food they could not buy from shops with similar ingredients. Support and advice from friends were effective ways to improve their food access. Additionally, length of stays in Tasmania and region of origin were significantly associated with the ways migrants dealing with food security. The interview results revealed that migrants managed to adapt to the new food culture by using different acculturation strategies, including access food ingredients from other country; adjusting or adapting; home gardening and access to technology. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. To summarize, migrants employed different strategies for food security while acculturating into the new environment. Our findings could become the guidelines for migrants and relevant government or private sectors that address food security.Keywords: food security, migrants, strategies, inferential statistics
Procedia PDF Downloads 5313042 Improving Digital Data Security Awareness among Teacher Candidates with Digital Storytelling Technique
Authors: Veysel Çelik, Aynur Aker, Ebru Güç
Abstract:
Developments in information and communication technologies have increased both the speed of producing information and the speed of accessing new information. Accordingly, the daily lives of individuals have started to change. New concepts such as e-mail, e-government, e-school, e-signature have emerged. For this reason, prospective teachers who will be future teachers or school administrators are expected to have a high awareness of digital data security. The aim of this study is to reveal the effect of the digital storytelling technique on the data security awareness of pre-service teachers of computer and instructional technology education departments. For this purpose, participants were selected based on the principle of volunteering among third-grade students studying at the Computer and Instructional Technologies Department of the Faculty of Education at Siirt University. In the research, the pretest/posttest half experimental research model, one of the experimental research models, was used. In this framework, a 6-week lesson plan on digital data security awareness was prepared in accordance with the digital narration technique. Students in the experimental group formed groups of 3-6 people among themselves. The groups were asked to prepare short videos or animations for digital data security awareness. The completed videos were watched and evaluated together with prospective teachers during the evaluation process, which lasted approximately 2 hours. In the research, both quantitative and qualitative data collection tools were used by using the digital data security awareness scale and the semi-structured interview form consisting of open-ended questions developed by the researchers. According to the data obtained, it was seen that the digital storytelling technique was effective in creating data security awareness and creating permanent behavior changes for computer and instructional technology students.Keywords: digital storytelling, self-regulation, digital data security, teacher candidates, self-efficacy
Procedia PDF Downloads 1303041 Health Status among Government and Private Primary School Children in the Central of Thailand
Authors: Petcharat Kerdonfag, Supunnee Thrakul
Abstract:
School health services through regular screening of school students’ health status have been the main responsibility for community or school health nurses. The purposes of these retrospective study were to assess and compare health problems between government and private primary school students in the central region of Thailand. The data were collected from the school health records in October at the end of the first semester in the academic year 2018. Two thousand and fifty primary school health records from government and private primary schools were gathered to assess health problems regarding anthropometric measurements, physical examination/personal hygiene, and clinical findings for this study. Descriptive statistics and Chi-square were used to be analyzed. The results revealed that health problems of all the school students remained high magnitude. The five top ranks for prevalence rate of health problems were dental caries (36.6%), visual acuity problem (27.7%), over-nutrition (16.8%), head lice (12.8%), and under-nutrition (6.8%), respectively. However, when compared between government and private schools among five health problems; dental caries (55.0% vs 19.9%), visual acuity problem (23.1% vs 31.9%), over-nutrition (20.2% vs 13.8%), head lice (26.5% vs 0.3%), and under-nutrition (10.6% vs 3.4%) with Chi-square analysis, there were significantly different (p < .001). The problem of visual acuity seems to be more serious in private schools while other health problems tend to be more critical in government schools. The findings have suggested that parents who have children in the private primary schools should pay more attention to visual health defects whereas parents with children in the government school should pay more vigilance regards to hygiene and health behavior problems.Keywords: community health nursing, school health service, health status, primary school children
Procedia PDF Downloads 1273040 Botnet Detection with ML Techniques by Using the BoT-IoT Dataset
Authors: Adnan Baig, Ishteeaq Naeem, Saad Mansoor
Abstract:
The Internet of Things (IoT) gadgets have advanced quickly in recent years, and their use is steadily rising daily. However, cyber-attackers can target these gadgets due to their distributed nature. Additionally, many IoT devices have significant security flaws in their implementation and design, making them vulnerable to security threats. Hence, these threats can cause important data security and privacy loss from a single attack on network devices or systems. Botnets are a significant security risk that can harm the IoT network; hence, sophisticated techniques are required to mitigate the risk. This work uses a machine learning-based method to identify IoT orchestrated by botnets. The proposed technique identifies the net attack by distinguishing between legitimate and malicious traffic. This article proposes a hyperparameter tuning model to improvise the method to improve the accuracy of existing processes. The results demonstrated an improved and more accurate indication of botnet-based cyber-attacks.Keywords: Internet of Things, Botnet, BoT-IoT dataset, ML techniques
Procedia PDF Downloads 203039 Mean Nutrient Intake and Nutrient Adequacy Ratio in India: Occurrence of Hidden Hunger in Indians
Authors: Abha Gupta, Deepak K. Mishra
Abstract:
The focus of food security studies in India has been on the adequacy of calories and its linkage with poverty level. India currently being undergoing a massive demographic and epidemiological transition has demonstrated a decline in average physical activity with improved mechanization and urbanization. Food consumption pattern is also changing with decreasing intake of coarse cereals and a marginal increase in the consumption of fruits, vegetables and meat products resulting into a nutrition transition in the country. However, deficiency of essential micronutrients such as vitamins and minerals is rampant despite their growing importance in fighting back with lifestyle and other modern diseases. The calorie driven studies can hardly tackle the complex problem of malnutrition. This paper fills these research lacuna and analyses mean intake of different major and micro-nutrients among different socio-economic groups and adequacy of these nutrients from recommended dietary allowance. For the purpose, a cross-sectional survey covering 304 households selected through proportional stratified random sampling was conducted in six villages of Aligarh district of the state of Uttar Pradesh, India. Data on quantity consumed of 74 food items grouped into 10 food categories with a recall period of seven days was collected from the households and converted into energy, protein, fat, carbohydrate, calcium, iron, thiamine, riboflavin, niacin and vitamin C using standard guidelines of National Institute of Nutrition. These converted nutrients were compared with recommended norms given by National Nutrition Monitoring Bureau. Per capita nutrient adequacy was calculated by dividing mean nutrient intake by the household size and then by comparing it with recommended norm. Findings demonstrate that source of both macro and micro-nutrients are mainly cereals followed by milk, edible oil and sugar items. Share of meat in providing essential nutrients is very low due to vegetarian diet. Vegetables, pulses, nuts, fruits and dry fruits are a poor source for most of the nutrients. Further analysis evinces that intake of most of the nutrients is higher than the recommended norm. Riboflavin is the only vitamin whose intake is less than the standard norm. Poor group, labour, small farmers, Muslims, scheduled caste demonstrate comparatively lower intake of all nutrients than their counterpart groups, though, they get enough macro and micro-nutrients significantly higher than the norm. One of the major reasons for higher intake of most of the nutrients across all socio-economic groups is higher consumption of monotonous diet based on cereals and milk. Most of the nutrients get their major share from cereals particularly wheat and milk intake. It can be concluded from the analysis that although there is adequate intake of most of the nutrients in the diet of rural population yet their source is mainly cereals and milk products depicting a monotonous diet. Hence, more efforts are needed to diversify the diet by giving more focus to the production of other food items particularly fruits, vegetables and pulse products. Awareness among the population, more accessibility and incorporating food items other than cereals in government social safety programmes are other measures to improve food security in India.Keywords: hidden hunger, India, nutrients, recommended norm
Procedia PDF Downloads 3213038 Health Care Providers' Perceptions on mHealth Workplace Nutrition Wellness Program: A Thematic Analysis
Authors: Kim H. K. Choy, Oliva H. K. Chu, W. Y. Keung, B. Lim, Winnie P. Y. Tang
Abstract:
Background: Health care providers have been identified as an at-risk group for obesity. Mobile health technology can be used to motivate lifestyle behavioral changes. The aim of this study was to investigate hospital-based health care providers’ perceptions of mHealth Workplace Nutrition Wellness Program. Methods: This qualitative study was conducted at a regional hospital in Hong Kong. Ten health care providers were purposively selected for the study. Qualitative data was collected by individual face-to-face semi-structured interviews which were audio-taped, transcribed verbatim and analyzed by thematic analysis. Results: Four themes were identified: (1) mobile health technology motivates lifestyle changes, (2) self-perceived body weight initiates health behavioral changes, (3) organizational support promotes healthy behavior, (4) lack of self-confidence hinders lifestyle modification. The health care providers’ perceptions of mobile health technology, barriers, and facilitators to participation in the mHealth Workplace Nutrition Wellness Program were discussed in the study. Conclusions: Barriers, facilitators, self-perceived body weight and experiences of mobile health technology were associated with intention of participation in mHealth Workplace Nutrition Wellness Program. The knowledge generated from the study could be used to guide the design and implementation of effective interventions, strategies and policies of workplace wellness programs to promote participation for hospital’s employees.Keywords: workplace wellness program, mobile health, barriers, facilitators, qualitative
Procedia PDF Downloads 2633037 Attitude of Beef Cattle Farmers toward Biosecurity Practices
Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim
Abstract:
The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.Keywords: attitude, beef cattle, biosecurity, farmers
Procedia PDF Downloads 2993036 VCloud: A Security Framework for VANET
Authors: Wiseborn Manfe Danquah, D. Turgay Altilar
Abstract:
Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)
Procedia PDF Downloads 3573035 Integrating Animal Nutrition into Veterinary Science: Enhancing Health, Productivity, and Sustainability through Advanced Nutritional Strategies and Collaborative Approaches
Authors: Namiiro Shirat Umar
Abstract:
The science of animals and veterinary medicine is a multidisciplinary field dedicated to understanding, managing, and enhancing the health and welfare of animals. This field encompasses a broad spectrum of disciplines, including animal physiology, genetics, nutrition, behavior, and pathology, as well as preventive and therapeutic veterinary care. Veterinary science focuses on diagnosing, treating, and preventing diseases in animals, ensuring their health and well-being. It involves the study of various animal species, from companion animals and livestock to wildlife and exotic species. Through advanced diagnostic techniques, medical treatments, and surgical procedures, veterinarians address a wide range of health issues, from infectious diseases and injuries to chronic conditions and reproductive health. Animal science complements veterinary medicine by providing a deeper understanding of animal biology and behavior, which is essential for effective health management. It includes research on animal breeding, nutrition, and husbandry practices aimed at improving animal productivity and welfare. Incorporating modern technologies and methodologies, such as genomics, bioinformatics, and precision farming, the science of animals and veterinary medicine continually evolves to address emerging challenges. This integrated approach ensures the development of sustainable practices, enhances animal welfare and contributes to public health by monitoring zoonotic diseases and ensuring the safety of animal products. Animal nutrition is a cornerstone of animal and veterinary science, focusing on the dietary needs of animals to promote health, growth, reproduction, and overall well-being. Proper nutrition ensures that animals receive essential nutrients, including macronutrients (carbohydrates, proteins, fats) and micronutrients (vitamins, minerals), tailored to their specific species, life stages, and physiological conditions. By emphasizing a balanced diet, animal nutrition serves as a preventive measure against diseases and enhances recovery from illnesses, reducing the need for pharmaceutical interventions. It addresses key health issues such as metabolic disorders, reproductive inefficiencies, and immune system deficiencies. Moreover, optimized nutrition improves the quality of animal products like meat, milk, and eggs and enhances the sustainability of animal farming by improving feed efficiency and reducing environmental waste. The integration of animal nutrition into veterinary practice necessitates a collaborative approach involving veterinarians, animal nutritionists, and farmers. Advances in nutritional science, such as precision feeding and the use of nutraceuticals, provide innovative solutions to traditional veterinary challenges. Overall, the focus on animal nutrition as a primary aspect of veterinary care leads to more holistic, sustainable, and effective animal health management practices, promoting the welfare and productivity of animals in various settings. This abstract is a trifold in nature as it traverses how education can put more emphasis on animal nutrition as an alternative for improving animal health as an important issue espoused under the discipline of animal and veterinary science; therefore, brief aspects of this paper and they are as follows; animal nutrition, veterinary science and animals.Keywords: animal nutrition as a way to enhance growth, animal science as a study, veterinary science dealing with health of the animals, animals healthcare dealing with proper sanitation
Procedia PDF Downloads 393034 Nutritional Allowance Support Affecting Treatment Compliance among TB Patients in Western, Nepal
Authors: Yadav R. K., Baral S.
Abstract:
Introduction: Nepal is one of the world’s least developed countries and has a high incidence of tuberculosis (TB). The TB prevalence survey in 2019 showed 69,000 Nepalese is developing TB and 4,000 die every year. Given its disproportionate impact on the impoverished segments of society, TB often thrusts patients into extreme poverty or exacerbates their existing economic struggles. Consequently, not only the patients but also their families suffer from the loss of livelihood. This study aims to assess the support of nutritional allowance on treatment compliance among retreatment tuberculosis patients in Nepal. This is a secondary analysis of data from HMIS (Health Management Information System) to investigate treatment compliance among tuberculosis patients and its association with nutritional allowance. The study population consisted of all individuals (N=2972) who had received services from July 16, 2021, to December 14, 2022. The SPSS 21version was used to conduct descriptive and bivariate analysis. Out of the total TB patients (n=2972), a third-fourth (65.9%) of TB patients were male. More than one-tenth (12.3%) of respondents received a nutrition support allowance. The TB treatment compliance rate was more (89.91%) in the nutrition support allowance group compared to the non-nutritional support group (87.98%). TB patients who received the nutritional support allowance were nearly twice as likely to have a higher TB treatment compliance rate compared to those who did not receive the nutritional support allowance. Providing nutritional allowance support to tuberculosis (TB) patients can play a significant role in improving treatment compliance and outcomes. Age and the type of TB are important factors that have shown statistical significance in relation to treatment compliance. Therefore, it is recommended to provide nutritional allowance support to both new and retreatment TB patients. To enhance treatment compliance among TB patients, it is beneficial to provide timely nutrition allowances and arrange home visits by TB focal persons.Keywords: nutrition, support, treatment compliance, TB, Nepal
Procedia PDF Downloads 1453033 Effect of Nutrition Education on the Control and Function of Insulin-Dependent Diabetes Patients
Authors: Rahil Sahragard, Mahmoud Hatami, Rostam Bahadori Khalili
Abstract:
Diabetes is one of the most important health problems in the world and a chronic disease requiring continuous care and therefore, it is necessary for patients to undergo self-care and nutrition education. This study was conducted to evaluate the effect of nutrition education on the metabolic control of diabetic patients in Tehran in 2015. An experimental study was conducted on 100 patients who had previously been approved by a specialist physician for diabetes and at least one year after their onset. At first, patients without any knowledge of the educational program were selected as sample and from them a checklist containing demographic and specific information about diabetes was filled and were taken three fasting blood glucose and three times fasting blood glucose (5 p.m.) Then, the patients received face-to-face training in the same conditions for 2 weeks in a Mehregan hospital of Tehran, and received 3 months of training, while they were fully monitored and during this time, samples that had a cold or blood pressure-related disease or were admitted to the hospital were excluded from the study. After the end of the study, the checklist was filled again and 3 fasting blood glucose and 3 fasting blood glucose samples were taken, the results were statistically analyzed by MC Nemar's statistical test. The research findings were performed on 100 patients 41.7% male and 58.3% women, the range of age was between 22 and 60 years old, with a duration of diabetes ranging from 1 to 15 years. Abnormal fasting blood glucose from 95% to 48.3% (P <0.0001) and non-fasting blood glucose decreased from 91.6% to 71.2% (P <0.001). Research has shown that training on blood glucose control has been successful, therefore, it is recommended that more research is done in the field of education to help patients with diabetes more comfortable.Keywords: nutrition education, diabetes, function, insulin, chronic, metabolic control
Procedia PDF Downloads 1443032 Enhancing Healthcare Data Protection and Security
Authors: Joseph Udofia, Isaac Olufadewa
Abstract:
Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.Keywords: cloud security, healthcare, cybersecurity, policy and standard
Procedia PDF Downloads 953031 Impact of the COVID-19 Pandemic on the Maternal, Newborn, Child Health and Nutrition Indicators in Miagao, Iloilo and Sibunag, Guimaras, Philippines
Authors: Franco Miguel Nodado, Adrienne Marie Bugayong Janagap, Allen Claire Arances, Kirsten Anne Gerez, Frances Catherine Rosario, Charise Alvyne Samaniego, Matt Andrew Secular, Rommel Gestuveo, Marilyn Sumayo, Joseph Arbizo, Philip Ian Padilla
Abstract:
COVID-19 pandemic adversely affected the delivery of health care services, but its impacts on Maternal, Newborn, Child Health and Nutrition (MNCHN) programs in rural municipalities in the Philippines remains understudied. Thus, this study explored the effects of the pandemic on MNCHN indicators in the municipalities of Miagao, Iloilo and Sibunag, Guimaras. A cross-sectional design was employed to compare the MNCHN indicators before and during the pandemic, and between Miagao and Sibunag. Key informant interviews (KII) were performed to identify the factors affecting access to MNCHN programs. During the pandemic, Miagao had a significant increase in positive outcomes of eight out of ten maternal health indicators, while Sibunag showed a significant decrease in six indicators. For child health and nutrition, Miagao obtained significant improvements in five of seven indicators, while Sibunag showed a significant increase in positive outcomes for six. KII data showed that the primary concern of mothers in Miagao is accessibility, while mothers in Sibunag raised concerns on accessibility, availability, and affordability of these MNCHN services. Miagao MHO employed various strategies such as telemedicine, activation of barangay health workers, and decentralization of health services to Barangay Health Centers, which can explain the improvements in MNCHN indicators. Sibunag also decentralized its health services, but its limited resources might have led them to prioritize child health and nutrition services. The findings suggest that the impacts of the COVID-19 pandemic on MNCHN depend on local health measures employed by the municipality, while telemedicine is a very useful tool in mitigating the negative effects of disrupted health services.Keywords: maternal, child, COVID-19, Miagao, Sibunag, nutrition
Procedia PDF Downloads 1913030 The Role of Community Gardens in Urban Food Security: A Case Study of the Thulubukele Community Farm in Newlands West
Authors: Nadine Ponnusamy
Abstract:
Reducing risks to food security resulting from climate change is recognized as one of the major challenges of the 21st century. The risks to food security have intensified, primarily due to globalization, a growing population, rapid urbanization, and the constantly evolving urban environment. One of the key challenges facing cities is the need to supply sufficient food to households amid increasing demand, which necessitates a continuous effort to enhance food production. Given the severity of climate change, it is imperative to adopt solutions to address food insecurity. Communities and individuals must explore sustainable livelihood options that do not harm the environment. Urban agriculture represents one of the many strategies that can be employed to improve household food security. The objective of this research is to establish the extent to which community gardens can enhance urban food security, focusing on the Thulubukele Community Farm in Newlands West, Durban. The researcher utilized a qualitative case study approach to gain insight into urban agriculture and food security within this context, while also examining the long-term impacts on food security and community development. The sampling method utilized for selecting participants and gathering information included purposive sampling. Since the study centers on urban agriculture, key stakeholders were specifically targeted. Participants were selected for interviews based on their involvement in the food garden. In-depth interviews were conducted to collect and analyze data. Secondary data from the literature facilitated a comparative analysis of similar case studies through precedent studies. This study demonstrates that growing food not only improves the nutritional value of the produce but also enhances household food security, enables individuals to generate disposable income, and facilitates significant contributions to the local community and other organizations in need.Keywords: community gardens, food security, South Africa, urban agriculture
Procedia PDF Downloads 203029 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications
Authors: Chieh-Fu Chang, Wan-Hsin Hsieh
Abstract:
We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.Keywords: security, IWE, cliff effect, space communications
Procedia PDF Downloads 4303028 The Impact of Technology on Food Science and Nutrition
Authors: Amera Karam Khalifa Robil
Abstract:
In numerous countries, traditional food habits play significant role in constructing of cutting-edge food habits. Suitable nutrients in children are also encouraged with the aid of determines meals behavior. The goal of observe is to survey the position of figure’s food behavior to shape of nutrition deeds in youngsters below 7 years in Tehran - Iran. The look at is a Descriptive examine. The members were 19 youngsters beneath 7 years with their mothers from a kindergarten inside the central Tehran. The sampling method turned into random sampling. The data changed into accrued by means of meals habits questionnaires and implementation of consultation meetings with the mothers. The information evaluation become qualitative analysis. The findings show that seventy-nine% children and their dad and mom have eaten enough and range breakfast, but food selections of youngsters have been trusted meals picks of mother and father. within the different meals, most of the people of youngsters enjoyed to devour dinner (58%), due to the fact the extra families may want to eat dinner collectively. according to mother opinions, the youngsters enjoy eating macaroni, chook, fried potatoes, chips and fruit juices. The researchers argue that mother’s function is unavoidable in the food alternatives amongst children. thankfully, the outcomes consider that youngsters generally tend to drink easy milk (79%). furthermore, their mother and father lead them to chocolate milk consumption (forty-two%) in place of other flavored milk. subsequently, despite popular perception declare that moms influence on vitamins conduct of youngsters, but they’re having a look at argues that the fathers have extra results on kids’ s nutrients behaviors. In conclusion, evidently the general trainings about selling healthful nutrients behavior for dad and mom via mass media can enhance vitamins behavior and behaviors of pre-college kids.Keywords: nutrition, public health, SA Harvest, foodfood habits, parents, nutrition behaviours, children, promoting nutrition
Procedia PDF Downloads 163027 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income
Authors: M. Koray Cetin, Mehmet Mert
Abstract:
The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.Keywords: exchange rate, panel data analysis, security, tourism revenues
Procedia PDF Downloads 3553026 Ensuring Cyber Security Using Kippo Honeypots
Authors: S. Vivekananda Pandian
Abstract:
A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.Keywords: attackers, security, Kippo Honeypots, virtual machine
Procedia PDF Downloads 4283025 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 1193024 Countering Terrorism and Defending Human Right after 9/11: The European Perspective
Authors: Anita Blagojević
Abstract:
It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights
Procedia PDF Downloads 3823023 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 923022 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment
Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu
Abstract:
Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization
Procedia PDF Downloads 464