Search results for: food security status
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8679

Search results for: food security status

7989 Eating Behaviours in Islam and Mental Health: A Preventative Approach

Authors: Muhammad Rafiq, Lamae Zulfiqar, Nazish Idrees Chaudhary

Abstract:

A growing number of research focuses on healthy and unhealthy eating behaviors and their impact on health. It was intended to study the Islamic point of view on eating behavior, its impact on mental health and preventative strategies in the light of the Quran and Sunnah. Different articles and Islamic sayings related to eating behaviors and mental health were reviewed in detail. It was also revealed scientifically and through Islamic point of view that appropriate quantity, quality and timings of food have positive effects on mental health. Therefore, a 3Rs model of eating behaviors has been proposed.

Keywords: food intake, mental health, quality of food, quantity of food

Procedia PDF Downloads 232
7988 Food Insecurity and Quality of Life among the Poor Elderly in South Korea

Authors: Jayoung Cho

Abstract:

Poverty has become a social problem in South Korea, given that seven out of ten elderly experience multidimensional poverty. As quality of life is a major social welfare measure of a society, verifying the major factors affecting the quality of life among the elderly in poverty can be used as baseline data for the promotion of welfare. This study aims to investigate the longitudinal relationships between food insecurity and quality of life among the elderly in poverty. In this study, panel regression analysis using 5-year longitudinal panel data were derived from Korea Welfare Panel Study (KWPS, 2011-2015) were used to identify the research question. A total of 1,327 elderly people aged 65 or older with less than 60% of median income was analyzed. The main results of the study are as follows; first, the level of quality of life of the poor elderly was on average of 5, and repeated the increase and decrease over time. Second, food insecurity and quality of life of the elderly in poverty had a longitudinal causal relationship. Furthermore, the statistical significance of food insecurity was the highest despite controlling for major variables affecting the quality of life among the poor elderly. Therefore, political and practical approaches are strongly suggested and considered regarding the food insecurity for the quality of life among the elderly in poverty. In practical intervention, it is necessary to pay attention to food insecurity when assessing the poor elderly. Also, there is a need to build a new delivery system that incorporates segmented health and nutrition-related services. This study has an academic significance in that it brought out the issue of food insecurity of the poor elderly and confirmed the longitudinal relationship between food insecurity and quality of life.

Keywords: food insecurity, longitudinal panel analysis, poor elderly, quality of life

Procedia PDF Downloads 233
7987 Biodiversity and Biotechnology: Some Considerations about the International Regulation of Agriculture and the International Legal System on Access to Genetic Resources

Authors: Leandro Moura da Silva

Abstract:

The international community has strived to create legal mechanisms to protect their biodiversity, but this can represent, sometimes, particularly in the case of regulatory regime on access to genetic resources, an excessive nationalism which transforms itself into a significant obstacle to scientific progress causing damages to the country and to local farmers. Although it has been poorly publicized in the media, the international legal system was marked, in 2014, by the entry into force of the Nagoya Protocol, which regulates the access and benefit sharing of genetic resources of the States Party to that legal instrument. However, it’s not reasonable to think of regulating access to genetic resources without reflecting on the links of this important subject with other related issues, such as family farming and agribusiness, food safety, food security, intellectual property rights (on seeds, genetic material, new plant varieties, etc.), environmental sustainability, biodiversity, and biosafety.

Keywords: international law, regulation on agriculture, agronomy techniques, sustainability, genetic resources and new crop varieties, CBD, Nagoya Protocol, ITPGRFA

Procedia PDF Downloads 497
7986 Effect of Pretreatment on Quality Parameters of Natural Convection Mixed-Mode Solar Dried Potato

Authors: Kshanaprava Dhalsamant, Punyadarshini P. Tripathy, Shanker L. Shrivastava

Abstract:

With present high global population, the need for rising food usage by minimizing food wastage and investment is highly necessary to achieve food security. The purpose of this study is to enlighten the effect of pre-drying treatment on rehydration, color, texture, nanohardness, microstructure and surface morphology of solar dried potato samples dried in the mixed-mode solar dryer. Locally bought potatoes were cleaned and cut into cylindrical pieces and pretreated with sodium metabisulfite (0.5%) for 10 min before placing them in natural convection solar dryer designed and developed in Indian Institute of Technology Kharagpur, India. Advanced quality characteristics were studied using Atomic Force Microscope (AFM), Scanning Electron Microscopy (SEM) and nanoindentation method, along with color, texture and water activity. The rehydration indices of solar dried potatoes were significantly biased by pretreatment followed by rehydration temperature. A lower redness index (a*) with a higher value of yellowness index (b*), chroma (C*) and hue angle (h*) were obtained for pretreated samples. Also, the average nanohardness (H) of untreated samples exhibited substantial lower value (18.46%) compared to pretreated samples. Additionally, a creep displacement of 43.27 nm during 20 s dwell time under constant load of 200

Keywords: pretreatment, nanohardness, microstructure, surface morphology

Procedia PDF Downloads 163
7985 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View

Authors: Olumide A. Fafore, Khondlo Mtshali

Abstract:

The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.

Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security

Procedia PDF Downloads 156
7984 Dietary Effect of Probiotic Bacteria, Bacillus amyloliquefaciens JFP-2 Isolate from Jeju Island`s Traditional Fermented Food, on Innate Immune Response of Oplegnathus fasciatus Challenged with Vibrio anguillarum

Authors: Dong Hwi Kim, Dharaneedharan Subramanian, So Hyun Park, Ha-Ri Choi, Ji-Hyung Kim, Dong-Hoon Lee, Moon Soo Heo

Abstract:

The present study was performed to evaluate the use of Bacillus amyloliquefaciens JFP-2 isolated from a traditional fermented sea food, as probiotic bacteria in the diets for Rock-bream, Oplegnathus faciatus. A total of 180 fish (187.4 ± 2.7 g) were divided into two groups, control (C) and probiotic (P) group (90 fish per group) in triplicate. C group was fed with basal diet without probiotic, while P group was fed with B. amyloliquefaciens spores at concentration of 1.4 x 106 colony forming units per gram (CFU/g) of feed. After two months of feeding experiments, P group fish showed significant improvements in body weight (BW), weight gain (WG), specific growth rate (SGR) and food conversion ratio (FCR) compared with C group. Also, bi-weekly assessment of serum protein, glucose, fatty acid profile showed a significant increase in probiotic fed fish than that of control fish group. Similar increase in serum antioxidant and lysozyme activity was found in probiotic fed fish group. Twenty days challenge experiment shows decrease mortality in probiotic fed fish group when compared with that of control group. Hence, these results indicate that the use of B. amyloliquefaciens JFP-2 as a feed supplement, is beneficial to improve the health status of Oplegnathus fasciatus challenged with Vibrio anguillarum.

Keywords: Bacillus amyloliquefaciens, Oplegnathus fasciatus, probiotic feed, rock bream

Procedia PDF Downloads 256
7983 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application

Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba

Abstract:

NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.

Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)

Procedia PDF Downloads 296
7982 Anemia and Nutritional Status as Dominant Factor of the Event Low Birth Weight in Indonesia: A Systematic Review

Authors: Lisnawati Hutagalung

Abstract:

Background: Low birth weight (LBW) is one cause of newborn death. Babies with low birth weight tend to have slower cognitive development, growth retardation, more at risk of infectious disease event at risk of death. Objective: Identifying risk factors and dominant factors that influence the incidence of LBW in Indonesia. Method: This research used some database of public health such as Google Scholar, UGM journals, UI journals and UNAND journals in 2012-2015. Data were filtered using keywords ‘Risk Factors’ AND ‘Cause LBW’ with amounts 2757 study. The filtrate obtained 5 public health research that meets the criteria. Results: Risk factors associated with LBW, among other environment factors (exposure to cigarette smoke and residence), social demographics (age and socio-economic) and maternal factors (anemia, placental abnormal, nutritional status of mothers, examinations antenatal, preeclampsia, parity, and complications in pregnancy). Anemia and nutritional status become the dominant factor affecting LBW. Conclusions: The risk factors that affect LBW, most commonly found in the maternal factors. The dominant factors are a big effect on LBW is anemia and nutritional status of the mother during pregnancy.

Keywords: low birth weight, anemia, nutritional status, the dominant factor

Procedia PDF Downloads 358
7981 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States

Authors: Cleopatra Gittens

Abstract:

It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.

Keywords: benefits, pension, small island developing states, social security reform

Procedia PDF Downloads 86
7980 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 387
7979 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia

Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki

Abstract:

Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.

Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering

Procedia PDF Downloads 152
7978 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment

Authors: Dengpan Wu, Dan Liu

Abstract:

In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.

Keywords: cloud security, memory isolation, xen, virtual machine

Procedia PDF Downloads 398
7977 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon

Authors: Jessy Abouarab

Abstract:

For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.

Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women

Procedia PDF Downloads 137
7976 Revival of Ancient Egyptian Food Habits: Preserving the Past and Living the Present

Authors: Dina M. Ezz El-Din

Abstract:

A variety of sources on Ancient Egypt provides us with knowledge about its agricultural and eating habits. This wealth of information testifies that the ancient Egyptians disposed of a wide variety of food choices. Egyptian agricultural diet was complemented by livestock breeding (Cows, sheep, geese, ducks, quail, pigeons, pelicans, etc). Moreover, the ancient Egyptians planted and harvested large amounts of cereals and vegetables (onions, leeks, lettuces, garlic). They had a varied and well-balanced diet throughout their history. Like in modern times, their eating habits not only changed from one region to the other, but also these also differed according to social classes. The present research is a descriptive-analytical study that tackles eating habits and culinary experience of the ancient Egyptians in an attempt to revive and preserve Egyptians’ food heritage. It focuses on different meals that were prepared and consumed in different occasions, and the habits that can be traced in Egypt in modern times. It also suggests means of bringing to life the ancient Egyptians’ food experience through restaurants and other tourism activities.

Keywords: cultural heritage, ancient Egyptian food, eating habits, preserving food traditions

Procedia PDF Downloads 304
7975 The Impact of Food Inflation on Poverty: An Analysis of the Different Households in the Philippines

Authors: Kara Gianina D. Rosas, Jade Emily L. Tong

Abstract:

This study assesses the vulnerability of households to food price shocks. Using the Philippines as a case study, the researchers aim to understand how such shocks can cause food insecurity in different types of households. This paper measures the impact of actual food price changes during the food crisis of 2006-2009 on poverty in relation to their spatial location. Households are classified as rural or urban and agricultural or non-agricultural. By treating food prices and consumption patterns as heterogeneous, this study differs from conventional poverty analysis as actual prices are used. Merging the Family, Income and Expenditure Survey (FIES) with the Consumer Price Index dataset (CPI), the researchers were able to determine the effects on poverty measures, specifically, headcount index, poverty gap, and poverty severity. The study finds that, without other interventions, food inflation would lead to a significant increase in the number of households that fall below the poverty threshold, except for households whose income is derived from agricultural activities. It also finds that much of the inflation during these years was fueled by the rise in staple food prices. Essentially, this paper aims to broaden the economic perspective of policymakers with regard to the heterogeneity of impacts of inflation through analyzing the deeper microeconomic levels of different subgroups. In hopes of finding a solution to lessen the inequality gap of poverty between the rural and urban poor, this paper aims to aid policymakers in creating projects targeted towards food insecurity.

Keywords: poverty, food inflation, agricultural households, non-agricultural households, net consumption ratio, urban poor, rural poor, head count index, poverty gap, poverty severity

Procedia PDF Downloads 239
7974 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks

Authors: Atabak Faramarzpour, Mohsen Mohammadian

Abstract:

In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.

Keywords: DG power plants, evaluation, voltage security, radial distribution networks

Procedia PDF Downloads 664
7973 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme

Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme

Procedia PDF Downloads 475
7972 Leveraging Advanced Technologies and Data to Eliminate Abandoned, Lost, or Otherwise Discarded Fishing Gear and Derelict Fishing Gear

Authors: Grant Bifolchi

Abstract:

As global environmental problems continue to have highly adverse effects, finding long-term, sustainable solutions to combat ecological distress are of growing paramount concern. Ghost Gear—also known as abandoned, lost or otherwise discarded fishing gear (ALDFG) and derelict fishing gear (DFG)—represents one of the greatest threats to the world’s oceans, posing a significant hazard to human health, livelihoods, and global food security. In fact, according to the UN Food and Agriculture Organization (FAO), abandoned, lost and discarded fishing gear represents approximately 10% of marine debris by volume. Around the world, many governments, governmental and non-profit organizations are doing their best to manage the reporting and retrieval of nets, lines, ropes, traps, floats and more from their respective bodies of water. However, these organizations’ ability to effectively manage files and documents about the environmental problem further complicates matters. In Ghost Gear monitoring and management, organizations face additional complexities. Whether it’s data ingest, industry regulations and standards, garnering actionable insights into the location, security, and management of data, or the application of enforcement due to disparate data—all of these factors are placing massive strains on organizations struggling to save the planet from the dangers of Ghost Gear. In this 90-minute educational session, globally recognized Ghost Gear technology expert Grant Bifolchi CET, BBA, Bcom, will provide real-world insight into how governments currently manage Ghost Gear and the technology that can accelerate success in combatting ALDFG and DFG. In this session, attendees will learn how to: • Identify specific technologies to solve the ingest and management of Ghost Gear data categories, including type, geo-location, size, ownership, regional assignment, collection and disposal. • Provide enhanced access to authorities, fisheries, independent fishing vessels, individuals, etc., while securely controlling confidential and privileged data to globally recognized standards. • Create and maintain processing accuracy to effectively track ALDFG/DFG reporting progress—including acknowledging receipt of the report and sharing it with all pertinent stakeholders to ensure approvals are secured. • Enable and utilize Business Intelligence (BI) and Analytics to store and analyze data to optimize organizational performance, maintain anytime-visibility of report status, user accountability, scheduling, management, and foster governmental transparency. • Maintain Compliance Reporting through highly defined, detailed and automated reports—enabling all stakeholders to share critical insights with internal colleagues, regulatory agencies, and national and international partners.

Keywords: ghost gear, ALDFG, DFG, abandoned, lost or otherwise discarded fishing gear, data, technology

Procedia PDF Downloads 90
7971 The Development and Provision of a Knowledge Management Ecosystem, Optimized for Genomics

Authors: Matthew I. Bellgard

Abstract:

The field of bioinformatics has made, and continues to make, substantial progress and contributions to life science research and development. However, this paper contends that a systems approach integrates bioinformatics activities for any project in a defined manner. The application of critical control points in this bioinformatics systems approach may be useful to identify and evaluate points in a pathway where specified activity risk can be reduced, monitored and quality enhanced.

Keywords: bioinformatics, food security, personalized medicine, systems approach

Procedia PDF Downloads 418
7970 Energizing Value Added Farming in Agriculture Economic Aspects towards Sustaining Crop Yield, Quality and Food Safety of Small-Scale Cocoa Farmer in Indonesia

Authors: Burmansyah Muhammad, Supriyoto Supriyoto

Abstract:

Crop yield, quality and food safety are three important components that all estate and food crops must put into consideration to lifting the economic value. These measurements should be evaluated because marketplace demand is simultaneously changing and farmers must adapt quickly to remain competitive. The increase in economic value could be done by producing high quality product that aligns with harvest collector preferences. The purpose of this study is to examine the causal effects of value added farming in agriculture economic aspects towards crop yield, quality and food security. This research is using descriptive survey research by employing data from small-scale cocoa farmers listed to off-taker company, located on Sulawesi area of Indonesia. The questionnaire was obtained from 650 cocoa farmers, selected randomly. Major findings of the study indicate that 78% of respondents agree that agriculture inputs have positive effect on crop yield, quality and food safety. The study recommended that cocoa stakeholders should ensure access to agriculture inputs in first priority and then followed by ensuring access to cocoa supply chain trader and micro-financing. Value Added Farming refers to lifting the economic value of a commodity through particular intervention. Regarding access to agriculture inputs, one of significant intervention is fertilization and plant nutrition management, both organic and inorganic fertilizer. Small-scale cocoa farmers can get access to fertilizer intervention through establishment of demo farm. Ordinary demo farm needs large area, selective requirements, lots of field resources and centralization impact. On the contrary, satellite demo farm is developing to wide-spread the impact of agriculture economic aspects and also the involvement in number of farmers. In Sulawesi Project, we develop leveling strata of small-scale demo farm with group of farmers and local cooperative. With this methodology, all of listed small-scale farmers can get access to agriculture input, micro-financing and how to deliver quality output. PT Pupuk Kaltim is member firm of holding company PT Pupuk Indonesia, private company belongs to the government of Indonesia. The company listed as Indonesia's largest producer of urea fertilizers, besides ammonia, Compound Fertilizer (NPK) and biological fertilizers. To achieve strategic objectives, the company has distinguished award such as SNI Platinum, SGS Award IFA Protect and Sustain Stewardship and Gold Rank of Environment Friendly Company. This achievement has become the strategic foundation for our company to energize value added farming in sustaining food security program. Moreover, to ensure cocoa sustainability farming the company has developed partnership with international companies and Non-Government Organization (NGO).

Keywords: fertilizer and plant nutrition management, good agriculture practices, agriculture economic aspects, value-added farming

Procedia PDF Downloads 98
7969 Literature Analysis of Nutrition in South Africa and How SA Harvest Aims to Improve Nutrition

Authors: Ali Conn, Kimberly Allen

Abstract:

Food and nutrition play a significant role in humans. It helps them function, grow, and develop into better individuals. However, as essential as food may seem to most people, it is not the case for everyone. South Africans, for example, have been suffering from hunger and poverty for the longest time now. With the spread of the COVID-19 virus, their situations have become worse. Millions of children and their families do not have access to food, hence no proper nutrition. They could barely make ends meet, so they make sure to make the most of what little they have for their household. Fortunately, organizations like SA Harvest aim to end hunger in South Africa. However, they still need to know more about how they can help South Africans with their current diet. Currently, most of the diets are composed of maize and rice. They do not have much to spend on fruits, so these commodities are seen as a luxury. With the help of organizations like SA Harvest, South Africans will be educated and more aware of what they need to eat.

Keywords: nutrition, public health, SA Harvest, food

Procedia PDF Downloads 121
7968 Constitutional Status of a Child in the Republic of Belarus and Its Principles

Authors: Maria Ashitko

Abstract:

The Constitution of the Republic of Belarus is based on the principle of the unity of rights and obligations, including those of the child. The constitutional status of the child is aspecific system of constitutional elements established and guaranteed by the state through the current legislation and regulatory acts that ensure the special legal status of the child, his or her constitutional legal capacity, implementation of the principles of the constitutional and legal status of the child, constitutional rights of the child and their safeguards. Under the principles of the constitutional status of the child, we consider the general, normative, social-volitional rules of behavior established by the Constitution of the Republic of Belarus, laws and other regulatory acts that determine the content and social purpose of the legal status of the child. The constitutional and legal status of the child is characterized by the following special principles, which form a feature of the state legal system:1) Ensuring the interests of the child means providing for the child in accordance with his or her age, state of health, characteristics of development, life experience, family life, cultural traditions, ethnicity. 2) The principle of equal responsibility of both parents or their substitutes characterized by caring for the next generation as one of the priority tasks of the state and society, and all issues related to the implementation of children’s rights should be addressed at the constitutional level. 3) We would like to highlight such a special principle as the subprinciple of safeguards, which is the principle of ensuring the safety of the child. It is also worth noting that in legal studies, there is no relationship between safety and constitutional rights as general safeguards of individual rights and freedoms, and as special safeguards for the right to life. 4) The principle of justice is expressed by the fact that in modern conditions, the quality of life is determined not only by material wealth but also by the ability of the state to ensure the harmonization of social relations and social harmony on the basis of humanism and justice. Thus, the specificity of the constitutional status of the child is the age boundary between adulthood and minority; therefore, we propose to highlight the age characteristics of the child as an additional element. It is advisable to highlight such a special principle as the subprinciple of safeguards, which is the principle of ensuring the safety of the child.

Keywords: children’s rights, constitutional status, constitutional principles, constitutional rights

Procedia PDF Downloads 123
7967 Night Patrolling Robot for Suspicious Activity Detection

Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe

Abstract:

Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.

Keywords: night patrolling, node MCU, server, security

Procedia PDF Downloads 147
7966 Consumer’ Knowledge, Attitude and Behavior on Food Safety Issues Related to Pesticide Residues in Cabbage

Authors: Dekie Rawung, Abdul L. Abadi, Toto Himawan, Siegfried Berhimpon

Abstract:

A case study on consumer' knowledge, attitude, and behavior on food safety issue related to pesticide residues in cabbage was conducted in the area of Manado and Tomohon city, North Sulawesi. A sample of 150 consumers were selected randomly on location (open market and supermarket) while they were purchasing vegetables. The data on consumers’ perception, knowledge, attitude and behavior on food safety issue regarding pesticide residues were collected using a 5-point, two-section Likert-Scale questionnaire, and the relationship of knowledge, attitude, and behavior on food safety issues were analyzed using Structural Equation Modeling (SEM). It was found that, among many food safety issues, the illegal, non-food chemical preservatives were considered the most important one (by more than 35% respondents), followed by high cholesterol content and textile coloring chemical (> 27% respondents). The pesticide residues issue was only in the 4th place. The same results were seen on the issue of quality factors that determine the product selection during purchasing. The pesticide-free and organic products labels were considered much less important quality factors as compared with freshness and nutrition value which were considered the most and the second most important quality factors (almost 65% of respondents). SEM analysis showed that only knowledge and attitude on food safety that had the significant relation (coefficient value of 0.38), whereas those with behaviors were not significant.

Keywords: cabbage, consumer, food safety, pesticide residues

Procedia PDF Downloads 417
7965 Factors Predicting Food Insecurity in Older Thai Women

Authors: Noppawan Piaseu, Surat Komindr

Abstract:

This study aimed to determine factors predicting food insecurity in older Thai women living in crowded urban communities. Through purposive sampling, 315 participants were recruited from community dwelling older women in Bangkok, Thailand. Data collection included interview from questionnaires and anthropometric measurement. Results showed that approximately half of the sample were 60-69 years old (51.1%), married (50.6%), obtained primary education (52.3%), had low family income (51.7%), lived in poor physical environment (49.9%) with normal body mass index (51.0%). Logistic regression analysis revealed that older women who were widowed/divorced/separated (OR = 1.804, 95% CI = 1.052-3.092, p = .032), who reported low family income (OR =.654, 95% CI = .523-.817, p < .001), and who had poor physical environment surrounding home (OR = 2.338, 95% CI = 1.057-5.171, p = .036) were more likely to have food insecurity. Results support that social and environmental factors are major factors predicting food insecurity in older women living in the urban community. Health professionals need to identify and monitor psychosocial, economic and environmental dimensions of food insecurity among them.

Keywords: food insecurity, older women, urban communities, Thailand

Procedia PDF Downloads 399
7964 Cyber Security in Nigeria: A Collaboration between Communities and Professionals

Authors: Alese Boniface K., Adu Michael K., Owa Victor K.

Abstract:

Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.

Keywords: security, cybercrime, internet, government, stakeholders, partnerships

Procedia PDF Downloads 529
7963 Survey of Access Controls in Cloud Computing

Authors: Monirah Alkathiry, Hanan Aljarwan

Abstract:

Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.

Keywords: access controls, cloud computing, confidentiality, identity and access management

Procedia PDF Downloads 128
7962 The Distribution of Prevalent Supplemental Nutrition Assistance Program-Authorized Food Store Formats Differ by U.S. Region and Rurality: Implications for Food Access and Obesity Linkages

Authors: Bailey Houghtaling, Elena Serrano, Vivica Kraak, Samantha Harden, George Davis, Sarah Misyak

Abstract:

United States (U.S.) Department of Agriculture Supplemental Nutrition Assistance Program (SNAP) participants are low-income Americans receiving federal dollars for supplemental food and beverage purchases. Participants use a variety of (traditional/non-traditional) SNAP-authorized stores for household dietary purchases - also representing food access points for all Americans. Importantly consumers' food and beverage purchases from non-traditional store formats tend to be higher in saturated fats, added sugars, and sodium when compared to purchases from traditional (e.g., grocery/supermarket) formats. Overconsumption of energy-dense and low-nutrient food and beverage products contribute to high obesity rates and adverse health outcomes that differ in severity among urban/rural U.S. locations and high/low-income populations. Little is known about the SNAP-authorized food store format landscape nationally, regionally, or by urban-rural status, as traditional formats are currently used as the gold standard in food access research. This research utilized publicly available U.S. databases to fill this large literature gap and to provide insight into modes of food access for vulnerable U.S. populations: (1) SNAP Retailer Locator which provides a list of all authorized food stores in the U.S., and; (2) Rural-Urban Continuum Codes (RUCC) that categorize U.S. counties as urban (RUCC 1-3) or rural (RUCC 4-9). Frequencies were determined for the highest occurring food store formats nationally and within two regionally diverse U.S. states – Virginia in the east and California in the west. Store format codes were assigned (e.g., grocery, drug, convenience, mass merchandiser, supercenter, dollar, club, or other). RUCC was applied to investigate state-level differences in urbanity-rurality regarding prevalent food store formats and Chi Square test of independence was used to determine if food store format distributions significantly (p < 0.05) differed by region or rurality. The resulting research sample that represented highly prevalent SNAP-authorized food stores nationally included 41.25% of all SNAP stores in the U.S. (N=257,839), comprised primarily of convenience formats (31.94%) followed by dollar (25.58%), drug (19.24%), traditional (10.87%), supercenter (6.85%), mass merchandiser (1.62%), non-food store or restaurant (1.81%), and club formats (1.09%). Results also indicated that the distribution of prevalent SNAP-authorized formats significantly differed by state. California had a lower proportion of traditional (9.96%) and a higher proportion of drug (28.92%) formats than Virginia- 11.55% and 19.97%, respectively (p < 0.001). Virginia also had a higher proportion of dollar formats (26.11%) when compared to California (10.64%) (p < 0.001). Significant differences were also observed for rurality variables (p < 0.001). Prominently, rural Virginia had a significantly higher proportion of dollar formats (41.71%) when compared to urban Virginia (21.78%) and rural California (21.21%). Non-traditional SNAP-authorized formats are highly prevalent and significantly differ in distribution by U.S. region and rurality. The largest proportional difference was observed for dollar formats where the least nutritious consumer purchases are documented in the literature. Researchers/practitioners should investigate non-traditional food stores at the local level using these research findings and similar applied methodologies to determine how access to various store formats impact obesity prevalence. For example, dollar stores may be prime targets for interventions to enhance nutritious consumer purchases in rural Virginia while targeting drug formats in California may be more appropriate.

Keywords: food access, food store format, nutrition interventions, SNAP consumers

Procedia PDF Downloads 136
7961 Influence of Parent’s Food Habits on Nutrition Behaviours of Children under 7 Years in Tehran, Iran

Authors: Katayoun Bagheri, Farzad Berahmandpour

Abstract:

Several studies about food habits in diverse population show, early living years play significant role in building of current food habits. Suitable nutrition in children is also influenced by parent’s food habits. The aim of study is to survey the role of parent’s food habits to form of nutrition behaviours in children under 7 years in Tehran - Iran. The study is a Descriptive study. The participants were 19 children under 7 years with their mothers from a kindergarten in the central Tehran. The sampling method was random sampling. The data was collected by food habits questionnaires and implementation of consultation meetings with the mothers. The data analysis was qualitative analysis. The findings show that 79% children and their parents have eaten enough and variety breakfast, but food choices of children were depended on food choices of parents. In the other meals, the majority of children enjoyed to eat dinner (58%), because the more families could eat dinner together. According to mother opinions, the children enjoy eating macaroni, chicken, fried potatoes, chips and fruit juices. The researchers argue that mother’s role is unavoidable in the food preferences among children. Fortunately, the results believe that children tend to drink simple milk (79%). Moreover, their parents lead them to chocolate milk consumption (42%) instead of other flavored milk. Finally, despite popular belief claim that mothers influence on nutrition behavior of children, but the study argues that the fathers have more effects on children’s nutrition behaviours. In conclusion, it seems that the general trainings about promoting healthy nutrition behavior for parents by mass media can improve nutrition habits and behaviours of pre school children.

Keywords: food habits, parents, nutrition behaviours, children, promoting nutrition

Procedia PDF Downloads 391
7960 Evaluation of Food Services by the Personnel in Hospitals of Athens, Greece

Authors: I. Mentziou, C. Delezos, D. Krikidis, A. Nestoridou, G. Boskou

Abstract:

Introduction: The systems of production and distribution of meals can have a significant impact on the food intake of hospital patients who are likely to develop malnutrition. In hospitals, the consequences of food borne infections can range from annoying to life-threatening for a patient, since they can lead up to death in vulnerable groups Aim: The aim of the present study was the evaluation of food safety management systems implementation, as well as the general evaluation of the total quality management systems in Greek hospitals. Methods: This is a multifocal study on the implementation and evaluation of the food safety management systems in the Greek hospitals of Attica region. Eleven hospitals from the city of Athens were chosen for this purpose. The sample was derived from the high rank personnel of the nutritional department (dietician, head-chef, food technologist, public health inspector). Tailor made questionnaires on hygiene regulations were used as tools for the interviews. Results: Overall, 30 employees in the field of hospital nutrition participated. Most of the replies implied that almost always the hygiene regulations are implemented. Nevertheless, only 30% stated that there is a Hazard Analysis Critical Control Points HACCP system (HACCP) in the hospital. In a small number of questionnaires there were proposals for changes by the staff. Conclusion: Measurement of the opinion of the personnel about the provided food services within a hospital can further lead to continuous improvement of the hospital nutrition.

Keywords: evaluation, food service, HACCP, hospital, personnel

Procedia PDF Downloads 370