Search results for: food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5844

Search results for: food security

5004 Effects of Different Food Matrices on Viscosity and Protein Degradation during in vitro Digestion

Authors: Gulay Oncu Ince, Sibel Karakaya

Abstract:

Food is a worldwide concern. Among the factors that have influences on human health, food, nutrition and life style have been regarded as the most important factors since they can be intervened. While some parts of the world has been faced with food shortages and hence, chronic metabolic diseases, the other part of the world have been emerged from over consumption of food. Both situations can result in shorter life expectancy and represent a major global health problem. Hunger, satiety and appetite sensation form a balance ensures the operation of feeding behavior between food intake and energy consumption. Satiety is one of the approaches that is effective in ensuring weight control and avoid eating more in the postprandial period. By manipulating the microstructure of food macro and micronutrient bioavailability may be increased or reduced. For the food industry appearance, texture, taste structural properties as well as the gastrointestinal tract behavior of the food after the consumption is becoming increasingly important. Also, this behavior has been the subject of several researches in recent years by the scientific community. Numerous studies have been published about changing the food matrix in order to increase expected impacts. In this study, yogurts were enriched with caseinomacropeptide (CMP), whey protein (WP), CMP and sodium alginate (SA), and WP + SA in order to produce goat yogurts having different food matrices. SDS Page profiles of the samples after in vitro digestion and viscosities of the stomach digesta at different share rates were determined. Energy values were 62.11kcal/100 g, 70.27 kcal/100 g, 70.61 kcal/100 g, 71.20 kcal/100 g and 71.67 kcal/100 g for control, CMP added WP added, WP + SA added, and CMP + SA added yogurts respectively. The results of viscosity analysis showed that control yogurt had the lowest viscosity value and this was followed by CMP added, WP added, CMP + SA added and WP + SA added yogurts, respectively. Protein contents of the stomach and duedonal digests of the samples after subjected to two different in vitro digestion methods were changed between 5.34-5.91 mg protein / g sample and 16.93-19.75 mg protein /g of sample, respectively. Viscosity measurements of the stomach digests showed that CMP + SA added yogurt displayed the highest viscosity value in both in vitro digestion methods. There were differences between the protein profiles of the stomach and duedonal digests obtained by two different in vitro digestion methods (p<0.05).

Keywords: caseinomacropeptide, protein profile, whey protein, yogurt

Procedia PDF Downloads 486
5003 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 92
5002 Evidence of Total Mercury Biomagnification in Tropical Estuary Lagoon in East Coast of Peninsula, Malaysia

Authors: Quang Dung Le, Kentaro Tanaka, Viet Dung Luu, Kotaro Shirai

Abstract:

Mercury pollutant is great concerns in globe due to its toxicity and biomagnification through the food web. Recently increasing approaches of stable isotope analyses which have applied in food-web structure are enabled to elucidate more insight trophic transfer of pollutants in ecosystems. In this study, the integration of total mercury (Hg) and stable isotopic analyses (δ13C and δ15N) were measured from basal food sources to invertebrates and fishes in order to determine Hg transfer in Setiu lagoon food webs. The average Hg concentrations showed the increasing trend from low to high trophic levels. The result also indicated that potential Hg exposure from inside mangrove could be higher than that from the tidal flat of mangrove creek. Fish Hg concentrations are highly variable, and many factors driving this variability need further examinations. A positive correlation found between Hg concentrations and δ15N values (the trophic magnification factor was 3.02), suggesting Hg biomagnification through the lagoon food web. Almost all Hg concentrations in fishes and mud crabs did not present a risk for human consumption, however, the Hg concentrations of Caranx ignobilis exceed the permitted level could raise a concern of the potential risk for the marine system. Further investigations should be done to elucidate whether trophic relay relates to high Hg concentrations of some fish species in coastal systems.

Keywords: mercury, transfer, stable isotopes, health risk, mangrove, food web

Procedia PDF Downloads 303
5001 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics

Authors: Gizem Ertürk, Nursena Dinç

Abstract:

The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.

Keywords: migration, biopolitics, Frontex, security, European union, securitization

Procedia PDF Downloads 136
5000 Evaluation of Nutritional Potential of Five Unexplored Wild Edible Food Plants from Eastern Himalayan Biodiversity Hotspot Region (India)

Authors: Pallabi Kalita, Hui Tag, Loxmi Jamoh, H. N. Sarma, A. K. Das

Abstract:

Wild edible food plants contain a number of organic phytochemical that have been linked to the promotion of good health. These plants used by the local people of Arunachal Pradesh (Northeast India) are found to have high nutritional potential to maintain general balance diet. A study was conducted to evaluate the nutritional potential of five commonly found, unexplored wild food plants namely, Piper pedicellatum C. DC (leaves), Gonostegia hirta (Blume ex Hassk.) Miq. (leaves), Mussaenda roxburghii Hook. f. (leaves), Solanum spirale Roxb. (leaves and fruits) and Cyathea spinulosa Wall. ex Hook. (pith portion and tender rachis) from East Siang District of Arunachal Pradesh Northeast (India) for ascertaining their suitability for utilization as supplementary food. Results of study revealed that P. pedicellatum, C. spinulosa, and S. spirale (leaves) are the most promising species which have high nutritional content out of the five wild food plants investigated which is required for the normal growth and development of human.

Keywords: wild edible plants, gross energy, Gonostegia hirta, Cyathea spinulosa

Procedia PDF Downloads 324
4999 Diversity and Use of Agroforestry Yards of Family Farmers of Ponte Alta – Gama, Federal District, Brazil

Authors: Kever Bruno Paradelo Gomes, Rosana Carvalho Martins

Abstract:

The home gardens areas are production systems, which are located near the homes and are quite common in the tropics. They consist of agricultural and forest species and may also involve the raising of small animals to produce food for subsistence as well as income generation, with a special focus on the conservation of biodiversity. Home gardens are diverse Agroforestry systems with multiple uses, among many, food security, income aid, traditional medicine. The work was carried out on rural properties of the family farmers of the Ponte Alta Rural Nucleus, Gama Administrative Region, in the city of Brasília, Federal District- Brazil. The present research is characterized methodologically as a quantitative, exploratory and descriptive nature. The instruments used in this research were: bibliographic survey and semi-structured questionnaire. The data collection was performed through the application of a semi-structured questionnaire, containing questions that referred to the perception and behavior of the interviewed producer on the subject under analysis. In each question, the respondent explained his knowledge about sustainability, agroecological practices, environmental legislation, conservation methods, forest and medicinal species, ago social and socioeconomic characteristics, use and purpose of agroforestry and technical assistance. The sample represented 55.62% of the universe of the study. We interviewed 99 people aged 18-83 years, with a mean age of 49 years. The low level of education, coupled with the lack of training and guidance for small family farmers in the Ponte Alta Rural Nucleus, is one of the limitations to the development of practices oriented towards sustainable and agroecological agriculture in the nucleus. It is observed that 50.5% of the interviewed people landed with agroforestry yards less than 20 years ago, and only 16.17% of them are older than 35 years. In identifying agriculture as the main activity of most of the rural properties studied, attention is drawn to the cultivation of medicinal plants, fruits and crops as the most extracted products. However, it is verified that the crops in the backyards have the exclusive purpose of family consumption, which could be complemented with the marketing of the surplus, as well as with the aggregation of value to the cultivated products. Initiatives such as this may contribute to the increase in family income and to the motivation and value of the crop in agroecological gardens. We conclude that home gardens of Ponte Alta are highly diverse thus contributing to local biodiversity conservation of are managed by women to ensure food security and allows income generation. The tradition of existing knowledge on the use and management of the diversity of resources used in agroforestry yards is of paramount importance for the development of sustainable alternative practices.

Keywords: agriculture, agroforestry system, rural development, sustainability

Procedia PDF Downloads 139
4998 Insights and Inferences Associated with Subscription of Health Insurance in the Informal Sector of India

Authors: Harinder Singh

Abstract:

The paper sheds light on the perceptions of the uninsured workers employed in the urban informal sector of India, towards the health insurance. In addition to this, it also explores the association of the identified perceptions with household decisions to enroll for health insurance schemes in India. Firstly the data taken from the primary survey of the uninsured workers employed in the urban informal sector was analyzed using exploratory factor analysis to evaluate the perceptions. Thereafter, logistic regression was employed to determine the association of the identified perceptions regarding the enrollment. Our study identifies twelve perceptions related to the health insurance enrollment of the uninsured workers employed in the urban informal sector of India. The study demonstrates that perceptions have the strongest association with the voluntary enrollment. These specifically relate to the lack of awareness about the need to buy health insurance; comprehensive coverage; income constraint; future contingencies and social obligations; lack of information; availability of subsidized government health care; linkage with government hospitals and preference for government schemes. Conclusions: Along with the food security, health security has become a crying need of the workers employed in the informal sector and the time has come to scale up the health insurance schemes for them in the country. Policy makers or marketers of health insurance policies should recognize the household perceptions as a potential barrier and try to develop a health insurance package as per the actual needs of the informal sector (low income) in India.

Keywords: association, enrollment, health insurance, informal sector, perceptions, uninsured

Procedia PDF Downloads 262
4997 BAN Logic Proof of E-passport Authentication Protocol

Authors: Safa Saoudi, Souheib Yousfi, Riadh Robbana

Abstract:

E-passport is a relatively new electronic document which maintains the passport features and provides better security. It deploys new technologies such as biometrics and Radio Frequency identification (RFID). The international civil aviation organization (ICAO) and the European union define mechanisms and protocols to provide security but their solutions present many threats. In this paper, a new mechanism is presented to strengthen e-passport security and authentication process. We propose a new protocol based on Elliptic curve, identity based encryption and shared secret between entities. Authentication in our contribution is formally proved with BAN Logic verification language. This proposal aims to provide a secure data storage and authentication.

Keywords: e-passport, elliptic curve cryptography, identity based encryption, shared secret, BAN Logic

Procedia PDF Downloads 428
4996 Water Quality of Cengkareng Drain in Maritime Security Perspective

Authors: Febri Ramadhan, Sigid Hariyadi, Niken Tunjung Murti Pratiwi, Budiman Djoko Said

Abstract:

The scope about maritime security copes all of the problems emanating from maritime domain. Those problems can give such threats to national security of the state. One of threats taking place nowadays in maritime domain is about pollution. Pollution coming from many sources may increase water-borne disease risk that can cause the instability of national security. Pollution coming from many sources may increase water-borne disease risk. Hence the pollution makes an improper condition of environments for humans and others biota dwelling in the waters. One of the tools that can determine about pollution is by measuring about the water quality of its waters. In this case, what brings the waste and pollutants is there an activity of tidal waves introducing substances or energy into the natural environment. Cengkareng Drain is one of the water channels which is affected by tidal waves. Cengkareng Drain was become an observation area to examine the relation between water quality and tide waves. This research was conducted monthly from July to November 2015. Sampling of water was conducted every ebb and tide in every observation. Pollution index showed that the level of pollution on Cengkareng drain was moderately polluted, with the score about 7.7-8.6. Based on the results of t-test and analysis of similarity, the characteristic of water quality on rising tide does not significantly differ from the characteristic of water quality on ebbing tide. Therefore, we need a proper management as a means to control the pollutants in order to make good maritime security strategy.

Keywords: maritime security, Cengkareng drain, water quality, tidal waves

Procedia PDF Downloads 208
4995 Nigeria Energy Security: The Role of Solar Batteries

Authors: Ihugba Okezie A., Oguzie Emeka E.

Abstract:

Nigeria's renewable energy market is expanding due to increased environmental awareness, supportive government policies, and the need for energy diversification. This paper examines the role of solar batteries in enhancing Nigeria's energy security. With growing energy demands and frequent power outages, integrating solar batteries presents a viable solution to stabilize the energy supply. The study investigates the current state of solar battery technology in Nigeria, its economic and environmental benefits, and the challenges to implementation. Through a literature review, case studies, and stakeholder interviews, the paper provides a comprehensive analysis of solar batteries' contribution to a resilient energy future. Key players include Engie SA, TotalEnergies SE, Starsight Energy, Enel SpA, and North-South Power Co. Ltd. Challenges include high upfront costs, inadequate policies, weak infrastructure, and security risks. The paper recommends that the government should strengthen policies and incentives to encourage investments through tax breaks, subsidies, and financial incentives.

Keywords: renewable energy, solar batteries, energy security, Nigeria’s electricity generation, job creation

Procedia PDF Downloads 22
4994 Antimicrobial Activity of Seed Oil of Garlic and Moringa oleifera against Some Food-Borne Microorganisms

Authors: Mansur Abdulrasheed, Ibrahim I. Hussein, Ahmed M. Mubarak, Ahmed F. Umar

Abstract:

This study was aimed at evaluating the phytochemical constituents and the antimicrobial activity of the seed oil of Moringa oleifera and garlic against some selected food-borne microorganisms (Staphylococcus aureus, Escherichia coli, Salmonella spp and Pseudomonas aeruginosa) using disc diffusion method. The results of the phytochemical screening revealed differences in the presence of the phytochemicals among the extracts. Saponins were detected in both Moringa oleifera and garlic seed oil, while alkaloid and tannins were observed in seed oil of garlic. Furthermore, the antibacterial assay results show that the seed oil of Moringa oleifera was inactive against all the tested organisms, even at 100 % concentration. In contrast, garlic oil was found to be active against all the tested organisms. The highest inhibition was observed in E. coli (12 mm) at 100 % concentration, while at 20 % concentration, Salmonella Sp and P. aeruginosa showed the least inhibiton (6 mm). The antimicrobial activity of the seed oil of garlic may be attributed to its phytochemicals components which were not detected in the seed oil of Moringa oleifera. The results of this study have shown the potentials of the seed oil of garlic as an antimicrobial agent more especially in foods, by inhibiting the growth of the test organisms, which range from food-borne pathogens to food spoilage organisms.

Keywords: antimicrobial, garlic, Moringa oleifera, food borne pathogens

Procedia PDF Downloads 500
4993 Stakeholder Mapping and Requirements Identification for Improving Traceability in the Halal Food Supply Chain

Authors: Laila A. H. F. Dashti, Tom Jackson, Andrew West, Lisa Jackson

Abstract:

Traceability systems are important in the agri-food and halal food sectors for monitoring ingredient movements, tracking sources, and ensuring food integrity. However, designing a traceability system for the halal food supply chain is challenging due to diverse stakeholder requirements and complex needs. Existing literature on stakeholder mapping and identifying requirements for halal food supply chains is limited. To address this gap, a pilot study was conducted to identify the objectives, requirements, and recommendations of stakeholders in the Kuwaiti halal food industry. The study collected data through semi-structured interviews with an international halal food manufacturer based in Kuwait. The aim was to gain a deep understanding of stakeholders' objectives, requirements, processes, and concerns related to the design of a traceability system in the country's halal food sector. Traceability systems are being developed and tested in the agri-food and halal food sectors due to their ability to monitor ingredient movements, track sources, and detect potential issues related to food integrity. Designing a traceability system for the halal food supply chain poses significant challenges due to diverse stakeholder requirements and the complexity of their needs (including varying food ingredients, different sources, destinations, supplier processes, certifications, etc.). Achieving a halal food traceability solution tailored to stakeholders' requirements within the supply chain necessitates prior knowledge of these needs. Although attempts have been made to address design-related issues in traceability systems, literature on stakeholder mapping and identification of requirements specific to halal food supply chains is scarce. Thus, this pilot study aims to identify the objectives, requirements, and recommendations of stakeholders in the halal food industry. The paper presents insights gained from the pilot study, which utilized semi-structured interviews to collect data from a Kuwait-based international halal food manufacturer. The objective was to gain an in-depth understanding of stakeholders' objectives, requirements, processes, and concerns pertaining to the design of a traceability system in Kuwait's halal food sector. The stakeholder mapping results revealed that government entities, food manufacturers, retailers, and suppliers are key stakeholders in Kuwait's halal food supply chain. Lessons learned from this pilot study regarding requirement capture for traceability systems include the need to streamline communication, focus on communication at each level of the supply chain, leverage innovative technologies to enhance process structuring and operations and reduce halal certification costs. The findings also emphasized the limitations of existing traceability solutions, such as limited cooperation and collaboration among stakeholders, high costs of implementing traceability systems without government support, lack of clarity regarding product routes, and disrupted communication channels between stakeholders. These findings contribute to a broader research program aimed at developing a stakeholder requirements framework that utilizes "business process modelling" to establish a unified model for traceable stakeholder requirements.

Keywords: supply chain, traceability system, halal food, stakeholders’ requirements

Procedia PDF Downloads 105
4992 Cultivating Social-Ecological Resilience, Harvesting Biocultural Resistance in Southern Andes

Authors: Constanza Monterrubio-Solis, Jose Tomas Ibarra

Abstract:

The fertile interdependence of social-ecological systems reveals itself in the interactions between native forests and seeds, home gardens, kitchens, foraging activities, local knowledge, and food practices, creating particular flavors and food meanings as part of cultural identities within territories. Resilience in local-food systems, from a relational perspective, can be understood as the balance between persistence and adaptability to change. Food growing, preparation, and consumption are constantly changing and adapting as expressions of agency of female and male indigenous peoples and peasants. This paper explores local food systems’ expressions of resilience in the la Araucanía region of Chile, namely: diversity, redundancy, buffer capacity, modularity, self-organization, governance, learning, equity, and decision-making. Applying ethnographic research methods (participant observation, focus groups, and semi-structured interviews), this work reflects on the experience developed through work with Mapuche women cultivating home gardens in the region since 2012; it looks to material and symbolic elements of resilience in the local indigenous food systems. Local food systems show indeed indicators of social-ecological resilience. The biocultural memory is expressed in affection to particular flavors and recipes, the cultural importance of seeds and reciprocity networks, as well as an accurate knowledge about the indicators of the seasons and weather, which have allowed local food systems to thrive with a strong cultural foundation. Furthermore, these elements turn into biocultural resistance in the face of the current institutional pressures for rural specialization, processes of cultural assimilation such as agroecosystems and diet homogenization, as well as structural threats towards the diversity and freedom of native seeds. Thus, the resilience-resistance dynamic shown by the social-ecological systems of the southern Andes is daily expressed in the local food systems and flavors and is key for diverse and culturally sound social-ecological health.

Keywords: biocultural heritage, indigenous food systems, social-ecological resilience, southern Andes

Procedia PDF Downloads 130
4991 New Applications of Essential Oils: Edible Packaging Material for Food Supplements

Authors: Roxana Gheorghita, Gheorghe Gutt

Abstract:

Environmental pollution due to non-degradation of packaging from the food and pharmaceutical industry is reaching increasingly alarming levels. The packaging used for food supplements is usually composed of successive layers of synthetic materials, conventional, glue, and paint. The situation is becoming more and more problematic as the population, according to statistics, uses food supplements more and more often. The solution can be represented by edible packaging, completely biodegradable, and compostable. The tested materials were obtained from biopolymers, agar, carrageenan, and alginate, in well-established quantities and plasticized with glycerol. Rosemary, thyme, and oregano essential oils have been added in varying proportions. The obtained films are completely water-soluble in hot liquids (with a temperature of about 80° C) and can be consumed with the product contained. The films were glossy, pleasant to the touch, thin (thicknesses between 32.8 and 52.8 μm), transparent, and with a pleasant smell, specific to the added essential oil. Tested for microbial evaluation, none of the films indicated the presence of E. coli, S. aureus, enterobacteria, coliform bacteria, yeasts, or molds. This aspect can also be helped by the low values of the water activity index (located between 0.546 and 0.576). The mechanical properties indicated that the material became more resistant with the addition of essential oil, the best values being recorded by the addition of oregano. The results obtained indicate the possibility of using biopolymer-based films with the addition of rosemary, thyme, and oregano essential oil, for wrapping food supplements, thus replacing conventional packaging, multilayer, impossible to sort and recycle.

Keywords: edible films, food supplements, oregano, rosemary, thyme

Procedia PDF Downloads 128
4990 Effect of National Sovereignty of Non-Citizens Human Rights Standards: Mediterranean Irregular Immigrants Case

Authors: Azin Karami, Bahareh Heydari

Abstract:

There is a difference between national sovereignty ( national security guarantee) and human rights standards (human security guarantee). Under the pretext of providing security for the majority, Governments violate human rights standards and lead to populism. This paper illustrates despite the human rights standards of non-citizens, they mostly confront different practical and social realities. (a large gap between the reality and the truth). This paper has focused on one of vulnerable irregular non-citizens immigrants from Mediterranean . In addition, it has considered challenges of the basic and primary human rights standards of this group. It shows how government policies affect the flow of irregular immigration. This paper is based upon UN data about Mediterranean immigrants and polls answered by 68 people who intended to migrate from Mediterranean (28 female and 40 male people, the average age of 30 to 40). The model is supposed to be a convenient one to present objective, real evidence of irregular immigrants and discusses the challenges that this group of immigrants confront them .This paper shows clear concept of immigrants.

Keywords: human rights, human security, national sovereignty, irregular immigrants

Procedia PDF Downloads 175
4989 Identification System for Grading Banana in Food Processing Industry

Authors: Ebenezer O. Olaniyi, Oyebade K. Oyedotun, Khashman Adnan

Abstract:

In the food industry high quality production is required within a limited time to meet up with the demand in the society. In this research work, we have developed a model which can be used to replace the human operator due to their low output in production and slow in making decisions as a result of an individual differences in deciding the defective and healthy banana. This model can perform the vision attributes of human operators in deciding if the banana is defective or healthy for food production based. This research work is divided into two phase, the first phase is the image processing where several image processing techniques such as colour conversion, edge detection, thresholding and morphological operation were employed to extract features for training and testing the network in the second phase. These features extracted in the first phase were used in the second phase; the classification system phase where the multilayer perceptron using backpropagation neural network was employed to train the network. After the network has learned and converges, the network was tested with feedforward neural network to determine the performance of the network. From this experiment, a recognition rate of 97% was obtained and the time taken for this experiment was limited which makes the system accurate for use in the food industry.

Keywords: banana, food processing, identification system, neural network

Procedia PDF Downloads 465
4988 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 124
4987 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 326
4986 Comparison of Antimicrobial Activity of Seed Oil of Garlic and Moringa oleifera against Some Food-Borne Microorganisms

Authors: Mansur Abdulrasheed, Ibrahim I. Hussein, Ahmed M. Mubarak, Ahmed F. Umar

Abstract:

This study was aimed at evaluating the phytochemical constituents and the antimicrobial activity of the seed oil of Moringa oleifera and garlic against some selected food-borne microorganisms (Staphylococcus aureus, Escherichia coli, Salmonella spp and Pseudomonas aeruginosa) using disc diffusion method. The results of the phytochemical screening revealed differences in the presence of the phytochemicals among the extracts. Saponins were detected in both Moringa oleifera and garlic seed oil, while alkaloid and tannins were observed in seed oil of garlic. Furthermore, the antibacterial assay results show that the seed oil of Moringa oleifera was inactive against all the tested organisms, even at 100 % concentration. In contrast, garlic oil was found to be active against all the tested organisms. The highest inhibition was observed in E. coli (12 mm)at 100 % concentration, while at 20 % concentration, Salmonella Sp and P. aeruginosa showed the least inhibit on (6 mm). The antimicrobial activity of the seed oil of garlic may be attributed to its phytochemicals components which were not detected in the seed oil of Moringa oleifera. The results of this study have shown the potentials of the seed oil of garlic as an antimicrobial agent more especially in foods, by inhibiting the growth of the test organisms, which range from food-borne pathogens to food spoilage organisms.

Keywords: antimicrobial, garlic, Moringa oleifera, food borne pathogens

Procedia PDF Downloads 409
4985 Customer Experience Management in Food and Beverage Outlet at Indian School of Business: Methodology and Recommendations

Authors: Anupam Purwar

Abstract:

In conventional consumer product industry, stockouts are taken care by carrying buffer stock to check underserving caused by changes in customer demand, incorrect forecast or variability in lead times. But, for food outlets, the alternate of carrying buffer stock is unviable because of indispensable need to serve freshly cooked meals. Besides, the food outlet being the sole provider has no incentives to reduce stockouts, as they have no fear of losing revenue, gross profit, customers and market share. Hence, innovative, easy to implement and practical ways of addressing the twin problem of long queues and poor customer experience needs to be investigated. Current work analyses the demand pattern of 11 different food items across a routine day. Based on this optimum resource allocation for all food items has been carried out by solving a linear programming problem with cost minimization as the objective. Concurrently, recommendations have been devised to address this demand and supply side problem keeping in mind their practicability. Currently, the recommendations are being discussed and implemented at ISB (Indian School of Business) Hyderabad campus.

Keywords: F&B industry, resource allocation, demand management, linear programming, LP, queuing analysis

Procedia PDF Downloads 131
4984 Beyond Cooking and Food Preparation: Examining the Material Culture of Medieval Cuisine in the Middle East

Authors: Shurouq Munzer

Abstract:

This study investigates methods for inferring the presence of cooking activity at an archaeological site through the study of cooking tools, contextual evidence, and food preparation techniques. This paper examines the patterns of cooking utensils and categorizes the morphological features as well as the types of clay utilized in manufacturing such cooking utensils. Despite challenges in accessing such evidence due to its limited availability in books and excavations. The excavation results provide the point for evaluating progress in daily life and underscore the cultural, social, and economic significance of studying cooking activity at archaeological sites within their archaeological contexts.

Keywords: coarse ware, cooking utensils, ḥisba, waqif, muḥtasib, foodways, practice, cuisine, food preparation

Procedia PDF Downloads 68
4983 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 378
4982 Industrial Ecology Perspectives of Food Supply Chains: A Framework of Analysis

Authors: Luciano Batista, Sylvia Saes, Nuno Fouto, Liam Fassam

Abstract:

This paper introduces the theoretical and methodological basis of an analytical framework conceived with the purpose of bringing industrial ecology perspectives into the core of the underlying disciplines supporting analyses in studies concerned with environmental sustainability aspects beyond the product cycle in a supply chain. Given the pressing challenges faced by the food sector, the framework focuses upon waste minimization through industrial linkages in food supply chains. The combination of industrial ecology practice with basic LCA elements, the waste hierarchy model, and the spatial scale of industrial symbiosis allows the standardization of qualitative analyses and associated outcomes. Such standardization enables comparative analysis not only between different stages of a supply chain, but also between different supply chains. The analytical approach proposed contributes more coherently to the wider circular economy aspiration of optimizing the flow of goods to get the most out of raw materials and cuts wastes to a minimum.

Keywords: by-product synergy, food supply chain, industrial ecology, industrial symbiosis

Procedia PDF Downloads 414
4981 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 389
4980 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 403
4979 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 327
4978 Moving Towards Zero Waste in a UK Local Authority Area: Challenges to the Introduction of Separate Food Waste Collections

Authors: C. Cole, M. Osmani, A. Wheatley, M. Quddus

Abstract:

EU and UK Government targets for minimising and recycling household waste has led the responsible authorities to research the alternatives to landfill. In the work reported here the local waste collection authority (Charnwood Borough Council) has adopted the aspirational strategy of becoming a “Zero Waste Borough” to lead the drive for public participation. The work concludes that the separate collection of food waste would be needed to meet the two regulatory standards on recycling and biologically active wastes. An analysis of a neighbouring Authority (Newcastle-Under-Lyne Borough Council (NBC), a similar sized local authority that has a successful weekly food waste collection service was undertaken. Results indicate that the main challenges for Charnwood Borough Council would be gaining householder co-operation, the extra costs of collection and organising alternative treatment. The analysis also demonstrated that there was potential offset value via anaerobic digestion for CBC to overcome these difficulties and improve its recycling performance.

Keywords: England, food waste collections, household waste, local authority

Procedia PDF Downloads 407
4977 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 136
4976 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 69
4975 Assessing the Impact of Renewable Energy on Regional Sustainability: A Comparative Study of Suwon and Seoul

Authors: Jongsoo Jurng

Abstract:

The drive to expand renewable energies is often in direct conflict with sustainable development goals. Thus, it is important that energy policies account for potential trade-offs. We assess the interlinkages between energy, food, water, and land, for two case studies, Suwon and Seoul. We apply a range of assessment methods and study their usefulness as tools to identify trade-offs and to compare the sustainability performance. We calculate cross-sectoral footprints, self-sufficiency ratios and perform a simplified Energy-Water-Food nexus analysis. We use the latter for assessing scenarios to increase energy and food self-sufficiency in Suwon, while we use ecosystem service (ESS) accounting for Seoul. For Suwon, we find that constraints on the energy, food and water sectors urgently call for integrated approaches to energy policy; for Seoul, the further expansion of renewables comes at the expense of cultural and supporting ESS, which could outweigh gains from increased energy exports. We recommend a general upgrade to indicators and visualization methods that look beyond averages and a fostering of infrastructure for data on sustainable development based on harmonized international protocols. We warn against rankings of countries or regions based on benchmarks that are neither theory-driven nor location-specific.

Keywords: ESS, renewable energy, energy-water-food nexus, assessment

Procedia PDF Downloads 129