Search results for: global food security index
12917 Groundwater Quality Assessment Using Water Quality Index and Geographical Information System Techniques: A Case Study of Busan City, South Korea
Authors: S. Venkatramanan, S. Y. Chung, S. Selvam, E. E. Hussam, G. Gnanachandrasamy
Abstract:
The quality of groundwater was evaluated by major ions concentration around Busan city, South Korea. The groundwater samples were collected from 40 wells. The order of abundance of major cations concentration in groundwater is Na > Ca > Mg > K, in case of anions are Cl > HCO₃ > SO₄ > NO₃ > F. Based on Piper’s diagram Ca (HCO₃)₂, CaCl₂, and NaCl are the leading groundwater types. While Gibbs diagram suggested that most of groundwater samples belong to rock-weathering zone. Hydrogeochemical condition of groundwater in this city is influenced by evaporation, ion exchange and dissolution of minerals. Water Quality Index (WQI) revealed that 86 % of the samples belong to excellent, 2 % good, 4 % poor to very poor and 8 % unsuitable categories. The results of sodium absorption ratio (SAR), Permeability Index (PI), Residual Sodium Carbonate (RSC) and Magnesium Hazard (MH) exhibit that most of the groundwater samples are suitable for domestic and irrigation purposes.Keywords: WQI (Water Quality Index), saturation index, groundwater types, ion exchange
Procedia PDF Downloads 26812916 A Practice of Zero Trust Architecture in Financial Transactions
Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu
Abstract:
In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.Keywords: zero trust, trading terminal, architecture, network security, cybersecurity
Procedia PDF Downloads 17412915 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems
Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos
Abstract:
Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system
Procedia PDF Downloads 18612914 Effect of Climate Change on Nutritional Status of Women in Nigeria
Authors: Onu Theresa Chinyere
Abstract:
The study evaluates the perceived effect of climate change on nutritional status of women in Nigeria. Five research questions and two hypotheses were formulated to guide the study. The study adopted a survey and experimental study research design. One thousand two hundred and fifty one (1,250) respondents were selected from different State in Nigeria using multistage sampling technique. The instruments used to collect data were questionnaire and personal interview on socio economic characteristics of respondents, while Anthropometric data (height and weight) were also used. The data was analyzed using t-test statistic, decided at 50% level of significance. The study found that most states in Nigeria experience high winds, warmer and frequent hot days and night over most land areas, droughts and tides during climate change events. The respondent unanimously agree that climate change causes reduction in food yields, decline in food availability/supply, negatively affecting soil quality, carbon fertilization, decreases flexibilities in technology choices to strengthen food production. The Anthropometric analysis shows that out of 1250 women sampled, 560 (44.8%) maintain normal weight, while 405 (32.40%) women were found to be underweight, since their body mass index is less that 18.5. There were few cases of obesity among the surveyed women since only 80 out of 1250 which represent 6.4% of the women were obese. Bases on the findings, the following recommendations were made-local fertilizer should be encouraged to boost foods yield especially during climate change: women should imbibe the culture of preservation or reservoir that will help in mitigating the effects of climate on food intake and nutritional status, especially during the crisis period, among others.Keywords: climate change, nutrition anthropometric analysis, obesity culture, environment and women among others
Procedia PDF Downloads 42912913 Drivers for Relationship Building in the Supply Chain: The Case of Luxury Food
Authors: Kateryna Merkulova, Alessio Castello, Maria Kreuzer
Abstract:
This research investigates the drivers of long-term relationship building between customers and suppliers within the luxury food supply chain, a topic that remains largely unexplored in the current state of academic literature. This paper identifies for the first time the key elements that influence the formation and maintenance of effective supply chain relationships, which are crucial for navigating the complexities of the luxury food industry. In particular, it explores the critical role of trust in a business-to-business context, specifically emphasizing its significance in the luxury food supply chain. Empirically, this research is contextualized in the region of the French Riviera, which offers a gastronomic playground for food enthusiasts, making it ideally suited to explore the luxury food sector. Qualitative in-depth interviews with stakeholders along the luxury supply chain (i.e., suppliers, chefs, restaurant owners, and fine food shop managers) allow identifying key drivers of trustful business relationships. Triangulating different perspectives of stakeholders within the luxury supply chain adds validity and robustness to the findings. The findings have important theoretical and managerial implications for the effective functioning of long-term supplier-buyer relationships.Keywords: luxury food, relationship building, B2B, supply chain, trust
Procedia PDF Downloads 5612912 Sector-Wide Collaboration to Reduce Food Waste
Authors: Carolyn Cameron
Abstract:
Stop Food Waste Australia is working with the industry to co-design sector action plans to prevent and reduce food waste across the supply chain. We are a public-private partnership, funded in 2021 by the Australian national government under the 2017 National Food Waste Strategy. Our partnership has representatives from all levels of government, industry associations from farm to fork, and food rescue groups. Like many countries, Australia has adopted the Sustainable Development Goal (SDG) target of 12.3 to halve food waste by 2030. A seminal 2021 study, the National Food Waste Feasibility Report, developed a robust national baseline, illustrating hotspots in commodities and across the supply chain. This research found that the consumption stages – households, food service, and institutions - account for over half of all food waste, and 22% of food produced never leaves the farm gate. Importantly the study found it is feasible for Australia to meet SDG 12.3, but it will require unprecedented action by governments, industry, and the community. Sector Action Plans (Plan) are one of the four main initiatives of Stop Food Waste Australia, including a voluntary commitment, a coordinated food waste communications hub, and robust monitoring and reporting framework. These plans provide a systems-based approach to reducing food loss and waste while realising multiple benefits for supply chain partners and other collaborators. Each plan is being co-designed with the key stakeholders most able to directly control or influence the root cause(s) of food waste hotspots and to take action to reduce or eliminate food waste in their value chain. The initiatives in the Plans are fit-for-purpose, reflecting current knowledge and recognising priorities may refocus over time. To date, sector action plans have been developed with the Food Rescue, Cold Chain, Bread and Bakery, and Dairy Sectors. Work is currently underway on Meat and Horticulture, and we are also developing supply-chain stage plans for food services and institutions. The study will provide an overview of Australia’s food waste baseline and challenges, the important role of sector action plans in reducing food waste, and case studies of implementation outcomes.Keywords: co-design, horticulture, sector action plans, voluntary
Procedia PDF Downloads 13712911 Silver Nanoparticle Application in Food Packaging and Impacts on Food Safety and Consumer’s Health
Authors: Worku Dejene Bekele, András Marczika Csilla Sörös
Abstract:
Silver nanoparticles are silver metal with a size of 1-100nm. The most common source of silver nanoparticles is inorganic salts. Nanoparticles can be ingested through our foods and constitute nanoparticles and silver ions, whether as an additive or by migrants and, in some cases, as a pollutant. Silver nanoparticles are the most widely applicable engineered nanomaterials, especially for antimicrobial function. Ag nanoparticles give different advantages in the case of food safety, quality, and overall acceptability; however, they affect the health of humans and animals, putting them at risk of health problems and environmental pollution. Silver nanoparticles have been used widely in food packaging technologies, especially in water treatments, meat and meat products, fruit, and many other food products. This is for bio-preservation from food products. The primary goal of this review is to determine the safety and health impact of Ag nanoparticles application in food packaging and analysis of the human organs more affected by this preservative technology, to assess the implications of a nanoparticle on food safety, to determine the effects of nanoparticles on consumers health and to determine the impact of nanotechnology on product acceptability. But currently, much research has demonstrated that there is cause to believe that silver nanoparticles may have toxicological effects on biological organs and systems. The silver nanoparticles affect DNA expression, gastrointestinal barriers, lungs, and other breathing organs illness. Silver particles and molecules are very toxic. During its application in food packaging, food industries used the thinnest particle. This particle can potentially affect the gastrointestinal tracts-it suffers from mucus production, DNA, lungs, and other breezing organs. This review is targeted to demonstrate the knowledge gap that industrials use in the application of silver nanoparticles in food packaging and preservation and its health effects on the consumer.Keywords: food preservatives, health impact, nanoparticle, silver nanoparticle
Procedia PDF Downloads 7612910 Effects of Irregular Migration from Different Aspects of Security
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.Keywords: irregular migration, the changing dimensions of security, human security, social security
Procedia PDF Downloads 34012909 Multi Attribute Failure Mode Analysis of the Catering Systems: A Case Study of Sefako Makgatho Health Sciences University in South Africa
Authors: Mokoena Oratilwe Penwell, Seeletse Solly Matshonisa
Abstract:
The demand for quality products is a vital factor determining the success of a producing company, and the reality of this demand influences customer satisfaction. In Sefako Makgatho Health Sciences University (SMU), concerns over the quality of food being sold have been raised by mostly students and staff who are primary consumers of food being sold by the cafeteria. Suspicions of food poisoning and the occurrence of diarrhea-related to food from the cafeteria, amongst others, have been raised. However, minimal measures have been taken to resolve the issue of food quality. New service providers have been appointed, and still, the same trends are being observed, the quality of food seems to depreciate continuously. This paper uses multi-attribute failure mode analysis (MAFMA) for failure detection and minimization on the machines used for food production by SMU catering company before being sold to both staff, and students so as to improve production plant reliability, and performance. Analytical Hierarchy Process (AHP) will be used for the severity ranking of the weight criterions and development of the hierarchical structure for the cafeteria company. Amongst other potential issues detected, maintenance of the machines and equipment used for food preparations was of concern. Also, the staff lacked sufficient hospitality skills, supervision, and management in the cafeteria needed greater attention to mitigate some of the failures occurring in the food production plant.Keywords: MAFMA, food quality, maintenance, supervision
Procedia PDF Downloads 13912908 Security Analysis and Implementation of Achterbahn-128 for Images Encryption
Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri
Abstract:
In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis
Procedia PDF Downloads 31612907 Exploring the Food Environments and Their Influence on Food Choices of Working Adults
Authors: Deepa Shokeen, Bani Tamber Aeri
Abstract:
Food environments are believed to play a significant role in the obesity epidemic and robust research methods are required to establish which factors or aspects of the food environment are relevant to food choice and to adiposity. The relationship between the food environment and obesity is complex. While there is little research linking food access with obesity as an outcome measure in any age group, with the help of this article we will try to understand the relationship between what we eat and the environmental context in which these food choices are made. Methods: A literature search of studies published between January 2000 and December 2013 was undertaken on computerized medical, social science, health, nutrition and education databases including Google, PubMed etc. Reports of organisations such as World Health Organisation (WHO), Centre for Chronic Disease Control (CCDC) were studied to project the data. Results: Studies show that food environments play a significant role in the obesity epidemic and robust research methods are required to establish which factors or aspects of the food environment are relevant to food choice and to adiposity. Evidence indicates that the food environment may help explain the obesity and cardio-metabolic risk factors among young adults. Conclusion: Cardiovascular disease is the ever growing chronic disease, the incidence of which will increase markedly in the coming decades. Therefore, it is the need of the hour to assess the prevalence of various risk factors that contribute to the incidence of cardiovascular diseases especially in the work environment. Research is required to establish how different environments affect different individuals as individuals interact with the environment on a number of levels. We need to ascertain the impact of selected food and nutrition environments (Information, organization, community, consumer) on food choice and dietary intake of the working adults as it is important to learn how these food environments influence the eating perceptions and health behaviour of the adults.Keywords: food environment, prevalence, cardiovascular disease, India, worksite, risk factors
Procedia PDF Downloads 40412906 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning
Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot
Abstract:
The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines
Procedia PDF Downloads 15412905 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Authors: Carlos Gonzalez
Abstract:
This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.Keywords: internet, secure software, threats, cryptography process
Procedia PDF Downloads 33712904 Evaluation and Provenance Studies of Heavy Mineral Deposits in Recent Sediment of Ologe Lagoon, South Western, Nigeria
Authors: Mayowa Philips Ibitola, Akinade-Solomon Olorunfemi, Abe Oluwaseun Banji
Abstract:
Heavy minerals studies were carried out on eighteen sediment samples from Ologe lagoon located at Lagos Barrier complex, with the aim of evaluating the heavy mineral deposits and determining the provenance of the sediments. The samples were subjected to grain analysis techniques in order to collect the finest grain size. Separation of heavy minerals from the samples was done with the aid of bromoform to enable petrographic analyses of the heavy mineral suite, under the polarising microscope. The data obtained from the heavy mineral analysis were used in preparing histograms and pie chart, from which the individual heavy mineral percentage distribution and ZTR index were derived. The percentage composition of the individual heavy mineral analyzed are opaque mineral 63.92%, Zircon 12.43%, Tourmaline 5.79%, Rutile 13.44%, Garnet 1.74% and Staurolite 3.52%. The calculated zircon, tourmaline, rutile index in percentage (ZTR) varied between 76.13 -92.15%, average garnet-zircon index (GZI), average rutile-zircon index (RuZI) and average staurolite-zircon index values in all the stations are 16.18%, 54.33%, 25.11% respectively. The mean ZTR index percentage value is 85.17% indicates that the sediments within the lagoon are mineralogically matured. The high percentage of zircon, rutile, and tourmaline indicates an acid igneous rock source for the sediments. However, the low percentage of staurolite, rutile and garnet occurrence indicates sediment of metamorphic rock source input.Keywords: lagoon, provenance, heavy mineral, ZTR index
Procedia PDF Downloads 18012903 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law
Procedia PDF Downloads 38712902 Instability Index Method and Logistic Regression to Assess Landslide Susceptibility in County Route 89, Taiwan
Authors: Y. H. Wu, Ji-Yuan Lin, Yu-Ming Liou
Abstract:
This study aims to set up the landslide susceptibility map of County Route 89 at Ren-Ai Township in Nantou County using the Instability Index Method and Logistic regression. Seven susceptibility factors including Slope Angle, Aspect, Elevation, Distance to fold, Distance to River, Distance to Road and Accumulated Rainfall were obtained by GIS based on the Typhoon Toraji landslide area identified by Industrial Technology Research Institute in 2001. To calculate the landslide percentage of each factor and acquire the weight and grade the grid by means of Instability Index Method. In this study, landslide susceptibility can be classified into four grades: high, medium high, medium low and low, in order to determine the advantages and disadvantages of the two models. The precision of this model is verified by classification error matrix and SRC curve. These results suggest that the logistic regression model is a preferred method than instability index in the assessment of landslide susceptibility. It is suitable for the landslide prediction and precaution in this area in the future.Keywords: instability index method, logistic regression, landslide susceptibility, SRC curve
Procedia PDF Downloads 29512901 To Determine the Effects of Regulatory Food Safety Inspections on the Grades of Different Categories of Retail Food Establishments across the Dubai Region
Authors: Shugufta Mohammad Zubair
Abstract:
This study explores the Effect of the new food System Inspection system also called the new inspection color card scheme on reduction of critical & major food safety violations in Dubai. Data was collected from all retail food service establishments located in two zones in the city. Each establishment was visited twice, once before the launch of the new system and one after the launch of the system. In each visit, the Inspection checklist was used as the evaluation tool for observation of the critical and major violations. The old format of the inspection checklist was concerned with scores based on the violations; but the new format of the checklist for the new inspection color card scheme is divided into administrative, general major and critical which gives a better classification for the inspectors to identify the critical and major violations of concerned. The study found that there has been a better and clear marking of violations after the launch of new inspection system wherein the inspectors are able to mark and categories the violations effectively. There had been a 10% decrease in the number of food establishment that was previously given A grade. The B & C grading were also considerably dropped by 5%.Keywords: food inspection, risk assessment, color card scheme, violations
Procedia PDF Downloads 32512900 Foodborne Disease Risk Factors Among Women in Riyadh, Saudi Arabia
Authors: Abdullah Alsayeqh
Abstract:
The burden of foodborne diseases in Saudi Arabia is currently unknown. The objective of this study was to identify risk factors associated with these diseases among women in Riyadh. A cross-sectional study was carried out from March to July, 2013 where participants’ responses indicated that they were at risk of these diseases through improper food-holding temperature (45.28%), inadequate cooking (35.47%), cross-contamination (32.23%), and food from unsafe sources (22.39%). The claimed food safety knowledge by 22.04% of participants was not evidenced by their reported behaviors (p > 0.05). This is the first study to identify the gap in food safety knowledge among women in Riyadh which needs to be addressed by the concerned authorities in the country by engaging women more effectively in food safety educational campaigns.Keywords: foodborne diseases, risk factors, knowledge, women, Saudi Arabia
Procedia PDF Downloads 51412899 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security
Authors: Lisdey Espinoza Pedraza
Abstract:
Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States
Procedia PDF Downloads 41912898 Global Optimization: The Alienor Method Mixed with Piyavskii-Shubert Technique
Authors: Guettal Djaouida, Ziadi Abdelkader
Abstract:
In this paper, we study a coupling of the Alienor method with the algorithm of Piyavskii-Shubert. The classical multidimensional global optimization methods involves great difficulties for their implementation to high dimensions. The Alienor method allows to transform a multivariable function into a function of a single variable for which it is possible to use efficient and rapid method for calculating the the global optimum. This simplification is based on the using of a reducing transformation called Alienor.Keywords: global optimization, reducing transformation, α-dense curves, Alienor method, Piyavskii-Shubert algorithm
Procedia PDF Downloads 50612897 Alternative Futures for the Middle East
Authors: Dorsa Bakhshandehgeyazdi
Abstract:
This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group
Procedia PDF Downloads 29612896 Assessing EU-China Security Interests from Contradiction to Convergence
Authors: Julia Gurol
Abstract:
Why do we observe a shift towards convergence in EU-China security interests? While contradicting attitudes towards key principles of inter-state and region-to-state relations, including state sovereignty, territorial integrity, and intervention policies have ever since hindered EU-China inter-regional cooperation beyond the economic realm, collaboration in peace and security issues is now becoming a key pillar of European-Chinese relations. In addition, the Belt and Road Initiative as most ambitious Chinese foreign policy project explicitly touches upon several European foreign policy and security preferences. Based on these counterintuitive findings, this paper traces the process of convergence of Sino-European security interests. Drawing on qualitative text analysis of official Chinese and European policy papers and documents from the establishment of diplomatic relations in 1975 until today, it assesses the striking change over time. On this basis, the paper uses theories of neo-functionalism, inter-regionalism, and securitization and borrows from constructivist views in International Relations’ theory, to expound possible motives for the change in Chinese and respectively European preferences in the security realm. The results reveal interesting insights into the decisive factors and motives behind both countries’ foreign policies. The paper concludes with a discussion of further potential and difficulties of EU-China security cooperation.Keywords: belt and road initiative, China, European Union, foreign policy, neo-functionalism, security
Procedia PDF Downloads 28912895 Heritage and the Sustainable Development Goals: Successful Practices and Lessons Learnt from the Uk’s Global Challenges Research Fund and Newton Research Portfolios
Authors: Francesca Giliberto
Abstract:
Heritage and culture, in general, plays a central role in addressing the complexity and broad variety of global development challenges, ranging from environmental degradation and refugee and humanitarian crisis to extreme poverty, food insecurity, persisting inequalities, and unsustainable urbanisation, just to mention some examples. Nevertheless, the potential of harnessing heritage to address global challenges has remained largely under-represented and underestimated in the most recent international development agenda adopted by the United Nations in 2015 (2030 Agenda). Among the 17 sustainable development goals (SDGs) and 169 associated targets established, only target 11.4 explicitly mentions heritage, stating that efforts should be strengthened “to protect and safeguard the world’s cultural and natural heritage in order to make our cities safe, resilient, and sustainable”. However, this global target continues to reflect a rather limited approach to heritage for development. This paper will provide a critical reflection on the contribution that using (tangible and intangible) heritage in international research can make to tackling global challenges and supporting the achievement of all the SDGs. It will present key findings and insights from the heritage strand of PRAXIS, a research project from the University of Leeds, which focuses on Arts and Humanities research across 300+ projects funded through the Global Challenges Research Fund and Newton Fund. In particular, this paper will shed light on successful practices and lessons learned from 87 research projects funded through the Global Challenges Research Fund and Newton Fund portfolios in 49 countries eligible for Official Development Assistance (ODA) between 2014 and 2021. Research data were collected through a desk assessment of project data available on UKRI Gateway to Research, online surveys, and qualitative interviews with research principal investigators and partners. The findings of this research provide evidence of how heritage and heritage research can foster innovative, interdisciplinary, inclusive, and transformative sustainable development and the achievement of the SDGs in ODA countries and beyond. This paper also highlights current challenges and research gaps that still need to be overcome to rethink current approaches and transform our development models to be more integrated, human-centred, and sustainable.Keywords: global challenges, heritage, international research, sustainable development
Procedia PDF Downloads 7712894 Evaluation of Zooplankton Community and Saprobi Index of Carps Culture Ponds: Case Study on East of Golestan Province-Gonbade Kavous City
Authors: Mehrdad Kamali-Sanzighi, Maziar Kamali-Sanzighi
Abstract:
The aim of this research was to study zooplankton community density, diversity and Saprobi index in carp ponds at Golestan province, Gonbade Kavous city, Iran. Zooplankton sampling was done monthly in each pond during one carp culture time. Our analysis showed 27 genus from 4 groups (Protozoa 12, Rotatoria 8, Copepoda 4 and Cladocera 3). The highest and lowest frequency of zooplankton groups were belongs to Rotatoria, Copepoda, Cladocera and Protozoa with 46, 28, 23 and 3 percent, respectively. No significant differences between saprobi index of six carp ponds (P>0.05) were observed. Saprobi index indicated Class ßmesosaprob for six analysis ponds. There was a general tendency to decrease and significantly in the saprobi index with the value range of 1.52-1.70 from the beginning to end of the culture season (P<0.05). Also, gradual improvement of water quality observed toward the end of culture period and these reasons are partly a result of natural and management processed such as seasons changes (climate), water exchange (replacement of water) and pause of introduce of fertilizer materials to the ponds. According to the ability of saprobi index in monitoring of water quality condition and health of different water resources, focus to similar kind of effective research is necessary in future time.Keywords: zooplankton, saprobi pollution index, water quality, fish pond, east of Golestan Province
Procedia PDF Downloads 10412893 Extraction, Characterization and Application of Natural Dyes from the Fresh Rind of Index Colour 5 Mangosteen (Garcinia mangostana L.)
Authors: Basitah Taif
Abstract:
This study was to explore and utilize the fresh rind of mangosteen Index Colour 5 as an upcoming raw material for the production of natural dyes. Rind from the fresh mangosteen Index Colour 5 was utilized to extract the dyes. The established extracts were experimented on silk fabrics via three types of mordanting and dyeing procedures; pre-mordanting, simultaneous mordanting and post-mordanting. As a result, the applications of the freeze-drying methodology and mechanizable equipment have helped to produce excellent range of natural colours. Silk fabric treated simultaneously with mordanting and dyeing with extract dye Index Colour 5 produced a brilliant shade of the red colour and the colour from this index is also discovered sensitive to light and washing during the fastness tests. The preliminary evaluation and instrumentation analysis allowed us to examine whether the application of different mordanting and dyeing procedures with the same extract samples and concentrations affected the colours and shades of the fabric samples.Keywords: natural dye, freeze-drying, Garcinia mangostana Linn, mordanting
Procedia PDF Downloads 46612892 The Study of Security Techniques on Information System for Decision Making
Authors: Tejinder Singh
Abstract:
Information system is the flow of data from different levels to different directions for decision making and data operations in information system (IS). Data can be violated by different manner like manual or technical errors, data tampering or loss of integrity. Security system called firewall of IS is effected by such type of violations. The flow of data among various levels of Information System is done by networking system. The flow of data on network is in form of packets or frames. To protect these packets from unauthorized access, virus attacks, and to maintain the integrity level, network security is an important factor. To protect the data to get pirated, various security techniques are used. This paper represents the various security techniques and signifies different harmful attacks with the help of detailed data analysis. This paper will be beneficial for the organizations to make the system more secure, effective, and beneficial for future decisions making.Keywords: information systems, data integrity, TCP/IP network, vulnerability, decision, data
Procedia PDF Downloads 31112891 Geothermal Resources to Ensure Energy Security During Climate Change
Authors: Debasmita Misra, Arthur Nash
Abstract:
Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.Keywords: exploration, geothermal, renewable energy, sustainable
Procedia PDF Downloads 15512890 Evaluation of Erodibility Status of Soils in Some Areas of Imo and Abia States of Nigeria
Authors: Andy Obinna Ibeje
Abstract:
In this study, the erodibility indices and some soil properties of some cassava farms in selected areas of Abia and Imo States were investigated. This study involves taking measurements of some soil parameters such as permeability, soil texture and particle size analysis from which the erodibility indices were compared. Results showed that soils of the areas are very sandy. The results showed that Isiukwuato with index of 72 has the highest erodibility index. The results also showed that Arondizuogu with index of 34 has the least erodibility index. The results revealed that soil erodibility (k) values varied from 34 to 72. Nkporo has the highest sand content; Inyishie has the least silt content. The result indicates that there were respectively strong inverse relationship between clay and silt contents and erodibility index. On the other hand, sand, organic matter and moisture contents as well as soil permeability has significantly high positive correlation with soil erodibility and it can be concluded that particle size distribution is a major finger print on the erodibility index of soil in the study area. It is recommended that safe cultural practices like crop rotation, matching and adoption of organic farming techniques be incorporated into farming communities of Abia and Imo States in order to stem the advances of erosion in the study area.Keywords: erodibility, indices, soil, sand
Procedia PDF Downloads 35212889 Preparation and Characterization of Cellulose Based Antimicrobial Food Packaging Materials
Authors: Memet Vezir Kahraman, Ferhat Sen
Abstract:
This study aimed to develop polyelectrolyte structured antimicrobial food packaging materials that do not contain any antimicrobial agents. Cationic hydroxyethyl cellulose was synthesized and characterized by Fourier Transform Infrared, carbon and proton Nuclear Magnetic Resonance spectroscopy. Its nitrogen content was determined by the Kjeldahl method. Polyelectrolyte structured antimicrobial food packaging materials were prepared using hydroxyethyl cellulose, cationic hydroxyethyl cellulose, and sodium alginate. Antimicrobial activity of materials was defined by inhibition zone method (disc diffusion method). Thermal stability of samples was evaluated by thermal gravimetric analysis and differential scanning calorimetry. Surface morphology of samples was investigated by scanning electron microscope. The obtained results prove that produced food packaging materials have good thermal and antimicrobial properties, and they can be used as food packaging material in many industries.Keywords: antimicrobial food packaging, cationic hydroxyethyl cellulose, polyelectrolyte, sodium alginate
Procedia PDF Downloads 16512888 Histopathological, Proliferative, Apoptotic, and Hormonal Characteristics of Various Types of Leiomyomas
Authors: Kiknadze T, Tevdorashvili G, Muzashvili T, Gachechiladze M, Burkadze G
Abstract:
Uterine leiomyomas decrease the quality of life by causing significant morbidity among women of reproductive age. Histologically various types of leiomyoma's can be differentiated. We have analysed th histopathological, proliferation, apoptotic, and hormonal profile in different types of leiomyomas. Study included altogether140 cases distributed into the following groups: group I-normal myometrium (20cases), group II-classic leiomyoma (69 cases), group III-cellular leiomyoma (15 cases), group IV-bizarre cell/atypical leiomyoma (22cases), group V-smooth muscle tumors of uncertain malignancy potential (STUMP) (8 cases) and group VI-leiomyosarcoma (6 cases). Together with classic histopathological features such as nuclear atypia, cellularity, presence of mitoses, vasculature and necrosis, immunohistochemical phenotype using antibodies against Ki67,Cas3, ER, and PR were analysed. The results of our study showed that leiomyomas are charterised with variable histopathological and immunohistocthemical phenotype. Histopathological parameters mainly correlate with the degree of malignancy except for two bizarre/atypical leiomyoma and STUMP, where two distinct subgroups could be identified. In bizarre/ atipycal leiomyoma, 31% of cases are characterized with the features of classic leiomyoma, whilst the rest of the cases reveal more atipycal phenotype. In STUMP 37.5 % of cases are characterized with the features of atipycal leiomyomas. The result of the immunohistochemical study also reveald that half of bizarre/atipycal leiomyomas are characterized with the low proliferation index, high apoptotic index, and high ER and PR index, whilst another half is characterized with high proliferation index, low apoptotic index, and low ER and PR index. Similarly, part of the STUMP cases are characterized with low proliferation index, high Er, and PR index and whilst part of the cases are characterized whith high proliferation index, low apoptotic index and low ER and PR index. The results of the histopathological and immunohistochemical study indicate that these two entities represent the heterogenous group of diseases, which might be the explanation of their different prognosis. Presented histopathological and immunohistochemical features should be considered in the diagnosis of myometrial smooth muscle tumors.Keywords: proliferation, apoptosis, bizarre cell, leiomyosarcoma., leiomyoma
Procedia PDF Downloads 113