Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6123

Search results for: food security and nutrition

5583 KUCERIA: A Media to Increase Students’ Reading Interest and Nutrition Knowledge

Authors: Luthfia A. Eka, Bertri M. Masita, G. Indah Lestari, Rizka. Ryanindya, Anindita D. Nur, Asih. Setiarini

Abstract:

The preferred habit nowadays is to watch television or listen to the radio rather than reading a newspaper or magazine. The low interest in reading is the reason to the Indonesian government passed a regulation to foster interest in reading early in schoolchildren through literacy programs. Literacy programs are held for the first 10 - 15 minutes before classes begin and children are asked to read books other than textbooks such as storybooks or magazines. In addition, elementary school children have a tendency to buy less healthy snacks around the school and do not know the nutrition fact from the food purchased. Whereas snacks contribute greatly in the fulfillment of energy and nutrients of children every day. The purpose of this study was to increase reading interest as well as knowledge of nutrition and health for elementary school students. This study used quantitative method with experimental study design for four months with twice intervention per week and deepened by qualitative method in the form of interview. The participants were 130 students consisting of 3rd and 4th graders in selected elementary school in Depok City. The Interventions given using KUCERIA (Child Storybook) which were storybooks with pictures consisting of 12 series about nutrition and health given at school literacy hours. There were five questions given by using the crossword method to find out the students' understanding of the story content in each series. To maximize the understanding and absorption of information, two students were asked to retell the story in front of the class and one student to fill the crossword on the board for each series. In addition, interviews were conducted by asking questions about students' interest in reading books. Intervention involved not only students but also teachers and parents in order to optimize students' reading habits. Analysis showed > 80% of student could answer 3 of 5 questions correctly in each series, which showed they had an interest in what they read. Research data on nutrition and health knowledge were analyzed using Wilcoxon and Chi-Square Test to see the relationship. However, only 46% of students completed 12 series and the rest lost to follow up due to school schedule incompatibility with the program. The results showed that there was a significant increase of knowledge (p = 0.000) between before intervention with 66,53 score and after intervention with 81,47 score. Retention of knowledge was conducted one month after the last intervention was administered and the analysis result showed no significant decrease of knowledge (p = 0,000) from 79,17 score to 75,48 score. There is also no relationship between sex and class with knowledge. Hence, an increased interest in reading of elementary school students and nutritional knowledge interventions using KUCERIA was proved successful. These interventions may be replicated in other schools or learning communities.

Keywords: literation, reading interest, nutrition knowledge, school children

Procedia PDF Downloads 136
5582 Applications of AI, Machine Learning, and Deep Learning in Cyber Security

Authors: Hailyie Tekleselase

Abstract:

Deep learning is increasingly used as a building block of security systems. However, neural networks are hard to interpret and typically solid to the practitioner. This paper presents a detail survey of computing methods in cyber security, and analyzes the prospects of enhancing the cyber security capabilities by suggests that of accelerating the intelligence of the security systems. There are many AI-based applications used in industrial scenarios such as Internet of Things (IoT), smart grids, and edge computing. Machine learning technologies require a training process which introduces the protection problems in the training data and algorithms. We present machine learning techniques currently applied to the detection of intrusion, malware, and spam. Our conclusions are based on an extensive review of the literature as well as on experiments performed on real enterprise systems and network traffic. We conclude that problems can be solved successfully only when methods of artificial intelligence are being used besides human experts or operators.

Keywords: artificial intelligence, machine learning, deep learning, cyber security, big data

Procedia PDF Downloads 109
5581 Participatory Approach: A Tool for Improving Food Security and Empowering a Local Community in Chitima, Mozambique

Authors: Matias Hargreaves, Martin Del Valle, Diego Rodriguez, Riveros Jose Luis

Abstract:

Trough years, all kind of social development projects have tried to solve social problems such as hunger, poverty, malnutrition, food insecurity, among others, with poor success. Both private and state initiatives have invested resources in several countries and communities. Nevertheless, most of these initiatives are scientific or external developers-centered, with a lack of local participation. This compromises the sustainability of any intervention and also leads to a poor empowerment of local community. The participatory approach aims to rescue and enhance the local knowledge since it recognizes that this kind of problems are better known by native actors. The objective of the study was to describe the role played by the community empowerment on food security improvement in the NGO “O Viveiro” (15°43'37.77"S; 32°46'27.53"E) and Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. A center for training in goat livestock and orchard was build. A community orchard was co-constructed between foreign technicians and local actors. The prototype was installed in February, 2016 by the technician team and local community with 16 m2 as a nursery garden. Two orchard workshops were conducted in order to design a sustainable productive model which mixes both local and technological approaches. Two goat meat workshops were conducted in order to describe local methods and train the community to conduce their own techniques with high sanitary and productive standards. Technician team stayed in Mozambique until May, 2016. The quorum for the orchard workshops was 20 and 14 persons respectively, which represents 100% and 70%of the total requested quorum (20). For the goat meat workshops were 4 and 5 persons, which representa80% and 100% of the total requested quorum (5). Until August, 2016, the orchard is 3.219 m2 and it grows several vegetables as beans, chili pepper, garlic, onion, tomatoes, lettuce, sweet potato, yuca potato, cabbage, eggplant, papaya trees, mango, and cassava. The process of increasing in size and diversification of vegetables grown was led entirely by the local community. In connection with this, the local community started to harvest and began to sell the vegetable products at the local market. At the meat goat workshops, local participants rescued a local knowledge by describing and practicing a traditional way to process goat meat by drying it outdoors and then doing a smoked treatment. This information might contribute to describe the level of empowerment of this community, and thus give evidence of acceptance of foreign intervention for improving their own proceedings and traditions.

Keywords: children malnutrition, food security, Local community, participatory approach

Procedia PDF Downloads 258
5580 A CM-Based Model for 802.11 Networks Security Policies Enforcement

Authors: Karl Mabiala Dondia, Jing Ma

Abstract:

In recent years, networks based on the 802.11 standards have gained a prolific deployment. The reason for this massive acceptance of the technology by both home users and corporations is assuredly due to the "plug-and-play" nature of the technology and the mobility. The lack of physical containment due to inherent nature of the wireless medium makes maintenance very challenging from a security standpoint. This study examines via continuous monitoring various predictable threats that 802.11 networks can face, how they are executed, where each attack may be executed and how to effectively defend against them. The key goal is to identify the key components of an effective wireless security policy.

Keywords: wireless LAN, IEEE 802.11 standards, continuous monitoring, security policy

Procedia PDF Downloads 360
5579 Global Peace and Security: The Role of International Peace and Security Organizations and the Need for Institutional and Operational Reforms

Authors: Saint C. Nguedjip

Abstract:

This paper is an analytical review a set of 20 literatures as required by the assignment prompt. The review centers on global peace and security. What role do international organizations play in global peace and security? The review centers around three main points. First, I examine global peace and security impacts on global governance. Secondly, it highlights the role traditional international community and security organizations such as the United Nations (UN), the North Atlantic Treaty Organization (NATO), and others play in providing the globe with peace and collective security. Third, it suggests a way forward as those institutions seek betterment and improvement. The review begins by defining some concepts and addressing the ambivalent meaning of peace and war. Scholars and researchers have conducted extensive research on the importance of international organizations. Yet, there is still a lot to consider if betterment and improvement are on the agenda. The review will shed light on the failures and challenges that these organizations. Those challenges are continuously undermining peacebuilding and peacekeeping actions of a great number among those institutions created with an ultimate mission of keeping the world order organized and coordinated for peace and security regardless of differences, cultures, and backgrounds. Women face violence on a daily basis, while racism and discrimination cause klm; ]]];inflammations worldwide. The chaotic situation in Ukraine is a wake-up call on scholarship and practitioners alike to come up with suggestions as well as recommendations that help mitigate insecurity while promoting peace and security, not only for Ukrainians but also for all countries facing wars and others issues. This paper will point the audience toward the right direction.

Keywords: security, peace, global governance, global peace and security, peacekeeping, international organizations, human rights, multilateralism, and unilateralism, gender, women

Procedia PDF Downloads 91
5578 Proactive WPA/WPA2 Security Using DD-WRT Firmware

Authors: Mustafa Kamoona, Mohamed El-Sharkawy

Abstract:

Although the latest Wireless Local Area Network technology Wi-Fi 802.11i standard addresses many of the security weaknesses of the antecedent Wired Equivalent Privacy (WEP) protocol, there are still scenarios where the network security are still vulnerable. The first security model that 802.11i offers is the Personal model which is very cheap and simple to install and maintain, yet it uses a Pre Shared Key (PSK) and thus has a low to medium security level. The second model that 802.11i provide is the Enterprise model which is highly secured but much more expensive and difficult to install/maintain and requires the installation and maintenance of an authentication server that will handle the authentication and key management for the wireless network. A central issue with the personal model is that the PSK needs to be shared with all the devices that are connected to the specific Wi-Fi network. This pre-shared key, unless changed regularly, can be cracked using offline dictionary attacks within a matter of hours. The key is burdensome to change in all the connected devices manually unless there is some kind of algorithm that coordinate this PSK update. The key idea of this paper is to propose a new algorithm that proactively and effectively coordinates the pre-shared key generation, management, and distribution in the cheap WPA/WPA2 personal security model using only a DD-WRT router.

Keywords: Wi-Fi, WPS, TLS, DD-WRT

Procedia PDF Downloads 216
5577 System Productivity Enhancement by Inclusion of Mungbean in Potato-Jute -T. Aman Rice Cropping Pattern

Authors: Apurba Kanti Chowdhury, Taslima Zahan

Abstract:

The inclusion of mungbean in a cropping pattern not only increases the cropping intensity but also enriches soil health as well as ensures nutrition for the fast-growing population of Bangladesh. A study was conducted in the farmers’ field during 2013-14 and 2014-15 to observe the performance of four-crop based improve cropping pattern Potato-Mungbean-Jute -t.aman rice against the existing cropping pattern Potato-Jute -t.aman rice at Domar, Nilphamari followed by randomized complete block design with three replications. Two years study revealed that inclusion of mungbean and better management practices in improved cropping pattern provided higher economic benefit over the existing pattern by 73.1%. Moreover, the average yield of potato increased in the improved pattern by 64.3% compared to the existing pattern; however yield of jute and t.aman rice in improved pattern declined by 5.6% and 10.7% than the existing pattern, respectively. Nevertheless, the additional yield of mungbean in the improved pattern helped to increase rice equivalent yield of the whole pattern by 38.7% over the existing pattern. Thus, the addition of mungbean in the existing pattern Potato-Jute -t.aman rice seems to be profitable for the farmers and also might be sustainable if the market channel of mungbean developed.

Keywords: crop diversity, food nutrition, production efficiency, yield improvement

Procedia PDF Downloads 173
5576 Ethnic Food Consumption: Experiencing Consumer Animosity and Racism on the Front

Authors: Rana Muhammad Ayyub, Muhammad Bilal, Tahir Mahmood

Abstract:

In multicultural societies, food preferences are taking dimensions in both minorities as well as majority ethnic groups. The food consumption behavior of minority ethnic groups has been studied adequately; however, this paper intends to study the consumer behavioral dimensions of majority ethnic groups regarding Halal foods (a minority-related food) in the USA. In this quantitative study, the online questionnaire survey (n=223) was collected through surveymonkey.com from non-Muslims living in various cities in the USA through random sampling. The theory of consumer animosity was a theoretical underpinning. The validated scales were adopted and adapted for all constructs. AMOS 24 was used to apply structural equation modelling (SEM) to the data. Among the majority of ethnic groups, it was found that consumer racism (β= -25) and consumer animosity (β= - 27) negatively affect intention to choose Halal foods, whereas food neophobia has a positive effect (β=36) on this intention. This study will prove instrumental in removing the blame of “Marketing Myopia” from marketing academics and will highlight the importance of prevalent market realities for one of the fastest growing ethnic food markets, i.e., Halal of the world. It has practical implications for Halal food marketers in particular and other ethnic food marketers in general.

Keywords: consumer racism, animosity, Halal foods, ethnic consumption, food neophobia

Procedia PDF Downloads 82
5575 Rethinking Military Aid to Civil Authorities for Internal Security Operations: A Sustainable Solution to Rebuilding Civil Military Relations in Nigeria

Authors: Emmanuela Ngozi Maduka

Abstract:

In Nigeria, civil-military relations is at its lowest point as a result of the challenges emanating from incessant initiation of military aid to civil authorities (MACA) for internal security operations. This paper is concerned with the question whether it is appropriate for the military to handle internal security crisis with exception to terrorism and armed militia. It analyses the legal framework for MACA in internal security operations which appear to be in contradiction with military tactical and equipment training. The paper argues that the expectation that transitional re-training of the military for internal security operations will reconcile these inconsistencies specifically on the issue of use of force is not practicable and will always pose challenges for both the military and the citizens. Accordingly, this paper adopts a socio-legal methodology for better clarity on the interactions between the legal framework on MACA and military internal security operations. The paper also identifies the lack of effective and proficient paramilitary within the security design of Nigeria as the key issue which results in incessant initiation of MACA and advocates for the establishment of an effective and proficient paramilitary to effectively handle internal security crisis within Nigeria.

Keywords: civil-military relations, MACA, military training, operational challenges, paramilitary, use of force

Procedia PDF Downloads 122
5574 Agroforestry Systems: A Sustainable Strategy of the Agricultural Systems of Cumaral (Meta), Colombia

Authors: Amanda Silva Parra, Dayra Yisel García Ramirez

Abstract:

In developing countries, agricultural "modernization" has led to a loss of biodiversity and inefficiency of agricultural systems, manifested in increases in Greenhouse Gas Emissions (GHG) and the C footprint, generating the susceptibility of systems agriculture to environmental problems, loss of biodiversity, depletion of natural resources, soil degradation and loss of nutrients, and a decrease in the supply of products that affect food security for peoples and nations. Each year agriculture emits 10 to 12% (5.1 to 6.1 Gt CO2eq per year) of the total estimated GHG emissions (51 Gt CO2 eq per year). The FAO recommends that countries that have not yet done so consider declaring sustainable agriculture as an essential or strategic activity of public interest within the framework of green economies to better face global climate change. The objective of this research was to estimate the balance of GHG in agricultural systems of Cumaral, Meta (Colombia), to contribute to the recovery and sustainable operation of agricultural systems that guarantee food security and face changes generated by the climate in a more intelligent way. To determine the GHG balances, the IPCC methodologies were applied with a Tier 1 and 2 level of use. It was estimated that all the silvopastoral systems evaluated play an important role in this reconversion compared to conventional systems such as improved pastures. and degraded pastures due to their ability to capture C both in soil and in biomass, generating positive GHG balances, guaranteeing greater sustainability of soil and air resources.

Keywords: climate change, carbon capture, environmental sustainability, GHG mitigation, silvopastoral systems

Procedia PDF Downloads 99
5573 Incidence of Listeria monocytogenes in Ready-To-Eat Food Sold in Johannesburg, South Africa

Authors: Hattie Hope Makumbe, Bhekisisa Dlamini, Frederick Tabit

Abstract:

Listeria monocytogenes is one of the most important foodborne pathogens associated with ready-to-eat (RTE) food. This study investigated the incidence of Listeria monocytogenes in 80 RTE food sold in the formal (dairy and processed meat) and informal markets (vegetable salads, beef stew, and rice) of Johannesburg, South Africa. High Enterobacteriaceae, S. aureus, and E. coli counts were obtained, which ranged from 1.9-7.5 log CFU/g. Listeria monocytogenes microbial counts in the food samples ranged from 3.5-6.0 log colony forming unit per gram except in cooked rice. The Listeria monocytogenes isolates were identified using biochemical tests and confirmed with the Biolog identification system and PCR analyses. The percentage incidence for Listeria monocytogenes in ready to eat food was 12.5%. When Minimum Inhibitory Concentrations were under consideration, all disinfectants were effective against Listeria monocytogenes strains. For antimicrobial work, rates of resistance amongst the antibiotics ranged from 17-100%. Therefore, more effective preventive control strategies for Listeria monocytogenes are needed to reduce the prevalence of the pathogen in RTE food that is sold in Johannesburg.

Keywords: Listeria monocytogenes, Listeria species, ready to eat food, sanitiser efficacy

Procedia PDF Downloads 148
5572 Development of an Online Raw-Vegan Eating Program to Reduce Sugar Intake

Authors: Sara D. Garduno-Diaz, Lorena Loriato

Abstract:

Food selection is one of the main modifiable risk factors for the avoidance of several detrimental health conditions. Excessive and regular sugar intake has been identified as highly unfavorable, yet a highly occurring practice. A proposed approach to modify this eating practice is the online program developed here. The program targets a modification of mindset and lifestyle habits around food, through a four week raw-vegan guided eating program. While the focus of the program is to set up sustainable changes in sugar intake reduction, it also aims to promote a plant-based eating style. Three pilot sessions have been run with participants from seven different countries. Participants are guided through the program via a combination of daily e-mails, a 24-hour support platform, and by-weekly remote live sessions. Meal preparation techniques, as well as cooking instructions, are provided, following set menus developed by a team of professional chefs and nutritionists. Goal setting, as well as alternatives to specific food-related challenges, is addressed. While the program is intended for both women and men, the majority of participants to date have been female. Feedback has been positive, with changes in eating habits have included an elimination of added sugars, an increase in home cooking and vegetable intake, and a reduction in foods of animal origin. Difficulties in following the program have been reported as unavailability of certain ingredients depending on the country of residence of the participants, social and cultural hurdles, and time restrictions. Nevertheless, the results obtained to date indicate this to be a highly interactive program with the potential to be scaled up and applied to various populations as a public health measure on the way to better health.

Keywords: eating habits, food addiction, nutrition education, plant-based, remote practice

Procedia PDF Downloads 95
5571 Corresponding Effect of Mycorhizal fungi and Pistachio on Absorption of Nutrition and Resistance on Salinity in Pistacia vera, L.

Authors: Hamid Mohammadi, S. H. Eftekhar Afzali

Abstract:

The irregular usage of chemical fertilizer cause different types of water and soil pollution and problems in health of human in past decades and organic fertilizer has been considered more and more. Mycorrhizal fungi have symbiosis with plant families and significantly effect on plant growth. Proper management of these symbiosis causes to reduce the usage of chemical fertilizers and absorb nutrition especially phosphor. Pistacia vera is endemic in Iran and is one of the most important products for this country. Considering special circumstances of pistachio orchards according to increasing salinity of water and soil and mismanagement of fertilizer reveals the necessity of the usage of Mycorrhizal fungi in these orchards.

Keywords: pistachio, mycorhiza, nutrition, salinity

Procedia PDF Downloads 477
5570 Traditional Practices and Indigenous Knowledge for Sustainable Food Waste Reduction: A Lesson from Africa

Authors: Gabriel Sunday Ayayia

Abstract:

Food waste has reached alarming levels worldwide, contributing to food insecurity, resource depletion, and environmental degradation. While numerous strategies exist to mitigate this issue, the role of traditional practices and indigenous knowledge remains underexplored. There is a need to investigate how these age-old practices can contribute to sustainable food waste reduction, particularly in the African context. This study explores the potential of traditional practices and indigenous knowledge in Africa to address this challenge sustainably. The study examines traditional African food management practices and indigenous knowledge related to food preservation and utilization; assess the impact of traditional practices on reducing food waste and its broader implications for sustainable development, and identify key factors influencing the continued use and effectiveness of traditional practices in contemporary African societies. Thus, the study argues that traditional practices and indigenous knowledge in Africa offer valuable insights and strategies for sustainable food waste reduction that can be adapted and integrated into global initiatives This research will employ a mixed-methods approach, combining qualitative and quantitative research techniques. Data collection will involve in-depth interviews, surveys, and participant observations in selected African communities. Moreover, a comprehensive review of literature on traditional food management practices and their impact on food waste reduction will be conducted. The significance of this study lies in its potential to bridge the gap between traditional knowledge and modern sustainability efforts. By uncovering the value of traditional practices in reducing food waste, this research can inform policies, interventions, and awareness campaigns aimed at achieving sustainable food systems worldwide.

Keywords: traditional practices, indigenous knowledge, food waste reduction, sustainability

Procedia PDF Downloads 52
5569 Capacity Building in Dietary Monitoring and Public Health Nutrition in the Eastern Mediterranean Region

Authors: Marisol Warthon-Medina, Jenny Plumb, Ayoub Aljawaldeh, Mark Roe, Ailsa Welch, Maria Glibetic, Paul M. Finglas

Abstract:

Similar to Western Countries, the Eastern Mediterranean Region (EMR) also presents major public health issues associated with the increased consumption of sugar, fat, and salt. Therefore, one of the policies of the World Health Organization’s (WHO) EMR is to reduce the intake of salt, sugar, and fat (Saturated fatty acids, trans fatty acids) to address the risk of non-communicable diseases (i.e. diabetes, cardiovascular disease, cancer) and obesity. The project objective is to assess status and provide training and capacity development in the use of improved standardized methodologies for updated food composition data, dietary intake methods, use of suitable biomarkers of nutritional value and determine health outcomes in low and middle-income countries (LMIC). Training exchanges have been developed with clusters of countries created resulting from regional needs including Sudan, Egypt and Jordan; Tunisia, Morocco, and Mauritania; and other Middle Eastern countries. This capacity building will lead to the development and sustainability of up-to-date national and regional food composition databases in LMIC for use in dietary monitoring assessment in food and nutrient intakes. Workshops were organized to provide training and capacity development in the use of improved standardized methodologies for food composition and food intake. Training needs identified and short-term scientific missions organized for LMIC researchers including (1) training and knowledge exchange workshops, (2) short-term exchange of researchers, (3) development and application of protocols and (4) development of strategies to reduce sugar and fat intake. An initial training workshop, Morocco 2018 was attended by 25 participants from 10 EMR countries to review status and support development of regional food composition. 4 training exchanges are in progress. The use of improved standardized methodologies for food composition and dietary intake will produce robust measurements that will reinforce dietary monitoring and policy in LMIC. The capacity building from this project will lead to the development and sustainability of up-to-date national and regional food composition databases in EMR countries. Supported by the UK Medical Research Council, Global Challenges Research Fund, (MR/R019576/1), and the World Health Organization’s Eastern Mediterranean Region.

Keywords: dietary intake, food composition, low and middle-income countries, status.

Procedia PDF Downloads 141
5568 Inventory Optimization in Restaurant Supply Chain Outlets

Authors: Raja Kannusamy

Abstract:

The research focuses on reducing food waste in the restaurant industry. A study has been conducted on the chain of retail restaurant outlets. It has been observed that the food wastages are due to the inefficient inventory management systems practiced in the restaurant outlets. The major food items which are wasted more in quantity are being selected across the retail chain outlets. A moving average forecasting method has been applied for the selected food items so that their future demand could be predicted accurately and food wastage could be avoided. It has been found that the moving average prediction method helps in predicting forecasts accurately. The demand values obtained from the moving average method have been compared to the actual demand values and are found to be similar with minimum variations. The inventory optimization technique helps in reducing food wastage in restaurant supply chain outlets.

Keywords: food wastage, restaurant supply chain, inventory optimisation, demand forecasting

Procedia PDF Downloads 72
5567 The Role of Gender and Socio-Demographics Variables on Food Safety Perceptions of Lebanese University Students

Authors: Lara Hanna-Wakim, Carine El Sokhn

Abstract:

The perception of the consumer in food safety plays an important role in reducing the incidence of foodborne diseases. Studies show that young adults aged between 18 and 25 years are more prone to foodborne illnesses than adults because of their lack of food safety knowledge. The aim of this study was to measure the degree of university students' awareness in food safety, as well as to explore whether there is a relationship or not between the demographic characteristics of university students and their knowledge and practices. A valid questionnaire divided into three parts was distributed to 938 university students, aged between 18-25 years, living alone or with their parents, from different majors and years of study. The data collected was analyzed using the SPSS program. The total scores of the students surveyed were 47.95% on their food safety knowledge and 56.45% on their practices in the matter. The final score of the food safety perception of university students in both genders was 52.2%. Female students scored higher (63.14%) than male students (39.69%), and students majoring in health related fields (67.45%) scored higher than those majoring in areas not related to public health (49.21%). These results showed an overall low level of food safety perception of university students. Educational interventions are needed to improve their food safety knowledge and practices as they will be responsible for their own family one day.

Keywords: food safety, gender, perception, practices, knowledge, lebanese university students

Procedia PDF Downloads 454
5566 Voice Signal Processing and Coding in MATLAB Generating a Plasma Signal in a Tesla Coil for a Security System

Authors: Juan Jimenez, Erika Yambay, Dayana Pilco, Brayan Parra

Abstract:

This paper presents an investigation of voice signal processing and coding using MATLAB, with the objective of generating a plasma signal on a Tesla coil within a security system. The approach focuses on using advanced voice signal processing techniques to encode and modulate the audio signal, which is then amplified and applied to a Tesla coil. The result is the creation of a striking visual effect of voice-controlled plasma with specific applications in security systems. The article explores the technical aspects of voice signal processing, the generation of the plasma signal, and its relationship to security. The implications and creative potential of this technology are discussed, highlighting its relevance at the forefront of research in signal processing and visual effect generation in the field of security systems.

Keywords: voice signal processing, voice signal coding, MATLAB, plasma signal, Tesla coil, security system, visual effects, audiovisual interaction

Procedia PDF Downloads 72
5565 Exploring the Effect of Environmental Cues of Food Festival on Visitor Satisfaction

Authors: Tao Zhang

Abstract:

As the competition of all kinds of festival events becomes more and more fierce, more and more event organizers try to design a blended festivalscape by integrating multifaceted environmental cues in order to raise the service quality of festival events and then raise visitors’ satisfaction. As the main type of festival events, food festivals are popular in all over the world. The organizers’ of food festivals also try to mix food with multifaceted environmental cues (e.g., music, stage, light, dance) to design a blended festivalscape. However, until now little studies explore the environmental cues of food festivals and their relationship with visitors’ satisfaction. Therefore, the aim of this study is to ascertain the environmental cues of food festival and their relationship with visitors’ satisfaction by using the blended festivalscape theory. Using convenient sampling method, this study investigated 1,000 food festival visitors in Macau. Factor analysis showed there are mainly six environmental cues (i.e., food, atmosphere, program, staff, facility, and information). All six environmental cues are positively related with visitors’ satisfaction, while the most influential factors are food, atmosphere, and program. This study showed that festival event organizers’ should focus on the topic of their festival event, build festival atmosphere, and create interesting programs in order to design a blended festivalscape and then raise visitors’ satisfaction.

Keywords: environmental cue, event, festival, satisfaction

Procedia PDF Downloads 346
5564 Enhancing Internet of Things Security: A Blockchain-Based Approach for Preventing Spoofing Attacks

Authors: Salha Abdullah Ali Al-Shamrani, Maha Muhammad Dhaher Aljuhani, Eman Ali Ahmed Aldhaheri

Abstract:

With the proliferation of Internet of Things (IoT) devices in various industries, there has been a concurrent rise in security vulnerabilities, particularly spoofing attacks. This study explores the potential of blockchain technology in enhancing the security of IoT systems and mitigating these attacks. Blockchain's decentralized and immutable ledger offers significant promise for improving data integrity, transaction transparency, and tamper-proofing. This research develops and implements a blockchain-based IoT architecture and a reference network to simulate real-world scenarios and evaluate a blockchain-integrated intrusion detection system. Performance measures including time delay, security, and resource utilization are used to assess the system's effectiveness, comparing it to conventional IoT networks without blockchain. The results provide valuable insights into the practicality and efficacy of employing blockchain as a security mechanism, shedding light on the trade-offs between speed and security in blockchain deployment for IoT. The study concludes that despite minor increases in time consumption, the security benefits of incorporating blockchain technology into IoT systems outweigh potential drawbacks, demonstrating a significant potential for blockchain in bolstering IoT security.

Keywords: internet of things, spoofing, IoT, access control, blockchain, raspberry pi

Procedia PDF Downloads 47
5563 Logistic and Its Importance in Turkish Food Sector and an Analysis of the Logistics Sector in Turkey

Authors: Şule Turhan, Özlem Turan

Abstract:

Permanence in the international markets for many global companies is about being known as having effective logistics which targets customer satisfaction management and lower costs. Under competitive conditions, the necessity of providing the products to customers quickly and on time for the companies which constantly aim to improve their profitability increased the strategic importance of the logistics concept. Food logistic is one of the most difficult areas in logistics. In the process from manufacturer to final consumer, quality and hygiene standards must be provided constantly. In food logistics, reliable and extensive service network has great importance and on time delivery is the target. Developing logistics industry provide the supply of foods in the country and the development of export markets more quickly and has an important role in providing added value to the country's economy. Turkey that creates a bridge between the east and the west is an attractive market for logistics companies. In this study, by examining both the place and the importance of logistics in Turkish food sector, recommendations will be made for the food industry.

Keywords: logistics, Turkish food industry, competition, food industry

Procedia PDF Downloads 352
5562 The Impact of Nutrition Education Intervention in Improving the Nutritional Status of Sickle Cell Patients

Authors: Lindy Adoma Dampare, Marina Aferiba Tandoh

Abstract:

Sickle cell disease (SCD) is an inherited blood disorder that mostly affects individuals in sub-Saharan Africa. Nutritional deficiencies have been well established in SCD patients. In Ghana, studies have revealed the prevalence of malnutrition, especially amongst children with SCD and hence the need to develop an evidence-based comprehensive nutritional therapy for SCD to improve their nutritional status. The aim of the study was to develop and assess the effect of a nutrition education material on the nutritional status of SCD patients in Ghana. This was a pre-post interventional study. Patients between the ages of 2 to 60 years were recruited from the Tema General Hospital. Following a baseline nutrition knowledge (NK), beliefs, sanitary practice and dietary consumption pattern assessment, a twice-monthly nutrition education was carried out for 3 months, followed by a post-intervention assessment. Nutritional status of SCD patients was assessed using a 3-days dietary recall and anthropometric measurements. Nutrition education (NE) was given to SCD adults and caregivers of SCD children. Majority of the caregivers (69%) and SCD adult (82%) at baseline had low NK. The level of NK improved significantly in SCD adults (4.18±1.83 vs. 10.00±1.00, p<0.001) and caregivers (5.58 ± 2.25 vs.10.44± 0.846, p<0.001) after NE. Increase in NK improved dietary intake and dietary consumption pattern of SCD patients. Significant increase in weight (23.2±11.6 vs. 25.9±12.1, p=0.036) and height (118.5±21.9 vs. 123.5±22.2, p=0.011) was observed in SCD children at post intervention. Stunting (10.5% vs. 8.6%, p=0.62) and wasting (22.1% vs. 14.4%, p=0.30) reduced in SCD children after NE although not statistically significant. Reduction (18.2% vs. 9.1%) in underweight and an increase (18.2% vs. 27.3%) in overweight SCD adults was recorded at post intervention. Fat mass remained the same while high muscle mass increased (18.2% vs. 27.3%) at post intervention in SCD adult. Anaemic status of SCD patients improved at post intervention and the improvement was statistically significant amongst SCD children. Nutrition education improved the NK of SCD caregivers and adults hence, improving the dietary consumption pattern and nutrient intake of SCD patients. Overall, NE improved the nutritional status of SCD patients. This study shows the potential of nutrition education in improving the nutritional knowledge, dietary consumption pattern, dietary intake and nutritional status of SCD patients, and should be further explored.

Keywords: sickle cell disease, nutrition education, dietary intake, nutritional status

Procedia PDF Downloads 78
5561 Classification of Attacks Over Cloud Environment

Authors: Karim Abouelmehdi, Loubna Dali, Elmoutaoukkil Abdelmajid, Hoda Elsayed, Eladnani Fatiha, Benihssane Abderahim

Abstract:

The security of cloud services is the concern of cloud service providers. In this paper, we will mention different classifications of cloud attacks referred by specialized organizations. Each agency has its classification of well-defined properties. The purpose is to present a high-level classification of current research in cloud computing security. This classification is organized around attack strategies and corresponding defenses.

Keywords: cloud computing, classification, risk, security

Procedia PDF Downloads 526
5560 Security Model for RFID Systems

Authors: John Ayoade

Abstract:

Radio Frequency Identification (RFID) has gained a lot of popularity in all walks of life due to its usefulness and diverse use of the technology in almost every application. However, there have been some security concerns most especially in regards to how authentic readers and tags can confirm their authenticity before confidential data is exchanged between them. In this paper, Kerberos protocol is adopted for the mutual authentication of RFID system components in order to ensure the secure communication between those components and to realize the authenticity of the communicating components.

Keywords: RFID, security, mutual authentication, Kerberos

Procedia PDF Downloads 447
5559 Stressors Faced by Border Security Officers: The Singapore Experience

Authors: Jansen Ang, Andrew Neo, Dawn Chia

Abstract:

Border Security is unlike mainstream policing in that officers are essentially in static deployment, working round the clock every day and every hour of the year looking for illegitimate entry of persons and goods. In Singapore, Border Security officers perform multiple functions to ensure the nation’s safety and security. They are responsible for safeguarding the borders of Singapore to prevent threats from entering the country. Being the first line of defence in ensuring the nation’s border security officers are entrusted with the responsibility of screening travellers inbound and outbound of Singapore daily. They examined 99 million arrivals and departures at the various checkpoints in 2014, which is a considerable volume compared to most immigration agencies. The officers’ work scopes also include cargo clearance, protective and security functions of checkpoints. The officers work in very demanding environment which can range from the smog at the land checkpoints to the harshness of the ports at the sea checkpoints. In addition, all immigration checkpoints are located at the boundaries, posing commuting challenges for officers. At the land checkpoints, festive seasons and school breaks are peak periods as given the surge of inbound and outbound travellers at the various checkpoints. Such work provides unique challenges in comparison to other law enforcement duties. This paper assesses the current stressors faced by officers of a border security agency through the conduct of ground observations as well as a perceived stress survey as well as recommendations in combating stressors faced by border security officers. The findings from the field observations and surveys indicate organisational and operational stressors that are unique to border security and recommends interventions in managing these stressors. Understanding these stressors would better inform border security agencies on the interventions needed to enhance the resilience of border security officers.

Keywords: border security, Singapore, stress, operations

Procedia PDF Downloads 309
5558 Addressing Food Grain Losses in India: Energy Trade-Offs and Nutrition Synergies

Authors: Matthew F. Gibson, Narasimha D. Rao, Raphael B. Slade, Joana Portugal Pereira, Joeri Rogelj

Abstract:

Globally, India’s population is among the most severely impacted by nutrient deficiency, yet millions of tonnes of food are lost before reaching consumers. Across food groups, grains represent the largest share of daily calories and overall losses by mass in India. If current losses remain unresolved and follow projected population rates, we estimate, by 2030, losses from grains for human consumption could increase by 1.3-1.8 million tonnes (Mt) per year against current levels of ~10 Mt per year. This study quantifies energy input to minimise storage losses across India, responsible for a quarter of grain supply chain losses. In doing so, we identify and explore a Sustainable Development Goal (SDG) triplet between SDG₂, SDG₇, and SDG₁₂ and provide insight for development of joined up agriculture and health policy in the country. Analyzing rice, wheat, maize, bajra, and sorghum, we quantify one route to reduce losses in supply chains, by modelling the energy input to maintain favorable climatic conditions in modern silo storage. We quantify key nutrients (calories, protein, zinc, iron, vitamin A) contained within these losses and calculate roughly how much deficiency in these dietary components could be reduced if grain losses were eliminated. Our modelling indicates, with appropriate uncertainty, maize has the highest energy input intensity for storage, at 110 kWh per tonne of grain (kWh/t), and wheat the lowest (72 kWh/t). This energy trade-off represents 8%-16% of the energy input required in grain production. We estimate if grain losses across the supply chain were saved and targeted to India’s nutritionally deficient population, average protein deficiency could reduce by 46%, calorie by 27%, zinc by 26%, and iron by 11%. This study offers insight for development of Indian agriculture, food, and health policy by first quantifying and then presenting benefits and trade-offs of tackling food grain losses.

Keywords: energy, food loss, grain storage, hunger, India, sustainable development goal, SDG

Procedia PDF Downloads 115
5557 The Effects of Food Matrix and Different Excipient Foods on β-Carotene Bioaccessibility in Carrots

Authors: Birgul Hizlar, Sibel Karakaya

Abstract:

Nowadays, consumers are more and more aware of the benefits beyond basic nutrition provided by food and food compounds. Between these, carotenoids have been demonstrated to exhibit multiple health benefits (for example, some types of cancer, cardiovascular diseases, eye disorders, among others). However, carotenoid bioaccessibility and bioavailability is generally rather low due to their specific localization in plant tissue and lipophilic nature. This situation is worldwide issue, since both developed and developing countries have their interest and benefits in increasing the uptake of carotenoids from the human diet. Recently, a new class of foods designed to improve the bioaccessibility/bioavailability of orally administered bioactive compounds is introduced: excipient foods. Excipient foods are specially designed foods which are prepared depending on the physicochemical properties of target bioactive compounds and increasing the bioavailability or bioaccessibility of bioactive compound. In this study, effects of food matrix (greating, boiling and mashing) and different excipient foods (olive oil, lemon juice, whey curd and dried artichoke leaf powder) on bioaccessibility of β-carotene in carrot were investigated by means of simulating in vitro gastrointestinal (GI) digestion. β-carotene contents of grated, boiled and mashed (after boiling process) carrots were 79.28, 147.63 and 151.19 μg/g respectively. No significant differences among boiled and mashed samples indicated that mashing process had no effect on the release of β-carotene from the food matrix (p > 0.05). On the contrary, mashing causes significant increase in the β-carotene bioaccessibility (p < 0.05). The highest β-carotene content was found in the mashed carrots incorporated with olive oil and lemon juice (C2). However, no significant differences between that sample and C1 (mashed carrot with lemon juice, olive oil, dried artichoke leaf powder), C3 (mashed carrot with addition of olive oil, lemon juice, whey curd) and). Similarly, the highest β-carotene bioaccessibility (50.26%) was found mashed C3 sample (p < 0.05). The increase in the bioaccessibility was approximately 5 fold and 50 fold when compared to grated and mashed samples containing olive oil, lemon juice and whey curd. The results demonstrate that both, food matrix and excipient foods, are able to increase the bioaccessibility of β-carotene.

Keywords: bioaccessibility, carotenoids, carrot, β-carotene

Procedia PDF Downloads 364
5556 Programming Systems in Implementation of Process Safety at Chemical Process Industry

Authors: Maryam Shayan

Abstract:

Programming frameworks have been utilized as a part of chemical industry process safety operation and configuration to enhance its effectiveness. This paper gives a brief survey and investigation of the best in class and effects of programming frameworks in process security. A study was completed by talking staff accountable for procedure wellbeing practices in the Iranian chemical process industry and diving into writing of innovation for procedure security. This article investigates the useful and operational attributes of programming frameworks for security and endeavors to sort the product as indicated by its level of effect in the administration chain of importance. The study adds to better comprehension of the parts of Information Communication Technology in procedure security, the future patterns and conceivable gaps for innovative work.

Keywords: programming frameworks, chemical industry process, process security, administration chain, information communication technology

Procedia PDF Downloads 355
5555 Mobile Agent Security Using Reference Monitor Based Security Framework

Authors: Sandhya Armoogum

Abstract:

In distributed systems and in open systems such as the Internet, often mobile code has to run on unknown and potentially hostile hosts. Mobile code such as a mobile agent is vulnerable when executing on remote hosts. The mobile agent may be subjected to various attacks such as tampering, inspection, and replay attack by a malicious host. Much research has been done to provide solutions for various security problems, such as authentication of mobile agent and hosts, integrity and confidentiality of the data carried by the mobile agent. Many of such proposed solutions in literature are not suitable for open systems whereby the mobile code arrives and executes on a host which is not known and trusted by the mobile agent owner. In this paper, we propose the adoption of the reference monitor by hosts in an open system for providing trust and security for mobile code execution. A secure protocol for the distribution of the reference monitor entity is described. This reference monitor entity on the remote host may also provide several security services such as authentication and integrity to the mobile code.

Keywords: security, mobile agents, reference monitor, trust

Procedia PDF Downloads 421
5554 Comprehensive Review of Ultralightweight Security Protocols

Authors: Prashansa Singh, Manjot Kaur, Rohit Bajaj

Abstract:

The proliferation of wireless sensor networks and Internet of Things (IoT) devices in the quickly changing digital landscape has highlighted the urgent need for strong security solutions that can handle these systems’ limited resources. A key solution to this problem is the emergence of ultralightweight security protocols, which provide strong security features while respecting the strict computational, energy, and memory constraints imposed on these kinds of devices. This in-depth analysis explores the field of ultralightweight security protocols, offering a thorough examination of their evolution, salient features, and the particular security issues they resolve. We carefully examine and contrast different protocols, pointing out their advantages and disadvantages as well as the compromises between resource limitations and security resilience. We also study these protocols’ application domains, including the Internet of Things, RFID systems, and wireless sensor networks, to name a few. In addition, the review highlights recent developments and advancements in the field, pointing out new trends and possible avenues for future research. This paper aims to be a useful resource for researchers, practitioners, and developers, guiding the design and implementation of safe, effective, and scalable systems in the Internet of Things era by providing a comprehensive overview of ultralightweight security protocols.

Keywords: wireless sensor network, machine-to-machine, MQTT broker, server, ultralightweight, TCP/IP

Procedia PDF Downloads 45