Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6463

Search results for: household food security

5443 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom

Authors: John Hardy

Abstract:

The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.

Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing

Procedia PDF Downloads 118
5442 The Determination of Contamination Rate of Traditional White Cheese in Behbahan Markets to Coliforms and Pathogenic Escherichia Coli

Authors: Sana Mohammad Jafar, Hossaini Seyahi Zohreh

Abstract:

Infections and food intoxication caused by microbial contamination of food is of major issues in different countries, and diseases caused by the consumption of contaminated food included a large percentage of the country's health problems. Since traditional cheese for cultural reasons, good taste and smell in many parts of the area still has the important place in people's food basket, transmission of pathogenic bacteria could be at risk human health through the consumption of this food. In this study selected randomly 100 samples of 250 grams of traditional cheeses supplied in the city Behbahan market and adjacent to the ice was transferred to the laboratory and microbiological tests were performed immediately. According to the results, from 100 samples tested traditional cheese, 94 samples (94% of samples) were contaminated with coliforms, which of this number 75 samples (75% of samples) the contamination rate was higher than the limit (more than 100 cfu/g). Of the total samples, 36 samples (36% of samples) were contaminated with fecal coliform which of this number 30 samples (30% of samples) were contaminated with Escherichia.coli bacteria. Based on the results of agglutination test,no samples was found positive as pathogenic Escherichia.coli.

Keywords: determination, traditional cheese, Behbahan, Escherichia coli

Procedia PDF Downloads 486
5441 The Relationship among Exercise Participation, Job Stress and Job Satisfaction: A Study on Food Service Employees in Taiwan

Authors: Jui-Hsiu Chang

Abstract:

As an increasing number of restaurants are growing, the demand for man force in the food service industry is dramatically increasing as well. However, food service workers often complete the heavy workload, infrequent breaks, long hours and shifts. With the overwhelming workload, many workers have experienced high injury rates. As a result, the restaurant industry reports a higher employee turnover rate compare to other service industries in Taiwan. Restaurant managers are seeing ways to retain good employees in order to provide good quality service for daily operation. The purpose of this study was to explore the relationship among exercise participation, job stress and job satisfaction on the food service employees. In addition, to examine how the job stress affected their job satisfaction. A survey using a self-reported questionnaire was conducted to collect data, and 269 questionnaires were collected for data analysis. The obtained materials were analyzed using descriptive statistic, independent t-test, one-way ANOVA, linear regression analysis. The results show that 1. Job stress had a significantly negative influence on employees’ job satisfaction. 2. Exercise participation had significantly positive influence on employees’ job satisfaction. 3. Job stress and job satisfaction varied among the groups of respondent with different level of exercise involvement. Furthermore, the practical implications were proposed for the food service company management when developing daily operational strategies.

Keywords: exercise participation, food service employees, job satisfaction, job stress

Procedia PDF Downloads 250
5440 Land Use Changes and Impact around Maladumba Lake and Forest Reserve, Nigeria

Authors: M. B. Abdullahi, S. M. Gumel

Abstract:

This study was carried out to analyze and describe biodiversity changes in representative communities around Maladumba Lake and Forest Reserve (MLFR), Bauchi, Nigeria. Primary and secondary data were collected through formal and informal interviews of key informants and survey of local communities and government records. There has been a change in biodiversity; some of the cropping systems have become nonexistent whereas others have developed. The main aspect of the changes has been the decline of species diversity due to degradation and over utilization. The changes have also been positive through the introduction and intensification of cropping system. Options have been open for people to manipulate the cropping systems in order to efficiently use the limited resources. Farmers have opted not only to intensify agricultural practices but also to deliberately restore some of the lost species. Reduction in the number of animals per household, adoption of new techniques of land management, changes in the type of crops cultivated and intensive use of the available resources are some of the indicators describing farmers’ efforts to cope with the changes. Sustainability of the farming system and biodiversity has been enhanced through peoples’ efforts that include planting trees and use of fertilizers.

Keywords: cropping systems, historical trends, household, land management, sustainability

Procedia PDF Downloads 374
5439 Consumers’ Perceptions of Non-Communicable Diseases and Perceived Product Value Impacts on Healthy Food Purchasing Decisions

Authors: Khatesiree Sripoothon, Usanee Sengpanich, Rattana Sittioum

Abstract:

The objective of this study is to examine the factors influencing consumer purchasing decisions about healthy food. This model consists of two latent variables: Consumer Perception relating to NCDs and Consumer Perceived Product Value. The study was conducted in the northern provinces of Thailand, which are popular with tourists and have received support from the government for health tourism. A survey was used as the data collection method, and the questionnaire was applied to 385 tourists. An accidental sampling method was used to identify the sample. The statistics of frequency, percentage, mean, and structural equation model were used to analyze the data obtained. Additionally, all factors had a significant positive influence on healthy food purchasing decisions (p<0.01) and were predictive of healthy food purchasing decisions at 46.20 (R2=0.462). Also, these findings seem to underline a supposition that consumer perceptions of NCDs and perceived product value are key variables that strengthens the competitive effects of a healthy-friendly business entrepreneur. Moreover, reduce the country's public health costs for treating patients with the disease of NCDs in Thailand.

Keywords: healthy food, perceived product value, perception of non-communicable diseases, purchasing decisions

Procedia PDF Downloads 142
5438 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm

Authors: Vahid Bayrami Rad

Abstract:

Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.

Keywords: arduino board, artificial intelligence, image processing, solenoid lock

Procedia PDF Downloads 51
5437 Securing Web Servers by the Intrusion Detection System (IDS)

Authors: Yousef Farhaoui

Abstract:

An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).

Keywords: intrusion detection, architectures, characteristic, tools, security, web server

Procedia PDF Downloads 397
5436 Ecological Concerns in Food Systems: An Ethnographical Approach on Vegan Impact in Governmentality

Authors: Jessica Gonzalez

Abstract:

Veganism, along with different types of vegetarianism, consists in the abstinence of animal products. Far from being only an alimentary regulation, it stands as a political posture against the food industry generating itself a set of beliefs, prohibitions, and attitudes that compel the individual to a reevaluation of his obligations towards the environment. Veganism defends animal rights and at the same time reinforces a different conception of natural resources embodying it in alimentary restrictions. These practices emerge in the context of alimentary modernity, which is characterized by bringing new concerns to the consumer. An increased skepticism towards the government ability to protect food supply; a notable distrust toward the market guaranties on providing safe food with sustainable techniques and the desire to react to the neoliberal forms of exploitation are some of its consequences of this phenomenon. This study aims to approach the concept of governmentality as a coproduced system of legitimized practices and knowledge, formed by the interaction of the different actors that are involved. In a scenario where the State seems to retreat from centralized regulation of food production giving up importance to citizens, dietary consultants, farmers, and stockbreeders, veganism plays its role on the conformation of distinctive forms of environmentalism, nature rights and responses to ecological crisis. The ethnographic method allows observing the mechanisms of interaction of consumers and discourses with the mainstream food system, providing evidence about the means of generation of new conceptions about nature and the environment. The paper focuses on how the dietary restrictions, consumption patterns and public discourses of vegans in Barcelona impact local consumption, demonstrating its relevance as a mechanism that associates particular concerns about food with political economy.

Keywords: animal rights, environmentalism, food system, governmentality, veganism

Procedia PDF Downloads 111
5435 Multiplying Vulnerability of Child Health Outcome and Food Diversity in India

Authors: Mukesh Ravi Raushan

Abstract:

Despite consideration of obesity as a deadly public health issue contributing 2.6 million deaths worldwide every year developing country like India is facing malnutrition and it is more common than in Sub-Saharan Africa. About one in every three malnourished children in the world lives in India. The paper assess the nutritional health among children using data from total number of 43737 infant and young children aged 0-59 months (µ = 29.54; SD = 17.21) of the selected households by National Family Health Survey, 2005-06. The wasting was measured by a Z-score of standardized weight-for-height according to the WHO child growth standards. The impact of education with place of residence was found to be significantly associated with the complementary food diversity score (CFDS) in India. The education of mother was positively associated with the CFDS but the degree of performance was lower in rural India than their counterpart from urban. The result of binary logistic regression on wasting with WHO seven types of recommended food for children in India suggest that child who consumed the milk product food (OR: 0.87, p<0.0001) were less likely to be malnourished than their counterparts who did not consume, whereas, in case of other food items as the child who consumed food product of seed (OR: 0.75, p<0.0001) were less likely to be malnourished than those who did not. The nutritional status among children were negatively associated with the protein containing complementary food given the child as those child who received pulse in last 24 hour were less likely to be wasted (OR: 0.87, p<0.00001) as compared to the reference categories. The frequency to feed the indexed child increases by 10 per cent the expected change in child health outcome in terms of wasting decreases by 2 per cent in India when place of residence, education, religion, and birth order were controlled. The index gets improved as the risk for malnutrition among children in India decreases.

Keywords: CFDS, food diversity index, India, logistic regression

Procedia PDF Downloads 238
5434 Development of a Multi-User Country Specific Food Composition Table for Malawi

Authors: Averalda van Graan, Joelaine Chetty, Malory Links, Agness Mwangwela, Sitilitha Masangwi, Dalitso Chimwala, Shiban Ghosh, Elizabeth Marino-Costello

Abstract:

Food composition data is becoming increasingly important as dealing with food insecurity and malnutrition in its persistent form of under-nutrition is now coupled with increasing over-nutrition and its related ailments in the developing world, of which Malawi is not spared. In the absence of a food composition database (FCDB) inherent to our dietary patterns, efforts were made to develop a country-specific FCDB for nutrition practice, research, and programming. The main objective was to develop a multi-user, country-specific food composition database, and table from existing published and unpublished scientific literature. A multi-phased approach guided by the project framework was employed. Phase 1 comprised a scoping mission to assess the nutrition landscape for compilation activities. Phase 2 involved training of a compiler and data collection from various sources, primarily; institutional libraries, online databases, and food industry nutrient data. Phase 3 subsumed evaluation and compilation of data using FAO and IN FOODS standards and guidelines. Phase 4 concluded the process with quality assurance. 316 Malawian food items categorized into eight food groups for 42 components were captured. The majority were from the baby food group (27%), followed by a staple (22%) and animal (22%) food group. Fats and oils consisted the least number of food items (2%), followed by fruits (6%). Proximate values are well represented; however, the percent missing data is huge for some components, including Se 68%, I 75%, Vitamin A 42%, and lipid profile; saturated fat 53%, mono-saturated fat 59%, poly-saturated fat 59% and cholesterol 56%. A multi-phased approach following the project framework led to the development of the first Malawian FCDB and table. The table reflects inherent Malawian dietary patterns and nutritional concerns. The FCDB can be used by various professionals in nutrition and health. Rising over-nutrition, NCD, and changing diets challenge us for nutrient profiles of processed foods and complete lipid profiles.

Keywords: analytical data, dietary pattern, food composition data, multi-phased approach

Procedia PDF Downloads 71
5433 Inferring Human Mobility in India Using Machine Learning

Authors: Asra Yousuf, Ajaykumar Tannirkulum

Abstract:

Inferring rural-urban migration trends can help design effective policies that promote better urban planning and rural development. In this paper, we describe how machine learning algorithms can be applied to predict internal migration decisions of people. We consider data collected from household surveys in Tamil Nadu to train our model. To measure the performance of the model, we use data on past migration from National Sample Survey Organisation of India. The factors for training the model include socioeconomic characteristic of each individual like age, gender, place of residence, outstanding loans, strength of the household, etc. and his past migration history. We perform a comparative analysis of the performance of a number of machine learning algorithm to determine their prediction accuracy. Our results show that machine learning algorithms provide a stronger prediction accuracy as compared to statistical models. Our goal through this research is to propose the use of data science techniques in understanding human decisions and behaviour in developing countries.

Keywords: development, migration, internal migration, machine learning, prediction

Procedia PDF Downloads 254
5432 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform

Authors: Ali A. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 477
5431 Impact of Flavor on Food Product Quality, A Case Study of Vanillin Stability during Biscuit Preparation

Authors: N. Yang, R. Linforth, I. Fisk

Abstract:

The influence of food processing and choice of flavour solvent was investigated using biscuits prepared with vanillin flavour as an example. Powder vanillin either was added directly into the dough or dissolved into flavour solvent then mixed into the dough. The impact of two commonly used flavour solvents on food quality was compared: propylene glycol (PG) or triacetin (TA). The analytical approach for vanillin detection was developed by chromatography (HPLC-PDA), and the standard extraction method for vanillin was also established. The results indicated the impact of solvent choice on vanillin level during biscuit preparation. After baking, TA as a more heat resistant solvent retained more vanillin than PG, so TA is a better solvent for products that undergo a heating process. The results also illustrated the impact of mixing and baking on vanillin stability in the matrices. The average loss of vanillin was 33% during mixing and 13% during baking, which indicated that the binding of vanillin to fat or flour before baking might cause larger loss than evaporation loss during baking.

Keywords: biscuit, flavour stability, food quality, vanillin

Procedia PDF Downloads 497
5430 Recent Advancements and Future Trends in the Development of Antimicrobial Edible Films for Food Preservation

Authors: Raana Babadi Fathipour

Abstract:

Food packaging plays a crucial role in protecting food from unwanted external factors. Antibacterial edible films are a promising option for food packaging due to their biodegradability, environmental friendliness, and safety. This paper reviews recent research progress on antimicrobial edible films, focusing on those made from polysaccharides, proteins, and lipids. Polysaccharides and proteins are the primary components of antimicrobial edible films, while lipids primarily serve as plasticizers and carriers for active substances in composite films. For instance, second-generation liposomes have shown great potential as carriers for antimicrobial substances and other bioactive compounds due to their exceptional stability. Furthermore, this paper analyzes recent advancements and future trends in antimicrobial edible films. One promising direction is the integration of antimicrobial edible film materials with delivery systems, such as nanoemulsion and microencapsulation technologies, to ensure stable loading of bioactive substances. Another emerging area of interest is the development of smart and active packaging that allows consumers to assess the freshness of food products without opening the package. pH-sensitive films and smart fluorescent "on-off" sensors for humidity are currently being explored as materials for smart and active packaging to monitor food product freshness, with further exploration anticipated in the future.

Keywords: antimicrobial edible film, biopolymer, antimicrobial agent, encapsulation, antimicrobial assay

Procedia PDF Downloads 45
5429 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 314
5428 Implementation of Achterbahn-128 for Images Encryption and Decryption

Authors: Aissa Belmeguenai, Khaled Mansouri

Abstract:

In this work, an efficient implementation of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written by MATLAB.7.5. At first two different original images are used for validate the proposed design. Then our developed program was used to transform the original images data into image digits file. Finally, we used our implemented program to encrypt and decrypt images data. Several tests are done for proving the design performance including visual tests and security analysis; we discuss the security analysis of the proposed image encryption scheme including some important ones like key sensitivity analysis, key space analysis, and statistical attacks.

Keywords: Achterbahn-128, stream cipher, image encryption, security analysis

Procedia PDF Downloads 515
5427 Facial Recognition Technology in Institutions of Higher Learning: Exploring the Use in Kenya

Authors: Samuel Mwangi, Josephine K. Mule

Abstract:

Access control as a security technique regulates who or what can access resources. It is a fundamental concept in security that minimizes risks to the institutions that use access control. Regulating access to institutions of higher learning is key to ensure only authorized personnel and students are allowed into the institutions. The use of biometrics has been criticized due to the setup and maintenance costs, hygiene concerns, and trepidations regarding data privacy, among other apprehensions. Facial recognition is arguably a fast and accurate way of validating identity in order to guard protected areas. It guarantees that only authorized individuals gain access to secure locations while requiring far less personal information whilst providing an additional layer of security beyond keys, fobs, or identity cards. This exploratory study sought to investigate the use of facial recognition in controlling access in institutions of higher learning in Kenya. The sample population was drawn from both private and public higher learning institutions. The data is based on responses from staff and students. Questionnaires were used for data collection and follow up interviews conducted to understand responses from the questionnaires. 80% of the sampled population indicated that there were many security breaches by unauthorized people, with some resulting in terror attacks. These security breaches were attributed to stolen identity cases, where staff or student identity cards were stolen and used by criminals to access the institutions. These unauthorized accesses have resulted in losses to the institutions, including reputational damages. The findings indicate that security breaches are a major problem in institutions of higher learning in Kenya. Consequently, access control would be beneficial if employed to curb security breaches. We suggest the use of facial recognition technology, given its uniqueness in identifying users and its non-repudiation capabilities.

Keywords: facial recognition, access control, technology, learning

Procedia PDF Downloads 109
5426 Spatially Random Sampling for Retail Food Risk Factors Study

Authors: Guilan Huang

Abstract:

In 2013 and 2014, the U.S. Food and Drug Administration (FDA) collected data from selected fast food restaurants and full service restaurants for tracking changes in the occurrence of foodborne illness risk factors. This paper discussed how we customized spatial random sampling method by considering financial position and availability of FDA resources, and how we enriched restaurants data with location. Location information of restaurants provides opportunity for quantitatively determining random sampling within non-government units (e.g.: 240 kilometers around each data-collector). Spatial analysis also could optimize data-collectors’ work plans and resource allocation. Spatial analytic and processing platform helped us handling the spatial random sampling challenges. Our method fits in FDA’s ability to pinpoint features of foodservice establishments, and reduced both time and expense on data collection.

Keywords: geospatial technology, restaurant, retail food risk factor study, spatially random sampling

Procedia PDF Downloads 342
5425 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System

Authors: Mobarok Hossain Bhuyain

Abstract:

Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.

Keywords: human detection, target tracking, neural network, particle filter

Procedia PDF Downloads 150
5424 Secure Cryptographic Operations on SIM Card for Mobile Financial Services

Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas

Abstract:

Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.

Keywords: SIM card, mobile financial services, cryptography, secure data storage

Procedia PDF Downloads 293
5423 Value Chain Analysis of Melon “Egusi” (Citrullus lanatus Thunb. Mansf) among Rural Farm Enterprises in South East, Nigeria

Authors: Chigozirim Onwusiribe, Jude Mbanasor

Abstract:

Egusi Melon (Citrullus Lanatus Thunb. Mansf ) is a very important oil seed that serves a major ingredient in the diet of most of the households in Nigeria. Egusi Melon is very nutritious and very important in meeting the food security needs of Nigerians. Egusi Melon is cultivated in most farm enterprise in South East Nigeria but the profitability of its value chain needs to be investigated. This study analyzed the profitability of the Egusi Melon value chain. Specifically this study developed a value chain map for Egusi Melon, analysed the profitability of each stage of the Egusi Melon Value chain and analysed the determinants of the profitability of the Egusi Melon at each stage of the value chain. Multi stage sampling technique was used to select 125 farm enterprises with similar capacity and characteristics. Questionnaire and interview were used to elicit the required data while descriptive statistics, Food and Agriculture Organization Value Chain Analysis Tool, profitability ratios and multiple regression analysis were used for the data analysis. One of the findings showed that the stages of the Egusi Melon value chain are very profitable. Based on the findings, we recommend the provision of grants by government and donor agencies to the farm enterprises through their cooperative societies, this will provide the necessary funds for the local fabrication of value addition and processing equipment to suit their unique value addition needs not met by the imported equipment.

Keywords: value, chain, melon, farm, enterprises

Procedia PDF Downloads 115
5422 Comparison of Food Products Contaminated by DDTs in South Africa and Mozambique

Authors: Lesa A. Thompson, Yoshinori Ikenaka, Victor Wepener, Mayumi Ishizuka

Abstract:

One method for controlling malaria in endemic regions is the killing of vector mosquitoes using pesticides such as DDT in indoor residual spraying (IRS). This study was carried out to investigate the presence of and human health risk due to DDT and its metabolites (collectively, DDTs) contaminating human food sources in areas where DDT is used for IRS. Free-range chicken products (meat and eggs) were collected from homesteads in KwaZulu-Natal Province in the northeast of South Africa, and fish meat samples from Maputo Bay in neighbouring Mozambique. Samples were analysed for DDTs (o,p’-DDT, p,p’-DDT, o,p’-DDD, p,p’-DDD, o,p’-DDE and p,p’-DDE) using a gas chromatograph with electron capture detector (GC-ECD). DDTs were detected in all food types, with the predominant congener being p,p’-DDE. The presence of p,p’-DDT confirmed recent release of DDT into the environment. By using concentration levels detected in foods and national consumption levels, the risk to human health through consumption of such food products was calculated. In order of risk level, these were: chicken eggs > chicken meat > fish meat. Human risk (carcinogenic) values greater than one suggest there is an increased health risk through consumption of these foods.

Keywords: DDT, food contamination, human health risk, Mozambique, South Africa

Procedia PDF Downloads 322
5421 Co-Integration Model for Predicting Inflation Movement in Nigeria

Authors: Salako Rotimi, Oshungade Stephen, Ojewoye Opeyemi

Abstract:

The maintenance of price stability is one of the macroeconomic challenges facing Nigeria as a nation. This paper attempts to build a co-integration multivariate time series model for inflation movement in Nigeria using data extracted from the abstract of statistics of the Central Bank of Nigeria (CBN) from 2008 to 2017. The Johansen cointegration test suggests at least one co-integration vector describing the long run relationship between Consumer Price Index (CPI), Food Price Index (FPI) and Non-Food Price Index (NFPI). All three series show increasing pattern, which indicates a sign of non-stationary in each of the series. Furthermore, model predictability was established with root-mean-square-error, mean absolute error, mean average percentage error, and Theil’s unbiased statistics for n-step forecasting. The result depicts that the long run coefficient of a consumer price index (CPI) has a positive long-run relationship with the food price index (FPI) and non-food price index (NFPI).

Keywords: economic, inflation, model, series

Procedia PDF Downloads 225
5420 The Connection Between the International Law and the Legal Consultation on the Social Media

Authors: Amir Farouk Ahmed Ali Hussin

Abstract:

Social media, such as Facebook, LinkedIn and Ex-Twitter have experienced exponential growth and a remarkable adoption rate in recent years. They give fantastic means of online social interactions and communications with family, friends, and colleagues from around the corner or across the globe, and they have become an important part of daily digital interactions for more than one and a half billion users around the world. The personal information sharing practices that social network providers encourage have led to their success as innovative social interaction platforms. Moreover, these practices have outcome in concerns with respect to privacy and security from different stakeholders. Guiding these privacy and security concerns in social networks is a must for these networks to be sustainable. Real security and privacy tools may not be enough to address existing concerns. Some points should be followed to protect users from the existing risks. In this research, we have checked the various privacy and security issues and concerns pertaining to social media. However, we have classified these privacy and security issues and presented a thorough discussion of the effects of these issues and concerns on the future of the social networks. In addition, we have presented a set of points as precaution measures that users can consider to address these issues.

Keywords: international legal, consultation mix, legal research, small and medium-sized enterprises, strategic International law, strategy alignment, house of laws, deployment, production strategy, legal strategy, business strategy

Procedia PDF Downloads 39
5419 Neuromarketing in the Context of Food Marketing

Authors: Francesco Pinci

Abstract:

This research investigates the significance of product packaging as an effective marketing tool. By using commercially available pasta as an example, the study specifically examines the visual components of packaging, including color, shape, packaging material, and logo. The insights gained from studies like this are particularly valuable to food and beverage companies as they provide marketers with a deeper understanding of the factors influencing consumer purchasing decisions. The research analyzes data collected through surveys conducted via Google Forms and visual data obtained using iMotions eye-tracker software. The results affirm the importance of packaging design elements, such as color and product information, in shaping consumer buying behavior.

Keywords: consumer behaviour, eyetracker, food marketing, neuromarketing

Procedia PDF Downloads 98
5418 Influence of Security on Fan Attendance during Nigeria Professional Football League Matches

Authors: B. O. Diyaolu

Abstract:

The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.

Keywords: adequate security, fans attendance, football fans, football stadium, Nigeria professional football league

Procedia PDF Downloads 99
5417 Protein Derived Biodegradable Food Packaging Material from Poultry By-Product

Authors: Muhammad Zubair, Aman Ullah, Jianping Wu

Abstract:

During the last decades, petroleum derived synthetic polymers like polyethylene terephthalate, polyvinylchloride, polyethylene, polypropylene and polystyrene has extensively been used in the field of food packaging and mostly are non-degradable. Biopolymers are a good fit for single-use or short-lived products such as food packaging. Spent hens, a poultry by-product which is of little economic value and their disposal are environmentally harmful. Through current study, we have explored the possibility to transform proteins from spent fowl into green food packaging material. Proteins from spent fowl were extracted within 1 hour using pH shift method with recovery of about 74%. Different plasticizers were tried like glycerol, sorbitol, glutaraldehyde, 1,2 ethylene glycol and 1,2 butanediol. Glycerol was the best plasticizer among all these plasticizers. A naturally occurring and non-toxic cross-linking agent, chitosan, was used to form the chitosan/glycerol/protein blend by casting and compression molding techniques. The mechanical properties were characterized using tensile strength analyzer. The nano-reinforcements with homogeneous dispersion of nanoparticles lead to improved physical properties suggesting that these materials have great potential for food packaging applications.

Keywords: differential scanning calorimetry, dynamic mechanical analysis, scanning electron microscopy, spent hen

Procedia PDF Downloads 263
5416 General Awareness of Teenagers in Information Security

Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek

Abstract:

The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.

Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system

Procedia PDF Downloads 369
5415 Role of Additional Food Resources in an Ecosystem with Two Discrete Delays

Authors: Ankit Kumar, Balram Dubey

Abstract:

This study proposes a three dimensional prey-predator model with additional food, provided to predator individuals, including gestation delay in predators and delay in supplying the additional food to predators. It is assumed that the interaction between prey and predator is followed by Holling type-II functional response. We discussed the steady states and their local and global asymptotic behavior for the non-delayed system. Hopf-bifurcation phenomenon with respect to different parameters has also been studied. We obtained a range of predator’s tendency factor on provided additional food, in which the periodic solutions occur in the system. We have shown that oscillations can be controlled from the system by increasing the tendency factor. Moreover, the existence of periodic solutions via Hopf-bifurcation is shown with respect to both the delays. Our analysis shows that both delays play an important role in governing the dynamics of the system. It changes the stability behavior into instability behavior. The direction and stability of Hopf-bifurcation are also investigated through the normal form theory and the center manifold theorem. Lastly, some numerical simulations and graphical illustrations have been carried out to validate our analytical findings.

Keywords: additional food, gestation delay, Hopf-bifurcation, prey-predator

Procedia PDF Downloads 112
5414 New Security Approach of Confidential Resources in Hybrid Clouds

Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel

Abstract:

Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.

Keywords: cloud, confidentiality, cryptography, security issues, trust issues

Procedia PDF Downloads 355