Search results for: food and nutrition security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6332

Search results for: food and nutrition security

5552 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security

Authors: Yael Deutsch, Arieh Gavious

Abstract:

The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.

Keywords: game theory, profiling, security, nash equilibrium

Procedia PDF Downloads 109
5551 Prevalence of Obesity in Kuwait: A Case Study among Kuwait University Students

Authors: Mohammad Alnasrallah, Muhammad Almatar

Abstract:

This study seeks to understand the relationship between the effect of geography and obesity prevalence among Kuwait University students. The sample involved 735 participants, 231 male, and 504 females, where there is a high percentage of them are overweight and obese. The percentage of overweight is 21% (BMI >25 - 30) while the percentage of obesity is 13.7% (BMI > 30). Both overweight and obese people account for 34.7%. In the study area, there are 327 fast food restaurants located in different places of in the urban area. This study uses the Geographic Information System to analyze the distribution of obesity and fast food restaurants. The study found that within half kilometers of fast food outlets, there are 33% of normal weight (BMI < 25), 30% of overweight while for the obese people there are 43 %, which shows that obesity is linked to the location of fast food restaurants. One of the significant tools that were used in this study hot and cold spots. The study found that areas of hot spots of fast food restaurants tend to be located in areas of hot spots of obese people. In conclusion, studying the prevalence of obesity from geographical perspective help to understand this public health issue and its relation to the effect of geography.

Keywords: obesity prevalence, GIS, fast food, Kuwait

Procedia PDF Downloads 215
5550 Cyber Security Situational Awareness among Students: A Case Study in Malaysia

Authors: Yunos Zahri, Ab Hamid R. Susanty, Ahmad Mustaffa

Abstract:

This paper explores the need for a national baseline study on understanding the level of cyber security situational awareness among primary and secondary school students in Malaysia. The online survey method was deployed to administer the data collection exercise. The target groups were divided into three categories: Group 1 (primary school aged 7-9 years old), Group 2 (primary school aged 10-12 years old), and Group 3 (secondary school aged 13-17 years old). A different questionnaire set was designed for each group. The survey topics/areas included Internet and digital citizenship knowledge. Respondents were randomly selected from rural and urban areas throughout all 14 states in Malaysia. A total of 9,158 respondents participated in the survey, with most states meeting the minimum sample size requirement to represent the country’s demographics. The findings and recommendations from this baseline study are fundamental to develop teaching modules required for children to understand the security risks and threats associated with the Internet throughout their years in school. Early exposure and education will help ensure healthy cyber habits among millennials in Malaysia.

Keywords: cyber security awareness, cyber security education, cyber security, school students

Procedia PDF Downloads 302
5549 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 358
5548 Monitoring of Sustainability of Extruded Soya Product TRADKON SPC-TEX in Order to Define Expiration Date

Authors: Radovan Čobanović, Milica Rankov Šicar

Abstract:

New attitudes about nutrition impose new styles, and therefore a neNew attitudes about nutrition impose new styles, and therefore a new kind of food. The goal of our work was to define the shelf life of new extruded soya product with minimum 65% of protein based on the analyses. According to the plan it was defined that a certain quantity of the same batch of new product (soybean flakes) which had predicted shelf life of 2 years had to be stored for 24 months in storage and analyzed at the beginning and end of sustainability plan on instrumental analyses (heavy metals, pesticides and mycotoxins) and every month on sensory analyses (odor, taste, color, consistency), microbiological analyses (Salmonella spp., Escherichia coli, Enterobacteriaceae, sulfite-reducing clostridia, Listeria monocytogenes), chemical analyses (protein, ash, fat, crude cellulose, granulation) and at the beginning on GMO analyses. All analyses were tested according to: sensory analyses ISO 6658, Salmonella spp ISO 6579, Escherichia coli ISO 16649-2, Enterobacteriaceae ISO 21528-2, sulfite-reducing clostridia ISO 15213 and Listeria monocytogenes ISO 11290-2, chemical and instrumental analyses Serbian ordinance on the methods of physico-chemical analyses and GMO analyses JRC Compendium. The results obtained after the analyses which were done according to the plan during the 24 months indicate that are no changes of products concerning both sensory and chemical analyses. As far as microbiological results are concerned Salmonella spp was not detected and all other quantitative analyses showed values <10 cfu/g. The other parameters for food safety (heavy metals, pesticides and mycotoxins) were not present in analyzed samples and also all analyzed samples were negative concerning genetic testing. On the basis of monitoring the sample under defined storage conditions and analyses of quality control, GMO analyses and food safety of the sample during the shelf within two years, the results showed that all the parameters of the sample during defined period is in accordance with Serbian regulative so that indicate that predicted shelf life can be adopted.w kind of food. The goal of our work was to define the shelf life of new extruded soya product with minimum 65% of protein based on the analyses. According to the plan it was defined that a certain quantity of the same batch of new product (soybean flakes) which had predicted shelf life of 2 years had to be stored for 24 months in storage and analyzed at the beginning and end of sustainability plan on instrumental analyses (heavy metals, pesticides and mycotoxins) and every month on sensory analyses (odor, taste, color, consistency), microbiological analyses (Salmonella spp., Escherichia coli, Enterobacteriaceae, sulfite-reducin clostridia, Listeria monocytogenes), chemical analyses (protein, ash, fat, crude cellulose, granulation) and at the beginning on GMO analyses. All analyses were tested according: sensory analyses ISO 6658, Salmonella spp ISO 6579, Escherichia coli ISO 16649-2, Enterobacteriaceae ISO 21528-2, sulfite-reducing clostridia ISO 15213 and Listeria monocytogenes ISO 11290-2, chemical and instrumental analyses Serbian ordinance on the methods of physico-chemical analyses and GMO analyses JRC Compendium. The results obtained after the analyses which were done according to the plan during the 24 months indicate that are no changes of products concerning both sensory and chemical analyses. As far as microbiological results are concerned Salmonella spp was not detected and all other quantitative analyses showed values <10 cfu/g. The other parameters for food safety (heavy metals, pesticides and mycotoxins) were not present in analyzed samples and also all analyzed samples were negative concerning genetic testing. On the basis of monitoring the sample under defined storage conditions and analyses of quality control, GMO analyses and food safety of the sample during the shelf within two years, the results showed that all the parameters of the sample during defined period is in accordance with Serbian regulative so that indicate that predicted shelf life can be adopted.

Keywords: extruded soya product, food safety analyses, GMO analyses, shelf life

Procedia PDF Downloads 296
5547 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 51
5546 Utilization of Biodiversity of Peaces Herbals Used as Food and Treat the Path of Economic Phu Sing District in Sisaket Province Thailand

Authors: Nopparet Thammasaranyakun

Abstract:

This research objects are: 1: To study the biodiversity of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. 2: To study the use of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. 3: To provide a database of information on biodiversity for food and medicinal plants and medicinal tourism economies along the Phu Sing district Sisaket province. 4: Learn to create a biodiversity of medicinal plants used as food and treatment by Journeys economic Phu Sing district Sisaket province Boundaries used in this study was the Phu Sing district. Population and Agricultural Development Center, rayong Mun due to the initiative for youth Local, Government Health officials, community leaders, teachers, students, schools, the local people and tourists. Sage wisdom to know the herbs and women's groups, OTOP Phu Sing district in SiisaKet province. By selecting the specific data that way. The process of participatory action research (PAR) is a community-based research. The method of collecting qualitative data. (Qualitative) tool is used from context, Community areas, interview and Taped recordings. Observation and focus group data was statistically analyzed using descriptive statistics (Descriptive Statistics). The results findings: 1- A study of the biodiversity of plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. Were used in the dry season and the rainy season find the medicinal plants of 251 species 41 types of drugs. 2- The study utilized medicinal plants used as food and the treatment of indigenous Phu Sing Sisaket province. Found 251 species have medicinal properties that are used for food and medicinal purposes 41 types of drugs. 3- Of the database technology of biodiversity for food and medicinal plants used by local treatment Phu Sing district Sisaket province. A data base of 251 medicinal species 41 types of drugs is used for food and medicinal properties Sisaket province. 4- learning the biodiversity of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province.

Keywords: utilization of biodiversity, peaces herbals, used as Food, Sing district, sisaket

Procedia PDF Downloads 358
5545 Occurrence of Foreign Matter in Food: Applied Identification Method - Association of Official Agricultural Chemists (AOAC) and Food and Drug Administration (FDA)

Authors: E. C. Mattos, V. S. M. G. Daros, R. Dal Col, A. L. Nascimento

Abstract:

The aim of this study is to present the results of a retrospective survey on the foreign matter found in foods analyzed at the Adolfo Lutz Institute, from July 2001 to July 2015. All the analyses were conducted according to the official methods described on Association of Official Agricultural Chemists (AOAC) for the micro analytical procedures and Food and Drug Administration (FDA) for the macro analytical procedures. The results showed flours, cereals and derivatives such as baking and pasta products were the types of food where foreign matters were found more frequently followed by condiments and teas. Fragments of stored grains insects, its larvae, nets, excrement, dead mites and rodent excrement were the most foreign matter found in food. Besides, foreign matters that can cause a physical risk to the consumer’s health such as metal, stones, glass, wood were found but rarely. Miscellaneous (shell, sand, dirt and seeds) were also reported. There are a lot of extraneous materials that are considered unavoidable since are something inherent to the product itself, such as insect fragments in grains. In contrast, there are avoidable extraneous materials that are less tolerated because it is preventable with the Good Manufacturing Practice. The conclusion of this work is that although most extraneous materials found in food are considered unavoidable it is necessary to keep the Good Manufacturing Practice throughout the food processing as well as maintaining a constant surveillance of the production process in order to avoid accidents that may lead to occurrence of these extraneous materials in food.

Keywords: extraneous materials, food contamination, foreign matter, surveillance

Procedia PDF Downloads 359
5544 Determinants of Child Malnutrition in Sub-Saharan Africa

Authors: Habtamu Fufa, Yemane Berhane

Abstract:

Child under nutrition has long-term consequences for intellectual ability, economic productivity, reproductive performance and susceptibility to metabolic and cardiovascular disease. The unacceptably high prevalence of malnutrition in young children of the region has not changed much over the last decades, which could make the achievement of the corresponding Millennium Development Goals very unlikely. Despite the well-documented problems of child malnutrition in Sub-Saharan Africa, there is few systematic review of evidences on determinants of child malnutrition in the region. The current available evidence on determinants of child under nutrition in Sub-Saharan Africa is systematically reviewed. The method used in searching relevant literature was using bio medical databases PUBMED, Google scholar and the website of the World Health Organization on nutrition using the following key words: "Determinants “, "Child Malnutrition", and "Sub- Saharan Africa". The search was limited to articles published in and after 1995 up to date. In all the reviewed articles, the data were analyzed using multivariate regression analysis and or odds ratios for significance of determinants in child malnutrition. Synthesis of 40 published articles from various countries of the region is done and noted that household economic status, maternal education, disease, breastfeeding practices, age and sex of a child, birth interval and residential areas were found to be determinants of child under nutrition. Poverty remains the main factor of malnutrition in Sub-Saharan Africa and poor education of parents aggravates the malnutrition through perpetuation of poor nutrition practices. Male children under five years are the most affected ones. Understanding of these determinants of poor nutritional attainment would provide insights in designing interventions for reducing the high levels of child malnutrition in this region. Large-scale multi-sectoral community-based interventions are urgently needed for a sustainable improvement of child nutritional & health status in Sub-Saharan Africa.

Keywords: child malnutrition, determinants, Sub-Saharan Africa, health status

Procedia PDF Downloads 479
5543 Translation of the Bible into the Yoruba Language: A Functionalist Approach in Resolving Cultural Problems

Authors: Ifeoluwa Omotehinse Oloruntoba

Abstract:

Through comparative and causal models of translation, this paper examined the translation of ‘bread’ into the Yoruba language in three Yoruba versions of the Bible: Bibeli Yoruba Atoka (YBA), Bibeli Mimo ni Ede Yoruba Oni (BMY) and Bibeli Mimo (BM). In biblical times, bread was a very important delicacy that it was synonymous with food in general and in the Bible, bread sometimes refers to a type of food (a mixture of flour, water, and yeast that is baked) or food in general. However, this is not the case in the Yoruba culture. In fact, some decades ago, bread was not known in Nigeria and had no name in the Yoruba language until the 1900s when it was codified as burẹdi in Yoruba, a term borrowed from English and transliterated. Nevertheless, in Nigeria presently, bread is not a special food and it is not appreciated or consumed like in the West. This makes it difficult to translate bread in the Bible into Yoruba. From an investigation on the translation of this term, it was discovered that bread which has 330 occurrences in the English Bible translation (King James) has few occurrences in the three Yoruba Bible versions. In the first version (YBA) published in the 1880s, where bread is synonymous with food in general, it is mostly translated as oúnjẹ (food) or the verb jẹ (to eat), revealing that something is eaten but not indicating what it is. However, when the bread is a type of food, it is rendered as akara, a special delicacy of the Yoruba people made from beans flour. In the later version (BMY) published in the 1990s, bread as food, in general, is also mainly translated as oúnjẹ or the verb jẹ, but when it is a type of food, it is translated as akara with few occurrences of burẹdi. In the latest edition (BM), bread as food is either rendered as ounje or literally translated as burẹdi. Where it is a type of food in this version, it is mainly rendered as burẹdi with few occurrences of akara, indicating the assimilation of bread into the Yoruba culture. This result, although limited, shows that the Bible was translated into Yoruba to make it accessible to Yoruba speakers in their everyday language, hence the application of both domesticating and foreignising strategies. This research also emphasizes the role of the translator as an intermediary between two cultures.

Keywords: translation, Bible, Yoruba, cultural problems

Procedia PDF Downloads 279
5542 Food Insecurity and Mental Health among Adolescents in Southwest Ethiopia: Structural Equation Modeling Analysis

Authors: Mulusew G. Jebena, David Lindstrom, Tefera Belachew, Craig Hadley, Carl Lachat, Patrick Kolsteren

Abstract:

Background: The biological and psychosocial consequence of food insecurity on physical health and nutritional status has been reported. But, its effect on mental health during adolescence remains unexplored. Thus, the main aim of this analysis is to examine the mechanism by which food insecurity is linked to mental health among adolescents living in Jimma, Southwest Ethiopia. Methods: We used data from third round observation of Jimma Longitudinal Family and Youth Survey (JLFSY). A total of 1,521 adolescents included for the main analysis. Food insecurity was measured using 5-items scale and The Self Reporting Questionnaire (SRQ-20) was used to measure mental distress. Structural equation modeling analysis was done using maximum likelihood estimation method. Model diagnostics test was reported. All p values were two tailed and P value ≤ 0.05 was used to determine statistical significance. Results: The prevalence of mental distress was 20.8%, 95% CI: (18.8, 22.9). After adjusted for covariates, the final model depicts food insecurity was associated with adolescent mental distress (β=.324). This analysis showed 94.1% of the effect of food insecurity on mental distress is direct. By contrast, 5.9% of the food insecurity effect is mediated by physical health. In addition, Self-rated health (β=.356), socioeconomic status (β=-.078) parental educational (β= .170), living in urban (β= .193) and female headed household (β=.205) were associated with adolescent mental distress. Conclusions: This finding highlights the direct effect of food insecurity on adolescent mental distress. Therefore, any intervention aimed to improve mental distress of adolescents should consider strategies to improve access to sufficient, safe, and nutritious food. Beside this, prevention of underlying factors such as psychosomatic health illness and improving socio economic status is also very critical. Furthermore longitudinal relationship of the long term effect of food insecurity on mental health should be investigated.

Keywords: adolescent, Ethiopia, food insecurity, mental health

Procedia PDF Downloads 596
5541 Double Encrypted Data Communication Using Cryptography and Steganography

Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet

Abstract:

In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.

Keywords: cryptography, steganography, layered security, Cipher, encryption

Procedia PDF Downloads 85
5540 Enhancing Maritime Governance in Africa: Challenges of Maritime Policy Development in the East African Community

Authors: Christantus Begealawuh Nchongayi

Abstract:

As clearly stated in goal 14 of sustainable development goals, global oceans greatly contribute to making the earth habitable for mankind. This explains why ocean governance is an important global concern today. The emerging maritime security problems and the impact of climate change on African oceans, evidenced by tropical cyclones as seen recently in the Southern region of Africa, is also an indication that maritime governance and policymaking are important elements of peace and security in Africa. Within the last decade, there have been commendable efforts towards maritime governance and policymaking in Africa, although implementation of existing maritime policies is still lacking. This paper provides a snapshot of the overall state of the maritime policymaking process in Africa. It specifically explores the challenges facing policymakers in developing national and regional maritime security strategy in the East African Community. For methodology, the paper relied on primary and secondary data. Primary data was collected from informal discussions with policymakers and key policy-making bodies in Africa, and from a survey of public opinions. The study found that the Africa Integrated Maritime Strategy (2050 AIMS) is a recent template for regional and national maritime security policymaking in Africa and that although maritime security has in the past not been prioritized in the security agenda of the East African Community, developing and aligning a regional maritime security strategy to the 2050 AIMS will result to positive regional integration outcomes in East Africa.

Keywords: 2050 Africa integrated maritime strategy, east African community, maritime policy-making, maritime security

Procedia PDF Downloads 216
5539 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework

Authors: Husnil Khatimah, Fairol Halim

Abstract:

This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.

Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper

Procedia PDF Downloads 454
5538 Effect of Lifestyle Modification for Two Years on Obesity and Metabolic Syndrome Components in Elementary Students: A Community-Based Trial

Authors: Bita Rabbani, Hossein Chiti, Faranak Sharifi, Saeedeh Mazloomzadeh

Abstract:

Background: Lifestyle modifications, especially improving nutritional patterns and increasing physical activity, are the most important factors in preventing obesity and metabolic syndrome in children and adolescents. For this purpose, the following interventional study was designed to investigate the effects of educational programs for students, as well as changes in diet and physical activity, on obesity and components of the metabolic syndrome. Methods: This study is part of an interventional research project (elementary school) conducted on all students of Sama schools in Zanjan and Abhar in three levels of elementary, middle, and high school, including 1000 individuals in Zanjan (intervention group) and 1000 individuals (control group) in Abhar in 2011. Interventions were based on educating students, teachers, and parents, changes in food services, and physical activity. We primarily measured anthropometric indices, fasting blood sugar, lipid profiles, and blood pressure and completed standard nutrition and physical activity questionnaires. Also, blood insulin levels were randomly measured in a number of students. Data analysis was done by SPSS software version 16.0. Results: Overall, 589 individuals (252 male, 337 female) entered the case group, and 803 individuals (344 male, 459 female) entered the control group. After two years of intervention, mean waist circumference (63.8 ± 10.9) and diastolic BP (63.8 ± 10.4) were significantly lower; however, mean systolic BP (10.1.0 ± 12.5), food score (25.0 ± 5.0) and drinking score (12.1 ± 2.3) were higher in the intervention group (p<0.001). Comparing components of metabolic syndrome between the second year and at time of recruitment within the intervention group showed that although number of overweight/obese individuals, individuals with hypertriglyceridemia and high LDL increased, abdominal obesity, high BP, hyperglycemia, and insulin resistance decreased (p<0.001). On the other hand, in the control group, number of individuals with high BP increased significantly. Conclusion: The prevalence of abdominal obesity and hypertension, which are two major components of metabolic syndrome, are much higher in our study than in other regions of country. However, interventions for modification of diet and increase in physical activity are effective in lowering their prevalence.

Keywords: metabolic syndrome, obesity, life style, nutrition, hypertension

Procedia PDF Downloads 67
5537 Muslim Consumer Purchase Behavior on Doubtful Halal Packed Food

Authors: Aliffaizi Arsat, Nur Ida Fatihah, Che Shalifullizam

Abstract:

Malaysia is well known as a Muslim country and is quickly becoming a Global Halal-hub of Halal business in promoting Halal food products in both Muslim countries and non-Muslim countries. The objective of this study is to analyse the Muslim consumer purchased behaviour on doubtful Halal packed food by using theory of planned behaviour, to examine the mediating effects between certification, and Muslim consumer purchased behaviour on doubtful Halal packed food. The relevant questionnaires have been distributed in Kuala Selangor. Among the 300 Muslim participants from Kuala Selangor, Selangor, Malaysia, only 107 of them have returned the questionnaire with complete answers. The respondent’s rate was discovered to be at 35.67%. The data have been analysed by using SPSS version 22 and Structural equation modelling Partial Least Square SEM-PLS. There are three dimensions needed to identify Muslim consumer purchased behaviour on doubtful Halal packed food. They are attitude towards behaviour, subjective norm and perceived behavioural. All the results from this study show that the hypothesis has been supported. However, subjective norm had shown that there is a negative relationship towards Muslim consumer purchased behaviour on doubtful Halal packed food.

Keywords: Muslim consumer purchase behaviour, theory planned behaviour, doubtful Halal, certification

Procedia PDF Downloads 341
5536 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector

Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid

Abstract:

For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.

Keywords: electricity, energy policy, energy security, Malaysia

Procedia PDF Downloads 305
5535 Nutrition Transition in Bangladesh: Multisectoral Responsiveness of Health Systems and Innovative Measures to Mobilize Resources Are Required for Preventing This Epidemic in Making

Authors: Shusmita Khan, Shams El Arifeen, Kanta Jamil

Abstract:

Background: Nutrition transition in Bangladesh has progressed across various relevant socio-demographic contextual issues. For a developing country like Bangladesh, its is believed that, overnutrition is less prevalent than undernutrition. However, recent evidence suggests that a rapid shift is taking place where overweight is subduing underweight. With this rapid increase, for Bangladesh, it will be challenging to achieve the global agenda on halting overweight and obesity. Methods: A secondary analysis was performed from six successive national demographic and health surveys to get the trend on undernutrition and overnutrition for women from reproductive age. In addition, national relevant policy papers were reviewed to determine the countries readiness for whole of the systems approach to tackle this epidemic. Results: Over the last decade, the proportion of women with low body mass index (BMI<18.5), an indicator of undernutrition, has decreased markedly from 34% to 19%. However, the proportion of overweight women (BMI ≥25) increased alarmingly from 9% to 24% over the same period. If the WHO cutoff for public health action (BMI ≥23) is used, the proportion of overweight women has increased from 17% in 2004 to 39% in 2014. The increasing rate of obesity among women is a major challenge to obstetric practice for both women and fetuses. In the long term, overweight women are also at risk of future obesity, diabetes, hyperlipidemia, hypertension, and heart disease. These diseases have serious impact on health care systems. Costs associated with overweight and obesity involves direct and indirect costs. Direct costs include preventive, diagnostic, and treatment services related to obesity. Indirect costs relate to morbidity and mortality costs including productivity. Looking at the Bangladesh Health Facility Survey, it is found that the country is bot prepared for providing nutrition-related health services, regarding prevention, screening, management and treatment. Therefore, if this nutrition transition is not addressed properly, Bangladesh will not be able to achieve the target of the NCD global monitoring framework of the WHO. Conclusion: Addressing this nutrition transition requires contending ‘malnutrition in all its forms’ and addressing it with integrated approaches. Whole of the systems action is required at all levels—starting from improving multi-sectoral coordination to scaling up nutrition-specific and nutrition-sensitive mainstreamed interventions keeping health system in mind.

Keywords: nutrition transition, Bangladesh, health system, undernutrition, overnutrition, obesity

Procedia PDF Downloads 286
5534 Development of Technologies for the Treatment of Nutritional Problems in Primary Care

Authors: Marta Fernández Batalla, José María Santamaría García, Maria Lourdes Jiménez Rodríguez, Roberto Barchino Plata, Adriana Cercas Duque, Enrique Monsalvo San Macario

Abstract:

Background: Primary Care Nursing is taking more autonomy in clinical decisions. One of the most frequent therapies to solve is related to the problems of maintaining a sufficient supply of food. Nursing diagnoses related to food are addressed by the nurse-family and community as the first responsible. Objectives and interventions are set according to each patient. To improve the goal setting and the treatment of these care problems, a technological tool is developed to help nurses. Objective: To evaluate the computational tool developed to support the clinical decision in feeding problems. Material and methods: A cross-sectional descriptive study was carried out at the Meco Health Center, Madrid, Spain. The study population consisted of four specialist nurses in primary care. These nurses tested the tool on 30 people with ‘need for nutritional therapy’. Subsequently, the usability of the tool and the satisfaction of the professional were sought. Results: A simple and convenient computational tool is designed for use. It has 3 main entrance fields: age, size, sex. The tool returns the following information: BMI (Body Mass Index) and caloric consumed by the person. The next step is the caloric calculation depending on the activity. It is possible to propose a goal of BMI or weight to achieve. With this, the amount of calories to be consumed is proposed. After using the tool, it was determined that the tool calculated the BMI and calories correctly (in 100% of clinical cases). satisfaction on nutritional assessment was ‘satisfactory’ or ‘very satisfactory’, linked to the speed of operations. As a point of improvement, the options of ‘stress factor’ linked to weekly physical activity. Conclusion: Based on the results, it is clear that the computational tools of decision support are useful in the clinic. Nurses are not only consumers of computational tools, but can develop their own tools. These technological solutions improve the effectiveness of nutrition assessment and intervention. We are currently working on improvements such as the calculation of protein percentages as a function of protein percentages as a function of stress parameters.

Keywords: feeding behavior health, nutrition therapy, primary care nursing, technology assessment

Procedia PDF Downloads 227
5533 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures

Authors: L. Sellami, D. Idoughi, P. F. Tiako

Abstract:

Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.

Keywords: cloud computing, intrusion detection system, privacy, trust

Procedia PDF Downloads 323
5532 Dietetics Practice in the Scope of Disease Prevention in Community Settings: A School-Based Obesity Prevention Program

Authors: Elham Abbas Aljaaly, Nahlaa Abdulwahab Khalifa

Abstract:

The active method of disease prevention is seen as the most affordable and sustainable action to deal with risks of non-communicable diseases such as obesity. This eight-week project aimed to pilot the feasibility and acceptability of a school-based programme, which is proposed to prevent and modify overweight status and possible related risk factors among student girls 'at the intermediate level' in Jeddah city. The programme was conducted through comprehensible approach targeting physical environment and school policies (nutritional/exercise/behavioural approach). The programme was designed to cultivate the personal and environmental awareness in schools for girls. This was applied by promoting healthy eating and physical activity through policies, physical education, healthier options for school canteens, and the creation of school health teams. The prevention programme was applied on 68 students (who agreed to participate) from grades 7th, 8th and 9th. A pre and post assessment questionnaire was employed on 66 students. The questionnaires were designed to obtain information on students' knowledge about health, nutrition and physical activity. Survey questions included information about nutrients, food consumption patterns, food intake and lifestyle. Physical education included training sessions for new opportunities for physical activities to be performed during school or after school hours. A running competition 'to enhance students’ performance for physical activities' was also conducted during the school visit. A visit to the school canteen was conducted to check, observe, record and assess all available food/beverage items and meals. The assessment method was a subjective method for the type of food/beverages if high in saturated fat, salt and sugar (HFSS) or non-HFSS. The school canteen administrators were encouraged to provide healthy food/beverage items and a sample healthy canteen was provided for implementation. Two healthy options were introduced to the school canteen. A follow up for students’ preferences for the introduced options and the purchasing power were assessed. Thirty-eight percent of young girls (n=26) were not participating in any form of physical activities inside or outside school. Skipping breakfast was stated by 42% (n=28) of students with no daily consumption (19%, n=13) for fruit/vegetables. Significant changes were noticed in students’ (n=66) overall responses to the pre and post questions (P value=.001). All students had participated in the conducted running competition sessions and reported satisfaction and enjoyment about the sessions. No absence was reported by the research team for attending physical education and activity sessions throughout the delivered programme. The purchasing power of the introduced healthy options of 'Salad and oatmeal' was increased to 18% in 8 weeks at the school canteen, and slightly affected the purchase for other less healthy options. The piloted programme indorsed better health and nutrition knowledge, healthy eating and lifestyle attitude, which could help young girls to obtain sustainable changes. It is expected that the outcomes of the programme will be a cornerstone for the futuristic national study that will assist policy makers and participants to build a knowledgeable health promotion scenario and make sure that school students have access to healthy foods, physical exercise and healthy lifestyle.

Keywords: adolescents, diet, exercise, behaviours, overweight/obesity, prevention-intervention programme, Saudi Arabia, schoolgirls

Procedia PDF Downloads 129
5531 Microalgae Applied to the Reduction of Biowaste Produced by Fruit Fly Drosophila melanogaster

Authors: Shuang Qiu, Zhipeng Chen, Lingfeng Wang, Shijian Ge

Abstract:

Biowastes are a concern due to the large amounts of commercial food required for model animals during the biomedical research. Searching for sustainable food alternatives with negligible physiological effects on animals is critical to solving or reducing this challenge. Microalgae have been demonstrated as suitable for both human consumption and animal feed in addition to biofuel and bioenergy applications. In this study, the possibility of using Chlorella vulgaris and Senedesmus obliquus as a feed replacement to Drosophila melanogaster, one of the fly models commonly used in biomedical studies, was investigated to assess the fly locomotor activity, motor pattern, lifespan, and body weight. Compared to control, flies fed on 60% or 80% (w/w) microalgae exhibited varied walking performance including travel distance and apparent step size, and flies treated with 40% microalgae had shorter lifespans and decreased body weight. However, the 20% microalgae treatment showed no statistical differences in all parameters tested with respect to the control. When partially including 20% microalgae in the standard food, it can annually reduce the food waste (~ 202 kg) by 22.7 % and save $ 7,200 of the food cost, offering an environmentally superior and cost-effective food alternative without compromising physiological performance.

Keywords: animal feed, Chlorella vulgaris, Drosophila melanogaster, food waste, microalgae

Procedia PDF Downloads 166
5530 Modern Information Security Management and Digital Technologies: A Comprehensive Approach to Data Protection

Authors: Mahshid Arabi

Abstract:

With the rapid expansion of digital technologies and the internet, information security has become a critical priority for organizations and individuals. The widespread use of digital tools such as smartphones and internet networks facilitates the storage of vast amounts of data, but simultaneously, vulnerabilities and security threats have significantly increased. The aim of this study is to examine and analyze modern methods of information security management and to develop a comprehensive model to counteract threats and information misuse. This study employs a mixed-methods approach, including both qualitative and quantitative analyses. Initially, a systematic review of previous articles and research in the field of information security was conducted. Then, using the Delphi method, interviews with 30 information security experts were conducted to gather their insights on security challenges and solutions. Based on the results of these interviews, a comprehensive model for information security management was developed. The proposed model includes advanced encryption techniques, machine learning-based intrusion detection systems, and network security protocols. AES and RSA encryption algorithms were used for data protection, and machine learning models such as Random Forest and Neural Networks were utilized for intrusion detection. Statistical analyses were performed using SPSS software. To evaluate the effectiveness of the proposed model, T-Test and ANOVA statistical tests were employed, and results were measured using accuracy, sensitivity, and specificity indicators of the models. Additionally, multiple regression analysis was conducted to examine the impact of various variables on information security. The findings of this study indicate that the comprehensive proposed model reduced cyber-attacks by an average of 85%. Statistical analysis showed that the combined use of encryption techniques and intrusion detection systems significantly improves information security. Based on the obtained results, it is recommended that organizations continuously update their information security systems and use a combination of multiple security methods to protect their data. Additionally, educating employees and raising public awareness about information security can serve as an effective tool in reducing security risks. This research demonstrates that effective and up-to-date information security management requires a comprehensive and coordinated approach, including the development and implementation of advanced techniques and continuous training of human resources.

Keywords: data protection, digital technologies, information security, modern management

Procedia PDF Downloads 30
5529 The Limits of Charity: Advancing a Rights-based Justice Model to Remedy Poverty and Hunger

Authors: Tracy Smith-Carrier

Abstract:

In 1995, the World Health Organization declared that poverty was the biggest killer and the greatest cause of suffering in the world. Income is certainly a key social determinant of health, the lack of which causes innumerable health and mental health conditions. In seeking to provide relief from financial hardship for residents within their populace, states in the Global North have largely turned to the non-profit and charitable sector. The stigma and shame of accessing charity is a significant barrier for many, but what is more problematic is that the embrace of the charitable model has let governments off the hook from responding to their international human rights obligations. Although states are signatories to various human rights treaties and conventions internationally, many of these laws have not been implemented domestically. This presentation explores the limits of the charitable model in addressing poverty in countries of the Global North. Unlike in the ages passed, when poverty was thought to be an individual problem, we now know that poverty is largely systemic in nature. In this presentation, we will identify the structural determinants of poverty, outline why people are reticent to access charitable programs and services and how income security is reproduced through the charitable model, and discuss evidence-informed solutions, such as a basic income guarantee, to move beyond the charitable model in favour of a rights-based justice model. To move beyond charity, we must demand that governments recognize our fundamental human rights and address poverty and hunger using a justice model based on substantive human rights.

Keywords: basic income, charity, poverty, income security, hunger, food security, social justice, human rights

Procedia PDF Downloads 117
5528 Determination of a Novel Artificial Sweetener Advantame in Food by Liquid Chromatography Tandem Mass Spectrometry

Authors: Fangyan Li, Lin Min Lee, Hui Zhu Peh, Shoet Harn Chan

Abstract:

Advantame, a derivative of aspartame, is the latest addition to a family of low caloric and high potent dipeptide sweeteners which include aspartame, neotame and alitame. The use of advantame as a high-intensity sweetener in food was first accepted by Food Standards Australia New Zealand in 2011 and subsequently by US and EU food authorities in 2014, with the results from toxicity and exposure studies showing advantame poses no safety concern to the public at regulated levels. To our knowledge, currently there is barely any detailed information on the analytical method of advantame in food matrix, except for one report published in Japanese, stating a high performance liquid chromatography (HPLC) and liquid chromatography/ mass spectrometry (LC-MS) method with a detection limit at ppm level. However, the use of acid in sample preparation and instrumental analysis in the report raised doubt over the reliability of the method, as there is indication that stability of advantame is compromised under acidic conditions. Besides, the method may not be suitable for analyzing food matrices containing advantame at low ppm or sub-ppm level. In this presentation, a simple, specific and sensitive method for the determination of advantame in food is described. The method involved extraction with water and clean-up via solid phase extraction (SPE) followed by detection using liquid chromatography tandem mass spectrometry (LC-MS/MS) in negative electrospray ionization mode. No acid was used in the entire procedure. Single laboratory validation of the method was performed in terms of linearity, precision and accuracy. A low detection limit at ppb level was achieved. Satisfactory recoveries were obtained using spiked samples at three different concentration levels. This validated method could be used in the routine inspection of the advantame level in food.

Keywords: advantame, food, LC-MS/MS, sweetener

Procedia PDF Downloads 475
5527 Feasibility Study of Implementing Electronic Commerce in Food Industries with a Case Study

Authors: Maryam Safarirad

Abstract:

Fast and increasing growth of electronic commerce (e-commerce) in developed countries and its resulting competitive advantages mean that those countries should revise dramatically their trade and commercial strategies and policies. Regarding the importance of food industry in Iran, the current paper studies the feasibility of implementing the e-commerce system in Shiraz’s petrochemical unit. The statistical population of the study includes 29 senior managers and experts of the food industries. In the present Feasibility study of implementing electronic commerce 249 research, senior managers and experts’ opinions on feasibility have been examined and some feedbacks have resulted in from the opinions. The current research concludes that the organization under study does not have favorable state either in software or in hardware. Implementation of the e-commerce system in food industries would reduce the average value of the transaction costs.

Keywords: electronic trading, electronic commerce, electronic exchange of information, feasibility study, information technology, virtual shopping, computer networks, electronic commerce laws, food industry

Procedia PDF Downloads 415
5526 Enhancing Child Diets in Food-Insecure Rural Ethiopia

Authors: Tigist mamo, Beryl Oranga, Precious Mubanga

Abstract:

High rates of child undernutrition in Ethiopia place children at significant risk, highlighting the need for low-cost, nutritious diets starting at six months of age. These diets should be diverse and rich in essential nutrients like proteins, vitamins, and minerals. However, many rural households participating in the Productive Safety Net Program (PSNP) struggle to afford fortified foods and often rely on low-protein, cereal-based diets, leading to micronutrient deficiencies. In addition, fasting practices further restrict the consumption of animal-source foods for 190 to 250 days each year, limiting dietary diversity even more. Addressing these challenges requires solutions beyond nutrition counseling, focusing on factors such as seasonality, food perishability, and safety to promote better health outcomes for children. The program's main objective is to empower caregivers with practical recipes for complementary feeding for children aged 6 to 23 months by enhancing meals with affordable ingredients like cereal, legumes, dried vegetables, and meat. The ongoing implementation research within the SPIR-II program is centered on developing a cost-effective mixed flour and exploring drying techniques to extend shelf life, ultimately addressing the delayed introduction of complementary foods and increasing nutrient-rich options in households. Saleswomen participating in the SPIR-II program have been empowered to produce easy-to-use local complementary flour and conduct door-to-door sales in their neighborhoods. Caregivers who have purchased and fed this flour to their children have reported significant improvements in their nutritional status. Additionally, SPIR-II is testing low-tech drying methods suitable for rural Ethiopian contexts to reduce food loss and promote the inclusion of nutrient-dense foods in children's diets. The paper will highlight the primary outcomes of these initiatives as they are being implemented.

Keywords: food preservation, easy-to-use mixed flour, complementary feeding, drying techniques

Procedia PDF Downloads 7
5525 Barriers to Business Model Innovation in the Agri-Food Industry

Authors: Pia Ulvenblad, Henrik Barth, Jennie Cederholm BjöRklund, Maya Hoveskog, Per-Ola Ulvenblad

Abstract:

The importance of business model innovation (BMI) is widely recognized. This is also valid for firms in the agri-food industry, closely connected to global challenges. Worldwide food production will have to increase 70% by 2050 and the United Nations’ sustainable development goals prioritize research and innovation on food security and sustainable agriculture. The firms of the agri-food industry have opportunities to increase their competitive advantage through BMI. However, the process of BMI is complex and the implementation of new business models is associated with high degree of risk and failure. Thus, managers from all industries and scholars need to better understand how to address this complexity. Therefore, the research presented in this paper (i) explores different categories of barriers in research literature on business models in the agri-food industry, and (ii) illustrates categories of barriers with empirical cases. This study is addressing the rather limited understanding on barriers for BMI in the agri-food industry, through a systematic literature review (SLR) of 570 peer-reviewed journal articles that contained a combination of ‘BM’ or ‘BMI’ with agriculture-related and food-related terms (e.g. ‘agri-food sector’) published in the period 1990-2014. The study classifies the barriers in several categories and illustrates the identified barriers with ten empirical cases. Findings from the literature review show that barriers are mainly identified as outcomes. It can be assumed that a perceived barrier to growth can often be initially exaggerated or underestimated before being challenged by appropriate measures or courses of action. What may be considered by the public mind to be a barrier could in reality be very different from an actual barrier that needs to be challenged. One way of addressing barriers to growth is to define barriers according to their origin (internal/external) and nature (tangible/intangible). The framework encompasses barriers related to the firm (internal addressing in-house conditions) or to the industrial or national levels (external addressing environmental conditions). Tangible barriers can include asset shortages in the area of equipment or facilities, while human resources deficiencies or negative willingness towards growth are examples of intangible barriers. Our findings are consistent with previous research on barriers for BMI that has identified human factors barriers (individuals’ attitudes, histories, etc.); contextual barriers related to company and industry settings; and more abstract barriers (government regulations, value chain position, and weather). However, human factor barriers – and opportunities - related to family-owned businesses with idealistic values and attitudes and owning the real estate where the business is situated, are more frequent in the agri-food industry than other industries. This paper contributes by generating a classification of the barriers for BMI as well as illustrating them with empirical cases. We argue that internal barriers such as human factors barriers; values and attitudes are crucial to overcome in order to develop BMI. However, they can be as hard to overcome as for example institutional barriers such as governments’ regulations. Implications for research and practice are to focus on cognitive barriers and to develop the BMI capability of the owners and managers of agri-industry firms.

Keywords: agri-food, barriers, business model, innovation

Procedia PDF Downloads 234
5524 Software-Defined Networking: A New Approach to Fifth Generation Networks: Security Issues and Challenges Ahead

Authors: Behrooz Daneshmand

Abstract:

Software Defined Networking (SDN) is designed to meet the future needs of 5G mobile networks. The SDN architecture offers a new solution that involves separating the control plane from the data plane, which is usually paired together. Network functions traditionally performed on specific hardware can now be abstracted and virtualized on any device, and a centralized software-based administration approach is based on a central controller, facilitating the development of modern applications and services. These plan standards clear the way for a more adaptable, speedier, and more energetic network beneath computer program control compared with a conventional network. We accept SDN gives modern inquire about openings to security, and it can significantly affect network security research in numerous diverse ways. Subsequently, the SDN architecture engages systems to effectively screen activity and analyze threats to facilitate security approach modification and security benefit insertion. The segregation of the data planes and control and, be that as it may, opens security challenges, such as man-in-the-middle attacks (MIMA), denial of service (DoS) attacks, and immersion attacks. In this paper, we analyze security threats to each layer of SDN - application layer - southbound interfaces/northbound interfaces - controller layer and data layer. From a security point of see, the components that make up the SDN architecture have a few vulnerabilities, which may be abused by aggressors to perform noxious activities and hence influence the network and its administrations. Software-defined network assaults are shockingly a reality these days. In a nutshell, this paper highlights architectural weaknesses and develops attack vectors at each layer, which leads to conclusions about further progress in identifying the consequences of attacks and proposing mitigation strategies.

Keywords: software-defined networking, security, SDN, 5G/IMT-2020

Procedia PDF Downloads 100
5523 Improving Food Security and Commercial Development through Promotion of High Value Medicinal and Industrial Plants in the Swat Valley of Pakistan

Authors: Hassan Sher

Abstract:

Agriculture has a pivotal role in Pakistan’s economy, accounting for about one-fourth of the GDP and employing almost half the population. However, the competitiveness, productivity, growth, employment potential, export opportunity, and contribution to GDP of the sector is significantly hampered by agriculture marketing laws/regulations at the provincial level that reward rent seeking behavior, promote monopoly power, artificially reduce farmer incomes while inflating prices to consumers, and act as disincentives to investment. Although of more recent vintage than some other provincial agricultural marketing laws, the NWFP Agricultural and Livestock Produce Markets Act, 2007 is a throwback to a colonial paradigm, where restrictions on agricultural produce marketing and Government control of distribution channels is the norm. The Swat Valley (in which we include its tributary valleys) is an area of Pakistan in which there is poverty is both extreme and pervasive. For many, a significant portion of the family’s income comes from selling plants that are used as herbs, medicines, and perfumes. Earlier studies have shown that the benefit they derive from this work is less than they might because of: Lack of knowledge concerning which plants and which plant parts are valuable, Lack of knowledge concerning optimal preservation and storage of material, illiteracy. Another concern that much of the plant material sold from the valley is collected in the wild, without an appreciation of the negative impact continued collecting has on wild populations. We propose: Creating colored cards to help inhabitants recognize the 25 most valuable plants in their area; Developing and sharing protocols for growing the 25 most valuable plants in a home garden; Developing and sharing efficient mechanisms for drying plants so they do not lose value; Encouraging increased literacy by incorporating numbers and a few words in the handouts.

Keywords: food security, medicinal plants, industrial plants, economic development

Procedia PDF Downloads 326