Search results for: national food security act
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9725

Search results for: national food security act

8645 New Applications of Essential Oils: Edible Packaging Material for Food Supplements

Authors: Roxana Gheorghita, Gheorghe Gutt

Abstract:

Environmental pollution due to non-degradation of packaging from the food and pharmaceutical industry is reaching increasingly alarming levels. The packaging used for food supplements is usually composed of successive layers of synthetic materials, conventional, glue, and paint. The situation is becoming more and more problematic as the population, according to statistics, uses food supplements more and more often. The solution can be represented by edible packaging, completely biodegradable, and compostable. The tested materials were obtained from biopolymers, agar, carrageenan, and alginate, in well-established quantities and plasticized with glycerol. Rosemary, thyme, and oregano essential oils have been added in varying proportions. The obtained films are completely water-soluble in hot liquids (with a temperature of about 80° C) and can be consumed with the product contained. The films were glossy, pleasant to the touch, thin (thicknesses between 32.8 and 52.8 μm), transparent, and with a pleasant smell, specific to the added essential oil. Tested for microbial evaluation, none of the films indicated the presence of E. coli, S. aureus, enterobacteria, coliform bacteria, yeasts, or molds. This aspect can also be helped by the low values of the water activity index (located between 0.546 and 0.576). The mechanical properties indicated that the material became more resistant with the addition of essential oil, the best values being recorded by the addition of oregano. The results obtained indicate the possibility of using biopolymer-based films with the addition of rosemary, thyme, and oregano essential oil, for wrapping food supplements, thus replacing conventional packaging, multilayer, impossible to sort and recycle.

Keywords: edible films, food supplements, oregano, rosemary, thyme

Procedia PDF Downloads 129
8644 Identification System for Grading Banana in Food Processing Industry

Authors: Ebenezer O. Olaniyi, Oyebade K. Oyedotun, Khashman Adnan

Abstract:

In the food industry high quality production is required within a limited time to meet up with the demand in the society. In this research work, we have developed a model which can be used to replace the human operator due to their low output in production and slow in making decisions as a result of an individual differences in deciding the defective and healthy banana. This model can perform the vision attributes of human operators in deciding if the banana is defective or healthy for food production based. This research work is divided into two phase, the first phase is the image processing where several image processing techniques such as colour conversion, edge detection, thresholding and morphological operation were employed to extract features for training and testing the network in the second phase. These features extracted in the first phase were used in the second phase; the classification system phase where the multilayer perceptron using backpropagation neural network was employed to train the network. After the network has learned and converges, the network was tested with feedforward neural network to determine the performance of the network. From this experiment, a recognition rate of 97% was obtained and the time taken for this experiment was limited which makes the system accurate for use in the food industry.

Keywords: banana, food processing, identification system, neural network

Procedia PDF Downloads 466
8643 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 125
8642 Comparison of Antimicrobial Activity of Seed Oil of Garlic and Moringa oleifera against Some Food-Borne Microorganisms

Authors: Mansur Abdulrasheed, Ibrahim I. Hussein, Ahmed M. Mubarak, Ahmed F. Umar

Abstract:

This study was aimed at evaluating the phytochemical constituents and the antimicrobial activity of the seed oil of Moringa oleifera and garlic against some selected food-borne microorganisms (Staphylococcus aureus, Escherichia coli, Salmonella spp and Pseudomonas aeruginosa) using disc diffusion method. The results of the phytochemical screening revealed differences in the presence of the phytochemicals among the extracts. Saponins were detected in both Moringa oleifera and garlic seed oil, while alkaloid and tannins were observed in seed oil of garlic. Furthermore, the antibacterial assay results show that the seed oil of Moringa oleifera was inactive against all the tested organisms, even at 100 % concentration. In contrast, garlic oil was found to be active against all the tested organisms. The highest inhibition was observed in E. coli (12 mm)at 100 % concentration, while at 20 % concentration, Salmonella Sp and P. aeruginosa showed the least inhibit on (6 mm). The antimicrobial activity of the seed oil of garlic may be attributed to its phytochemicals components which were not detected in the seed oil of Moringa oleifera. The results of this study have shown the potentials of the seed oil of garlic as an antimicrobial agent more especially in foods, by inhibiting the growth of the test organisms, which range from food-borne pathogens to food spoilage organisms.

Keywords: antimicrobial, garlic, Moringa oleifera, food borne pathogens

Procedia PDF Downloads 411
8641 Climbing up to Safety and Security: The Facilitation of an NGO Awareness Culture

Authors: Mirad Böhm, Diede De Kok

Abstract:

It goes without saying that for many NGOs a high level of safety and security are crucial issues, which often necessitates the support of military personnel to varying degrees. The relationship between military and NGO personnel is usually a difficult one and while there has been progress, clashes naturally still occur owing to different interpretations of mission objectives amongst many other challenges. NGOs tend to view safety and security as necessary steps towards their goal instead of fundamental pillars of their core ‘business’. The military perspective, however, considers them primary objectives; thus, frequently creating a different vision of how joint operations should be conducted. This paper will argue that internalizing safety and security into the NGO organizational culture is compelling in order to ensure a more effective cooperation with military partners and, ultimately, to achieve their goals. This can be accomplished through a change in perception of safety and security concepts as a fixed and major point on the everyday agenda. Nowadays, there are several training programmes on offer addressing such issues but they primarily focus on the individual level. True internalization of these concepts should reach further by encompassing a wide range of NGO activities, beginning with daily proceedings in office facilities far from conflict zones including logistical and administrative tasks such as budgeting, and leading all the way to actual and potentially hazardous missions in the field. In order to effectuate this change, a tool is required to help NGOs realize, firstly, how they perceive and define safety and security, and secondly, how they can adjust this perception to their benefit. The ‘safety culture ladder’ is a concept that suggests what organizations can and should do to advance their safety. While usually applied to private industrial scenarios, this work will present the concept as a useful instrument to visualize and facilitate the internalization process NGOs ought to go through. The ‘ladder’ allows them to become more aware of the level of their safety and security measures, and moreover, cautions them to take these measures proactively rather than reactively. This in turn will contribute to a rapprochement between military and NGO priority setting in regard to what constitutes a safe working environment.

Keywords: NGO-military cooperation, organisational culture, safety and security awareness, safety culture ladder

Procedia PDF Downloads 330
8640 Customer Experience Management in Food and Beverage Outlet at Indian School of Business: Methodology and Recommendations

Authors: Anupam Purwar

Abstract:

In conventional consumer product industry, stockouts are taken care by carrying buffer stock to check underserving caused by changes in customer demand, incorrect forecast or variability in lead times. But, for food outlets, the alternate of carrying buffer stock is unviable because of indispensable need to serve freshly cooked meals. Besides, the food outlet being the sole provider has no incentives to reduce stockouts, as they have no fear of losing revenue, gross profit, customers and market share. Hence, innovative, easy to implement and practical ways of addressing the twin problem of long queues and poor customer experience needs to be investigated. Current work analyses the demand pattern of 11 different food items across a routine day. Based on this optimum resource allocation for all food items has been carried out by solving a linear programming problem with cost minimization as the objective. Concurrently, recommendations have been devised to address this demand and supply side problem keeping in mind their practicability. Currently, the recommendations are being discussed and implemented at ISB (Indian School of Business) Hyderabad campus.

Keywords: F&B industry, resource allocation, demand management, linear programming, LP, queuing analysis

Procedia PDF Downloads 131
8639 Beyond Cooking and Food Preparation: Examining the Material Culture of Medieval Cuisine in the Middle East

Authors: Shurouq Munzer

Abstract:

This study investigates methods for inferring the presence of cooking activity at an archaeological site through the study of cooking tools, contextual evidence, and food preparation techniques. This paper examines the patterns of cooking utensils and categorizes the morphological features as well as the types of clay utilized in manufacturing such cooking utensils. Despite challenges in accessing such evidence due to its limited availability in books and excavations. The excavation results provide the point for evaluating progress in daily life and underscore the cultural, social, and economic significance of studying cooking activity at archaeological sites within their archaeological contexts.

Keywords: coarse ware, cooking utensils, ḥisba, waqif, muḥtasib, foodways, practice, cuisine, food preparation

Procedia PDF Downloads 70
8638 Computer-Based versus Paper-Based Tests: A Comparative Study of Two Types of Indonesian National Examination for Senior High School Students

Authors: Faizal Mansyur

Abstract:

The objective of this research is to find out whether there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based tests. The population of this research is senior high school students in South Sulawesi Province who sat the Indonesian National Examination for 2015/2016 academic year. The samples of this research are 800 students’ scores from 8 schools taken by employing the multistage random sampling technique. The data of this research is a secondary data since it is obtained from the education office for South Sulawesi. In analyzing the collected data, the researcher employed the independent samples T-Test with the help of SPSS v.24 program. The finding of this research reveals that there is a significant difference in the English language scores of senior high school students in the Indonesia National Examination for students tested by using computer-based and paper-based Tests (p < .05). Moreover, students tested by using PBT (Mean = 63.13, SD = 13.63) achieve higher score than those tested by using CBT (Mean = 46.33, SD = 14.68).

Keywords: computer-based test, paper-based test, Indonesian national examination, testing

Procedia PDF Downloads 163
8637 Evaluating the Possibility of Expanding National Health Insurance Funding From Zakat, Sudan

Authors: Fawzia Mohammed Idris

Abstract:

Zakat is an Islamic procedure for wealth distribution as a social protection mechanism for needy people. This study aimed to assess the possibility to expand the share of fund for national health insurance fund from zakat funds allocated for poor people by measuring the reduction of poverty that result from the investing on direct payment to the needy or by covering them in social health insurance. This study used stata regression as a statistical analysis tool and the finding clarified that there is no significant relationship between the poverty rate as the main indicator and, the number of poor people covered by national health insurance on one hand and the number of benefits poor people from the distribution of zakat fund. This study experienced many difficulties regarding the quality and the consistency of the data. The study suggested that a joint mission between national health insurance fund and zakat chamber to conduct study to assess the efficient use of zakat fund allocated to poor people.

Keywords: health finance, poverty, social health insurance, zakat

Procedia PDF Downloads 142
8636 The Use of AI to Measure Gross National Happiness

Authors: Riona Dighe

Abstract:

This research attempts to identify an alternative approach to the measurement of Gross National Happiness (GNH). It uses artificial intelligence (AI), incorporating natural language processing (NLP) and sentiment analysis to measure GNH. We use ‘off the shelf’ NLP models responsible for the sentiment analysis of a sentence as a building block for this research. We constructed an algorithm using NLP models to derive a sentiment analysis score against sentences. This was then tested against a sample of 20 respondents to derive a sentiment analysis score. The scores generated resembled human responses. By utilising the MLP classifier, decision tree, linear model, and K-nearest neighbors, we were able to obtain a test accuracy of 89.97%, 54.63%, 52.13%, and 47.9%, respectively. This gave us the confidence to use the NLP models against sentences in websites to measure the GNH of a country.

Keywords: artificial intelligence, NLP, sentiment analysis, gross national happiness

Procedia PDF Downloads 107
8635 MSG Image Encryption Based on AES and RSA Algorithms "MSG Image Security"

Authors: Boukhatem Mohammed Belkaid, Lahdir Mourad

Abstract:

In this paper, we propose a new encryption system for security issues meteorological images from Meteosat Second Generation (MSG), which generates 12 images every 15 minutes. The hybrid encryption scheme is based on AES and RSA algorithms to validate the three security services are authentication, integrity and confidentiality. Privacy is ensured by AES, authenticity is ensured by the RSA algorithm. Integrity is assured by the basic function of the correlation between adjacent pixels. Our system generates a unique password every 15 minutes that will be used to encrypt each frame of the MSG meteorological basis to strengthen and ensure his safety. Several metrics have been used for various tests of our analysis. For the integrity test, we noticed the efficiencies of our system and how the imprint cryptographic changes at reception if a change affects the image in the transmission channel.

Keywords: AES, RSA, integrity, confidentiality, authentication, satellite MSG, encryption, decryption, key, correlation

Procedia PDF Downloads 378
8634 Industrial Ecology Perspectives of Food Supply Chains: A Framework of Analysis

Authors: Luciano Batista, Sylvia Saes, Nuno Fouto, Liam Fassam

Abstract:

This paper introduces the theoretical and methodological basis of an analytical framework conceived with the purpose of bringing industrial ecology perspectives into the core of the underlying disciplines supporting analyses in studies concerned with environmental sustainability aspects beyond the product cycle in a supply chain. Given the pressing challenges faced by the food sector, the framework focuses upon waste minimization through industrial linkages in food supply chains. The combination of industrial ecology practice with basic LCA elements, the waste hierarchy model, and the spatial scale of industrial symbiosis allows the standardization of qualitative analyses and associated outcomes. Such standardization enables comparative analysis not only between different stages of a supply chain, but also between different supply chains. The analytical approach proposed contributes more coherently to the wider circular economy aspiration of optimizing the flow of goods to get the most out of raw materials and cuts wastes to a minimum.

Keywords: by-product synergy, food supply chain, industrial ecology, industrial symbiosis

Procedia PDF Downloads 414
8633 A Review of the Fundamental Principles of the National Transport Policy and Developmental Implementation Programmes

Authors: Charles Asenime, Asaju Joel, Fagbenro Abiola, Adetoyese Oguntimehin, Agosu Rebecca

Abstract:

This paper examines the fundamental principles of the National Transport Policy (NTP) and determined its role in the execution of transport projects, and the establishment of ministries, departments, and agencies. Data used for the paper are from secondary sources of commissioned reports, studies, internet sources, and government releases. Results of the analysis show that the draft NTP has been used to establish transport schemes, master plans, and transport infrastructure. The paper concludes that though, the national transport Policy is still in a draft form, its production, however, has shaped the transport system in Nigeria and has shown how transport has improved the economy through the efficient utilisation of resources, improved mobility, and lifestyle.

Keywords: principles, draft, system, resources

Procedia PDF Downloads 136
8632 How to Applicate Knowledge Management in Security Environment within the Scope of Optimum Balance Model

Authors: Hakan Erol, Altan Elibol, Ömer Eryılmaz, Mehmet Şimşek

Abstract:

Organizations aim to manage information in a most possible effective way for sustainment and development. In doing so, they apply various procedures and methods. The very same situation is valid for each service of Armed Forces. During long-lasting endeavors such as shaping and maintaining security environment, supporting and securing peace, knowledge management is a crucial asset. Optimum Balance Model aims to promote the system from a decisive point to a higher decisive point. In this context, this paper analyses the application of optimum balance model to knowledge management in Armed Forces and tries to find answer to the question how Optimum Balance Model is integrated in knowledge management.

Keywords: optimum balance model, knowledge management, security environment, supporting peace

Procedia PDF Downloads 390
8631 A Secure Survey against Black Hole Attack in MANET

Authors: G. Usha, S. Kannimuthu, K. Mahalakshmi

Abstract:

Mobile Adhoc Network (MANET) is one of the most promising technologies that have applications ranging from various portable devices to military networks. MANET has no fixed infrastructure and the security of such network is a big concern. Therefore, in order to operate MANET’s securely, the misbehavior and intrusions should be detected before the attackers affect the network communication. In this article, we make a comprehensive survey against black hole attack that is a serious threat against MANET that exploits the routing behavior of the MANET. We have given broad survey solutions that detect black hole attacks in MANET. This is achieved by analyzing the techniques involved in detecting the attacks in each scheme. Furthermore, we examine about the challenges to the researchers for constructing an in-depth solution against black hole attack.

Keywords: AODV, cross layer security, mobile Adhoc network (MANET), packet delivery ratio, single layer security

Procedia PDF Downloads 404
8630 Democracy and Security Challenge in Nigeria, 1999, Till Date

Authors: Abdulsalami M. Deji

Abstract:

Prolonged military incursion in Nigeria politics which favored the oligarchy brought agitation for democratic rule it exacerbated ethnicity integration of minority for fear of domination. The advent of democracy ushered in new breath of life to Nigerians from the shackle of military oppression to democratic governance. Democratic rule became a mirage as a result of prevalent insecurity in Nigeria; effort to bring lasting peace to all sections of the country had not yielded positive result till date. In the process of struggling for democracy among ethnic groups in Nigeria, they had instituted various militia groups defending the interest of their identity due to unequal distribution of wealth by military junta. When democracy came on board, these various militia groups became demons hunting democratic institutions. Quest by the successful government to find lasting solution has proved abortive. The security of politics which guaranteed stability is not visible in Nigeria, what we have now is politics of security. The unrest in Nigeria today has cripple socio-political and economy of the nation; the growth of economy favored elites without meaningful impact on the common man. This paper focus on the effects of democracy on Nigerians and, how security under democratic rule has hindered dividends of democracy since 1999-till date and way forward. The source is strictly base on secondary source from textbook, newspapers, internet, and journals.

Keywords: democracy, interest, militia, security

Procedia PDF Downloads 328
8629 Attitude of Tertiary Students on Multiculturalism in Indonesia

Authors: Budi Annisa Sidi

Abstract:

Present-day Indonesia maintains a narrative of a culturally plural but unified nation. At the same time, multicultural policies extend different degrees of recognition, accommodation, toleration and even discrimination towards different socio-cultural groups. In conjunction with different ethnographic landscapes across regions in Indonesia, this approach leads to a varied experience and understanding of national identity and multiculturalism among people. As a result, governments seeking to maintain national unity while practicing multiculturalism have to juggle different expectations. This situation is examined through the microcosms of university students using questionnaires followed up by focus group discussions and personal interviews. A comparison between university students across four different provinces in Indonesia (Aceh, Jakarta, West Java and the Moluccas) highlights the influence of one’s surroundings on their perception of multiculturalism. Students in the more heterogeneous areas generally show more acceptance towards diversity compared to students in primarily homogenous areas who have little actual experience in dealing with diversity. Regardless of their environment, students claim to have positive feelings and a strong sense of attachment to Indonesia but hold different ideas of what constitutes an ideal Indonesian national identity.

Keywords: Indonesia, multiculturalism, national identity, nationalism

Procedia PDF Downloads 229
8628 A Location-based Authentication and Key Management Scheme for Border Surveillance Wireless Sensor Networks

Authors: Walid Abdallah, Noureddine Boudriga

Abstract:

Wireless sensor networks have shown their effectiveness in the deployment of many critical applications especially in the military domain. Border surveillance is one of these applications where a set of wireless sensors are deployed along a country border line to detect illegal intrusion attempts to the national territory and report this to a control center to undergo the necessary measures. Regarding its nature, this wireless sensor network can be the target of many security attacks trying to compromise its normal operation. Particularly, in this application the deployment and location of sensor nodes are of great importance for detecting and tracking intruders. This paper proposes a location-based authentication and key distribution mechanism to secure wireless sensor networks intended for border surveillance where the key establishment is performed using elliptic curve cryptography and identity-based public key scheme. In this scheme, the public key of each sensor node will be authenticated by keys that depend on its position in the monitored area. Before establishing a pairwise key between two nodes, each one of them must verify the neighborhood location of the other node using a message authentication code (MAC) calculated on the corresponding public key and keys derived from encrypted beacon messages broadcast by anchor nodes. We show that our proposed public key authentication and key distribution scheme is more resilient to node capture and node replication attacks than currently available schemes. Also, the achievement of the key distribution between nodes in our scheme generates less communication overhead and hence increases network performances.

Keywords: wireless sensor networks, border surveillance, security, key distribution, location-based

Procedia PDF Downloads 653
8627 Moving Towards Zero Waste in a UK Local Authority Area: Challenges to the Introduction of Separate Food Waste Collections

Authors: C. Cole, M. Osmani, A. Wheatley, M. Quddus

Abstract:

EU and UK Government targets for minimising and recycling household waste has led the responsible authorities to research the alternatives to landfill. In the work reported here the local waste collection authority (Charnwood Borough Council) has adopted the aspirational strategy of becoming a “Zero Waste Borough” to lead the drive for public participation. The work concludes that the separate collection of food waste would be needed to meet the two regulatory standards on recycling and biologically active wastes. An analysis of a neighbouring Authority (Newcastle-Under-Lyne Borough Council (NBC), a similar sized local authority that has a successful weekly food waste collection service was undertaken. Results indicate that the main challenges for Charnwood Borough Council would be gaining householder co-operation, the extra costs of collection and organising alternative treatment. The analysis also demonstrated that there was potential offset value via anaerobic digestion for CBC to overcome these difficulties and improve its recycling performance.

Keywords: England, food waste collections, household waste, local authority

Procedia PDF Downloads 409
8626 Terrorism and National Development: A Critique of Its Aftermath on Educational Attainment

Authors: David Chapola Nggada

Abstract:

Although the concept of terrorism is not a new phenomenon to Nigeria, the protracted terrorist activities experiencing in the north-eastern part of the country since 2009, had left an indelible mark on virtually every aspects of lives whether directly or indirectly, particularly the educational sector. Indeed, since the abduction of over 200 schoolgirls at Chibok in 2014 by the insurgence, education had witnessed a setback as most school remains closed for sometimes. The aftermath of this development on education and its future multiplier effect on national development is a source of concern. Consequently, this paper is designed to examine the consequences of terrorism on educational attainment and national development among the Chibok community of Borno State. The technique employed involves a mixture of both qualitative and quantitative research work on a sample size of 79 secondary school students currently displaced from Chibok, Damboa and Askira-Uba, now residing as internally displaced persons(IDPs) in Biu, Gombe, Maiduguri. A random sample technique is used. Structured and semi-unstructured questionnaire were administered. The result shows that, a significant number of students over these years, lacked access to education and this posed a great danger to national development. Recommendations towards reinvigorating education as a panacea to social, economic cum political vices were articulated. Concerted effort should be made to create confidence in the community.

Keywords: education, effect, terrorism, national, development

Procedia PDF Downloads 257
8625 Freedom of Information and Freedom of Expression

Authors: Amin Pashaye Amiri

Abstract:

Freedom of information, according to which the public has a right to have access to government-held information, is largely considered as a tool for improving transparency and accountability in governments, and as a requirement of self-governance and good governance. So far, more than ninety countries have recognized citizens’ right to have access to public information. This recognition often took place through the adoption of an act referred to as “freedom of information act”, “access to public records act”, and so on. A freedom of information act typically imposes a positive obligation on a government to initially and regularly release certain public information, and also obliges it to provide individuals with information they request. Such an act usually allows governmental bodies to withhold information only when it falls within a limited number of exemptions enumerated in the act such as exemptions for protecting privacy of individuals and protecting national security. Some steps have been taken at the national and international level towards the recognition of freedom of information as a human right. Freedom of information was recognized in a few countries as a part of freedom of expression, and therefore, as a human right. Freedom of information was also recognized by some international bodies as a human right. The Inter-American Court of Human Rights ruled in 2006 that Article 13 of the American Convention on Human Rights, which concerns the human right to freedom of expression, protects the right of all people to request access to government information. The European Court of Human Rights has recently taken a considerable step towards recognizing freedom of information as a human right. However, in spite of the measures that have been taken, public access to government information is not yet widely accepted as an international human right. The paper will consider the degree to which freedom of information has been recognized as a human right, and study the possibility of widespread recognition of such a human right in the future. It will also examine the possible benefits of such recognition for the development of the human right to free expression.

Keywords: freedom of information, freedom of expression, human rights, government information

Procedia PDF Downloads 546
8624 Understanding the Influence of Cross-National Distances on Tourist Expenditure

Authors: Wei-Ting Hung

Abstract:

Inbound tourist expenditure might not only have influenced by individual tourist characteristics but may also be affected by nationality characteristics. The cross national distance effects on tourist consumption behavior should be incorporated in the analytical framework. Additionally, the often used factor analysis, cluster analysis and regression analysis overlook the hierarchical tourist consumption data structure and may lead to misleading results. The objectives of the present study were twofold. First, we propose a multilevel model that takes individual and cross-national differences into account under a hierarchical framework. Second, we further sought to determine the types of cross-national differences affecting tourist expenditure. Thus, this study incorporates the individual tourist effects and cross national distance effects simultaneously, uses the data of 2010 Annual Survey Report on Visitors’ Expenditure and Trends in Taiwan to investigate the determinants of inbound tourist expenditure. Multilevel analysis was used to investigate the influence of individual tourist effects and cross national distance effects on inbound tourist expenditure. The empirical results show that cross national distance plays a crucial role in tourist consumption behavior. Our findings also indicate age and income have positive influence on tourism expenditure., whereas education and gender do not have significant impact. Regarding macro-level factors, geographic and cultural differences exhibited significant positive relationships on tourism expenditure, while economic differences did not. Based on the above empirical results, it is suggested that tour operators should take tourists’ individual attributes, particularly their income and age, into consideration when arranging tours. In addition, nationality holds sway over tourists’ consumption behavior, of which geographic and cultural differences are the two major factors at play. The empirical results of this study serve as practical suggestions for tourism marketing strategies and policy implications for government policies.

Keywords: cross national distance, inbound tourist, multilevel analysis, tourist expenditure

Procedia PDF Downloads 357
8623 Partnering with Stakeholders to Secure Digitization of Water

Authors: Sindhu Govardhan, Kenneth G. Crowther

Abstract:

Modernisation of the water sector is leading to increased connectivity and integration of emerging technologies with traditional ones, leading to new security risks. The convergence of Information Technology (IT) with Operation Technology (OT) results in solutions that are spread across larger geographic areas, increasingly consist of interconnected Industrial Internet of Things (IIOT) devices and software, rely on the integration of legacy with modern technologies, use of complex supply chain components leading to complex architectures and communication paths. The result is that multiple parties collectively own and operate these emergent technologies, threat actors find new paths to exploit, and traditional cybersecurity controls are inadequate. Our approach is to explicitly identify and draw data flows that cross trust boundaries between owners and operators of various aspects of these emerging and interconnected technologies. On these data flows, we layer potential attack vectors to create a frame of reference for evaluating possible risks against connected technologies. Finally, we identify where existing controls, mitigations, and other remediations exist across industry partners (e.g., suppliers, product vendors, integrators, water utilities, and regulators). From these, we are able to understand potential gaps in security, the roles in the supply chain that are most likely to effectively remediate those security gaps, and test cases to evaluate and strengthen security across these partners. This informs a “shared responsibility” solution that recognises that security is multi-layered and requires collaboration to be successful. This shared responsibility security framework improves visibility, understanding, and control across the entire supply chain, and particularly for those water utilities that are accountable for safe and continuous operations.

Keywords: cyber security, shared responsibility, IIOT, threat modelling

Procedia PDF Downloads 69
8622 Assessing the Impact of Renewable Energy on Regional Sustainability: A Comparative Study of Suwon and Seoul

Authors: Jongsoo Jurng

Abstract:

The drive to expand renewable energies is often in direct conflict with sustainable development goals. Thus, it is important that energy policies account for potential trade-offs. We assess the interlinkages between energy, food, water, and land, for two case studies, Suwon and Seoul. We apply a range of assessment methods and study their usefulness as tools to identify trade-offs and to compare the sustainability performance. We calculate cross-sectoral footprints, self-sufficiency ratios and perform a simplified Energy-Water-Food nexus analysis. We use the latter for assessing scenarios to increase energy and food self-sufficiency in Suwon, while we use ecosystem service (ESS) accounting for Seoul. For Suwon, we find that constraints on the energy, food and water sectors urgently call for integrated approaches to energy policy; for Seoul, the further expansion of renewables comes at the expense of cultural and supporting ESS, which could outweigh gains from increased energy exports. We recommend a general upgrade to indicators and visualization methods that look beyond averages and a fostering of infrastructure for data on sustainable development based on harmonized international protocols. We warn against rankings of countries or regions based on benchmarks that are neither theory-driven nor location-specific.

Keywords: ESS, renewable energy, energy-water-food nexus, assessment

Procedia PDF Downloads 131
8621 Development of Protein-based Emulsion Gels For Food Structuring

Authors: Baigts-Allende Diana, Klojdová Iveta, Kozlu Ali, Metri-ojeda Jorge

Abstract:

Emulsion gels are constituted by a colloidal system (emulsion) stabilized by a polymeric gel matrix. These systems are more homogeneous and stable than conventional emulsions and can behave as either gel-like or soft-solid. Protein-based emulsion gels (PEG) have been used as carrier systems of bioactive compounds and as food structuring to improve the texture and consistency, mainly in producing low-fat content products. This work studied the effect of protein: polysaccharide ratio 0.75:1.25, 1:1, and 1.25:0.75 (levels -1, 0, and +1) and pH values (2-9) on the stability of protein-based emulsion gels using soy protein isolate and sodium alginate. Protein emulsion capacity was enhaced with increased pH (6,7,8 and 9) compared to acid pH values. The smaller particle size for PEG was at pH 9 (~23µm); however, with increasing protein ratio (level +1), higher particle size was observed (~23µm). The same trend was observed for rheological measurements; the consistency index (K) increased at pH 9 for level -1 (1.17) in comparison to level +1 (0.45). The studied PEG showed good thermal stability at neutral and pH 9 (~98 %) for all biopolymer ratios. Optimal conditions in pH and biopolymer ratios were determined for PEG using soy protein and sodium alginate ingredients with potential use in elaborating stable systems for broad application in the food sector.

Keywords: emulsion gels, food structuring, biopolymers, food systems

Procedia PDF Downloads 71
8620 Inhibition of Food Borne Pathogens by Bacteriocinogenic Enterococcus Strains

Authors: Neha Farid

Abstract:

Due to the abuse of antimicrobial medications in animal feed, the occurrence of multi-drug resistant (MDR) pathogens in foods is currently a growing public health concern on a global scale. MDR infections have the potential to penetrate the food chain by posing a serious risk to both consumers and animals. Food pathogens are those biological agents that have the tendency to cause pathogenicity in the host body upon ingestion. The major reservoirs of foodborne pathogens include food-producing fauna like cows, pigs, goats, sheep, deer, etc. The intestines of these animals are highly condensed with several different types of food pathogens. Bacterial food pathogens are the main cause of foodborne disease in humans; almost 66% of the reported cases of food illness in a year are caused by the infestation of bacterial food pathogens. When ingested, these pathogens reproduce and survive or form different kinds of toxins inside host cells causing severe infections. The genus Listeria consists of gram-positive, rod-shaped, non-spore-forming bacteria. The disease caused by Listeria monocytogenes is listeriosis or gastroenteritis, which induces fever, vomiting, and severe diarrhea in the affected body. Campylobacter jejuni is a gram-negative, curved-rod-shaped bacteria causing foodborne illness. The major source of Campylobacter jejuni is livestock and poultry; particularly, chicken is highly colonized with Campylobacter jejuni. Serious public health concerns include the widespread growth of bacteria that are resistant to antibiotics and the slowing in the discovery of new classes of medicines. The objective of this study is to provide some potential antibacterial activities with certain broad-range antibiotics and our desired bacteriocins, i.e., Enterococcus faecium from specific strains preventing microbial contamination pathways in order to safeguard the food by lowering food deterioration, contamination, and foodborne illnesses. The food pathogens were isolated from various sources of dairy products and meat samples. The isolates were tested for the presence of Listeria and Campylobacter by gram staining and biochemical testing. They were further sub-cultured on selective media enriched with the growth supplements for Listeria and Campylobacter. All six strains of Listeria and Campylobacter were tested against ten antibiotics. Campylobacter strains showed resistance against all the antibiotics, whereas Listeria was found to be resistant only against Nalidixic Acid and Erythromycin. Further, the strains were tested against the two bacteriocins isolated from Enterococcus faecium. It was found that bacteriocins showed better antimicrobial activity against food pathogens. They can be used as a potential antimicrobial for food preservation. Thus, the study concluded that natural antimicrobials could be used as alternatives to synthetic antimicrobials to overcome the problem of food spoilage and severe food diseases.

Keywords: food pathogens, listeria, campylobacter, antibiotics, bacteriocins

Procedia PDF Downloads 65
8619 Symmetric Arabic Language Encryption Technique Based on Modified Playfair Algorithm

Authors: Fairouz Beggas

Abstract:

Due to the large number of exchanges in the networks, the security of communications is essential. Most ways of keeping communication secure rely on encryption. In this work, a symmetric encryption technique is offered to encrypt and decrypt simple Arabic scripts based on a multi-level security. A proposed technique uses an idea of Playfair encryption with a larger table size and an additional layer of encryption to ensure more security. The idea of the proposed algorithm aims to generate a dynamic table that depends on a secret key. The same secret key is also used to create other secret keys to over-encrypt the plaintext in three steps. The obtained results show that the proposed algorithm is faster in terms of encryption/decryption speed and can resist to many types of attacks.

Keywords: arabic data, encryption, playfair, symmetric algorithm

Procedia PDF Downloads 83
8618 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 260
8617 Alignment between Governance Structures and Food Safety Standards on the Shrimp Supply Chain in Indonesia

Authors: Maharani Yulisti, Amin Mugera, James Fogarty

Abstract:

Food safety standards have received significant attention in the fisheries global market due to health issues, free trade agreements, and increasing aquaculture production. Vertical coordination throughout the supply chain of fish producing and exporting countries is needed to meet food safety demands imposed by importing countries. However, the complexities of the supply chain governance structures and difficulties in standard implementation can generate safety uncertainty and high transaction costs. Using a Transaction Cost Economics framework, this paper examines the alignment between food safety standards and the governance structures in the shrimp supply chain in Indonesia. We find the supply chain is organized closer to the hierarchy-like governance structure where private standard (organic standard) are implemented and more towards a market-like governance structure where public standard (IndoGAP certification) are more prevalent. To verify the statements, two cases are examined from Sidoarjo district as a centre of shrimp production in Indonesia. The results show that public baseline FSS (Food Safety Standards) need additional mechanism to achieve a coordinated chain-wide response because uncertainty, asset specificity, and performance measurement problems are high in this chain. Organic standard as private chain-wide FSS is more efficient because it has been achieved by hierarchical-like type of governance structure.

Keywords: governance structure, shrimp value chain, food safety standards, transaction costs economics

Procedia PDF Downloads 375
8616 Autophagy in the Midgut Epithelium of Spodoptera exigua Hübner (Lepidoptera: Noctuidae) Larvae Exposed to Various Cadmium Concentration - 6-Generational Exposure

Authors: Magdalena Maria Rost-Roszkowska, Alina Chachulska-Żymełka, Monika Tarnawska, Maria Augustyniak, Alina Kafel, Agnieszka Babczyńska

Abstract:

Autophagy is a form of cell remodeling in which an internalization of organelles into vacuoles that are called autophagosomes occur. Autophagosomes are the targets of lysosomes, thus causing digestion of cytoplasmic components. Eventually, it can lead to the death of the entire cell. However, in response to several stress factors, e.g., starvation, heavy metals (e.g., cadmium) autophagy can also act as a pro-survival factor, protecting the cell against its death. The main aim of our studies was to check if the process of autophagy, which could appear in the midgut epithelium after Cd treatment, can be fixed during the following generations of insects. As a model animal, we chose the beet armyworm Spodoptera exigua Hübner (Lepidoptera: Noctuidae), a well-known polyphagous pest of many vegetable crops. We analyzed specimens at final larval stage (5th larval stage), due to its hyperfagy, resulting in great amount of cadmium assimilate. The culture consisted of two strains: a control strain (K) fed a standard diet, and a cadmium strain (Cd), fed on standard diet supplemented with cadmium (44 mg Cd per kg of dry weight of food) for 146 generations, both strains. In addition, the control insects were transferred to the Cd supplemented diet (5 mg Cd per kg of dry weight of food, 10 mg Cd per kg of dry weight of food, 20 mg Cd per kg of dry weight of food, 44 mg Cd per kg of dry weight of food). Therefore, we obtained Cd1, Cd2, Cd3 and KCd experimental groups. Autophagy has been examined using transmission electron microscope. During this process, degenerated organelles were surrounded by a membranous phagophore and enclosed in an autophagosome. Eventually, after the autophagosome fused with a lysosome, an autolysosome was formed and the process of the digestion of organelles began. During the 1st year of the experiment, we analyzed specimens of 6 generations in all the lines. The intensity of autophagy depends significantly on the generation, tissue and cadmium concentration in the insect rearing medium. In the Ist, IInd, IIIrd, IVth, Vth and VIth generation the intensity of autophagy in the midguts from cadmium-exposed strains decreased gradually according to the following order of strains: Cd1, Cd2, Cd3 and KCd. The higher amount of cells with autophagy was observed in Cd1 and Cd2. However, it was still higher than the percentage of cells with autophagy in the same tissues of the insects from the control and multigenerational cadmium strain. This may indicate that during 6-generational exposure to various Cd concentration, a preserved tolerance to cadmium was not maintained. The study has been financed by the National Science Centre Poland, grant no 2016/21/B/NZ8/00831.

Keywords: autophagy, cell death, digestive system, ultrastructure

Procedia PDF Downloads 231