Search results for: nutrition security
2361 SWOT Analysis on the Prospects of Carob Use in Human Nutrition: Crete, Greece
Authors: Georgios A. Fragkiadakis, Antonia Psaroudaki, Theodora Mouratidou, Eirini Sfakianaki
Abstract:
Research: Within the project "Actions for the optimal utilization of the potential of carob in the Region of Crete" which is financed-supervised by the Region, with collaboration of Crete University and Hellenic Mediterranean University, a SWOT (strengths, weaknesses, opportunities, threats) survey was carried out, to evaluate the prospects of carob in human nutrition, in Crete. Results and conclusions: 1). Strengths: There exists a local production of carob for human consumption, based on international reports, and local-product reports. The data on products in the market (over 100 brands of carob food), indicates a sufficiency of carob materials offered in Crete. The variety of carob food products retailed in Crete indicates a strong demand-production-consumption trend. There is a stable number (core) of businesses that invest significantly (Creta carob, Cretan mills, etc.). The great majority of the relevant food stores (bakery, confectionary etc.) do offer carob products. The presence of carob products produced in Crete is strong on the internet (over 20 main professionally designed websites). The promotion of the carob food-products is based on their variety and on a few historical elements connected with the Cretan diet. 2). Weaknesses: The international prices for carob seed affect the sector; the seed had an international price of €20 per kg in 2021-22 and fell to €8 in 2022, causing losses to carob traders. The local producers do not sort the carobs they deliver for processing, causing 30-40% losses of the product in the industry. The occasional high price triggers the collection of degraded raw material; large losses may emerge due to the action of insects. There are many carob trees whose fruits are not collected, e.g. in Apokoronas, Chania. The nutritional and commercial value of the wild carob fruits is very low. Carob trees-production is recorded by Greek statistical services as "other cultures" in combination with prickly pear i.e., creating difficulties in retrieving data. The percentage of carob used for human nutrition, in contrast to animal feeding, is not known. The exact imports of carob are not closely monitored. We have no data on the recycling of carob by-products in Crete. 3). Opportunities: The development of a culture of respect for carob trade may improve professional relations in the sector. Monitoring carob market and connecting production with retailing-industry needs may allow better market-stability. Raw material evaluation procedures may be implemented to maintain carob value-chain. The state agricultural services may be further involved in carob-health protection. The education of farmers on carob cultivation/management, can improve the quality of the product. The selection of local productive varieties, may improve the sustainability of the culture. Connecting the consumption of carob with health-food products, may create added value in the sector. The presence and extent of wild carob threes in Crete, represents, potentially, a target for grafting. 4). Threats: The annual fluctuation of carob yield challenges the programming of local food industry activities. Carob is a forest species also - there is danger of wrong classification of crops as forest areas, where land ownership is not clear.Keywords: human nutrition, carob food, SWOT analysis, crete, greece
Procedia PDF Downloads 1022360 Blind Watermarking Using Discrete Wavelet Transform Algorithm with Patchwork
Authors: Toni Maristela C. Estabillo, Michaela V. Matienzo, Mikaela L. Sabangan, Rosette M. Tienzo, Justine L. Bahinting
Abstract:
This study is about blind watermarking on images with different categories and properties using two algorithms namely, Discrete Wavelet Transform and Patchwork Algorithm. A program is created to perform watermark embedding, extraction and evaluation. The evaluation is based on three watermarking criteria namely: image quality degradation, perceptual transparency and security. Image quality is measured by comparing the original properties with the processed one. Perceptual transparency is measured by a visual inspection on a survey. Security is measured by implementing geometrical and non-geometrical attacks through a pass or fail testing. Values used to measure the following criteria are mostly based on Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). The results are based on statistical methods used to interpret and collect data such as averaging, z Test and survey. The study concluded that the combined DWT and Patchwork algorithms were less efficient and less capable of watermarking than DWT algorithm only.Keywords: blind watermarking, discrete wavelet transform algorithm, patchwork algorithm, digital watermark
Procedia PDF Downloads 2712359 Secure Text Steganography for Microsoft Word Document
Authors: Khan Farhan Rafat, M. Junaid Hussain
Abstract:
Seamless modification of an entity for the purpose of hiding a message of significance inside its substance in a manner that the embedding remains oblivious to an observer is known as steganography. Together with today's pervasive registering frameworks, steganography has developed into a science that offers an assortment of strategies for stealth correspondence over the globe that must, however, need a critical appraisal from security breach standpoint. Microsoft Word is amongst the preferably used word processing software, which comes as a part of the Microsoft Office suite. With a user-friendly graphical interface, the richness of text editing, and formatting topographies, the documents produced through this software are also most suitable for stealth communication. This research aimed not only to epitomize the fundamental concepts of steganography but also to expound on the utilization of Microsoft Word document as a carrier for furtive message exchange. The exertion is to examine contemporary message hiding schemes from security aspect so as to present the explorative discoveries and suggest enhancements which may serve a wellspring of information to encourage such futuristic research endeavors.Keywords: hiding information in plain sight, stealth communication, oblivious information exchange, conceal, steganography
Procedia PDF Downloads 2442358 A Model to Assist Military Mission Planners in Identifying and Assessing Variables Impacting Food Security
Authors: Lynndee Kemmet
Abstract:
The U.S. military plays an increasing role in supporting political stability efforts, and this includes efforts to prevent the food insecurity that can trigger political and social instability. This paper presents a model that assists military commanders in identifying variables that impact food production and distribution in their areas of operation (AO), in identifying connections between variables and in assessing the impacts of those variables on food production and distribution. Through use of the model, military units can better target their data collection efforts and can categorize and analyze data within the data categorization framework most widely-used by military forces—PMESII-PT (Political, Military, Economic, Infrastructure, Information, Physical Environment and Time). The model provides flexibility of analysis in that commanders can target analysis to be highly focused on a specific PMESII-PT domain or variable or conduct analysis across multiple PMESII-PT domains. The model is also designed to assist commanders in mapping food systems in their AOs and then identifying components of those systems that must be strengthened or protected.Keywords: food security, food system model, political stability, US Military
Procedia PDF Downloads 1992357 Multisignature Schemes for Reinforcing Trust in Cloud Software-As-A-Service Services
Authors: Mustapha Hedabou, Ali Azougaghe, Ahmed Bentajer, Hicham Boukhris, Mourad Eddiwani, Zakaria Igarramen
Abstract:
Software-as-a-service (SaaS) is emerging as a dominant approach to delivering software. It encompasses a range of business, technical opportunities, issue, and challenges. Trustiness in the cloud services regarding the security and the privacy of the delivered data is the most critical issue with the SaaS model. In this paper, we survey the security concerns related to the SaaS model, and we propose the design of a trusted SaaS model that gives users more confidence into SaaS services by leveraging a trust in a neutral source code certifying authority. The proposed design is based on the use of the multisignature mechanism for signing the source code of the application service. In our model, the cloud provider acts as a root of trust by ensuring the integrity of the application service when it was running on its platform. The proposed design prevents insider attacks from tampering with application service before and after it was launched in a cloud provider platform.Keywords: cloud computing, SaaS Platform, TPM, trustiness, code source certification, multi-signature schemes
Procedia PDF Downloads 2802356 Applications of Greenhouse Data in Guatemala in the Analysis of Sustainability Indicators
Authors: Maria A. Castillo H., Andres R. Leandro, Jose F. Bienvenido B.
Abstract:
In 2015, Guatemala officially adopted the Sustainable Development Goals (SDG) according to the 2030 Agenda agreed by the United Nations Organization. In 2016, these objectives and goals were reviewed, and the National Priorities were established within the K'atún 2032 National Development Plan. In 2019 and 2021, progress was evaluated with 120 defined indicators, and the need to improve quality and availability of statistical data necessary for the analysis of sustainability indicators was detected, so the values to be reached in 2024 and 2032 were adjusted. The need for greater agricultural technology is one of the priorities established within SDG 2 "Zero Hunger". Within this area, protected agricultural production provides greater productivity throughout the year, reduces the use of chemical products to control pests and diseases, reduces the negative impact of climate and improves product quality. During the crisis caused by Covid-19, there was an increase in exports of fruits and vegetables produced in greenhouses from Guatemala. However, this information has not been considered in the 2021 revision of the Plan. The objective of this study is to evaluate the information available on Greenhouse Agricultural Production and its integration into the Sustainability Indicators for Guatemala. This study was carried out in four phases: 1. Analysis of the Goals established for SDG 2 and the indicators included in the K'atún Plan. 2. Analysis of Environmental, Social and Economic Indicator Models. 3. Definition of territorial levels in 2 geographic scales: Departments and Municipalities. 4. Diagnosis of the available data on technological agricultural production with emphasis on Greenhouses at the 2 geographical scales. A summary of the results is presented for each phase and finally some recommendations for future research are added. The main contribution of this work is to improve the available data that allow the incorporation of some agricultural technology indicators in the established goals, to evaluate their impact on Food Security and Nutrition, Employment and Investment, Poverty, the use of Water and Natural Resources, and to provide a methodology applicable to other production models and other geographical areas.Keywords: greenhouses, protected agriculture, sustainable indicators, Guatemala, sustainability, SDG
Procedia PDF Downloads 882355 Geothermal Resources to Ensure Energy Security During Climate Change
Authors: Debasmita Misra, Arthur Nash
Abstract:
Energy security and sufficiency enables the economic development and welfare of a nation or a society. Currently, the global energy system is dominated by fossil fuels, which is a non-renewable energy resource, which renders vulnerability to energy security. Hence, many nations have begun augmenting their energy system with renewable energy resources, such as solar, wind, biomass and hydro. However, with climate change, how sustainable are some of the renewable energy resources in the future is a matter of concern. Geothermal energy resources have been underexplored or underexploited in global renewable energy production and security, although it is gaining attractiveness as a renewable energy resource. The question is, whether geothermal energy resources are more sustainable than other renewable energy resources. High-temperature reservoirs (> 220 °F) can produce electricity from flash/dry steam plants as well as binary cycle production facilities. Most of the world’s high enthalpy geothermal resources are within the seismo-tectonic belt. However, exploration for geothermal energy is of great importance in conventional geothermal systems in order to improve its economic viability. In recent years, there has been an increase in the use and development of several exploration methods for geo-thermal resources, such as seismic or electromagnetic methods. The thermal infrared band of the Landsat can reflect land surface temperature difference, so the ETM+ data with specific grey stretch enhancement has been used to explore underground heat water. Another way of exploring for potential power is utilizing fairway play analysis for sites without surface expression and in rift zones. Utilizing this type of analysis can improve the success rate of project development by reducing exploration costs. Identifying the basin distribution of geologic factors that control the geothermal environment would help in identifying the control of resource concentration aside from the heat flow, thus improving the probability of success. The first step is compiling existing geophysical data. This leads to constructing conceptual models of potential geothermal concentrations which can then be utilized in creating a geodatabase to analyze risk maps. Geospatial analysis and other GIS tools can be used in such efforts to produce spatial distribution maps. The goal of this paper is to discuss how climate change may impact renewable energy resources and how could a synthesized analysis be developed for geothermal resources to ensure sustainable and cost effective exploitation of the resource.Keywords: exploration, geothermal, renewable energy, sustainable
Procedia PDF Downloads 1552354 Impact of Bio Preparations on Agro-Chemical Indexes and Fruit Mineral Composition of Mandarin (Citrus Reticulata) Orchard
Authors: Nunu Nakashidze, Shota Lominadze, Darejan Jashi
Abstract:
Citrus culture used to be one of the leading fields of sub-tropical agriculture in Georgia and especially in Adjara region, but the citrus production has been significantly decreased in recent years due to deterioration of quality index of fruit and reduction of sale markets. The fact severely affected both the economy of Republic and population. Intensive technologies of citrus fruit production are widely implemented in the world practices, which include the following: variety of species, consumption of fertilizers and chemicals, proper use of fruit production and etc. However working on technologies which ensure getting of high quality and plentiful product is very much important if taking into consideration modern, global ecological problems. Using of bio-preparations for plant nourishment is considered as one of the activities. The present work discusses liquid organic fertilizer 'Biorag' produced in Georgia and influence of its growth stimulation (Gakhokidze N1, N2, N3) on agrochemical index of soils and mineral composition of fruit of Citrus Unshiu orchards cultivated in the sub-tropical zone of Black Sea in Adjara region. It was ascertained that liquid organic fertilizers used in the orchard of citrus 'Unshiu' and influence of growth stimulators on the quality index of fruit are not clearly shown in comparison with control one. A small priority is noticed in case of growth stimulators. In conditions of red soils, liquid organic fertilizers and growth stimulators added in the nutrition of the citrus more or less influence the dry material of fruit and the composition of ash and nutrition elements. Agro-chemical index of the soil, except exchange acidity, is somehow enlarged which is one of the positive results in this case.Keywords: growth stimulator, liquid fertilizer, plant, fruit, soil
Procedia PDF Downloads 2882353 The Construction of Women’s Leadership in the Swedish Armed Forces in the Context of the Women, Peace and Security Agenda
Authors: Sofia Sutera
Abstract:
Despite the introduction of the Women, Peace, and Security (WPS) Agenda in 2000, thanks to the UNSCR 1325 and subsequent resolutions, and the clear stance of the UN towards the support of increased participation of women in peace and security processes, women’s leadership in this context remains very low. Considering specifically the framework of peacekeeping operations, the aim of this paper is to analyze the way women’s leadership is constructed in the Swedish Armed Forces (SAF). In the context of the WPS Agenda, Sweden has been chosen as a case study because of the relevance of its singular feminist policies (the statement in 2014 from Wallström, previous and current Minister for Foreign Affairs and Deputy Prime Minister, that Sweden is pursuing a feminist foreign policy is a clear example). Moreover, the SAF adopted in 2016 the Handbok Gender. This policy addresses explicitly the gender perspective embraced by the Swedish military institution, a sui-generis organization even in the Scandinavian reality. Indeed, the SAF has assumed a clear commitment to represent its institution as gender aware and gender equal. The theoretical perspective utilized in this research, which focuses specifically on women, is feminism and particularly a feminist constructivist approach, with an institutional focus on the military institution, has been chosen. Taking into account the specificity of the feminist research, the above-mentioned gender policy has been examined by means of a critical discourse analysis (CDA) whose main aim is to investigate the social structures of discourse and the power relationships inherent to it. Thus, CDA appears to be quite relevant in order to understand the construction of women’s leadership in the Handbok Gender. Nevertheless, even in a country which officially identifies as feminist and which is characterized by a peculiar military institution, the conclusions of this analysis revealed that women’s leadership in peacekeeping operations remains very low.Keywords: feminism, peacekeeping operations, swedish armed forces, UNSCR 1325, women's leadership, WPS agenda
Procedia PDF Downloads 1372352 Profiling Risky Code Using Machine Learning
Authors: Zunaira Zaman, David Bohannon
Abstract:
This study explores the application of machine learning (ML) for detecting security vulnerabilities in source code. The research aims to assist organizations with large application portfolios and limited security testing capabilities in prioritizing security activities. ML-based approaches offer benefits such as increased confidence scores, false positives and negatives tuning, and automated feedback. The initial approach using natural language processing techniques to extract features achieved 86% accuracy during the training phase but suffered from overfitting and performed poorly on unseen datasets during testing. To address these issues, the study proposes using the abstract syntax tree (AST) for Java and C++ codebases to capture code semantics and structure and generate path-context representations for each function. The Code2Vec model architecture is used to learn distributed representations of source code snippets for training a machine-learning classifier for vulnerability prediction. The study evaluates the performance of the proposed methodology using two datasets and compares the results with existing approaches. The Devign dataset yielded 60% accuracy in predicting vulnerable code snippets and helped resist overfitting, while the Juliet Test Suite predicted specific vulnerabilities such as OS-Command Injection, Cryptographic, and Cross-Site Scripting vulnerabilities. The Code2Vec model achieved 75% accuracy and a 98% recall rate in predicting OS-Command Injection vulnerabilities. The study concludes that even partial AST representations of source code can be useful for vulnerability prediction. The approach has the potential for automated intelligent analysis of source code, including vulnerability prediction on unseen source code. State-of-the-art models using natural language processing techniques and CNN models with ensemble modelling techniques did not generalize well on unseen data and faced overfitting issues. However, predicting vulnerabilities in source code using machine learning poses challenges such as high dimensionality and complexity of source code, imbalanced datasets, and identifying specific types of vulnerabilities. Future work will address these challenges and expand the scope of the research.Keywords: code embeddings, neural networks, natural language processing, OS command injection, software security, code properties
Procedia PDF Downloads 1112351 Cloud Monitoring and Performance Optimization Ensuring High Availability
Authors: Inayat Ur Rehman, Georgia Sakellari
Abstract:
Cloud computing has evolved into a vital technology for businesses, offering scalability, flexibility, and cost-effectiveness. However, maintaining high availability and optimal performance in the cloud is crucial for reliable services. This paper explores the significance of cloud monitoring and performance optimization in sustaining the high availability of cloud-based systems. It discusses diverse monitoring tools, techniques, and best practices for continually assessing the health and performance of cloud resources. The paper also delves into performance optimization strategies, including resource allocation, load balancing, and auto-scaling, to ensure efficient resource utilization and responsiveness. Addressing potential challenges in cloud monitoring and optimization, the paper offers insights into data security and privacy considerations. Through this thorough analysis, the paper aims to underscore the importance of cloud monitoring and performance optimization for ensuring a seamless and highly available cloud computing environment.Keywords: cloud computing, cloud monitoring, performance optimization, high availability, scalability, resource allocation, load balancing, auto-scaling, data security, data privacy
Procedia PDF Downloads 622350 Phyto-Therapeutic, Functional and Nutritional Acclaims of Turnip (Brassica rapus L.): An Overview
Authors: Tabussam Tufail
Abstract:
Purpose: The core purpose of the current review article is to elaborate the phytochemicals present in turnip (brassica rapus l.) and also allied health claims. Plant-based foods contain a significant amount of bioactive compounds which provide desirable health benefits beyond the basic nutrition. Epidemiological evidence suggests that consumption of a diet rich in vegetables and fruits has positive implications for human health. Design: Potential of turnip peroxidase (TP) for the treatment of phenolic-contaminated solutions has been reviewed. However, issues of taste along with behavioral nutrition ought to be considered. So in the last decades, special attention has been paid towards edible plants, especially those that are rich in secondary metabolites (frequently called phytochemicals) and nowadays, there is an increasing interest in the antioxidant activity of such phytochemicals present in the diet. These chemicals favor nutritional and phytotherapy that is emerging as new concepts of health aid in recent years. Turnip is rich in these valuable ingredients though it can be employed as having health promoting and healing properties. Findings: Numerous bioactive components i.e. organic acids, phenolic compounds, turnip peroxidase, kaempeferol, vitamin-K, etc. are present in turnip. The review focused on the significance of plant derived (especially turnip) phenolic compounds as a source of certain beneficial compounds for human health. Owing to the presence of bioactive moieties, the turnip has high antioxidant activity, positive role in blood clotting, effectual in phenobarbital-induced sleeping time, effective against hepatic injury in diabetics and also have a good hepatoprotective role. Strong recommendations for consumption of nutraceuticals from turnip have become progressively popular to improve health, and to prevent from diseases.Keywords: phytochemicals, turnip, antioxidants, health benefits
Procedia PDF Downloads 2382349 Global Evidence on the Seasonality of Enteric Infections, Malnutrition, and Livestock Ownership
Authors: Aishwarya Venkat, Anastasia Marshak, Ryan B. Simpson, Elena N. Naumova
Abstract:
Livestock ownership is simultaneously linked to improved nutritional status through increased availability of animal-source protein, and increased risk of enteric infections through higher exposure to contaminated water sources. Agrarian and agro-pastoral households, especially those with cattle, goats, and sheep, are highly dependent on seasonally various environmental conditions, which directly impact nutrition and health. This study explores global spatiotemporally explicit evidence regarding the relationship between livestock ownership, enteric infections, and malnutrition. Seasonal and cyclical fluctuations, as well as mediating effects, are further examined to elucidate health and nutrition outcomes of individual and communal livestock ownership. The US Agency for International Development’s Demographic and Health Surveys (DHS) and the United Nations International Children's Emergency Fund’s Multi-Indicator Cluster Surveys (MICS) provide valuable sources of household-level information on anthropometry, asset ownership, and disease outcomes. These data are especially important in data-sparse regions, where surveys may only be conducted in the aftermath of emergencies. Child-level disease history, anthropometry, and household-level asset ownership information have been collected since DHS-V (2003-present) and MICS-III (2005-present). This analysis combines over 15 years of survey data from DHS and MICS to study 2,466,257 children under age five from 82 countries. Subnational (administrative level 1) measures of diarrhea prevalence, mean livestock ownership by type, mean and median anthropometric measures (height for age, weight for age, and weight for height) were investigated. Effects of several environmental, market, community, and household-level determinants were studied. Such covariates included precipitation, temperature, vegetation, the market price of staple cereals and animal source proteins, conflict events, livelihood zones, wealth indices and access to water, sanitation, hygiene, and public health services. Children aged 0 – 6 months, 6 months – 2 years, and 2 – 5 years of age were compared separately. All observations were standardized to interview day of year, and administrative units were harmonized for consistent comparisons over time. Geographically weighted regressions were constructed for each outcome and subnational unit. Preliminary results demonstrate the importance of accounting for seasonality in concurrent assessments of malnutrition and enteric infections. Household assets, including livestock, often determine the intensity of these outcomes. In many regions, livestock ownership affects seasonal fluxes in malnutrition and enteric infections, which are also directly affected by environmental and local factors. Regression analysis demonstrates the spatiotemporal variability in nutrition outcomes due to a variety of causal factors. This analysis presents a synthesis of evidence from global survey data on the interrelationship between enteric infections, malnutrition, and livestock. These results provide a starting point for locally appropriate interventions designed to address this nexus in a timely manner and simultaneously improve health, nutrition, and livelihoods.Keywords: diarrhea, enteric infections, households, livestock, malnutrition, seasonality
Procedia PDF Downloads 1292348 Assessing the Financial Impact of Federal Benefit Program Enrollment on Low-income Households
Authors: Timothy Scheinert, Eliza Wright
Abstract:
Background: Link Health is a Boston-based non-profit leveraging in-person and digital platforms to promote health equity. Its primary aim is to financially support low-income individuals through enrollment in federal benefit programs. This study examines the monetary impact of enrollment in several benefit programs. Methodologies: Approximately 17,000 individuals have been screened for eligibility via digital outreach, community events, and in-person clinics. Enrollment and financial distributions are evaluated across programs, including the Affordable Connectivity Program (ACP), Lifeline, LIHEAP, Transitional Aid to Families with Dependent Children (TAFDC), and the Supplemental Nutrition Assistance Program (SNAP). Major Findings: A total of 1,895 individuals have successfully applied, collectively distributing an estimated $1,288,152.00 in aid. The largest contributors to this sum include: ACP: 1,149 enrollments, $413,640 distributed annually. Child Care Financial Assistance (CCFA): 15 enrollments, $240,000 distributed annually. Lifeline: 602 enrollments, $66,822 distributed annually. LIHEAP: 25 enrollments, $48,750 distributed annually. SNAP: 41 enrollments, $123,000 distributed annually. TAFDC: 21 enrollments, $341,760 distributed annually. Conclusions: These results highlight the role of targeted outreach and effective enrollment processes in promoting access to federal benefit programs. High enrollment rates in ACP and Lifeline demonstrate a considerable need for affordable broadband and internet services. Programs like CCFA and TAFDC, despite lower enrollment numbers, provide sizable support per individual. This analysis advocates for continued funding of federal benefit programs. Future efforts can be made to develop screening tools that identify eligibility for multiple programs and reduce the complexity of enrollment.Keywords: benefits, childcare, connectivity, equity, nutrition
Procedia PDF Downloads 352347 A Comparison of Methods for Neural Network Aggregation
Authors: John Pomerat, Aviv Segev
Abstract:
Recently, deep learning has had many theoretical breakthroughs. For deep learning to be successful in the industry, however, there need to be practical algorithms capable of handling many real-world hiccups preventing the immediate application of a learning algorithm. Although AI promises to revolutionize the healthcare industry, getting access to patient data in order to train learning algorithms has not been easy. One proposed solution to this is data- sharing. In this paper, we propose an alternative protocol, based on multi-party computation, to train deep learning models while maintaining both the privacy and security of training data. We examine three methods of training neural networks in this way: Transfer learning, average ensemble learning, and series network learning. We compare these methods to the equivalent model obtained through data-sharing across two different experiments. Additionally, we address the security concerns of this protocol. While the motivating example is healthcare, our findings regarding multi-party computation of neural network training are purely theoretical and have use-cases outside the domain of healthcare.Keywords: neural network aggregation, multi-party computation, transfer learning, average ensemble learning
Procedia PDF Downloads 1662346 Analysis of Local Food Sources in Ethiopia
Authors: Bereket Amare Mulu
Abstract:
Ethiopia is one of the countries that consists of a huge variety of botanical resources as compared to the world. The agroclimatic is suitable for a variety of plants to grow effectively throughout the year. Sources of food plants are basic items for people in the world. Production of food items is a prior activity and needs more resources and attention to produce a huge amount of production. The local food is rich in nutrition and healthful foods. The local food is fresh and not exposed to infections easily. The community can easily get the food items in their surroundings. The local food sources are not expensive when it is compared to the other proceed food items, and it is affordable to the community purchasing power. The food is very tasty and palatable capacity by the whole community categories. The basic problems in Ethiopia are the community experiences some of the common food source items. On the contrary, inefficient food production, low economic growth, and climate variability affected food production. This leads to serious food shortages and acute health problems. The objective of the study is to identify local food sources and analyze the advantage and benefits of local food sources. Casava is one of the root crop plants in Ethiopia and easily adapts to any type of agroecology in every place in the country. 50 community members have been identified to prepare casava in different forms of food items. They have prepared in the forms of Bread, Injera, Porridge, Boiled casava, fried chips Casava, and Cocktails. The prepared food items have been exposed to the community as a food festival to eat and taste how much interesting Even though there is a cultural barrier to eating the food items, the community had the food and tasted it the food. The result showed that community awareness is still not addressed the benefits of local food sources yet. The local food has high nutritional value and healthful foods. The local food sources are fresh and easily produced in every place of the country.Keywords: bread, cassava, injera, nutrition
Procedia PDF Downloads 1092345 Violent Conflict and the Protection of Women from Sex and Gender-Based Violence: A Third World Feminist Critique of the United Nations Women, Peace, and Security Agenda
Authors: Seember Susan Aondoakura
Abstract:
This paper examines the international legal framework established to address the challenges women and girls experience in situations of violent conflict. The United Nations (UN) women, peace, and security agenda (hereafter WPS agenda, the Agenda) aspire to make wars safer for women. It recognizes women's agency in armed conflict and their victimization and formulates measures for their protection. The Agenda also acknowledges women's participation in conflict transformation and post-conflict reconstruction. It also calls for the involvement of women in conflict transformation, encourages the protection of women from sex and gender-based violence (SGBV), and provides relief and recovery from conflict-related SGBV. Using Third World Critical Feminist Theory, this paper argues that the WPS agenda overly focus on the protection of women from SGBV occurring in the less developed and conflict-ridden states in the global south, obscures the complicity of western states and economies to the problem, and silences the privileges that such states derive from war economies that continue to fuel conflict. This protectionist approach of the UN also obliterates other equally pressing problems in need of attention, like the high rates of economic degradation in conflict-ravaged societies of the global south. Prioritising protection also 'others' the problem, obliterating any sense of interconnections across geographical locations and situating women in the less developed economies of the global south as the victims and their men as the perpetrators. Prioritising protection ultimately situates western societies as saviours of Third World women with no recourse to their role in engendering and sustaining war. The paper demonstrates that this saviour mentality obliterates chances of any meaningful coalition between the local and the international in framing and addressing the issue, as solutions are formulated from a specific lens—the white hegemonic lens.Keywords: conflict, protection, security, SGBV
Procedia PDF Downloads 992344 Scenario Analysis to Assess the Competitiveness of Hydrogen in Securing the Italian Energy System
Authors: Gianvito Colucci, Valeria Di Cosmo, Matteo Nicoli, Orsola Maria Robasto, Laura Savoldi
Abstract:
The hydrogen value chain deployment is likely to be boosted in the near term by the energy security measures planned by European countries to face the recent energy crisis. In this context, some countries are recognized to have a crucial role in the geopolitics of hydrogen as importers, consumers and exporters. According to the European Hydrogen Backbone Initiative, Italy would be part of one of the 5 corridors that will shape the European hydrogen market. However, the set targets are very ambitious and require large investments to rapidly develop effective hydrogen policies: in this regard, scenario analysis is becoming increasingly important to support energy planning, and energy system optimization models appear to be suitable tools to quantitively carry on that kind of analysis. The work aims to assess the competitiveness of hydrogen in contributing to the Italian energy security in the coming years, under different price and import conditions, using the energy system model TEMOA-Italy. A wide spectrum of hydrogen technologies is included in the analysis, covering the production, storage, delivery, and end-uses stages. National production from fossil fuels with and without CCS, as well as electrolysis and import of low-carbon hydrogen from North Africa, are the supply solutions that would compete with other ones, such as natural gas, biomethane and electricity value chains, to satisfy sectoral energy needs (transport, industry, buildings, agriculture). Scenario analysis is then used to study the competition under different price and import conditions. The use of TEMOA-Italy allows the work to catch the interaction between the economy and technological detail, which is much needed in the energy policies assessment, while the transparency of the analysis and of the results is ensured by the full accessibility of the TEMOA open-source modeling framework.Keywords: energy security, energy system optimization models, hydrogen, natural gas, open-source modeling, scenario analysis, TEMOA
Procedia PDF Downloads 1212343 A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network
Authors: Abdulaziz Alsadhan, Naveed Khan
Abstract:
In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion Detection System (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw data set for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. These optimal feature subset used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.Keywords: Particle Swarm Optimization (PSO), Principle Component Analysis (PCA), Linear Discriminant Analysis (LDA), Local Binary Pattern (LBP), Support Vector Machine (SVM), Multilayer Perceptron (MLP)
Procedia PDF Downloads 3762342 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security
Authors: Abel Edeowede Abhulimen
Abstract:
Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.Keywords: performance, power industry, industrialization, security, energy
Procedia PDF Downloads 792341 An Empirical Study of Factors that Impact Government E-Services Acceptance by Citizens: Case Study from UAE
Authors: Emad Bataineh, Sara Al-Mutawa
Abstract:
The primary focus of this study is to investigate and identify the perceptions of potential end users relating to factors which impact on e-services acceptance. Technology Acceptance Model (TAM) has been adopted in this study as it can be extended when technologies are introduced. This research validates the developed TAM model and evaluates the variance of the outcome variable (acceptance of e-services). Five factors were adopted as determinants of acceptance of e-services: ease of use, security, trust, web skills, and language. The study was undertaken in the General Directorate of Residency and Foreigners Affairs (GDRFA) in the UAE. A quantitative survey methodology was adopted in this study, which surveyed 466 customers who use the GDRFA e-services. The overall findings revealed that security language, web skills and support significantly affected ease of use and perceived usefulness. However, the trust doesn’t affect the ease of use. Further, ease of use significantly affects intention to use and perceived usefulness while in turn intention to use was influenced by perceived usefulness. This study offers an understanding of people’s adoption of e-government services with the help of established theories such as TAM and various factors that influence the e-government adoption with reference to UAE.Keywords: e-government portal, e-service, usability, TAM model
Procedia PDF Downloads 4372340 An Analysis of Non-Elliptic Curve Based Primality Tests
Authors: William Wong, Zakaria Alomari, Hon Ching Lai, Zhida Li
Abstract:
Modern-day information security depends on implementing Diffie-Hellman, which requires the generation of prime numbers. Because the number of primes is infinite, it is impractical to store prime numbers for use, and therefore, primality tests are indispensable in modern-day information security. A primality test is a test to determine whether a number is prime or composite. There are two types of primality tests, which are deterministic tests and probabilistic tests. Deterministic tests are adopting algorithms that provide a definite answer whether a given number is prime or composite. While in probabilistic tests, a probabilistic result would be provided, there is a degree of uncertainty. In this paper, we review three probabilistic tests: the Fermat Primality Test, the Miller-Rabin Test, and the Baillie-PSW Test, as well as one deterministic test, the Agrawal-Kayal-Saxena (AKS) Test. Furthermore, we do an analysis of these tests. All of the reviews discussed are not based on the Elliptic Curve. The analysis demonstrates that, in the majority of real-world scenarios, the Baillie- PSW test’s favorability stems from its typical operational complexity of O(log 3n) and its capacity to deliver accurate results for numbers below 2^64.Keywords: primality tests, Fermat’s primality test, Miller-Rabin primality test, Baillie-PSW primality test, AKS primality test
Procedia PDF Downloads 942339 Sustaining Efficiency in Electricity Distribution to Enhance Effective Human Security for the Vulnerable People in Ghana
Authors: Anthony Nyamekeh-Armah Adjei, Toshiaki Aoki
Abstract:
The unreliable and poor efficiency of electricity distribution leading to frequent power outages and high losses are the major challenge facing the power distribution sector in Ghana. Distribution system routes electricity from the power generating station at a higher voltage through the transmission grid and steps it down through the low voltage lines to end users. Approximately all electricity problems and disturbances that have increased the call for renewable and sustainable energy in recent years have their roots in the distribution system. Therefore, sustaining electricity distribution efficiency can potentially contribute to the reserve of natural energy resources use in power generation, reducing greenhouse gas emission (GHG), decreasing tariffs for consumers and effective human security. Human Security is a people-centered approach where individual human being is the principal object of concern, focuses on protecting the vital core of all human lives in ways for meeting basic needs that enhance the safety and protection of individuals and communities. The vulnerability is the diminished capacity of an individual or group to anticipate, resist and recover from the effect of natural, human-induced disaster. The research objectives are to explore the causes of frequent power outages to consumers, high losses in the distribution network and the effect of poor electricity distribution efficiency on the vulnerable (poor and ordinary) people that mostly depend on electricity for their daily activities or life to survive. The importance of the study is that in a developing country like Ghana where raising a capital for new infrastructure project is difficult, it would be beneficial to enhance the efficiency that will significantly minimize the high energy losses, reduce power outage, to ensure safe and reliable delivery of electric power to consumers to secure the security of people’s livelihood. The methodology used in this study is both interview and questionnaire survey to analyze the response from the respondents on causes of power outages and high losses facing the electricity company of Ghana (ECG) and its effect on the livelihood on the vulnerable people. Among the outcome of both administered questionnaire and the interview survey from the field were; poor maintenance of existing sub-stations, use of aging equipment, use of poor distribution infrastructure and poor metering and billing system. The main observation of this paper is that the poor network efficiency (high losses and power outages) affects the livelihood of the vulnerable people. Therefore, the paper recommends that policymakers should insist on all regulation guiding electricity distribution to improve system efficiency. In conclusion, there should be decentralization of off-grid solar PV technologies to provide a sustainable and cost-effective, which can increase daily productivity and improve the quality of life of the vulnerable people in the rural communities.Keywords: electricity efficiency, high losses, human security, power outage
Procedia PDF Downloads 2882338 Tanzanian Food Origins and Protected Geographical Indications
Authors: Innocensia John, Henrik Egelyng, Razack Lokina
Abstract:
As the world`s population is constantly growing, food security has become a thorny trending issue. The impact has particularly been felt more in Africa as most of the people depend on food Agriculture products. Geographical Indications can aid in transforming the Tanzania agriculture-dependent economy through tapping the unique attributes of their quality products like soil, taste color etc. Consumers worldwide demand more uniquer products featuring a ´connect´ with the land use systems producing particular qualities. Tanzania has demonstrated the capacity to tap into the organic world market and has untapped potential for harvesting market value from geographical indications. This paper presents preliminary results from VALOR — a research project investigating conditions under which Tanzanian origin food producers can add value by incorporating territory specific cultural, environmental and social qualities into marketing, production and processing of unique local, niche and specialty products. Cases are investigated of the prospects for Tanzania to leapfrog perhaps into exports of geographical indications products, and certainly into allowing smallholders to create employment and build monetary value, while stewarding local food cultures and natural environments and resources, and increasing the diversity of supply of natural and unique quality products and so contribute to enhanced food security. Rice from Kyela, coffee and Sugar from Kilimanjaro, are some of the product cases investigated and provides for the in-depth case study, as ´landscape´ products incorporating ´taste of place´. Framework conditions for producers creating or capturing market value as stewards of cultural and landscape values and environments and institutional requirements for such creation or capturing to happen, including presence of export opportunities, are discussed.Keywords: food origins, food security, protected geographical indications, case study analysis
Procedia PDF Downloads 3062337 Cost and Non-affordability of a Nutritious Diet in Ethiopia: The Fill the Nutrient Gap Approach
Authors: Andinet Abera Hailu, Claudia Damu, Aregash Samuel, Saskia de Pee
Abstract:
Introduction: Ethiopia has made considerable progress in reducing stunting, yet 39% of children under five remain affected. Child wasting, micronutrient deficiencies, and poor quality of diets for children and adults are the main challenges faced by Ethiopians. Availability and access to nutritious foods and potential scenarios to improve affordability were assessed. Methodology: The Fill the Nutrient Gap (FNG) methodology was used. Cost of the diet software was used to optimize the cost and affordability of nutritious diets for a typical household. Monthly food price data (November 2018 to October 2019) was used to calculate the cost of the diet. Modeling of interventions was performed to identify potential entry points for policy implementers. Non-affordability of the modeled diets was estimated. Average per capita diet-related greenhouse gas (GHG) footprints for current diets and modeled diet scenarios were also evaluated. Result: Almost all households would be able to afford energy-only diets. However, only 25% of households could afford a nutritious diet. Diets containing multiple nutrients would cost four times more than energy-sufficient diets. Nutritious diets tended to cost more in areas where fewer foods were found on local markets (correlation coefficient =-0.62). A modeling scenario performed on multiple interventions showed a reduced monthly cost of a nutritious diet. The GHG emissions of optimized diets that meet nutrient needs were below the country’s emission target. Conclusion: Adolescent girls and women were at risk of inadequate diets as the cost of meeting their nutrient requirements was highest. Diet costs were predominantly driven by requirements for vitamin B12, iron, and calcium. Improving access to nutrition can have implications for climate outcomes as well as nutrition.Keywords: diet cost, affordability, modelling, environment
Procedia PDF Downloads 152336 Red-Tide Detection and Prediction Using MODIS Data in the Arabian Gulf of Qatar
Authors: Yasir E. Mohieldeen
Abstract:
Qatar is one of the most water scarce countries in the World. In 2014, the average per capita rainfall was less than 29 m3/y/ca, while the global average is 6,000 m3/y/ca. However, the per capita water consumption in Qatar is among the highest in the World: more than 500 liters per person per day, whereas the global average is 160 liters per person per day. Since the early 2000s, Qatar has been relying heavily on desalinated water from the Arabian Gulf as the main source of fresh water. In 2009, about 99.9% of the total potable water produced was desalinated. Reliance on desalinated water makes Qatar very vulnerable to water related natural disasters, such as the red-tide phenomenon. Qatar’s strategic water reserve lasts for only 7 days. In case of red-tide outbreak, the country would not be able to desalinate water for days, let alone the months that this disaster would bring about (as it clogs the desalination equipment). The 2008-09 red-tide outbreak, for instance, lasted for more than eight months and forced the closure of desalination plants in the region for weeks. This study aims at identifying favorite conditions for red-tide outbreaks, using satellite data along with in-situ measurements. This identification would allow the prediction of these outbreaks and their hotspots. Prediction and monitoring of outbreaks are crucial to water security in the country, as different measures could be put in place in advance to prevent an outbreak and mitigate its impact if it happened. Red-tide outbreaks are detected using different algorithms for chlorophyll concentration in the Gulf waters. Vegetation indices, such as Normalized Difference Vegetation Index (NDVI) and Enhanced Vegetation Index (EVI) were used along with Surface Algae Bloom Index (SABI) to detect known outbreaks. MODIS (or Moderate Resolution Imaging Spectroradiometer) bands are used to calculate these indices. A red-tide outbreaks atlas in the Arabian Gulf is being produced. Prediction of red-tide outbreaks ahead of their occurrences would give critical information on possible water-shortage in the country. Detecting known outbreaks in the past few decades and related parameters (e.g. water salinity, water surface temperature, nutrition, sandstorms, … etc) enables the identification of favorite conditions of red-tide outbreak that are key to the prediction of these outbreaks.Keywords: Arabian Gulf, MODIS, red-tide detection, strategic water reserve, water desalination
Procedia PDF Downloads 1122335 Women's Vulnerability to Cross-Border Criminality in Saki/Iseyin Area of Oyo State in Nigeria: Insight and Experiences
Authors: Samuel Kehinde Okunade, Daniel Sunday Tolorunshagba
Abstract:
Globally women are classified to be part of the vulnerable group in any environment. In a conflict-ridden environment, women being vulnerable often suffer the consequences as it relates to security and access to basic social services such as medical care. This is the situation in border communities in Nigeria where cross-border crimes are on the rife, thus, putting women at a disadvantaged position and, eventually, victims of such inimical activities. Border communities in the Saki/Iseyin area of Oyo state are a case in point where the lives of inhabitants are daily threatened most, especially women. In light of the above, this article examined the security situation of the Saki/Iseyin area of Oyo State with a view to ascertaining its status in terms of safety of lives and property. This paper also explored the experiences of women in the border communities within the area as it relates to their safety, the safety of their children, access to good health facilities in their immediate environment, and above all, how they have been able to cope or manage the situation. The qualitative research model was adopted utilizing a phenomenological case study approach. A Focused Group Discussion was conducted with 10 pregnant women and 10 mothers in Okerete and Abugudu communities while a Key Informant Interview was conducted with the women leaders in both communities of the Saki/Iseyin border area of Oyo State. The findings of the study revealed the poor state of basic infrastructure. So bad to a point that inhabitants of these communities no longer see themselves as Nigerians because they have been neglected by the government for too long. The only solution is for the government to embark on developmental projects within these communities so that they can live a good life just as those in the cities do. More importantly, this will increase the loyalty of these communities to the Nigeria state by defending and resisting all forms of cross-border criminal activities that go on along the porous borders.Keywords: security, women, Saki/Iseyin border area, cross-border criminalities, basic infrastructure
Procedia PDF Downloads 1352334 The Effects of Perceived Service Quality on Customers' Satisfaction, Trust and Loyalty in Online Shopping: A Case of Saudi Consumers' Perspectives
Authors: Nawt Almutairi, Ramzi El-Haddadeh
Abstract:
With the extensive increase in the number of online shops, loyalty becomes the most purpose for e-retailers by which they can maintain their exit customers and regular income instead of spending large deal of money to target new segmentation. To obtain customers’ loyalty e-marketers should firstly satisfy customers by providing a high quality of services that could fulfil their demand. They have to satisfy them to trust the web-site then increase their intention to re-visit it. This study intends to investigate to what extend the elements of e-service quality presented in the literature affect customers’ satisfaction and how these influences contribute to customers’ trust and loyalty. Three dimensions of service quality are estimated. The first element is web-site interactivity, which is perceived the quality of interactive support and the accessible communications-tool. The second aspect is security/privacy, which is perceived the quality of controlling security and privacy while transaction over the web-site. The third element is web-design that perceived a pleasant user interface with visual appealing. These elements present positive effects on shoppers’ satisfaction. Thus, To examine the proposed constructs of this research, some measurements scale-items adapted from similar prior studies. Survey data collected online from Saudi customers (n=106) were utilized to test the research hypotheses. After that, the hypotheses were analyzed by using a variety of regression tools. The analytical results of this study propose that perceived quality of interactivity and security/privacy affects customers’ satisfaction. As well as trust seems to be a substantial construct that highly affects loyalty in online shopping. This study provides a developed model to obtain a simple understanding of the series of customers’ loyalty in online shopping. One construct presenting in the research model is web-design appears to be not important antecedent of satisfaction (the path to loyalty) in online shopping.Keywords: e-service, satisfaction, trust, loyalty
Procedia PDF Downloads 2602333 Technological Properties, in Vitro Starch Digestibility, and Antioxidant Activity of Gluten-Free Cakes Enriched With Prunus spinosa
Authors: Elif Cakir, Görkem Özülkü, Hatice Bekiroğlu, Muhammet Arici, Osman Sağdic
Abstract:
It is important to be able to formulate cakes with a wide consumption mass with gluten-free and high nutritional value ingredients to increase the consumption possibilities of people with limited nutrition opportunities. Although people do not prefer Prunus spinosa (PS)because of its sour taste and its use in the food industry is limited on a local scale, the potential of using PS, which is a naturally rich source of many micronutrients and bioactive compounds, in glutenfree cake production has been investigated. In this study, the potential of using PS, a natural wild fruit, in the production of functional gluten-free cakes was investigated. It was aimed to evaluate the effects of freeze-dried and powdered PS-enriched rice flour cakes on tech functionality, nutrition and eating quality. In terms of physicochemical properties, PS raises increased the ash, protein, and moisture values of the cakes. PS with high phenolic content, phenolic component content, and radical reducing power made by ABTS, FRAP, and DPPH techniques were higher in all samples than control, and the highest 4% PS was determined in cakes. In terms of the glycemic index (GI), which is an important feature of diet products, it was determined that the GI in cakes decreased by 86.30±1.04.75.05±1.16 and 69.38±1.21, respectively, with the increase in PS ratio. Except for the 1%, PS added sample, the increase in PS caused a decrease in specific volume, % porosity and increase in hardness, including 4 days of storage. PS increase decreased the L* and b* values and increased a* value and redness of the cake. Sensory liking of the cake samples containing PS was scored significantly (p<0.05) higher of control.Keywords: Prunus spinosa, gluten-free cake, antioxidant, phenolic, glycemic index
Procedia PDF Downloads 1422332 Psycholgical Contract Violation and Its Impact on Job Satisfaction Level: A Study on Subordinate Employees in Enterprises of Hanoi, Vietnam
Authors: Quangyen Tran, YeZhuang Tian, Chengfeng Li
Abstract:
Psychological contract violations may lead to damaging an organization through losing its potential employees; it is a very significant concept in understanding the employment relationships. The authors selected contents of psychological contract violation scale based on the nine areas of violation most relevant to managerial samples (High pay, training, job security, career development, pay based on performance, promotion, feedback, expertise and quality of co-workers and support with personal problems), using regression analysis, the degree of psychological contract violations was measured by an adaptation of a multiplicative scale with Cronbach’s alpha as a measure of reliability. Through the regression analysis, psychological contract violations was found have a positive impact on employees’ job satisfaction, the frequency of psychological contract violations was more intense among male employees particularly in terms of training, job security and pay based on performance. Job dissatisfaction will lead to a lowering of employee commitment in the job, enterprises in Hanoi, Vietnam should therefore offer lucrative jobs in terms of salary and other emoluments to their employees.Keywords: psychological contract, psychological contract violation, job satisfaction, subordinate employees, employers’ obligation
Procedia PDF Downloads 327