Search results for: food and nutrition security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6332

Search results for: food and nutrition security

5522 A Review on the Use of Herbal Alternatives to Antibiotics in Poultry Diets

Authors: Sasan Chalaki, Seyed Ali Mirgholange, Touba Nadri, Saman Chalaki

Abstract:

In the current world, proper poultry nutrition has garnered special attention as one of the fundamental factors for enhancing their health and performance. Concerns related to the excessive use of antibiotics in the poultry industry and their role in antibiotic resistance have transformed this issue into a global challenge in public health and the environment. On the other hand, poultry farming plays a vital role as a primary source of meat and eggs in human nutrition, and improving their health and performance is crucial. One effective approach to enhance poultry nutrition is the utilization of the antibiotic properties of plant-based ingredients. The use of plant-based alternatives as natural antibiotics in poultry nutrition not only aids in improving poultry health and performance but also plays a significant role in reducing the consumption of synthetic antibiotics and preventing antibiotic resistance-related issues. Plants contain various antibacterial compounds, such as flavonoids, tannins, and essential oils. These compounds are recognized as active agents in combating bacteria. Plant-based antibiotics are compounds extracted from plants with antibacterial properties. They are acknowledged as effective substitutes for chemical antibiotics in poultry diets. The advantages of plant-based antibiotics include reducing the risk of resistance to chemical antibiotics, increasing poultry growth performance, and lowering the risk of disease transmission.

Keywords: poultry, antibiotics, essential oils, plant-based

Procedia PDF Downloads 78
5521 An Investigation into the Impact of Brexit on Consumer Perception of Trust in the Food Industry

Authors: Babatope David Omoniyi, Fiona Lalor, Sinead Furey

Abstract:

This ongoing project investigates the impact of Brexit on consumer perceptions of trust in the food industry. Brexit has significantly impacted the food industry, triggering a paradigm shift in the movement of food/agricultural produce, regulations, and cross-border collaborations between Great Britain, Northern Ireland, and the Republic of Ireland. In a world where the dynamics have shifted because of regulatory changes that impact trade and the free movement of foods and agricultural produce between these three countries, monitoring and controlling every stage of the food supply chain have become challenging, increasing the potential for food fraud and food safety incidents. As consumers play a pivotal role in shaping the market, understanding any shifts in trust post-Brexit enables them to navigate the market with confidence and awareness. This study aims to explore the complexities of consumer perceptions, focusing on trust as a cornerstone of consumer confidence in the post-Brexit food landscape. The objectives include comparing trust in official controls pre- and post-Brexit, determining consumer awareness of food fraud, and devising recommendations that reflect the evidence from this primary research regarding consumer trust in food authenticity post-Brexit. The research design follows an exploratory sequential mixed methods approach, incorporating qualitative methods such as focus groups and structured interviews, along with quantitative research through a large-scale survey. Participants from UCD and Ulster University campuses, comprising academic and non-academic staff, students, and researchers, will provide insights into the impact of Brexit on consumer trust. Preliminary findings from focus groups and interviews highlight changes in labelling, reduced quantity and quality of foods in both Northern Ireland and the Republic of Ireland, fewer food choices, and increased food prices since Brexit. The study aims to further investigate and quantify these impacts through a comprehensive large-scale survey involving participants from Northern Ireland and the Republic of Ireland. The results will inform official controls and consumer-facing messaging contributing valuable insights to navigate the evolving post-Brexit food landscape.

Keywords: Brexit, consumer trust, food fraud, food authenticity, food safety, food industry

Procedia PDF Downloads 47
5520 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 301
5519 Microbial Resource Research Infrastructure: A Large-Scale Research Infrastructure for Microbiological Services

Authors: R. Hurtado-Ortiz, D. Clermont, M. Schüngel, C. Bizet, D. Smith, E. Stackebrandt

Abstract:

Microbiological resources and their derivatives are the essential raw material for the advancement of human health, agro-food, food security, biotechnology, research and development in all life sciences. Microbial resources, and their genetic and metabolic products, are utilised in many areas such as production of healthy and functional food, identification of new antimicrobials against emerging and resistant pathogens, fighting agricultural disease, identifying novel energy sources on the basis of microbial biomass and screening for new active molecules for the bio-industries. The complexity of public collections, distribution and use of living biological material (not only living but also DNA, services, training, consultation, etc.) and service offer, demands the coordination and sharing of policies, processes and procedures. The Microbial Resource Research Infrastructure (MIRRI) is an initiative within the European Strategy Forum Infrastructures (ESFRI), bring together 16 partners including 13 European public microbial culture collections and biological resource centres (BRCs), supported by several European and non-European associated partners. The objective of MIRRI is to support innovation in microbiology by provision of a one-stop shop for well-characterized microbial resources and high quality services on a not-for-profit basis for biotechnology in support of microbiological research. In addition, MIRRI contributes to the structuring of microbial resources capacity both at the national and European levels. This will facilitate access to microorganisms for biotechnology for the enhancement of the bio-economy in Europe. MIRRI will overcome the fragmentation of access to current resources and services, develop harmonised strategies for delivery of associated information, ensure bio-security and other regulatory conditions to bring access and promote the uptake of these resources into European research. Data mining of the landscape of current information is needed to discover potential and drive innovation, to ensure the uptake of high quality microbial resources into research. MIRRI is in its Preparatory Phase focusing on governance and structure including technical, legal governance and financial issues. MIRRI will help the Biological Resources Centres to work more closely with policy makers, stakeholders, funders and researchers, to deliver resources and services needed for innovation.

Keywords: culture collections, microbiology, infrastructure, microbial resources, biotechnology

Procedia PDF Downloads 444
5518 Models, Methods and Technologies for Protection of Critical Infrastructures from Cyber-Physical Threats

Authors: Ivan Župan

Abstract:

Critical infrastructure is essential for the functioning of a country and is designated for special protection by governments worldwide. Due to the increase in smart technology usage in every facet of the industry, including critical infrastructure, the exposure to malicious cyber-physical attacks has grown in the last few years. Proper security measures must be undertaken in order to defend against cyber-physical threats that can disrupt the normal functioning of critical infrastructure and, consequently the functioning of the country. This paper provides a review of the scientific literature of models, methods and technologies used to protect from cyber-physical threats in industries. The focus of the literature was observed from three aspects. The first aspect, resilience, concerns itself with the robustness of the system’s defense against threats, as well as preparation and education about potential future threats. The second aspect concerns security risk management for systems with cyber-physical aspects, and the third aspect investigates available testbed environments for testing developed models on scaled models of vulnerable infrastructure.

Keywords: critical infrastructure, cyber-physical security, smart industry, security methodology, security technology

Procedia PDF Downloads 77
5517 Enhance Security in XML Databases: XLog File for Severity-Aware Trust-Based Access Control

Authors: A: Asmawi, L. S. Affendey, N. I. Udzir, R. Mahmod

Abstract:

The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.

Keywords: XML database, trust-based access control, severity-aware, trust values, log file

Procedia PDF Downloads 300
5516 SOTM: A New Cooperation Based Trust Management System for VANET

Authors: Amel Ltifi, Ahmed Zouinkhi, Mohamed Salim Bouhlel

Abstract:

Security and trust management in Vehicular Ad-hoc NETworks (VANET) is a crucial research domain which is the scope of many researches and domains. Although, the majority of the proposed trust management systems for VANET are based on specific road infrastructure, which may not be present in all the roads. Therefore, road security should be managed by vehicles themselves. In this paper, we propose a new Self Organized Trust Management system (SOTM). This system has the responsibility to cut with the spread of false warnings in the network through four principal components: cooperation, trust management, communication and security.

Keywords: ative vehicle, cooperation, trust management, VANET

Procedia PDF Downloads 430
5515 Case Study: 3000acres Facilitating Urban Agriculture in Melbourne, Australia

Authors: Philippa Anne French

Abstract:

This paper presents a case study of 3000acres, a for-purpose organisation established in 2013 to improve the health of Melbournians by enabling them to grow more of their own food. Over the past four years, the organisation has encountered a number of barriers, both obvious and less obvious, which discourage communities from beginning their own food-growing projects. These include soil contamination, planning policies, public perception and access to land. 3000acres has been working to remove these barriers if possible, or otherwise to find ways around them. Strategies have included the use of removable planter boxes on temporarily vacant land, separating the site soil from above-ground garden beds, writing planning exemptions, developing relationships with land management authorities and recording both the quantitative and qualitative products of food gardens in Melbourne. While creating change in policy and legal requirements will be a gradual process, discernable progress has been made in the attitudes of land management authorities and the establishment of new food gardens is becoming easier. Over the past four years, 3000acres has supported the establishment of 14 food gardens in and around Melbourne, including public community gardens, fenced community gardens and urban farms supplying food to a food relief organisation.

Keywords: case study, community gardens, land access, land contamination, urban agriculture

Procedia PDF Downloads 180
5514 Hydrogels Beads of Alginate/Seaweed Powder for Plants Nutrition

Authors: Brenda O. Mazzola, Adriel Larsen, Romina P. Ollier, Leandro N. Ludueña, Vera A. Alvarez, Jimena S. Gonzalez

Abstract:

Seaweed is a natural renewable resource with great potential that is not being used by the domestic industry. Here, it was used a kind of invasive algae U. Pinnatifida that causes serious ecological damage on the Argentinian coasts. Alginate is one of the most widely used materials for encapsulation, and has the advantage that is a natural polysaccharide derived from a marine plant. It can form thermally stable hydrogel in the presence of calcium cation. In addition, the hydrogel can be easily produced into particulate form by using simple and gentle method. The aim of this work was to obtain and to characterize novel compounds (alginate/seaweed powder) for the soil nutrition. Alginate water solutions were prepared by concentrations of 20, 30, 40 and 50 g/L, in those solutions 10g/L of seaweed powder was added. Then the dispersions were transferred from a beaker to the atomizer by a peristaltic pump (with 0.05 to 0.1 L/h flow). A tank was filled with 1 L of calcium chloride solution (4 g/L), and the solution was agitated with a magnetic stirrer. The beads were analyzed by means TGA, FTIR and swelling determinations. In addition, the improvements in the soil were qualitative measured. It was obtained beads with different diameters depend on the initial concentration and the flow used. A better dispersions of seaweed and optimal diameter for the plant nutrition applications were obtained for 40g/L concentration and 0.1 L/h flow. The beads show thermal stability and high swelling degree. It can be successfully obtained alginate beads with seaweed powder with a novelty application as plant nutrient.

Keywords: biodegradable, characterization, hydrogel, plant nutrition, seaweed

Procedia PDF Downloads 282
5513 Migration and Human Security: An Analysis of a Neglected Ethnic Rohingya's Exodus in Myanmar and Its Regional Security Implications

Authors: Zarina Othman, Bakri Mat, Aini Fatihah Roslam

Abstract:

The Burmese ethnic known as Rohingya is one of the world’s most persecuted ethnic minorities on earth. They have been massacred, discriminated, humiliated, gang-raped, trafficked, abused and neglected. More than one million Rohingyas have been displaced internally and overseas. Currently, Rohingya asylum seekers can be found in India, Bangladesh, Thailand, Malaysia, and Indonesia. This forced migration is unacceptable since the Rohingya are stateless although they have been part of Myanmar for more than one century. Why the Rohingyas crisis is important to be analyse from human security perspectives? Understanding the human security of the Rohingya is important because the crisis may have implication on the regional stability in South and South-East Asia. The objectives of the research are to provide an explanation to the current human security situation in Myanmar, to analyse the regional implication of the Rohingya’s crisis and to recommend the workable solution that may help to reduce the tension. To analyze and demonstrate the case, the research has adopted the BAGHUS or Bangi Human Security Approach, a Southeast Asian human security model, designed to protect the weakest and the vital core of human life across national borders. Based on a qualitative research, and a review of literature from secondary sources of books, reports and academic journals, the research has conducted interviews with 1) Rohingya respondents in Cox’s Baza in February 2017; 2) experts and scholars in the field in Bangladesh, Myanmar and Malaysia. Preliminary findings suggest that conflicts lead to displacement and migration across borders, human insecurity is an issue where the implementation of human rights is too slow to take place even in sovereign state like Myanmar. The political and economic interests of many extraregional powers have further contributed to the current crisis. Human security perspectives is suggested as the workable solution for stability and peace in the region.

Keywords: human security, migration, Myanmar, regional security, Rohingya

Procedia PDF Downloads 153
5512 BOFSC: A Blockchain Based Decentralized Framework to Ensure the Transparency of Organic Food Supply Chain

Authors: Mifta Ul Jannat, Raju Ahmed, Al Mamun, Jannatul Ferdaus, Ritu Costa, Milon Biswas

Abstract:

Blockchain is an internet-based invention that is coveted in the permanent, scumbled record for its capacity to openly accept, record, and distribute transactions. In a traditional supply chain, there are no trustworthy participants for an organic product. Yet blockchain engineering may provide confidence, transparency, and traceability. Blockchain varies in how companies get real, checked, and lasting information from their supply chain and lock in customers. In an arrangement of cryptographic squares, Blockchain digitizes each connection by sparing it. No one person may alter the documents, and any alteration within the agreement is clear to all. The coming to the record is tamper proof and unchanging, offering a complete history of the object’s life cycle and minimizing opening for extorting. The primary aim of this analysis is to identify the underlying problem that the customer faces. In this post, we will minimize the allocation of fraud data through the ’Smart Contract’ and include a certificate of quality assurance.

Keywords: blockchain technology, food supply chain, Ethereum, smart contract, quality assurance, trustability, security, transparency

Procedia PDF Downloads 153
5511 Safety Evaluation of Post-Consumer Recycled PET Materials in Chilean Industry by Overall Migration Tests

Authors: Evelyn Ilabaca, Ximena Valenzuela, Alejandra Torres, María José Galotto, Abel Guarda

Abstract:

One of the biggest problems in food packaging industry, especially with the plastic materials, is the fact that these materials are usually obtained from non-renewable resources and also remain as waste after its use, causing environmental issues. This is an international concern and particular attention is given to reduction, reuse and recycling strategies for decreasing the waste from plastic packaging industry. In general, polyethylenes represent most plastic waste and recycling process of post-consumer polyethylene terephthalate (PCR-PET) has been studied. US Food and Drug Administration (FDA), European Food Safety Authority (EFSA) and Southern Common Market (MERCOSUR) have generated different legislative documents to control the use of PCR-PET in the production of plastic packaging intended direct food contact in order to ensure the capacity of recycling process to remove possible contaminants that can migrate into food. Consequently, it is necessary to demonstrate by challenge test that the recycling process is able to remove specific contaminants, obtaining a safe recycled plastic to human health. These documents establish that the concentration limit for substitute contaminants in PET is 220 ppb (ug/kg) and the specific migration limit is 10 ppb (ug/kg) for each contaminant, in addition to assure the sensorial characteristics of food are not affected. Moreover, under the Commission Regulation (EU) N°10/2011 on plastic materials and articles intended to come into contact with food, it is established that overall migration limit is 10 mg of substances per 1 dm2 of surface area of the plastic material. Thus, the aim of this work is to determine the safety of PCR-PET-containing food packaging materials in Chile by measuring their overall migration, and their comparison with the established limits at international level. This information will serve as a basis to provide a regulation to control and regulate the use of recycled plastic materials in the manufacture of plastic packaging intended to be in direct contact with food. The methodology used involves a procedure according to EN-1186:2002 with some modifications. The food simulants used were ethanol 10 % (v/v) and acetic acid 3 % (v/v) as aqueous food simulants, and ethanol 95 % (v/v) and isooctane as substitutes of fatty food simulants. In this study, preliminary results showed that Chilean food packaging plastics with different PCR-PET percentages agree with the European Legislation for food aqueous character.

Keywords: contaminants, polyethylene terephthalate, plastic food packaging, recycling

Procedia PDF Downloads 276
5510 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 97
5509 Farmers’ Perception and Response to Climate Change Across Agro-ecological Zones in Conflict-Ridden Communities in Cameroon

Authors: Lotsmart Fonjong

Abstract:

The livelihood of rural communities in the West African state of Cameroon, which is largely dictated by natural forces (rainfall, temperatures, and soil), is today threatened by climate change and armed conflict. This paper investigates the extent to which rural communities are aware of climate change, how their perceptions of changes across different agro-ecological zones have impacted farming practices, output, and lifestyles, on the one hand, and the extent to which local armed conflicts are confounding their efforts and adaptation abilities. The paper is based on a survey conducted among small farmers in selected localities within the forest and savanna ecological zones of the conflict-ridden Northwest and Southwest Cameroon. Attention is paid to farmers’ gender, scale, and type of farming. Farmers’ perception of/and response to climate change are analysed alongside local rainfall and temperature data and mobilization for climate justice. Findings highlight the fact that farmers’ perception generally corroborates local climatic data. Climatic instability has negatively affected farmers’ output, food prices, standards of living, and food security. However, the vulnerability of the population varies across ecological zones, gender, and crop types. While these factors also account for differences in local response and adaptation to climate change, ongoing armed conflicts in these regions have further complicated opportunities for climate-driven agricultural innovations, inputs, and exchange of information among farmers. This situation underlines how poor communities, as victims, are forced into many complex problems outsider their making. It is therefore important to mainstream farmers’ perceptions and differences into policy strategies that consider both climate change and Anglophone conflict as national security concerns foe sustainable development in Cameroon.

Keywords: adaptation policies, climate change, conflict, small farmers, cameroon

Procedia PDF Downloads 156
5508 Food and Agricultural Waste Management for Sustainable Agriculture

Authors: Shubhangi Salokhe

Abstract:

Agriculture encompasses crop and livestock production, forestry, and fisheries for food and non-food products. Farmers combine land, water, commercial inputs, labor, and their management skills into practices and systems that produce food and fibre. Harvesting of agricultural produce is either followed by the processing of fresh produce or storage for later consumption. All these activities result in a vast generation of waste in terms of crop residue or food waste. So, a large amount of agricultural waste is produced every year. Waste arising from food and agricultural sectors has the potential for vast applications. So, agricultural waste management is an essential component of sustainable agriculture. The major portion of the waste comes from the residues of crops on farms, food processing, livestock, aquaculture, and agro-industry waste. Therefore, management of these agricultural wastes is an important task, and it requires robust strategic planning. It can contribute to three pillars of sustainable agriculture development. It protects the environment (environmental pillar), enhances the livelihoods of farmers (economic pillar), and can contribute to increasing the sustainability of the agricultural sector (social pillar). This paper addresses the essential technological aspects, possible solutions, and sound policy concerns to accomplish long-term way out of agriculture waste management and to minimize the negative impact of waste on the environment. The author has developed a sustainable agriculture waste management model for improving the sustainability of agriculture.

Keywords: agriculture, development, management, waste

Procedia PDF Downloads 50
5507 Examples of Techniques and Algorithms Used in Wlan Security

Authors: Vahid Bairami Rad

Abstract:

Wireless communications offer organizations and users many benefits such as portability and flexibility, increased productivity, and lower installation costs. Wireless networks serve as the transport mechanism between devices and among devices and the traditional wired networks (enterprise networks and the internet). Wireless networks are many and diverse but are frequently categorized into three groups based on their coverage range: WWAN, WLAN, and WPAN. WWAN, representing wireless wide area networks, includes wide coverage area technologies such as 2G cellular, Cellular Digital Packet Data (CDPD), Global System for Mobile Communications (GSM), and Mobitex. WLAN, representing wireless local area networks, includes 802.11, Hyper lan, and several others. WPAN, represents wireless personal area network technologies such as Bluetooth and Infrared. The security services are provided largely by the WEP (Wired Equivalent Privacy) protocol to protect link-level data during wireless transmission between clients and access points. That is, WEP does not provide end-to-end security but only for the wireless portion of the connection.

Keywords: wireless lan, wired equivalent privacy, wireless network security, wlan security

Procedia PDF Downloads 569
5506 Effects of Cacao Agroforestry and Landscape Composition on Farm Biodiversity and Household Dietary Diversity

Authors: Marlene Yu Lilin Wätzold, Wisnu Harto Adiwijoyo, Meike Wollni

Abstract:

Land-use conversion from tropical forests to cash crop production in the form of monocultures has drastic consequences for biodiversity. Meanwhile, high dependence on cash crop production is often associated with a decrease in other food crop production, thereby affecting household dietary diversity. Additionally, deforestation rates have been found to reduce households’ dietary diversity, as forests often offer various food sources. Agroforestry systems are seen as a potential solution to improve local biodiversity as well as provide a range of provisioning ecosystem services, such as timber and other food crops. While a number of studies have analyzed the effects of agroforestry on biodiversity, as well as household livelihood indicators, little is understood between potential trade-offs or synergies between the two. This interdisciplinary study aims to fill this gap by assessing cacao agroforestry’s role in enhancing local bird diversity, as well as farm household dietary diversity. Additionally, we will take a landscape perspective and investigate in what ways the landscape composition, such as the proximity to forests and forest patches, are able to contribute to the local bird diversity, as well as households’ dietary diversity. Our study will take place in two agro-ecological zones in Ghana, based on household surveys of 500 cacao farm households. Using a subsample of 120 cacao plots, we will assess the degree of shade tree diversity and density using drone flights and a computer vision tree detection algorithm. Bird density and diversity will be assessed using sound recordings that will be kept in the cacao plots for 24 hours. Landscape compositions will be assessed via remote sensing images. The results of our study are of high importance as they will allow us to understand the effects of agroforestry and landscape composition in improving simultaneous ecosystem services.

Keywords: agroforestry, biodiversity, landscape composition, nutrition

Procedia PDF Downloads 113
5505 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 476
5504 Enhanced Model for Risk-Based Assessment of Employee Security with Bring Your Own Device Using Cyber Hygiene

Authors: Saidu I. R., Shittu S. S.

Abstract:

As the trend of personal devices accessing corporate data continues to rise through Bring Your Own Device (BYOD) practices, organizations recognize the potential cost reduction and productivity gains. However, the associated security risks pose a significant threat to these benefits. Often, organizations adopt BYOD environments without fully considering the vulnerabilities introduced by human factors in this context. This study presents an enhanced assessment model that evaluates the security posture of employees in BYOD environments using cyber hygiene principles. The framework assesses users' adherence to best practices and guidelines for maintaining a secure computing environment, employing scales and the Euclidean distance formula. By utilizing this algorithm, the study measures the distance between users' security practices and the organization's optimal security policies. To facilitate user evaluation, a simple and intuitive interface for automated assessment is developed. To validate the effectiveness of the proposed framework, design science research methods are employed, and empirical assessments are conducted using five artifacts to analyze user suitability in BYOD environments. By addressing the human factor vulnerabilities through the assessment of cyber hygiene practices, this study aims to enhance the overall security of BYOD environments and enable organizations to leverage the advantages of this evolving trend while mitigating potential risks.

Keywords: security, BYOD, vulnerability, risk, cyber hygiene

Procedia PDF Downloads 76
5503 Dietary Diversity and Nutritional Status of Adolescents Attending Public Secondary Schools in Oyo State Nigeria

Authors: Nimot Opeyemi Wahab

Abstract:

Poor nutritional status during adolescence is a reflection of inadequate intake of nutrients. This can also be associated with a lack of consumption of diverse food. This study assessed the nutritional status and dietary diversity score (DDS) of in-school adolescents in Ibadan North, North East, and Ibadan South West Local Government Areas (LGA) of Oyo State, Nigeria. A cross-sectional study involving 3,510 in-school adolescents from the three LGA was conducted. Nutrient intake was measured using a validated 24-hour dietary recall, and the anthropometric measurement was also taken. Dietary diversity score (DDS) was assessed using the Individual Dietary Diversity Score (WDDS) of nine food groups. Participants were between 10-19years, and the mean age was 14.76±1.68, 15.32±1.77, and 15.45±1.62 in Ibadan North, Ibadan North East, and Ibadan South West, respectively. About 48% of the participants were male (47.9%), while 52.1% were female. BMI-for-age showed that 92.1%, 5.4%, 2.1%, and 0.4% of the participants were normal, underweight, overweight, and obese, respectively. The mean energy intake (143.193±695.98) of the female respondents was more than that of the male respondents (1406.86±767.41). The macronutrients intake (protein, carbohydrates, fiber, and fats) of the female participants was also found to be more than that of the male participants, with a non-significant difference of 0.336, 0.530, 0.234, and 0.069 (at p< 0.05). Out of all the vitamin intake, only vitamin C was found to be statistically different (p=0.038) at p<0.05 between the male and female respondents. Of all the mineral intake, only phosphorus showed a higher intake (575.20±362.12) among female respondents than the male respondents. The mean DDS of all participants was 4.59±0.939. The majority of the participants, 1183 (80.9%), were within the medium DDS category, 9.9% were low, while 1.5% were in the high category: of which males were 474 (71.5%) and females were 709 (88.6%). Participants from Ibadan North were 941(88.5%), and those from South West were 242(60.5%). A non-significant difference in the mean score of participants from the two locations (p=0.467) was also found. A negative correlation exists between DDS and BMI-for age (-0.11), DDS, and energy intake (-0.46) in Ibadan North and South West LGA. The nutritional status of in-school adolescents was normal, and DDS was within the medium category. Nutrition intervention regarding the consumption of diverse food is necessary among adolescents.

Keywords: nutritional status, dietary diversity, adolescents, nutrient intake

Procedia PDF Downloads 76
5502 Rural Territorial Sustainable Development: Interinstitutional Dialogue and Transition to Sustainable Livelihoods

Authors: Aico Nogueira

Abstract:

This paper examines the interinstitutional dialogues within the Brazilian federal structures, which comprises federal, state and local levels, around the themes of new approaches and interventions aimed to promote sustainable rural development, particularly rural development as part of a territorial approach. The work seeks to understand to what extent the various levels of the state interact with these strategies, particularly with the locally constituted powers, focusing on the importance of the transition of traditional agriculture methods to more sustainable agroecological systems and its effects on food security and sustainable rural development. The research analyses as case studies the Sustainable Rural Territories Development Program (PRONAT) of the Ministry of Agrarian Development at the federal level, as well as the State of São Paulo and the Vale do Ribeira Territory, an area characterized by environmental and social vulnerability, restrictive environmental laws and attempts to promote sustainable development. In order to examine how the interrelationships between different levels of governance and civil society, in addition to the neo-institutionalist polity centered literature, the research uses an adaptation of the concept of arena in Ostrom and Hannigan, produced at different scales of decision-making processes, as well as the multilevel governance literature. Document analysis, interviews, focus groups and direct observation techniques are also used. The main findings of this study are that how different levels of governance understand and organize themselves for this work and have a direct impact on the actions taken. Consequently, programs formulated for this purpose are not associated with the creation of institutions capable of breaking with a traditional sectoral view that has historically prevailed in policymaking. And the transition from traditional agriculture to agroecological production systems is hampered by a sectorial foundation, based on large-scale production and the strengthening of the traditional country's land concentration model.

Keywords: agroecology, food security, inter-institutional dialogue, rural poverty, sustainable rural development, territorial development

Procedia PDF Downloads 202
5501 Rapid and Culture-Independent Detection of Staphylococcus Aureus by PCR Based Protocols

Authors: V. Verma, Syed Riyaz-ul-Hassan

Abstract:

Staphylococcus aureus is one of the most commonly found pathogenic bacteria and is hard to eliminate from the human environment. It is responsible for many nosocomial infections, besides being the main causative agent of food intoxication by virtue of its variety of enterotoxins. Routine detection of S. aureus in food is usually carried out by traditional methods based on morphological and biochemical characterization. These methods are time-consuming and tedious. In addition, misclassifications with automated susceptibility testing systems or commercially available latex agglutination kits have been reported by several workers. Consequently, there is a need for methods to specifically discriminate S. aureus from other staphylococci as quickly as possible. Data on protocols developed using molecular means like PCR technology will be presented for rapid and specific detection of this pathogen in food, clinical and environmental samples, especially milk.

Keywords: food Pathogens, PCR technology, rapid and specific detection, staphylococcus aureus

Procedia PDF Downloads 513
5500 Assessing Smallholder Rice and Vegetable Farmers’ Constraints and Needs to Adopt Small-Scale Irrigation in South Tongu District, Ghana

Authors: Tamekloe Michael Kossivi, Kenichi Matsui

Abstract:

Irrigation access is one of the essential rural development investment options that can significantly improve smallholder farmers’ agriculture productivity. Investment in irrigation infrastructural development to supply adequate water could improve food security, growth in income for farmers, poverty alleviation, and improve business and livelihood. This paper assesses smallholder farmers’ constraints and the needs to adopt small-scale irrigation for crops production in the South Tongu District of Ghana. The data collection involved database search, questionnaire survey, interview, and field work. The structured questionnaire survey was administered from September to November 2020 among 120 respondents in six purposively sampled irrigation communities in the District. The questions focused on small-scale irrigation development constraints and needs. As a result, we found that the respondents relied mainly on rainfall for agriculture production. They did not have adequate irrigation access. Even though the District is blessed with open arable lands and rich water sources for rice and vegetable production on a massive scale, water sources like the Lower Volta River, Tordzi River, and Avu Lagoon were not close enough to the respondents. The respondents faced inadequate credit support (100%), unreliable rainfall (76%), insufficient water supply (54%), and unreliable water delivery challenges on their farms (53%). Physical constraints for the respondents to adopt irrigation included flood (77%), drought (93%), inadequate irrigation technology (59%), and insufficient technical know-how (65%). Farmers were interested in investing in irrigation infrastructural development to enhance productivity on their farms only if they own the farmlands. External support from donors on irrigation systems did not allow smallholder farmers to control irrigation facilities.

Keywords: constraints, food security, needs, smallholder farmers, small-scale irrigation

Procedia PDF Downloads 137
5499 Development of Probiotic Edible Film Coated Extruded Food Product

Authors: Manab Bandhu Bera, Navdeep Singh, Paramjit Singh Panesar

Abstract:

In view of exploiting the health benefits of probiotic yeast S.boulardii NCDC 363 and make it available in the form of non-dairy food products, study was undertaken. In this, probiotic yeast S.boulardii NCDC 363 was incorporated in the edible film made from sodium alginate (SA), whey protein concentrate (WPC) and glycerol (50%). Response surface methodology was used to optimize process variables such as; concentration of SA (0.25-0.75%), WPC (1-2%) and temperature (70-80°C) and also to investigate effect of these process variables on viability of probiotic yeast and hardness when applied as an edible coat on extruded food products. Accelerated storage stability of optimized probiotic extruded food products samples was determined at 38 C and 90% RH. The optimized products were packed in high-density polyethylene (HDPE) and aluminum laminated polyethylene (ALP) pouches at 38°C and relative humidity maintained was 90%. It was observed that product stored in ALP had better stability in terms of moisture absorption, hardness and viability.

Keywords: probiotic yeast, extruded food product, WPC, RSM

Procedia PDF Downloads 276
5498 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe

Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran

Abstract:

The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.

Keywords: access control, multimodal biometrics, pattern recognition, security safe

Procedia PDF Downloads 335
5497 Teaching Food Discourse in Cross-Cultural Communication Lectures at University

Authors: Sanjar Davronov

Abstract:

Linguistic research of food discourse helps to analyze gastronomic picture of the world which plays important role in cross-cultural communications. 20 hours lecture can’t provide broad knowledge about national picture of the world of native speakers whose language being studied by future translator students. This abstract analyses how to research food discourse in “Cross-cultural (or lingvo-cultural) communication” lectures for ESL students. During compare Uzbek and American national meals, we found some specific features of food names in both countries. For example: If names of food includes advertising character in USA restaurant menus like: New York strip Sirloin crowned with Fresh – squeezed orange and lemon with a hint of garlic; Uzbek meals names are too simple, short and force general afford in underlining action – preparation process like: “Dimlama” (dimla(verb-to stew)+ma(suffix of past perfect like- stew- stewed). “Qovurdoq” (qovur (verb- to fry)+ doq (suffix of adverb like “fried one”) but these are the most delicious and difficult in preparing national meals however it is heritage of national cuisine. There are also similarity between US and Uzbek food names which has geographical color - South African Lobster tail; Qashqadaryo tandiri (lamb prepared in “tandir” typical national oven with pine leafs in Qashkadarya region). Food for European people contains physical context more than spiritual but in Asian literature especially Uzbek food has some pragmatic stuff: salt and bread (associates with hospitality and humanity), don’t be faithlessness 40 for owners of house where you where a guest. We share some teaching techniques for food discourse analyzing lectures.

Keywords: cross-cultural communications, food discourse, ESL lectures, linguistic research

Procedia PDF Downloads 616
5496 Basics of SCADA Security: A Technical Approach

Authors: Michał Witas

Abstract:

This paper presents a technical approach to analysis of security of SCADA systems. Main goal of the paper is to make SCADA administrators aware of risks resulting from SCADA systems usage and to familiarize with methods that can be adopt to existing or planned system, to increase overall system security level. Because SCADA based systems become a industrial standard, more attention should be paid to the security of that systems. Industrial Control Systems (ICS) like SCADA are responsible for controlling crucial aspects of wide range of industrial processes. In pair with that responsibility, goes a lot of money that can be earned or lost – this fact is main reason of increased interest of attackers. Additionally ICS are often responsible for maintaining resources strategic from the point of view of national economy, like electricity (including nuclear power plants), heating, water resources or military facilities, so they can be targets of terrorist cybernetic attacks. Without proper risk analysis and management, vulnerabilities resulting from the usage of SCADA can be easily exploited by potential attacker. Paper is based mostly on own experience in systems security, gathered during academic studies and professional work in international company. As title suggests, it will cover only basics of topic, because every of points mentioned in the document can be base for additional research and papers.

Keywords: denial of service, SCADA, security policy, distributed network

Procedia PDF Downloads 373
5495 Analysis of Critical Success Factors for Implementing Industry 4.0 and Circular Economy to Enhance Food Traceability

Authors: Mahsa Pishdar

Abstract:

Food traceability through the supply chain is facing increased demand. IoT and blockchain are among the tools under consideration in the Industry 4.0 era that could be integrated to help implementation of the Circular Economy (CE) principles while enhancing food traceability solutions. However, such tools need intellectual system, and infrastructureto be settled as guidance through the way, helping overcoming obstacles. That is why the critical success factors for implementing Industry 4.0 and circular economy principles in food traceability concept are analyzed in this paper by combination of interval type 2 fuzzy Worst Best Method and Measurement Alternatives and Ranking according to Compromise Solution (Interval Type 2 fuzzy WBM-MARCOS). Results indicate that “Knowledge of Industry 4.0 obligations and CE principle” is the most important factor that is the basis of success following by “Management commitment and support”. This will assist decision makers to seize success in gaining a competitive advantage while reducing costs through the supply chain.

Keywords: food traceability, industry 4.0, internet of things, block chain, best worst method, marcos

Procedia PDF Downloads 207
5494 Negotiating Increased Food Production with African Indigenous Agricultural Knowledge: The Ugandan Case

Authors: Harriet Najjemba, Simon Peter Rutabajuuka, Deo Katono Nzarwa

Abstract:

Scientific agricultural knowledge was introduced in Africa, including Uganda, during colonial rule. While this form of knowledge was introduced as part of Western scientific canon, African indigenous knowledge was not destroyed and has remained vital in food production. Modern scientific methods were devoted to export crops while food crop production was left to Africans who continued to use indigenous knowledge. Today, indigenous agricultural knowledge still provides farming skills and practices, more than a century since modern scientific agricultural knowledge was introduced in Uganda. It is evident that there is need to promote the still useful and more accessible indigenous agricultural practices in order to sustain increased food production. It is also important to have a tailor made agricultural knowledge system that combines practical indigenous practices with financially viable western scientific agricultural practices for sustained food production. The proposed paper will explain why the African indigenous agricultural knowledge has persisted and survived for over a century after colonial introduction of western scientific agricultural knowledge. The paper draws on research findings for a PhD study at Makerere University, Uganda. The study uses both written and oral sources, including colonial and postcolonial archival documents, and interviews. It critiques the parameters within which Western farming methods were introduced to African farmers.

Keywords: food production, food shortage, indigenous agricultural knowledge, western scientific agricultural practices

Procedia PDF Downloads 460
5493 An Investigation of Performance Versus Security in Cognitive Radio Networks with Supporting Cloud Platforms

Authors: Kurniawan D. Irianto, Demetres D. Kouvatsos

Abstract:

The growth of wireless devices affects the availability of limited frequencies or spectrum bands as it has been known that spectrum bands are a natural resource that cannot be added. Many studies about available spectrum have been done and it shows that licensed frequencies are idle most of the time. Cognitive radio is one of the solutions to solve those problems. Cognitive radio is a promising technology that allows the unlicensed users known as secondary users (SUs) to access licensed bands without making interference to licensed users or primary users (PUs). As cloud computing has become popular in recent years, cognitive radio networks (CRNs) can be integrated with cloud platform. One of the important issues in CRNs is security. It becomes a problem since CRNs use radio frequencies as a medium for transmitting and CRNs share the same issues with wireless communication systems. Another critical issue in CRNs is performance. Security has adverse effect to performance and there are trade-offs between them. The goal of this paper is to investigate the performance related to security trade-off in CRNs with supporting cloud platforms. Furthermore, Queuing Network Models with preemptive resume and preemptive repeat identical priority are applied in this project to measure the impact of security to performance in CRNs with or without cloud platform. The generalized exponential (GE) type distribution is used to reflect the bursty inter-arrival and service times at the servers. The results show that the best performance is obtained when security is disable and cloud platform is enable.

Keywords: performance vs. security, cognitive radio networks, cloud platforms, GE-type distribution

Procedia PDF Downloads 346