Search results for: foods security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3279

Search results for: foods security

2409 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 139
2408 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 142
2407 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 254
2406 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 295
2405 Occupational Safety Need Analysis for Turkey and Europe

Authors: Ismail Muratoglu, Ahmet Meyveci, Abdurrahman Tuncer, Erkan Demirci

Abstract:

This study is dedicated to the analysis of the problems of occupational safety in Turkey, Italy and Poland. The need analysis was applied to three different countries which are Turkey; 4, Poland; 1, Italy; 1 state. The number of the subjects is 891 in Turkey. The number of the subjects is 26 in Italy and the number of the subjects is 19 in Poland. The total number of samples of study is 936. Four different forms (Job Security Experts Form, Student Form, Teacher Form and Company Form) were applied. Results of experts of job security forms are rate of 7.1%. Then, the students’ forms are rate of 34.3%, teacher or instructor forms are rate of 9.9%. The last corporation forms are rate of 48.7%.

Keywords: Europe, need analysis, occupational safety, Turkey, vocational education

Procedia PDF Downloads 428
2404 Nutritional Evaluation and the Importance of Traditional Vegetables That Sustain the Indigenous People of Malaysia

Authors: Rachel Thomas Tharmabalan

Abstract:

The growing unease over the matter of food security in the world is the result of a maturing realization that the genetic base of most human caloric intake from plants is dangerously narrow. Malaysia’s tropical rainforests have the potential to contribute to diet diversification and provide a source of nutrient-rich food as the Orang Asli communities in Malaysia have relied almost entirely on the jungle for food, fodder, medicine and fuel antithetical to what is happening today. This segregation of the Orang Asli from traditional lands and resources leads to severe loss of knowledge of biodiversity. In order to preserve these wild edibles, four different types of vegetables that are frequently consumed by the Orang Asli which consists of Rebu, Meranti, Saya and Pama were selected. These vegetables were then analysed to determine its proximate and mineral content to help ascertain claims and reaffirm the impact it can play in ensuring food and nutrition security, in addition to combating chronic diseases. From the results obtained, the Meranti had the highest crude fiber, iron and calcium content. Other minerals such as potassium, magnesium and copper were also found in varying content. These wild edibles could also contribute to education and bring awareness to younger generations as well as urban populations to start consuming more of these in their daily life as it could prevent various chronic diseases in Malaysia.

Keywords: food and nutrition security, Orang Asli, underutilized plants, wild edible food systems

Procedia PDF Downloads 148
2403 A Goal-Driven Crime Scripting Framework

Authors: Hashem Dehghanniri

Abstract:

Crime scripting is a simple and effective crime modeling technique that aims to improve understanding of security analysts about security and crime incidents. Low-quality scripts provide a wrong, incomplete, or sophisticated understanding of the crime commission process, which oppose the purpose of their application, e.g., identifying effective and cost-efficient situational crime prevention (SCP) measures. One important and overlooked factor in generating quality scripts is the crime scripting method. This study investigates the problems within the existing crime scripting practices and proposes a crime scripting approach that contributes to generating quality crime scripts. It was validated by experienced crime scripters. This framework helps analysts develop better crime scripts and contributes to their effective application, e.g., SCP measures identification or policy-making.

Keywords: attack modelling, crime commission process, crime script, situational crime prevention

Procedia PDF Downloads 124
2402 Eating Behavior and Nutritional Status of Pregnant Women Living in Keserwan Lebanon

Authors: Cynthia Zgheib, Yonna Sacre

Abstract:

Pregnancy, this particular moment in the life of a woman, requires monitoring of eating behavior changes. However, the food choices during pregnancy should be varied and healthy, including the consumption of different food groups. Nutritional status is the process of acquisition and consumption of food. Therefore, a varied diet is associated with good nutritional status. This is why the nutrition education is a strategy commonly applied to improve maternal nutrition during pregnancy. Thus, it is crucial to assess 'The eating behavior and nutritional status of pregnant women living in Keserwan Lebanon.' In order to evaluate the association of different persona, socioeconomic and sociodemographic factors with the eating behavior and nutrition in the concerned study category, a cross-sectional descriptive study was conducted on a sample of 150 pregnant women aging between 18 and 40 years randomly selected from the hospitals and clinics located in Keserwan area and equally distributed between different cities and villages of the area according to altitude. The purpose of this study was to evaluate the eating behavior of the concerned population and to compare it to the recommendation of the food guide pyramid, their level of food awareness and finally to analyze their blood tests in order to detect any nutrients deficiency that they may face during the course of their pregnancy. Sociodemographic, lifestyle, eating behaviour, health, eating patterns, awareness, and food frequency questionnaire (FFQ) were collected through a validated questionnaire specifically adapted for the purpose of the study. Statistical analysis was carried out, and multivariate models were used in order to evaluate the association between several independent variables and the eating behaviour and nutritional status of Lebanese pregnant women The final analysis has shown that 48.7% of pregnant women were aged between 30 and 40 years old, 56% had a normal BMI between 18.5 and 24.9, thus age affects the eating behavior, so the older are the pregnant women, and the healthier is their eating behavior. In fact, 80.7% had acceptable food behavior which is based on an equilibrium between both quantity and quality of food, although the recommended foods are foods found in the food pyramid and available in the Lebanese diet. In addition, 68% had an acceptable level of awareness concerning the health importance of good eating habits, therefore, it is positively affecting their food choices. Moreover, 50 % have an acceptable nutritional status which is confirmed by their biological tests. Future governmental or national studies and programs could be settled aiming to increase the awareness about the good eating behaviors and nutritional status of Lebanese pregnant women.

Keywords: eating behavior, nutritional status, level of awareness, pregnant woman

Procedia PDF Downloads 251
2401 In vitro Study of Inflammatory Gene Expression Suppression of Strawberry and Blackberry Extracts

Authors: Franco Van De Velde, Debora Esposito, Maria E. Pirovani, Mary A. Lila

Abstract:

The physiology of various inflammatory diseases is a complex process mediated by inflammatory and immune cells such as macrophages and monocytes. Chronic inflammation, as observed in many cardiovascular and autoimmune disorders, occurs when the low-grade inflammatory response fails to resolve with time. Because of the complexity of the chronic inflammatory disease, major efforts have focused on identifying novel anti-inflammatory agents and dietary regimes that prevent the pro-inflammatory process at the early stage of gene expression of key pro-inflammatory mediators and cytokines. The ability of the extracts of three blackberry cultivars (‘Jumbo’, ‘Black Satin’ and ‘Dirksen’), and one strawberry cultivar (‘Camarosa’) to inhibit four well-known genetic biomarkers of inflammation: inducible nitric oxide synthase (iNOS), cyclooxynase-2 (Cox-2), interleukin-1β (IL-1β) and interleukin-6 (IL-6) in an in vitro lipopolysaccharide-stimulated murine RAW 264.7 macrophage model were investigated. Moreover, the effect of latter extracts on the intracellular reactive oxygen species (ROS) and nitric oxide (NO) production was assessed. Assay was conducted with 50 µg/mL crude extract concentration, an amount that is easily achievable in the gastrointestinal tract after berries consumption. The mRNA expression levels of Cox-2 and IL-6 were reduced consistently (more than 30%) by extracts of ‘Jumbo’ and ‘Black Satin’ blackberries. Strawberry extracts showed high reduction in mRNA expression levels of IL-6 (more than 65%) and exhibited moderate reduction in mRNA expression of Cox-2 (more than 35%). The latter behavior mirrors the intracellular ROS production of the LPS stimulated RAW 264.7 macrophages after the treatment with blackberry ‘Black Satin’ and ‘Jumbo’, and strawberry ‘Camarosa’ extracts, suggesting that phytochemicals from these fruits may play a role in the health maintenance by reducing oxidative stress. On the other hand, effective inhibition in the gene expression of IL-1β and iNOS was not observed by any of blackberry and strawberry extracts. However, suppression in the NO production in the activated macrophages among 5–25% was observed by ‘Jumbo’ and ‘Black Satin’ blackberry extracts and ‘Camarosa’ strawberry extracts, suggesting a higher NO suppression property by phytochemicals of these fruits. All these results suggest the potential beneficial effects of studied berries as functional foods with antioxidant and anti-inflammatory roles. Moreover, the underlying role of phytochemicals from these fruits in the protection of inflammatory process will deserve to be further explored.

Keywords: cyclooxygenase-2, functional foods, interleukin-6, reactive oxygen species

Procedia PDF Downloads 230
2400 Biodiversity of the National Production through Companion Plants Analysis

Authors: Astrid Rivera, Diego Villatoro

Abstract:

The world population increases at an accelerated pace, and it is essential to find solutions to feed the population. Nevertheless, crop diversity has significantly decreased in the last years, and the increase in food production is not the optimal solution. It is essential to consider the origin of the food, the nutriment contributions, among other dimensions. In this regard, biodiversity plays an indispensable role when designing an effective strategy to face the actual food security problems. Consequently, the purpose of this work is to analyze biodiversity in the Mexican national food production and suggest a proper crop selection based on companion plants, for which empirical and experimental knowledge shows a better scenery than current efforts. As a result, we get a set of crop recommendations to increase production in sustainable and nutritive planning. It is essential to explore more feasible options to advance sustainable development goals beyond an economic aspect.

Keywords: biodiversity, food security, companion plats, nutrition

Procedia PDF Downloads 196
2399 Sustainable Electricity Generation Mix for Kenya from 2015 to 2035

Authors: Alex Maina, Mwenda Makathimo, Adwek George, Charles Opiyo

Abstract:

This research entails the simulation of three possible power scenarios for Kenya from 2015 to 2035 using the Low Emissions Analysis Platform (LEAP). These scenarios represent the unfolding future electricity generation that will fully satisfy the demand while considering the following: energy security, power generation cost and impacts on the environment. These scenarios are Reference Scenario (RS), Nuclear Scenario (NS) and More Renewable Scenario (MRS). The findings obtained reveals that the most sustainable scenario while comparing the costs was found to be the coal scenario with a Net Present Value (NPV) of $30,052.67 million though it has the highest Green House Gases (GHGs) emissions. However, the More Renewable Scenario (MRS) had the least GHGs emissions but was found to be a most expensive scenario to implement with an NPV of $30,733.07 million.

Keywords: energy security, Kenya, low emissions analysis platform, net-present value, greenhouse gases

Procedia PDF Downloads 88
2398 Efficient Position Based Operation Code Authentication

Authors: Hashim Ali, Sheheryar Khan

Abstract:

Security for applications is always been a keen issue of concern. In general, security is to allow access of grant to legal user or to deny non-authorized access to the system. Shoulder surfing is an observation technique to hack an account or to enter into a system. When a malicious observer is capturing or recording the fingers of a user while he is entering sensitive inputs (PIN, Passwords etc.) and may be able to observe user’s password credential. It is very rigorous for a novice user to prevent himself from shoulder surfing or unaided observer in a public place while accessing his account. In order to secure the user account, there are five factors of authentication; they are: “(i) something you have, (ii) something you are, (iii) something you know, (iv) somebody you know, (v) something you process”. A technique has been developed of fifth-factor authentication “something you process” to provide novel approach to the user. In this paper, we have applied position based operational code authentication in such a way to more easy and user friendly to the user.

Keywords: shoulder surfing, malicious observer, sensitive inputs, authentication

Procedia PDF Downloads 263
2397 Towards A New Maturity Model for Information System

Authors: Ossama Matrane

Abstract:

Information System has become a strategic lever for enterprises. It contributes effectively to align business processes on strategies of enterprises. It is regarded as an increase in productivity and effectiveness. So, many organizations are currently involved in implementing sustainable Information System. And, a large number of studies have been conducted the last decade in order to define the success factors of information system. Thus, many studies on maturity model have been carried out. Some of this study is referred to the maturity model of Information System. In this article, we report on development of maturity models specifically designed for information system. This model is built based on three components derived from Maturity Model for Information Security Management, OPM3 for Project Management Maturity Model and processes of COBIT for IT governance. Thus, our proposed model defines three maturity stages for corporate a strong Information System to support objectives of organizations. It provides a very practical structure with which to assess and improve Information System Implementation.

Keywords: information system, maturity models, information security management, OPM3, IT governance

Procedia PDF Downloads 439
2396 Secure Authentication Scheme Based on Numerical Series Cryptography for Internet of Things

Authors: Maha Aladdin, Khaled Nagaty, Abeer Hamdy

Abstract:

The rapid advancement cellular networks and wireless networks have laid a solid basis for the Internet of Things. IoT has evolved into a unique standard that allows diverse physical devices to collaborate with one another. A service provider gives a variety of services that may be accessed via smart apps anywhere, at any time, and from any location over the Internet. Because of the public environment of mobile communication and the Internet, these services are highly vulnerable to a several malicious attacks, such as unauthorized disclosure by hostile attackers. As a result, the best option for overcoming these vulnerabilities is a strong authentication method. In this paper, a lightweight authentication scheme that is based on numerical series cryptography is proposed for the IoT environments. It allows mutual authentication between IoT devices Parametric study and formal proofs are utilized to illustrate that the pro-posed approach is resistant to a variety of security threats.

Keywords: internet of things, authentication, cryptography, security protocol

Procedia PDF Downloads 114
2395 Tasting Terroir: A Gourmet Adventure in Food and Wine Tourism

Authors: Sunita Boro, Saurabh Kumar Dixit

Abstract:

Terroir, an intricate fusion of geography, climate, soil, and human expertise, has long been acknowledged as a defining factor in the character of wines and foods. This research embarks on an exploration of terroir's profound influence on gastronomic tourism, shedding light on the intricate interplay between the physical environment and culinary artistry. Delving into the intricate science of terroir, we scrutinize its role in shaping the sensory profiles of wines and foods, emphasizing the profound impact of specific regions on flavor, aroma, and texture. We deploy a multifaceted methodology, amalgamating sensory analysis, chemical profiling, geographical information systems, and qualitative interviews to unearth the nuanced nuances of terroir expression. Through an exhaustive review of the literature, we elucidate the historical roots of terroir, unveil the intricate cultural dimensions shaping it, and provide a comprehensive examination of prior studies in the field. Our findings underscore the pivotal role of terroir in promoting regional identities, enhancing the economic viability of locales, and attracting gastronomic tourists. The paper also dissects the marketing strategies employed to promote terroir-driven food and wine experiences. We elucidate the utilization of storytelling, branding, and collaborative endeavors in fostering a robust terroir-based tourism industry. This elucidates both the potential for innovation and the challenges posed by oversimplification or misrepresentation of terroir. Our research spotlights the intersection of terroir and sustainability, emphasizing the significance of environmentally conscious practices in terroir-driven productions. We discern the harmonious relationship between sustainable agriculture, terroir preservation, and responsible tourism, encapsulating the essence of ecological integrity in gastronomic tourism. Incorporating compelling case studies of regions and businesses excelling in the terroir-based tourism realm, we offer in-depth insights into successful models and strategies, with an emphasis on their replicability and adaptability to various contexts. Ultimately, this paper not only contributes to the scholarly understanding of terroir's role in the world of food and wine tourism but also provides actionable recommendations for stakeholders to leverage terroir's allure, preserve its authenticity, and foster sustainable and enriching culinary tourism experiences.

Keywords: terroir, food tourism, wine tourism, sustainability

Procedia PDF Downloads 51
2394 Development and Structural Characterization of a Snack Food with Added Type 4 Extruded Resistant Starch

Authors: Alberto A. Escobar Puentes, G. Adriana García, Luis F. Cuevas G., Alejandro P. Zepeda, Fernando B. Martínez, Susana A. Rincón

Abstract:

Snack foods are usually classified as ‘junk food’ because have little nutritional value. However, due to the increase on the demand and third generation (3G) snacks market, low price and easy to prepare, can be considered as carriers of compounds with certain nutritional value. Resistant starch (RS) is classified as a prebiotic fiber it helps to control metabolic problems and has anti-cancer colon properties. The active compound can be developed by chemical cross-linking of starch with phosphate salts to obtain a type 4 resistant starch (RS4). The chemical reaction can be achieved by extrusion, a process widely used to produce snack foods, since it's versatile and a low-cost procedure. Starch is the major ingredient for snacks 3G manufacture, and the seeds of sorghum contain high levels of starch (70%), the most drought-tolerant gluten-free cereal. Due to this, the aim of this research was to develop a snack (3G), with RS4 in optimal conditions extrusion (previously determined) from sorghum starch, and carry on a sensory, chemically and structural characterization. A sample (200 g) of sorghum starch was conditioned with 4% sodium trimetaphosphate/ sodium tripolyphosphate (99:1) and set to 28.5% of moisture content. Then, the sample was processed in a single screw extruder equipped with rectangular die. The inlet, transport and output temperatures were 60°C, 134°C and 70°C, respectively. The resulting pellets were expanded in a microwave oven. The expansion index (EI), penetration force (PF) and sensory analysis were evaluated in the expanded pellets. The pellets were milled to obtain flour and RS content, degree of substitution (DS), and percentage of phosphorus (% P) were measured. Spectroscopy [Fourier Transform Infrared (FTIR)], X-ray diffraction, differential scanning calorimetry (DSC) and scanning electron microscopy (SEM) analysis were performed in order to determine structural changes after the process. The results in 3G were as follows: RS, 17.14 ± 0.29%; EI, 5.66 ± 0.35 and PF, 5.73 ± 0.15 (N). Groups of phosphate were identified in the starch molecule by FTIR: DS, 0.024 ± 0.003 and %P, 0.35±0.15 [values permitted as food additives (<4 %P)]. In this work an increase of the gelatinization temperature after the crosslinking of starch was detected; the loss of granular and vapor bubbles after expansion were observed by SEM; By using X-ray diffraction, loss of crystallinity was observed after extrusion process. Finally, a snack (3G) was obtained with RS4 developed by extrusion technology. The sorghum starch was efficient for snack 3G production.

Keywords: extrusion, resistant starch, snack (3G), Sorghum

Procedia PDF Downloads 304
2393 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 379
2392 Climate Smart Agriculture: Nano Technology in Solar Drying

Authors: Figen Kadirgan, M. A. Neset Kadirgan, Gokcen A. Ciftcioglu

Abstract:

Addressing food security and climate change challenges have to be done in an integrated manner. To increase food production and to reduce emissions intensity, thus contributing to mitigate climate change, food systems have to be more efficient in the use of resources. To ensure food security and adapt to climate change they have to become more resilient. The changes required in agricultural and food systems will require the creation of supporting institutions and enterprises to provide services and inputs to smallholders, fishermen and pastoralists, and transform and commercialize their production more efficiently. Thus there is continously growing need to switch to green economy where simultaneously causes reduction in carbon emissions and pollution, enhances energy and resource-use efficiency; and prevents the loss of biodiversity and ecosystem services. Smart Agriculture takes into account the four dimensions of food security, availability, accessibility, utilization, and stability. It is well known that, the increase in world population will strengthen the population-food imbalance. The emphasis on reduction of food losses makes a point on production, on farmers, on increasing productivity and income ensuring food security. Where also small farmers enhance their income and stabilize their budget. The use of solar drying for agricultural, marine or meat products is very important for preservation. Traditional sun drying is a relatively slow process where poor food quality is seen due to an infestation of insects, enzymatic reactions, microorganism growth and micotoxin development. In contrast, solar drying has a sound solution to all these negative effects of natural drying and artificial mechanical drying. The technical directions in the development of solar drying systems for agricultural products are compact collector design with high efficiency and low cost. In this study, using solar selective surface produced in Selektif Teknoloji Co. Inc. Ltd., solar dryers with high efficiency will be developed and a feasibility study will be realized.

Keywords: energy, renewable energy, solar collector, solar drying

Procedia PDF Downloads 222
2391 Integrated Farming Barns as a Strategy for National Food Security

Authors: Ilma Ulfatul Janah, Ibnu Rizky Briwantara, Muhammad Afif

Abstract:

The agricultural sector is one of the sectors that contribute to national development. The benefit of the agricultural sector can be felt directly by the majority of Indonesian people. Indonesia is one of the agricultural countries and most of the people working in the agricultural sector. Hence, the agricultural sector’s become the second sector which has contributed greatly to the growth of Gross Domestic Product (GDP) after the manufacture sector. Based on the National Medium Term Development Plan (RPJMN) from 2015 to 2019, one of the targets to be achieved by the Indonesian government is rice’s self-sufficient. Rice is the main food commodities which as most people in Indonesia, and it is making Indonesian government attempt self-sufficient in rice. Indonesia as an agricultural country becomes one of the countries that have a lower percentage of food security than other ASEAN countries. Rice self-sufficiency can be created through agricultural productivity and the availability of a market for the output. There are some problems still to be faced by the farmers such as farmer exchange rate is low. The low exchange rate of farmers showed that the level of the welfare’s Indonesian farmers is still low. The aims of this paper are to resolve problems related to food security and improve the welfare of the national rice farmers. The method by using materials obtained from the analysis of secondary data with the descriptive approach and conceptual framework. Integrated Farmers barn raising rice production is integrated and managed by the government coupled with the implementation of technology in the form of systems connected and accessible to farmers, namely 'SIBUNGTAN'.

Keywords: agriculture, self-sufficiency, technology, productivity

Procedia PDF Downloads 245
2390 Phenolic Content and Antioxidant Potential of Selected Nigerian Herbs and Spices: A Justification for Consumption and Use in the Food Industry

Authors: Amarachi Delight Onyemachi, Gregory Ikechukwu Onwuka

Abstract:

The growing consumer trend for natural ingredients, functional foods with health benefits and the perceived risk of carcinogenesis associated with synthetic antioxidants have forced food manufacturers to look for alternatives for producing healthy and safe food. Herbs and spices are cheap, natural and harmless sources of antioxidants which can delay and prevent lipid oxidation of food products and also confer its unique organoleptic properties and health benefits to food products. The Nigerian climate has been proven to be conducive for the production of spices and herbs and is blessed bountifully with a wide range of them. Five selected Nigerian herbs and spices Piper guieense, Xylopia aethopica, Gongronema latifolium and Ocimum gratissimum were evaluated for their ability to act as radical scavengers. The spices were extracted with 80% ethanol and evaluated using total phenolic capacity (TPC), DPPH (1,1-diph diphenyl-2-picrylhydrazyl radical) ABTS (2,2’azinobis-(3-ethylbenzthiazoline-6-sulfonic acid)), total antioxidant capacity (TAC), reducing power (RP) assays. The TPC ranged from 5.33 µg GAE/mg (in Gongronema latifolium) to 15.55 µg GAE/mg (in Ocimum gratissimum). The DPPH and ABTS scavenging activity of the extracts ranged from 0.23-0.36 IC50 mg/ml and 2.32-7.25 Trolox equivalent % respectively. The TAC and RP of the extract ranged from 6.73-10.64 µg AAE/mg and 3.52-10.19 µg AAE/mg. The result of percentage yield of the extract ranged from as low as 9.94% in Gongronema latifolium and to as high as 23.85% in Xylopia aethopica. A very strong positive relationship existed between the total antioxidant capacity and total phenolic content of the tested herbs and spices (R2=0.96). All of the extracts exhibited different extent of strong antioxidant activity, high antioxidant activity was found in Ocimum gratissimum and Gongronema latifolium with the least. However, Gongronema latifolium possessed the highest total antioxidant capacity. These data confirm the appreciable antioxidant potentials and high phenolic content of Nigerian herbs and spices, thereby providing justification for their use in dishes and functional foods, prevention of cellular damage caused by free radicals and use as natural antioxidants in the food industry for prevention of lipid oxidation in food products. However, to utilize these natural antioxidants in food products, further analysis and studies of their behaviour in food systems at varying temperature, pH conditions and ionic concentrations should be carried out to displace the use of synthetic antioxidants like BHT and BHA.

Keywords: Antioxidant, free radicals, herbs, phenolic, spices

Procedia PDF Downloads 250
2389 A Multilevel Authentication Protocol: MAP in VANET for Human Safety

Authors: N. Meddeb, A. M. Makhlouf, M. A. Ben Ayed

Abstract:

Due to the real-time requirement of message in Vehicular Ad hoc NETworks (VANET), it is necessary to authenticate vehicles to achieve security, efficiency, and conditional privacy-preserving. Privacy is of utmost relevance in VANETs. For this reason, we have proposed a new protocol called ‘Multilevel Authentication Protocol’ (MAP) that considers different vehicle categories. The proposed protocol is based on our Multilevel Authentication protocol for Vehicular networks (MAVnet). But the MAP leads to human safety, where the priority is given to the ambulance vehicles. For evaluation, we used the Java language to develop a demo application and deployed it on the Network Security Simulation (Nessi2). Compared with existing authentication protocols, MAP markedly enhance the communication overhead and decreases the delay of exchanging messages while preserving conditional privacy.

Keywords: Vehicular Ad hoc NETworks (VANET), vehicle categories, safety, databases, privacy, authentication, throughput, delay

Procedia PDF Downloads 290
2388 Development and Validation of a Semi-Quantitative Food Frequency Questionnaire for Use in Urban and Rural Communities of Rwanda

Authors: Phenias Nsabimana, Jérôme W. Some, Hilda Vasanthakaalam, Stefaan De Henauw, Souheila Abbeddou

Abstract:

Tools for the dietary assessment in adults are limited in low- and middle-income settings. The objective of this study was to develop and validate a semi-quantitative food frequency questionnaire (FFQ) against the multiple pass-24 h recall tool for use in urban and rural Rwanda. A total of 212 adults (154 females and 58 males), 18-49 aged, including 105 urban and 107 rural residents, from the four regions of Rwanda, were recruited in the present study. A multiple-pass 24- H recall technique was used to collect dietary data in both urban and rural areas in four different rounds, on different days (one weekday and one weekend day), separated by a period of three months, from November 2020 to October 2021. The details of all the foods and beverages consumed over the 24h period of the day prior to the interview day were collected during face-to-face interviews. A list of foods, beverages, and commonly consumed recipes was developed by the study researchers and ten research assistants from the different regions of Rwanda. Non-standard recipes were collected when the information was available. A single semi-quantitative FFQ was also developed in the same group discussion prior to the beginning of the data collection. The FFQ was collected at the beginning and the end of the data collection period. Data were collected digitally. The amount of energy and macro-nutrients contributed by each food, recipe, and beverage will be computed based on nutrient composition reported in food composition tables and weight consumed. Median energy and nutrient contents of different food intakes from FFQ and 24-hour recalls and median differences (24-hour recall –FFQ) will be calculated. Kappa, Spearman, Wilcoxon, and Bland-Altman plot statistics will be conducted to evaluate the correlation between estimated nutrient and energy intake found by the two methods. Differences will be tested for their significance and all analyses will be done with STATA 11. Data collection was completed in November 2021. Data cleaning is ongoing and the data analysis is expected to be completed by July 2022. A developed and validated semi-quantitative FFQ will be available for use in dietary assessment. The developed FFQ will help researchers to collect reliable data that will support policy makers to plan for proper dietary change intervention in Rwanda.

Keywords: food frequency questionnaire, reproducibility, 24-H recall questionnaire, validation

Procedia PDF Downloads 136
2387 A Critical Discourse Analysis: Embedded Inequalities in the UK Disability Social Security System

Authors: Cara Williams

Abstract:

In 2006, the UK Labour government published a Green Paper introducing Employment and Support Allowance (ESA) as a replacement for Incapacity Benefit (IB), as well as a new Work Capability Assessment (WCA); signalling a controversial political and economic shift in disability welfare policy. In 2016, the Conservative government published Improving Lives: The Work, Health, and Disability Green Paper, as part of their social reform agenda, evidently to address the ‘injustice’ of the ‘disability employment gap’. This paper contextualises ESA in the wider ideology and rhetoric of ‘welfare to work’, ‘dependency’ and ‘responsibility’. Using the British ‘social model of disability’ as a theoretical framework, the study engages in a critical discourse analysis of these two Green Papers. By uncovering the medicalised conceptions embedded in the texts, the analysis has revealed ESA is linked with late capitalisms concern with the ‘disability category’.

Keywords: disability, employment, social security, welfare

Procedia PDF Downloads 162
2386 A Reasoning Method of Cyber-Attack Attribution Based on Threat Intelligence

Authors: Li Qiang, Yang Ze-Ming, Liu Bao-Xu, Jiang Zheng-Wei

Abstract:

With the increasing complexity of cyberspace security, the cyber-attack attribution has become an important challenge of the security protection systems. The difficult points of cyber-attack attribution were forced on the problems of huge data handling and key data missing. According to this situation, this paper presented a reasoning method of cyber-attack attribution based on threat intelligence. The method utilizes the intrusion kill chain model and Bayesian network to build attack chain and evidence chain of cyber-attack on threat intelligence platform through data calculation, analysis and reasoning. Then, we used a number of cyber-attack events which we have observed and analyzed to test the reasoning method and demo system, the result of testing indicates that the reasoning method can provide certain help in cyber-attack attribution.

Keywords: reasoning, Bayesian networks, cyber-attack attribution, Kill Chain, threat intelligence

Procedia PDF Downloads 444
2385 Internal Displacement in Iraq due to ISIS Occupation and Its Effects on Human Security and Coexistence

Authors: Feisal Khudher Mahmood, Abdul Samad Rahman Sultan

Abstract:

Iraq had been a diverse society with races, cultures and religions that peacefully coexistence. The phenomenon of internal displacement occurred after April 2003, because of political instability as will as the deterioration of the political and security situation as a result of United States of America occupation. Biggest internal displacement have occurred (and keep happening) since 10th of June 2014 due to rise of Islamic State of Iraq and Syria (ISIS) and it’s occupation of one third of country territories. This crisis effected directly 3,275,000 people and reflected negatively on the social fabric of Iraq community and led to waves of sectorial violence that swept the country. Internal displaced communities are vulnerable, especially under non functional and weak government, that led to lose of essential human rights and dignity. Using Geographic Information System (GIS) and Geospatial Techniques, two types of internal displacement have been found; voluntary and forced. Both types of displacement are highly influenced by location, race and religion. The main challenge for Iraqi government and NGOs will be after defeating ISIS. Helping the displaced to resettle within their community and to re-establish the coexistence. By spatial-statical analysis hot spots of future conflicts among displaced community have been highlighted. This will help the government to tackle future conflicts before they occur. Also, it will be the base for social conflict early warning system.

Keywords: internal displacement, Iraq, ISIS, human security, human rights, GIS, spatial-statical analysis

Procedia PDF Downloads 519
2384 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 415
2383 Switched Uses of a Bidirectional Microphone as a Microphone and Sensors with High Gain and Wide Frequency Range

Authors: Toru Shionoya, Yosuke Kurihara, Takashi Kaburagi, Kajiro Watanabe

Abstract:

Mass-produced bidirectional microphones have attractive characteristics. They work as a microphone as well as a sensor with high gain over a wide frequency range; they are also highly reliable and economical. We present novel multiple functional uses of the microphones. A mathematical model for explaining the high-pass-filtering characteristics of bidirectional microphones was presented. Based on the model, the characteristics of the microphone were investigated, and a novel use for the microphone as a sensor with a wide frequency range was presented. In this study, applications for using the microphone as a security sensor and a human biosensor were introduced. The mathematical model was validated through experiments, and the feasibility of the abovementioned applications for security monitoring and the biosignal monitoring were examined through experiments.

Keywords: bidirectional microphone, low-frequency, mathematical model, frequency response

Procedia PDF Downloads 535
2382 Politics of Violence and Terrorism in the Nigeria Democracy and Its Implications on National Peace and Security

Authors: Felix O. Akinboyewa

Abstract:

To say that Nigeria is faced with the problem of domestic terrorism is to say the obvious. The spate of political assassination during the fourth republic (1999-2010) is representative of what has become a growing trend. In this research, an attempt was made to examine the problems of political assassination within the context of significant categories of domestic-related terrorism in Nigeria Democracy. The central questions are: What exactly are the nature of political violence and terrorist act in the Nigeria nascent democracy? Was there any factor responsible for the politics of violence and terrorist act in the Nigeria democracy? What implications can the political violence and terrorist act have on democratic consolidation, national peace, and security? What solutions can be proffered to eradicate terrorist act and political violence in the Nigeria democracy? The study adopted a descriptive survey design which falls within the empirical research methodology. The sample size of the study consisted of 220 subjects randomly selected. The main instruments used were questionnaire and interview schedule. Data generated from the study were analyzed using descriptive statistics such as percentage and tables. The research findings showed that unemployed youths and the members of Nigeria Union of Road Transport Workers (NURTW) were the major actors in political violence in Nigeria. They have access to weapons and ammunitions which they use to terrorize the populace. The research showed that factors responsible for the political violence and terrorism in Nigeria are: poor electoral administration; election rigging; poor security system; religious and ethnic sentiment; problems of poverty and unemployment; over-exuberance and low level of education. The study also showed that electoral violence affects smooth running democracy in Nigeria. On the measures to be taken to eradicate political violence and terrorism in Nigeria, the research showed that provision of employment opportunities would go a long way to solving the problem. Civil society as an important institution can help to reduce incidence of political violence in Nigeria. Also, government has greater role to play. The study concludes that adherence to the proffered suggestions would reduce the level of political violence and terrorist act in Nigeria.

Keywords: consolidation, democracy, peace, security, terrorism, violence

Procedia PDF Downloads 118
2381 Perceived Risks in Business-to-Consumer Online Contracts: An Empirical Study in Saudi Arabia

Authors: Shaya Alshahrani

Abstract:

Perceived risks play a major role in consumer intentions, behaviors, attitudes, and decisions about online shopping in the KSA. This paper investigates the influence of six perceived risk dimensions on Saudi consumers: product risk, information risk, financial risk, privacy and security risk, delivery risk, and terms and conditions risk empirically. To ensure the success of this study, a random survey was distributed to reflect the consumers’ perceived risk and to enable the generalization of the results. Data were collected from 323 respondents in the Kingdom of Saudi Arabia (KSA): 50 who had never shopped online and 273 who had done so. The results indicated that all six risks influenced the respondents’ perceptions of online shopping. The non-online shoppers perceived financial and delivery risks as the most significant barriers to online shopping. This was followed closely by performance, information, and privacy and security risks. Terms and conditions were perceived as less significant. The online consumers considered delivery and performance risks to be the most significant influences on internet shopping. This was followed closely by information and terms and conditions. Financial and privacy and security risks were perceived as less significant. This paper argues that introducing adequate legal solutions to addressing related problems arising from this study is an urgent need. This may enhance consumer trust in the KSA online market, increase consumers’ intentions regarding online shopping, and improve consumer protection.

Keywords: perceived risk, online contracts, Saudi Arabia, consumer protection

Procedia PDF Downloads 146
2380 Implementation and Performance Analysis of Data Encryption Standard and RSA Algorithm with Image Steganography and Audio Steganography

Authors: S. C. Sharma, Ankit Gambhir, Rajeev Arya

Abstract:

In today’s era data security is an important concern and most demanding issues because it is essential for people using online banking, e-shopping, reservations etc. The two major techniques that are used for secure communication are Cryptography and Steganography. Cryptographic algorithms scramble the data so that intruder will not able to retrieve it; however steganography covers that data in some cover file so that presence of communication is hidden. This paper presents the implementation of Ron Rivest, Adi Shamir, and Leonard Adleman (RSA) Algorithm with Image and Audio Steganography and Data Encryption Standard (DES) Algorithm with Image and Audio Steganography. The coding for both the algorithms have been done using MATLAB and its observed that these techniques performed better than individual techniques. The risk of unauthorized access is alleviated up to a certain extent by using these techniques. These techniques could be used in Banks, RAW agencies etc, where highly confidential data is transferred. Finally, the comparisons of such two techniques are also given in tabular forms.

Keywords: audio steganography, data security, DES, image steganography, intruder, RSA, steganography

Procedia PDF Downloads 284