Search results for: nutrition security
2391 Food Insecurity Assessment, Consumption Pattern and Implications of Integrated Food Security Phase Classification: Evidence from Sudan
Authors: Ahmed A. A. Fadol, Guangji Tong, Wlaa Mohamed
Abstract:
This paper provides a comprehensive analysis of food insecurity in Sudan, focusing on consumption patterns and their implications, employing the Integrated Food Security Phase Classification (IPC) assessment framework. Years of conflict and economic instability have driven large segments of the population in Sudan into crisis levels of acute food insecurity according to the (IPC). A substantial number of people are estimated to currently face emergency conditions, with an additional sizeable portion categorized under less severe but still extreme hunger levels. In this study, we explore the multifaceted nature of food insecurity in Sudan, considering its historical, political, economic, and social dimensions. An analysis of consumption patterns and trends was conducted, taking into account cultural influences, dietary shifts, and demographic changes. Furthermore, we employ logistic regression and random forest analysis to identify significant independent variables influencing food security status in Sudan. Random forest clearly outperforms logistic regression in terms of area under curve (AUC), accuracy, precision and recall. Forward projections of the IPC for Sudan estimate that 15 million individuals are anticipated to face Crisis level (IPC Phase 3) or worse acute food insecurity conditions between October 2023 and February 2024. Of this, 60% are concentrated in Greater Darfur, Greater Kordofan, and Khartoum State, with Greater Darfur alone representing 29% of this total. These findings emphasize the urgent need for both short-term humanitarian aid and long-term strategies to address Sudan's deepening food insecurity crisis.Keywords: food insecurity, consumption patterns, logistic regression, random forest analysis
Procedia PDF Downloads 782390 Effect of Saffron Extract and Aerobic Exercises on Troponin T and Heart-Type Fatty Acid Binding Protein in Men with Type 2 Diabetes
Authors: Ahmad Abdi, M. Golzadeh Gangeraj, Alireza Barari, S. Shirali, S. Amini
Abstract:
Aims: Diabetes is one of the common metabolic diseases in the world that has the dire adverse effects such as nephropathy, retinopathy and cardiovascular problems. Pharmaceutical and non-pharmaceutical strategies for control and treatment of diabetes are provided. Exercise and nutrition as non-drug strategies for the prevention and control of diabetes are considered. Exercises may increase oxidative stress and myocardium injury, thus it is necessary to take nutrition strategies to help diabetic athletes. Methods: This study was a semi-experimental research. Therefore, 24 men with type 2 diabetes were selected and randomly divided in four groups (1. control, 2. saffron extract, 3. aerobic exercises, 4. compound aerobic exercises and saffron extract). Saffron extract with 100 mg/day was used. Aerobic exercises, three days a week, for eight weeks, with 55-70% of maximum heart rate were performed. At the end, levels of Heart-type fatty acid-binding protein (HFABP) and Troponin T were measured. Data were analyzed by Paired t, One-way ANOVA and Tukey tests. Results: The serum Troponin T increased significantly in saffron extract, aerobic exercises and compound saffron extract -aerobic exercises in type 2 diabetic men(P=0.024, P =0.013, P=0.005 respectively). Saffron extract consumption (100 mg/day) and aerobic exercises did not significantly influence the serum HFABP (P =0.365, P =0.188 respectively). But serum HFABP decreased significantly in compound saffron extract -aerobic exercises group (P =0.003). Conclusions: Raised cardiac Troponin T and HFABP concentration accepted as the standard biochemical markers for the diagnosis of cardiac injury. Saffron intake may beneficially protect the myocardium from injuries. Compound saffron extract -aerobic exercises can decrease levels of Troponin T and HFABP in men with type 2 diabetes.Keywords: Saffron, aerobic exercises, type 2 diabetes, HFABP, troponin T
Procedia PDF Downloads 2682389 Search for Alternative Strategy to Enhancing Food Security at Household Level: Hybrid Urban Agriculture as a Strategy
Authors: Nyumbaiza Tambwe
Abstract:
The purpose of this paper is to demonstrate that hybrid urban agriculture as the most practiced type of urban agriculture in the majority of cities in sub-Saharan Africa can be taken as an alternative strategy in fighting food insecurity. The practice not only provides food, generates income and fights against unemployment; it constitutes a true back-up for households during crisis linked to the nature of capitalism system. African cities are mostly characterized by rapid population growth, rampant poverty, and high level of unemployment and food insecurity. Those factors and many others are at the origin of the emergence of urban agriculture in many African cities. Based particularly on results of research undertaken in the Democratic Republic of Congo (DRC), but also in comparison with those realized in other parts of the African continent, the paper is a case study. Therefore, the paper firstly describes the situation of food in Africa, secondly, presents hybrid urban agriculture as a household strategy in fighting food insecurity and finally shows possibilities and limits of this practice.Keywords: alternative strategy, food security, household strategy, hybrid urban agriculture
Procedia PDF Downloads 3302388 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks
Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner
Abstract:
Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.Keywords: USB, device, cyber security, attack, detection
Procedia PDF Downloads 4022387 Toward a Characteristic Optimal Power Flow Model for Temporal Constraints
Authors: Zongjie Wang, Zhizhong Guo
Abstract:
While the regular optimal power flow model focuses on a single time scan, the optimization of power systems is typically intended for a time duration with respect to a desired objective function. In this paper, a temporal optimal power flow model for a time period is proposed. To reduce the computation burden needed for calculating temporal optimal power flow, a characteristic optimal power flow model is proposed, which employs different characteristic load patterns to represent the objective function and security constraints. A numerical method based on the interior point method is also proposed for solving the characteristic optimal power flow model. Both the temporal optimal power flow model and characteristic optimal power flow model can improve the systems’ desired objective function for the entire time period. Numerical studies are conducted on the IEEE 14 and 118-bus test systems to demonstrate the effectiveness of the proposed characteristic optimal power flow model.Keywords: optimal power flow, time period, security, economy
Procedia PDF Downloads 4542386 Modelling Insider Attacks in Public Cloud
Authors: Roman Kulikov, Svetlana Kolesnikova
Abstract:
Last decade Cloud Computing technologies have been rapidly becoming ubiquitous. Each year more and more organizations, corporations, internet services and social networks trust their business sensitive information to Public Cloud. The data storage in Public Cloud is protected by security mechanisms such as firewalls, cryptography algorithms, backups, etc.. In this way, however, only outsider attacks can be prevented, whereas virtualization tools can be easily compromised by insider. The protection of Public Cloud’s critical elements from internal intruder remains extremely challenging. A hypervisor, also called a virtual machine manager, is a program that allows multiple operating systems (OS) to share a single hardware processor in Cloud Computing. One of the hypervisor's functions is to enforce access control policies. Furthermore, it prevents guest OS from disrupting each other and from accessing each other's memory or disk space. Hypervisor is the one of the most critical and vulnerable elements in Cloud Computing infrastructure. Nevertheless, it has been poorly protected from being compromised by insider. By exploiting certain vulnerabilities, privilege escalation can be easily achieved in insider attacks on hypervisor. In this way, an internal intruder, who has compromised one process, is able to gain control of the entire virtual machine. Thereafter, the consequences of insider attacks in Public Cloud might be more catastrophic and significant to virtual tools and sensitive data than of outsider attacks. So far, almost no preventive security countermeasures have been developed. There has been little attention paid for developing models to assist risks mitigation strategies. In this paper formal model of insider attacks on hypervisor is designed. Our analysis identifies critical hypervisor`s vulnerabilities that can be easily compromised by internal intruder. Consequently, possible conditions for successful attacks implementation are uncovered. Hence, development of preventive security countermeasures can be improved on the basis of the proposed model.Keywords: insider attack, public cloud, cloud computing, hypervisor
Procedia PDF Downloads 3652385 Banking and Accounting Analysis Researches Effect on Environment and Income
Authors: Gerges Samaan Henin Abdalla
Abstract:
New methods of providing banking services to the customer have been introduced, such as online banking. Banks have begun to consider electronic banking (e-banking) as a way to replace some traditional branch functions by using the Internet as a new distribution channel. Some consumers have at least one account at multiple banks and access these accounts through online banking. To check their current net worth, clients need to log into each of their accounts, get detailed information, and work toward consolidation. Not only is it time consuming, but it is also a repeatable activity with a certain frequency. To solve this problem, the concept of account aggregation was added as a solution. Account consolidation in e-banking as a form of electronic banking appears to build a stronger relationship with customers. An account linking service is generally referred to as a service that allows customers to manage their bank accounts held at different institutions via a common online banking platform that places a high priority on security and data protection. The article provides an overview of the account aggregation approach in e-banking as a new service in the area of e-banking.Keywords: compatibility, complexity, mobile banking, observation, risk banking technology, Internet banks, modernization of banks, banks, account aggregation, security, enterprise development
Procedia PDF Downloads 592384 Specific Emitter Identification Based on Refined Composite Multiscale Dispersion Entropy
Authors: Shaoying Guo, Yanyun Xu, Meng Zhang, Weiqing Huang
Abstract:
The wireless communication network is developing rapidly, thus the wireless security becomes more and more important. Specific emitter identification (SEI) is an vital part of wireless communication security as a technique to identify the unique transmitters. In this paper, a SEI method based on multiscale dispersion entropy (MDE) and refined composite multiscale dispersion entropy (RCMDE) is proposed. The algorithms of MDE and RCMDE are used to extract features for identification of five wireless devices and cross-validation support vector machine (CV-SVM) is used as the classifier. The experimental results show that the total identification accuracy is 99.3%, even at low signal-to-noise ratio(SNR) of 5dB, which proves that MDE and RCMDE can describe the communication signal series well. In addition, compared with other methods, the proposed method is effective and provides better accuracy and stability for SEI.Keywords: cross-validation support vector machine, refined com- posite multiscale dispersion entropy, specific emitter identification, transient signal, wireless communication device
Procedia PDF Downloads 1322383 Study of the Composition of Lipids in Different Kinds of Packaged Food Products
Authors: Zineb Taidirt, Fathia Sebahi, Mohamed Karim Guarchani, Anissa Berkane, Noureddine Smail, Ouahiba Hadjoudj
Abstract:
Cardiovascular diseases are one of the most important causes of death in Algeria. Several risk factors are responsible for this, including the consumption of foods containing saturated fat and trans fatty acids TFAs. This brief presents the results of a descriptive study of the lipid composition of 251 food products marketed in Algeria. The objective of the study is to describe the nature and composition of lipids and to verify the compliance of saturated and trans fatty acids intakes with the regulations. The study is based on data from the nutrition labelling of marketed food products. The results showed that the lipids in foodstuffs are diverse in nature and of varying amounts, but their nature is not specified on all products. In addition, the required content of saturated fatty acids is mentioned only in 29.48% of the products; 21.62% of them do not comply with the standard. Hydrogenation of fats, which produced Trans fatty acids, is common: 19.92% of products contain hydrogenated fats, and 74.89% may contain them according to the aspect of the lipid (solid fat). However, the trans fatty acid content is only mentioned in 5.18% of the products. The latter is above the limits set by Algerian regulations in 50% of the butter samples studied. The composition of lipids in mono- and polyunsaturated fatty acids essential for the body is insufficient: only 13.94% of the products inform their contents on their labels. It is necessary to adopt mandatory restriction of trans fatty acids, to ban the use of partially-hydrogenated oils, and to require required mandatory labeling of the TFAs and the other fatty acids on packaged foods, and to conduct more studies in order to appreciate the intake of TFAs and saturated fat and appreciate their effects on the Algerian population and to get more informed about the composition of the lipid in packaged foods.Keywords: cardiovascular diseases, lipids, nutrition labelling, lipids, trans fatty acids
Procedia PDF Downloads 1302382 The Influence of Dietary Components on Acne; A Case-Control Survey
Authors: Atiya Mahmood, Mubasharah Hanif, Ghazala Butt, Mehwish Zahoor Ahmed
Abstract:
Acne vulgaris affects millions of adults.Despite extensive research, its food related etiology remains elusive. Objective:To assess the correlation between dietary intake and acne through a case-control survey of 300,15-25 year old respondents living in Pakistan. 50 acne patients and 150 age-and ethnicity-matched controls completed a questionnaire.Cases and controls were separated using SPSS-22 and univariate analysis was performed using the chi-square test. p value < 0.05 was considered statistically significant. We used adjusted odds ratios to assess the strength of associations with 95% confidence intervals. Most of the respondents were females(91.3%).Most(48.7%)acne patients were 20-25 yearsold.Acne severity was mild in 50%,moderate in 34%,severe in14%and very severe in 2%.Frequent low-fat foods(p<0.001)(OR=3.22),fat intake(p=0.03)(OR = 1.629),sweet snacks i.e. biscuits and candies etc. (p=0.013) (OR=1.9254), soft drinks(p= 0.045)(OR= 1.9091),butter(p<0.001) (OR= 1.8185),dairy products(p=0.043)(OR=0.624),salty foods(p= 0.011)(OR=1.961),chocolate (p=0.028)(OR=1.669), were associated with increased acne risk.No association was found with consumption of fried foods, desserts, fruit juices, raw fruit, fast food, vegetables, cheese, soy products, salt, and corn. Increased butter and chocolate consumption were linked to more severe forms of acne(p=0.049 and p=0.005 respectively).Most respondents (n=218) considered themselves to have healthy eating habits, indicating they were not educated about the nutritional aspects of acne treatment.Certain food item intake was significantly higher in acne patients to give an association between the two. Further studies must be conducted to develop a causative relationship. Nutrition aawareness is critical to reduce acne.Keywords: correlation between dietary components and acne, dietary components, acne, nutrition
Procedia PDF Downloads 672381 Analyzing the Risk Based Approach in General Data Protection Regulation: Basic Challenges Connected with Adapting the Regulation
Authors: Natalia Kalinowska
Abstract:
The adoption of the General Data Protection Regulation, (GDPR) finished the four-year work of the European Commission in this area in the European Union. Considering far-reaching changes, which will be applied by GDPR, the European legislator envisaged two-year transitional period. Member states and companies have to prepare for a new regulation until 25 of May 2018. The idea, which becomes a new look at an attitude to data protection in the European Union is risk-based approach. So far, as a result of implementation of Directive 95/46/WE, in many European countries (including Poland) there have been adopted very particular regulations, specifying technical and organisational security measures e.g. Polish implementing rules indicate even how long password should be. According to the new approach from May 2018, controllers and processors will be obliged to apply security measures adequate to level of risk associated with specific data processing. The risk in GDPR should be interpreted as the likelihood of a breach of the rights and freedoms of the data subject. According to Recital 76, the likelihood and severity of the risk to the rights and freedoms of the data subject should be determined by reference to the nature, scope, context and purposes of the processing. GDPR does not indicate security measures which should be applied – in recitals there are only examples such as anonymization or encryption. It depends on a controller’s decision what type of security measures controller considered as sufficient and he will be responsible if these measures are not sufficient or if his identification of risk level is incorrect. Data protection regulation indicates few levels of risk. Recital 76 indicates risk and high risk, but some lawyers think, that there is one more category – low risk/now risk. Low risk/now risk data processing is a situation when it is unlikely to result in a risk to the rights and freedoms of natural persons. GDPR mentions types of data processing when a controller does not have to evaluate level of risk because it has been classified as „high risk” processing e.g. processing on a large scale of special categories of data, processing with using new technologies. The methodology will include analysis of legal regulations e.g. GDPR, the Polish Act on the Protection of personal data. Moreover: ICO Guidelines and articles concerning risk based approach in GDPR. The main conclusion is that an appropriate risk assessment is a key to keeping data safe and avoiding financial penalties. On the one hand, this approach seems to be more equitable, not only for controllers or processors but also for data subjects, but on the other hand, it increases controllers’ uncertainties in the assessment which could have a direct impact on incorrect data protection and potential responsibility for infringement of regulation.Keywords: general data protection regulation, personal data protection, privacy protection, risk based approach
Procedia PDF Downloads 2542380 Eco-Literacy and Pedagogical Praxis in the Multidisciplinary University Greenhouse toward the Food Security Strengthening
Authors: Citlali Aguilera Lira, David Lynch Steinicke, Andrea León García
Abstract:
One of the challenges that higher education faces is to find how to approach the sustainability in an inclusive way to the student within all the different academic areas, how to move the sustainable development from the abstract field to the operational field. This research comes from the ecoliteracy and the pedagogical praxis as tools for rebuilding the teaching processes inside of universities. The purpose is to determine and describe which are the factors involved in the process of learning particularly in the Greenhouse-School Siembra UV. In the Greenhouse-School Siembra UV, of the University of Veracruz, are cultivated vegetables, medicinal plants and small cornfields under the usage of eco-technologies such as hydroponics, Wickingbed and Hugelkultur, which main purpose is the saving of space, labor and natural resources, as well as function as agricultural production alternatives in the urban and periurban zones. The sample was formed with students from different academic areas and who are actively involved in the greenhouse, as well as institutes from the University of Veracruz and governmental and non-governmental departments. This project comes from a pedagogic praxis approach, from filling the needs that the different professional profiles of the university students have. All this with the purpose of generate a pragmatic dialogue with the sustainability. It also comes from the necessity to understand the factors that intervene in the students’ praxis. In this manner is how the students are the fundamental unit in the sphere of sustainability. As a result, it is observed that those University of Veracruz students who are involved in the Greenhouse-school, Siembra UV, have enriched in different levels the sense of urban and periurban agriculture because of the diverse academic approaches they have and the interaction between them. It is concluded that the eco-technologies act as fundamental tools for ecoliteracy in society, where it is strengthen the nutritional and food security from a sustainable development approach.Keywords: farming eco-technologies, food security, multidisciplinary, pedagogical praxis
Procedia PDF Downloads 3192379 Conflict and Hunger Revisit: Evidences from Global Surveys, 1989-2020
Authors: Manasse Elusma, Thung-Hong Lin, Chun-yin Lee
Abstract:
The relationship between hunger and war or conflict remains to be discussed. Do wars or conflicts cause hunger and food scarcity, or is the reverse relationship is true? As the world becomes more peaceful and wealthier, some countries are still suffered from hunger and food shortage. So, eradicating hunger calls for a more comprehensive understanding of the relationship between conflict and hunger. Several studies are carried out to detect the importance of conflict or war on food security. Most of these studies, however, perform only descriptive analysis and largely use food security indicators instead of the global hunger index. Few studies have employed cross-country panel data to explicitly analyze the association between conflict and chronic hunger, including hidden hunger. Herein, this study addresses this issue and the knowledge gap. We combine global datasets to build a new panel dataset including 143 countries from 1989 to 2020. This study examines the effect of conflict on hunger with fixed effect models, and the results show that the increase of conflict frequency deteriorates hunger. Peacebuilding efforts and war prevention initiative are required to eradicate global hunger.Keywords: armed conflict, food scarcity, hidden hunger, hunger, malnutrition
Procedia PDF Downloads 1772378 Nutriscience Project: A Web-Based Intervention to Improve Nutritional Literacy among Families and Educators of Pre-School Children
Authors: R. Barros, J. Azevedo, P. Padrão, M. Gregório, I. Pádua, C. Almeida, C. Rodrigues, P. Fontes, A. Coelho
Abstract:
Recent evidence shows a positive association between nutritional literacy and healthy eating. Traditional nutrition education strategies for childhood obesity prevention have shown weak effect. The Nutriscience project aims to create and evaluate an innovative and multidisciplinary strategy for promoting effective and accessible nutritional information to children, their families, and educators. Nutriscience is a one-year prospective follow-up evaluation study including pre-school children (3-5 y), who attend national schools’ network (29). The project is structured around a web-based intervention, using an on-line interactive platform, and focus on increasing fruit and vegetable consumption, and reducing sugar and salt intake. The platform acts as a social network where educational materials, games, and nutritional challenges are proposed in a gamification approach that promotes family and community social ties. A nutrition Massive Online Open Course is developed for educators, and a national healthy culinary contest will be promoted on TV channel. A parental self-reported questionnaire assessing sociodemographic and nutritional literacy (knowledge, attitudes, skills) is administered (baseline and end of the intervention). We expect that results on nutritional literacy from the presented strategy intervention will give us important information about the best practices for health intervention with kindergarten families. This intervention program using a digital interactive platform could be an educational tool easily adapted and disseminated for childhood obesity prevention.Keywords: childhood obesity, educational tool, nutritional literacy, web-based intervention
Procedia PDF Downloads 3372377 Structured Tariff Calculation to Promote Geothermal for Energy Security
Authors: Siti Mariani, Arwin DW Sumari, Retno Gumilang Dewi
Abstract:
This paper analyzes the necessity of a structured tariff calculation for geothermal electricity in Indonesia. Indonesia is blessed with abundant natural resources and a choices of energy resources to generate electricity among other are coal, gas, biomass, hydro to geothermal, creating a fierce competition in electricity tariffs. While geothermal is inline with energy security principle and green growth initiative, it requires a huge capital funding. Geothermal electricity development consists of phases of project with each having its own financial characteristics. The Indonesian government has set a support in the form of ceiling price of geothermal electricity tariff by 11 U.S cents / kWh. However, the government did not set a levelized cost of geothermal, as an indication of lower limit capacity class, to which support is given. The government should establish a levelized cost of geothermal energy to reflect its financial capability in supporting geothermal development. Aside of that, the government is also need to establish a structured tariff calculation to reflect a fair and transparent business cooperation.Keywords: load fator, levelized cost of geothermal, geothermal power plant, structured tariff calculation
Procedia PDF Downloads 4462376 Sleep Disturbance in Indonesian School-Aged Children and Its Relationship to Nutritional Aspect
Authors: William Cheng, Rini Sekartini
Abstract:
Background: Sleep is essential for children because it provides enhancement for the neural system activities that give physiologic effects for the body to support growth and development. One of the modifiable factors that relates with sleep is nutrition, which includes nutritional status, iron intake, and magnesium intake. Nutritional status represents the balance between nutritional intake and expenditure, while iron and magnesium are micronutrients that are related to sleep regulation. The aim of this study is to identify prevalence of sleep disturbance among Indonesian children and to evaluate its relation with aspect to nutrition. Methods : A cross-sectional study involving children aged 5 to 7-years-old in an urban primary health care between 2012 and 2013 was carried out. Related data includes anthropometric status, iron intake, and magnesium intake. Iron and magnesium intake was obtained by 24-hours food recall procedure. Sleep Disturbance Scale for Children (SDSC) was used as the diagnostic tool for sleep disturbance, with score under 39 indicating presence of problem. Results: Out of 128 school-aged children included in this study, 28 (23,1%) of them were found to have sleep disturbance. The majority of children had good nutritional status, with only 15,7% that were severely underweight or underweight, and 12,4% that were identified as stunted. On the contrary, 99 children (81,8%) were identified to have inadequate magnesium intake and 56 children (46,3%) with inadequate iron intake. Our analysis showed there was no significant relation between all of the nutritional status indicators and sleep disturbance (p>0,05%). Moreover, inadequate iron and magnesium intake also failed to prove significant relation with sleep disturbance in this population. Conclusion: Almost fourth of school-aged children in Indonesia were found to have sleep disturbance and further study are needed to overcome this problem. According to our finding, there is no correlation between nutritional status, iron intake, magnesium intake, and sleep disturbance.Keywords: iron intake, magnesium intake, nutritional status, school-aged children, sleep disturbance
Procedia PDF Downloads 4702375 Cybersecurity Protective Behavior in Industrial Revolution 4.0 Era: A Conceptual Framework
Authors: Saif Hussein Abdallah Alghazo, Norshima Humaidi
Abstract:
Adopting cybersecurity protective behaviour among the employees is seriously considered in the organization, especially when the Internet of Things (IoT) is widely used in Industrial Revolution 4.0 (IR 4.0) era. Cybersecurity issues arise due to weaknesses of employees’ behaviour such as carelessness and failure to adopt good practices of information security behaviour. Therefore, this study aims to explore the dimensions that might influence employees’ behaviour to adopt good cybersecurity practices and to develop a new holistic model related to this concept. The study proposed this by reviewing the existing works of literature related to this field extensively, especially by focusing on the existing theory such as Protection Motivation Theory (PMT). Moreover, this study has also explored the role of cybersecurity competency among the security manager in the organization since this construct is essential to enhance the protective behaviour towards cybersecurity among the employees in the organization. The proposed research model is important to be quantitatively tested in the future as the findings will serve as the input to the act that will enhance employee’s cybersecurity protective behaviour in the IR 4.0 environment.Keywords: cybersecurity protective behaviour, protection motivation theory, IR 4.0, cybersecurity competency
Procedia PDF Downloads 1552374 An Assessment of Housing Affordability and Safety Measures in the Varied Residential Area of Lagos, A Case Study of the Amuwo-Odofin Local Government Area in Lagos State
Authors: Jubril Olatunbosun Akinde
Abstract:
Unplanned population growth are mostly attributed to a lack of infrastructural facilities and poor economic condition in the rural dwellings and the incidence of rural-urban migration, which has resulted in severe housing deficiency in the urban centre, with a resultant pressure on housing delivery in the cities. Affordable housing does not only encompass environmental factors that make living acceptable and comfortable, which include good access routes, ventilation, sanitation and access to other basic human needs, which include water and safety. The research assessed the housing affordability and safety measures in the varied residential area of lagos by examining the demographic and socioeconomic attributes of residents; examining the existing residential safety measures; by examining the residential quality in terms of safety; the researcher therefore examined if relationship between housing affordability and safety in the varied residential areas. The research adopted the bartlett, kotrlik and higgins (2001) method of t-test to determine the sample size which specifies different populations at different levels of significance (α). The researcher adopted primary data which was sourced from a field survey where the sample population was simply randomly selected to give a member of the population an equal chance of being selected, therefore, the sample size for the field survey was two hundred (200) respondents, and subjected to necessary testing. The research come to conclusion that housing safety and security is the responsibility of every resident, the landlords/landladies possess a better sense of security in their neighbourhood than renters in the community, therefore they need to be aware of their responsibility of ensuring the safety of lives and property.Keywords: housing, housing affordability, housing security, residential, residential quality
Procedia PDF Downloads 1172373 Impact Evaluation of Discriminant Analysis on Epidemic Protocol in Warships’s Scenarios
Authors: Davi Marinho de Araujo Falcão, Ronaldo Moreira Salles, Paulo Henrique Maranhão
Abstract:
Disruption Tolerant Networks (DTN) are an evolution of Mobile Adhoc Networks (MANET) and work good in scenarioswhere nodes are sparsely distributed, with low density, intermittent connections and an end-to-end infrastructure is not possible to guarantee. Therefore, DTNs are recommended for high latency applications that can last from hours to days. The maritime scenario has mobility characteristics that contribute to a DTN network approach, but the concern with data security is also a relevant aspect in such scenarios. Continuing the previous work, which evaluated the performance of some DTN protocols (Epidemic, Spray and Wait, and Direct Delivery) in three warship scenarios and proposed the application of discriminant analysis, as a classification technique for secure connections, in the Epidemic protocol, thus, the current article proposes a new analysis of the directional discriminant function with opening angles smaller than 90 degrees, demonstrating that the increase in directivity influences the selection of a greater number of secure connections by the directional discriminant Epidemic protocol.Keywords: DTN, discriminant function, epidemic protocol, security, tactical messages, warship scenario
Procedia PDF Downloads 1952372 Cybersecurity for Digital Twins in the Built Environment: Research Landscape, Industry Attitudes and Future Direction
Authors: Kaznah Alshammari, Thomas Beach, Yacine Rezgui
Abstract:
Technological advances in the construction sector are helping to make smart cities a reality by means of cyber-physical systems (CPS). CPS integrate information and the physical world through the use of information communication technologies (ICT). An increasingly common goal in the built environment is to integrate building information models (BIM) with the Internet of Things (IoT) and sensor technologies using CPS. Future advances could see the adoption of digital twins, creating new opportunities for CPS using monitoring, simulation, and optimisation technologies. However, researchers often fail to fully consider the security implications. To date, it is not widely possible to assimilate BIM data and cybersecurity concepts, and, therefore, security has thus far been overlooked. This paper reviews the empirical literature concerning IoT applications in the built environment and discusses real-world applications of the IoT intended to enhance construction practices, people’s lives and bolster cybersecurity. Specifically, this research addresses two research questions: (a) how suitable are the current IoT and CPS security stacks to address the cybersecurity threats facing digital twins in the context of smart buildings and districts? and (b) what are the current obstacles to tackling cybersecurity threats to the built environment CPS? To answer these questions, this paper reviews the current state-of-the-art research concerning digital twins in the built environment, the IoT, BIM, urban cities, and cybersecurity. The results of these findings of this study confirmed the importance of using digital twins in both IoT and BIM. Also, eight reference zones across Europe have gained special recognition for their contributions to the advancement of IoT science. Therefore, this paper evaluates the use of digital twins in CPS to arrive at recommendations for expanding BIM specifications to facilitate IoT compliance, bolster cybersecurity and integrate digital twin and city standards in the smart cities of the future.Keywords: BIM, cybersecurity, digital twins, IoT, urban cities
Procedia PDF Downloads 1732371 The Consumption of Sodium and Fat from Processed Foods
Authors: Pil Kyoo Jo, Jee Young Kim, Yu Jin Oh, Sohyun Park, Young Ha Joo, Hye Suk Kim, Semi Kang
Abstract:
When convenience drives daily food choices, the increased consumption of processed foods may be associated with the increased intakes of sodium and fat and further with the onset of chronic diseases. The purpose of this study was to investigate the levels of sodium, saturated fat, and calories intakes through processed foods and the dietary patterns among adult populations in South Korea. We used the nationally representative data from the 5th Korea National Health and Nutrition Examination Survey (KNHANES, 2010-2012) and a cross-sectional survey on the eating behaviors among university students(N=893, 380 men, 513 women) aged from 20 to 24 years. Results showed that South Koreans consumed 43.5% of their total food consumption from processed foods. The 24-hour recalls data showed that 77% of sodium, 60% of fats, 59% of saturated fat, and 44% of calories were consumed from processed food. The intake of processed foods increased by 1.7% in average since 2008 annually. Only 33% of processed food that respondents consumed had nutrition labeling. The data from university students showed that students selected processed foods in convenience store when eating alone compared to eating with someone else. Given the convenience and lack of time, more people will consume processed foods and it may impact their overall dietary intake and further their health. In order to help people to make healthier food choices, regulations and policies to reduce the potentially unhealthy nutrients of processed foods should be strengthened. This research was supported by the National Research Foundation of Korea for 2011 Korea-Japan Basic Scientific Cooperation Program. This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2015S1A5B6037369).Keywords: sodium, fat, processed foods, diet trends
Procedia PDF Downloads 2582370 Food Insecurity and Its Implication for Poverty Alleviation in Nigeria
Authors: Peter Okpamen
Abstract:
Food security concentrates on the collective efforts of all nations to produce enough food to feed their people. Recently, though the emphasis shifted from food availability to accessibility constraints, which entails the difficulties undernourished people face in gaining access to food even when it is available. Broadly speaking, access to food depends on an individual’s access to resources, markets and food transfers. The opportunities to obtain food through these channels are entitlements, which when denied constitute food insecurity. Evidence shows that a significant percentage of Nigerians are undernourished with adverse implications for the fight against poverty. The greatest danger or consequence of food insecurity is malnutrition. Food insecurity as both an agent and consequence of poverty also increases the economic, political and social tensions in the country. The undernourished in Nigeria are marginalised in several ways to the extent that they are often ill; and because of illness, their work capacity is reduced with attendant reduction in their income. Without adequate income, they cannot save nor invest enough resources to take care of their basic needs. In this paper therefore, we used the political economy approach and statistical analysis to demonstrate that poverty alleviation in Nigeria would be a mirage if food security problems are not adequately resolved.Keywords: alleviation, demographic, food insecurity, undernourished
Procedia PDF Downloads 4332369 A Hybrid Digital Watermarking Scheme
Authors: Nazish Saleem Abbas, Muhammad Haris Jamil, Hamid Sharif
Abstract:
Digital watermarking is a technique that allows an individual to add and hide secret information, copyright notice, or other verification message inside a digital audio, video, or image. Today, with the advancement of technology, modern healthcare systems manage patients’ diagnostic information in a digital way in many countries. When transmitted between hospitals through the internet, the medical data becomes vulnerable to attacks and requires security and confidentiality. Digital watermarking techniques are used in order to ensure the authenticity, security and management of medical images and related information. This paper proposes a watermarking technique that embeds a watermark in medical images imperceptibly and securely. In this work, digital watermarking on medical images is carried out using the Least Significant Bit (LSB) with the Discrete Cosine Transform (DCT). The proposed methods of embedding and extraction of a watermark in a watermarked image are performed in the frequency domain using LSB by XOR operation. The quality of the watermarked medical image is measured by the Peak signal-to-noise ratio (PSNR). It was observed that the watermarked medical image obtained performing XOR operation between DCT and LSB survived compression attack having a PSNR up to 38.98.Keywords: watermarking, image processing, DCT, LSB, PSNR
Procedia PDF Downloads 572368 Infant and Young Child Dietary Diversification Using Locally Available Foods after Nutrition Education in Rural Malawi
Authors: G. C. Phiri, E. A. Heil, A. A. Kalimbira, E. Muehlhoff, C. Masangano, B. M. Mtimuni, J. Herrmann, M. B. Krawinkel, I. Jordan
Abstract:
Background and objectives: High prevalence of undernutrition in Malawi is caused by poor complementary foods. Lack of knowledge of age appropriate food within the household might affect utilization of available resources. FAO-Malawi implemented nutrition education (NE) sessions in 200 villages in Kasungu and Mzimba districts from December 2012 to April 2013 targeting 15 caregivers per village of children aged 6-18 months, grandmothers, spouses and community leaders. Two trained volunteers per village facilitated 10 NE sessions on breastfeeding, food safety and hygiene and complementary feeding using locally available resources. This study assessed the reported dietary diversification practices of infant and young child after nutrition education and the factors that influenced adoption of the practice. Methodology: Questionnaire-based interviews with caregivers were conducted in 16 randomly selected villages (n=108) before training-(t1) and seven months after training-(t2). Knowledge score (KS) was calculated on the indicators breastfeeding, hygiene and complementary feeding. Count regression was performed using SPSS 22. Eight focus group discussions (FGDs) were separately conducted among caregivers and grandmothers in 4 villages. Content analysis was used to analyze FGDs data. Results: Following NE, caregivers' KS significantly increased (p<0.001) between t1 and t2 for breastfeeding (7.7 vs. 9.8, max=18), hygiene (3.8 vs. 5.9, max=7) and complementary feeding (10.2 vs. 16.2, max=26). Caregivers indicated that they stopped preparation of plain-refined maize meal porridge after they gained knowledge on dietary diversification of complementary foods. They learnt mushing and pounding of ingredients for enriched porridge. Whole-maize meal or potatoes were often enriched with vegetables, legumes, small fish or eggs and cooking oil. Children liked the taste of enriched porridge. Amount of enriched porridge consumed at each sitting increase among previously fussy-eater children. Meal frequency increased by including fruits as snacks in child’s diet. Grandmothers observed preparation of enriched porridge among the mothers using locally available foods. Grandmothers liked the taste of enriched porridge and not the greenish color of the porridge. Both grandmothers and mothers reported that children were playing independently after consuming enriched porridge and were strong and healthy. These motivated adoption of the practice. Conclusion: Increased knowledge and skill of preparation and utilisation of locally available foods promoted children’s dietary diversification. Children liking the enriched porridge motivated adoption of dietary diversification.Keywords: behaviour change, complementary feeding, dietary diversification, IYCN
Procedia PDF Downloads 4752367 Deterministic Random Number Generator Algorithm for Cryptosystem Keys
Authors: Adi A. Maaita, Hamza A. A. Al Sewadi
Abstract:
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfills Shannon’s principle of “confusion and diffusion”. ASCII code characters wereutilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.Keywords: cryptosystems, information security agreement, key distribution, random numbers
Procedia PDF Downloads 2702366 Evaluation of Biological Seed Coating Technology On-Field Performance of Wheat in Regenerative Agriculture and Conventional Systems
Authors: S. Brain, P. J. Storer, H. Strydom, Z. M. Solaiman
Abstract:
Increasing farmer awareness of soil health, the impact of agricultural management practices, and the requirement for high-quality agricultural produce are major factors driving the rapid adoption of biological seed treatments - currently valued globally at USD 1.5 billion. Biological seed coatings with multistrain plant beneficial microbial technology have the capability to affect plant establishment, growth, and development positively. These beneficial plant microbes can potentially increase soil health, plant yield, and nutrition – acting as bio fertilisers, rhizoremediators, phytostimulators, and stress modulators, and can ultimately reduce the overall use of agrichemicals. A field trial was conducted on MACE wheat in the central wheat belt of Western Australia to evaluate a proprietary seed coating technology (Langleys Bio-EnergeticTM Microbe blend (BMB)) on a conventional program (+/- BMB microbes) and a Regenerative Biomineral fertiliser program (+/- BMB microbes). The Conventional (+BMB) and Biomineral (+BMB) treated plants had no fungicide treatments and had no disease issues. Control (No fertiliser, No microbes), Conventional (No Microbes), and Biomineral (No Microbes) were treated with fungicides (seed dressing and foliar). From the research findings, compared to control and no microbe treatments, both the Conventional (+ BMB) and Biomineral (+ BMB) showed significant increases in Soil Carbon (SOC), Seed germination, nutrient use efficiency (NUE) of nitrogen, phosphate and mineral nutrients, grain mineral nutrient uptake, protein %, hectolitre weight, and fewer screenings, yield, and gross margins.Keywords: biological seed coating, biomineral fertiliser, plant nutrition, regenerative and conventional agriculture
Procedia PDF Downloads 842365 Genomics Approach for Excavation of NAS Genes from Nutri Rich Minor Millet Crops: Transforming Perspective from Orphan Plants to Future Food Crops
Authors: Mahima Dubey, Girish Chandel
Abstract:
Minor millets are highly nutritious and climate resilient cereal crops. These features make them ideal candidates to excavate the physiology of the underlying mechanism. In an attempt to understand the basis of mineral nutrition in minor millets, a set of five Barnyard millet genotypes were analyzed for grain Fe and Zn content under contrasting Fe-Zn supply to identify genotypes proficient in tolerating mineral deficiency. This resulted in the identification of Melghat-1 genotype to be nutritionally superior with better ability to withstand deficiency. Expression analysis of several Nicotianamine synthase (NAS) genes showed that HvNAS1 and OsNAS2 genes were prominent in positively mediating mineral deficiency response in Barnyard millet. Further, strategic efforts were employed for fast-track identification of more effective orthologous NAS genes from Barnyard millet. This resulted in the identification of two genes namely EfNAS1 (orthologous to HvNAS1 of barley) and EfNAS2 (orthologous to OsNAS2 gene of rice). Sequencing and thorough characterization of these sequences revealed the presence of intact NAS domain and signature tyrosine and di-leucine motifs in their predicted proteins and thus established their candidature as functional NAS genes in Barnyard millet. Moreover, EfNAS1 showed structural superiority over previously known NAS genes and is anticipated to have role in more efficient metal transport. Findings of the study provide insight into Fe-Zn deficiency response and mineral nutrition in millets. This provides millets with a physiological edge over micronutrient deficient staple cereals such as rice in withstanding Fe-Zn deficiency and subsequently accumulating higher levels of Fe and Zn in millet grains.Keywords: gene expression, micronutrient, millet, ortholog
Procedia PDF Downloads 2342364 Wireless Transmission of Big Data Using Novel Secure Algorithm
Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha
Abstract:
This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance
Procedia PDF Downloads 4932363 Member States 'Perception of Threat' to Migration Crises as a Determinant Factor of Change in Cooperation: A Comparison between the Yugoslav Migration Crisis and the Syrian Refugees' Crisis
Authors: Diego Caballero Vélez
Abstract:
In 1997 the Schengen Convention was incorporated in the mainstream of EU law by the Amsterdam Treaty. It came into effect in 1999 with the abolition of internal border controls in the EU, a milestone in the European integration project. In the meantime, due to the Yugoslav wars, nearly 700,000 asylum applications were filed in the European countries provoking a major refugee crisis. During this period, the opening of Eastern Europe fostered more cooperation and policy-making at the EU level in migration issues. Currently, a similar migratory crisis is taking place in Europe. The Syrian war has caused the most massive influx of immigrants in Europe since World War II. Nevertheless, the EU is adopting different migration policies from those implemented during the Yugoslav migration crisis. The current crisis has not led to a common European position but national responses have been offered on migration policies and responsibility for border security and asylum-seekers. A lot of factors can explain this change from a cooperation scenario to a no cooperation one, such as the economic crisis, but this research is focused on the premise that 'threat perception' lies at the core of some states grand strategies towards migration and it also influences in multilateral or unilateral responses. Migration rests at the nexus of three dimensions of security, including geopolitical interests, material production, and internal security. According to some scholars, migration policy is an 'integral instrument' of state grand strategy in that context. Political integration at the EU might be altered with the emergence of existential threats. In other words, some areas of the European cooperation can be transformed when a 'critical juncture' occurs, for instance a migration crisis. In that instance, Member states could see migration as a matter of threat that modifies their national interests and willingness to embrace international cooperation. This research will focus on EU Member states´ perceptions of the 90´s migration crisis and the current one. The goal is to evaluate to what extent the perceptions of threat are one of the main factors for explaining the transition from a cooperation scenario to a no-cooperation one in European asylum and security policies. To analyze threat perception in both migration crisis, some relevant Member states are treated as cases of study and a comparative analysis is carried out based on public opinion polls, public and policy discourse in migration, voting practices and deconstruction of the migration policies themselves both at EU level and a national one.Keywords: cooperation, migration crisis, national responses, threat perception
Procedia PDF Downloads 2432362 Nutritional Education in Health Resort Institutions in the Face of Demographic and Epidemiological Changes in Poland
Authors: J. Woźniak-Holecka, T. Holecki, S. Jaruga
Abstract:
Spa treatment is an important area of the health care system in Poland due to the increasing needs of the population and the context of historical conditions for this form of therapy. It extends the range of financing possibilities of the outlets and increases the potential of spa services, which is very important in the context of demographic and epidemiological changes. The main advantages of spa treatment services include its relatively wide availability, low risk of side effects, good patient tolerance, long-lasting curative effect and a relatively low cost. In addition, patients should be provided with a proper diet and enable participation in health education and health promotion classes aimed at health problems consistent with the treatment profile. Challenges for global health care systems include a sharp increase in spending on benefits, dynamic development of health technologies and growing social expectations. This requires extending the competences of health resort facilities for health promotion. Within each type of health resort institutions in Poland, nutritional education services are implemented, aimed at creating and consolidating proper eating habits. Choosing the right diet can speed up recovery or become one of the methods to alleviate the symptoms of chronic diseases. During spa treatment patient learns the principles of rational nutrition and adequate dietotherapy to his diseases. The aim of the project is to assess the frequency and quality of nutritional education provided to patients in health resort facilities in a nationwide perspective. The material for the study will be data obtained as part of an in-depth interview conducted among Heads of Nutrition Departments of selected institutions. The use of nutritional education in a health resort may be an important goal of implementing the state health policy as a useful tool to reduce the risk of diet-related diseases. Recognizing nutritional education in health resort institutions as a type of full-value health service can be effective system support for health policy, including seniors, due to demographic changes currently occurring in the Polish population. Furthermore, it is necessary to increase the interest and motivation of patients to follow the recommendations of nutritional education, because it will bring tangible benefits for the long-term effects of therapy and care should be taken for the form and methodology of nutrition education implemented in health resort institutions. Finally it is necessary to construct an educational offer in terms of selected groups of patients with the highest health needs: the elderly and the disabled. In conclusion, it can be said that the system of nutritional education implemented in polish health resort institutions should be subjected to global changes and strong systemic correction.Keywords: health care system, nutritional education, public health, spa and treatment
Procedia PDF Downloads 117