Search results for: transformation and security challenges
8683 Effect of the Food Distribution on Household Food Security Status in Iran
Authors: Delaram Ghodsi, Nasrin Omidvar, Hassan Eini-Zinab, Arash Rashidian, Hossein Raghfar
Abstract:
Food supplementary programs are policy approaches that aim to reduce financial barriers to healthy diets and tackle food insecurity. This study aimed to evaluate the effect of the supportive section of Multidisciplinary Supplementary Program for Improvement of Nutritional Status of Children (MuPINSC) on households’ food security status and nutritional status of mothers. MuPINSC is a national integrative program in Iran that distributes supplementary food basket to malnourished or growth retarded children living in low-income families in addition to providing health services, including sanitation, growth monitoring, and empowerment of families. This longitudinal study is part of a comprehensive evaluation of the program. The study participants included 359 mothers of children aged 6 to 72 month under coverage of the supportive section of the program in two provinces of Iran (Semnan and Qazvin). Demographic and economic characteristics of families were assessed by a questionnaire. Data on food security of family was collected by locally adapted Household Food Insecurity Access Scale (HFIAS) at the baseline of the study and six month thereafter. Weight and height of mothers were measured at the baseline and end of the study and mother’s BMI was calculated. Data were analysed, using paired t-test, GEE (Generalized Estimating Equation), and Chi-square tests. Based on the findings, at the baseline, only 4.7% of families were food-secure, while 13.1%, 38.7% and, 43.5% were categorized as mild, moderate and severe food insecure. After six months follow up, the distribution of different levels of food security changed significantly (P<0.001) to 7.9%, 11.6%, 42.6%, and 38%, respectively. At the end of the study, the chance of food insecurity was significantly 20% lower than the beginning (OR=0.796; 0.653-0.971). No significant difference was observed in maternal BMI based on food security (P>0.05). The findings show that the food supplementary program for children improved household food security status in the studied households. Further research is needed to assess other factors that affect the effectiveness of this large scale program on nutritional status and household’s food security.Keywords: food security, food supplementary program, household, malnourished children
Procedia PDF Downloads 4018682 Production Value, Constraints, and Opportunities in East African Freshwater Fisheries: Systematic Review
Authors: Alamrew Eyayu, Abebe Getahun, James Last Keyombe
Abstract:
Demand for fish continued to grow worldwide while production from capture fisheries has decreased. In the Eastern African Region (EAR), the open-access nature of capture fisheries has resulted in illegal fishing. Within communities engaged in fishing, small-scale fisheries support food security strategies and sustain livelihoods. Despite the role of fisheries in EAR, inland fisheries are vulnerable to loss, and management solutions authorized for inland fisheries are inadequate. This review investigates production potential, challenges, opportunities, and management of inland fisheries in the EAR. It is therefore expected that in aquaculture promising areas, the EAR will turn to depend more on aquaculture to meet the extended needs and supply gaps created as a result of capture fisheries shortfalls. However, aquaculture is still in its infant stage in the region, and there exists no adequate aquaculture policy framework and funds in some EAR (e.g., Ethiopia, Somalia). Stakeholders at all levels should entertain the importance of fishery-based activities for food security in EAR. As a result, easily implemented and community-oriented fisheries legislative documents need to be prepared for advancing sustainable fisheries management. Legislative documents might consider techniques of continual catch statistics (consider small water bodies as much as possible) of inland fisheries and enforcing existing laws to manage illegal fishing activities to accustom sustainable development of inland capture fisheries.Keywords: aquaculture, capture fisheries, East Africa, fisheries management
Procedia PDF Downloads 258681 Impact of HIV/AIDS on Food Security in Pala Sub-Location, Bondo District, Kenya
Authors: S. B. Otieno, Were Fred, E. W. Kabiru, K. Waza
Abstract:
Background: HIV/AIDS is leading to the loss of labor through sickness and subsequent death, this is leading to the neglect of farm and off-farm activities, with the subsequent loss of potential income and food security. The situation is sensitive to seasonal labour peaks in agriculture. This study was done to determine the impact of high HIV prevalence in farming systems and food security in Pala Bondo District, Kenya. Methods: In this study, 386 respondents were randomly chosen in Pala Sub-Location. The respondents and key informants were interviewed using structured questionnaire. The data were entered and analyzed using SPSS version 16. Results: It was established that majority of respondents (67%) were between 18 and 35 years {χ2 = (1, N = 386) = 13.430, p = 0.000} (chimney effect). The study also established that 83.5% of respondents were married {χ2 = (1, N= 370) = 166.277 p = 0.000} and predominant occupation being farming and fishing (61%), while 52.8% of farm labour was by hand, 26% by oxen, and 4.9% mechanized. 73.2% of respondents only farm 0.25 to 2 acres, 48% mentioned lack of labour in land preparation {χ2 ((1,N = 321) = 113.146, p = 0.000), in planting {χ2 (1, N = 321) = 29.28, p = 0.000}. Majority of respondents lack food from January to June, during which 93% buy food. Conclusion: The high HIV prevalence in Pala has affected the farm labour leading to food insecurity.Keywords: food security, HIV, AIDS, labour
Procedia PDF Downloads 2698680 RFID and Intelligence: A Smart Authentication Method for Blind People
Authors: V. Vishu, R. Manimegalai
Abstract:
A combination of Intelligence and Radio frequency identification to bring an enhanced authentication method for the improvement of visually challenged people. The main goal is to provide an improved authentication by combining Advanced Encryption Standard algorithm and Intelligence. Here the encryption key will be generated as a combination of intelligent information from sensors and tag values. The main challenges are security, privacy and cost. Besides, the method was created to evaluate the amount of interaction between sensors and significant influence on the level of visually challenged people’s mental and physical states. The proposal is to apply various ideas on independent living or to assist them for a good life.Keywords: AES, encryption, intelligence, smart key
Procedia PDF Downloads 2418679 Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria
Authors: Oyekan Kolawole Jamiu
Abstract:
The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria.Keywords: terrorism, intelligent gathering, right to life, prosecution
Procedia PDF Downloads 3498678 Strategies for the Oral Delivery of Oligonucleotides
Authors: Venkat Garigapati
Abstract:
To date, more than a dozen oligonucleotide products are approved as injectable products for clinical use. However, there is no single oligo nucleotide product approved for clinical use. Oral delivery of oligo nucleotides is patient friendly administration however, many challenges involved in the development of oral formulation. Over the course of last twenty plus years, the research in this space aimed to address these challenges. This paper describes the issues involved in solubility, stability, enzymatic (nuclease) induced degradation, and permeation of nucleotides in the Gastrointestinal (GI) and how to overcome these challenges. Also, the translation of in vitro data to in vivo models hinders the formulation development. This paper describes the challenges involved in the development of Oligo Nucleotide products for oral administration. It also discusses the chemistry and formulation strategies for oral administration of oligonucleotides.Keywords: oral adminstration, oligo nucleotides, stability, permeation, gastrointestinal tract
Procedia PDF Downloads 858677 Client Hacked Server
Authors: Bagul Abhijeet
Abstract:
Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring
Procedia PDF Downloads 2528676 Secure Optical Communication System Using Quantum Cryptography
Authors: Ehab AbdulRazzaq Hussein
Abstract:
Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).
Procedia PDF Downloads 4068675 Morphological Transformation of Traditional Cities: The Case Study of the Historic Center of the City of Najaf
Authors: Sabeeh Lafta Farhan, Ihsan Abbass Jasim, Sohaib Kareem Al-Mamoori
Abstract:
This study addresses the subject of transformation of urban structures and how does this transformation affect the character of traditional cities, which represents the research issue. Hence, the research has aimed at studying and learning about the urban structure characteristics and morphological transformation features in the traditional cities centers, and to look for means and methods to preserve the character of those cities. Cities are not merely locations inhabited by a large number of people, they are political and legal entities, in addition to economic activities that distinguish these cities, thus, they are a complex set of institutions, and the transformation in urban environment cannot be recognized without understanding these relationships. The research presumes an existing impact of urbanization on the properties of traditional structure of the Holy City of Najaf. The research has defined urbanization as restructuring and re-planning of urban areas that have lost their functions and bringing them into social and cultural life in the city, to be able to serve economy in order to better respond to the needs of users. Sacred Cities provide the organic connection between acts of worship and dealings and reveal the mechanisms and reasons behind the regulatory nature of the sacred shrine and their role in achieving organizational assimilation of urban morphology. The research has reached a theoretical framework of the particulars of urbanization. This framework has been applied to the historic center of the old city of Najaf, where the most important findings of the research were that the visual and structural dominant presence of holy shrine of Imam Ali (peace be upon him) remains to emphasize the visual particularity, and the main role of the city, which hosts one of the most important Muslim shrines in the world, in addition to the visible golden dome rising above the skyline, and the Imam Ali Mosque the hub and the center for religious activities. Thus, in view of being a place of main importance and a symbol of religious and Islamic culture, it is very important to have the shrine of Imam Ali (AS) prevailing on all zones of re-development in the old city. Consequently, the research underlined that the distinctive and unique character of the city of Najaf did not proceed from nothing, but was achieved through the unrivaled characteristics and features possessed by the city of Najaf alone, which allowed it and enabled it to occupy this status among the Arab and Muslim cities. That is why the activities arising from the development have to enhance the historical role of the city in order to have this development as clear support, strength and further addition to the city assets and its cultural heritage, and not seeing the developmental activities crushing the city urban traditional fabric, cultural heritage and its historical specificity.Keywords: Iraq, the city of Najaf, heritage, traditional cities, morphological transformation
Procedia PDF Downloads 3148674 The Roles of Art Extra Activities in Promoting the Psychological Sides in the Higher Education Institutions and Its Challenges: Oman as a Case Study
Authors: Mohammed Hamood Al-Amri, Fakhriya Khalfan Al Yahyai
Abstract:
The current case study aimed to investigate the roles of art extra activities in promoting the psychological sides in the Higher Education Institutions in the Sultanate of Oman and its challenges. The sample of the study consisted of (331) students (111 males and 220 females) were chosen randomly from four higher education institutions in Oman. For the purpose of achieving the objectives of the study, the researchers prepared a questioner consisted of (52 items) divided into two main sections (psychological sides & challenges), and the validity and reliability were established. The results of the study showed that the important of the roles of art extra activities in promoting and supporting the psychologic sides in the Higher Education Institutions as the respondents scored highly in all study tool sections with means rated between (3.65 to 4.25). The results also indicated that there were statistically differences between the average scores of the study sample members regarding the roles of art extra activities in promoting the psychological sides in the Higher Education Institutions due to type of institution in favor of the private institutions as well as in favor of females' students. The results also show there is statistically significant differences in the type of accommodation regarding the psychological side due to inside compass accommodation. Regarding the challenges facing students to participating in art extra activities, the results showed that the challenges relating to the academic study become the first, followed by the personal challenges related to the students themselves. The results also indicated that there were statistically differences at (α=0.05) between the average scores of the study sample members regarding identify the challenges for students' reluctance in favour of the private institutions. The results also there were no statistically significant differences among the sample responds due to the agenda, year of study, and type of accommodations. This study ended up with some recommendations and suggestions to activate the roles of art extra activities in promoting the psychological sides in the Higher Education Institutions with references to some solutions for the challenges.Keywords: art activities, psychological sides, higher education institutions, challenges and oman
Procedia PDF Downloads 928673 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study
Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly
Abstract:
In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions
Procedia PDF Downloads 828672 Sustainability through Resilience: How Emergency Responders Cope with Stressors
Authors: Sophie Kroeling, Agnetha Schuchardt
Abstract:
Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.Keywords: civil security, emergency responders, stress, resilience, resources
Procedia PDF Downloads 1458671 Issues and Challenges in Social Work Field Education: The Field Coordinator's Perspective
Authors: Tracy B.E. Omorogiuwa
Abstract:
Understanding the role of social work in improving societal well-being cannot be separated from the place of field education, which is an integral aspect of social work education. Field learning provides students with knowledge and opportunities to experience solving issues in the field and giving them a clue of the practice situation. Despite being a crucial component in social work curriculum, field education occupies a large space in learning outcome, given the issues and challenges pertaining to its purpose and significance in the society. The drive of this paper is to provide insight on the specific ways in which field education has been conceived, realized and valued in the society. Emphasis is on the significance of field instruction; the link with classroom learning; and the structure of field experience in social work education. Given documented analysis and experience, this study intends to contribute to the development of social work curriculum, by analyzing the pattern, issues and challenges fronting the social work field education in the University of Benin, Nigeria.Keywords: challenges, curriculum, field education, social work education
Procedia PDF Downloads 2998670 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors
Authors: M. S. Razana, Z. W. Shafiuddin
Abstract:
Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification
Procedia PDF Downloads 2358669 Critical Review of Web Content Mining Extraction Mechanisms
Authors: Rabia Bashir, Sajjad Akbar
Abstract:
There is an inevitable demand of web mining due to rapid increase of huge information on the Internet, but the striking variety of web structures has made required content retrieval a difficult task. To counter this issue, Web Content Mining (WCM) emerges as a potential candidate which extracts and integrates suitable resources of data to users. In past few years, research has been done on several extraction techniques for WCM i.e. agent-based, template-based, assumption-based, statistic-based, wrapper-based and machine learning. However, it is still unclear that either these approaches are efficiently tackling the significant challenges of WCM or not. To answer this question, this paper identifies these challenges such as language independency, structure flexibility, performance, automation, dynamicity, redundancy handling, intelligence, relevant content retrieval, and privacy. Further, mapping of these challenges is done with existing extraction mechanisms which helps to adopt the most suitable WCM approach, given some conditions and characteristics at hand.Keywords: content mining challenges, web content mining, web content extraction approaches, web information retrieval
Procedia PDF Downloads 5488668 Math Rally Proposal for the Teaching-Learning of Algebra
Authors: Liliana O. Martínez, Juan E. González, Manuel Ramírez-Aranda, Ana Cervantes-Herrera
Abstract:
In this work, the use of a collection of mathematical challenges and puzzles aimed at students who are starting in algebra is proposed. The selected challenges and puzzles are intended to arouse students' interest in this area of mathematics, in addition to facilitating the teaching-learning process through challenges such as riddles, crossword puzzles, and board games, all in everyday situations that allow them to build themselves the learning. For this, it is proposed to carry out a "Math Rally: algebra" divided into four sections: mathematical reasoning, a hierarchy of operations, fractions, and algebraic equations.Keywords: algebra, algebraic challenge, algebraic puzzle, math rally
Procedia PDF Downloads 1718667 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure
Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano
Abstract:
Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security
Procedia PDF Downloads 1658666 Transformation of Aluminum Unstable Oxyhydroxides in Ultrafine α-Al2O3 in Presence of Various Seeds
Authors: T. Kuchukhidze, N. Jalagonia, Z. Phachulia, R. Chedia
Abstract:
Ceramic obtained on the base of aluminum oxide has wide application range, because it has unique properties, for example, wear-resistance, dielectric characteristics, exploitation ability at high temperatures and in corrosive atmosphere. Low temperature synthesis of α-Al2O3 is energo-economical process and it is actual for developing technologies of corundum ceramics fabrication. In the present work possibilities of low temperature transformation of oxyhydroxides in α-Al2O3, during a presence of small amount of rare–earth elements compounds (also Th, Re), have been discussed. Aluminium unstable oxyhydroxides have been obtained by hydrolysis of aluminium isopropoxide, nitrates, sulphate, chloride in alkaline environment at 80-90ºC tempertures. β-Al(OH)3 has been received from aluminium powder by ultrasonic development. Drying of oxyhydroxide sol has been conducted with presence of various types seeds, which amount reaches 0,1-0,2% (mas). Neodymium, holmium, thorium, lanthanum, cerium, gadolinium, disprosium nitrates and rhenium carbonyls have been used as seeds and they have been added to the sol specimens in amount of 0.1-0.2% (mas) calculated on metals. Annealing of obtained gels is carried out at 70 – 1100ºC for 2 hrs. The same specimen transforms in α-Al2O3 at 1100ºC. At this temperature in case of presence of lanthanum and gadolinium transformation takes place by 70-85%. In case of presence of thorium stabilization of γ-and θ-phases takes place. It is established, that thorium causes inhibition of α-phase generation at 1100ºC, at the time in all other doped specimens α-phase is generated at lower temperatures (1000-1050ºC). During the work the following devices have been used: X-ray difractometer DRON-3M (Cu-Kα, Ni filter, 2º/min), High temperature vacuum furnace OXY-GON, electronic scanning microscopes Nikon ECLIPSE LV 150, NMM-800TRF, planetary mill Pulverisette 7 premium line, SHIMADZU Dynamic Ultra Micro Hardness Tester, DUH-211S, Analysette 12 Dyna sizer.Keywords: α-Alumina, combustion, phase transformation, seeding
Procedia PDF Downloads 3938665 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women
Authors: Abeer Al Kalbani
Abstract:
Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.Keywords: food security, household food security, utilization, role of women
Procedia PDF Downloads 4058664 Mastering Digital Transformation with the Strategy Tandem Innovation Inside-Out/Outside-In: An Approach to Drive New Business Models, Services and Products in the Digital Age
Authors: S. N. Susenburger, D. Boecker
Abstract:
In the age of Volatility, Uncertainty, Complexity, and Ambiguity (VUCA), where digital transformation is challenging long standing traditional hardware and manufacturing companies, innovation needs a different methodology, strategy, mindset, and culture. What used to be a mindset of scaling per quantity is now shifting to orchestrating ecosystems, platform business models and service bundles. While large corporations are trying to mimic the nimbleness and versatile mindset of startups in the core of their digital strategies, they’re at the frontier of facing one of the largest organizational and cultural changes in history. This paper elaborates on how a manufacturing giant transformed its Corporate Information Technology (IT) to enable digital and Internet of Things (IoT) business while establishing the mindset and the approaches of the Innovation Inside-Out/Outside-In Strategy. It gives insights into the core elements of an innovation culture and the tactics and methodologies leveraged to support the cultural shift and transformation into an IoT company. This paper also outlines the core elements for an innovation culture and how the persona 'Connected Engineer' thrives in the digital innovation environment. Further, it explores how tapping domain-focused ecosystems in vibrant innovative cities can be used as a part of the strategy to facilitate partner co-innovation. Therefore, findings from several use cases, observations and surveys led to conclusion for the strategy tandem of Innovation Inside-Out/Outside-In. The findings indicate that it's crucial in which phases and maturity level the Innovation Inside-Out/Outside-In Strategy is activated: cultural aspects of the business and the regional ecosystem need to be considered, as well as cultural readiness from management and active contributors. The 'not invented here syndrome' is a barrier of large corporations that need to be addressed and managed to successfully drive partnerships, as well as embracing co-innovation and a mindset shifting away from physical products toward new business models, services, and IoT platforms. This paper elaborates on various methodologies and approaches tested in different countries and cultures, including the U.S., Brazil, Mexico, and Germany.Keywords: innovation management, innovation culture, innovation methodologies, digital transformation
Procedia PDF Downloads 1468663 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism
Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun
Abstract:
The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorismKeywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution
Procedia PDF Downloads 968662 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network
Authors: Muhammad R. Ahmed, Mohammed Aseeri
Abstract:
Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.Keywords: internal attack, wireless sensor network, network security, entropy
Procedia PDF Downloads 4558661 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability
Authors: Özlem Turan, Şule Turhan
Abstract:
About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.Keywords: food, food safety, food systems, sustainability
Procedia PDF Downloads 3868660 Human Resource Management Challenges in Nigeria Under a Globalised Economy
Authors: Odeh Linus
Abstract:
The pace of globalization is increasing continuously in terms of markets for goods and services, investment opportunities across borders amongst others. Enterprises face competition from all fronts. Human resource management is not left out in this transformation crusade as it has obligation to move along with the changing demands of the globalization process. One of the objectives of this paper is to show that effective managers should constantly be aware of the changes taking place in domestic (home country) environment, as well as around the globe (international and foreign environments) on HR issues and developments. By so doing, they can scan their environment on an ongoing basis, and when they detect opportunities and/or threats, they can transform their organization to seize the opportunities and/or combat or neutralize the threats as the case may be. In this presentation, problems, issues and trends in HRM practice in Nigeria in the current period were reviewed. The factors affecting HRM and its practice in a global context and what should be the direction of the profession and its practice in Nigeria constitute the main focus of this paper.Keywords: human resource, globalization, management, developing countries
Procedia PDF Downloads 3118659 A Model-Driven Approach of User Interface for MVP Rich Internet Application
Authors: Sarra Roubi, Mohammed Erramdani, Samir Mbarki
Abstract:
This paper presents an approach for the model-driven generating of Rich Internet Application (RIA) focusing on the graphical aspect. We used well known Model-Driven Engineering (MDE) frameworks and technologies, such as Eclipse Modeling Framework (EMF), Graphical Modeling Framework (GMF), Query View Transformation (QVTo) and Acceleo to enable the design and the code automatic generation of the RIA. During the development of the approach, we focused on the graphical aspect of the application in terms of interfaces while opting for the Model View Presenter pattern that is designed for graphics interfaces. The paper describes the process followed to define the approach, the supporting tool and presents the results from a case study.Keywords: metamodel, model-driven engineering, MVP, rich internet application, transformation, user interface
Procedia PDF Downloads 3538658 Evolving Urban Landscapes: Smart Cities and Sustainable Futures
Authors: Mehrzad Soltani, Pegah Rezaei
Abstract:
In response to the escalating challenges posed by resource scarcity, urban congestion, and the dearth of green spaces, contemporary urban areas have undergone a remarkable transformation into smart cities. This evolution necessitates a strategic and forward-thinking approach to urban development, with the primary objective of diminishing and eventually eradicating dependence on non-renewable energy sources. This steadfast commitment to sustainable development is geared toward the continual enhancement of our global urban milieu, ensuring a healthier and more prosperous environment for forthcoming generations. This transformative vision has been meticulously shaped by an extensive research framework, incorporating in-depth field studies and investigations conducted at both neighborhood and city levels. Our holistic strategy extends its purview to encompass major cities and states, advocating for the realization of exceptional development firmly rooted in the principles of sustainable intelligence. At its core, this approach places a paramount emphasis on stringent pollution control measures, concurrently safeguarding ecological equilibrium and regional cohesion. Central to the realization of this vision is the widespread adoption of environmentally friendly materials and components, championing the cultivation of plant life and harmonious green spaces, and the seamless integration of intelligent lighting and irrigation systems. These systems, including solar panels and solar energy utilization, are deployed wherever feasible, effectively meeting the essential lighting and irrigation needs of these dynamic urban ecosystems. Overall, the transformation of urban areas into smart cities necessitates a holistic and innovative approach to urban development. By actively embracing sustainable intelligence and adhering to strict environmental standards, these cities pave the way for a brighter and more sustainable future, one that is marked by resilient, thriving, and eco-conscious urban communities.Keywords: smart city, green urban, sustainability, urban management
Procedia PDF Downloads 728657 Money Laundering and Financing of Terrorism
Authors: Covadonga Mallada Fernández
Abstract:
Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.Keywords: control of financial flows, money laundering, terrorism, financing of terrorism
Procedia PDF Downloads 4548656 Representation of Contemporary Italian Migrants Through Photographic Portraiture in the Arc Lémanique (Switzerland): Methodological Challenges
Authors: Francesco Arese Visconti
Abstract:
The purpose of this paper is to question the methodological challenges that practice-based research on recent Italian migrants in Switzerland can pose. The entire development of the work has moved from the theorization to the production and back in a continuous exchange which is at the base of failures and successful results. The theoretical background leads to reflect on practical solutions to produce photographic portraits in the attempt to depict the cultural identity of a specific population. Thus, a series of key points of this challenging, visual, and intimate journey are discussed and developed. While analyzing, in the first stance, the psychological challenges resulting from the encounter of the photographer, the sitter, and the spectator, the challenges of the representation of a group of people with individual photographic portraits will secondly be highlighted. The paper underlines how previous work can be precursory of subsequent research and why the inclusion of the landscape versus maintaining a neutral background has links with paintings from the Italian Renaissance.Keywords: photography, migration, Italians, Switzerland
Procedia PDF Downloads 978655 Functional Analysis of Barriers in Disability Care Research: An Integrated Developmental Approach
Authors: Asma Batool
Abstract:
Immigrant families raising a child with developmental disabilities in Canada encounter many challenges during the process of disability care. Starting from the early screening of their child for diagnosis followed by challenges associated with treatment, access and service utilization. A substantial amount of research focuses on identifying barriers. However, the functional aspects of barriers in terms of their potential influences on parents and children with disabilities are unexplored yet. This paper presents functional analysis of barriers in disability care research by adopting a method of integrated approach. Juxtaposition of two developmental approaches, Bronfenbrenner’s ecological model and parents ‘transformational process model is generating multiple hypotheses to be considered while empirically investigating causal relationships and mediating or moderating factors among various variables related with disability care research. This functional analysis suggests that barriers have negative impacts on the physical and emotional development of children with disabilities as well as on the overall quality of family life (QOFL). While, barriers have facilitating impacts on parents, alternatively, the process of transformation in parents expedite after experiencing barriers. Consequently, parents reconstruct their philosophy of life and experience irreversible but continuous developmental change in terms of transformations simultaneously with their developing child and may buffer the expected negative impacts of barriers on disabled child and QOFL. Overall, this paper is suggesting implications for future research and parents’ transformations are suggesting potential pathways to minimize the negative influences of barriers that parents experience during disability care, hence improving satisfaction in QOFL in general.Keywords: barriers in disability care, developmental disabilities, parents’ transformations, quality of family life
Procedia PDF Downloads 4058654 Social Perception of the Benefits of Using a Solar Dryer to Conserve Fruits and Vegetables in Rural Communities in Manica - Mozambique
Authors: Constâncio Augusto Machanguana, Luís Miguel Estevão Cristóvão
Abstract:
In Mozambique, over 80% of the rural population relies on agriculture, livestock, and silviculture for their livelihoods. Unfortunately, these communities face persistent food shortages, which are exacerbated by natural disasters and post-harvest losses due to inadequate storage facilities. Addressing post-harvest loss is critical not only for ensuring food security but also for preventing financial hardships faced by farmers. The study delves into the perceptions of beneficiary communities regarding the construction of three food dryer models made from metal, wood, and clay brick. These solar dryers are part of the project titled ‘Solar Dryer Integrated with Natural Rocks as Energy Storage for Drying Fruits and Vegetables in Mozambique.’ The overarching goal is to enhance food availability beyond the typical growing season, particularly for fruits and vegetables, while simultaneously combating hunger. Given the context of climate change impacts on agriculture, this project becomes even more relevant. Structured interviews conducted with 45 members of beneficiary associations in Manica Province—primarily female heads of households—revealed that rural communities are aware of various food drying alternatives. However, reliance on traditional methods often comes at a cost: compromised product quality and reduced shelf life. To address these challenges, the project implemented energy storage solutions like rock-based thermal energy storage for food drying. This result underscores the urgent need to foster innovation and extend these sustainable practices —such as solar dryers integrated with thermal energy-storage systems made of locally abundant and affordable materials— to more local communities, especially those with significant agricultural potential within the country. By taking these actions, we can improve food security and alleviate hunger.Keywords: solar dryer, food security, rural community, small technology
Procedia PDF Downloads 30