Search results for: food security indicators
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7275

Search results for: food security indicators

6765 Impact of Different Ripening Accelerators on the Microbial Load and Proximate Composition of Plantain (Musa paradisiaca) and Banana (Musa sapientum), during the Ripening Process, and the Nutrition Implication for Food Security

Authors: Wisdom Robert Duruji, Oluwasegun Christopher Akinleye

Abstract:

This study reports on the impact of different ripening accelerators on the microbial load and proximate composition of plantain (Musa paradisiaca) and Banana (Musa sapientum) during the ripening process, and the nutrition implication for food security. The study comprised of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening accelerator was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating and enumerating their micro flora using pour plate method; and also, their proximate composition was determined using standard methods. The result indicated that the bacteria count of plantain increased from 3.25 ± 0.33 for unripe to 5.31 ± 0.30 log cfu/g for (treated) ripened, and that of banana increased from 3.69 ± 0.11 for unripe to 5.26 ± 0.21 log cfu/g for ripened. Also, the fungal count of plantain increased from 3.20 ± 0.16 for unripe to 4.88 ± 0.22 log sfu/g for ripened; and that of banana increased from 3.61 ± 0.19 for unripe to 5.43 ± 0.26 for ripened. Ripened plantain fingers without any ripening accelerator (control) had significantly (p < 0.05) higher values of crude protein 3.56 ± 0.06%, crude fat 0.42 ± 0.04%, total ash 2.74 ± 0.15 and carbohydrate 31.10 ± 0.20; but with significantly lower value of moisture 62.14 ± 0.07% when compared with treated plantain. The proximate composition trend of treated and banana fingers control is similar to that of treated and plantain control, except that higher moisture content of 75.11 ± 0.07% and lesser protein, crude fat, total ash and carbohydrate were obtained from treated and ripened banana control when the treatments were compared with that of plantain. The study concluded that plantain is more nutritious (mealy) than a banana; also, the ripening accelerators increased the microbial load and reduced the nutritional status of plantain and banana.

Keywords: food nutrition, calcium carbide, rvingia gabonensis, newbouldia laevis, plantain, banana

Procedia PDF Downloads 298
6764 Security Issues and Primary School Participation in Kenya

Authors: Rose Mwanza

Abstract:

This paper investigates security factors influencing primary school pupils’ school participation in Kenya. Schools, communities and the Government all have roles to play in enhancing primary school pupil’s school participation. The effective security system of a country provides the necessary avenues to facilitate improved health services protection of children and allows free movement of the country’s citizens which leads to a conducive atmosphere for school participation. Kenya is a signatory to international commitments and conventions related to security such as the National Policy on Peace Building and Conflict Management, United Nations Development Assistance Framework and Key Security Unity, which enable primary school pupils to participate in education. The paper also looks at the strategies the Government of Kenya has put in place to ensure effective pupil school participation.

Keywords: ethnicity, social media, participation in school, poverty, terrorism

Procedia PDF Downloads 48
6763 Survey on Data Security Issues Through Cloud Computing Amongst Sme’s in Nairobi County, Kenya

Authors: Masese Chuma Benard, Martin Onsiro Ronald

Abstract:

Businesses have been using cloud computing more frequently recently because they wish to take advantage of its advantages. However, employing cloud computing also introduces new security concerns, particularly with regard to data security, potential risks and weaknesses that could be exploited by attackers, and various tactics and strategies that could be used to lessen these risks. This study examines data security issues on cloud computing amongst sme’s in Nairobi county, Kenya. The study used the sample size of 48, the research approach was mixed methods, The findings show that data owner has no control over the cloud merchant's data management procedures, there is no way to ensure that data is handled legally. This implies that you will lose control over the data stored in the cloud. Data and information stored in the cloud may face a range of availability issues due to internet outages; this can represent a significant risk to data kept in shared clouds. Integrity, availability, and secrecy are all mentioned.

Keywords: data security, cloud computing, information, information security, small and medium-sized firms (SMEs)

Procedia PDF Downloads 65
6762 Maintaining User-Level Security in Short Message Service

Authors: T. Arudchelvam, W. W. E. N. Fernando

Abstract:

Mobile phone has become as an essential thing in our life. Therefore, security is the most important thing to be considered in mobile communication. Short message service is the cheapest way of communication via the mobile phones. Therefore, security is very important in the short message service as well. This paper presents a method to maintain the security at user level. Different types of encryption methods are used to implement the user level security in mobile phones. Caesar cipher, Rail Fence, Vigenere cipher and RSA are used as encryption methods in this work. Caesar cipher and the Rail Fence methods are enhanced and implemented. The beauty in this work is that the user can select the encryption method and the key. Therefore, by changing the encryption method and the key time to time, the user can ensure the security of messages. By this work, while users can safely send/receive messages, they can save their information from unauthorised and unwanted people in their own mobile phone as well.

Keywords: SMS, user level security, encryption, decryption, short message service, mobile communication

Procedia PDF Downloads 381
6761 Development of New Technology Evaluation Model by Using Patent Information and Customers' Review Data

Authors: Kisik Song, Kyuwoong Kim, Sungjoo Lee

Abstract:

Many global firms and corporations derive new technology and opportunity by identifying vacant technology from patent analysis. However, previous studies failed to focus on technologies that promised continuous growth in industrial fields. Most studies that derive new technology opportunities do not test practical effectiveness. Since previous studies depended on expert judgment, it became costly and time-consuming to evaluate new technologies based on patent analysis. Therefore, research suggests a quantitative and systematic approach to technology evaluation indicators by using patent data to and from customer communities. The first step involves collecting two types of data. The data is used to construct evaluation indicators and apply these indicators to the evaluation of new technologies. This type of data mining allows a new method of technology evaluation and better predictor of how new technologies are adopted.

Keywords: data mining, evaluating new technology, technology opportunity, patent analysis

Procedia PDF Downloads 352
6760 Comparing Performance Indicators among Mechanistic, Organic, and Bureaucratic Organizations

Authors: Benchamat Laksaniyanon, Padcharee Phasuk, Rungtawan Boonphanakan

Abstract:

With globalization, organizations had to adjust to an unstable environment in order to survive in a competitive arena. Typically within the field of management, different types of organizations include mechanistic, bureaucratic and organic ones. In fact, bureaucratic and mechanistic organizations have some characteristics in common. Bureaucracy is one type of Thailand organization which adapted from mechanistic concept to develop an organization that is suitable for the characteristic and culture of Thailand. The objective of this study is to compare the adjustment strategies of both organizations in order to find key performance indicators (KPI) suitable for improving organization in Thailand. The methodology employed is binary logistic regression. The results of this study will be valuable for developing future management strategies for both bureaucratic and mechanistic organizations.

Keywords: mechanistic, bureaucratic and organic organization, binary logistic regression, key performance indicators (KPI)

Procedia PDF Downloads 337
6759 Impact of the COVID-19 Pandemic on the Maternal, Newborn, Child Health and Nutrition Indicators in Miagao, Iloilo and Sibunag, Guimaras, Philippines

Authors: Franco Miguel Nodado, Adrienne Marie Bugayong Janagap, Allen Claire Arances, Kirsten Anne Gerez, Frances Catherine Rosario, Charise Alvyne Samaniego, Matt Andrew Secular, Rommel Gestuveo, Marilyn Sumayo, Joseph Arbizo, Philip Ian Padilla

Abstract:

COVID-19 pandemic adversely affected the delivery of health care services, but its impacts on Maternal, Newborn, Child Health and Nutrition (MNCHN) programs in rural municipalities in the Philippines remains understudied. Thus, this study explored the effects of the pandemic on MNCHN indicators in the municipalities of Miagao, Iloilo and Sibunag, Guimaras. A cross-sectional design was employed to compare the MNCHN indicators before and during the pandemic, and between Miagao and Sibunag. Key informant interviews (KII) were performed to identify the factors affecting access to MNCHN programs. During the pandemic, Miagao had a significant increase in positive outcomes of eight out of ten maternal health indicators, while Sibunag showed a significant decrease in six indicators. For child health and nutrition, Miagao obtained significant improvements in five of seven indicators, while Sibunag showed a significant increase in positive outcomes for six. KII data showed that the primary concern of mothers in Miagao is accessibility, while mothers in Sibunag raised concerns on accessibility, availability, and affordability of these MNCHN services. Miagao MHO employed various strategies such as telemedicine, activation of barangay health workers, and decentralization of health services to Barangay Health Centers, which can explain the improvements in MNCHN indicators. Sibunag also decentralized its health services, but its limited resources might have led them to prioritize child health and nutrition services. The findings suggest that the impacts of the COVID-19 pandemic on MNCHN depend on local health measures employed by the municipality, while telemedicine is a very useful tool in mitigating the negative effects of disrupted health services.

Keywords: maternal, child, COVID-19, Miagao, Sibunag, nutrition

Procedia PDF Downloads 161
6758 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 110
6757 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique

Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis

Abstract:

Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.

Keywords: children malnutrition, food security, Local community, participatory approach

Procedia PDF Downloads 258
6756 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 363
6755 Outcomes of Pain Management for Patients in Srinagarind Hospital: Acute Pain Indicator

Authors: Chalermsri Sorasit, Siriporn Mongkhonthawornchai, Darawan Augsornwan, Sudthanom Kamollirt

Abstract:

Background: Although knowledge of pain and pain management is improving, they are still inadequate to patients. The Nursing Division of Srinagarind Hospital is responsible for setting the pain management system, including work instruction development and pain management indicators. We have developed an information technology program for monitoring pain quality indicators, which was implemented to all nursing departments in April 2013. Objective: To study outcomes of acute pain management in process and outcome indicators. Method: This is a retrospective descriptive study. The sample population was patients who had acute pain 24-48 hours after receiving a procedure, while admitted to Srinagarind Hospital in 2014. Data were collected from the information technology program. 2709 patients with acute pain from 10 Nursing Departments were recruited in the study. The research tools in this study were 1) the demographic questionnaire 2) the pain management questionnaire for process indicators, and 3) the pain management questionnaire for outcome indicators. Data were analyzed and presented by percentages and means. Results: The process indicators show that nurses used pain assessment tool and recorded 99.19%. The pain reassessment after the intervention was 96.09%. The 80.15% of the patients received opioid for pain medication and the most frequency of non-pharmacological intervention used was positioning (76.72%). For the outcome indicators, nearly half of them (49.90%) had moderate–severe pain, mean scores of worst pain was 6.48 and overall pain was 4.08. Patient satisfaction level with pain management was good (49.17%) and very good (46.62%). Conclusion: Nurses used pain assessment tools and pain documents which met the goal of the pain management process. Patient satisfaction with pain management was at high level. However the patients had still moderate to severe pain. Nurses should adhere more strictly to the guidelines of pain management, by using acute pain guidelines especially when pain intensity is particularly moderate-high. Nurses should also develop and practice a non-pharmacological pain management program to continually improve the quality of pain management. The information technology program should have more details about non-pharmacological pain techniques.

Keywords: outcome, pain management, acute pain, Srinagarind Hospital

Procedia PDF Downloads 216
6754 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 91
6753 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 217
6752 Ethnic Food Consumption: Experiencing Consumer Animosity and Racism on the Front

Authors: Rana Muhammad Ayyub, Muhammad Bilal, Tahir Mahmood

Abstract:

In multicultural societies, food preferences are taking dimensions in both minorities as well as majority ethnic groups. The food consumption behavior of minority ethnic groups has been studied adequately; however, this paper intends to study the consumer behavioral dimensions of majority ethnic groups regarding Halal foods (a minority-related food) in the USA. In this quantitative study, the online questionnaire survey (n=223) was collected through surveymonkey.com from non-Muslims living in various cities in the USA through random sampling. The theory of consumer animosity was a theoretical underpinning. The validated scales were adopted and adapted for all constructs. AMOS 24 was used to apply structural equation modelling (SEM) to the data. Among the majority of ethnic groups, it was found that consumer racism (β= -25) and consumer animosity (β= - 27) negatively affect intention to choose Halal foods, whereas food neophobia has a positive effect (β=36) on this intention. This study will prove instrumental in removing the blame of “Marketing Myopia” from marketing academics and will highlight the importance of prevalent market realities for one of the fastest growing ethnic food markets, i.e., Halal of the world. It has practical implications for Halal food marketers in particular and other ethnic food marketers in general.

Keywords: consumer racism, animosity, Halal foods, ethnic consumption, food neophobia

Procedia PDF Downloads 84
6751 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 127
6750 Incidence of Listeria monocytogenes in Ready-To-Eat Food Sold in Johannesburg, South Africa

Authors: Hattie Hope Makumbe, Bhekisisa Dlamini, Frederick Tabit

Abstract:

Listeria monocytogenes is one of the most important foodborne pathogens associated with ready-to-eat (RTE) food. This study investigated the incidence of Listeria monocytogenes in 80 RTE food sold in the formal (dairy and processed meat) and informal markets (vegetable salads, beef stew, and rice) of Johannesburg, South Africa. High Enterobacteriaceae, S. aureus, and E. coli counts were obtained, which ranged from 1.9-7.5 log CFU/g. Listeria monocytogenes microbial counts in the food samples ranged from 3.5-6.0 log colony forming unit per gram except in cooked rice. The Listeria monocytogenes isolates were identified using biochemical tests and confirmed with the Biolog identification system and PCR analyses. The percentage incidence for Listeria monocytogenes in ready to eat food was 12.5%. When Minimum Inhibitory Concentrations were under consideration, all disinfectants were effective against Listeria monocytogenes strains. For antimicrobial work, rates of resistance amongst the antibiotics ranged from 17-100%. Therefore, more effective preventive control strategies for Listeria monocytogenes are needed to reduce the prevalence of the pathogen in RTE food that is sold in Johannesburg.

Keywords: Listeria monocytogenes, Listeria species, ready to eat food, sanitiser efficacy

Procedia PDF Downloads 149
6749 Agroforestry Systems: A Sustainable Strategy of the Agricultural Systems of Cumaral (Meta), Colombia

Authors: Amanda Silva Parra, Dayra Yisel García Ramirez

Abstract:

In developing countries, agricultural "modernization" has led to a loss of biodiversity and inefficiency of agricultural systems, manifested in increases in Greenhouse Gas Emissions (GHG) and the C footprint, generating the susceptibility of systems agriculture to environmental problems, loss of biodiversity, depletion of natural resources, soil degradation and loss of nutrients, and a decrease in the supply of products that affect food security for peoples and nations. Each year agriculture emits 10 to 12% (5.1 to 6.1 Gt CO2eq per year) of the total estimated GHG emissions (51 Gt CO2 eq per year). The FAO recommends that countries that have not yet done so consider declaring sustainable agriculture as an essential or strategic activity of public interest within the framework of green economies to better face global climate change. The objective of this research was to estimate the balance of GHG in agricultural systems of Cumaral, Meta (Colombia), to contribute to the recovery and sustainable operation of agricultural systems that guarantee food security and face changes generated by the climate in a more intelligent way. To determine the GHG balances, the IPCC methodologies were applied with a Tier 1 and 2 level of use. It was estimated that all the silvopastoral systems evaluated play an important role in this reconversion compared to conventional systems such as improved pastures. and degraded pastures due to their ability to capture C both in soil and in biomass, generating positive GHG balances, guaranteeing greater sustainability of soil and air resources.

Keywords: climate change, carbon capture, environmental sustainability, GHG mitigation, silvopastoral systems

Procedia PDF Downloads 100
6748 Traditional Practices and Indigenous Knowledge for Sustainable Food Waste Reduction: A Lesson from Africa

Authors: Gabriel Sunday Ayayia

Abstract:

Food waste has reached alarming levels worldwide, contributing to food insecurity, resource depletion, and environmental degradation. While numerous strategies exist to mitigate this issue, the role of traditional practices and indigenous knowledge remains underexplored. There is a need to investigate how these age-old practices can contribute to sustainable food waste reduction, particularly in the African context. This study explores the potential of traditional practices and indigenous knowledge in Africa to address this challenge sustainably. The study examines traditional African food management practices and indigenous knowledge related to food preservation and utilization; assess the impact of traditional practices on reducing food waste and its broader implications for sustainable development, and identify key factors influencing the continued use and effectiveness of traditional practices in contemporary African societies. Thus, the study argues that traditional practices and indigenous knowledge in Africa offer valuable insights and strategies for sustainable food waste reduction that can be adapted and integrated into global initiatives This research will employ a mixed-methods approach, combining qualitative and quantitative research techniques. Data collection will involve in-depth interviews, surveys, and participant observations in selected African communities. Moreover, a comprehensive review of literature on traditional food management practices and their impact on food waste reduction will be conducted. The significance of this study lies in its potential to bridge the gap between traditional knowledge and modern sustainability efforts. By uncovering the value of traditional practices in reducing food waste, this research can inform policies, interventions, and awareness campaigns aimed at achieving sustainable food systems worldwide.

Keywords: traditional practices, indigenous knowledge, food waste reduction, sustainability

Procedia PDF Downloads 53
6747 Inventory Optimization in Restaurant Supply Chain Outlets

Authors: Raja Kannusamy

Abstract:

The research focuses on reducing food waste in the restaurant industry. A study has been conducted on the chain of retail restaurant outlets. It has been observed that the food wastages are due to the inefficient inventory management systems practiced in the restaurant outlets. The major food items which are wasted more in quantity are being selected across the retail chain outlets. A moving average forecasting method has been applied for the selected food items so that their future demand could be predicted accurately and food wastage could be avoided. It has been found that the moving average prediction method helps in predicting forecasts accurately. The demand values obtained from the moving average method have been compared to the actual demand values and are found to be similar with minimum variations. The inventory optimization technique helps in reducing food wastage in restaurant supply chain outlets.

Keywords: food wastage, restaurant supply chain, inventory optimisation, demand forecasting

Procedia PDF Downloads 75
6746 The Role of Gender and Socio-Demographics Variables on Food Safety Perceptions of Lebanese University Students

Authors: Lara Hanna-Wakim, Carine El Sokhn

Abstract:

The perception of the consumer in food safety plays an important role in reducing the incidence of foodborne diseases. Studies show that young adults aged between 18 and 25 years are more prone to foodborne illnesses than adults because of their lack of food safety knowledge. The aim of this study was to measure the degree of university students' awareness in food safety, as well as to explore whether there is a relationship or not between the demographic characteristics of university students and their knowledge and practices. A valid questionnaire divided into three parts was distributed to 938 university students, aged between 18-25 years, living alone or with their parents, from different majors and years of study. The data collected was analyzed using the SPSS program. The total scores of the students surveyed were 47.95% on their food safety knowledge and 56.45% on their practices in the matter. The final score of the food safety perception of university students in both genders was 52.2%. Female students scored higher (63.14%) than male students (39.69%), and students majoring in health related fields (67.45%) scored higher than those majoring in areas not related to public health (49.21%). These results showed an overall low level of food safety perception of university students. Educational interventions are needed to improve their food safety knowledge and practices as they will be responsible for their own family one day.

Keywords: food safety, gender, perception, practices, knowledge, lebanese university students

Procedia PDF Downloads 456
6745 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System

Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra

Abstract:

This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.

Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction

Procedia PDF Downloads 72
6744 Exploring the Effect of Environmental Cues of Food Festival on Visitor Satisfaction

Authors: Tao Zhang

Abstract:

As the competition of all kinds of festival events becomes more and more fierce, more and more event organizers try to design a blended festivalscape by integrating multifaceted environmental cues in order to raise the service quality of festival events and then raise visitors’ satisfaction. As the main type of festival events, food festivals are popular in all over the world. The organizers’ of food festivals also try to mix food with multifaceted environmental cues (e.g., music, stage, light, dance) to design a blended festivalscape. However, until now little studies explore the environmental cues of food festivals and their relationship with visitors’ satisfaction. Therefore, the aim of this study is to ascertain the environmental cues of food festival and their relationship with visitors’ satisfaction by using the blended festivalscape theory. Using convenient sampling method, this study investigated 1,000 food festival visitors in Macau. Factor analysis showed there are mainly six environmental cues (i.e., food, atmosphere, program, staff, facility, and information). All six environmental cues are positively related with visitors’ satisfaction, while the most influential factors are food, atmosphere, and program. This study showed that festival event organizers’ should focus on the topic of their festival event, build festival atmosphere, and create interesting programs in order to design a blended festivalscape and then raise visitors’ satisfaction.

Keywords: environmental cue, event, festival, satisfaction

Procedia PDF Downloads 348
6743 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 51
6742 An Intelligence-Led Methodologly for Detecting Dark Actors in Human Trafficking Networks

Authors: Andrew D. Henshaw, James M. Austin

Abstract:

Introduction: Human trafficking is an increasingly serious transnational criminal enterprise and social security issue. Despite ongoing efforts to mitigate the phenomenon and a significant expansion of security scrutiny over past decades, it is not receding. This is true for many nations in Southeast Asia, widely recognized as the global hub for trafficked persons, including men, women, and children. Clearly, human trafficking is difficult to address because there are numerous drivers, causes, and motivators for it to persist, such as non-military and non-traditional security challenges, i.e., climate change, global warming displacement, and natural disasters. These make displaced persons and refugees particularly vulnerable. The issue is so large conservative estimates put a dollar value at around $150 billion-plus per year (Niethammer, 2020) spanning sexual slavery and exploitation, forced labor, construction, mining and in conflict roles, and forced marriages of girls and women. Coupled with corruption throughout military, police, and civil authorities around the world, and the active hands of powerful transnational criminal organizations, it is likely that such figures are grossly underestimated as human trafficking is misreported, under-detected, and deliberately obfuscated to protect those profiting from it. For example, the 2022 UN report on human trafficking shows a 56% reduction in convictions in that year alone (UNODC, 2022). Our Approach: To better understand this, our research utilizes a bespoke methodology. Applying a JAM (Juxtaposition Assessment Matrix), which we previously developed to detect flows of dark money around the globe (Henshaw, A & Austin, J, 2021), we now focus on the human trafficking paradigm. Indeed, utilizing a JAM methodology has identified key indicators of human trafficking not previously explored in depth. Being a set of structured analytical techniques that provide panoramic interpretations of the subject matter, this iteration of the JAM further incorporates behavioral and driver indicators, including the employment of Open-Source Artificial Intelligence (OS-AI) across multiple collection points. The extracted behavioral data was then applied to identify non-traditional indicators as they contribute to human trafficking. Furthermore, as the JAM OS-AI analyses data from the inverted position, i.e., the viewpoint of the traffickers, it examines the behavioral and physical traits required to succeed. This transposed examination of the requirements of success delivers potential leverage points for exploitation in the fight against human trafficking in a new and novel way. Findings: Our approach identified new innovative datasets that have previously been overlooked or, at best, undervalued. For example, the JAM OS-AI approach identified critical 'dark agent' lynchpins within human trafficking that are difficult to detect and harder to connect to actors and agents within a network. Our preliminary data suggests this is in part due to the fact that ‘dark agents’ in extant research have been difficult to detect and potentially much harder to directly connect to the actors and organizations in human trafficking networks. Our research demonstrates that using new investigative techniques such as OS-AI-aided JAM introduces a powerful toolset to increase understanding of human trafficking and transnational crime and illuminate networks that, to date, avoid global law enforcement scrutiny.

Keywords: human trafficking, open-source intelligence, transnational crime, human security, international human rights, intelligence analysis, JAM OS-AI, Dark Money

Procedia PDF Downloads 74
6741 Assessment on the Level of Development of Macedonia and Iran Organic Agriculture as Compared to Nigeria: A Review

Authors: Y. A. Sani., A. A. Yakubu., A. A. Jamilu., J. Omeke, I. J. Sambo

Abstract:

With the rising global threat of food security, cancer, and related diseases (carcinogenic) because of increased usage of inorganic substances in agricultural food production, the Ministry of Food Agriculture and Livestock of the Republic of Turkey organized an International Workshop on Organic Agriculture between 8–12th December 2014 at the International Agricultural Research and Training Center, Izmir. About 21 countries, including Nigeria, were invited to attend the training workshop. Several topics on organic agriculture were presented by renowned scholars, ranging from regulation, certification, crop, animal, seed production, pest and disease management, soil composting, and marketing of organic agricultural products, among others. This paper purposely selected two countries (Macedonia and Iran) out of the 21 countries to assess their level of development in terms of organic agriculture as compared to Nigeria. Macedonia, with a population of only 2.1 million people as of 2014, started organic agriculture in 2005 with only 266ha of land and has grown significantly to over 5,000ha in 2010, covering such crops as cereals (62%), forage (20%) fruit orchard (7%), vineyards (5%), vegetables (4%), oil seed and industrial crops (1%) each. Others are organic beekeeping from 110 hives to over 15,000 certified colonies. As part of government commitment, the level of government subsidy for organic products was 30% compared to the direct support for conventional agricultural products. About 19 by-laws were introduced on organic agricultural production that was fully consistent with European Union regulations. The republic of Iran, on the other hand, embarked on organic agriculture for the fact, that the country recorded the highest rate of cancer disease in the world, with over 30,000 people dying every year and 297 people diagnosed every day. However, the host country, Turkey, is well advanced in organic agricultural production and now being the largest exporter of organic products to Europe and other parts of the globe. A technical trip to one of the villages that are under the government scheme on organic agriculture reveals that organic agriculture was based on market-demand-driven and the support of the government was very visible, linking the farmers with private companies that provide inputs to them while the companies purchase the products at harvest with a high premium price. However, in Nigeria, research on organic agriculture was very recent, and there was very scanty information on organic agriculture due to poor documentation and very low awareness, even among the elites. The paper, therefore, recommends that the government should provide funds to NARIs to conduct research on organic agriculture and to establish clear government policy and good pre-conditions for sustainable organic agricultural production in the country.

Keywords: organic agriculture, food security, food safety, food nutrition

Procedia PDF Downloads 59
6740 Logistic and Its Importance in Turkish Food Sector and an Analysis of the Logistics Sector in Turkey

Authors: Şule Turhan, Özlem Turan

Abstract:

Permanence in the international markets for many global companies is about being known as having effective logistics which targets customer satisfaction management and lower costs. Under competitive conditions, the necessity of providing the products to customers quickly and on time for the companies which constantly aim to improve their profitability increased the strategic importance of the logistics concept. Food logistic is one of the most difficult areas in logistics. In the process from manufacturer to final consumer, quality and hygiene standards must be provided constantly. In food logistics, reliable and extensive service network has great importance and on time delivery is the target. Developing logistics industry provide the supply of foods in the country and the development of export markets more quickly and has an important role in providing added value to the country's economy. Turkey that creates a bridge between the east and the west is an attractive market for logistics companies. In this study, by examining both the place and the importance of logistics in Turkish food sector, recommendations will be made for the food industry.

Keywords: logistics, Turkish food industry, competition, food industry

Procedia PDF Downloads 352
6739 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 527
6738 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 448
6737 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 309
6736 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 357