Search results for: food security indicators
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7275

Search results for: food security indicators

6525 Home-Based Care with Follow-Up at Outpatient Unit or Community-Follow-Up Center with/without Food Supplementation and/or Psychosocial Stimulation of Children with Moderate Acute Malnutrition in Bangladesh

Authors: Md Iqbal Hossain, Tahmeed Ahmed, Kenneth H. Brown

Abstract:

Objective: To assess the effect of community-based follow up, with or without food-supplementation and/or psychosocial stimulation, as an alternative to current hospital-based follow-up of children with moderate-acute-malnutrition (WHZ < -2 to -3) (MAM). Design/methods: The study was conducted at the ICDDR,B Dhaka Hospital and in four urban primary health care centers of Dhaka, Bangladesh during 2005-2007. The efficacy of five different randomly assigned interventions was compared with respect to the rate of completion of follow-up, growth and morbidity in 227 MAM children aged 6-24 months who were initially treated at ICDDR,B for diarrhea and/or other morbidities. The interventions were: 1) Fortnightly follow-up care (FFC) at the ICDDR,B’s outpatient-unit, including growth monitoring, health education, and micro-nutrient supplementation (H-C, n=49). 2) FFC at community follow-up unit (CNFU) [established in the existing urban primary health-care centers close to the residence of the child] but received the same regimen as H-C (C-C, n=53). 3) As per C-C plus cereal-based supplementary food (SF) (C-SF, n=49). The SF packets were distributed on recruitment and at every visit in CNFU [@1 packet/day for 6–11 and 2 packets/day for 12-24 month old children. Each packet contained 20g toasted rice-powder, 10g toasted lentil-powder, 5g molasses, and 3g soy bean oil, to provide a total of ~ 150kcal with 11% energy from protein]. 4) As per C-C plus psychosocial stimulation (PS) (C-PS, n=43). PS consisted of child-stimulation and parental-counseling conducted by trained health workers. 5) As per C-C plus both SF+PS (C-SF+PS, n=33). Results: A total of 227children (48.5% female), with a mean ± SD age of 12.6 ±3.8 months, and WHZ of - 2.53±0.28 enrolled. Baseline characteristics did not differ by treatment group. The rate of spontaneous attendance at scheduled follow-up visits gradually decreased in all groups. Follow-up attendance and gain in weight and length were greater in groups C-SF, C-SF+PS, and C-PS than C-C, and these indicators were observed least in H-C. Children in the H-C group more often suffered from diarrhea (25 % vs. 4-9%) and fever (28% vs. 8-11%) than other groups (p < 0.05). Children who attended at least five of the total six scheduled follow-up visits gained more in weight (median: 0.86 vs. 0.62 kg, p=0.002), length (median: 2.4 vs. 2.0 cm, p=0.009) than those who attended fewer. Conclusions: Community-based service delivery, especially including supplementary food with or without psychosocial stimulation, permits better rehabilitation of children with MAM compared to current hospital outpatients-based care. By scaling the community-based follow-up including food supplementation with or without psychosocial stimulation, it will be possible to rehabilitate a greater number of MAM children in a better way.

Keywords: community-based management, moderate acute malnutrition, psychosocial stimulation, supplementary food

Procedia PDF Downloads 417
6524 A Survey on Smart Security Mechanism Using Graphical Passwords

Authors: Aboli Dhanavade, Shweta Bhimnath, Rutuja Jumale, Ajay Nadargi

Abstract:

Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins.

Keywords: shoulder-surfing, security, authentication, text-passwords

Procedia PDF Downloads 349
6523 Distributed Key Management With Less Transmitted Messaged In Rekeying Process To Secure Iot Wireless Sensor Networks In Smart-Agro

Authors: Safwan Mawlood Hussien

Abstract:

Internet of Things (IoT) is a promising technology has received considerable attention in different fields such as health, industry, defence, and agro, etc. Due to the limitation capacity of computing, storage, and communication, IoT objects are more vulnerable to attacks. Many solutions have been proposed to solve security issues, such as key management using symmetric-key ciphers. This study provides a scalable group distribution key management based on ECcryptography; with less transmitted messages The method has been validated through simulations in OMNeT++.

Keywords: elliptic curves, Diffie–Hellman, discrete logarithm problem, secure key exchange, WSN security, IoT security, smart-agro

Procedia PDF Downloads 107
6522 A Survey on Genetic Algorithm for Intrusion Detection System

Authors: Prikhil Agrawal, N. Priyanka

Abstract:

With the increase of millions of users on Internet day by day, it is very essential to maintain highly reliable and secured data communication between various corporations. Although there are various traditional security imparting techniques such as antivirus software, password protection, data encryption, biometrics and firewall etc. But still network security has become the main issue in various leading companies. So IDSs have become an essential component in terms of security, as it can detect various network attacks and respond quickly to such occurrences. IDSs are used to detect unauthorized access to a computer system. This paper describes various intrusion detection techniques using GA approach. The intrusion detection problem has become a challenging task due to the conception of miscellaneous computer networks under various vulnerabilities. Thus the damage caused to various organizations by malicious intrusions can be mitigated and even be deterred by using this powerful tool.

Keywords: genetic algorithm (GA), intrusion detection system (IDS), dataset, network security

Procedia PDF Downloads 278
6521 Biodiversity of Pathogenic and Toxigenic Fungi Associated with Maize Grains Sampled across Egypt

Authors: Yasser Shabana, Khaled Ghoneem, Nehal Arafat, Younes Rashad, Dalia Aseel, Bruce Fitt, Aiming Qi, Benjamine Richard

Abstract:

Providing food for more than 100 million people is one of Egypt's main challenges facing development. The overall goal is to formulate strategies to enhance food security in light of population growth. Two hundred samples of maize grains from 25 governates were collected. For the detection of seed-borne fungi, the deep-freezing blotter method (DFB) and washing method (ISTA 1999) were used. A total of 41 fungal species was recovered from maize seed samples. Weather data from 30 stations scattered all over Egypt and covering the major maize growing areas were obtained. Canonical correspondence analysis of data for the obtained fungal genera with temperature, relative humidity, precipitation, wind speed, or solar radiation revealed that relative humidity, temperature and wind speed were the most influential weather variables.

Keywords: biodiversity, climate change, maize, seed-borne fungi

Procedia PDF Downloads 145
6520 The Impact of Improved Grain Storage Technology on Marketing Behaviour and Livelihoods of Maize Farmers: A Randomized Controlled Trial in Ethiopia

Authors: Betelhem M. Negede, Maarten Voors, Hugo De Groote, Bart Minten

Abstract:

Farmers in Ethiopia produce most of their own food during one agricultural season per year. Therefore, they need to use on-farm storage technologies to bridge the lean season and benefit from price arbitrage. Maize stored using traditional storage bags offer no protection from insects and molds, leading to high storage losses. In Ethiopia access to and use of modern storage technologies are still limited, restraining farmers to benefit from local maize price fluctuations. We used a randomized controlled trial among 871 maize farmers to evaluate the impacts of Purdue Improved Crop Storage (PICS) bags, also known as hermetic bags, on storage losses, and especially on behavioral changes with respect to consumption, marketing, and income among maize farmers in Ethiopia. This study builds upon the limited previous experimental research that has tried to understand farmers’ grain storage and post-harvest losses and identify mechanisms behind the persistence of these challenges. Our main hypothesis is that access to PICS bags allows farmers to increase production, storage and maize income. Also delay the length of maize storage, reduce maize post-harvest losses and improve their food security. Our results show that even though farmers received only three PICS bags that represent 10percent of their total maize stored, they delay their length of maize storage for sales by two weeks. However, we find no treatment effect on maize income, suggesting that the arbitrage of two weeks is too small. Also, we do not find any reduction in storage losses due to farmers’ reaction by selling early and by using cheap and readily available but potentially harmful storage chemicals. Looking at the heterogeneity treatment effects between the treatment variable and highland and lowland villages, we find a decrease in the percentage of maize stored by 4 percent in the highland villages. This confirms that location specific factors, such as agro-ecology and proximity to markets are important factors that influence whether and how much of the harvest a farmer stores. These findings highlight the benefits of hermetic storage bags, by allowing farmers to make inter-temporal arbitrage and by reducing potential health risks from storage chemicals. The main policy recommendation that emanates from our study is that postharvest losses reduction throughout the whole value chain is an important pathway to food and income security in Sub-Saharan Africa (SSA). However, future storage loss interventions with hermetic storage technologies should take into account the agro-ecology of the study area and quantify storage losses beyond farmers self-reported losses, such as the count and weigh method. Finally, studies on hermetic storage technologies indicate positive impacts on post-harvest losses and in improving food security, but the adoption and use of these technologies is currently still low in SSA. Therefore, future works on the scaling up of hermetic bags, should consider reasons why farmers only use PICS bags to store grains for consumption, which is usually related to a safety-first approach or due to lack of incentives (higher price from maize not treated with chemicals), and no grain quality check.

Keywords: arbitrage, PICS hermetic bags, post-harvest storage loss, RCT

Procedia PDF Downloads 118
6519 Advancing Energy Security Through Regional Cooperation in Southern Africa: An Assessment of the Challenges and Opportunities

Authors: Loide Sambo

Abstract:

Achieving energy security has, in the past few decades, become one of the main goals in the security agenda of every country around the world. For Southern African Countries (SAC) the aim is not different, yet these countries face a particular challenge in the pursuit of their energy security. More than just secure enough energy sources to fuel their industrial and societal needs, SAC have as well to ensure that they trade their rich energy resources to the global market in a way that promotes and safeguards their economic development objectives. Considering the relevance of this issue to the SAC, the present paper explores the possibility of these countries to achieve energy security through regional cooperation, under the Southern Africa Development Community (SADC) platform. It discusses the challenges and opportunities for advancing energy security in this region through cooperation. After analyzing the data through the documentary analysis method, it was found that regional cooperation among SAC to improve energy security is not effective since cooperation in the region is still very susceptible to a plethora of challenges, such as political instability, lack of development of infrastructure and expertise, lack of good governance, lack of sense of cohesiveness, and most important lack of political commitment. It was also found that significant commitment on regional cooperation had been centered on the electricity sub-sector due to the region’s huge electricity deficit. Thus less commitment is dedicated to the development and policy harmonization of the other sub-sectors such as the one of natural gas and oil, for instance. Hence, it is recommended that the leadership of the SAC is fully committed to cooperate and harmonize the policies, the strategic plans, as well as the infrastructure concerning to all the natural energy resources and its respective sub-sectors. This would provide the SAC significant leverage to negotiate for the energy market access, ensuring that the region’s energy commodities are traded, while the countries themselves retain enough energy to sustain their economic growth and development, improving, therefore, their energy security.

Keywords: regional cooperation, energy security, economic development, political commitment

Procedia PDF Downloads 234
6518 The Vulnerability of Farmers in Valencia Negros Oriental to Climate Change: El Niño Phenomenon and Malnutrition

Authors: J. K. Pis-An

Abstract:

Objective: The purpose of the study was to examine the vulnerability of farmers to the effects of climate change, specifically the El Niño phenomenon was felt in the Philippines in 2009-2010. Methods: KAP Survey determines behavioral response to vulnerability to the effects of El Niño. Body Mass Index: Dietary Assessment using 24-hour food recall. Results: 75% of the respondents claimed that crop significantly decreased during drought. Indications that households of farmers are large where 51.6% are composed of 6-10 family members with 68% annual incomes below Php 100,00. Anthropometric assessment showed that the prevalence of Chronic Energy Deficiency Grade 1 among females 17% and 28.57% for low normal. While male body mass index result for chronic energy deficiency grade 1 10%, low normal 18.33% and and obese grade 1, 31.67%. Dietary assessment of macronutrient intake of carbohydrates, protein, and fat 31.6 % among respondents are below recommended amounts. Micronutrient deficiency of calcium, iron, vit. A, thiamine, riboflavin, niacin, and Vit. C. Conclusion: Majority of the rural populations are engaged into farming livelihood that makes up the backbone of their economic growth. Placing the current nutritional status of the farmers in the context of food security, there are reasons to believe that the status will go for worse if the extreme climatic conditions will once again prevail in the region. Farmers rely primarily on home grown crops for their food supply, a reduction in farm production during drought is expected to adversely affect dietary intake. The local government therefore institute programs to increase food resiliency and to prioritize health of the population as the moving force for productivity and development.

Keywords: world health organization, united nation framework convention on climate change, anthropometric, macronutrient, micronutrient

Procedia PDF Downloads 430
6517 Investigation on Polymer Based Nano-Silver as Food Packaging Materials

Authors: A. M. Metak, T. T. Ajaal, Amal Metak, Tawfik Ajaal

Abstract:

Commercial nanocomposite food packaging type nano-silver containers were characterised using scanning electron microscopy (SEM) and energy-dispersive X-Ray spectroscopy (EDX). The presence of nanoparticles consistent with the incorporation of 1% nano-silver (Ag) and 0.1% titanium dioxide (TiO2) nanoparticle into polymeric materials formed into food containers was confirmed. Both nanomaterials used in this type of packaging appear to be embedded in a layered configuration within the bulk polymer. The dimensions of the incorporated nanoparticles were investigated using X-Ray diffraction (XRD) and determined by calculation using the Scherrer Formula; these were consistent with Ag and TiO2 nanoparticles in the size range 20-70nm both were spherical shape nanoparticles. Antimicrobial assessment of the nanocomposite container has also been performed and the results confirm the antimicrobial activity of Ag and TiO2 nanoparticles in food packaging containers. Migration assessments were performed in a wide range of food matrices to determine the migration of nanoparticles from the packages. The analysis was based on the relevant European safety directives and involved the application of inductively coupled plasma mass spectrometry (ICP-MS) to identify the range of migration risk. The data pertain to insignificance levels of migration of Ag and TiO2 nanoparticles into the selected food matrices.

Keywords: nano-silver, antimicrobial food packaging, migration, titanium dioxide

Procedia PDF Downloads 350
6516 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 92
6515 Volatile Organic Compounds from Decomposition of Local Food Waste and Potential Health Risk

Authors: Siti Rohana Mohd Yatim, Ku Halim Ku Hamid, Kamariah Noor Ismail, Zulkifli Abdul Rashid

Abstract:

The aim of this study is to investigate odour emission profiles from storage of food waste and to assess the potential health risk caused by exposure to volatile compounds. Food waste decomposition process was conducted for 14 days and kept at 20°C and 30°C in self-made bioreactor. VOCs emissions from both samples were collected at different stages of decomposition starting at day 0, day 1, day 3, day 5, day 7, day 10, day 12 and day 14. It was analyzed using TD-GC/MS. Findings showed that various VOCs were released during decomposition of food waste. Compounds produced were influenced by time, temperature and the physico-chemical characteristics of the compounds. The most abundant compound released was dimethyl disulfide. Potential health risk of exposure to this compound is represented by hazard ratio, HR, calculated at 1.6 x 1011. Since HR equal to or less than 1.0 is considered negligible risk, this indicates that the compound posed a potential risk to human health.

Keywords: volatile organic compounds, decomposition process, food waste, health risk

Procedia PDF Downloads 501
6514 Genetically Encoded Tool with Time-Resolved Fluorescence Readout for the Calcium Concentration Measurement

Authors: Tatiana R. Simonyan, Elena A. Protasova, Anastasia V. Mamontova, Eugene G. Maksimov, Konstantin A. Lukyanov, Alexey M. Bogdanov

Abstract:

Here, we describe two variants of the calcium indicators based on the GCaMP sensitive core and BrUSLEE fluorescent protein (GCaMP-BrUSLEE and GCaMP-BrUSLEE-145). In contrast to the conventional GCaMP6-family indicators, these fluorophores are characterized by the well-marked responsiveness of their fluorescence decay kinetics to external calcium concentration both in vitro and in cellulo. Specifically, we show that the purified GCaMP-BrUSLEE and GCaMP-BrUSLEE-145 exhibit three-component fluorescence decay kinetics, with the amplitude-normalized lifetime component (t3*A3) of GCaMP-BrUSLEE-145 changing four-fold (500-2000 a.u.) in response to a Ca²⁺ concentration shift in the range of 0—350 nM. Time-resolved fluorescence microscopy of live cells displays the two-fold change of the GCaMP-BrUSLEE-145 mean lifetime upon histamine-stimulated calcium release. The aforementioned Ca²⁺-dependence calls considering the GCaMP-BrUSLEE-145 as a prospective Ca²⁺-indicator with the signal read-out in the time domain.

Keywords: calcium imaging, fluorescence lifetime imaging microscopy, fluorescent proteins, genetically encoded indicators

Procedia PDF Downloads 136
6513 Cyber Security Situational Awareness among Students: A Case Study in Malaysia

Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa

Abstract:

This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.

Keywords: cyber security awareness, cyber security education, cyber security, school students

Procedia PDF Downloads 284
6512 Behavior on Nutritious Food: An Analysis of Newly Affluent Millionaire of Kathmandu Valley, Nepal

Authors: Babita Adhikari

Abstract:

There is a general assumption that affluent people consume a variety of balanced nutritious foods on a regular basis, such as fruits, whole grains, lean meat, nuts, and fresh vegetables, because they have greater affordability and market accessibility. A simple random sampling technique and an open-ended questionnaire were used for this study. Findings showed that high socioeconomic status (SES) people in Kathmandu were more concerned with expensive foods, fruits, and vegetables, regardless of their nutrient content. New millionaire groups in Kathmandu are aware of the importance of nutrition and healthy well-being, but their purchasing and consumption habits differ from general perceptions as they learn about fast-food and restaurant culture. On the home front, they buy, cook, and eat expensive foods but are unaware of their nutrient contents. The study critically examines attributes that influence purchase decisions for nutritious and healthy foods in Kathmandu. Despite the fact that a significant amount of literature helps to comprehend that food has to be good in taste, healthy, and affordable, the major driver of food purchases is still the desire to consume.

Keywords: nutritious food, consumer behavior, nutrition, food behavior

Procedia PDF Downloads 53
6511 The Potential of ‘Comprehensive Assessment System for Built Environment Efficiency for Cities’ in Developing Country: Evidence of Myanmar

Authors: Theingi Shwe, Riken Homma, Kazuhisa Iki, Juko Ito

Abstract:

The growing cities of the developing country are characterized by rapid growth and poor infrastructure management inviting and accelerating relative environmental problems. Even though the movements of the sustainability had already been developed around the world, it is still increasing in the developing countries to plant sustainable practices. Aligned with the sustainable development actions, many sustainable assessment tools are also developed to rate and evaluate the sustainability performances through the building to community level. Among them, CASBEE is developed by Japanese organizations and is recognized as one of the international well-known assessment tools. The main purpose of the study is to find out the potential of CASBEE tool reflecting sustainability city level performances in developing countries. The research framework was designed with three major phases: Quantitative Approach, Qualitative Approach and Evaluation Reflection. The first two approaches were based on the investigation of tool’s contents and indicators by means of three sustainable dimensions and sustainability categories. To know the reality and reflection on developing country, Pathein City from Myanmar was selected and evaluated by 2012 version of CASBEE for Cities. The evaluation practices went through assigned indicators and the evaluation outcome presents the performances of Pathein city’s environmental efficiency as a very good in current conditions. The results of this study indicate that the indicators of this tool have balance coverage among three dimensions of sustainability but it has not yet counted enough for some indicators like location, infrastructure and institution which are relative to society dimension. In the developing countries’ cities, the most critical issues on development such as affordable housing and heritage preservation which are already planted in Pathein City but the tool does not account for those issues. Moreover, in some of the indicators, the benchmark and the weighting coefficient are strongly linked to the system birth region. By means of this study, it can be stated that CASBEE for Cities would be potential for delivering sustainable city level development in developing country especially in Myanmar along with further inclusion of the indicators.

Keywords: assessment tool, CASBEE, developing country, Myanmar, Pathein city, sustainable development

Procedia PDF Downloads 245
6510 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 343
6509 Prevalence of Obesity in Kuwait: A Case Study among Kuwait University Students

Authors: Mohammad Alnasrallah, Muhammad Almatar

Abstract:

This study seeks to understand the relationship between the effect of geography and obesity prevalence among Kuwait University students. The sample involved 735 participants, 231 male, and 504 females, where there is a high percentage of them are overweight and obese. The percentage of overweight is 21% (BMI >25 - 30) while the percentage of obesity is 13.7% (BMI > 30). Both overweight and obese people account for 34.7%. In the study area, there are 327 fast food restaurants located in different places of in the urban area. This study uses the Geographic Information System to analyze the distribution of obesity and fast food restaurants. The study found that within half kilometers of fast food outlets, there are 33% of normal weight (BMI < 25), 30% of overweight while for the obese people there are 43 %, which shows that obesity is linked to the location of fast food restaurants. One of the significant tools that were used in this study hot and cold spots. The study found that areas of hot spots of fast food restaurants tend to be located in areas of hot spots of obese people. In conclusion, studying the prevalence of obesity from geographical perspective help to understand this public health issue and its relation to the effect of geography.

Keywords: obesity prevalence, GIS, fast food, Kuwait

Procedia PDF Downloads 193
6508 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 36
6507 Utilization of Biodiversity of Peaces Herbals Used as Food and Treat the Path of Economic Phu Sing District in Sisaket Province Thailand

Authors: Nopparet Thammasaranyakun

Abstract:

This research objects are: 1: To study the biodiversity of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. 2: To study the use of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. 3: To provide a database of information on biodiversity for food and medicinal plants and medicinal tourism economies along the Phu Sing district Sisaket province. 4: Learn to create a biodiversity of medicinal plants used as food and treatment by Journeys economic Phu Sing district Sisaket province Boundaries used in this study was the Phu Sing district. Population and Agricultural Development Center, rayong Mun due to the initiative for youth Local, Government Health officials, community leaders, teachers, students, schools, the local people and tourists. Sage wisdom to know the herbs and women's groups, OTOP Phu Sing district in SiisaKet province. By selecting the specific data that way. The process of participatory action research (PAR) is a community-based research. The method of collecting qualitative data. (Qualitative) tool is used from context, Community areas, interview and Taped recordings. Observation and focus group data was statistically analyzed using descriptive statistics (Descriptive Statistics). The results findings: 1- A study of the biodiversity of plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. Were used in the dry season and the rainy season find the medicinal plants of 251 species 41 types of drugs. 2- The study utilized medicinal plants used as food and the treatment of indigenous Phu Sing Sisaket province. Found 251 species have medicinal properties that are used for food and medicinal purposes 41 types of drugs. 3- Of the database technology of biodiversity for food and medicinal plants used by local treatment Phu Sing district Sisaket province. A data base of 251 medicinal species 41 types of drugs is used for food and medicinal properties Sisaket province. 4- learning the biodiversity of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province.

Keywords: utilization of biodiversity, peaces herbals, used as Food, Sing district, sisaket

Procedia PDF Downloads 339
6506 Occurrence of Foreign Matter in Food: Applied Identification Method - Association of Official Agricultural Chemists (AOAC) and Food and Drug Administration (FDA)

Authors: E. C. Mattos, V. S. M. G. Daros, R. Dal Col, A. L. Nascimento

Abstract:

The aim of this study is to present the results of a retrospective survey on the foreign matter found in foods analyzed at the Adolfo Lutz Institute, from July 2001 to July 2015. All the analyses were conducted according to the official methods described on Association of Official Agricultural Chemists (AOAC) for the micro analytical procedures and Food and Drug Administration (FDA) for the macro analytical procedures. The results showed flours, cereals and derivatives such as baking and pasta products were the types of food where foreign matters were found more frequently followed by condiments and teas. Fragments of stored grains insects, its larvae, nets, excrement, dead mites and rodent excrement were the most foreign matter found in food. Besides, foreign matters that can cause a physical risk to the consumer’s health such as metal, stones, glass, wood were found but rarely. Miscellaneous (shell, sand, dirt and seeds) were also reported. There are a lot of extraneous materials that are considered unavoidable since are something inherent to the product itself, such as insect fragments in grains. In contrast, there are avoidable extraneous materials that are less tolerated because it is preventable with the Good Manufacturing Practice. The conclusion of this work is that although most extraneous materials found in food are considered unavoidable it is necessary to keep the Good Manufacturing Practice throughout the food processing as well as maintaining a constant surveillance of the production process in order to avoid accidents that may lead to occurrence of these extraneous materials in food.

Keywords: extraneous materials, food contamination, foreign matter, surveillance

Procedia PDF Downloads 344
6505 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 65
6504 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community

Authors: Christantus Begealawuh Nchongayi

Abstract:

As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.

Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security

Procedia PDF Downloads 200
6503 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework

Authors: Husnil Khatimah, Fairol Halim

Abstract:

This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.

Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper

Procedia PDF Downloads 436
6502 Translation of the Bible into the Yoruba Language: A Functionalist Approach in Resolving Cultural Problems

Authors: Ifeoluwa Omotehinse Oloruntoba

Abstract:

Through comparative and causal models of translation, this paper examined the translation of ‘bread’ into the Yoruba language in three Yoruba versions of the Bible: Bibeli Yoruba Atoka (YBA), Bibeli Mimo ni Ede Yoruba Oni (BMY) and Bibeli Mimo (BM). In biblical times, bread was a very important delicacy that it was synonymous with food in general and in the Bible, bread sometimes refers to a type of food (a mixture of flour, water, and yeast that is baked) or food in general. However, this is not the case in the Yoruba culture. In fact, some decades ago, bread was not known in Nigeria and had no name in the Yoruba language until the 1900s when it was codified as burẹdi in Yoruba, a term borrowed from English and transliterated. Nevertheless, in Nigeria presently, bread is not a special food and it is not appreciated or consumed like in the West. This makes it difficult to translate bread in the Bible into Yoruba. From an investigation on the translation of this term, it was discovered that bread which has 330 occurrences in the English Bible translation (King James) has few occurrences in the three Yoruba Bible versions. In the first version (YBA) published in the 1880s, where bread is synonymous with food in general, it is mostly translated as oúnjẹ (food) or the verb jẹ (to eat), revealing that something is eaten but not indicating what it is. However, when the bread is a type of food, it is rendered as akara, a special delicacy of the Yoruba people made from beans flour. In the later version (BMY) published in the 1990s, bread as food, in general, is also mainly translated as oúnjẹ or the verb jẹ, but when it is a type of food, it is translated as akara with few occurrences of burẹdi. In the latest edition (BM), bread as food is either rendered as ounje or literally translated as burẹdi. Where it is a type of food in this version, it is mainly rendered as burẹdi with few occurrences of akara, indicating the assimilation of bread into the Yoruba culture. This result, although limited, shows that the Bible was translated into Yoruba to make it accessible to Yoruba speakers in their everyday language, hence the application of both domesticating and foreignising strategies. This research also emphasizes the role of the translator as an intermediary between two cultures.

Keywords: translation, Bible, Yoruba, cultural problems

Procedia PDF Downloads 250
6501 Food Insecurity and Mental Health among Adolescents in Southwest Ethiopia: Structural Equation Modeling Analysis

Authors: Mulusew G. Jebena, David Lindstrom, Tefera Belachew, Craig Hadley, Carl Lachat, Patrick Kolsteren

Abstract:

Background: The biological and psychosocial consequence of food insecurity on physical health and nutritional status has been reported. But, its effect on mental health during adolescence remains unexplored. Thus, the main aim of this analysis is to examine the mechanism by which food insecurity is linked to mental health among adolescents living in Jimma, Southwest Ethiopia. Methods: We used data from third round observation of Jimma Longitudinal Family and Youth Survey (JLFSY). A total of 1,521 adolescents included for the main analysis. Food insecurity was measured using 5-items scale and The Self Reporting Questionnaire (SRQ-20) was used to measure mental distress. Structural equation modeling analysis was done using maximum likelihood estimation method. Model diagnostics test was reported. All p values were two tailed and P value ≤ 0.05 was used to determine statistical significance. Results: The prevalence of mental distress was 20.8%, 95% CI: (18.8, 22.9). After adjusted for covariates, the final model depicts food insecurity was associated with adolescent mental distress (β=.324). This analysis showed 94.1% of the effect of food insecurity on mental distress is direct. By contrast, 5.9% of the food insecurity effect is mediated by physical health. In addition, Self-rated health (β=.356), socioeconomic status (β=-.078) parental educational (β= .170), living in urban (β= .193) and female headed household (β=.205) were associated with adolescent mental distress. Conclusions: This finding highlights the direct effect of food insecurity on adolescent mental distress. Therefore, any intervention aimed to improve mental distress of adolescents should consider strategies to improve access to sufficient, safe, and nutritious food. Beside this, prevention of underlying factors such as psychosomatic health illness and improving socio economic status is also very critical. Furthermore longitudinal relationship of the long term effect of food insecurity on mental health should be investigated.

Keywords: adolescent, Ethiopia, food insecurity, mental health

Procedia PDF Downloads 578
6500 Muslim Consumer Purchase Behavior on Doubtful Halal Packed Food

Authors: Aliffaizi Arsat, Nur Ida Fatihah, Che Shalifullizam

Abstract:

Malaysia is well known as a Muslim country and is quickly becoming a Global Halal-hub of Halal business in promoting Halal food products in both Muslim countries and non-Muslim countries. The objective of this study is to analyse the Muslim consumer purchased behaviour on doubtful Halal packed food by using theory of planned behaviour, to examine the mediating effects between certification, and Muslim consumer purchased behaviour on doubtful Halal packed food. The relevant questionnaires have been distributed in Kuala Selangor. Among the 300 Muslim participants from Kuala Selangor, Selangor, Malaysia, only 107 of them have returned the questionnaire with complete answers. The respondent’s rate was discovered to be at 35.67%. The data have been analysed by using SPSS version 22 and Structural equation modelling Partial Least Square SEM-PLS. There are three dimensions needed to identify Muslim consumer purchased behaviour on doubtful Halal packed food. They are attitude towards behaviour, subjective norm and perceived behavioural. All the results from this study show that the hypothesis has been supported. However, subjective norm had shown that there is a negative relationship towards Muslim consumer purchased behaviour on doubtful Halal packed food.

Keywords: Muslim consumer purchase behaviour, theory planned behaviour, doubtful Halal, certification

Procedia PDF Downloads 321
6499 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: electricity, energy policy, energy security, Malaysia

Procedia PDF Downloads 289
6498 Investigation of Anatomical Components of Mosques with the Approach of Attention to Islamic Wisdom

Authors: Farshad Negintaji, Hamid Reza Zeraat Pisheh, Mahshid Ghanea, Zahra Khalifeh, Mohammad Bagher Rahami

Abstract:

This study has been examined the anatomical components of mosques with the approach of attending to Islamic wisdom and investigated the distinction between the anatomical design of mosques (traditional and modern) by considering the category of perception in Islamic architecture. To this end, this article by reviewing the theoretical and empirical literature of mosques' anatomy and the role of anatomy on the architectural design of Iranian mosques by examining the quantitative and qualitative indicators and in order to understand and identify the anatomy of mosques, indicators such as: entrance, portico, minarets, domes, bedchamber and pool have been used. The aim of this study has been to investigate materials, the functional properties, technology, sizes and fitness of (traditional and modern) mosques. For this purpose, a questionnaire was prepared in which the anatomical and spiritual elements of the mosque shape have been questioned. Research is related to field and is of descriptive, analytical and inferential type and quantitative and qualitative indicators have been examined.

Keywords: Islamic wisdom, Islamic architecture, mosque anatomy, the minaret, dome, bedchamber, entrance, pool, perception

Procedia PDF Downloads 407
6497 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 301
6496 Monitoring and Evaluation of Web-Services Quality and Medium-Term Impact on E-Government Agencies' Efficiency

Authors: A. F. Huseynov, N. T. Mardanov, J. Y. Nakhchivanski

Abstract:

This practical research is aimed to improve the management quality and efficiency of public administration agencies providing e-services. The monitoring system developed will provide continuous review of the websites compliance with the selected indicators, their evaluation based on the selected indicators and ranking of services according to the quality criteria. The responsible departments in the government agencies were surveyed; the questionnaire includes issues of management and feedback, e-services provided, and the application of information systems. By analyzing the main affecting factors and barriers, the recommendations will be given that lead to the relevant decisions to strengthen the state agencies competencies for the management and the provision of their services. Component 1. E-services monitoring system. Three separate monitoring activities are proposed to be executed in parallel: Continuous tracing of e-government sites using built-in web-monitoring program; this program generates several quantitative values which are basically related to the technical characteristics and the performance of websites. The expert assessment of e-government sites in accordance with the two general criteria. Criterion 1. Technical quality of the site. Criterion 2. Usability/accessibility (load, see, use). Each high-level criterion is in turn subdivided into several sub-criteria, such as: the fonts and the color of the background (Is it readable?), W3C coding standards, availability of the Robots.txt and the site map, the search engine, the feedback/contact and the security mechanisms. The on-line survey of the users/citizens – a small group of questions embedded in the e-service websites. The questionnaires comprise of the information concerning navigation, users’ experience with the website (whether it was positive or negative), etc. Automated monitoring of web-sites by its own could not capture the whole evaluation process, and should therefore be seen as a complement to expert’s manual web evaluations. All of the separate results were integrated to provide the complete evaluation picture. Component 2. Assessment of the agencies/departments efficiency in providing e-government services. - the relevant indicators to evaluate the efficiency and the effectiveness of e-services were identified; - the survey was conducted in all the governmental organizations (ministries, committees and agencies) that provide electronic services for the citizens or the businesses; - the quantitative and qualitative measures are covering the following sections of activities: e-governance, e-services, the feedback from the users, the information systems at the agencies’ disposal. Main results: 1. The software program and the set of indicators for internet sites evaluation has been developed and the results of pilot monitoring have been presented. 2. The evaluation of the (internal) efficiency of the e-government agencies based on the survey results with the practical recommendations related to the human potential, the information systems used and e-services provided.

Keywords: e-government, web-sites monitoring, survey, internal efficiency

Procedia PDF Downloads 284