Search results for: food security indicators
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 7275

Search results for: food security indicators

6315 System Transformation: Transitioning towards Low Carbon, Resource Efficient, and Circular Economy for Global Sustainability

Authors: Anthony Halog

Abstract:

In the coming decades the world that we know today will be drastically transformed. Population and economic growth, particularly in developing countries, are radically changing the demand for food and natural resources. Due to the transformations caused by these megatrends, especially economic growth which is rapidly expanding the middle class and changing consumption patterns worldwide, it is expected that this will result to an increase of approximately 40 percent in the demand for food, water, energy and other resources in the next decades. To fulfill this demand in a sustainable and efficient manner while avoiding food and water scarcity as well as environmental catastrophes in the near future, some industries, particularly the ones involved in food and energy production, have to drastically change its current production systems towards circular and green economy. In Australia, the agri-food industry has played a very important role in the scenario described above. It is one of the major food exporters in the world, supplying fast growing international markets in Asia and the Middle East. Though the Australian food supply chains are economically and technologically developed, it has been facing enduring challenges about its international competitiveness and environmental burdens caused by its production processes. An integrated framework for sustainability assessment is needed to precisely identify inefficiencies and environmental impacts created during food production processes. This research proposes a combination of industrial ecology and systems science based methods and tools intending to develop a novel and useful methodological framework for life cycle sustainability analysis of the agri-food industry. The presentation highlights circular economy paradigm aiming to implement sustainable industrial processes to transform the current industrial model of agri-food supply chains. The results are expected to support government policy makers, business decision makers and other stakeholders involved in agri-food-energy production system in pursuit of green and circular economy. The framework will assist future life cycle and integrated sustainability analysis and eco-redesign of food and other industrial systems.

Keywords: circular economy, eco-efficiency, agri-food systems, green economy, life cycle sustainability assessment

Procedia PDF Downloads 267
6314 Environmental Life Cycle Assessment of Two Technologic Scenario of Wind Turbine Blades Composition for an Optimized Wind Turbine Design Using the Impact 2002+ Method and Using 15 Environmental Impact Indicators

Authors: A. Jarrou, A. Iranzo, C. Nana

Abstract:

The rapid development of the onshore/offshore wind industry and the continuous, strong, and long-term support from governments have made it possible to create factories specializing in the manufacture of the different parts of wind turbines, but in the literature, Life Cycle Assessment (LCA) analyzes consider the wind turbine as a whole and do not allow the allocation of impacts to the different components of the wind turbine. Here we propose to treat each part of the wind turbine as a system in its own right. This is more in line with the current production system. Environmental Life Cycle Assessment of two technological scenarios of wind turbine blades composition for an optimized wind turbine design using the impact 2002+ method and using 15 environmental impact indicators. This article aims to assess the environmental impacts associated with 1 kg of wind turbine blades. In order to carry out a realistic and precise study, the different stages of the life cycle of a wind turbine installation are included in the study (manufacture, installation, use, maintenance, dismantling, and waste treatment). The Impact 2002+ method used makes it possible to assess 15 impact indicators (human toxicity, terrestrial and aquatic ecotoxicity, climate change, land use, etc.). Finally, a sensitivity study is carried out to analyze the different types of uncertainties in the data collected.

Keywords: life cycle assessment, wind turbine, turbine blade, environmental impact

Procedia PDF Downloads 146
6313 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 277
6312 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria

Authors: Nuhu Bitrus Mailabari

Abstract:

Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.

Keywords: border, cross border, migration, Nigeria, northeast region, security

Procedia PDF Downloads 148
6311 Magnetic Treatment of Irrigation Water and Its Effect on Water Salinity

Authors: Muhammad Waqar Ashraf

Abstract:

The influence of magnetic field on the structure of water and aqueous solutions are similar and can alter the physical and chemical properties of water-dispersed systems. With the application of magnetic field, hydration of salt ions and other impurities slides down and improve the possible technological characteristics of the water. Magnetic field can enhance the characteristic of water i.e. better salt solubility, kinetic changes in salt crystallization, accelerated coagulation, etc. Gulf countries are facing critical problem due to depletion of water resources and increasing food demands to cover the human needs; therefore water shortage is being increasingly accepted as a major limitation for increased agricultural production and food security. In arid and semi-arid regions sustainable agricultural development is influenced to a great extent by water quality that might be used economically and effectively in developing agriculture programs. In the present study, the possibility of using magnetized water to desalinate the soil is accounted for the enhanced dissolving capacity of the magnetized water. Magnetic field has been applied to treat brackish water. The study showed that the impact of magnetic field on saline water is sustained up to three hours (with and without shaking). These results suggest that even low magnetic field can decrease the electrical conductivity and total dissolved solids which are good for the removal of salinity from the irrigated land by using magnetized water.

Keywords: magnetic treatment, saline water, hardness of water, removal of salinity

Procedia PDF Downloads 474
6310 Pre-Analytical Laboratory Performance Evaluation Utilizing Quality Indicators between Private and Government-Owned Hospitals Affiliated to University of Santo Tomas

Authors: A. J. Francisco, K. C. Gallosa, R. J. Gasacao, J. R. Ros, B. J. Viado

Abstract:

The study focuses on the use of quality indicators (QI)s based on the standards made by the (IFCC), that could effectively identify and minimize errors occurring throughout the total testing process (TTP), in order to improve patient safety. The study was conducted through a survey questionnaire that was given to a random sample of 19 respondents (eight privately-owned and eleven government-owned hospitals), mainly CMTs, MTs, and Supervisors from UST-affiliated hospitals. The pre-analytical laboratory errors, which include misidentification errors, transcription errors, sample collection errors and sample handling and transportation errors, were considered as variables according to the IFCC WG-LEPS. Data gathered were analyzed using the Mann-Whitney U test, Percentile, Linear Regression, Percentage, and Frequency. The laboratory performance of both hospitals is High level. There is no significant difference between the laboratory performance between the two stated variables. Moreover, among the four QIs, sample handling and transportation errors contributed most to the difference between the two variables. Outcomes indicate satisfactory performance between both variables. However, in order to ensure high-quality and efficient laboratory operation, constant vigilance and improvements in pre-analytical QI are still needed. Expanding the coverage of the study, the inclusion of other phases, utilization of parametric tests are recommended.

Keywords: pre-analytical phase, quality indicators, laboratory performance, pre-analytical error

Procedia PDF Downloads 125
6309 [Keynote Talk]: Surveillance of Food Safety Compliance of Hong Kong Street Food

Authors: Mabel Y. C. Yau, Roy C. F. Lai, Hugo Y. H. Or

Abstract:

This study is a pilot surveillance of hygiene compliance and food microbial safety of both licensed and mobile vendors selling Chinese ready–to-eat snack foods in Hong Kong. The study reflects similar situations in running mobile food vending business on trucks. Hong Kong is about to launch the Food Truck Pilot Scheme by the end of 2016 or early 2017. Technically, selling food on the vehicle is no different from hawking food on the street or vending food on the street. Each type of business bears similar food safety issues and cast the same impact on public health. Present findings demonstrate exemplarily situations that also apply to food trucks. 9 types of Cantonese style snacks of 32 samples in total were selected for microbial screening. A total of 16 vending sites including supermarkets, street markets, and snack stores were visited. The study finally focused on a traditional snack, the steamed rice cake with red beans called Put Chai Ko (PCK). PCK is a type of classical Cantonese pastry sold on push carts on the street. It used to be sold at room temperature and served with bamboo sticks in the old days. Some shops would have them sold steam fresh. Microbial examinations on aerobic counts, yeast, and mould, coliform, salmonella as well as Staphylococcus aureus detections were carried out. Salmonella was not detected in all samples. Since PCK does not contain ingredients of beef, poultry, eggs or dairy products, the risk of the presence of Salmonella in PCK was relatively lower although other source of contamination might be possible. Coagulase positive Staphylococcus aureus was found in 6 of the 14 samples sold at room temperature. Among these 6 samples, 3 were PCK. One of the samples was in an unacceptable range of total colony forming units higher than 105. The rest were only satisfactory. Observational evaluations were made with checklists on personal hygiene, premises hygiene, food safety control, food storage, cleaning and sanitization as well as waste disposals. The maximum score was 25 if total compliance were obtained. The highest score among vendors was 20. Three stores were below average, and two of these stores were selling PCK. Most of the non-compliances were on food processing facilities, sanitization conditions and waste disposal. In conclusion, although no food poisoning outbreaks happened during the time of the investigation, the risk of food hazard existed in these stores, especially among street vendors. Attention is needed in the traditional practice of food selling, and that food handlers might not have sufficient knowledge to properly handle food products. Variations in food qualities existed among supply chains or franchise eateries or shops. It was commonly observed that packaging and storage conditions are not properly enforced in the retails. The same situation could be reflected across the food business. It did indicate need of food safety training in the industry and loopholes in quality control among business.

Keywords: cantonese snacks, food safety, microbial, hygiene, street food

Procedia PDF Downloads 288
6308 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 318
6307 Food Preference of Monomorium Destructor

Authors: Ussawit Srisakrapikoop, Art-Ong Pradatsundarasar, Duangkhae Sitthicharoenchai

Abstract:

Monomorium destructor or Singapore ant is one of the common household pests. It causes nuisance and damage to household. Due to the fact that there are many queens in one colony (polygyny), so this ant can quickly increase its population in a short time in the urban environment. This study has been conducted at Faculty of Science, Chulalongkorn University in the field condition. Ant food preference was conducted for 3 replicates per month by using six food choices including 20% sucrose solution, 20% sucrose agar, pork liver, smashed pork liver, pork fat and lard. The number of ants of each bait choice was counted and the orders of ant accessing baits were also recorded. The results showed that the 20% sucrose agar was the most attractive significantly following by pork liver and pork fat. The ants also most accessed to the pork liver bait choice in the first place. It can be suggested that the ant control by baiting should consist of mixture of carbohydrate, protein and lipid in solid form with suitable ratios.

Keywords: baits, food preference, monomorium destructor, Singapore ant

Procedia PDF Downloads 238
6306 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 65
6305 Analyzing the Impacts of Sustainable Tourism Development on Residents’ Well-Being Based on Stakeholder Perception: Evidence from a Coastal-Hinterland Region

Authors: Elham Falatoonitoosi, Vikki Schaffer, Don Kerr

Abstract:

Over-development for tourism and its consequences on residents’ well-being turn into a critical issue in tourism destinations. Learning about undesirable impacts of tourism has led many people to seek more sustainable and responsible tourism. The main objective of this research is to understand how and to what extent sustainable tourism development enhances locals’ well-being regarding stakeholder perception. The research was conducted in a coastal-hinterland tourism region through two sequential phases. At the first phase, a unique set of 19 sustainable tourism indicators resulted from a triplex model was used to examine the sustainability effects on the main factors of residents’ well-being including equity and living condition, life satisfaction, health condition, and education quality. The triplex model including i) systematic literature search, ii) convergent interviewing, and iii) DEMATEL aimed to develop sustainability indicators, specify them for a particular destination, and identify the dominant sustainability issues acting as key predictors in sustainable development. At the second phase, a hierarchical multiple regression was used to examine the relationship between sustainable development and local residents’ well-being. A number of 167 participants from five different groups of stakeholders perceived the importance level of each sustainability indicators regarding well-being factors on 5-point Likert scale. Results from the first phase indicated that sustainability training, government support, tourism sociocultural effects, tourism revenue, and climate change are the top dominant sustainability issues in the regional sustainable development. Results from the second phase showed that sustainable development considerably improves the overall residents’ well-being and has positive relationships with all well-being factors except life satisfaction. It explains that it was difficult for stakeholders to recognize a link between sustainable development and their overall life satisfaction and happiness. Among well-being’s factors, health condition was influenced the most by sustainability indicators that indicate stakeholders believed sustainability development can promote public health, health sector performance, quality of drinking water, and sanitation. For the future research, it is highly recommended to analysis the effects of sustainable tourism development on the other features of a tourism destination’s well-being including residents sociocultural empowerment, local economic growth, and attractiveness of the destination.

Keywords: residents' well-being, stakeholder perception, sustainability indicators, sustainable tourism

Procedia PDF Downloads 246
6304 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 268
6303 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 419
6302 Application of Remote Sensing Technique on the Monitoring of Mine Eco-Environment

Authors: Haidong Li, Weishou Shen, Guoping Lv, Tao Wang

Abstract:

Aiming to overcome the limitation of the application of traditional remote sensing (RS) technique in the mine eco-environmental monitoring, in this paper, we first classified the eco-environmental damages caused by mining activities and then introduced the principle, classification and characteristics of the Light Detection and Ranging (LiDAR) technique. The potentiality of LiDAR technique in the mine eco-environmental monitoring was analyzed, particularly in extracting vertical structure parameters of vegetation, through comparing the feasibility and applicability of traditional RS method and LiDAR technique in monitoring different types of indicators. The application situation of LiDAR technique in extracting typical mine indicators, such as land destruction in mining areas, damage of ecological integrity and natural soil erosion. The result showed that the LiDAR technique has the ability to monitor most of the mine eco-environmental indicators, and exhibited higher accuracy comparing with traditional RS technique, specifically speaking, the applicability of LiDAR technique on each indicator depends on the accuracy requirement of mine eco-environmental monitoring. In the item of large mine, LiDAR three-dimensional point cloud data not only could be used as the complementary data source of optical RS, Airborne/Satellite LiDAR could also fulfill the demand of extracting vertical structure parameters of vegetation in large areas.

Keywords: LiDAR, mine, ecological damage, monitoring, traditional remote sensing technique

Procedia PDF Downloads 378
6301 Effect of Cloud Computing on Enterprises

Authors: Amir Rashid

Abstract:

Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.

Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS

Procedia PDF Downloads 321
6300 Scientometrics Analysis of Food Supply Chain Risk Assessment Literature: Based On Web of Science Record 1996-2014

Authors: Mohsen Shirani, Shadi Asadzandi, Micaela Demichela

Abstract:

This paper presents the results of a study to assess crucial aspects and the strength of the scientific basis of a typically interdisciplinary, applied field: food supply chain risk assessment research. Our approach is based on an advanced scientometrics analysis with novel elements to assess the influence and dissemination of research results and to measure interdisciplinary. This paper aims to describe the quantity and quality of the publication trends in food supply chain risk assessment. The population under study was composed of 266 articles from database web of science. The results were analyzed based on date of publication, type of document, language of the documents, source of publications, subject areas, authors and their affiliations, and the countries involved in developing the articles.

Keywords: food supply chain, risk assessment, scientometrics, web of science

Procedia PDF Downloads 482
6299 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 628
6298 Examining the Acceptability of Destination Local Food by Domestic Tourist Visiting Northern Nigeria

Authors: Eldah Ephraim Buba, Jamila Mohammed Waziri

Abstract:

There are challenges faced by tourist in respect of choosing food while in tourism destination. Food is very important in the choice of holiday of tourist. Many tourists choose a destination not only because of physical attraction but they choose destination where they will not encounter challenges in respect to food. The study is aimed at examining the acceptability of northern delicacies by tourists from other parts of Nigeria. Six delicacies were produced and presented to 50 tourists who are randomly picked from the south-east, south-west, south-south and the middle belt of Nigeria. The study found out that Danwake, Masa, and Kwadon zogale were generally accepted by majority of the respondents. Although, the respondents were not comfortable with the appearance of danwake, other aspect of the checklist was accepted. Tuwon shinkafa miyan taushe was accepted in terms of appearance but rejected in terms of taste and texture. ‘Yar Tsame and dindikolo were generally rejected. The study recommended that caterers, attraction owners and hoteliers should include such meals in their menu so that tourist will enjoy the gastronomy of the northern part of Nigeria.

Keywords: acceptability, examination, food, tourism

Procedia PDF Downloads 375
6297 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 414
6296 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 347
6295 Assessment of the Bataan Peninsula State University Food Technology Situation

Authors: Rosemarie P. Ongoco, Rowena S. Badua, Kristine Joy S. Simpao, Ria L. Dizon

Abstract:

Food Technology (FT) has become a very powerful field in dealing with the processing of food making it available, safe, tasty and convenient. Bataan Peninsula State University (BPSU) has been offering FT as a major of the Bachelor of Science in Industrial Technology, both in the Main and Orani campuses since the 1970s. With the different orientation of FT offered in state universities and colleges, whether it is skill or science-based, this study aims to assess the current FT situation in BPSU. Curriculum, faculty profile and facilities of FT in BPSU were assessed and compared to the other FT related program in three state universities in Region III; Nueva Ecija University of Science and Technology, Pampanga Agricultural College, and Central Luzon State University. Data were gathered through structured interview, ocular inspection for the facilities and questionnaires for the teacher and students’ personal interest. Results show that BPSU’s FT program is more likely similar to the one offered in NEUST. PAC is offering a similar course but is more business and management-oriented BS Home Economics while CLSU is offering a science and technology-related course, BS Home Economics while CLSU is offering a science and technology-related course, BS Food Technology. BPSU students more intercede in cooking and baking while doing sales report, dishwashing and food packaging are the activities faculty and students are least interested. Mechanized machines in cooking and baking are also suggested by the majority of the students in BPSU. In conclusion, BPSU’s program in BS IT major in Food Technology must be improved in the aspects of curriculum, faculty profile, and facilities. It is recommended for the department to consider the curriculum, faculty profile, and facilities. It is recommended for the department to consider the curriculum of NEUST in the BS IT major in Food Technology.

Keywords: food technology, curriculum, technology, assessment

Procedia PDF Downloads 331
6294 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 31
6293 The Determination of Contamination Rate of Traditional White Cheese in Behbahan Markets to Coliforms and Pathogenic Escherichia Coli

Authors: Sana Mohammad Jafar, Hossaini Seyahi Zohreh

Abstract:

Infections and food intoxication caused by microbial contamination of food is of major issues in different countries, and diseases caused by the consumption of contaminated food included a large percentage of the country's health problems. Since traditional cheese for cultural reasons, good taste and smell in many parts of the area still has the important place in people's food basket, transmission of pathogenic bacteria could be at risk human health through the consumption of this food. In this study selected randomly 100 samples of 250 grams of traditional cheeses supplied in the city Behbahan market and adjacent to the ice was transferred to the laboratory and microbiological tests were performed immediately. According to the results, from 100 samples tested traditional cheese, 94 samples (94% of samples) were contaminated with coliforms, which of this number 75 samples (75% of samples) the contamination rate was higher than the limit (more than 100 cfu/g). Of the total samples, 36 samples (36% of samples) were contaminated with fecal coliform which of this number 30 samples (30% of samples) were contaminated with Escherichia.coli bacteria. Based on the results of agglutination test,no samples was found positive as pathogenic Escherichia.coli.

Keywords: determination, traditional cheese, Behbahan, Escherichia coli

Procedia PDF Downloads 488
6292 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 122
6291 The Relationship among Exercise Participation, Job Stress and Job Satisfaction: A Study on Food Service Employees in Taiwan

Authors: Jui-Hsiu Chang

Abstract:

As an increasing number of restaurants are growing, the demand for man force in the food service industry is dramatically increasing as well. However, food service workers often complete the heavy workload, infrequent breaks, long hours and shifts. With the overwhelming workload, many workers have experienced high injury rates. As a result, the restaurant industry reports a higher employee turnover rate compare to other service industries in Taiwan. Restaurant managers are seeing ways to retain good employees in order to provide good quality service for daily operation. The purpose of this study was to explore the relationship among exercise participation, job stress and job satisfaction on the food service employees. In addition, to examine how the job stress affected their job satisfaction. A survey using a self-reported questionnaire was conducted to collect data, and 269 questionnaires were collected for data analysis. The obtained materials were analyzed using descriptive statistic, independent t-test, one-way ANOVA, linear regression analysis. The results show that 1. Job stress had a significantly negative influence on employees’ job satisfaction. 2. Exercise participation had significantly positive influence on employees’ job satisfaction. 3. Job stress and job satisfaction varied among the groups of respondent with different level of exercise involvement. Furthermore, the practical implications were proposed for the food service company management when developing daily operational strategies.

Keywords: exercise participation, food service employees, job satisfaction, job stress

Procedia PDF Downloads 251
6290 Identify the Renewable Energy Potential through Sustainability Indicators and Multicriteria Analysis

Authors: Camila Lima, Murilo Andrade Valle, Patrícia Teixeira Leite Asano

Abstract:

The growth in demand for electricity, caused by human development, depletion and environmental impacts caused by traditional sources of electricity generation have made new energy sources are increasingly encouraged and necessary for companies in the electricity sector. Based on this scenario, this paper assesses the negative environmental impacts associated with thermoelectric power plants in Brazil, pointing out the importance of using renewable energy sources, reducing environmental aggression. This article points out the existence of an energy alternative, wind energy, of the municipalities of São Paulo, represented by georeferenced maps with the help of GIS, using as a premise the indicators of sustainability and multicriteria analysis in the decision-making process.

Keywords: GIS (geographic information systems), multicriteria analysis, sustainability, wind energy

Procedia PDF Downloads 346
6289 Consumers’ Perceptions of Non-Communicable Diseases and Perceived Product Value Impacts on Healthy Food Purchasing Decisions

Authors: Khatesiree Sripoothon, Usanee Sengpanich, Rattana Sittioum

Abstract:

The objective of this study is to examine the factors influencing consumer purchasing decisions about healthy food. This model consists of two latent variables: Consumer Perception relating to NCDs and Consumer Perceived Product Value. The study was conducted in the northern provinces of Thailand, which are popular with tourists and have received support from the government for health tourism. A survey was used as the data collection method, and the questionnaire was applied to 385 tourists. An accidental sampling method was used to identify the sample. The statistics of frequency, percentage, mean, and structural equation model were used to analyze the data obtained. Additionally, all factors had a significant positive influence on healthy food purchasing decisions (p<0.01) and were predictive of healthy food purchasing decisions at 46.20 (R2=0.462). Also, these findings seem to underline a supposition that consumer perceptions of NCDs and perceived product value are key variables that strengthens the competitive effects of a healthy-friendly business entrepreneur. Moreover, reduce the country's public health costs for treating patients with the disease of NCDs in Thailand.

Keywords: healthy food, perceived product value, perception of non-communicable diseases, purchasing decisions

Procedia PDF Downloads 145
6288 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 55
6287 A Comparative Case Study on the Relationship between Solar Energy Potential and Block Typology and Density in Shanghai Context

Authors: Dan Zhu, Jie Shi

Abstract:

This study explores the relationship between solar potential and block typology and density by analyzing sixteen existing typical street blocks with different topologies and densities in Shanghai, a representative high-density urban in China. Several indicators are proposed to quantify, and a methodology is conducted to evaluate and compare the solar potential both on façade and roof across various selected urban forms. 1) The importance of appropriate solar energy indicators and geometric parameters to be used in comparative studies, and 2) the relationship between urban typology, density, and solar performance are discussed. In this way, the results reveal the key design attributes contributing to increasing solar potential.

Keywords: block typology, geometric parameters, high-density urban, solar potential

Procedia PDF Downloads 318
6286 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 400