Search results for: national food security act
9000 Food Intake Pattern and Nutritional Status of Preschool Children of Chakma Ethnic Community
Authors: Md Monoarul Haque
Abstract:
Nutritional status is a sensitive indicator of community health and nutrition among preschool children, especially the prevalence of undernutrition that affects all dimensions of human development and leads to growth faltering in early life. The present study is an attempt to assess the food intake pattern and nutritional status of pre-school Chakma tribe children. It was a cross-sectional community based study. The subjects were selected purposively. This study was conducted at Savar Upazilla of Rangamati. Rangamati is located in the Chittagong Division. Anthropometric data height and weight of the study subjects were collected by standard techniques. Nutritional status was measured using Z score according WHO classification. χ2 test, independent t-test, Pearson’s correlation, multiple regression and logistic regression was performed as P<0.05 level of significance. Statistical analyses were performed by appropriate univariate and multivariate techniques using SPSS windows 11.5. Moderate (-3SD to <-2SD) to severe underweight (<-3SD) were 23.8% and 76.2% study subjects had normal weight for their age. Moderate (-3SD to <-2SD) to severe (<-3SD) stunted children were only 25.6% and 74.4% children were normal and moderate to severe wasting were 14.7% whereas normal child was 85.3%. Significant association had been found between child nutritional status and monthly family income, mother education and occupation of father and mother. Age, sex and incomes of the family, education of mother and occupation of father were significantly associated with WAZ and HAZ of the study subjects (P=0.0001, P=0.025, P=0.001 and P=0.0001, P=0.003, P=0.031, P=0.092, P=0.008). Maximum study subjects took local small fish and some traditional tribal food like bashrool, jhijhipoka and pork very much popular food among tribal children. Energy, carbohydrate and fat intake was significantly associated with HAZ, WAZ, BAZ and MUACZ. This study demonstrates that malnutrition among tribal children in Bangladesh is much better than national scenario in Bangladesh. Significant association was found between child nutritional status and family monthly income, mother education and occupation of father and mother. Most of the study subjects took local small fish and some traditional tribal food. Significant association was also found between child nutritional status and dietary intake of energy, carbohydrate and fat.Keywords: food intake pattern, nutritional status, preschool children, Chakma ethnic community
Procedia PDF Downloads 5038999 Analyzing Restrictive Refugee Policies in Japan and the United Kingdom: An Examination of Fundamental Causes and Implications
Authors: Shalini Shawari Matharage
Abstract:
The worldwide refugee challenge has arisen as a critical concern, with millions of individuals fleeing their home countries owing to conflict, persecution, and human rights violations. Since the establishment of an international framework in 1951 for tackling the humanitarian needs of refugees and asylum seekers, many developed and developing countries have adopted a refugee admittance framework into their national immigration policy and steadily changed their domestic legislation to assist the resettlement of refugees. However, many developed nations have put forth strict limitations on refugee admission in the midst of the continuing refugee crisis, claiming factors including national sovereignty, security of their borders, and national economy. Two such developed nations that have been restrictive on refugees is Japan and the United Kingdom. Despite their contrasting histories, migration methods, and viewpoints on diversity in modern society, the two notably developed nations have taken similar restrictive approaches in refugee policy in the recent years. This study attempts to investigate the underlying causes that led these countries to adopt strict refugee policies and how those policies have affected their compliance with international human rights responsibilities. The study employs a head-to-head methodology to examine the structural inequities in Japan and the United Kingdom's refugee policies. Using data from the UNHCR Refugee Data Finder, official government policy proposals, statements, and academic works, the study evaluates the contemporary refugee legislations, fundamental causes, and subsequent implications. The study illustrates a combination of economic, security, and demographic issues, as well as political rigidity and negative public perceptions, as major determinants of the two countries' restrictive refugee policies. The findings shed light on the restrictive actions taken by Japan and the UK, raising concerns about potential breaches in obligations to their commitments to international law and human rights obligations. Understanding the underlying issues influencing these policies allows lawmakers and activists to establish more compassionate refugee policies that adhere to international human rights and protect vulnerable individuals fleeing persecution. Ultimately, this study aims to contribute to the development of sensible refugee policies that uphold human rights and humanitarian values.Keywords: immigration, Japan, refugee policy, united kingdom
Procedia PDF Downloads 728998 Investigation on Polymer Based Nano-Silver as Food Packaging Materials
Authors: A. M. Metak, T. T. Ajaal, Amal Metak, Tawfik Ajaal
Abstract:
Commercial nanocomposite food packaging type nano-silver containers were characterised using scanning electron microscopy (SEM) and energy-dispersive X-Ray spectroscopy (EDX). The presence of nanoparticles consistent with the incorporation of 1% nano-silver (Ag) and 0.1% titanium dioxide (TiO2) nanoparticle into polymeric materials formed into food containers was confirmed. Both nanomaterials used in this type of packaging appear to be embedded in a layered configuration within the bulk polymer. The dimensions of the incorporated nanoparticles were investigated using X-Ray diffraction (XRD) and determined by calculation using the Scherrer Formula; these were consistent with Ag and TiO2 nanoparticles in the size range 20-70nm both were spherical shape nanoparticles. Antimicrobial assessment of the nanocomposite container has also been performed and the results confirm the antimicrobial activity of Ag and TiO2 nanoparticles in food packaging containers. Migration assessments were performed in a wide range of food matrices to determine the migration of nanoparticles from the packages. The analysis was based on the relevant European safety directives and involved the application of inductively coupled plasma mass spectrometry (ICP-MS) to identify the range of migration risk. The data pertain to insignificance levels of migration of Ag and TiO2 nanoparticles into the selected food matrices.Keywords: nano-silver, antimicrobial food packaging, migration, titanium dioxide
Procedia PDF Downloads 3668997 Food Consumption and Adaptation to Climate Change: Evidence from Ghana
Authors: Frank Adusah-Poku, John Bosco Dramani, Prince Boakye Frimpong
Abstract:
Climate change is considered a principal threat to human existence and livelihood. The persistence and intensity of droughts and floods in recent years have adversely affected food production systems and value chains, making it impossible to end global hunger by 2030. Thus, this study aims to examine the effect of climate change on food consumption for both farm and non-farm households in Ghana. An important focus of the analysis is to investigate how climate change affects alternative dimensions of food security, examine the extent to which these effects vary across heterogeneous groups, and explore the channels through which climate change affects food consumption. Finally, we conducted a pilot study to understand the significance of farm and non-farm diversification measures in reducing the harmful impact of climate change on farm households. The approach of this article is to use two secondary and one primary datasets. The first secondary dataset is the Ghana Socioeconomic Panel Survey (GSPS). The GSPS is a household panel dataset collected during the period 2009 to 2019. The second dataset is monthly district rainfall and temperature gridded data from the Ghana Meteorological Agency. This data was matched to the GSPS dataset at the district level. Finally, the primary data was obtained from a survey of farm and non-farm adaptation practices used by farmers in three regions in Northern Ghana. The study employed the household fixed effects model to estimate the effect of climate change (measured by temperature and rainfall) on food consumption in Ghana. Again, it used the spatial and temporal variation in temperature and rainfall across the districts in Ghana to estimate the household-level model. Evidence of potential mechanisms through which climate change affects food consumption was explored using two steps. First, the potential mechanism variables were regressed on temperature, rainfall, and the control variables. In the second and final step, the potential mechanism variables were included as extra covariates in the first model. The results revealed that extreme average temperature and drought had caused a decrease in food consumption as well as reduced the intake of important food nutrients such as carbohydrates, protein and vitamins. The results further indicated that low rainfall increased food insecurity among households with no education compared with those with primary and secondary education. Again, non-farm activity and silos have been revealed as the transmission pathways through which the effect of climate change on farm households can be moderated. Finally, the results indicated over 90% of the small-holder farmers interviewed had no farm diversification adaptation strategies for climate change, and a little over 50% of the farmers owned unskilled or manual non-farm economic ventures. This makes it very difficult for the majority of the farmers to withstand climate-related shocks. These findings suggest that achieving the Sustainable Development Goal of Zero Hunger by 2030 needs an integrated approach, such as reducing the over-reliance on rainfed agriculture, educating farmers, and implementing non-farm interventions to improve food consumption in Ghana.Keywords: climate change, food consumption, Ghana, non-farm activity
Procedia PDF Downloads 48996 Advancing Energy Security Through Regional Cooperation in Southern Africa: An Assessment of the Challenges and Opportunities
Authors: Loide Sambo
Abstract:
Achieving energy security has, in the past few decades, become one of the main goals in the security agenda of every country around the world. For Southern African Countries (SAC) the aim is not different, yet these countries face a particular challenge in the pursuit of their energy security. More than just secure enough energy sources to fuel their industrial and societal needs, SAC have as well to ensure that they trade their rich energy resources to the global market in a way that promotes and safeguards their economic development objectives. Considering the relevance of this issue to the SAC, the present paper explores the possibility of these countries to achieve energy security through regional cooperation, under the Southern Africa Development Community (SADC) platform. It discusses the challenges and opportunities for advancing energy security in this region through cooperation. After analyzing the data through the documentary analysis method, it was found that regional cooperation among SAC to improve energy security is not effective since cooperation in the region is still very susceptible to a plethora of challenges, such as political instability, lack of development of infrastructure and expertise, lack of good governance, lack of sense of cohesiveness, and most important lack of political commitment. It was also found that significant commitment on regional cooperation had been centered on the electricity sub-sector due to the region’s huge electricity deficit. Thus less commitment is dedicated to the development and policy harmonization of the other sub-sectors such as the one of natural gas and oil, for instance. Hence, it is recommended that the leadership of the SAC is fully committed to cooperate and harmonize the policies, the strategic plans, as well as the infrastructure concerning to all the natural energy resources and its respective sub-sectors. This would provide the SAC significant leverage to negotiate for the energy market access, ensuring that the region’s energy commodities are traded, while the countries themselves retain enough energy to sustain their economic growth and development, improving, therefore, their energy security.Keywords: regional cooperation, energy security, economic development, political commitment
Procedia PDF Downloads 2478995 Volatile Organic Compounds from Decomposition of Local Food Waste and Potential Health Risk
Authors: Siti Rohana Mohd Yatim, Ku Halim Ku Hamid, Kamariah Noor Ismail, Zulkifli Abdul Rashid
Abstract:
The aim of this study is to investigate odour emission profiles from storage of food waste and to assess the potential health risk caused by exposure to volatile compounds. Food waste decomposition process was conducted for 14 days and kept at 20°C and 30°C in self-made bioreactor. VOCs emissions from both samples were collected at different stages of decomposition starting at day 0, day 1, day 3, day 5, day 7, day 10, day 12 and day 14. It was analyzed using TD-GC/MS. Findings showed that various VOCs were released during decomposition of food waste. Compounds produced were influenced by time, temperature and the physico-chemical characteristics of the compounds. The most abundant compound released was dimethyl disulfide. Potential health risk of exposure to this compound is represented by hazard ratio, HR, calculated at 1.6 x 1011. Since HR equal to or less than 1.0 is considered negligible risk, this indicates that the compound posed a potential risk to human health.Keywords: volatile organic compounds, decomposition process, food waste, health risk
Procedia PDF Downloads 5188994 Behavior on Nutritious Food: An Analysis of Newly Affluent Millionaire of Kathmandu Valley, Nepal
Authors: Babita Adhikari
Abstract:
There is a general assumption that affluent people consume a variety of balanced nutritious foods on a regular basis, such as fruits, whole grains, lean meat, nuts, and fresh vegetables, because they have greater affordability and market accessibility. A simple random sampling technique and an open-ended questionnaire were used for this study. Findings showed that high socioeconomic status (SES) people in Kathmandu were more concerned with expensive foods, fruits, and vegetables, regardless of their nutrient content. New millionaire groups in Kathmandu are aware of the importance of nutrition and healthy well-being, but their purchasing and consumption habits differ from general perceptions as they learn about fast-food and restaurant culture. On the home front, they buy, cook, and eat expensive foods but are unaware of their nutrient contents. The study critically examines attributes that influence purchase decisions for nutritious and healthy foods in Kathmandu. Despite the fact that a significant amount of literature helps to comprehend that food has to be good in taste, healthy, and affordable, the major driver of food purchases is still the desire to consume.Keywords: nutritious food, consumer behavior, nutrition, food behavior
Procedia PDF Downloads 678993 A Game Theory Analysis of the Effectiveness of Passenger Profiling for Transportation Security
Authors: Yael Deutsch, Arieh Gavious
Abstract:
The threat of aviation terrorism and its potential damage became significant after the 9/11 terror attacks. These attacks have led authorities and leaders to suggest that security personnel should overcome politically correct scruples about profiling and use it openly. However, there is a lack of knowledge about the smart usage of profiling and its advantages. We analyze game models that are suitable to specific real-world scenarios, focusing on profiling as a tool to detect potential violators, such as terrorists and smugglers. We provide analytical and clear answers to difficult questions, and by that help fighting against harmful violation acts.Keywords: game theory, profiling, security, nash equilibrium
Procedia PDF Downloads 1078992 Prevalence of Obesity in Kuwait: A Case Study among Kuwait University Students
Authors: Mohammad Alnasrallah, Muhammad Almatar
Abstract:
This study seeks to understand the relationship between the effect of geography and obesity prevalence among Kuwait University students. The sample involved 735 participants, 231 male, and 504 females, where there is a high percentage of them are overweight and obese. The percentage of overweight is 21% (BMI >25 - 30) while the percentage of obesity is 13.7% (BMI > 30). Both overweight and obese people account for 34.7%. In the study area, there are 327 fast food restaurants located in different places of in the urban area. This study uses the Geographic Information System to analyze the distribution of obesity and fast food restaurants. The study found that within half kilometers of fast food outlets, there are 33% of normal weight (BMI < 25), 30% of overweight while for the obese people there are 43 %, which shows that obesity is linked to the location of fast food restaurants. One of the significant tools that were used in this study hot and cold spots. The study found that areas of hot spots of fast food restaurants tend to be located in areas of hot spots of obese people. In conclusion, studying the prevalence of obesity from geographical perspective help to understand this public health issue and its relation to the effect of geography.Keywords: obesity prevalence, GIS, fast food, Kuwait
Procedia PDF Downloads 2138991 Multilingualism and the Question of National Language in Nigeria
Authors: Salome Labeh
Abstract:
Diverse Languages that exist in Nigeria, gave rise to the need to choose among these languages, which one or ones to be used as the National Language(s) in Nigeria. The Multilingual Nature of Nigeria has been examined, in relation to the provisional result of 1991 census conducted in Nigeria and the status of language policy in the country, which eventually led to the discovery of the fact that Hausa, Igbo, Yoruba languages have the highest speaker in terms of population, and are already made co-official languages in Nigeria, alongside with English language. Then, these languages should be considered as the National Languages, if eventually a language policy emerges in Nigeria.Keywords: multilingual, languages, culture, Nigeria
Procedia PDF Downloads 3698990 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks
Authors: Naveed Ghani, Samreen Javed
Abstract:
In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.Keywords: network worms, malware infection propagating malicious code, virus, security, VPN
Procedia PDF Downloads 3558989 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments
Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka
Abstract:
Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance
Procedia PDF Downloads 508988 Utilization of Biodiversity of Peaces Herbals Used as Food and Treat the Path of Economic Phu Sing District in Sisaket Province Thailand
Authors: Nopparet Thammasaranyakun
Abstract:
This research objects are: 1: To study the biodiversity of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. 2: To study the use of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. 3: To provide a database of information on biodiversity for food and medicinal plants and medicinal tourism economies along the Phu Sing district Sisaket province. 4: Learn to create a biodiversity of medicinal plants used as food and treatment by Journeys economic Phu Sing district Sisaket province Boundaries used in this study was the Phu Sing district. Population and Agricultural Development Center, rayong Mun due to the initiative for youth Local, Government Health officials, community leaders, teachers, students, schools, the local people and tourists. Sage wisdom to know the herbs and women's groups, OTOP Phu Sing district in SiisaKet province. By selecting the specific data that way. The process of participatory action research (PAR) is a community-based research. The method of collecting qualitative data. (Qualitative) tool is used from context, Community areas, interview and Taped recordings. Observation and focus group data was statistically analyzed using descriptive statistics (Descriptive Statistics). The results findings: 1- A study of the biodiversity of plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province. Were used in the dry season and the rainy season find the medicinal plants of 251 species 41 types of drugs. 2- The study utilized medicinal plants used as food and the treatment of indigenous Phu Sing Sisaket province. Found 251 species have medicinal properties that are used for food and medicinal purposes 41 types of drugs. 3- Of the database technology of biodiversity for food and medicinal plants used by local treatment Phu Sing district Sisaket province. A data base of 251 medicinal species 41 types of drugs is used for food and medicinal properties Sisaket province. 4- learning the biodiversity of medicinal plants used for food and medicinal tourism economies along the Phu Sing district Sisaket province.Keywords: utilization of biodiversity, peaces herbals, used as Food, Sing district, sisaket
Procedia PDF Downloads 3578987 Occurrence of Foreign Matter in Food: Applied Identification Method - Association of Official Agricultural Chemists (AOAC) and Food and Drug Administration (FDA)
Authors: E. C. Mattos, V. S. M. G. Daros, R. Dal Col, A. L. Nascimento
Abstract:
The aim of this study is to present the results of a retrospective survey on the foreign matter found in foods analyzed at the Adolfo Lutz Institute, from July 2001 to July 2015. All the analyses were conducted according to the official methods described on Association of Official Agricultural Chemists (AOAC) for the micro analytical procedures and Food and Drug Administration (FDA) for the macro analytical procedures. The results showed flours, cereals and derivatives such as baking and pasta products were the types of food where foreign matters were found more frequently followed by condiments and teas. Fragments of stored grains insects, its larvae, nets, excrement, dead mites and rodent excrement were the most foreign matter found in food. Besides, foreign matters that can cause a physical risk to the consumer’s health such as metal, stones, glass, wood were found but rarely. Miscellaneous (shell, sand, dirt and seeds) were also reported. There are a lot of extraneous materials that are considered unavoidable since are something inherent to the product itself, such as insect fragments in grains. In contrast, there are avoidable extraneous materials that are less tolerated because it is preventable with the Good Manufacturing Practice. The conclusion of this work is that although most extraneous materials found in food are considered unavoidable it is necessary to keep the Good Manufacturing Practice throughout the food processing as well as maintaining a constant surveillance of the production process in order to avoid accidents that may lead to occurrence of these extraneous materials in food.Keywords: extraneous materials, food contamination, foreign matter, surveillance
Procedia PDF Downloads 3588986 Examining the Influences of Exchange Programmes on Youths' National Identity: A Hong Kong Case Study
Authors: Annie Y. N. Cheng
Abstract:
Since the handover of Hong Kong to China, 'National Identity' has become a vital focus promoted by the HKSAR government. According to the poll by the University of Hong Kong’s Public Opinion Programme (2010 – 2015), young people aged between 18 and 29 have the least and decreasing recognition, an average 5.5%, of their Chinese identity. Past research has shown that student participation in exchange programmes and study tours provides the possibility of new formulations of national identity. Since the Policy Address 2008, the HKSAR government has been actively expanding and exploring the feasibility of Mainland exchange programmes to enhance our youths’ understanding of Chineseness and to strengthen their national identity. Schools have been sponsored or subsidized with the costs of Mainland exchange activities through various grants and channels. Considering the significantly increasing number of Hong Kong youths who have participated in these Mainland exchange programmes and study tours, however, the effectiveness of these activities is understudied. At present, there is the lack of systematic research on the impacts of these activities and the ways in which they influence our students’ perceptions of national identity. Using case study approach, this study aims to examine students’ perceptions of their national identity; and evaluate whether the Mainland exchange programmes or study tours have influences on students’ perceptions of national identity. Results show that the influences on national identity varied which were dependent on the objectives and destinations of the programmes. The findings of this study can provide significant feedback for schools to organize meaningful Mainland exchange activities or study tours and inform policy makers how to formulate effective strategies for promoting such exchange activities.Keywords: Hong Kong youth, mainland exchange programme, national identity, study tours
Procedia PDF Downloads 3948985 Translation of the Bible into the Yoruba Language: A Functionalist Approach in Resolving Cultural Problems
Authors: Ifeoluwa Omotehinse Oloruntoba
Abstract:
Through comparative and causal models of translation, this paper examined the translation of ‘bread’ into the Yoruba language in three Yoruba versions of the Bible: Bibeli Yoruba Atoka (YBA), Bibeli Mimo ni Ede Yoruba Oni (BMY) and Bibeli Mimo (BM). In biblical times, bread was a very important delicacy that it was synonymous with food in general and in the Bible, bread sometimes refers to a type of food (a mixture of flour, water, and yeast that is baked) or food in general. However, this is not the case in the Yoruba culture. In fact, some decades ago, bread was not known in Nigeria and had no name in the Yoruba language until the 1900s when it was codified as burẹdi in Yoruba, a term borrowed from English and transliterated. Nevertheless, in Nigeria presently, bread is not a special food and it is not appreciated or consumed like in the West. This makes it difficult to translate bread in the Bible into Yoruba. From an investigation on the translation of this term, it was discovered that bread which has 330 occurrences in the English Bible translation (King James) has few occurrences in the three Yoruba Bible versions. In the first version (YBA) published in the 1880s, where bread is synonymous with food in general, it is mostly translated as oúnjẹ (food) or the verb jẹ (to eat), revealing that something is eaten but not indicating what it is. However, when the bread is a type of food, it is rendered as akara, a special delicacy of the Yoruba people made from beans flour. In the later version (BMY) published in the 1990s, bread as food, in general, is also mainly translated as oúnjẹ or the verb jẹ, but when it is a type of food, it is translated as akara with few occurrences of burẹdi. In the latest edition (BM), bread as food is either rendered as ounje or literally translated as burẹdi. Where it is a type of food in this version, it is mainly rendered as burẹdi with few occurrences of akara, indicating the assimilation of bread into the Yoruba culture. This result, although limited, shows that the Bible was translated into Yoruba to make it accessible to Yoruba speakers in their everyday language, hence the application of both domesticating and foreignising strategies. This research also emphasizes the role of the translator as an intermediary between two cultures.Keywords: translation, Bible, Yoruba, cultural problems
Procedia PDF Downloads 2778984 Food Insecurity and Mental Health among Adolescents in Southwest Ethiopia: Structural Equation Modeling Analysis
Authors: Mulusew G. Jebena, David Lindstrom, Tefera Belachew, Craig Hadley, Carl Lachat, Patrick Kolsteren
Abstract:
Background: The biological and psychosocial consequence of food insecurity on physical health and nutritional status has been reported. But, its effect on mental health during adolescence remains unexplored. Thus, the main aim of this analysis is to examine the mechanism by which food insecurity is linked to mental health among adolescents living in Jimma, Southwest Ethiopia. Methods: We used data from third round observation of Jimma Longitudinal Family and Youth Survey (JLFSY). A total of 1,521 adolescents included for the main analysis. Food insecurity was measured using 5-items scale and The Self Reporting Questionnaire (SRQ-20) was used to measure mental distress. Structural equation modeling analysis was done using maximum likelihood estimation method. Model diagnostics test was reported. All p values were two tailed and P value ≤ 0.05 was used to determine statistical significance. Results: The prevalence of mental distress was 20.8%, 95% CI: (18.8, 22.9). After adjusted for covariates, the final model depicts food insecurity was associated with adolescent mental distress (β=.324). This analysis showed 94.1% of the effect of food insecurity on mental distress is direct. By contrast, 5.9% of the food insecurity effect is mediated by physical health. In addition, Self-rated health (β=.356), socioeconomic status (β=-.078) parental educational (β= .170), living in urban (β= .193) and female headed household (β=.205) were associated with adolescent mental distress. Conclusions: This finding highlights the direct effect of food insecurity on adolescent mental distress. Therefore, any intervention aimed to improve mental distress of adolescents should consider strategies to improve access to sufficient, safe, and nutritious food. Beside this, prevention of underlying factors such as psychosomatic health illness and improving socio economic status is also very critical. Furthermore longitudinal relationship of the long term effect of food insecurity on mental health should be investigated.Keywords: adolescent, Ethiopia, food insecurity, mental health
Procedia PDF Downloads 5958983 Leveraging Advanced Technologies and Data to Eliminate Abandoned, Lost, or Otherwise Discarded Fishing Gear and Derelict Fishing Gear
Authors: Grant Bifolchi
Abstract:
As global environmental problems continue to have highly adverse effects, finding long-term, sustainable solutions to combat ecological distress are of growing paramount concern. Ghost Gear—also known as abandoned, lost or otherwise discarded fishing gear (ALDFG) and derelict fishing gear (DFG)—represents one of the greatest threats to the world’s oceans, posing a significant hazard to human health, livelihoods, and global food security. In fact, according to the UN Food and Agriculture Organization (FAO), abandoned, lost and discarded fishing gear represents approximately 10% of marine debris by volume. Around the world, many governments, governmental and non-profit organizations are doing their best to manage the reporting and retrieval of nets, lines, ropes, traps, floats and more from their respective bodies of water. However, these organizations’ ability to effectively manage files and documents about the environmental problem further complicates matters. In Ghost Gear monitoring and management, organizations face additional complexities. Whether it’s data ingest, industry regulations and standards, garnering actionable insights into the location, security, and management of data, or the application of enforcement due to disparate data—all of these factors are placing massive strains on organizations struggling to save the planet from the dangers of Ghost Gear. In this 90-minute educational session, globally recognized Ghost Gear technology expert Grant Bifolchi CET, BBA, Bcom, will provide real-world insight into how governments currently manage Ghost Gear and the technology that can accelerate success in combatting ALDFG and DFG. In this session, attendees will learn how to: • Identify specific technologies to solve the ingest and management of Ghost Gear data categories, including type, geo-location, size, ownership, regional assignment, collection and disposal. • Provide enhanced access to authorities, fisheries, independent fishing vessels, individuals, etc., while securely controlling confidential and privileged data to globally recognized standards. • Create and maintain processing accuracy to effectively track ALDFG/DFG reporting progress—including acknowledging receipt of the report and sharing it with all pertinent stakeholders to ensure approvals are secured. • Enable and utilize Business Intelligence (BI) and Analytics to store and analyze data to optimize organizational performance, maintain anytime-visibility of report status, user accountability, scheduling, management, and foster governmental transparency. • Maintain Compliance Reporting through highly defined, detailed and automated reports—enabling all stakeholders to share critical insights with internal colleagues, regulatory agencies, and national and international partners.Keywords: ghost gear, ALDFG, DFG, abandoned, lost or otherwise discarded fishing gear, data, technology
Procedia PDF Downloads 948982 Double Encrypted Data Communication Using Cryptography and Steganography
Authors: Adine Barett, Jermel Watson, Anteneh Girma, Kacem Thabet
Abstract:
In information security, secure communication of data across networks has always been a problem at the forefront. Transfer of information across networks is susceptible to being exploited by attackers engaging in malicious activity. In this paper, we leverage steganography and cryptography to create a layered security solution to protect the information being transmitted. The first layer of security leverages crypto- graphic techniques to scramble the information so that it cannot be deciphered even if the steganography-based layer is compromised. The second layer of security relies on steganography to disguise the encrypted in- formation so that it cannot be seen. We consider three cryptographic cipher methods in the cryptography layer, namely, Playfair cipher, Blowfish cipher, and Hills cipher. Then, the encrypted message is passed through the least significant bit (LSB) to the steganography algorithm for further encryption. Both encryption approaches are combined efficiently to help secure information in transit over a network. This multi-layered encryption is a solution that will benefit cloud platforms, social media platforms and networks that regularly transfer private information such as banks and insurance companies.Keywords: cryptography, steganography, layered security, Cipher, encryption
Procedia PDF Downloads 828981 A Review on the Challenge and Need of Goat Semen Production and Artificial Insemination in Nepal
Authors: Pankaj K. Jha, Ajeet K. Jha, Pravin Mishra
Abstract:
Goat raising is a popular livestock sub-commodity of mixed farming system in Nepal. Besides food and nutritional security, it has an important role in the economy of many peoples. Goat breeding through AI is commonly practiced worldwide. It is a very basic tool to speed up genetic improvement and increase productivity. For the goat genetic improvement program, the government of Nepal has imported some specialized exotic goat breeds and semen. Some progress has been made in the initiation of selective breeding within the local breeds and practice of AI with imported semen. Importance of AI in goats has drawn more attention among goat farmers. However, importing semen is not a permanent solution at national level; rather, it is more important to develop and establish its own frozen semen production technique. Semen quality and its relationship with fertility are said to be a major concern in animal production, hence accurate measurement of semen fertilizing potential is of great importance. The survivability of sperm cells depends on semen quality. Survivability of sperm cells is assessed through visual and microscopic evaluation of spermatozoal progressive motility and morphology. In Nepal, there is lack of scientific information on seminal attributes of buck semen, its dilution, cooling and freezing technique under management conditions of Nepal. Therefore, the objective of this review was to provide brief information about breeding system, semen production and artificial insemination in Nepalese goat.Keywords: artificial insemination, goat, Nepal, semen
Procedia PDF Downloads 2088980 India’s Foreign Policy toward its South Asian Neighbors: Retrospect and Prospect
Authors: Debasish Nandy
Abstract:
India’s foreign policy towards all of her neighbor countries is determinate on the basis of multi-dimensional factors. India’s relations with its South Asian neighbor can be classified into three categories. In the first category, there are four countries -Sri Lanka, Bangladesh, Nepal, and Afghanistan- whose bilateral relationships have encompassed cooperation, irritants, problems and crisis at different points in time. With Pakistan, the relationship has been perpetually adversarial. The third category includes Bhutan and Maldives whose relations are marked by friendship and cooperation, free of any bilateral problems. It is needless to say that Jawaharlal Nehru emphasized on friendly relations with the neighboring countries. The subsequent Prime Ministers of India especially I.K. Gujral had advocated in making of peaceful and friendly relations with the subcontinental countries. He had given a unique idea to foster bilateral relations with the neighbors. His idea is known as ‘Gujral Doctrine’. A dramatical change has been witnessed in Indian foreign policy since 1991.In the post-Cold War period, India’s national security has been vehemently threatened by terrorism, which originated from Pakistan-Afghanistan and partly Bangladesh. India has required a cooperative security, which can be made by mutual understanding among the South Asian countries. Additionally, the countries of South Asia need to evolve the concept of ‘Cooperative Security’ to explain the underlying logic of regional cooperation. According to C. Rajamohan, ‘cooperative security could be understood, as policies of governments, which see themselves as former adversaries or potential adversaries to shift from or avoid confrontationist policies.’ A cooperative security essentially reflects a policy of dealing peacefully with conflicts, not merely by abstention from violence or threats but by active engagement in negotiation, a search for practical solutions and with a commitment to preventive measures. Cooperative assumes the existence of a condition in which the two sides possess the military capabilities to harm each other. Establishing cooperative security runs into a complex process building confidence. South Asian nations often engaged with hostility to each other. Extra-regional powers have been influencing their powers in this region since a long time. South Asian nations are busy to purchase military equipment. In spite of weakened economic systems, these states are spending a huge amount of money for their security. India is the big power in this region in every aspect. The big states- small states syndrome is a negative factor in this respect. However, India will have to an initiative to extended ‘track II diplomacy’ or soft diplomacy for its security as well as the security of this region.Confidence building measures could help rejuvenate not only SAARC but also build trust and mutual confidence between India and its neighbors in South Asia. In this paper, I will focus on different aspects of India’s policy towards it, South-Asian neighbors. It will also be searched that how India is dealing with these countries by using a mixed type of diplomacy – both idealistic and realistic points of view. Security and cooperation are two major determinants of India’s foreign policy towards its South Asian neighbors.Keywords: bilateral, diplomacy, infiltration, terrorism
Procedia PDF Downloads 5378979 The Intention to Use E-Money Transaction: The Moderating Effect of Security in Conceptual Frammework
Authors: Husnil Khatimah, Fairol Halim
Abstract:
This research examines the moderating impact of security on intention to use e-money that adapted from some variables of the TAM (Technology Acceptance Model) and TPB (Theory of Planned Behavior). This study will use security as moderating variable and finds these relationship depends on customer intention to use e-money as payment tools. The conceptual framework of e-money transactions was reviewed to understand behavioral intention of consumers from perceived usefulness, perceived ease of use, perceived behavioral control and security. Quantitative method will be utilized as sources of data collection. A total of one thousand respondents will be selected using quota sampling method in Medan, Indonesia. Descriptive analysis and Multiple Regression analysis will be conducted to analyze the data. The article ended with suggestion for future studies.Keywords: e-money transaction, TAM & TPB, moderating variable, behavioral intention, conceptual paper
Procedia PDF Downloads 4528978 Muslim Consumer Purchase Behavior on Doubtful Halal Packed Food
Authors: Aliffaizi Arsat, Nur Ida Fatihah, Che Shalifullizam
Abstract:
Malaysia is well known as a Muslim country and is quickly becoming a Global Halal-hub of Halal business in promoting Halal food products in both Muslim countries and non-Muslim countries. The objective of this study is to analyse the Muslim consumer purchased behaviour on doubtful Halal packed food by using theory of planned behaviour, to examine the mediating effects between certification, and Muslim consumer purchased behaviour on doubtful Halal packed food. The relevant questionnaires have been distributed in Kuala Selangor. Among the 300 Muslim participants from Kuala Selangor, Selangor, Malaysia, only 107 of them have returned the questionnaire with complete answers. The respondent’s rate was discovered to be at 35.67%. The data have been analysed by using SPSS version 22 and Structural equation modelling Partial Least Square SEM-PLS. There are three dimensions needed to identify Muslim consumer purchased behaviour on doubtful Halal packed food. They are attitude towards behaviour, subjective norm and perceived behavioural. All the results from this study show that the hypothesis has been supported. However, subjective norm had shown that there is a negative relationship towards Muslim consumer purchased behaviour on doubtful Halal packed food.Keywords: Muslim consumer purchase behaviour, theory planned behaviour, doubtful Halal, certification
Procedia PDF Downloads 3418977 An Evaluation of Impact of Media on the Electoral Reform Process in Nigeria between 2010–2015
Authors: H. Shola Adeosun, D. Adeoye Odedeji, F. Ajoke Adebiyi
Abstract:
This study examines the impact of media on the electoral process in Nigeria and the roles played by the media in the reform process. Survey research method was adopted as research methodology, and this enables the researcher to use questionnaire, and oral interview to elicit primary data from the respondents was interpreted, analysed and interpreted with statistical tools such as tables, figures, and percentages. The hypothesis formulated were tested with chi-square. The findings revealed that there is significant relationship between the media and electoral reform process in the 2011 and 2015 general elections in Nigeria. The study recommends that electoral committee should implement virile electoral system with the peaceful voting environment. The media should intensify efforts to expose violation of electoral laws; media should play an advocacy role for dialogue and debate on the reform recommendations. The study recommends that media should unite the nation through their reports on peace, national security, national integration and ethnoreligious tolerance and that adequate training should be given to media practitioners on how to report issues relating to elections.Keywords: evaluation, impact, media, electoral reform process
Procedia PDF Downloads 2878976 Framework for the Assessment of National Systems of Innovation in Biotechnology
Authors: Andrea Schiffauerova, Amnah Alzeyoudi
Abstract:
This paper studies patterns of innovation within national constitutional context. Its objective is to examine national systems of innovation in biotechnology in six leading innovative countries: the US, Japan, Germany, the UK, France and Canada. The framework proposed for this purpose consists of specific factors considered critical for the development of national systems of innovation, which are industry size, innovative activities, area of specialization, industry structure, national policy, the level of government intervention, the stock of knowledge in universities and industries, knowledge transfer from universities to industry and country-specific conditions for start-ups. The paper then uses the framework to provide detailed cross-country comparisons while highlighting particular features of national institutional context which affect the creation and diffusion of scientific knowledge within the system. The study is primarily based on the extensive survey of literature and it is complemented by the quantitative analysis of the patent data extracted from the United States Patent and Trademark Office (USPTO). The empirical analysis provides numerous insights and greatly complements the data gained from the literature and other sources. The final cross-country comparative analysis identifies three patterns followed by the national innovation systems in the six countries. The proposed cross-country relative positioning analysis may help in drawing policy implications and strategies leading to the enhancement of national competitive advantage and innovation capabilities of nations.Keywords: comparative analysis, framework, national systems of innovation, patent analysis, United States Patent and Trademark Office (USPTO)
Procedia PDF Downloads 3128975 Analyses of the Constitutional Identity in Hungary: A Case Study on the Concept of Constitutionalism and Legal Continuity in New Fundamental Law of Hungary
Authors: Zsuzsanna Fejes
Abstract:
The aim of this paper is to provide an overview of the legal history of constitutionalism in Hungary, in focus of the democratic transitions in 1989-1990, describing the historical and political background of the changes and presenting the main and most important features of the new democracy, and institutional and legal orders. In Hungary the evolved political, economic and moral crisis prior to the constitutional years 2010-11 had been such a constitutional moment, which led to an opportune and unavoidable change at the same time. The Hungarian constitutional power intended to adopt a new constitution, which was competent to create a common constitutional identity and to express a national unity. The Hungarian Parliament on 18th April 2011 passed the New Fundamental Law. The new Fundamental Law rich in national values meant a new challenge for the academics, lawyers, and political scientists. Not only the classical political science, but also the constitutional law and theory have to struggle with the interpretation of the new declarations about national constitutional values in the Fundamental Law. The main features and structure of the new Fundamental Law will be analysed, and given a detailed interpretation of the Preamble as a declaration of constitutional values. During the examination of the Preamble shall be cleared up the components of Hungarian statehood and national unity, individual and common human rights, the practical and theoretical demand on national sovereignty, and the content and possibilities for the interpretation of the achievements of the historical Constitution. These scopes of problems will be presented during the examination of the text of National Avowal, as a preamble of the Fundamental Law. It is examined whether the Fundamental Law itself could be suitable and sufficient means to citizens of Hungary to express the ideas therein as their own, it will be analysed how could the national and European common traditions, values and principles stated in the Fundamental Law mean maintenance in Hungary’s participation in the European integration.Keywords: common constitutional values, constitutionalism, national identity, national sovereignty, national unity, statehood
Procedia PDF Downloads 2938974 Illuminating the Policies Affecting Energy Security in Malaysia’s Electricity Sector
Authors: Hussain Ali Bekhet, Endang Jati Mat Sahid
Abstract:
For the past few decades, the Malaysian economy has expanded at an impressive pace, whilst, the Malaysian population has registered a relatively high growth rate. These factors had driven the growth of final energy demand. The ballooning energy demand coupled with the country’s limited indigenous energy resources have resulted in an increased of the country’s net import. Therefore, acknowledging the precarious position of the country’s energy self-sufficiency, this study has identified three main concerns regarding energy security, namely; over-dependence on fossil fuel, increasing energy import dependency, and increasing energy consumption per capita. This paper discusses the recent energy demand and supply trends, highlights the policies that are affecting energy security in Malaysia and suggests strategic options towards achieving energy security. The paper suggested that diversifying energy sources, reducing carbon content of energy, efficient utilization of energy and facilitating low-carbon industries could further enhance the effectiveness of the measures as the introduction of policies and initiatives will be more holistic.Keywords: electricity, energy policy, energy security, Malaysia
Procedia PDF Downloads 3048973 The Issue of Online Fake News and Disinformation: Criminal and Criminological Aspects of Prevention
Authors: Fotios Spyropoulos, Evangelia Androulaki, Vasileios Karagiannopoulos, Aristotelis Kompothrekas, Nikolaos Karagiannis
Abstract:
The problem of 'fake news' and 'hoaxes' has dominated in recent years the field of news, politics, economy, safety, and security as dissemination of false information can intensively affect and mislead public discourse and public opinion. The widespread use of internet and social media platforms can substantially intensify these effects, which often include public fear and insecurity. Misinformation, malinformation, and disinformation have also been blamed for affecting election results in multiple countries, and since then, there have been efforts to tackle the phenomenon both on national and international level. The presentation will focus on methods of prevention of disseminating false information on social media and on the internet and will discuss relevant criminological views. The challenges that have arisen for criminal law will be covered, taking into account the potential need for a multi-national approach required in order to mitigate the extent and negative impact of the fake news phenomenon. Finally, the analysis will include a discussion on the potential usefulness of non-legal modalities of regulation and crime prevention, especially situational and social measures of prevention and the possibility of combining an array of methods to achieve better results on national and international level. This project has received funding from the Hellenic Foundation for Research and Innovation (HFRI) and the General Secretariat for Research and Technology (GSRT), under grant agreement No 80529.Keywords: cybercrime, disinformation, fake news, prevention
Procedia PDF Downloads 1428972 Detection of New Attacks on Ubiquitous Services in Cloud Computing and Countermeasures
Authors: L. Sellami, D. Idoughi, P. F. Tiako
Abstract:
Cloud computing provides infrastructure to the enterprise through the Internet allowing access to cloud services at anytime and anywhere. This pervasive aspect of the services, the distributed nature of data and the wide use of information make cloud computing vulnerable to intrusions that violate the security of the cloud. This requires the use of security mechanisms to detect malicious behavior in network communications and hosts such as intrusion detection systems (IDS). In this article, we focus on the detection of intrusion into the cloud sing IDSs. We base ourselves on client authentication in the computing cloud. This technique allows to detect the abnormal use of ubiquitous service and prevents the intrusion of cloud computing. This is an approach based on client authentication data. Our IDS provides intrusion detection inside and outside cloud computing network. It is a double protection approach: The security user node and the global security cloud computing.Keywords: cloud computing, intrusion detection system, privacy, trust
Procedia PDF Downloads 3218971 Microalgae Applied to the Reduction of Biowaste Produced by Fruit Fly Drosophila melanogaster
Authors: Shuang Qiu, Zhipeng Chen, Lingfeng Wang, Shijian Ge
Abstract:
Biowastes are a concern due to the large amounts of commercial food required for model animals during the biomedical research. Searching for sustainable food alternatives with negligible physiological effects on animals is critical to solving or reducing this challenge. Microalgae have been demonstrated as suitable for both human consumption and animal feed in addition to biofuel and bioenergy applications. In this study, the possibility of using Chlorella vulgaris and Senedesmus obliquus as a feed replacement to Drosophila melanogaster, one of the fly models commonly used in biomedical studies, was investigated to assess the fly locomotor activity, motor pattern, lifespan, and body weight. Compared to control, flies fed on 60% or 80% (w/w) microalgae exhibited varied walking performance including travel distance and apparent step size, and flies treated with 40% microalgae had shorter lifespans and decreased body weight. However, the 20% microalgae treatment showed no statistical differences in all parameters tested with respect to the control. When partially including 20% microalgae in the standard food, it can annually reduce the food waste (~ 202 kg) by 22.7 % and save $ 7,200 of the food cost, offering an environmentally superior and cost-effective food alternative without compromising physiological performance.Keywords: animal feed, Chlorella vulgaris, Drosophila melanogaster, food waste, microalgae
Procedia PDF Downloads 164