Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6463

Search results for: household food security

5503 Infant and Young Child-Feeding Practices in Mongolia

Authors: Otgonjargal Damdinbaljir

Abstract:

Background: Infant feeding practices have a major role in determining the nutritional status of children and are associated with household socioeconomic and demographic factors. In 2010, Mongolia used WHO 2008 edition of Indicators for assessing infant and young child feeding practices for the first time. Objective: To evaluate the feeding status of infants and young children under 2 years old in Mongolia. Materials and Methods: The study was conducted by cluster random sampling. The data on breastfeeding and complementary food supplement of the 350 infants and young children aged 0-23 months in 21 provinces of the 4 economic regions of the country and capital Ulaanbaatar city were collected through questionnaires. The feeding status was analyzed according to the WHO 2008 edition of Indicators for assessing infant and young child feeding practices. Analysis of data: Survey data was analysed using the PASW statistics 18.0 and EPI INFO 2000 software. For calculation of overall measures for the entire survey sample, analyses were stratified by region. Age-specific feeding patterns were described using frequencies, proportions and survival analysis. Logistic regression was done with feeding practice as dependent and socio demographic factors as independent variables. Simple proportions were calculated for each IYCF indicator. The differences in the feeding practices between sexes and age-groups, if any, were noted using chi-square test. Ethics: The Ethics Committee under the auspices of the Ministry of Health approved the study. Results: A total of 350 children aged 0-23 months were investigated. The rate of ever breastfeeding of children aged 0-23 months reached up to 98.2%, while the percentage of early initiation of breastfeeding was only 85.5%. The rates of exclusive breastfeeding under 6 months, continued breastfeeding for 1 year, and continued breastfeeding for 2 years were 71.3%, 74% and 54.6%, respectively. The median time of giving complementary food was the 6th month and the weaning time was the 9th month. The rate of complementary food supplemented from 6th-8th month in time was 80.3%. The rates of minimum dietary diversity, minimum meal frequency, and consumption of iron-rich or iron-fortified foods among children aged 6-23 months were 52.1%, 80.8% (663/813) and 30.1%, respectively. Conclusions: The main problems revealed from the study were inadequate category and frequency of complementary food, and the low rate of consumption of iron-rich or iron-fortified foods were the main issues to be concerned on infant feeding in Mongolia. Our findings have highlighted the need to encourage mothers to enrich their traditional wheat- based complementary foods add more animal source foods and vegetables.

Keywords: complementary feeding, early initiation of breastfeeding, exclusive breastfeeding, minimum meal frequency

Procedia PDF Downloads 460
5502 Evaluation of Potential of Crop Residues for Energy Generation in Nepal

Authors: Narayan Prasad Adhikari

Abstract:

In Nepal, the crop residues have often been considered as one of the potential sources of energy to cope with prevailing energy crisis. However, the lack of systematic studies about production and various other competent uses of crop production is the main obstacle to evaluate net potential of the residues for energy production. Under this background, this study aims to assess the net annual availability of crop residues for energy production by undertaking three different districts with the representation of country’s three major regions of lowland, hill, and mountain. The five major cereal crops of paddy, wheat, maize, millet, and barley are considered for the analysis. The analysis is based upon two modes of household surveys. The first mode of survey is conducted to total of 240 households to obtain key information about crop harvesting and livestock management throughout a year. Similarly, the quantification of main crops along with the respective residues on fixed land is carried out to 45 households during second mode. The range of area of such fixed land is varied from 50 to 100 m2. The measurements have been done in air dry basis. The quantity for competitive uses of respective crop residues is measured on the basis of respondents’ feedback. There are four major competitive uses of crop residues at household which are building material, burning, selling, and livestock fodder. The results reveal that the net annual available crop residues per household are 4663 kg, 2513 kg, and 1731 kg in lowland, hill, and mountain respectively. Of total production of crop residues, the shares of dedicated fodder crop residues (except maize stalk and maize cob) are 94 %, 62 %, and 89 % in lowland, hill, and mountain respectively and of which the corresponding shares of fodder are 87 %, 91 %, and 82 %. The annual percapita energy equivalent from net available crop residues in lowland, hill, and mountain are 2.49 GJ, 3.42 GJ, and 0.44 GJ which represent 30 %, 33 %, and 3 % of total annual energy consumption respectively whereas the corresponding current shares of crop residues are only 23 %, 8 %, and 1 %. Hence, even utmost exploitation of available crop residues can hardly contribute to one third of energy consumption at household level in lowland, and hill whereas this is limited to particularly negligible in mountain. Moreover, further analysis has also been done to evaluate district wise supply-demand context of dedicated fodder crop residues on the basis of presence of livestock. The high deficit of fodder crop residues in hill and mountain is observed where the issue of energy generation from these residues will be ludicrous. As a contrary, the annual production of such residues for livestock fodder in lowland meets annual demand with modest surplus even if entire fodder to be derived from the residues throughout a year and thus there seems to be further potential to utilize the surplus residues for energy generation.

Keywords: crop residues, hill, lowland, mountain

Procedia PDF Downloads 450
5501 Attitude of Beef Cattle Farmers toward Biosecurity Practices

Authors: Veronica Sri Lestari, Sitti Nurani Sirajuddin, Kasmiyati Kasim

Abstract:

The purpose of this research was to know the attitude of beef cattle farmers toward bio security practices. This research was conducted in Barru regency, South Sulawesi province, Indonesia, in 2014. Thirty beef cattle farmers were selected through random sampling. Primary and secondary data were collected through report, observation and deep interview by using questionnaire. Bio security practices consisted of 35 questions. Every answer of the question was scored based on three categories: score 1 (not important), score 2 (important) and 3 (very important). The results of this research showed that the attitude of beef cattle farmers toward bio security practices was categorized as important.

Keywords: attitude, beef cattle, biosecurity, farmers

Procedia PDF Downloads 279
5500 The Effects of Land Grabbing on Livelihood Assets and Its Implication on Food Production in Ghana: A Case Study of Bui Dam Construction Project

Authors: Charles Kwaku Oppong

Abstract:

This study examined the effects of the agricultural land grabbed for the Bui Dam project on the livelihoods assets of the affected people and its implication on food production. Both quantitative and qualitative data were collected through the use of focus group discussions, questionnaire administration, interview guide, and observations. It was found that the land grabbing incident in the study communities as a result of the Bui Dam construction has resulted in the improvements in the physical assets of the affected people. The findings also indicated that local food crop production and the quantity of fish catch have dwindled after the land grabs. Contrary to this, the local people’s access to the natural capital, particularly the local land for agricultural activities has been worsened. The study recommends alternative sustainable livelihood for the affected people by the local government.

Keywords: land grabbing, livelihood, asset, food production

Procedia PDF Downloads 146
5499 VCloud: A Security Framework for VANET

Authors: Wiseborn Manfe Danquah, D. Turgay Altilar

Abstract:

Vehicular Ad-hoc Network (VANET) is an integral component of Intelligent Transport Systems (ITS) that has enjoyed a lot of attention from the research community and the automotive industry. This is mainly due to the opportunities and challenges it presents. Vehicular Ad-hoc Network being a class of Mobile Ad-hoc Networks (MANET) has all the security concerns existing in traditional MANET as well as new security and privacy concerns introduced by the unique vehicular communication environment. This paper provides a survey of the possible attacks in vehicular environment, as well as security and privacy concerns in VANET. It also provides an insight into the development of a comprehensive cloud framework to provide a more robust and secured communication among vehicular nodes and road side units. Our proposal, a Metropolitan Based Public Interconnected Vehicular Cloud (MIVC) infrastructure seeks to provide a more reliable and secured vehicular communication network.

Keywords: mobile Ad-hoc networks, vehicular ad hoc network, cloud, ITS, road side units (RSU), metropolitan interconnected vehicular cloud (MIVC)

Procedia PDF Downloads 334
5498 The Effect of Resource Misallocation on the Productivity of Rice Farming in Thailand: Evidence from Household-Level Data

Authors: Siwapong Dheera-Aumpon

Abstract:

Resource misallocation is known to be prevalent in many countries. Such misallocation in the manufacturing sector is large and has a considerable negative effect on aggregate productivity. Thailand is one of the countries having large resource misallocation in the manufacturing sector. Resource misallocation is also known to be widespread in the agricultural sector. It is, therefore, likely that resource misallocation exists in the agricultural sector of Thailand as well. This study aims to evaluate the extent of resource misallocation in Thai rice farming. Using household-level data from 2013 Thai Agricultural Census, this study calculates farm total factor productivity (TFP) controlling for land quality and rain. Similar to the case of Malawi, marginal products of land and capital are found to be related to farm TFP implying large resource misallocation. The output gain from a reallocation of resources to their best use is 67 percent. The gain from reallocation is highest for farms in the southern region and followed by the northeastern region.

Keywords: agriculture, misallocation, productivity, rice

Procedia PDF Downloads 210
5497 Agriroofs and Agriwalls: Applications of Food Production in Green Roofs and Green Walls

Authors: Eman M. Elmazek

Abstract:

Green roofs and walls are a rising technology in the global sustainable architectural industry. The idea takes great steps towards the future of sustainable design due to its many benefits. However, there are many barriers and constraints. Economical, structural, and knowledge barriers prevent the spread of the usage of green roofs and living walls. Understanding the benefits and expanding them will spread the idea. Benefits provided by these green spots interrupt and maintain the current urban cover. Food production is one of the benefits of green roofs. It can save money and energy spent in food transportation. The goal of this paper is to put a better understanding of implementing green systems. The paper aims to identify gains versus challenges facing the technology. It surveys with case studies buildings with green roofs and walls used for food production.

Keywords: green roof, green walls, urban farming, roof herb garden

Procedia PDF Downloads 503
5496 From Industry 4.0 to Agriculture 4.0: A Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability

Authors: Angelo Corallo, Maria Elena Latino, Marta Menegoli

Abstract:

Agri-food value chain involves various stakeholders with different roles. All of them abide by national and international rules and leverage marketing strategies to advance their products. Food products and related processing phases carry with it a big mole of data that are often not used to inform final customer. Some data, if fittingly identified and used, can enhance the single company, and/or the all supply chain creates a math between marketing techniques and voluntary traceability strategies. Moreover, as of late, the world has seen buying-models’ modification: customer is careful on wellbeing and food quality. Food citizenship and food democracy was born, leveraging on transparency, sustainability and food information needs. Internet of Things (IoT) and Analytics, some of the innovative technologies of Industry 4.0, have a significant impact on market and will act as a main thrust towards a genuine ‘4.0 change’ for agriculture. But, realizing a traceability system is not simple because of the complexity of agri-food supply chain, a lot of actors involved, different business models, environmental variations impacting products and/or processes, and extraordinary climate changes. In order to give support to the company involved in a traceability path, starting from business model analysis and related business process a Framework to Manage Product Data in Agri-Food Supply Chain for Voluntary Traceability was conceived. Studying each process task and leveraging on modeling techniques lead to individuate information held by different actors during agri-food supply chain. IoT technologies for data collection and Analytics techniques for data processing supply information useful to increase the efficiency intra-company and competitiveness in the market. The whole information recovered can be shown through IT solutions and mobile application to made accessible to the company, the entire supply chain and the consumer with the view to guaranteeing transparency and quality.

Keywords: agriculture 4.0, agri-food suppy chain, industry 4.0, voluntary traceability

Procedia PDF Downloads 133
5495 Household Low Temperature MS2 (ATCC15597-B1) Virus Inactivation Using a Hot Bubble Column Evaporator

Authors: Adrian Garrido Sanchis, Richard Pashley

Abstract:

The MS2 (ATCC15597-B1) virus was used as a surrogate to estimate the inactivation rates for enteric viruses when using a hot air bubble column evaporator (HBCE) system in the treatment of household wastewater. In this study, we have combined MS2 virus surface charging properties with thermal inactivation rates, using an improved double layer plaque assay technique, in order to assess the efficiency of the HBCE process for virus removal in water. When bubbling a continuous flow of dry air, at 200°C, only heats the aqueous solution in the bubble column to about 50°C. Viruses are not inactivated by this solution temperature, as confirmed separately from water bath heating experiments. Hence, the efficiency of the HBCE process for virus removal in water appeared to be caused entirely by collisions between the hot air bubbles and the virus organisms. This new energy efficient treatment for water reuse applications can reduce the thermal energy required to only 25% (about 113.7 kJ/L) of that required for boiling (about 450 kJ/L).

Keywords: MS2 virus inactivation, water reuse, hot bubble column evaporator, water treatment

Procedia PDF Downloads 193
5494 Predicting Wealth Status of Households Using Ensemble Machine Learning Algorithms

Authors: Habtamu Ayenew Asegie

Abstract:

Wealth, as opposed to income or consumption, implies a more stable and permanent status. Due to natural and human-made difficulties, households' economies will be diminished, and their well-being will fall into trouble. Hence, governments and humanitarian agencies offer considerable resources for poverty and malnutrition reduction efforts. One key factor in the effectiveness of such efforts is the accuracy with which low-income or poor populations can be identified. As a result, this study aims to predict a household’s wealth status using ensemble Machine learning (ML) algorithms. In this study, design science research methodology (DSRM) is employed, and four ML algorithms, Random Forest (RF), Adaptive Boosting (AdaBoost), Light Gradient Boosted Machine (LightGBM), and Extreme Gradient Boosting (XGBoost), have been used to train models. The Ethiopian Demographic and Health Survey (EDHS) dataset is accessed for this purpose from the Central Statistical Agency (CSA)'s database. Various data pre-processing techniques were employed, and the model training has been conducted using the scikit learn Python library functions. Model evaluation is executed using various metrics like Accuracy, Precision, Recall, F1-score, area under curve-the receiver operating characteristics (AUC-ROC), and subjective evaluations of domain experts. An optimal subset of hyper-parameters for the algorithms was selected through the grid search function for the best prediction. The RF model has performed better than the rest of the algorithms by achieving an accuracy of 96.06% and is better suited as a solution model for our purpose. Following RF, LightGBM, XGBoost, and AdaBoost algorithms have an accuracy of 91.53%, 88.44%, and 58.55%, respectively. The findings suggest that some of the features like ‘Age of household head’, ‘Total children ever born’ in a family, ‘Main roof material’ of their house, ‘Region’ they lived in, whether a household uses ‘Electricity’ or not, and ‘Type of toilet facility’ of a household are determinant factors to be a focal point for economic policymakers. The determinant risk factors, extracted rules, and designed artifact achieved 82.28% of the domain expert’s evaluation. Overall, the study shows ML techniques are effective in predicting the wealth status of households.

Keywords: ensemble machine learning, households wealth status, predictive model, wealth status prediction

Procedia PDF Downloads 23
5493 Enhancing Healthcare Data Protection and Security

Authors: Joseph Udofia, Isaac Olufadewa

Abstract:

Everyday, the size of Electronic Health Records data keeps increasing as new patients visit health practitioner and returning patients fulfil their appointments. As these data grow, so is their susceptibility to cyber-attacks from criminals waiting to exploit this data. In the US, the damages for cyberattacks were estimated at $8 billion (2018), $11.5 billion (2019) and $20 billion (2021). These attacks usually involve the exposure of PII. Health data is considered PII, and its exposure carry significant impact. To this end, an enhancement of Health Policy and Standards in relation to data security, especially among patients and their clinical providers, is critical to ensure ethical practices, confidentiality, and trust in the healthcare system. As Clinical accelerators and applications that contain user data are used, it is expedient to have a review and revamp of policies like the Payment Card Industry Data Security Standard (PCI DSS), the Health Insurance Portability and Accountability Act (HIPAA), the Fast Healthcare Interoperability Resources (FHIR), all aimed to ensure data protection and security in healthcare. FHIR caters for healthcare data interoperability, FHIR caters to healthcare data interoperability, as data is being shared across different systems from customers to health insurance and care providers. The astronomical cost of implementation has deterred players in the space from ensuring compliance, leading to susceptibility to data exfiltration and data loss on the security accuracy of protected health information (PHI). Though HIPAA hones in on the security accuracy of protected health information (PHI) and PCI DSS on the security of payment card data, they intersect with the shared goal of protecting sensitive information in line with industry standards. With advancements in tech and the emergence of new technology, it is necessary to revamp these policies to address the complexity and ambiguity, cost barrier, and ever-increasing threats in cyberspace. Healthcare data in the wrong hands is a recipe for disaster, and we must enhance its protection and security to protect the mental health of the current and future generations.

Keywords: cloud security, healthcare, cybersecurity, policy and standard

Procedia PDF Downloads 63
5492 A Study for Turkish Underwater Sports Federation Athletes: Evaluation of the Street Foods Consumption

Authors: Su Tezel

Abstract:

The paper deals with licensed athletes affiliated with the Turkish Underwater Sports Federation to assess the consumption status of street food. The aim of the paper is the frequency of training during competition preparatory training or season periods, the athletes' economic situation, social life, work-life or education situations are the directs them to street food? Also to evaluate the importance that athletes attach to their nutritional status. Data were collected with survey method. 141 underwater sports athletes participated in the survey. Empirical findings on 141 respondents are related to athletes' demographic information, which underwater sports branch they doing (underwater hockey, underwater rugby and free diving), with whom they live, training hours and frequency, street food consumption frequency and preferences, which type drinks they prefer drink with or without street foods and other similar things. Most of the athletes were male (64.5%), female (35.5%) and the most athletes from the sports branches included in the survey belong to underwater hockey (95.7%). 93.7% of athletes have a training time between 08:00 pm to 00:00 am and the frequency of consuming street food after training is 88%. As a remarkable result, 48% of the reasons for consuming street food easy access to street foods after training. Statistical analyzes were made with the data obtained and the status of street food consumption of athletes, whether they were suitable for professional athlete nutrition and their attitudes were evaluated.

Keywords: nutrition, street foods, underwater hockey, underwater sport

Procedia PDF Downloads 127
5491 Impact of Instagram Food Bloggers on Consumer (Generation Z) Decision Making Process in Islamabad. Pakistan

Authors: Tabinda Sadiq, Tehmina Ashfaq Qazi, Hoor Shumail

Abstract:

Recently, the advent of emerging technology has created an emerging generation of restaurant marketing. It explores the aspects that influence customers’ decision-making process in selecting a restaurant after reading food bloggers' reviews online. The motivation behind this research is to investigate the correlation between the credibility of the source and their attitude toward restaurant visits. The researcher collected the data by distributing a survey questionnaire through google forms by employing the Source credibility theory. Non- probability purposive sampling technique was used to collect data. The questionnaire used a predeveloped and validated scale by Ohanian to measure the relationship. Also, the researcher collected data from 250 respondents in order to investigate the influence of food bloggers on Gen Z's decision-making process. SPSS statistical version 26 was used for statistical testing and analyzing the data. The findings of the survey revealed that there is a moderate positive correlation between the variables. So, it can be analyzed that food bloggers do have an impact on Generation Z's decision making process.

Keywords: credibility, decision making, food bloggers, generation z, e-wom

Procedia PDF Downloads 54
5490 A Review of the Nutritional, Health and Medicinal Benefits of Selected Endangered Food Spice Crops in South Eastern Nigeria

Authors: Poly-Mbah C. P., Offor J. I., Onyeneke E. N., Poly-Mbah J. C.

Abstract:

Many food spice crops are being endangered into extinction in Nigeria because of climate change as well as deforestation occasioned by population pressure and urbanization and also due to neglect of research and agronomic attention. This review was aimed at identifying the nutritional and health benefits of these endangered aromatic food spice crops. The findings of this review will help to popularize their cultivation and increase research efforts made in the agronomy of these food spice species. Nine aromatic food spice crop species identified to be facing the danger of extinction include: Guinea pepper ( Piper guineensis), Utazi ( Gongronema latifolium), Hoary or Thai lemon basil ( Ocimum africanum), Mint basil ( Ocimum gratissimum), Whole country onions( Afrostyrax lepidophyllus), Jansa ( Cussonia bateri), Negro pepper ( Xylopia aethiopica), Ataiko or Orima (Afromomium Danielle), Aidan (Tetrapleura tetraptera). Findings from this review revealed that these species are capable of improving the nutrition and health of the rural dwellers but yet, are minimally cultivated. This paper also reviewed research made in the agronomy of these identified threatened food spice crops in the semi-urban Southeastern Nigeria environment and discovered that there is little research attention on them. The availability of these food spice crop species was discovered to come from collections made from nearby bushes and forests. This paper therefore recommends that agronomic packages such as pre-planting, planting and post-planting requirements be investigated and recommended in order to initiate and increase the cultivation of the selected endangered food spice crops as well as their productivity.

Keywords: review, endangered, food spice crops, South Eastern Nigeria

Procedia PDF Downloads 60
5489 Gender Supportive Systems-Key to Good Governance in Agriculture: Challenges and Strategies

Authors: Padmaja Kaja, Kiran Kumar Gellaboina

Abstract:

A lion’s share of agricultural work is contributed by women in India as it is the case in many developing countries, yet women are not securing the pride as a farmer. Many policies are supporting women empowerment in India, especially in agriculture sector considering the importance of sustainable food security. However these policies many times failed to achieve the targeted results of mainstreaming gender. Implementing the principles of governance would lead to gender equality in agriculture. This paper deals with the social norms and obligations prevailed with reference to Indian context which abstain women from having resources. This paper is formulated by using primary research done in eight districts of Telangana and Andhra Pradesh states of India supported by secondary research. Making amendments to Hindu Succession Act in united Andhra Pradesh much prior to the positioning of the amended act in the whole country lead to a better land holding a share of women in Andhra Pradesh. The policies like registering government distributed lands in the name of women in the state also have an added value. However, the women participation in decision-making process in agriculture is limited in elite families when compared to socially under privileged families, further too it was higher in drought affected districts like Mahbubnagar in Telangana when compared to resource-rich East Godavari district in Andhra Pradesh. Though National Gender Resource Centre for Agriculture (NGRCA) at centre and Gender Cells in the states were established a decade ago, extension reach to the women farmers is still lagging behind. Capturing the strength of women self groups in India especially in Andhra Pradesh to link up with agriculture extension might improve the extension reach of women farmers. Maintenance of micro level women data sets, creating women farmers networks with government departments like agriculture, irrigation, revenue and formal credit institutes would result in good governance to mainstream gender in agriculture. Further to add that continuous monitoring and impact assessments of the programmes and projects for gender inclusiveness would reiterate the government efforts.

Keywords: food security, gender, governance, mainstreaming

Procedia PDF Downloads 235
5488 Multi-Indicator Evaluation of Agricultural Drought Trends in Ethiopia: Implications for Dry Land Agriculture and Food Security

Authors: Dawd Ahmed, Venkatesh Uddameri

Abstract:

Agriculture in Ethiopia is the main economic sector influenced by agricultural drought. A simultaneous assessment of drought trends using multiple drought indicators is useful for drought planning and management. Intra-season and seasonal drought trends in Ethiopia were studied using a suite of drought indicators. Standardized Precipitation Index (SPI), Standardized Precipitation Evapotranspiration Index (SPEI), Palmer Drought Severity Index (PDSI), and Z-index for long-rainy, dry, and short-rainy seasons are used to identify drought-causing mechanisms. The Statistical software package R version 3.5.2 was used for data extraction and data analyses. Trend analysis indicated shifts in late-season long-rainy season precipitation into dry in the southwest and south-central portions of Ethiopia. Droughts during the dry season (October–January) were largely temperature controlled. Short-term temperature-controlled hydrologic processes exacerbated rainfall deficits during the short rainy season (February–May) and highlight the importance of temperature- and hydrology-induced soil dryness on the production of short-season crops such as tef. Droughts during the long-rainy season (June–September) were largely driven by precipitation declines arising from the narrowing of the intertropical convergence zone (ITCZ). Increased dryness during long-rainy season had severe consequences on the production of corn and sorghum. PDSI was an aggressive indicator of seasonal droughts suggesting the low natural resilience to combat the effects of slow-acting, moisture-depleting hydrologic processes. The lack of irrigation systems in the nation limits the ability to combat droughts and improve agricultural resilience. There is an urgent need to monitor soil moisture (a key agro-hydrologic variable) to better quantify the impacts of meteorological droughts on agricultural systems in Ethiopia.

Keywords: autocorrelation, climate change, droughts, Ethiopia, food security, palmer z-index, PDSI, SPEI, SPI, trend analysis

Procedia PDF Downloads 128
5487 A Scheme Cooperating with Cryptography to Enhance Security in Satellite Communications

Authors: Chieh-Fu Chang, Wan-Hsin Hsieh

Abstract:

We have proposed a novel scheme— iterative word-extension (IWE) to enhance the cliff effect of Reed-Solomon codes regarding the error performance at a specific Eb/N0. The scheme can be readily extended to block codes and the important properties of IWE are further investigated here. In order to select proper block codes specifying the desired cliff Eb/N0, the associated features of IWE are explored. These properties and features grant IWE ability to enhance security regarding the received Eb/N0 in physical layer so that IWE scheme can cooperate with the traditional presentation layer approach — cryptography, to meet the secure requirements in diverse applications. The features and feasibility of IWE scheme in satellite communication are finally discussed.

Keywords: security, IWE, cliff effect, space communications

Procedia PDF Downloads 402
5486 Predicting Long-Term Meat Productivity for the Kingdom of Saudi Arabia

Authors: Ahsan Abdullah, Ahmed A. S. Bakshwain

Abstract:

Livestock is one of the fastest-growing sectors in agriculture. If carefully managed, have potential opportunities for economic growth, food sovereignty and food security. In this study we mainly analyse and compare long-term i.e. for year 2030 climate variability impact on predicted productivity of meat i.e. beef, mutton and poultry for the Kingdom of Saudi Arabia w.r.t three factors i.e. i) climatic-change vulnerability ii) CO2 fertilization and iii) water scarcity and compare the results with two countries of the region i.e. Iraq and Yemen. We do the analysis using data from diverse sources, which was extracted, transformed and integrated before usage. The collective impact of the three factors had an overall negative effect on the production of meat for all the three countries, with adverse impact on Iraq. High similarity was found between CO2 fertilization (effecting animal fodder) and water scarcity i.e. higher than that between production of beef and mutton for the three countries considered. Overall, the three factors do not seem to be favorable for the three Middle-East countries considered. This points to possibility of a vegetarian year 2030 based on dependency on indigenous live-stock population.

Keywords: prediction, animal-source foods, pastures, CO2 fertilization, climatic-change vulnerability, water scarcity

Procedia PDF Downloads 301
5485 Panel Application for Determining Impact of Real Exchange Rate and Security on Tourism Revenues: Countries with Middle and High Level Tourism Income

Authors: M. Koray Cetin, Mehmet Mert

Abstract:

The purpose of the study is to examine impacts on tourism revenues of the exchange rate and country overall security level. There are numerous studies that examine the bidirectional relation between macroeconomic factors and tourism revenues and tourism demand. Most of the studies support the existence of impact of tourism revenues on growth rate but not vice versa. Few studies examine the impact of factors like real exchange rate or purchasing power parity on the tourism revenues. In this context, firstly impact of real exchange rate on tourism revenues examination is aimed. Because exchange rate is one of the main determinants of international tourism services price in guests currency unit. Another determinant of tourism demand for a country is country’s overall security level. This issue can be handled in the context of the relationship between tourism revenues and overall security including turmoil, terrorism, border problem, political violence. In this study, factors are handled for several countries which have tourism revenues on a certain level. With this structure, it is a panel data, and it is evaluated with panel data analysis techniques. Panel data have at least two dimensions, and one of them is time dimensions. The panel data analysis techniques are applied to data gathered from Worldbank data web page. In this study, it is expected to find impacts of real exchange rate and security factors on tourism revenues for the countries that have noteworthy tourism revenues.

Keywords: exchange rate, panel data analysis, security, tourism revenues

Procedia PDF Downloads 327
5484 Ensuring Cyber Security Using Kippo Honeypots

Authors: S. Vivekananda Pandian

Abstract:

A major challenging task in this current scenario is protecting your computer and other electronic gadgets against Cyber-attacks. In this current era Cyber warfare becomes a major threat to the entire world which targets a particular organization or a country spreading the Malwares, Breaching the securities, causing major loss to the organization. Several sectors both public and private are computerized such as Energy sectors, Oil refinery sectors, Defense sectors and Aviation sectors are prone to attacks. Several attacks are unknown while accessing the internet. To study the characteristics and Intention of the Attacker Kippo Honeypots are used. Honeypots are the trap set by us which enables them to monitor the malicious activities and detailed study about attackers which leads to strengthening of the security.

Keywords: attackers, security, Kippo Honeypots, virtual machine

Procedia PDF Downloads 407
5483 Microbial Quality of Traditional Qatari Foods Sold by Women Street Vendors in Doha, Qatar

Authors: Tahra El-Obeid, Reham Mousa, Amal Alzahiri

Abstract:

During the past few years the traditional market of Qatar has become an attraction to many customers who eat from the numerous women street vendors selling Qatari traditional dishes. To gain an understanding on the safety of these street vended foods, we designed the study to test microbiological quality of 14 different Qatari foods sold in Souk Wagif, the main traditional market in Qatar. This study was conducted to mainly identify presence or absence of microbial pathogens. A total of 56 samples were purchased from 10 different street vendors and the samples were collected randomly on different days. The samples were tested for microbial contaminants at Central Food Laboratories, Doha, Qatar. The qualitative study was conducted using Real Time-PCR to screen for; Salmonella spp., Listeria monocytogenes, Escherichia coli and E. coli 0157:H7. Out of the 56 samples, only two samples “Biryani” and “Khabess” contained E. coli. However, both samples tested negative for E. coli O157:H7. The microbial contamination of the Qatari traditional street vended foods was 3%. This result may be attributed to the food safety training requirement set by the regulatory authorities before issuing any license to food handlers in Qatar as well as the food inspection conducted by the food health inspectors on a regular basis.

Keywords: microbiological quality, street vended food, traditional dishes, Qatar

Procedia PDF Downloads 290
5482 Power System Cyber Security Risk in the Era of Digital Transformation

Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim

Abstract:

Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.

Keywords: supply chain, cybersecurity, maturity model, risk, smart grid

Procedia PDF Downloads 90
5481 Eating Constitutes Human Dignity: A Metaphysical Anthropology Perspective

Authors: Sri Poedjiastoeti

Abstract:

One of the traits of living beings is eating. As the living beings, people must provide their life by taking material. They must assimilate for themselves with substances. They grow and develop themselves by changing what they eat and digest into their own substance. This happened in the so-called eating. This article aims to analyze distinction between human beings and other infrahumans when facing and eating food. It uses the analytical description with metaphysical anthropology approach. As a result, to give the expression that eating is not simply to put food in mouth, chew and swallow it. Eating constitutes a sacred ceremonial if it is done in accordance with human dignity. They face food with distance and moderation as well as civilize or make their behaviour better for it. Accordingly, they are being to be human.

Keywords: human beings, behaviour, eating, dignity

Procedia PDF Downloads 255
5480 Investigate the Current Performance of Burger King Ho Chi Minh City in Terms of the Controllable Variables of the Overall Retail Strategy

Authors: Nhi Ngoc Thien

Abstract:

Franchising is a popular trend in Vietnam retail industry, especially in fast food industry. Several famous foreign fast food brands such as KFC, Lotteria, Jollibee or Pizza Hut invested on this potential market since the 1990s. Following this trend, in 2011, Burger King - the second largest fast food hamburger chain all over the world - entered Vietnam with its first store located in Tan Son Nhat International Airport, with the expectation to become the leading brand in the country. However, the business performance of Burger King was not going well in the first few years making it questioned about its strategy. The given assumption was that its business performance was affected negatively by its store location selection strategy. This research aims to investigate the current performance of Burger King Vietnam in terms of the controllable variables like store location as well as to explore the key factors influencing customer decision to choose Burger King. Therefore, a case study research method was conducted to approach deeply on the opinions and evaluations of 10 Burger King’s customers, Burger King's staffs and other fast food experts on Burger King’s performance through in-depth interview, direct observation and documentary analysis. Findings show that there are 8 determinants affecting the decision-making of Burger King’s customers, which are store location, quality of food, service quality, store atmosphere, price, promotion, menu and brand reputation. Moreover, findings present that Burger King’s staffs and fast food experts also mentioned the main problems of Burger King, which are about store location and food quality. As a result, there are some recommendations for Burger King Vietnam to improve its performance in the market and attract more Vietnamese target customers by giving suitable promotional activities among its customers and being differentiated itself from other fast food brands.

Keywords: overall retail strategy, controllable variables, store location, quality of food

Procedia PDF Downloads 331
5479 Climate Change Impacts, Vulnerability, and Adaptation among Rural Households in Ethiopia

Authors: Birtukan Atinkut Asmare

Abstract:

Climate change disproportionately affects many Africans who heavily rely on climate-exposed sectors such as rain-fed agriculture and fishing, rendering them highly vulnerable. Gender plays a significant role, as men and women experience unequal impacts and vulnerabilities due to gender norms, labor divisions, resource access, and power dynamics. Drawing on an integrated framework, this study sheds light on the gendered impacts of climate change on household’s livelihood, their vulnerability, and adaptation in rural Ethiopia's Lake Tana Basin. This study utilized mixed research methods, integrating diverse qualitative techniques such as focus group discussions, key informant interviews, and field observations, along with quantitative data gathered through household surveys. The findings reveal that women-headed households were more vulnerable to climate change than male-headed households. Flood was the major climate-induced hazards in the area that threatened the lives and livelihoods of households. In response to climate change, households undertook different adaptation measures such as agroforestry practices, crop diversification, seasonal migration, petty trading, charcoal and fuel wood sales. However, the adaptation strategies were slightly varied based on the gender of the household head. Women-headed households specifically engaged in fuelwood collection and selling and petty trading activities. The main constraints for adaptation were limited access to technologies, extension services, information, and financial services. Therefore, this research urges attention from research, policy, and advisory services on rural households who are trying to survive in the face of climate change.

Keywords: agriculture, climate change impacts, ethiopia, gender

Procedia PDF Downloads 45
5478 Countering Terrorism and Defending Human Right after 9/11: The European Perspective

Authors: Anita Blagojević

Abstract:

It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?

Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights

Procedia PDF Downloads 361
5477 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 71
5476 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment

Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu

Abstract:

Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.

Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization

Procedia PDF Downloads 440
5475 Labor Welfare and Social Security

Authors: Shoaib Alvi

Abstract:

Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.

Keywords: labor welfare, internal social responsibility, social security, international conventions

Procedia PDF Downloads 549
5474 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application

Authors: Senthuran Manoharan, Rathesan Sivagananalingam

Abstract:

One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.

Keywords: authentication, adaptive authentication, machine learning, security

Procedia PDF Downloads 220