Search results for: food and nutrition security
5612 Nurture Early for Optimal Nutrition: A Community-Based Randomized Controlled Trial to Improve Infant Feeding and Care Practices Using Participatory Learning and Actions Approach
Authors: Priyanka Patil, Logan Manikam
Abstract:
Background: The first 1000 days of life are a critical window and can result in adverse health consequences due to inadequate nutrition. South-Asian (SA) communities face significant health disparities, particularly in maternal and child health. Community-based interventions, often employing Participatory-Learning and Action (PLA) approaches, have effectively addressed health inequalities in lower-income nations. The aim of this study was to assess the feasibility of implementing a PLA intervention to improve infant feeding and care practices in SA communities living in London. Methods: Comprehensive analyses were conducted to assess the feasibility/fidelity of this pilot randomized controlled trial. Summary statistics were computed to compare key metrics, including participant consent rates, attendance, retention, intervention support, and perceived effectiveness, against predefined progression rules guiding toward a definitive trial. Secondary outcomes were analyzed, drawing insights from multiple sources, such as The Children’s-Eating-Behaviour Questionnaire (CEBQ), Parental-Feeding-Style Questionnaires (PFSQ), Food-diary, and the Equality-Impact-Assessment (EIA) tool. A video analysis of children's mealtime behavior trends was conducted. Feedback interviews were collected from study participants. Results: Process-outcome measures met predefined progression rules for a definitive trial, which deemed the intervention as feasible and acceptable. The secondary outcomes analysis revealed no significant changes in children's BMI z-scores. This could be attributed to the abbreviated follow-up period of 6 months, reduced from 12 months, due to COVID-19-related delays. CEBQ analysis showed increased food responsiveness, along with decreased emotional over/undereating. A similar trend was observed in PFSQ. The EIA tool found no potential discrimination areas, and video analysis revealed a decrease in force-feeding practices. Participant feedback revealed improved awareness and knowledge sharing. Conclusion: This study demonstrates that a co-adapted PLA intervention is feasible and well-received in optimizing infant-care practices among South-Asian community members in a high-income country. These findings highlight the potential of community-based interventions to enhance health outcomes, promoting health equity.Keywords: child health, childhood obesity, community-based, infant nutrition
Procedia PDF Downloads 565611 Security Risks Assessment: A Conceptualization and Extension of NFC Touch-And-Go Application
Authors: Ku Aina Afiqah Ku Adzman, Manmeet Mahinderjit Singh, Zarul Fitri Zaaba
Abstract:
NFC operates on low-range 13.56 MHz frequency within a distance from 4cm to 10cm, and the applications can be categorized as touch and go, touch and confirm, touch and connect, and touch and explore. NFC applications are vulnerable to various security and privacy attacks such due to its physical nature; unprotected data stored in NFC tag and insecure communication between its applications. This paper aims to determine the likelihood of security risks happening in an NFC technology and application. We present an NFC technology taxonomy covering NFC standards, types of application and various security and privacy attack. Based on observations and the survey presented to evaluate the risk assessment within the touch and go application demonstrates two security attacks that are high risks namely data corruption and DOS attacks. After the risks are determined, risk countermeasures by using AHP is adopted. The guideline and solutions to these two high risks, attacks are later applied to a secure NFC-enabled Smartphone Attendance System.Keywords: Near Field Communication (NFC), risk assessment, multi-criteria decision making, Analytical Hierarchy Process (AHP)
Procedia PDF Downloads 3025610 Challenges in Developing a World Class Sustainable Food Organization
Authors: Baskar Kotte
Abstract:
Many organizations are constantly striving to implement numerous techniques for long-term sustainability, for food related organizations it is imperative to conceptualize the critical concepts which constitute food safety sustainability. This presentation provides three critical pillars to develop a sustainable organization. Financial sustainability, regulatory sustainability and excellence standards sustainability are the three components which practiced and implemented effectively with process performance metrics defined objectives and targets lead to sustainable and safe food organizations. The participants take away a well-developed concept diagram with all elements impacting sustainability. Proven disciplined path which worked to achieve desired results is presented for effective implementation. Effective implementation of this proven disciplined path positions organizations to achieve world class status with bottomline improvement. Additionally, this presentation highlights critical terms, principles and implementation difficulties related to using the proven disciplined path. This presentation is beneficial for business leaders, food safety compliance managers, food safety practitioners, financial managers, Lean & Six sigma continual improvement managers, BRC/SQF/ IFS / FSSC 22000 practitioners and food manufacturing personnel.Keywords: food safety, sustainability, regulatory, lean, six sigma, bottom-line improvement disciplined path
Procedia PDF Downloads 2785609 Social Security Reform and Management: The Case of Three Member Territories of the Organisation of Eastern Caribbean States
Authors: Cleopatra Gittens
Abstract:
It has been recognized that some social security and national insurance systems in the Eastern Caribbean are experiencing ageing populations and economic and other crises that will present a financial challenge of being unable to pay pension benefits in fifteen to twenty years. This has implications for the fiscal and economic positions of the countries themselves. Hence, organizations would need to address the issue urgently. The study adds to the body of knowledge on social security systems and social security reforms in small island developing states (SIDS). It also makes recommendations for the types of reforms that social security systems in other SIDS can implement given their special circumstances. Secondary research is used to gather financial and other related information on three social security schemes in the Eastern Caribbean. Actuarial and financial reports and other documents of the social security systems are analysed to obtain financial and static data on each of the schemes. The findings show that the three schemes studied are experiencing steady increases in benefit expenditure versus contributions and increasing pensioner to insured ratios. The schemes will deplete their reserves between 2038 and 2050. Two of the schemes have increased their retirement age while the other has not embarked on any reforms. One scheme has made changes to its contribution percentages. Due to their small size, small populations and other unique circumstances, the social security schemes in the identified territories are not likely to be able to take advantage of all of the reform initiatives that the developed world embarked on when faced with similar problems. These schemes will need to make incremental changes that align with the timeframes recommended by the actuarial studies.Keywords: benefits, pension, small island developing states, social security reform
Procedia PDF Downloads 915608 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users
Authors: Haydar Teymourlouei
Abstract:
It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.Keywords: cyber-attacks, home user, prevention, security, technology
Procedia PDF Downloads 3965607 Saudi Human Awareness Needs: A Survey in How Human Causes Errors and Mistakes Leads to Leak Confidential Data with Proposed Solutions in Saudi Arabia
Authors: Amal Hussain Alkhaiwani, Ghadah Abdullah Almalki
Abstract:
Recently human errors have increasingly become a very high factor in security breaches that may affect confidential data, and most of the cyber data breaches are caused by human errors. With one individual mistake, the attacker will gain access to the entire network and bypass the implemented access controls without any immediate detection. Unaware employees will be vulnerable to any social engineering cyber-attacks. Providing security awareness to People is part of the company protection process; the cyber risks cannot be reduced by just implementing technology; the human awareness of security will significantly reduce the risks, which encourage changes in staff cyber-awareness. In this paper, we will focus on Human Awareness, human needs to continue the required security education level; we will review human errors and introduce a proposed solution to avoid the breach from occurring again. Recently Saudi Arabia faced many attacks with different methods of social engineering. As Saudi Arabia has become a target to many countries and individuals, we needed to initiate a defense mechanism that begins with awareness to keep our privacy and protect the confidential data against possible intended attacks.Keywords: cybersecurity, human aspects, human errors, human mistakes, security awareness, Saudi Arabia, security program, security education, social engineering
Procedia PDF Downloads 1605606 Design and Implementation of a Memory Safety Isolation Method Based on the Xen Cloud Environment
Authors: Dengpan Wu, Dan Liu
Abstract:
In view of the present cloud security problem has increasingly become one of the major obstacles hindering the development of the cloud computing, put forward a kind of memory based on Xen cloud environment security isolation technology implementation. And based on Xen virtual machine monitor system, analysis of the model of memory virtualization is implemented, using Xen memory virtualization system mechanism of super calls and grant table, based on the virtual machine manager internal implementation of access control module (ACM) to design the security isolation system memory. Experiments show that, the system can effectively isolate different customer domain OS between illegal access to memory data.Keywords: cloud security, memory isolation, xen, virtual machine
Procedia PDF Downloads 4095605 Revival of Ancient Egyptian Food Habits: Preserving the Past and Living the Present
Authors: Dina M. Ezz El-Din
Abstract:
A variety of sources on Ancient Egypt provides us with knowledge about its agricultural and eating habits. This wealth of information testifies that the ancient Egyptians disposed of a wide variety of food choices. Egyptian agricultural diet was complemented by livestock breeding (Cows, sheep, geese, ducks, quail, pigeons, pelicans, etc). Moreover, the ancient Egyptians planted and harvested large amounts of cereals and vegetables (onions, leeks, lettuces, garlic). They had a varied and well-balanced diet throughout their history. Like in modern times, their eating habits not only changed from one region to the other, but also these also differed according to social classes. The present research is a descriptive-analytical study that tackles eating habits and culinary experience of the ancient Egyptians in an attempt to revive and preserve Egyptians’ food heritage. It focuses on different meals that were prepared and consumed in different occasions, and the habits that can be traced in Egypt in modern times. It also suggests means of bringing to life the ancient Egyptians’ food experience through restaurants and other tourism activities.Keywords: cultural heritage, ancient Egyptian food, eating habits, preserving food traditions
Procedia PDF Downloads 3095604 Alternative (In)Security: Using Photovoice Research Methodology to Explore Refugee Anxieties in Lebanon
Authors: Jessy Abouarab
Abstract:
For more than half a century, international norms related to refugee security and protection have proliferated, yet their role in alleviating war’s negative impacts on human life remains limited. The impact of refugee-security processes often manifests asymmetrically within populations. Many issues and people get silenced due to narrow security policies that focus either on abstract threat containment and refugee control or refugee protection and humanitarian aid. (In)security practices are gendered and experienced. Examining the case study of Syrian refugees in Lebanon, this study explores the gendered impact of refugee security mechanisms on local realities. A transnational feminist approach will be used to position this research in relation to existing studies in the field of security and the refugee-protection regime, highlighting the social, cultural, legal, and political barriers to gender equality in the areas of violence, rights, and social inclusion. Through Photovoice methodology, the Syrian refugees’ (in)securities in Lebanon were given visibility by enabling local volunteers to record and reflect their realities through pictures, at the same time voice the participants’ anxieties and recommendations to reach normative policy change. This Participatory Action Research approach helped participants observe the structural barriers and lack of culturally inclusive refugee services that hinder security, increase discrimination, stigma, and poverty. The findings have implications for a shift of the refugee protection mechanisms to a community-based approach in ways that extend beyond narrow security policies that hinder women empowerment and raise vulnerabilities such as gendered exploitation, abuse, and neglect.Keywords: gender, (in)security, Lebanon, refugee, Syrian refugees, women
Procedia PDF Downloads 1435603 The Impact of Food Inflation on Poverty: An Analysis of the Different Households in the Philippines
Authors: Kara Gianina D. Rosas, Jade Emily L. Tong
Abstract:
This study assesses the vulnerability of households to food price shocks. Using the Philippines as a case study, the researchers aim to understand how such shocks can cause food insecurity in different types of households. This paper measures the impact of actual food price changes during the food crisis of 2006-2009 on poverty in relation to their spatial location. Households are classified as rural or urban and agricultural or non-agricultural. By treating food prices and consumption patterns as heterogeneous, this study differs from conventional poverty analysis as actual prices are used. Merging the Family, Income and Expenditure Survey (FIES) with the Consumer Price Index dataset (CPI), the researchers were able to determine the effects on poverty measures, specifically, headcount index, poverty gap, and poverty severity. The study finds that, without other interventions, food inflation would lead to a significant increase in the number of households that fall below the poverty threshold, except for households whose income is derived from agricultural activities. It also finds that much of the inflation during these years was fueled by the rise in staple food prices. Essentially, this paper aims to broaden the economic perspective of policymakers with regard to the heterogeneity of impacts of inflation through analyzing the deeper microeconomic levels of different subgroups. In hopes of finding a solution to lessen the inequality gap of poverty between the rural and urban poor, this paper aims to aid policymakers in creating projects targeted towards food insecurity.Keywords: poverty, food inflation, agricultural households, non-agricultural households, net consumption ratio, urban poor, rural poor, head count index, poverty gap, poverty severity
Procedia PDF Downloads 2465602 Knowledge-driven Integration of Meat Storage and Safety Practices among College of Science Undergraduate Students of Polytechnic University of the Philippines – Sta. Mesa
Authors: Erwin L. Descallar
Abstract:
Food safety is crucial in protecting the health of consumers, maintaining integrity in the entire food industry, and ensuring regulatory compliance. Food is a universal need for survival, and everyone is at risk of engaging in improper food handling, which increases vulnerability to foodborne illnesses. The level of knowledge or awareness and meat storage practices of students are behaviors influenced by various demographic factors. The Health Belief Model examines the relationship of such demographic factors towards the attitude, perception, and actions of individuals on perceived risk. This study aims to analyze and understand the correlation of said behaviors with course programs, prior food poisoning experience, and food handling of university students. The study employed randomized responses from 89 university students (n=89) under the College of Science at the Polytechnic University of the Philippines–Sta. Mesa (Manila). The results were subjected to measures of central tendency for score ranking and inferential statistics. The statistics were compared using Pearson ‘r’ Product Moment Correlation to determine the degree of relationship between the knowledge and practices on meat storage and safety. No statistically significant differences were found between the course program of students, food poisoning experiences, level of knowledge, and awareness regarding proper meat storage practices. However, increased frequency and involvement in meat handling have shown a positive correlation, indicating that there is a correlation between food handling and proper meat storage practices of university students.Keywords: meat storage practices, food handling, food safety, meat science and technology
Procedia PDF Downloads 85601 DG Power Plants Placement and Evaluation of its Effect on Improving Voltage Security Margin in Radial Distribution Networks
Authors: Atabak Faramarzpour, Mohsen Mohammadian
Abstract:
In this article, we introduce the stability of power system voltage and state DG power plants placement and its effect on improving voltage security margin in radial distribution networks. For this purpose, first, important definitions in voltage stability area such as small and big voltage disturbances, instability, and voltage collapse, and voltage security definitions are stated. Then, according to voltage collapse time, voltage stability is classified and each one's characteristics are stated.Keywords: DG power plants, evaluation, voltage security, radial distribution networks
Procedia PDF Downloads 6715600 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encyption Scheme
Authors: Victor Onomza Waziri, John K. Alhassan, Idris Ismaila, Noel Dogonyara
Abstract:
This paper describes the problem of building secure computational services for encrypted information in the Cloud. Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy or confidentiality, availability and integrity of the data and user’s security. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute a theoretical presentations in a high-level computational processes that are based on number theory that is derivable from abstract algebra which can easily be integrated and leveraged in the Cloud computing interface with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based on cryptographic security algorithm.Keywords: big data analytics, security, privacy, bootstrapping, Fully Homomorphic Encryption Scheme
Procedia PDF Downloads 4805599 The Development and Provision of a Knowledge Management Ecosystem, Optimized for Genomics
Authors: Matthew I. Bellgard
Abstract:
The field of bioinformatics has made, and continues to make, substantial progress and contributions to life science research and development. However, this paper contends that a systems approach integrates bioinformatics activities for any project in a defined manner. The application of critical control points in this bioinformatics systems approach may be useful to identify and evaluate points in a pathway where specified activity risk can be reduced, monitored and quality enhanced.Keywords: bioinformatics, food security, personalized medicine, systems approach
Procedia PDF Downloads 4235598 Factors Predicting Food Insecurity in Older Thai Women
Authors: Noppawan Piaseu, Surat Komindr
Abstract:
This study aimed to determine factors predicting food insecurity in older Thai women living in crowded urban communities. Through purposive sampling, 315 participants were recruited from community dwelling older women in Bangkok, Thailand. Data collection included interview from questionnaires and anthropometric measurement. Results showed that approximately half of the sample were 60-69 years old (51.1%), married (50.6%), obtained primary education (52.3%), had low family income (51.7%), lived in poor physical environment (49.9%) with normal body mass index (51.0%). Logistic regression analysis revealed that older women who were widowed/divorced/separated (OR = 1.804, 95% CI = 1.052-3.092, p = .032), who reported low family income (OR =.654, 95% CI = .523-.817, p < .001), and who had poor physical environment surrounding home (OR = 2.338, 95% CI = 1.057-5.171, p = .036) were more likely to have food insecurity. Results support that social and environmental factors are major factors predicting food insecurity in older women living in the urban community. Health professionals need to identify and monitor psychosocial, economic and environmental dimensions of food insecurity among them.Keywords: food insecurity, older women, urban communities, Thailand
Procedia PDF Downloads 4065597 Night Patrolling Robot for Suspicious Activity Detection
Authors: Amruta Amune, Rohit Agrawal, Yashashree Shastri, Syeda Zarah Aiman, Rutuja Rathi, Vaishnav Suryawanshi, Sameer Sumbhe
Abstract:
Every human being needs a sense of security. The requirement for security has risen in proportion with the population growth. However, because of a scarcity of resources, effective protection is not possible. It costs a lot of money to get appropriate security that not many can handle or afford. The goal of the study was to find a solution to the issue by developing a system capable of providing strong protection at a very low cost when long-term benefits are taken into account. The objective was to design and develop a robot that could travel around and survey the region and inform the command center if anything unusual was found. The system will be controlled manually on the server to find out its workplace's paths. The system is outfitted with a camera so that it can be used to capture built-in live video of the attacker and display it on the server.Keywords: night patrolling, node MCU, server, security
Procedia PDF Downloads 1585596 Quantitative on Fatty Acid Profiles, Lipid Contents and Fat-Soluble Vitamin A of Freshwater Fish Species in Tonle Sap Lake, Cambodia
Authors: Sengly Sroy, Elodie Arnaud, Adrien Servent, Sokneang In, Sylvie Avallone
Abstract:
In Cambodia, fish plays an important role for local community in term of food habits, preference and contribution to several nutritional intakes. Consumed on a daily basis, fishes and their derivatives products are good sources of proteins, essential fatty acids and fat-soluble vitamins. They mainly obtain from the Tonle Sap Lake but, during the last decade, the fish population decreased drastically due to climate change and human activities as well. Contamination by agricultural residues and heavy metals were identified. However, fishes are currently used in several nutrition programs for children and pregnant women to improve their nutritional status. The aim of our work was to characterize the nutritional profile and contamination of 10 fish species consumed near the Tonle Sap Lake with a special attention to fatty acid and fat-soluble vitamin profiles. Fish samples were analyzed for their nutritional profiles (AOAC methods for macronutrients and micronutrients), their lipid content (Folch modified method), their Fatty acid (FAME method), their vitamin A (HPLC) and their heavy metals (ICP-MS). The total lipid contents ranged from 1.43 to 10.00% according to fish species. Lipid profile was mainly dominated by saturated fat (from 47.95 to 57.32%) but some fish species were particularly rich in ω-3 and ω-6 especially eicosapentaenoic acid EPA (3.05%) and docosahexaenoic acid DHA (2.82%). The more the fishes were fats, the more they contained vitamin A, DHA and EPA. Vitamin A is particularly abundant in small fishes (250.10 μg RE/100 g) compare to big ones (13.77 μg RE/100 g) because they are consumed as a whole with their organs (liver) and head. However, the contents of heavy metal in some species are higher than the maximum permitted level (MPL) from codex alimentarius, especially Mn. The results obtained provided important information on the most interesting fish in term of human nutrition and the potential risk of contaminants. The fatty acids are important for child development and pregnant women. These data are useful for supply chain stakeholders and the people in charge of nutrition program.Keywords: fat-soluble vitamin, fatty acid, freshwater fish, lipid content, Tonle Sap Lake
Procedia PDF Downloads 1535595 Cyber Security in Nigeria: A Collaboration between Communities and Professionals
Authors: Alese Boniface K., Adu Michael K., Owa Victor K.
Abstract:
Security can be defined as the degree of resistance to, or protection from harm. It applies to any vulnerable and valuable assets, such as persons, dwellings, communities, nations or organizations. Cybercrime is any crime committed or facilitated via the Internet. It is any criminal activity involving computers and networks. It can range from fraud to unsolicited emails (spam). It includes the distant theft of government or corporate secrets through criminal trespass into remote systems around the globe. Nigeria like any other nations of the world is currently having their own share of the menace that has been used even as tools by terrorists. This paper is an attempt at presenting cyber security as an issue that requires a coordinated national response. It also acknowledges and advocates the key roles to be played by stakeholders and the importance of forging strong partnerships to prevent and tackle cybercrime in Nigeria.Keywords: security, cybercrime, internet, government, stakeholders, partnerships
Procedia PDF Downloads 5385594 Survey of Access Controls in Cloud Computing
Authors: Monirah Alkathiry, Hanan Aljarwan
Abstract:
Cloud computing is one of the most significant technologies that the world deals with, in different sectors with different purposes and capabilities. The cloud faces various challenges in securing data from unauthorized access or modification. Consequently, security risks and levels have greatly increased. Therefore, cloud service providers (CSPs) and users need secure mechanisms that ensure that data are kept secret and safe from any disclosures or exploits. For this reason, CSPs need a number of techniques and technologies to manage and secure access to the cloud services to achieve security goals, such as confidentiality, integrity, identity access management (IAM), etc. Therefore, this paper will review and explore various access controls implemented in a cloud environment that achieve different security purposes. The methodology followed in this survey was conducting an assessment, evaluation, and comparison between those access controls mechanisms and technologies based on different factors, such as the security goals it achieves, usability, and cost-effectiveness. This assessment resulted in the fact that the technology used in an access control affects the security goals it achieves as well as there is no one access control method that achieves all security goals. Consequently, such a comparison would help decision-makers to choose properly the access controls that meet their requirements.Keywords: access controls, cloud computing, confidentiality, identity and access management
Procedia PDF Downloads 1315593 Bioconcentration Analysis of Iodine Species in Seaweed (Eucheuma cottonii) from Maluku Marine as Alternative Food Source
Authors: Yeanchon H. Dulanlebit, Nikmans Hattu, Gloria Bora
Abstract:
Seaweed is a type of macro algae which are good source of iodine and have been widely used as food and nutrition supplement. One of iodine species that found in ocean plant is iodate. Analysis of iodate in seaweed (Eucheuma cottonii) from coastal area of Maluku has been done. The determination is done by using spectrophotometric method. Iodate in sample is reduced in excess of potassium iodide in the presence of acid solution, and then is reacted with starch to form blue complex. The study found out that the highest wavelength on determination of iodate species using spectrophotometer analysis method is 570 nm. Optimum value to yield maximum absorption is used in this research. Contents of iodate in seawater from coastal area of Ambon Island, Western Seram and Southeast Maluku are 0.2655, 0.2719 and 0.1760 mg/L, respectively. While in seaweeds from Ambon Island, Western Seram, Southeast Maluku-Taar, Ohoidertawun and Wab are 6.3122, 6.3293, 6.2333, 3.7406 and 4.4207 mg/kg in dry weight. Bioconcentration (enrichment) factor of iodate in seaweed (Eucheuma cottonii) from the three samples (cluster) is different; in Coastal area of Ambon Island, Western Seram and Southeast Maluku respectively are 23.78, 23.28 and 27.26.Keywords: bioconcentration, eucheuma cottonii, iodate, iodine, seaweed
Procedia PDF Downloads 2195592 Enhanced Visual Sharing Method for Medical Image Security
Authors: Kalaivani Pachiappan, Sabari Annaji, Nithya Jayakumar
Abstract:
In recent years, Information security has emerged as foremost challenges in many fields. Especially in medical information systems security is a major issue, in handling reports such as patients’ diagnosis and medical images. These sensitive data require confidentiality for transmission purposes. Image sharing is a secure and fault-tolerant method for protecting digital images, which can use the cryptography techniques to reduce the information loss. In this paper, visual sharing method is proposed which embeds the patient’s details into a medical image. Then the medical image can be divided into numerous shared images and protected by various users. The original patient details and medical image can be retrieved by gathering the shared images.Keywords: information security, medical images, cryptography, visual sharing
Procedia PDF Downloads 4145591 Adoption of Climate-Smart Agriculture Practices Among Farmers and Its Effect on Crop Revenue in Ethiopia
Authors: Fikiru Temesgen Gelata
Abstract:
Food security, adaptation, and climate change mitigation are all problems that can be resolved simultaneously with Climate-Smart Agriculture (CSA). This study examines determinants of climate-smart agriculture (CSA) practices among smallholder farmers, aiming to understand the factors guiding adoption decisions and evaluate the impact of CSA on smallholder farmer income in the study areas. For this study, three-stage sampling techniques were applied to select 230 smallholders randomly. Mann-Kendal test and multinomial endogenous switching regression model were used to analyze trends of decrease or increase within long-term temporal data and the impact of CSA on the smallholder farmer income, respectively. Findings revealed education level, household size, land ownership, off-farm income, climate information, and contact with extension agents found to be highly adopted CSA practices. On the contrary, erosion exerted a detrimental impact on all the agricultural practices examined within the study region. Various factors such as farming methods, the size of farms, proximity to irrigated farmlands, availability of extension services, distance to market hubs, and access to weather forecasts were recognized as key determinants influencing the adoption of CSA practices. The multinomial endogenous switching regression model (MESR) revealed that joint adoption of crop rotation and soil and water conservation practices significantly increased farm income by 1,107,245 ETB. The study recommends that counties and governments should prioritize addressing climate change in their development agendas to increase the adoption of climate-smart farming techniques.Keywords: climate-smart practices, food security, Oincome, MERM, Ethiopia
Procedia PDF Downloads 375590 Use of Indian Food Mascot Design as an Advertising Tool in Maintaining and Growing the Brand Name
Authors: Preeti Yadav, Dandeswar Bisoyi, Debkumar Chakrabarti
Abstract:
Mascots provide memories to viewers, and numerous promotional campaigns with different appearances, continue to trigger viewers and capture their interest. This study investigates the effect of Indian food mascot designs and influence on enhancing communication; thereby, building long-term brand recognition by the consumers. This paper presents a descriptive approach to Indian food mascot design as an advertising tool, and its research adopts a quantitative methodology. The study confirms that mascots have an ability to communicate a message in an effective manner; all though they are simple in terms of design and fashion trend, they have the capability to build positive reactions.Keywords: food mascot, brand recognitions, advertising, humour
Procedia PDF Downloads 1795589 Linguistic Codes: Food as a Class Indicator
Authors: Elena Valeryevna Pozhidaeva
Abstract:
This linguistic case study is based on an interaction between the social position and foodways. In every culture there is a social hierarchical system in which there can be means to express and to identify the social status of a person. Food serves as a class indicator. The British being a verbal nation use the words as a preferred medium for signalling and recognising the social status. The linguistic analysis reflects a symbolic hierarchy determined by social groups in the UK. The linguistic class indicators of a British hierarchical system are detectable directly – in speech acts. They are articulated in every aspect of a national identity’s life from preferences of the food and the choice to call it to the names of the meals. The linguistic class indicators can as well be detected indirectly – through symbolic meaning or via the choice of the mealtime, its class (e.g the classes of tea or marmalade), the place to buy food (the class of the supermarket) and consume it (the places for eating out and the frequency of such practices). Under analysis of this study are not only food items and their names but also such categories as cutlery as a class indicator and the act of eating together as a practice of social significance and a class indicator. Current social changes and economic developments are considered and their influence on the class indicators appearance and transformation.Keywords: linguistic, class, social indicator, English, food class
Procedia PDF Downloads 4035588 Diversity and Quality of Food Consumption Compared to Nutritional Status in Ages 15–17 Years Old in Jakarta
Authors: Andra Vidyarini
Abstract:
Adolescence is a transition period in which various changes occur, both biologically, intellectually and psychosocially. Changes in adolescents, one of which is a change in food consumption patterns that make adolescents vulnerable to nutritional problems that can affect their growth and health in the future. Nutritional problems in adolescents have increased from year to year and one of the causes is the low diversity and quality of consumption. The diversity and quality of consumption can be seen through the Individual Dietary Diversity Score and the Healthy Eating Index. Currently, in Indonesia, data on the diversity and quality of food consumption, especially among adolescents, are still scarce. In general, the purpose of this study is to describe the diversity and quality of adolescent food consumption and the relationship between the diversity and quality of food consumption with nutritional status. This study is a cross-sectional study by looking at the diversity and quality of consumption of adolescents aged 15-17 years. The total number of subjects in this study amounted to 70 teenagers. This research was conducted online via a google form. Data analysis in this study was univariate and bivariate. The results showed that the diversity of the subject's food consumption was in the diverse and very diverse category with an average of 6. However, the quality was still not good, whereas it was still in the bad and moderate categories with an average of 12.93. The nutritional status of the majority of the subjects was in the normal category and overweight to obese. The implementation of blended learning where there are still limited face-to-face meetings at school can be the reason why teenagers' food consumption is more diverse than when they are face-to-face schools. In addition, changes in people's diet during the pandemic also influenced the results of the study. The change in pattern is a change in eating habits to three times a day with menu choices ranging from rice, meat, fish, bean and vegetables. Analysis of the relationship between the diversity and quality of food consumption shows that the diversity of consumption has a significant relationship with the quality of food consumption with a p-value of 0.002 (p<0.05). Meanwhile, the diversity and quality of food consumption have no significant relationship with nutritional status, with p values 0.777 and 0.251 (>0.05), respectively. This shows that the diversity of food consumption is directly proportional to the quality of consumption, where if you have a variety of food consumption, the quality or in terms of portions and weight are also sufficient in accordance with the recommendations of PGRS.Keywords: healthy eating index (HEI), food diversity, quality of consumption, adolescent
Procedia PDF Downloads 1755587 Can Career Advancement and Job Security Act as Collaterals for Commitment? Evidence from the Hotel Industry of Malaysia
Authors: Aizzat Md. Nasurdin, Noor Hazlina Ahmad, Cheng Ling Tan
Abstract:
This study aims to examine the role of career advancement and job security as predictors of employee commitment to their organization. Data was collected from 580 frontline employees attached to two departments of 29 luxury hotels in Peninsular Malaysia. Statistical results using Partial Least Squares technique provided support for the proposed hypotheses. In view of the findings, theoretical and practical implications are discussed.Keywords: organizational commitment, career advancement, job security, frontline employees, luxury hotels, Malaysia
Procedia PDF Downloads 3925586 Scenarios of Societal Security and Business Continuity Cycles
Authors: Jiří F. Urbánek, Jiří Barta
Abstract:
Societal security, continuity scenarios, and methodological cycling approach understands in this article. Namely, societal security organizational challenges ask implementation of international standards BS 25999-2 and global ISO 22300 which is a family of standards for business continuity management system. Efficient global organization system is distinguished of high entity´s complexity, connectivity, and interoperability, having not only cooperative relations in a fact. Competing business have numerous participating ´enemies´, which are in apparent or hidden opponent and antagonistic roles with prosperous organization systems, resulting to a crisis scene or even to a battle theater. Organization business continuity scenarios are necessary for such ´a play´ preparedness, planning, management, and overmastering in real environments.Keywords: business continuity, societal security, crisis scenarios cycles, interoperability
Procedia PDF Downloads 3855585 Detentions in Kashmir: A Review of Impact of J&K PSA, 1978
Authors: Naseer Ahmad Bhat
Abstract:
Jammu and Kashmir Public Safety Act, 1978 provides for administrative detention in Jammu and Kashmir, a disputed region between India & Pakistan, since 1947. This paper shall critically analyse the working of PSA (Public Safety Act) in this J&K since 1978, since its inception. Detentions under this Act traverse between the security of the State and Liberty of citizens but over decades, has this Act served its purpose in Kashmir or not shall be analysed in this paper. J&K PSA is used to detain political workers, Over-Ground Workers and Stone Pelters who pose a direct threat to the ‘security of the State.’ Detentions under J&K PSA are a good measure in the hands of Security agencies to bring calm during periods of turmoil, but it has socio-economic consequences for detainees as well as families. This paper shall highlight the Socio-Economic impact of detentions under J&K PSA on individuals and families.Keywords: detentions, Kashmir, public safety act, liberty, security
Procedia PDF Downloads 2285584 Inhibitory Activity of Lactic Acid Bacteria on the Growth and Biogenic Amines Production by Foodborne Pathogens and Food Spoilage Bacteria
Authors: Abderrezzak khatib
Abstract:
Biogenic amines are low molecular weight nitrogenous compounds that have the potential to accumulate in food, posing a significant risk to food safety and human health. In this study, we investigated the inhibitory activity of three strains of lactic acid bacteria (LAB), against the growth and production of biogenic amines by both foodborne pathogens and food spoilage bacteria. The foodborne pathogens studied included Staphylococcus aureus, Pseudomonas aeruginosa, and Salmonella Paratyphi, while the food spoilage bacteria comprised Enterobacter cloacae and Proteus mirabilis. The methodology involved bacterial growth determination in petri dishes, bacterial culture extraction and derivatization, and biogenic amine analysis using HPLC. Our findings revealed that the inhibitory effects of LAB on these pathogens varied, with all three LAB strains demonstrating a remarkable reduction in the total bacterial count when combined with most pathogens, compared to the individual cultures of the pathogens. Furthermore, the presence of LAB in co-cultures with the pathogens resulted in a significant decrease in the production of tyramine and other biogenic amines by the pathogens themselves. These results suggest that LAB strains hold considerable promise in preventing the accumulation of biogenic amines in food products, thereby enhancing food safety. This study provides insights into the potential utilization of LAB in the context of preserving and ensuring the safety of food products. It highlights the significance of conducting additional research endeavors to elucidate the underlying mechanisms involved and to identify the precise bioactive compounds that are responsible for the observed inhibitory effects.Keywords: food safety, lactic acid bacteria, foodborne pathogens, food spoilage bacteria, biogenic amines, tyrosine
Procedia PDF Downloads 555583 Recent Nano technological Advancements in Antimicrobial Edible Films for Food Packaging: A Review
Authors: Raana Babadi Fathipour
Abstract:
Researchers are now focusing on sustainable advancements in active packaging systems to meet the growing consumer demand for high-quality food with Eco-friendly packaging. One significant advancement in this area is the inclusion of antimicrobial agents in bio-polymer-based edible films, which effectively inhibit or kill pathogenic/spoilage microbes that can contaminate food. This technology also helps reduce undesirable flavors caused by active compounds directly incorporated into the food. To further enhance the efficiency of antimicrobial bio-based packaging systems, Nano technological concepts such as bio-nano composites and Nano encapsulation systems have been applied. This review examines the current state and applications of antimicrobial biodegradable films in the food packaging industry, while also highlighting ongoing research on the use of nanotechnology to develop innovative bio-based packaging systems.Keywords: active packaging, antimicrobial edible films, bioactive agents, biopolymers, bio-nanocomposites
Procedia PDF Downloads 73