Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6165

Search results for: food security and nutrition

5565 A Review of Security Attacks and Intrusion Detection Schemes in Wireless Sensor Networks: A Survey

Authors: Maleh Yassine, Ezzati Abdellah

Abstract:

Wireless Sensor Networks (WSNs) are currently used in different industrial and consumer applications, such as earth monitoring, health related applications, natural disaster prevention, and many other areas. Security is one of the major aspects of wireless sensor networks due to the resource limitations of sensor nodes. However, these networks are facing several threats that affect their functioning and their life. In this paper we present security attacks in wireless sensor networks, and we focus on a review and analysis of the recent Intrusion Detection schemes in WSNs.

Keywords: wireless sensor networks, security attack, denial of service, IDS, cluster-based model, signature based IDS, hybrid IDS

Procedia PDF Downloads 370
5564 Probable Future Weapon to Turn down Malnutrition in Women and Adolescent Girls

Authors: Manali Chakraborty

Abstract:

In the developing countries the most prevalent pathological state is malnutrition and under nutrition due to deficiency of essential nutrients. This condition is more seen between the woman population, especially in the adolescent girls. It is causing childhood deaths along with others cognitive, degenerative diseases. Born of low weight babies and stillbirth are also major problems associated with the malnutrition. Along with the increased level of population, people not only should concern about their quantity of food but also for the quality of the food to be healthy. Lethargy, depression caused due to iron deficiency often quoted as normal or unimportant issues. Children of malnourished women are more likely associated with cognitive impairment, immune dysfunction leading to a higher risk of being attacked by diseases. Malnourishment also affects the productivity of women. Low social status, lack of proper nutritional education is an important cause of this nutrient deficiency among women. Iron deficiency and anemia are mostly famous nutritional deficiencies among women worldwide. Mostly women from below poverty lined area are anemic due to less consumption of iron-rich foods or having foods that might inhibit the iron absorption. Growing females like adolescents or lactating females need more iron supply. Less supplement causes iron deficiency. Though malaria also might cause anemia, it is more likely endemic one in some specific areas. Folate deficiency in females also may cause neurological defects in the infants. Other Vitamin B, A deficiencies along with low iodine level is also noted in malnourished women. According to tradition, still in some areas in developing countries females have their food at the end. According to some survey and collected data, these females are often into the risk zone of being malnourished. Regularly they have the very lesser amount, or food sometimes may start to lose its nutrients. Women are the one who maintains the responsibility to cook foods in the home. Lack of proper nutritional education and proper food preparation not only make those foods lose the nutrients leading to impairment in proper nutrient intake of the family members but also impairing own nutritional status. Formulation and development of food products from iron or other nutrient affluent sources viz., traditional herbs can be helpful in the prevention of such malnutrition condition in females. Keeping low cost and smooth maintenance of the food product development from the natural sources like pulses, cereals or other vegetation also can be beneficial to sustain socio-economic condition. Consumption of such kind of foodstuff is much healthier rather than taking continuous supplements like capsules. Utilization of proper scientific and cost-effective techniques for this food product development and their distribution among rural women population might be an enormous initiative.

Keywords: anemia, food supplements, malnutrition, rural places, women population

Procedia PDF Downloads 111
5563 NFC Communications with Mutual Authentication Based on Limited-Use Session Keys

Authors: Chalee Thammarat

Abstract:

Mobile phones are equipped with increased short-range communication functionality called Near Field Communication (or NFC for short). NFC needs no pairing between devices but suitable for little amounts of data in a very restricted area. A number of researchers presented authentication techniques for NFC communications, however, they still lack necessary authentication, particularly mutual authentication and security qualifications. This paper suggests a new authentication protocol for NFC communication that gives mutual authentication between devices. The mutual authentication is a one of property, of security that protects replay and man-in-the-middle (MitM) attack. The proposed protocols deploy a limited-use offline session key generation and use of distribution technique to increase security and make our protocol lightweight. There are four sub-protocols: NFCAuthv1 is suitable for identification and access control and NFCAuthv2 is suitable for the NFC-enhanced phone by a POS terminal for digital and physical goods and services.

Keywords: cryptographic protocols, NFC, near field communications, security protocols, mutual authentication, network security

Procedia PDF Downloads 421
5562 Heat: A Healthy Eating Programme

Authors: Osagbai Joshua Eriki, Ngozi Agunwamba, Alice Hill, Lorna Almond, Maniya Duffy, Devashini Naidoo, David Ho, Raman Deo

Abstract:

Aims: To evaluate the baseline eating pattern in a psychiatric hospital through quantifying purchases of food and drink items at the hospital shop and to implement a traffic light healthy eating labeling system. Method: A electronic till with reporting capabilities was purchased. A two-week period of baseline data collection was conducted. Thereafter, a system for labeling items based on the nutritional value of the food items at the hospital shop was implemented. Green labeling represented the items with the lowest calories and red the most. Further data was collated on the number and types of items purchased by patients according to the category, and the initial effectiveness of the system was evaluated. Result: Despite the implementation of the traffic light system, the red category had the highest number of items purchased by patients, highlighting the importance of promoting healthy eating choices. However, the study also showed that the system was effective in promoting healthy options, as the number of items purchased from the green category increased during the study period. Conclusion: The implementation of a traffic light labeling system for items sold at the hospital shop offers a promising approach to promoting healthy eating habits and choices. This is likely to contribute to a toolkit of measures when considering the multifactorial challenges that obesity and weight issues pose for long-stay psychiatric inpatients

Keywords: mental health, nutrition, food, healthy

Procedia PDF Downloads 89
5561 The Legal Personality of The Security Council

Authors: Helyeh Doutaghi

Abstract:

The United Nations Security Council (UNSC) is one of the six principal organs of the United Nations. Under the Charter of the United Nations (UN Charter), the UNSC’s primary responsibility is maintaining international peace and security, which it does through establishing and adopting a Security Council resolution. United Nations resolutions are formal expressions of the opinion or will of United Nations organs. However, there have been times when powerful politicians (or governments with great political power) had the first say in situations where the UNSC should have had jurisdiction based on the principle of rule of law, which is the notion that people are governed by the law rather than by officials. This paper will assess the effectiveness of the UNSC by analyzing its actions during the Iran-Iraq war for it has been found that one of the major reasons for the prolongation of the war was a result of the one-sided positions taken by the UNSC and many nations. The UNSC’s success in achieving its primary goal during the war will be discussed, including an examination of the duties and structure of the UNSC by reviewing the articles in the UN Charter; this will include examples of the UNSC’s role in other international disputes as well.

Keywords: UN Security Council, Iran, Iraq, charter, international law

Procedia PDF Downloads 445
5560 Bring Your Own Device Security Model in a Financial Institution of South Africa

Authors: Michael Nthabiseng Moeti, Makhulu Relebogile Langa, Joey Jansen van Vuuren

Abstract:

This paper examines the utilization of personal electronic devices like laptops, tablets, and smartphones for professional duties within a financial organization. This phenomenon is known as bring your own device (BYOD). BYOD accords employees the freedom to use their personal devices to access corporate resources from anywhere in the world with Internet access. BYOD arrangements introduce significant security risks for both organizations and users. These setups change the threat landscape for enterprises and demand unique security strategies, as conventional tools tailored for safeguarding managed devices fall short in adequately protecting enterprise assets without active user cooperation. This paper applies protection motivation theory (PMT) to highlight behavioral risks from BYOD users that may impact the security of financial institutions. Thematic analysis was applied to gain a comprehensive understanding of how users perceive this phenomenon. These findings demonstrates that the existence of a security policy does not ensure that all employees will take measures to protect their personal devices. Active promotion of BYOD security policies is crucial for financial institution employees and management. This paper developed a BYOD security model which is useful for understanding compliant behaviors. Given that BYOD security is becoming a major concern across financial sector, it is important. The paper recommends that future research could expand the number of universities from which data is collected.

Keywords: BYOD, information security, protection motivation theory, security risks, thematic analysis

Procedia PDF Downloads 14
5559 Association between Eating Behavior in Children Aged 7-10 Years Old and Their Mother’s Feeding Practice: A Study among the Families in Isfahan, Iran

Authors: Behnaz Farahani, Razieh Sotoudeh, Ali Vahdani, Hamed Abdi

Abstract:

Individual differences in eating behavior can cause underweight or overweight and obesity. Thus influencing factors on children’s eating behavior such as mothers’ feeding practices are needed to be more investigated. The goals of this survey are to evaluate the association of (i) parental pressure and children’s food avoidant tendency, (ii) parental restriction and children’s food approach tendency, (iii) modeling of healthy eating in front of children and their children’s eating behavior. 760 mothers of children aged 7-10 from schools in Isfahan were asked to complete questionnaires including Child Feeding Questionnaire, Children’s Eating Behavior Questionnaire, Modeling Questionnaire, and self-administered demographic questionnaire in which mothers reported their children’s height and weight as well. Of those mothers, 745 completed the questionnaires for the children’s index (mean age: 8.513±1.112) during the 2011-2012 school year. The results of this quantitative, descriptive, cross-sectional analysis indicated that “parental restriction” was positively associated with child food responsiveness (P,0.000) and food enjoyment (P,0.000) and surprisingly, it was positively associated with Food Fussiness(0.000) .Parental pressure to eat was positively associated with child satiety responsiveness (P,0.000), slowness (P,0.000), and fussiness (P,0.00) and negatively associated with Food responsiveness(p,0.000)and Enjoyment of food (p,0.002), modeling of healthy eating were positively associated with Enjoyment of food / q (p,0.000) and negatively with food fussiness (P,0.000). The results of this survey will improve interventions and maternal guidance on their feeding practices and their association with children’s eating behavior and weight.

Keywords: feeding practices, eating behavior, pressure to eat, restriction, modeling, satiety responsiveness, slowness in eating, food fussiness, food responsiveness, enjoyment of food

Procedia PDF Downloads 608
5558 Adult Education for Transformation and Security Challenges in Nigeria

Authors: Asmau Zarma Gogaram

Abstract:

The paper examines adult education and how it can be employed as a strategy for transformation and security challenges in Nigeria. It defines the meaning of adult education and its objectives.The issue of the necessity of employing adult education as a strategy for transformation and security challenges was also examined in the paper.In doing this it discussed the different types of adult education programmes, i.e.continuing education, literacy education, retirement and pre-retirement education and civic education. The paper concluded by stating that if the programmes stated are internalizes and applied they can help to raise awareness. Finally the paper proffered some recommendations one of which was that government should at all levels increase their efforts or promoting acquisition of adult education.

Keywords: adult education, transformation and security challenges, Nigeria, education and human development

Procedia PDF Downloads 502
5557 The Impact of Implementing European Quality Labeling System on the Supply Chain Performance of Food Industry: An Empirical Study of the Egyptian Traditional Food Sector

Authors: Nourhan A. Saad, Sara Elgazzar, Gehan Saleh

Abstract:

The food industry nowadays is becoming customer-oriented and needs faster response time to deal with food incidents. There is a deep need for good traceability systems to help the supply chain (SC) partners to minimize production and distribution of unsafe or poor quality products, which in turn will enhance the food SC performance. The current food labeling systems implemented in developing countries cannot guarantee that food is authentic, safe and of good quality. Therefore, the use of origin labels, mainly the geographical indications (GIs), allows SC partners to define quality standards and defend their products' reputation. According to our knowledge there are no studies discussed the use of GIs in developing countries. This research represents a research schema about the implementation of European quality labeling system in developing countries and its impact on enhancing SC performance. An empirical study was conducted on the Egyptian traditional food sector based on a sample of seven restaurants implementing the Med-diet labeling system. First, in-depth interviews were carried out to analyze the Egyptian traditional food SC. Then, a framework was developed to link the European quality labeling system and SC performance. Finally, a structured survey was conducted based on the applied framework to investigate the impact of Med-diet labeling system on the SC performance. The research provides an applied framework linking Med-diet quality labeling system to SC performance of traditional food sector in developing countries generally and especially in the Egyptian traditional food sector. The framework can be used as a SC performance management tool to increase the effectiveness and efficiency of food industry's SC performance.

Keywords: food supply chain, med-diet labeling system, quality labeling system, supply chain performance

Procedia PDF Downloads 291
5556 Encapsulation and Protection of Bioactive Nutrients Based on Ligand-Binding Property of Milk Proteins

Authors: Hao Cheng, Yingzhou Ni, Amr M. Bakry, Li Liang

Abstract:

Functional foods containing bioactive nutrients offer benefits beyond basic nutrition and hence the possibility of delaying and preventing chronic diseases. However, many bioactive nutrients degrade rapidly under food processing and storage conditions. Encapsulation can be used to overcome these limitations. Food proteins have been widely used as carrier materials for the preparation of nano/micro-particles because of their ability to form gels and emulsions and to interact with polysaccharides. The mechanisms of interaction between bioactive nutrients and proteins must be understood in order to develop protein-based lipid-free delivery systems. Beta-lactoglobulin, a small globular protein in milk whey, exhibits an affinity to a wide range of compounds. Alfa-tocopherol, resveratrol and folic acid were respectively bound to the central cavity, the outer surface near Trp19–Arg124 and the hydrophobic pocket in the groove between the alfa-helix and the beta-barrel of the protein. Beta-lactoglobulin could thus bind the three bioactive nutrients simultaneously to form protein-multi-ligand complexes. Beta-casein, an intrinsically unstructured but major milk protein, could also interact with resveratrol and folic acid to form complexes. These results suggest the potential to develop milk-protein-based complex carrier systems for encapsulation of multiple bioactive nutrients for functional food application and also pharmaceutical and medical uses.

Keywords: milk protein, bioactive nutrient, interaction, protection

Procedia PDF Downloads 400
5555 The Renewed Constitutional Roots of Agricultural Law in Hungary in Line with Sustainability

Authors: Gergely Horvath

Abstract:

The study analyzes the special provisions of the highest level of national agricultural legislation in the Fundamental Law of Hungary (25 April 2011) with descriptive, analytic and comparative methods. The agriculturally relevant articles of the constitution are very important, because –in spite of their high level of abstraction– they can determine and serve the practice comprehensively and effectively. That is why the objective of the research is to interpret the concrete sentences and phrases in connection with agriculture compared with the methods of some other relevant constitutions (historical-grammatical interpretation). The major findings of the study focus on searching for the appropriate provisions and approach capable of solving the problems of sustainable food production. The real challenge agricultural law must face with in the future is protecting or conserving its background and subjects: the environment, the ecosystem services and all the 'roots' of food production. In effect, agricultural law is the legal aspect of the production of 'our daily bread' from farm to table. However, it also must guarantee the safe daily food for our children and for all our descendants. In connection with sustainability, this unique, value-oriented constitution of an agrarian country even deals with uncustomary questions in this level of legislation like GMOs (by banning the production of genetically modified crops). The starting point is that the principle of public good (principium boni communis) must be the leading notion of the norm, which is an idea partly outside the law. The public interest is reflected by the agricultural law mainly in the concept of public health (in connection with food security) and the security of supply with healthy food. The construed Article P claims the general protection of our natural resources as a requirement. The enumeration of the specific natural resources 'which all form part of the common national heritage' also means the conservation of the grounds of sustainable agriculture. The reference of the arable land represents the subfield of law of the protection of land (and soil conservation), that of the water resources represents the subfield of water protection, the reference of forests and the biological diversity visualize the specialty of nature conservation, which is an essential support for agrobiodiversity. The mentioned protected objects constituting the nation's common heritage metonymically melt with their protective regimes, strengthening them and forming constitutional references of law. This regimes also mean the protection of the natural foundations of the life of the living and also the future generations, in the name of intra- and intergenerational equity.

Keywords: agricultural law, constitutional values, natural resources, sustainability

Procedia PDF Downloads 158
5554 Enhancing Security and Privacy Protocols in Telehealth: A Comprehensive Approach across IoT/Fog/Cloud Environments

Authors: Yunyong Guo, Man Wang, Bryan Guo, Nathan Guo

Abstract:

This paper introduces an advanced security and privacy model tailored for Telehealth systems, emphasizing end-to-end protection across IoT, Fog, and Cloud components. The proposed model integrates encryption, key management, intrusion detection, and privacy-preserving measures to safeguard patient data. A comprehensive simulation study evaluates the model's effectiveness in scenarios such as unauthorized access, physical breaches, and insider threats. Results indicate notable success in detecting and mitigating threats yet underscore areas for refinement. The study contributes insights into the intricate balance between security and usability in Telehealth environments, setting the stage for continued advancements.

Keywords: cloud, enhancing security, fog, IoT, telehealth

Procedia PDF Downloads 57
5553 Food Intake Pattern and Nutritional Status of Preschool Children of Chakma Ethnic Community

Authors: Md Monoarul Haque

Abstract:

Nutritional status is a sensitive indicator of community health and nutrition among preschool children, especially the prevalence of undernutrition that affects all dimensions of human development and leads to growth faltering in early life. The present study is an attempt to assess the food intake pattern and nutritional status of pre-school Chakma tribe children. It was a cross-sectional community based study. The subjects were selected purposively. This study was conducted at Savar Upazilla of Rangamati. Rangamati is located in the Chittagong Division. Anthropometric data height and weight of the study subjects were collected by standard techniques. Nutritional status was measured using Z score according WHO classification. χ2 test, independent t-test, Pearson’s correlation, multiple regression and logistic regression was performed as P<0.05 level of significance. Statistical analyses were performed by appropriate univariate and multivariate techniques using SPSS windows 11.5. Moderate (-3SD to <-2SD) to severe underweight (<-3SD) were 23.8% and 76.2% study subjects had normal weight for their age. Moderate (-3SD to <-2SD) to severe (<-3SD) stunted children were only 25.6% and 74.4% children were normal and moderate to severe wasting were 14.7% whereas normal child was 85.3%. Significant association had been found between child nutritional status and monthly family income, mother education and occupation of father and mother. Age, sex and incomes of the family, education of mother and occupation of father were significantly associated with WAZ and HAZ of the study subjects (P=0.0001, P=0.025, P=0.001 and P=0.0001, P=0.003, P=0.031, P=0.092, P=0.008). Maximum study subjects took local small fish and some traditional tribal food like bashrool, jhijhipoka and pork very much popular food among tribal children. Energy, carbohydrate and fat intake was significantly associated with HAZ, WAZ, BAZ and MUACZ. This study demonstrates that malnutrition among tribal children in Bangladesh is much better than national scenario in Bangladesh. Significant association was found between child nutritional status and family monthly income, mother education and occupation of father and mother. Most of the study subjects took local small fish and some traditional tribal food. Significant association was also found between child nutritional status and dietary intake of energy, carbohydrate and fat.

Keywords: food intake pattern, nutritional status, preschool children, Chakma ethnic community

Procedia PDF Downloads 492
5552 Papain Immobilized Polyurethane Film as an Antimicrobial Food Package

Authors: M. Cynthya, V. Prabhawathi, D. Mukesh

Abstract:

Food contamination occurs during post process handling. This leads to spoilage and growth of pathogenic microorganisms in the food, thereby reducing its shelf life or spreading of food borne diseases. Several methods are tried and one of which is use of antimicrobial packaging. Here, papain, a protease enzyme, is covalently immobilized with the help of glutarldehyde on polyurethane and used as a food wrap to protect food from microbial contamination. Covalent immobilization of papain was achieved at a pH of 7.4; temperature of 4°C; glutaraldehyde concentration of 0.5%; incubation time of 24 h; and 50 mg of papain. The formation of -C=N- observed in the Fourier transform infrared spectrum confirmed the immobilization of the enzyme on the polymer. Immobilized enzyme retained higher activity than the native free enzyme. The efficacy of this was studied by wrapping it over S. aureus contaminated cottage cheese (paneer) and cheese and stored at a temperature of 4°C for 7 days. The modified film reduced the bacterial contamination by eight folds when compared to the bare film. FTIR also indicates reduction in lipids, sugars and proteins in the biofilm.

Keywords: cheese, papain, polyurethane, Staphylococcus aureus

Procedia PDF Downloads 464
5551 Network User Rules in Universities

Authors: Michel Berthiaume, Daniel Chamberland-Tremblay, Elaine Paiva Mosconi, Jérôme Blanchet-Brisson

Abstract:

This presentation documents the overall failure of North-American universities to build an effective IT Policies communication with their primary users: the students. A sample of 12 universities was selected. A set of indicators based on usability principles to assess the content of IT Policies vas devised. Then, IT Policies were rated according to the indicators and the results analyzed to build an overall picture of the potential of communication problems in policy communication. The initial finding is that network security professionals in Universities have to reach a delicate balance between asset protection, asset valorization and user security awareness.

Keywords: computer security, IT policy, security awareness, network user rules

Procedia PDF Downloads 549
5550 Defense Strategy: Perang Semesta Strategy as a Reliable National Security System of Indonesia

Authors: Erdianta S, Chastiti M. Wulolo, IDK Kerta Widana

Abstract:

Perang Semesta strategy is a national security system used by Republic of Indonesia. It comes from local wisdom, cultural, and hereditary of Indonesia itself. This system involves all people and all nation resources, and it is early prepared by government and conducted totality, integratedly, directly, and continously to enforce a sovereignty of country, teritorial integrity and the safety of the whole nation from threats. This study uses a qualitative content analysis method by studying, recording, and analyzing government policy. The Perang Semesta strategy divided into main, backup, and supporting components. Every component has its function and responsibility in security perspective. So when an attack comes, all people of Indonesia will voluntary to defend the country. Perang Semesta strategy is a national security system which becomes the most reliable strategy toward geography and demography of Indonesia.

Keywords: Indonesia, Perang Semesta strategy, national security, local wisdom

Procedia PDF Downloads 438
5549 Nuclear Materials and Nuclear Security in India: A Brief Overview

Authors: Debalina Ghoshal

Abstract:

Nuclear security is the ‘prevention and detection of, and response to unauthorised removal, sabotage, unauthorised access, illegal transfer or other malicious acts involving nuclear or radiological material or their associated facilities.’ Ever since the end of Cold War, nuclear materials security has remained a concern for global security. However, with the increase in terrorist attacks not just in India especially, security of nuclear materials remains a priority. Therefore, India has made continued efforts to tighten its security on nuclear materials to prevent nuclear theft and radiological terrorism. Nuclear security is different from nuclear safety. Physical security is also a serious concern and India had been careful of the physical security of its nuclear materials. This is more so important since India is expanding its nuclear power capability to generate electricity for economic development. As India targets 60,000 MW of electricity production by 2030, it has a range of reactors to help it achieve its goal. These include indigenous Pressurised Heavy Water Reactors, now standardized at 700 MW per reactor Light Water Reactors, and the indigenous Fast Breeder Reactors that can generate more fuel for the future and enable the country to utilise its abundant thorium resource. Nuclear materials security can be enhanced through two important ways. One is through proliferation resistant technologies and diplomatic efforts to take non proliferation initiatives. The other is by developing technical means to prevent any leakage in nuclear materials in the hands of asymmetric organisations. New Delhi has already implemented IAEA Safeguards on their civilian nuclear installations. Moreover, the IAEA Additional Protocol has also been ratified by India in order to enhance its transparency of nuclear material and strengthen nuclear security. India is a party to the IAEA Conventions on Nuclear Safety and Security, and in particular the 1980 Convention on the Physical Protection of Nuclear Material and its amendment in 2005, Code of Conduct in Safety and Security of Radioactive Sources, 2006 which enables the country to provide for the highest international standards on nuclear and radiological safety and security. India's nuclear security approach is driven by five key components: Governance, Nuclear Security Practice and Culture, Institutions, Technology and International Cooperation. However, there is still scope for further improvements to strengthen nuclear materials and nuclear security. The NTI Report, ‘India’s improvement reflects its first contribution to the IAEA Nuclear Security Fund etc. in the future, India’s nuclear materials security conditions could be further improved by strengthening its laws and regulations for security and control of materials, particularly for control and accounting of materials, mitigating the insider threat, and for the physical security of materials during transport. India’s nuclear materials security conditions also remain adversely affected due to its continued increase in its quantities of nuclear material, and high levels of corruption among public officials.’ This paper would study briefly the progress made by India in nuclear and nuclear material security and the step ahead for India to further strengthen this.

Keywords: India, nuclear security, nuclear materials, non proliferation

Procedia PDF Downloads 338
5548 Relationship between Food Inflation and Agriculture Lending Rate in Ghana: A Vector Autoregressive Approach

Authors: Raymond K. Dziwornu

Abstract:

Lending rate of agriculture loan has persistently been high and attributed to risk in the sector. This study examined how food inflation and agriculture lending rate react to each other in Ghana using vector autoregressive approach. Quarterly data from 2006 to 2018 was obtained from the Bank of Ghana quarterly bulletin and the Ghana Statistical Service reports. The study found that a positive standard deviation shock to food inflation causes lending rate of agriculture loan to react negatively in the short run, but positively and steadily in the long run. This suggests the need to direct appropriate policy measures to reduce food inflation and consequently, the cost of credit to the agricultural sector for its growth.

Keywords: food inflation, agriculture, lending rate, vector autoregressive, Ghana

Procedia PDF Downloads 132
5547 Nutritionists' Perspective on the Conception of a Telenutrition Platform for Diabetes Care: Qualitative Study

Authors: Choumous Mannoubi, Dahlia Kairy, Brigitte Vachon

Abstract:

The use of technology allows clinicians to provide an individualized approach in a cost-effective manner and to reach a broader client base more easily. Such interventions can be effective in ensuring self-management and follow-up of people with diabetes, reducing the risk of complications by improving accessibility to care services, and better adherence to health recommendations. Consideration of users' opinions and fears to inform the design and implementation stages of these telehealth services seems to be essential to improve their acceptance and usability. The objective of this study is to describe the telepractice of nutritionists supporting the therapeutic management of diabetic patients and document the functional requirements of nutritionists for the design of a tele-nutrition platform. To best identify the requirements and constraints of nutritionists, we conducted individual semi-structured interviews with 10 nutritionists who offered tele-nutrition services. Using a qualitative design with a descriptive approach based on the Nutrition Care Process Model (mNCP) framework, we explored in depth the state of nutritionists' telepractice in public and private health care settings, as well as their requirements for teleconsultation. Qualitative analyses revealed that nutritionists primarily used telephone calls during the COVID 19 pandemic to provide teleconsultations. Nutritionists identified the following important features for the design of a tele-nutrition platform: it should support interprofessional collaboration, allow for the development and monitoring of a care plan, integrate with the existing IT environment, be easy to use, accommodate different levels of patient literacy, and allow for easy sharing of educational materials to support nutrition education.

Keywords: telehealth, nutrition, diabetes, telenutrition, teleconsultation, telemonitoring

Procedia PDF Downloads 116
5546 Foreign Artificial Intelligence Investments and National Security Exceptions in International Investment Law

Authors: Ying Zhu

Abstract:

Recent years have witnessed a boom of foreign investments in the field of artificial intelligence (AI). Foreign investments provide critical capital for AI development but also trigger national security concerns of host states. A notable example is an increasing number of cases in which the Committee on Foreign Investment in the United States (CFIUS) has denied Chinese acquisitions of US technology companies on national security grounds. On July 19, 2018, the Congress has reached a deal on the final draft of a new provision to strengthen CFIUS’s authority to review overseas transactions involving sensitive US technology. The question is: how to reconcile the emerging tension between, on the one hand, foreign AI investors’ expectations of a predictable investment environment, and on the other hand, host states’ regulatory power on national security? This paper provides a methodology to reconcile this tension under international investment law. Based on an examination, the national security exception clauses in international investment treaties and the application of national security justification in investor-state arbitration jurisprudence, the paper argues that a traditional interpretation of the national security exception, based on the necessity concept in customary international law, fails to take into account new risks faced by countries, including security concerns over strategic industries such as AI. To overcome this shortage, the paper proposes to incorporate an integrated national security clause in international investment treaties, which includes a two-tier test: a ‘self-judging’ test in the pre-establishment period and a ‘proportionality’ test in the post-establishment period. At the end, the paper drafts a model national security clause for future treaty-drafting practice.

Keywords: foreign investment, artificial intelligence, international investment law, national security exception

Procedia PDF Downloads 137
5545 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4

Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono

Abstract:

Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.

Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations

Procedia PDF Downloads 138
5544 Drivers for Relationship Building in the Supply Chain: The Case of Luxury Food

Authors: Kateryna Merkulova, Alessio Castello, Maria Kreuzer

Abstract:

This research investigates the drivers of long-term relationship building between customers and suppliers within the luxury food supply chain, a topic that remains largely unexplored in the current state of academic literature. This paper identifies for the first time the key elements that influence the formation and maintenance of effective supply chain relationships, which are crucial for navigating the complexities of the luxury food industry. In particular, it explores the critical role of trust in a business-to-business context, specifically emphasizing its significance in the luxury food supply chain. Empirically, this research is contextualized in the region of the French Riviera, which offers a gastronomic playground for food enthusiasts, making it ideally suited to explore the luxury food sector. Qualitative in-depth interviews with stakeholders along the luxury supply chain (i.e., suppliers, chefs, restaurant owners, and fine food shop managers) allow identifying key drivers of trustful business relationships. Triangulating different perspectives of stakeholders within the luxury supply chain adds validity and robustness to the findings. The findings have important theoretical and managerial implications for the effective functioning of long-term supplier-buyer relationships.

Keywords: luxury food, relationship building, B2B, supply chain, trust

Procedia PDF Downloads 37
5543 Sector-Wide Collaboration to Reduce Food Waste

Authors: Carolyn Cameron

Abstract:

Stop Food Waste Australia is working with the industry to co-design sector action plans to prevent and reduce food waste across the supply chain. We are a public-private partnership, funded in 2021 by the Australian national government under the 2017 National Food Waste Strategy. Our partnership has representatives from all levels of government, industry associations from farm to fork, and food rescue groups. Like many countries, Australia has adopted the Sustainable Development Goal (SDG) target of 12.3 to halve food waste by 2030. A seminal 2021 study, the National Food Waste Feasibility Report, developed a robust national baseline, illustrating hotspots in commodities and across the supply chain. This research found that the consumption stages – households, food service, and institutions - account for over half of all food waste, and 22% of food produced never leaves the farm gate. Importantly the study found it is feasible for Australia to meet SDG 12.3, but it will require unprecedented action by governments, industry, and the community. Sector Action Plans (Plan) are one of the four main initiatives of Stop Food Waste Australia, including a voluntary commitment, a coordinated food waste communications hub, and robust monitoring and reporting framework. These plans provide a systems-based approach to reducing food loss and waste while realising multiple benefits for supply chain partners and other collaborators. Each plan is being co-designed with the key stakeholders most able to directly control or influence the root cause(s) of food waste hotspots and to take action to reduce or eliminate food waste in their value chain.  The initiatives in the Plans are fit-for-purpose, reflecting current knowledge and recognising priorities may refocus over time. To date, sector action plans have been developed with the Food Rescue, Cold Chain, Bread and Bakery, and Dairy Sectors. Work is currently underway on Meat and Horticulture, and we are also developing supply-chain stage plans for food services and institutions. The study will provide an overview of Australia’s food waste baseline and challenges, the important role of sector action plans in reducing food waste, and case studies of implementation outcomes.

Keywords: co-design, horticulture, sector action plans, voluntary

Procedia PDF Downloads 117
5542 Silver Nanoparticle Application in Food Packaging and Impacts on Food Safety and Consumer’s Health

Authors: Worku Dejene Bekele, András Marczika Csilla Sörös

Abstract:

Silver nanoparticles are silver metal with a size of 1-100nm. The most common source of silver nanoparticles is inorganic salts. Nanoparticles can be ingested through our foods and constitute nanoparticles and silver ions, whether as an additive or by migrants and, in some cases, as a pollutant. Silver nanoparticles are the most widely applicable engineered nanomaterials, especially for antimicrobial function. Ag nanoparticles give different advantages in the case of food safety, quality, and overall acceptability; however, they affect the health of humans and animals, putting them at risk of health problems and environmental pollution. Silver nanoparticles have been used widely in food packaging technologies, especially in water treatments, meat and meat products, fruit, and many other food products. This is for bio-preservation from food products. The primary goal of this review is to determine the safety and health impact of Ag nanoparticles application in food packaging and analysis of the human organs more affected by this preservative technology, to assess the implications of a nanoparticle on food safety, to determine the effects of nanoparticles on consumers health and to determine the impact of nanotechnology on product acceptability. But currently, much research has demonstrated that there is cause to believe that silver nanoparticles may have toxicological effects on biological organs and systems. The silver nanoparticles affect DNA expression, gastrointestinal barriers, lungs, and other breathing organs illness. Silver particles and molecules are very toxic. During its application in food packaging, food industries used the thinnest particle. This particle can potentially affect the gastrointestinal tracts-it suffers from mucus production, DNA, lungs, and other breezing organs. This review is targeted to demonstrate the knowledge gap that industrials use in the application of silver nanoparticles in food packaging and preservation and its health effects on the consumer.

Keywords: food preservatives, health impact, nanoparticle, silver nanoparticle

Procedia PDF Downloads 51
5541 Efficient and Timely Mutual Authentication Scheme for RFID Systems

Authors: Hesham A. El Zouka, Mustafa M. Hosni ka

Abstract:

The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.

Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature

Procedia PDF Downloads 250
5540 Analysing Trends in Rice Cropping Intensity and Seasonality across the Philippines Using 14 Years of Moderate Resolution Remote Sensing Imagery

Authors: Bhogendra Mishra, Andy Nelson, Mirco Boschetti, Lorenzo Busetto, Alice Laborte

Abstract:

Rice is grown on over 100 million hectares in almost every country of Asia. It is the most important staple crop for food security and has high economic and cultural importance in Asian societies. The combination of genetic diversity and management options, coupled with the large geographic extent means that there is a large variation in seasonality (when it is grown) and cropping intensity (how often it is grown per year on the same plot of land), even over relatively small distances. Seasonality and intensity can and do change over time depending on climatic, environmental and economic factors. Detecting where and when these changes happen can provide information to better understand trends in regional and even global rice production. Remote sensing offers a unique opportunity to estimate these trends. We apply the recently published PhenoRice algorithm to 14 years of moderate resolution remote sensing (MODIS) data (utilizing 250m resolution 16 day composites from Terra and Aqua) to estimate seasonality and cropping intensity per year and changes over time. We compare the results to the surveyed data collected by International Rice Research Institute (IRRI). The study results in a unique and validated dataset on the extent and change of extent, the seasonality and change in seasonality and the cropping intensity and change in cropping intensity between 2003 and 2016 for the Philippines. Observed trends and their implications for food security and trade policies are also discussed.

Keywords: rice, cropping intensity, moderate resolution remote sensing (MODIS), phenology, seasonality

Procedia PDF Downloads 286
5539 Multi Attribute Failure Mode Analysis of the Catering Systems: A Case Study of Sefako Makgatho Health Sciences University in South Africa

Authors: Mokoena Oratilwe Penwell, Seeletse Solly Matshonisa

Abstract:

The demand for quality products is a vital factor determining the success of a producing company, and the reality of this demand influences customer satisfaction. In Sefako Makgatho Health Sciences University (SMU), concerns over the quality of food being sold have been raised by mostly students and staff who are primary consumers of food being sold by the cafeteria. Suspicions of food poisoning and the occurrence of diarrhea-related to food from the cafeteria, amongst others, have been raised. However, minimal measures have been taken to resolve the issue of food quality. New service providers have been appointed, and still, the same trends are being observed, the quality of food seems to depreciate continuously. This paper uses multi-attribute failure mode analysis (MAFMA) for failure detection and minimization on the machines used for food production by SMU catering company before being sold to both staff, and students so as to improve production plant reliability, and performance. Analytical Hierarchy Process (AHP) will be used for the severity ranking of the weight criterions and development of the hierarchical structure for the cafeteria company. Amongst other potential issues detected, maintenance of the machines and equipment used for food preparations was of concern. Also, the staff lacked sufficient hospitality skills, supervision, and management in the cafeteria needed greater attention to mitigate some of the failures occurring in the food production plant.

Keywords: MAFMA, food quality, maintenance, supervision

Procedia PDF Downloads 119
5538 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes

Authors: Petar Kurecic, Josipa Penic

Abstract:

The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.

Keywords: security, security measures in tourism, tourism, tourist destinations

Procedia PDF Downloads 274
5537 Food Insecurity Among Afghan Women Refugees in Pakistan

Authors: Farhana Nosheen, Maleeha Fatima

Abstract:

This study on Afghan refugee women living in Punjab, Pakistan, shows a strong relationship between poor socio-economic status and lower nutritional health status. Pakistan is one of the significant countries accepting refugees from the Afghan war. Universally, refugees are vulnerable to food security and basic life necessities. The in-hand study aimed to investigate food insecurity among afghan refugees who recently migrated to Pakistan. Purposive sampling technique was employed to collect the data from afghan women refugees settled in refugee camp settled in Capital city Islamabad, Pakistan. Data was collected through an interview tool. It revealed from data that the majority of women were underweight, about 74.7% in their reproductive years, which is an alarming situation for the forthcoming children and families. It is also shown that There’s a strong impact of their income level, education, dietary habits and food insecurity on their overall health status. It can also be observed in their Body Mass Index and in their physical appearance; they also show extremely poor levels of hemoglobin which is directly indicated anemic condition, especially iron deficiency anemia among the young Afghan refugee women. The illiteracy rate is about 93.33% among the selected participants as well as a majority of this population has 10-12 family size in comparison with their income level of about 10,000-15,000 Pakistani rupees per month, which can hardly meet their daily food expenditure. Adequate food is rarely accessible to young girls and women due to fewer national and international food aids program available in Pakistan. The majority have pale yellowish skin color (due to low iron content) along with clear white eyes (low hemoglobin level), thin hairs (protein deficiency) and spoon-shaped nails (a direct indicator of low iron level). Data showed a significant relation between appetite and BMI as their appetite is very low, which is directly indicated in their underweight body condition. About 56.67% of the participants had Urinary Tract Infections. The main causes included personal unhygienic conditions and lack of washrooms as well as drinking water facilities in their refugee camps. It is suggested that National and international food aid programs should cater to the nutritional demands of women refugees in the world to protect them from food insecurities as well as future researchers should find out better ways of analysis and treatment plans for such kind of communities who are highly prone to nutritional deficiencies and lack of basic supplies.

Keywords: food insecurity, refugees, women, vulnerable

Procedia PDF Downloads 90
5536 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes

Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi

Abstract:

Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.

Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing

Procedia PDF Downloads 291