Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6167

Search results for: food security and nutrition

5147 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 382
5146 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 394
5145 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 320
5144 Moving Towards Zero Waste in a UK Local Authority Area: Challenges to the Introduction of Separate Food Waste Collections

Authors: C. Cole, M. Osmani, A. Wheatley, M. Quddus

Abstract:

EU and UK Government targets for minimising and recycling household waste has led the responsible authorities to research the alternatives to landfill. In the work reported here the local waste collection authority (Charnwood Borough Council) has adopted the aspirational strategy of becoming a “Zero Waste Borough” to lead the drive for public participation. The work concludes that the separate collection of food waste would be needed to meet the two regulatory standards on recycling and biologically active wastes. An analysis of a neighbouring Authority (Newcastle-Under-Lyne Borough Council (NBC), a similar sized local authority that has a successful weekly food waste collection service was undertaken. Results indicate that the main challenges for Charnwood Borough Council would be gaining householder co-operation, the extra costs of collection and organising alternative treatment. The analysis also demonstrated that there was potential offset value via anaerobic digestion for CBC to overcome these difficulties and improve its recycling performance.

Keywords: England, food waste collections, household waste, local authority

Procedia PDF Downloads 399
5143 Applications of Multi-Path Futures Analyses for Homeland Security Assessments

Authors: John Hardy

Abstract:

A range of future-oriented intelligence techniques is commonly used by states to assess their national security and develop strategies to detect and manage threats, to develop and sustain capabilities, and to recover from attacks and disasters. Although homeland security organizations use future's intelligence tools to generate scenarios and simulations which inform their planning, there have been relatively few studies of the methods available or their applications for homeland security purposes. This study presents an assessment of one category of strategic intelligence techniques, termed Multi-Path Futures Analyses (MPFA), and how it can be applied to three distinct tasks for the purpose of analyzing homeland security issues. Within this study, MPFA are categorized as a suite of analytic techniques which can include effects-based operations principles, general morphological analysis, multi-path mapping, and multi-criteria decision analysis techniques. These techniques generate multiple pathways to potential futures and thereby generate insight into the relative influence of individual drivers of change, the desirability of particular combinations of pathways, and the kinds of capabilities which may be required to influence or mitigate certain outcomes. The study assessed eighteen uses of MPFA for homeland security purposes and found that there are five key applications of MPFA which add significant value to analysis. The first application is generating measures of success and associated progress indicators for strategic planning. The second application is identifying homeland security vulnerabilities and relationships between individual drivers of vulnerability which may amplify or dampen their effects. The third application is selecting appropriate resources and methods of action to influence individual drivers. The fourth application is prioritizing and optimizing path selection preferences and decisions. The fifth application is informing capability development and procurement decisions to build and sustain homeland security organizations. Each of these applications provides a unique perspective of a homeland security issue by comparing a range of potential future outcomes at a set number of intervals and by contrasting the relative resource requirements, opportunity costs, and effectiveness measures of alternative courses of action. These findings indicate that MPFA enhances analysts’ ability to generate tangible measures of success, identify vulnerabilities, select effective courses of action, prioritize future pathway preferences, and contribute to ongoing capability development in homeland security assessments.

Keywords: homeland security, intelligence, national security, operational design, strategic intelligence, strategic planning

Procedia PDF Downloads 127
5142 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 63
5141 The Utility and the Consequences of Counter Terrorism Financing

Authors: Fatemah Alzubairi

Abstract:

Terrorism financing is a theme that dramatically evolved post-9/11. Supra-national bodies, above all UN Security Council and the Financial Action Task Form (FATF), have established an executive-like mechanism, which allows blacklisting individuals and groups, freezing their funds, and restricting their travel, all of which have become part of states’ anti-terrorism frameworks. A number of problems arise from building counter-terrorism measures on the foundation of a vague definition of terrorism. This paper examines the utility and consequences of counter-terrorism financing with considering the lack of an international definition of terrorism. The main problem with national and international anti-terrorism legislation is the lack of a clear objective definition of terrorism. Most, if not all, national laws are broad and vague. Determining what terrorism remains the crucial underpinning of any successful discussion of counter-terrorism, and of the future success of counter-terrorist measures. This paper focuses on the legal and political consequences of equalizing the treatment of violent terrorist crimes, such as bombing, with non-violent terrorism-related crimes, such as funding terrorist groups. While both sorts of acts requires criminalization, treating them equally risks wrongfully or unfairly condemning innocent people who have associated with “terrorists” but are not involved in terrorist activities. This paper examines whether global obligations to counter terrorism financing focus on controlling terrorist groups more than terrorist activities. It also examines the utility of the obligations adopted by the UN Security Council and FATF, and whether they serve global security; or whether the utility is largely restricted to Western security, with little attention paid to the unique needs and demands of other regions.

Keywords: counter-terrorism, definition of terrorism, FATF, security, terrorism financing, UN Security Council

Procedia PDF Downloads 315
5140 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 74
5139 Assessing the Impact of Renewable Energy on Regional Sustainability: A Comparative Study of Suwon and Seoul

Authors: Jongsoo Jurng

Abstract:

The drive to expand renewable energies is often in direct conflict with sustainable development goals. Thus, it is important that energy policies account for potential trade-offs. We assess the interlinkages between energy, food, water, and land, for two case studies, Suwon and Seoul. We apply a range of assessment methods and study their usefulness as tools to identify trade-offs and to compare the sustainability performance. We calculate cross-sectoral footprints, self-sufficiency ratios and perform a simplified Energy-Water-Food nexus analysis. We use the latter for assessing scenarios to increase energy and food self-sufficiency in Suwon, while we use ecosystem service (ESS) accounting for Seoul. For Suwon, we find that constraints on the energy, food and water sectors urgently call for integrated approaches to energy policy; for Seoul, the further expansion of renewables comes at the expense of cultural and supporting ESS, which could outweigh gains from increased energy exports. We recommend a general upgrade to indicators and visualization methods that look beyond averages and a fostering of infrastructure for data on sustainable development based on harmonized international protocols. We warn against rankings of countries or regions based on benchmarks that are neither theory-driven nor location-specific.

Keywords: ESS, renewable energy, energy-water-food nexus, assessment

Procedia PDF Downloads 123
5138 Development of Protein-based Emulsion Gels For Food Structuring

Authors: Baigts-Allende Diana, Klojdová Iveta, Kozlu Ali, Metri-ojeda Jorge

Abstract:

Emulsion gels are constituted by a colloidal system (emulsion) stabilized by a polymeric gel matrix. These systems are more homogeneous and stable than conventional emulsions and can behave as either gel-like or soft-solid. Protein-based emulsion gels (PEG) have been used as carrier systems of bioactive compounds and as food structuring to improve the texture and consistency, mainly in producing low-fat content products. This work studied the effect of protein: polysaccharide ratio 0.75:1.25, 1:1, and 1.25:0.75 (levels -1, 0, and +1) and pH values (2-9) on the stability of protein-based emulsion gels using soy protein isolate and sodium alginate. Protein emulsion capacity was enhaced with increased pH (6,7,8 and 9) compared to acid pH values. The smaller particle size for PEG was at pH 9 (~23µm); however, with increasing protein ratio (level +1), higher particle size was observed (~23µm). The same trend was observed for rheological measurements; the consistency index (K) increased at pH 9 for level -1 (1.17) in comparison to level +1 (0.45). The studied PEG showed good thermal stability at neutral and pH 9 (~98 %) for all biopolymer ratios. Optimal conditions in pH and biopolymer ratios were determined for PEG using soy protein and sodium alginate ingredients with potential use in elaborating stable systems for broad application in the food sector.

Keywords: emulsion gels, food structuring, biopolymers, food systems

Procedia PDF Downloads 64
5137 Inhibition of Food Borne Pathogens by Bacteriocinogenic Enterococcus Strains

Authors: Neha Farid

Abstract:

Due to the abuse of antimicrobial medications in animal feed, the occurrence of multi-drug resistant (MDR) pathogens in foods is currently a growing public health concern on a global scale. MDR infections have the potential to penetrate the food chain by posing a serious risk to both consumers and animals. Food pathogens are those biological agents that have the tendency to cause pathogenicity in the host body upon ingestion. The major reservoirs of foodborne pathogens include food-producing fauna like cows, pigs, goats, sheep, deer, etc. The intestines of these animals are highly condensed with several different types of food pathogens. Bacterial food pathogens are the main cause of foodborne disease in humans; almost 66% of the reported cases of food illness in a year are caused by the infestation of bacterial food pathogens. When ingested, these pathogens reproduce and survive or form different kinds of toxins inside host cells causing severe infections. The genus Listeria consists of gram-positive, rod-shaped, non-spore-forming bacteria. The disease caused by Listeria monocytogenes is listeriosis or gastroenteritis, which induces fever, vomiting, and severe diarrhea in the affected body. Campylobacter jejuni is a gram-negative, curved-rod-shaped bacteria causing foodborne illness. The major source of Campylobacter jejuni is livestock and poultry; particularly, chicken is highly colonized with Campylobacter jejuni. Serious public health concerns include the widespread growth of bacteria that are resistant to antibiotics and the slowing in the discovery of new classes of medicines. The objective of this study is to provide some potential antibacterial activities with certain broad-range antibiotics and our desired bacteriocins, i.e., Enterococcus faecium from specific strains preventing microbial contamination pathways in order to safeguard the food by lowering food deterioration, contamination, and foodborne illnesses. The food pathogens were isolated from various sources of dairy products and meat samples. The isolates were tested for the presence of Listeria and Campylobacter by gram staining and biochemical testing. They were further sub-cultured on selective media enriched with the growth supplements for Listeria and Campylobacter. All six strains of Listeria and Campylobacter were tested against ten antibiotics. Campylobacter strains showed resistance against all the antibiotics, whereas Listeria was found to be resistant only against Nalidixic Acid and Erythromycin. Further, the strains were tested against the two bacteriocins isolated from Enterococcus faecium. It was found that bacteriocins showed better antimicrobial activity against food pathogens. They can be used as a potential antimicrobial for food preservation. Thus, the study concluded that natural antimicrobials could be used as alternatives to synthetic antimicrobials to overcome the problem of food spoilage and severe food diseases.

Keywords: food pathogens, listeria, campylobacter, antibiotics, bacteriocins

Procedia PDF Downloads 56
5136 Alignment between Governance Structures and Food Safety Standards on the Shrimp Supply Chain in Indonesia

Authors: Maharani Yulisti, Amin Mugera, James Fogarty

Abstract:

Food safety standards have received significant attention in the fisheries global market due to health issues, free trade agreements, and increasing aquaculture production. Vertical coordination throughout the supply chain of fish producing and exporting countries is needed to meet food safety demands imposed by importing countries. However, the complexities of the supply chain governance structures and difficulties in standard implementation can generate safety uncertainty and high transaction costs. Using a Transaction Cost Economics framework, this paper examines the alignment between food safety standards and the governance structures in the shrimp supply chain in Indonesia. We find the supply chain is organized closer to the hierarchy-like governance structure where private standard (organic standard) are implemented and more towards a market-like governance structure where public standard (IndoGAP certification) are more prevalent. To verify the statements, two cases are examined from Sidoarjo district as a centre of shrimp production in Indonesia. The results show that public baseline FSS (Food Safety Standards) need additional mechanism to achieve a coordinated chain-wide response because uncertainty, asset specificity, and performance measurement problems are high in this chain. Organic standard as private chain-wide FSS is more efficient because it has been achieved by hierarchical-like type of governance structure.

Keywords: governance structure, shrimp value chain, food safety standards, transaction costs economics

Procedia PDF Downloads 361
5135 Contingency Screening Using Risk Factor Considering Transmission Line Outage

Authors: M. Marsadek, A. Mohamed

Abstract:

Power system security analysis is the most time demanding process due to large number of possible contingencies that need to be analyzed.  In a power system, any contingency resulting in security violation such as line overload or low voltage may occur for a number of reasons at any time.  To efficiently rank a contingency, both probability and the extent of security violation must be considered so as not to underestimate the risk associated with the contingency. This paper proposed a contingency ranking method that take into account the probabilistic nature of power system and the severity of contingency by using a newly developed method based on risk factor.  The proposed technique is implemented on IEEE 24-bus system.

Keywords: line overload, low voltage, probability, risk factor, severity

Procedia PDF Downloads 536
5134 Agroecology and Seasonal Disparity Nexus with Nutritional Status of Children in Ethiopia

Authors: Dagem Alemayehu, Samson Gebersilassie, Jan Frank

Abstract:

Climate change is impacting nutrition through reducing food quantity and access, limiting dietary diversity, and decreased nutritional food content as well as strongly affecting seasonal rainfall in Ethiopia. Nevertheless, only a few data is available on the impacts of seasonality in Infant, and Young Child Feeding (IYCF) practices undernutrition among 6-23 months old children in different agro-ecological zones of poor resource settings of Ethiopia. Methods: Socio-demographic, anthropometry, and IYCF indicators were assessed in the harvest and lean seasons among children aged 6–23 months of age randomly selected from rural villages of lowland and midland agro-ecological zones. Results: Child stunting and underweight increased from prevalence of 32.8 % and 23.9 % (lowland &midland respectively) in the lean season to 36.1% and 33.8 % harvest seasons, respectively. The biggest increase in the prevalence of stunting and underweight between harvest and lean seasons was noted in the lowland zone. Wasting decreased from 11.6% lean to 8.5% harvest, with the biggest decline recorded in the midland zone. Minimum meal frequency, minimum acceptable diet, and poor dietary diversity increased considerably in harvest compared to a lean season in the lowland zone. Feeding practices and maternal age were predictors of wasting, while women's dietary diversity and children's age was a predictor of child dietary diversity in both seasons. Conclusion: There is seasonal variation in undernutrition and IYCF practices among children 6-23 months of age with more pronounced effect lowland agro-ecological zone.

Keywords: agroecology, seasonality, stunting, wasting

Procedia PDF Downloads 133
5133 Multi Criteria Authentication Method in Cognitive Radio Networks

Authors: Shokoufeh Monjezi Kouchak

Abstract:

Cognitive radio network (CRN) is future network .Without this network wireless devices can’t work appropriately in the next decades. Today, wireless devices use static spectrum access methods and these methods don’t use spectrums optimum so we need use dynamic spectrum access methods to solve shortage spectrum challenge and CR is a great device for DSA but first of all its challenges should be solved .security is one of these challenges .In this paper we provided a survey about CR security. You can see this survey in tables 1 to 7 .After that we proposed a multi criteria authentication method in CRN. Our criteria in this method are: sensing results, following sending data rules, position of secondary users and no talk zone. Finally we compared our method with other authentication methods.

Keywords: authentication, cognitive radio, security, radio networks

Procedia PDF Downloads 375
5132 Intensity Analysis to Link Changes in Land-Use Pattern in the Abuakwa North and South Municipalities, Ghana, from 1986 to 2017

Authors: Isaac Kwaku Adu, Jacob Doku Tetteh, John Joseph Puthenkalam, Kwabena Effah Antwi

Abstract:

The continuous increase in population implies increase in food demand. There is, therefore, the need to increase agricultural production and other forest products to ensure food security and economic development. This paper employs the three-level intensity analysis to assess the total change of land-use in two-time intervals (1986-2002 and 2002-2017), the net change and swap as well as gross gains and losses in the two intervals. The results revealed that the overall change in the 31-year period was greater in the second period (2002-2017). Agriculture and forest categories lost in the first period while the other land class gained. However, in the second period agriculture and built-up increased greatly while forest, water bodies and thick bushes/shrubland experienced loss. An assessment revealed a reduction of forest in both periods but was greater in the second period and expansion of agricultural land was recorded as population increases. The pixels gaining built-up targeted agricultural land in both intervals, it also targeted thick bushes/shrubland and waterbody in the second period only. Built-up avoided forest in both intervals as well as waterbody and thick bushes/shrubland. To help in developing the best land-use strategies/policies, a further validation of the social factors is necessary.

Keywords: agricultural land, forest, Ghana, land-use, intensity analysis, remote sensing

Procedia PDF Downloads 133
5131 Detection of Egg Proteins in Food Matrices (2011-2021)

Authors: Daniela Manila Bianchi, Samantha Lupi, Elisa Barcucci, Sandra Fragassi, Clara Tramuta, Lucia Decastelli

Abstract:

Introduction: The undeclared allergens detection in food products plays a fundamental role in the safety of the allergic consumer. The protection of allergic consumers is guaranteed, in Europe, by Regulation (EU) No 1169/2011 of the European Parliament, which governs the consumer's right to information and identifies 14 food allergens to be mandatorily indicated on food labels: among these, an egg is included. An egg can be present as an ingredient or as contamination in raw and cooked products. The main allergen egg proteins are ovomucoid, ovalbumin, lysozyme, and ovotransferrin. This study presents the results of a survey conducted in Northern Italy aimed at detecting the presence of undeclared egg proteins in food matrices in the latest ten years (2011-2021). Method: In the period January 2011 - October 2021, a total of 1205 different types of food matrices (ready-to-eat, meats, and meat products, bakery and pastry products, baby foods, food supplements, pasta, fish and fish products, preparations for soups and broths) were delivered to Food Control Laboratory of Istituto Zooprofilattico Sperimentale of Piemonte Liguria and Valle d’Aosta to be analyzed as official samples in the frame of Regional Monitoring Plan of Food Safety or in the contest of food poisoning. The laboratory is ISO 17025 accredited, and since 2019, it has represented the National Reference Centre for the detection in foods of substances causing food allergies or intolerances (CreNaRiA). All samples were stored in the laboratory according to food business operator instructions and analyzed within the expiry date for the detection of undeclared egg proteins. Analyses were performed with RIDASCREEN®FAST Ei/Egg (R-Biopharm ® Italia srl) kit: the method was internally validated and accredited with a Limit of Detection (LOD) equal to 2 ppm (mg/Kg). It is a sandwich enzyme immunoassay for the quantitative analysis of whole egg powder in foods. Results: The results obtained through this study showed that egg proteins were found in 2% (n. 28) of food matrices, including meats and meat products (n. 16), fish and fish products (n. 4), bakery and pastry products (n. 4), pasta (n. 2), preparations for soups and broths (n.1) and ready-to-eat (n. 1). In particular, in 2011 egg proteins were detected in 5% of samples, in 2012 in 4%, in 2013, 2016 and 2018 in 2%, in 2014, 2015 and 2019 in 3%. No egg protein traces were detected in 2017, 2020, and 2021. Discussion: Food allergies occur in the Western World in 2% of adults and up to 8% of children. Allergy to eggs is one of the most common food allergies in the pediatrics context. The percentage of positivity obtained from this study is, however, low. The trend over the ten years has been slightly variable, with comparable data.

Keywords: allergens, food, egg proteins, immunoassay

Procedia PDF Downloads 123
5130 Pakistan Nuclear Security: Threats from Non-State Actors

Authors: Jennifer Wright

Abstract:

The recent rise of powerful terrorist groups such as ISIS and Al-Qaeda brings up concerns about nuclear terrorism as well as a focus on nuclear security, specifically the physical security of nuclear weapons and fissile material storage sites in countries where powerful nonstate actors are present. Particularly because these non-state actors, who lack their own sovereign territory, cannot be ‘deterred’ in the traditional sense. In light of the current threat environment, it’s necessary to now rethink these strategies in the 21st century – a multipolar world with the presence of powerful non-state actors. As a country in the spotlight for its low ranking on the Nuclear Threat Initiative’s (NTI) Nuclear Security Index, Pakistan is a relevant example to explore the question of whether the presence of non-state actors poses a real risk to nuclear security today. It’s necessary to take a look at their nuclear security policies to determine if they’re robust enough to deal with political instability and violence in the country. After carrying out interviews with experts in May 2017 in Islamabad on nuclear security and nuclear terrorism, this paper aims to highlight findings by providing a Pakistan-centric view on the subject and give experts there a chance to counter criticism. Western media would have us fearful of nuclear security mechanisms in Pakistan after reports that areas such as cybersecurity and accounting and control of materials are weak, as well as sensitive nuclear material being transported in unmarked, unguarded vehicles. Also reported are cases where terrorist groups carried out targeted attacks against Pakistani military bases or secure sites where nuclear material is stored. One specific question asked of each interviewee in Islamabad was Do you feel the threat of nuclear terrorism calls into question the reliance on deterrence? Their responses will be elaborated on in the longer paper, but overall they demonstrate views that deterrence still serves a purpose for state-to-state security strategy, but not for a state in countering nonstate threats. If nuclear security is lax enough for these non-state actors to get their hands on either an intact nuclear weapon or enough military-grade fissile material to build a nuclear weapon, then what would stop them from launching a nuclear attack? As deterrence is a state-centric strategy, it doesn’t work to deter non-state actors from carrying out an attack on another state, as they lack their own territory, and as such, are not fearful of a reprisal attack. Deterrence will need to be addressed, and its relevance analyzed to determine its utility in the current security environment. The aim of this research is to demonstrate the real risk of nuclear terrorism by pointing to weaknesses in global nuclear security, particularly in Pakistan. The research also aims to provoke thought on the weaknesses of deterrence as a whole. Original thinking is needed as we attempt to adequately respond to the 21st century’s current threat environment.

Keywords: deterrence, non-proliferation, nuclear security, nuclear terrorism

Procedia PDF Downloads 210
5129 Design and Construction of Vehicle Tracking System with Global Positioning System/Global System for Mobile Communication Technology

Authors: Bala Adamu Malami

Abstract:

The necessity of low-cost electronic vehicle/car security designed in coordination with other security measures is always there in our society to reduce the risk of vehicle intrusion. Keeping this problem in mind, we are designing an automatic GPS system which is technology to build an integrated and fully customized vehicle to detect the movement of the vehicle and also serve as a security system at a reasonable cost. Users can locate the vehicle's position via GPS by using the Google Maps application to show vehicle coordinates on a smartphone. The tracking system uses a Global System for Mobile Communication (GSM) modem for communication between the mobile station and the microcontroller to send and receive commands. Further design can be improved to capture the vehicle movement range and alert the vehicle owner when the vehicle is out of range.

Keywords: electronic, GPS, GSM modem, communication, vehicle

Procedia PDF Downloads 88
5128 Food and Feeding Habit of Clarias anguillaris in Tagwai Reservoir, Minna, Niger State, Nigeria

Authors: B. U. Ibrahim, A. Okafor

Abstract:

Sixty-two (62) samples of Clarias anguillaris were collected from Tagwai Reservoir and used for the study. 29 male and 33 female samples were obtained for the study. Body measurement indicated that different sizes were collected for the study. Males, females and combined sexes had standard length and total length means of 26.56±4.99 and 31.13±6.43, 27.17±5.21 and 30.62±5.43, 26.88±5.08 and 30.86±5.88 cm, respectively. The weights of males, females and combined sexes have mean weights of 241.10±96.27, 225.75±78.66 and 232.93±86.95 gm, respectively. Eight items; fish, insects, plant materials, sand grains, crustaceans, algae, detritus and unidentified items were eaten as food by Clarias anguilarias in Tagwai Reservoir. Frequency of occurrence and numerical methods used in stomach contents analysis indicated that fish was the highest, followed by insect, while the lowest was the algae. Frequency of stomach fullness of Clarias anguillaris showed low percentage of empty stomachs or stomachs without food (21.00%) and high percentage of stomachs with food (79.00%), which showed high abundance of food and high feeding intensity during the period of study. Classification of fish based on feeding habits showed that Clarias anguillaris in this study is an omnivore because it consumed both plant and animal materials.

Keywords: stomach content, feeding habit, Clarias anguillaris, Tagwai Reservoir

Procedia PDF Downloads 583
5127 Bypassing Docker Transport Layer Security Using Remote Code Execution

Authors: Michael J. Hahn

Abstract:

Docker is a powerful tool used by many companies such as PayPal, MetLife, Expedia, Visa, and many others. Docker works by bundling multiple applications, binaries, and libraries together on top of an operating system image called a container. The container runs on a Docker engine that in turn runs on top of a standard operating system. This centralization saves a lot of system resources. In this paper, we will be demonstrating how to bypass Transport Layer Security and execute remote code within Docker containers built on a base image of Alpine Linux version 3.7.0 through the use of .apk files due to flaws in the Alpine Linux package management program. This exploit renders any applications built using Docker with a base image of Alpine Linux vulnerable to unwanted outside forces.

Keywords: cloud, cryptography, Docker, Linux, security

Procedia PDF Downloads 184
5126 Food Bolus Obstruction: A Rural Hospital’s Experience

Authors: Davina Von Hagt, Genevieve Gibbons, Matt Henderson, Tom Bowles

Abstract:

Purpose: Food bolus obstructions are common emergency surgical presentations, but there is no established management guideline in a rural setting. Intervention usually involves endoscopic removal after initial medical management has failed. Within a rural setting, this falls upon the general surgeon. There are varied endoscopic techniques that may be used. Methodology: A review of the past fifty cases of food bolus obstruction managed at Albany Health Campus was retrospectively reviewed to assess endoscopic findings and techniques. Operation notes, histopathology, imaging, and patient notes were reviewed. Results: 50 patients underwent gastroscopy for food bolus obstruction from August 2017 to March 2021. Ages ranged from 11 months to 95 years, with the majority of patients aged between 30-70 years. 88% of patients were male. Meat was the most common bolus (20% unspecified, 20% steak, 10% chicken, 6% lamb, 4% sausage, 2% pork). At endoscopy, 12% were found not to have a food bolus obstruction. Two patients were found to have oesophageal cancer, and four patients had a stricture and required dilatation. A variety of methods were used to relieve oesophageal obstruction ranging from pushing through to stomach (24 patients), using an overtube (10 patients), raptor (13 patients), and less common instruments such as Roth net, basket, guidewire, and pronged grasper. One patient had an unsuccessful endoscopic retrieval and required theatre for laparoscopic assisted removal with rendezvous endoscopic piecemeal removal via oesophagus and gastrostomy. Conclusion: Food bolus obstruction is a common emergency presentation. Within the rural setting, management requires innovation and teamwork within the safety of the local experience.

Keywords: food bolus obstruction, regional hospital, surgical management, innovative surgical treatment

Procedia PDF Downloads 238
5125 Emotional Security in Relation to Students' Emotional Efficiency

Authors: Ibtisam Mahmoud Mohammed Sultan

Abstract:

The present research aimed to identify the level of both emotional and emotional competence among students in Tikrit University aimed to know the assumptions in statistical significance for both variables as gender variables (m-f) and specialty (scientific-humanistic), as research to learn what Relationship between emotional safety and efficiency alanfaalet Tikrit University students. The researcher built emotional security measure (54) as built measure emotional competence (46), as the researcher extract full alsaykomtrih characteristics of both scales. The research sample consisted of (600) students selected by the random way and applying the scales on a basic search sample and processed statistical data using a variety of methods, including statistical test (test T.) and Pearson correlation coefficient, the researcher found a set of results. The following: 1. that the Tikrit University students possess a high level of emotional security. 2. to safely enjoy passionate males more than females. 3. that there is no difference between students of scientific and humanitarian specialization in variable emotional security. 4. that the Tikrit University students enjoy a high level of emotional competence. 5. the female-male outperforming in emotional competence level. 6. the humanitarian specialization students Excel in emotional competence for those of specialty. 7. the existence of a positive correlation between variables. Through search results, the researcher has developed a set of conclusions, proposals, and recommendations.

Keywords: relation, emotional security, students, efficiency

Procedia PDF Downloads 110
5124 Totally Implantable Venous Access Device for Long Term Parenteral Nutrition in a Patient with High Output Enterocutaneous Fistula Due to Advanced Malignancy

Authors: Puneet Goyal, Aarti Agarwal

Abstract:

Background and Objective: Nutritional support is an integral part of palliative care of advanced non-resectable abdominal malignancy patients, though is frequently neglected aspect. Non-Healing high output Entero-cutaneous fistulas sometimes require long term parenteral nutrition, to take care of catabolism and replacement of nutrients. We present a case of inoperable pancreatic malignancy with high output entero-cutaneous fistula, which was provided parenteral nutritional support with the use of Totally Implantable Venous Access Device (TIVAD). Method and Results: 55 year old man diagnosed with carcinoma pancreas had developed high entero-cutaneous fistula. His tumor was found to be inoperable and was on total parenteral nutrition through routine central line. This line was difficult to maintain as he required it for a long term TPN. He was planned to undergo Totally Implantable Venous Access Device (TIVAD) implantation. 8Fr single lumen catheter with Groshong non-return Valve (Bard Access Systems, Inc. USA) was inserted through right internal jugular vein, under fluoroscopic guidance. The catheter was tunneled subcutaneously and brought towards infraclavicular pocket, cut at appropriate length and connected to port and locked. Port was sutured in floor of pocket. Free flow of blood aspirated, flushed with heparinized saline. There was no kink observed in entire length of catheter under fluoroscopy. Skin over infraclavicular pocket was sutured. Long term catheter care and associated risks were explained to patient and relatives. Patient continued to receive total parenteral nutrition as well as other supportive therapy though TIVAD for next 6 weeks, till his demise. Conclusion: TIVADs are standard of care for long term venous access solutions in cancer patients requiring chemotherapy. In this case, we extended its use for providing parenteral nutrition and other supportive therapy. TIVADs can be implanted in advanced cancer patients for providing venous access solution required for various palliative treatments and medications. This will help in improving quality of life and satisfaction amongst terminally ill cancer patients.

Keywords: parenteral nutrition, totally implantable venous access device, long term venous access, interventions in anesthesiology

Procedia PDF Downloads 227
5123 Create and Design Visual Presentation to Promote Thai Cuisine

Authors: Supaporn Wimonchailerk

Abstract:

This research aims to study how to design and create the media to promote Thai cuisine. The study used qualitative research methods by using in-depth interview 3 key informants who have experienced in the production of food or cooking shows in television programs with an aspect of acknowledging Thai foods. The results showed that visual presentation is divided into four categories. First, the light meals should be presented in details via the close-up camera with lighting to make the food look more delicious. Then the curry presentation should be arranged a clear and crisp light focus on a colorful curry paste. Besides the vision of hot steam floating from the plate and a view of curry spread on steamed rice can call great attentions. Third, delivering good appearances of the fried or spicy foods, the images must allow the audiences to see the shine of the coat covering the texture of the food and the colorful of the ingredients. Fourth, the presentation of sweets is recommended to focus on details of food design, composition, and layout.

Keywords: media production, television, promote, Thai cuisine

Procedia PDF Downloads 217
5122 Evaluation of Two DNA Extraction Methods for Minimal Porcine (Pork) Detection in Halal Food Sample Mixture Using Taqman Real-time PCR Technique

Authors: Duaa Mughal, Syeda Areeba Nadeem, Shakil Ahmed, Ishtiaq Ahmed Khan

Abstract:

The identification of porcine DNA in Halal food items is critical to ensuring compliance with dietary restrictions and religious beliefs. In Islam, Porcine is prohibited as clearly mentioned in Quran (Surah Al-Baqrah, Ayat 173). The purpose of this study was to compare two DNA extraction procedures for detecting 0.001% of porcine DNA in processed Halal food sample mixtures containing chicken, camel, veal, turkey and goat meat using the TaqMan Real-Time PCR technology. In this research, two different commercial kit protocols were compared. The processed sample mixtures were prepared by spiking known concentration of porcine DNA to non-porcine food matrices. Afterwards, TaqMan Real-Time PCR technique was used to target a particular porcine gene from the extracted DNA samples, which was quantified after extraction. The results of the amplification were evaluated for sensitivity, specificity, and reproducibility. The results of the study demonstrated that two DNA extraction techniques can detect 0.01% of porcine DNA in mixture of Halal food samples. However, as compared to the alternative approach, Eurofins| GeneScan GeneSpin DNA Isolation kit showed more effective sensitivity and specificity. Furthermore, the commercial kit-based approach showed great repeatability with minimal variance across repeats. Quantification of DNA was done by using fluorometric assay. In conclusion, the comparison of DNA extraction methods for detecting porcine DNA in Halal food sample mixes using the TaqMan Real-Time PCR technology reveals that the commercial kit-based approach outperforms the other methods in terms of sensitivity, specificity, and repeatability. This research helps to promote the development of reliable and standardized techniques for detecting porcine DNA in Halal food items, religious conformity and assuring nutritional.

Keywords: real time PCR (qPCR), DNA extraction, porcine DNA, halal food authentication, religious conformity

Procedia PDF Downloads 60
5121 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 499
5120 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 288
5119 European Food Safety Authority (EFSA) Safety Assessment of Food Additives: Data and Methodology Used for the Assessment of Dietary Exposure for Different European Countries and Population Groups

Authors: Petra Gergelova, Sofia Ioannidou, Davide Arcella, Alexandra Tard, Polly E. Boon, Oliver Lindtner, Christina Tlustos, Jean-Charles Leblanc

Abstract:

Objectives: To assess chronic dietary exposure to food additives in different European countries and population groups. Method and Design: The European Food Safety Authority’s (EFSA) Panel on Food Additives and Nutrient Sources added to Food (ANS) estimates chronic dietary exposure to food additives with the purpose of re-evaluating food additives that were previously authorized in Europe. For this, EFSA uses concentration values (usage and/or analytical occurrence data) reported through regular public calls for data by food industry and European countries. These are combined, at individual level, with national food consumption data from the EFSA Comprehensive European Food Consumption Database including data from 33 dietary surveys from 19 European countries and considering six different population groups (infants, toddlers, children, adolescents, adults and the elderly). EFSA ANS Panel estimates dietary exposure for each individual in the EFSA Comprehensive Database by combining the occurrence levels per food group with their corresponding consumption amount per kg body weight. An individual average exposure per day is calculated, resulting in distributions of individual exposures per survey and population group. Based on these distributions, the average and 95th percentile of exposure is calculated per survey and per population group. Dietary exposure is assessed based on two different sets of data: (a) Maximum permitted levels (MPLs) of use set down in the EU legislation (defined as regulatory maximum level exposure assessment scenario) and (b) usage levels and/or analytical occurrence data (defined as refined exposure assessment scenario). The refined exposure assessment scenario is sub-divided into the brand-loyal consumer scenario and the non-brand-loyal consumer scenario. For the brand-loyal consumer scenario, the consumer is considered to be exposed on long-term basis to the highest reported usage/analytical level for one food group, and at the mean level for the remaining food groups. For the non-brand-loyal consumer scenario, the consumer is considered to be exposed on long-term basis to the mean reported usage/analytical level for all food groups. An additional exposure from sources other than direct addition of food additives (i.e. natural presence, contaminants, and carriers of food additives) is also estimated, as appropriate. Results: Since 2014, this methodology has been applied in about 30 food additive exposure assessments conducted as part of scientific opinions of the EFSA ANS Panel. For example, under the non-brand-loyal scenario, the highest 95th percentile of exposure to α-tocopherol (E 307) and ammonium phosphatides (E 442) was estimated in toddlers up to 5.9 and 8.7 mg/kg body weight/day, respectively. The same estimates under the brand-loyal scenario in toddlers resulted in exposures of 8.1 and 20.7 mg/kg body weight/day, respectively. For the regulatory maximum level exposure assessment scenario, the highest 95th percentile of exposure to α-tocopherol (E 307) and ammonium phosphatides (E 442) was estimated in toddlers up to 11.9 and 30.3 mg/kg body weight/day, respectively. Conclusions: Detailed and up-to-date information on food additive concentration values (usage and/or analytical occurrence data) and food consumption data enable the assessment of chronic dietary exposure to food additives to more realistic levels.

Keywords: α-tocopherol, ammonium phosphatides, dietary exposure assessment, European Food Safety Authority, food additives, food consumption data

Procedia PDF Downloads 304
5118 Behavior, Temperament and Food Intake of Urban Indian Adolescents

Authors: Preeti Khanna, Bani T. Aeri

Abstract:

Background: Recent studies have indicated challenges that hamper health and wellbeing of a vast majority of adolescents in developing countries. Many modifiable factors like behavior and temperament related to food intake among adolescents have not been adequately explored. The aim of the proposed research is to study the impact of behavior and temperament on food intake and diet quality of adolescents. Objectives: In the present study data on dietary behavior and anthropometry of adolescent boys & girls (aged 13-16 years) studying in public schools of Delhi will be gathered to ascertain the quality of diet among adolescent boys and girls and to study the effect of behavior and temperament on diet quality of adolescents. Methods: In total, 400 adolescents will participate in this cross-sectional study. Weight and height of adolescents will be measured and BMI will be calculated. Information will be obtained on their socio-demographic profile and various factors influencing their Food Choices and diet quality such as body image perception, Behavior, temperament, locus of control and parental influence. Expected results: Several direct effects of adolescent traits and behavior on food intake will be observed. Maturational patterns and gender differences in behavior traits will be assessed. By profiling of the behavior and temperament traits, we will have a better understanding of impact of these factors on weight and eating behaviors in overweight/obese or even underweight adolescents. Conclusions: The proposed study will highlight the association of behavioral factors with nutritional status of adolescents. It will also serve as a strategic approach for the obesity prevention and health management policies designed for adolescents.

Keywords: behaviour, temperament, food intake, adolescents

Procedia PDF Downloads 233