Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6463

Search results for: household food security

5353 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 168
5352 Effect of Environmental Conditions on E. Coli o157:h7 Atcc 43888 and L. Monocytogenes Atcc 7644 Cell Surface Hydrophobicity, Motility and Cell Attachment on Food-Contact Surfaces

Authors: Stanley Dula, Oluwatosini A. Ijabadeniyi

Abstract:

Biofilm formation is a major source of materials and foodstuffs contamination, contributing to occurrence of pathogenic and spoilage microbes in food processing resulting in food spoilage, transmission of diseases and significant food hygiene and safety issues. This study elucidates biofilm formation of E. coli O157:H7 and L. monocytogenes ATCC 7644 grown under food related environmental stress conditions of varying pH (5.0;7.0; and 8.5) and temperature (15, 25 and 37 ℃). Both strains showed confluent biofilm formation at 25 ℃ and 37 ℃, at pH 8.5 after 5 days. E. coli showed curli fimbriae production at various temperatures, while L. monocytogenes did not show pronounced expression. Swarm, swimming and twitching plate assays were used to determine strain motilities. Characterization of cell hydrophobicity was done using the microbial adhesion to hydrocarbons (MATH) assay using n-hexadecane. Both strains showed hydrophilic characteristics as they fell within a < 20 % interval. FT-IR revealed COOH at 1622 cm-1, and a strong absorption band at 3650 cm-1 – 3200 cm-1 indicating the presence of both -OH and -NH groups. Both strains were hydrophilic and could form biofilm at different combinations of temperature and pH. EPS produced in both species proved to be an acidic hetero-polysaccharide.

Keywords: biofilm, pathogens, hydrophobicity, motility

Procedia PDF Downloads 222
5351 Nutrition and Physical Activity in Obese Women

Authors: Shubeska Stratrova S., Muca A., Panovska S. Clinic of endocrinology, diabetes, metabolic disorders, Medical Faculty, Skopje, N. Macedonia

Abstract:

Rationale: Obese subjects have a high energy density diet, low physical activity levels, a sedentary lifestyle, as well as eating disorders, which are considered important risk factors for the development of obesity. Methods: In order to discover the imbalance of energy intake and energy expenditure in obese women (W), two groups of examinees answered questionnaires regarding nutrition and physical activity: 1st group of women with normal body mass index (BMI <25 kg/m²) and 2nd group of obese women with BMI >30 kg/m². Results: 61.11% of obese W from the 2nd group reported good appetite, which was higher than the 1st group (45%). In 55.56% W, frustrations were a provocation for over nutrition. In the 2nd group, 38.89% W ate too much compared to 9.09% W from the 1st group. In the ²ⁿᵈ group, 35.29% W reported consuming food rarely and too much, while 29.41% W reported consuming food often and too much. All examinees from the ²ⁿᵈ group had consumed food in less than 5 hours, compared to only 8.33% W from the ¹ⁿᵈ group and had consumed hyper-caloric food. Consumption of fruits and vegetables was lower in the 2nd group compared to the 1st group. Half of the subjects in the 2nd group were physically inactive, compared to only 8% in the 1st group. All of the examinees in the 2nd group walked for less than 3 hours a day, compared to 54% in the 1st group. In the 2nd group, 67% W reported watching TV very often, 39% reported watching TV longer than 3 hours, which is significantly higher than 8.33% W in the 1st group. Overall, 81.25% of examinees from the 2nd group reported sitting for more than 3 hours a day, which is significantly more compared to the 1st group (45.45%). Conclusions: Obese women are less physically active, have a sedentary lifestyle, good appetite, and consume too much hyper-caloric food very often.

Keywords: (W) obese women, BMI(Body mass Index), nutrition, hyper-caloric food

Procedia PDF Downloads 63
5350 Evaluating Antimicrobial Activity of Selenium Nanoparticles Against Food-Borne Bacteria

Authors: Qunying Yuan, Manjula Bomma, Adrian Rhoden, Zhigang Xiao

Abstract:

Selenium is an essential micronutrient for all mammals and plays an important role in maintaining human physiological functions. The potential applications of selenium as food supplements, cancer-prevention, antimicrobial and anti-inflammatory agents have been investigated in biomedicine and food sciences. Nanoscale of selenium is of particular interest due to its better biocompatibility, higher bioavailability, lower toxicity, more homogeneous distribution, and presumptive controlled release of substances. The objective of this study is to explore whether selenium nanoparticle (SeNP) has the potential to be used as a food preservative to reduce food spoilage. SeNPs were synthesized through ascorbic acid reduction of sodium selenite using the bovine serum albumin (BSA) as capping and stabilizing agent. The chemically synthesized SeNPs had a spherical conformation and a size of 22.8 ± 4.7 nm. FTIR analysis confirmed that the nanoparticles were covered with BSA. We further tested the antimicrobial activity of these SeNPs against common food-borne bacteria. Colony forming unit assay showed that SeNPs exhibited good inhibition on the growth of Listeria Monocytogens (ATCC15313), Staphylococcus epidermidis (ATCC 700583) starting at 0.5µg/mL, but only a moderate inhibitory effect on the growth of Staphylococcus aureus (ATCC12600) and Vibrio alginolyticus (ATCC 33787) at a concentration higher than 10µg/mL and 2.5µg/mL, respectively. There was a mild effect against the growth Salmonella enterica (ATCC19585) when the concentration reached 15µg/mL. No inhibition was observed in the growth of Enterococcus faecalis (ATCC 19433). Surprisingly, SeNPs appeared to promote the growth of Vibrio parahaemolyticus (ATCC43996) and Salmonella enterica (ATCC49284) at 30 µg/mL and above. Our preliminary data suggested that the chemically synthesized SeNPs may be able to inhibit some food-borne bacteria, and SeNP as a food preservative should be used with caution. We will explore the mechanisms of the inhibitory action of chemically synthesized SeNPs on bacterial growth and whether the SeNPs are able to inhibit the development of biofilm and antibiotic resistance.

Keywords: antimicrobial, food-borne bacteria, nanoparticles, selenium

Procedia PDF Downloads 75
5349 The Islamic Advertising Standardisation Revisited of Food Products

Authors: Nurzahidah Haji Jaapar, Anis Husna Abdul Halim, Mohd Faiz Mohamed Yusof, Mohd Dani Muhamad, Sharifah Fadylawaty Syed Abdullah

Abstract:

The growing size of Muslim is recognised with significant increasing of purchasing power in the market. The realm of trade and business has embedded religious values as the new market segments are emerging in offering food products to meet needs and demands of Muslim consumer. The emergence of new market in food industry, advertising is charged with all sort of negative effects includes promoting controversial unsafety and harmful products, wasteful spending and exploiting women and kids. Therefore, this research attempts to examine between previous examinations of advertising standardisation in ancient era and current practices in the market. This paper is based on content analysis of the literature. The results show that there are a bridge gap between the implementation of practices as the advent in industrial 4.0 in using digital advertising by food industry. Thus, this paper is able to recognize the differences between two era and significant in determining the best practices in advertising by following Islamic principles.

Keywords: Islamic advertising, unethical advertising, ethical advertising, Islamic principles

Procedia PDF Downloads 136
5348 Establishing Community-Based Pro-Biodiversity Enterprise in the Philippines: A Climate Change Adaptation Strategy towards Agro-Biodiversity Conservation and Local Green Economic Development

Authors: Dina Magnaye

Abstract:

In the Philippines, the performance of the agricultural sector is gauged through crop productivity and returns from farm production rather than the biodiversity in the agricultural ecosystem. Agricultural development hinges on the overall goal of increasing productivity through intensive agriculture, monoculture system, utilization of high yielding varieties in plants, and genetic upgrading in animals. This merits an analysis of the role of agro-biodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. These enterprises conserve biodiversity while equitably sharing production income in the utilization of biological resources. The study aims to determine how community-based pro-biodiversity enterprises become instrumental in local climate change adaptation and agro-biodiversity conservation as input to local green economic development planning. It also involves an assessment of the role of agrobiodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. The perceptions of the local community members both in urban and upland rural areas on community-based pro-biodiversity enterprises were evaluated. These served as a basis in developing a planning modality that can be mainstreamed in the management of local green economic enterprises to benefit the environment, provide local income opportunities, conserve species diversity, and sustain environment-friendly farming systems and practices. The interviews conducted with organic farmer-owners, entrepreneur-organic farmers, and organic farm workers revealed that pro-biodiversity enterprise such as organic farming involved the cyclic use of natural resources within the carrying capacity of a farm; recognition of the value of tradition and culture especially in the upland rural area; enhancement of socio-economic capacity; conservation of ecosystems in harmony with nature; and climate change mitigation. The suggested planning modality for community-based pro-biodiversity enterprises for a green economy encompasses four (4) phases to include community resource or capital asset profiling; stakeholder vision development; strategy formulation for sustained enterprises; and monitoring and evaluation.

Keywords: agro-biodiversity, agro-biodiversity conservation, local green economy, organic farming, pro-biodiversity enterprise

Procedia PDF Downloads 348
5347 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 137
5346 Effect of Cellular Water Transport on Deformation of Food Material during Drying

Authors: M. Imran Hossen Khan, M. Mahiuddin, M. A. Karim

Abstract:

Drying is a food processing technique where simultaneous heat and mass transfer take place from surface to the center of the sample. Deformation of food materials during drying is a common physical phenomenon which affects the textural quality and taste of the dried product. Most of the plant-based food materials are porous and hygroscopic in nature that contains about 80-90% water in different cellular environments: intercellular environment and intracellular environment. Transport of this cellular water has a significant effect on material deformation during drying. However, understanding of the scale of deformation is very complex due to diverse nature and structural heterogeneity of food material. Knowledge about the effect of transport of cellular water on deformation of material during drying is crucial for increasing the energy efficiency and obtaining better quality dried foods. Therefore, the primary aim of this work is to investigate the effect of intracellular water transport on material deformation during drying. In this study, apple tissue was taken for the investigation. The experiment was carried out using 1H-NMR T2 relaxometry with a conventional dryer. The experimental results are consistent with the understanding that transport of intracellular water causes cellular shrinkage associated with the anisotropic deformation of whole apple tissue. Interestingly, it is found that the deformation of apple tissue takes place at different stages of drying rather than deforming at one time. Moreover, it is found that the penetration rate of heat energy together with the pressure gradient between intracellular and intercellular environments is the responsible force to rupture the cell membrane.

Keywords: heat and mass transfer, food material, intracellular water, cell rupture, deformation

Procedia PDF Downloads 207
5345 Formal Verification for Ethereum Smart Contract Using Coq

Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song

Abstract:

The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.

Keywords: smart contract, formal verification, Ethereum, Coq

Procedia PDF Downloads 657
5344 Consumer Welfare in the Platform Economy

Authors: Prama Mukhopadhyay

Abstract:

Starting from transport to food, today’s world platform economy and digital markets have taken over almost every sphere of consumers’ lives. Sellers and buyers are getting connected through platforms, which is acting as an intermediary. It has made consumer’s life easier in terms of time, price, choice and other factors. Having said that, there are several concerns regarding platforms. There are competition law concerns like unfair pricing, deep discounting by the platforms which affect the consumer welfare. Apart from that, the biggest problem is lack of transparency with respect to the business models, how it operates, price calculation, etc. In most of the cases, consumers are unaware of how their personal data are being used. In most of the cases, they are unaware of how algorithm uses their personal data to determine the price of the product or even to show the relevant products using their previous searches. Using personal or non-personal data without consumer’s consent is a huge legal concern. In addition to this, another major issue lies with the question of liability. If a dispute arises, who will be responsible? The seller or the platform? For example, if someone ordered food through a food delivery app and the food was bad, in this situation who will be liable: the restaurant or the food delivery platform? In this paper, the researcher tries to examine the legal concern related to platform economy from the consumer protection and consumer welfare perspectives. The paper analyses the cases from different jurisdictions and approach taken by the judiciaries. The author compares the existing legislation of EU, US and other Asian Countries and tries to highlight the best practices.

Keywords: competition, consumer, data, platform

Procedia PDF Downloads 121
5343 Securing the Electronic Commerce - The Way Forward: A Comparative Ananlysis

Authors: Sarthak Mishra, Astha Sinha

Abstract:

There’s no doubt about the convenience of making commercial and business transactions over the Internet under the new business model known as the e-Commerce. The term 'Electronic commerce' or e-Commerce refers to the use of an electronic medium to carry out commercial transactions. E-Commerce is one of the parts of Information Science framework and its uses are gradually becoming popular. Thus, the threat of security issues in Information Science has now become an important subject of discussion amongst the concerned users. These two issues i.e. security and privacy are required to be looked into through social, organizational, technical and economic perspectives. The current paper analyses the effect of these two issues in the arena of e-commerce. Here, no specification has been discussed rather an attempt has been made to provide a general overview. Further, attempts have been made to discuss the security and privacy issues in relation to the E-Commerce financial transactions. We shall also discuss in particular different steps required to be taken before online shopping and also shall discuss the purpose of security and privacy in E-Commerce and why it has currently become the need of the present hour. Lastly, an attempt has been made to discuss the plausible future course of development of this practice and its impact upon the global economy and if any changes should be bought about to ensure a smooth evolution of the practice. This paper has adopted a descriptive methodology to undertake its major area of study, wherein the major source of information has been via the secondary resources. Also, the study is of a comparative nature wherein the position of the various national regimes have compared with regards to the research question.

Keywords: business-business transaction (B2B), business-consumer transaction (B2C), e-commerce, online transaction, privacy and security threats

Procedia PDF Downloads 215
5342 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 56
5341 The Islamic Grand Tour: The Case of Caravan Hajj Routes

Authors: Akram Atef Rawshdeh

Abstract:

This research aims to prove the role of Islamic pilgrimage caravans in formulating the concept of the tourism industry and the concept of Grand Tours before that which was found in Europe in the medieval and modern Ages, through its duration and the number of tourists who participated in it and its role in providing tourism services from the establishment of castles and inns that were built To accommodate pilgrims during their travels from different regions of the Islamic world to the holy places in Saudi Arabia, as well as food and beverage services, transportation and support services like tourist security and tourist guide services. This research will depend on the historical method

Keywords: grand tour, hajj caravan routes, tourism services, transportation

Procedia PDF Downloads 148
5340 Central American Security Issue: Civil War Legacy and Contemporary Challenges

Authors: Olga Andrianova, Lazar Jeifets

Abstract:

The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.

Keywords: Central America, insecurity, instability, post-war countries, violence

Procedia PDF Downloads 462
5339 Design of Low-Maintenance Sewer Pump Stations with High-Security Measures for Municipal Applications

Authors: H. V. Smit, V. H. J. de Wet

Abstract:

South African municipalities are dealing with aging and dilapidated infrastructure while faced with challenges in the form of expanding informal settlements, vandalism, theft, and a lack of maintenance which place even more pressure on existing infrastructure. The existing infrastructure was never designed to cater to these challenges, and this becomes evident when evaluating the current state of many municipal sewer pump stations. A need has thus arisen to develop a sewer pump station design concept that will address these challenges and allow for a long-term sustainable solution. This article deals with the design concepts which have been developed for sewer pump stations for an effective reduction in maintenance, improved grit handling, improvement to the operation and maintenance working conditions, and the adoption of high-security design philosophy.

Keywords: high security, low maintenance, municipal application, sewer pump station

Procedia PDF Downloads 84
5338 Monitoring the Effect of Deep Frying and the Type of Food on the Quality of Oil

Authors: Omar Masaud Almrhag, Frage Lhadi Abookleesh

Abstract:

Different types of food like banana, potato and chicken affect the quality of oil during deep fat frying. The changes in the quality of oil were evaluated and compared. Four different types of edible oils, namely, corn oil, soybean, canola, and palm oil were used for deep fat frying at 180°C ± 5°C for 5 h/d for six consecutive days. A potato was sliced into 7-8 cm length wedges and chicken was cut into uniform pieces of 100 g each. The parameters used to assess the quality of oil were total polar compound (TPC), iodine value (IV), specific extinction E1% at 233 nm and 269 nm, fatty acid composition (FAC), free fatty acids (FFA), viscosity (cp) and changes in the thermal properties. Results showed that, TPC, IV, FAC, Viscosity (cp) and FFA composition changed significantly with time (P< 0.05) and type of food. Significant differences (P< 0.05) were noted for the used parameters during frying of the above mentioned three products.

Keywords: frying potato, chicken, frying deterioration, quality of oil

Procedia PDF Downloads 406
5337 Some Issues with Extension of an HPC Cluster

Authors: Pil Seong Park

Abstract:

Homemade HPC clusters are widely used in many small labs, because they are easy to build and cost-effective. Even though incremental growth is an advantage of clusters, it results in heterogeneous systems anyhow. Instead of adding new nodes to the cluster, we can extend clusters to include some other Internet servers working independently on the same LAN, so that we can make use of their idle times, especially during the night. However extension across a firewall raises some security problems with NFS. In this paper, we propose a method to solve such a problem using SSH tunneling, and suggest a modified structure of the cluster that implements it.

Keywords: extension of HPC clusters, security, NFS, SSH tunneling

Procedia PDF Downloads 407
5336 Re-Emergence of Religious Militancy in Pakistan after Return of Afghan Taliban to Power Corridors in Afghanistan (2021-2022)

Authors: Syed Sibtain Hussain Shah

Abstract:

The Afghan Taliban returned to power corridors in Afghanistan in August 2021 after waging a twenty-year insurgency in the country. U.S.-led forces completed their withdrawal from Afghanistan on August 30, 2021, but the Taliban took control of the whole country till August 15, 2021. At the same time, some of the militant groups such as Tehrik-e-Taliban Pakistan (TTP) and Islamic State Khurasan (IS-K) reappeared in Pakistan’s borders and other areas and by increasing attacks on the armed forces of Pakistan and minorities communities. These groups once again created a crucial challenge to the internal security of the country. Since mid of 2021, many of the terrorist incidents in the countries specified in the areas of Pakistan bordering Afghanistan were committed by TTP and IS-K. The aim of this paper is to investigate the reappearance of TTP and IS-K in 2021 and 2022 as a crucial threat to the internal security of Pakistan. The author will particularly probe threats to the security of military personnel and their installations and threats to human security, including danger to religious minority communities in the different areas of the country, including border areas such as Waziristan, which was once a hub of TTP and other militant groups in the 2000s. The author will employ the relevant method and appropriate theories of security studies, such as religious extremism and terrorism, in this study. TTP, inspired by the Afghan Taliban, initially emerged in Pakistan in 2007 and this group has so far targeted various religious and ethnic communities and government installations in Pakistan. The group is not only against Pakistan’s government policies, but it also committed terrorist attacks on the communities of the other Muslim sects and as well as non-Muslim communities. Most of the prominent figures of this violent group disappeared or escaped to Afghanistan after military actions, such as the larger “Zarb-e-Azb” operation in Pakistan in 2015. IS-K, which established its branch of Khurasan covering Pakistan and Afghanistan in 2015, with its main formation in Iraq and Syria in 2015, by targeting religious minorities such as Shia Muslims, has so far created a vital security challenge for the security of the country.

Keywords: Pakistan, Afghanistan, Afghan Taliban, Pakistani Taliban, Islamic state Khorasan, security threat

Procedia PDF Downloads 124
5335 Different Contexts Activate Different Frames: Deepening and Broadening Goal-Framing Theory for Sustainable Food Behaviour

Authors: Marleen Onwezen

Abstract:

It is often assumed that specific consumer groups do or do not have a sustainable lifestyle or that a specific context does or does not trigger sustainable choices. Based on goal-framing theory, this article aims to understand variation in sustainable choices across contexts. We add to the literature by showing the added value of including a moral goal frame (Study 1; N = 1,100) beyond the hedonic, gain, and normative goal frames. Moreover, we add to the literature by revealing how these goal frames are recalled in real-life consumption contexts (Study 2; N = 1,100) and how they can be activated (Study 3; N = 1,651). The results reveal that different goal frames result in different preferences and consumption choices, and that the normative frames showed the most consistent association with sustainable intentions. A contrast exists between frames currently activated in food choice contexts, mainly the gain and hedonic frames, and those associated with sustainable behaviours, the moral and social frames. This indicates the relevance of further understanding and adapting the environment to activate moral and social frames to further enforce sustainable food transitions.

Keywords: goal frames, sustainable behaviour, food choice, moral

Procedia PDF Downloads 116
5334 Approaches to Ethical Hacking: A Conceptual Framework for Research

Authors: Lauren Provost

Abstract:

The digital world remains increasingly vulnerable, making the development of effective cybersecurity approaches even more critical in supporting the success of the digital economy and national security. Although approaches to cybersecurity have shifted and improved in the last decade with new models, especially with cloud computing and mobility, a record number of high severity vulnerabilities were recorded in the National Institute of Standards and Technology (NIST), and its National Vulnerability Database (NVD) in 2020. This is due, in part, to the increasing complexity of cyber ecosystems. Security must be approached with a more comprehensive, multi-tool strategy that addresses the complexity of cyber ecosystems, including the human factor. Ethical hacking has emerged as such an approach: a more effective, multi-strategy, comprehensive approach to cyber security's most pressing needs, especially understanding the human factor. Research on ethical hacking, however, is limited in scope. The two main objectives of this work are to (1) provide highlights of case studies in ethical hacking, (2) provide a conceptual framework for research in ethical hacking that embraces and addresses both technical and nontechnical security measures. Recommendations include an improved conceptual framework for research centered on ethical hacking that addresses many factors and attributes of significant attacks that threaten computer security; a more robust, integrative multi-layered framework embracing the complexity of cybersecurity ecosystems.

Keywords: ethical hacking, literature review, penetration testing, social engineering

Procedia PDF Downloads 192
5333 Internet of Things-Based Smart Irrigation System

Authors: Ahmed Abdulfatah Yusuf, Collins Oduor Ondiek

Abstract:

The automation of farming activities can have a transformational impact on the agricultural sector, especially from the emerging new technologies such as the Internet of Things (IoT). The system uses water level sensors and soil moisture sensors that measure the content of water in the soil as the values generated from the sensors enable the system to use an appropriate quantity of water, which avoids over or under irrigation. Due to the increase in the world’s population, there is a need to increase food production. With this demand in place, it is difficult to increase crop yield using the traditional manual approaches that lead to the wastage of water, thus affecting crop production. Food insecurity has become a scourge greatly affecting the developing countries and agriculture is an essential part of human life and tends to be the mainstay of the economy in most developing nations. Thus, without the provision of adequate food supplies, the population of those living in poverty is likely to multiply. The project’s main objective is to design and develop an IoT (Internet of Things) microcontroller-based Smart Irrigation System. In addition, the specific research objectives are to find out the challenges with traditional irrigation approaches and to determine the benefits of IoT-based smart irrigation systems. Furthermore, the system includes Arduino, a website and a database that works simultaneously in collecting and storing the data. The system is designed to pave the way in attaining the Sustainable Development Goal (SDG 1), which aims to end extreme poverty in all forms by 2030. The research design aimed at this project is a descriptive research design. Data was gathered through online questionnaires that used both quantitative and qualitative in order to triangulate the data. Out of the 32 questionnaires sent, there were 32 responses leading to a 100% response rate. In terms of sampling, the target group of this project is urban farmers, which account for about 25% of the population of Nairobi. From the findings of the research carried out, it is evident that there is a need to move away from manual irrigation approaches due to the high wastage of water to the use of smart irrigation systems that propose a better way of conserving water while maintaining the quality and moisture of the soil. The research also found out that urban farmers are willing to adopt this system to better their farming practices. However, this system can be improved in the future by incorporating it with other features and deploying it to a larger geographical area.

Keywords: crop production, food security, smart irrigation system, sustainable development goal

Procedia PDF Downloads 138
5332 Automatic Teller Machine System Security by Using Mobile SMS Code

Authors: Husnain Mushtaq, Mary Anjum, Muhammad Aleem

Abstract:

The main objective of this paper is used to develop a high security in Automatic Teller Machine (ATM). In these system bankers will collect the mobile numbers from the customers and then provide a code on their mobile number. In most country existing ATM machine use the magnetic card reader. The customer is identifying by inserting an ATM card with magnetic card that hold unique information such as card number and some security limitations. By entering a personal identification number, first the customer is authenticated then will access bank account in order to make cash withdraw or other services provided by the bank. Cases of card fraud are another problem once the user’s bank card is missing and the password is stolen, or simply steal a customer’s card & PIN the criminal will draw all cash in very short time, which will being great financial losses in customer, this type of fraud has increase worldwide. So to resolve this problem we are going to provide the solution using “Mobile SMS code” and ATM “PIN code” in order to improve the verify the security of customers using ATM system and confidence in the banking area.

Keywords: PIN, inquiry, biometric, magnetic strip, iris recognition, face recognition

Procedia PDF Downloads 344
5331 Affordable Housing and Economic Sustainability: The Case of the Poorest of the Poor Housing in Debre Markos City

Authors: Michael Menberu

Abstract:

Housing affordability is a crucial policy objective. Incorporating economic sustainability in affordable housing in the development of the poorest of the poor's housing programs has become a major concern. This paper examines the affordability and economic sustainability of the poorest of the poor affordable housing in Debre Markos city. To address this, this study uses both quantitative and qualitative methods, Using a questionnaire survey, Interviews, field observation, household survey, and Pearson correlation analysis. The findings show that households in the expansion area have lower monthly incomes than in the past, but they are satisfied with the housing quality, rental pricing, and tenure security of their homes. This demonstrates in providing affordable housing for the poorest of the poor the location of the houses must be considered in order to have affordable and economically sustainable development. The findings show that housing is not truly affordable if it is in an inaccessible place with a long commute to work, high transportation expenditures, and land use that is homogeneous. Increasing the supply of affordable housing in accessible locations helps the poorest of the poor achieve multiple planning objectives: it reduces transportation costs, improves incomes, provides infrastructure, and reduces the distance to the work area.

Keywords: housing, affordable housing, economic sustainability, the poorest of the poor housing

Procedia PDF Downloads 25
5330 Assessing the Role of Water Research and Development Investment towards Water Security in South Africa: During the Five Years Period (2009/10 - 2013/14)

Authors: Hlamulo Makelane

Abstract:

The study aims at providing new insights regarding research and development (R&D) public and private activities based on the national R&D survey of the past five years. The main question of the study is what role does water R&D plays on water security; to then analyze what lessons could be extracted to improve the security of water through R&D. In particular, this work concentrates on three main aspects of R&D investments: (i) the level of expenditures, (ii) the sources of funding related to water R&D, and (iii) the personnel working in the field, both for the public and private sectors. The nonlinear regression approached will be used for data analysis based on secondary data gathered from the South African nation R&D survey conducted annually by the Centre for science, technology and innovation indicators (CeSTII).

Keywords: water, R&D, investment, public sector, private sector

Procedia PDF Downloads 215
5329 Multi-Agent TeleRobotic Security Control System: Requirements Definitions of Multi-Agent System Using The Behavioral Patterns Analysis (BPA) Approach

Authors: Assem El-Ansary

Abstract:

This paper illustrates the event-oriented Behavioral Pattern Analysis (BPA) modeling approach in developing an Multi-Agent TeleRobotic Security Control System (MTSCS). The event defined in BPA is a real-life conceptual entity that is unrelated to any implementation. The major contributions of this research are the Behavioral Pattern Analysis (BPA) modeling methodology, and the development of an interactive software tool (DECISION), which is based on a combination of the Analytic Hierarchy Process (AHP) and the ELECTRE Multi-Criteria Decision Making (MCDM) methods.

Keywords: analysis, multi-agent, TeleRobotics control, security, modeling methodology, software modeling, event-oriented, behavioral pattern, use cases

Procedia PDF Downloads 415
5328 Productivity Improvement of Faffa Food Share Company Using a Computerized Maintenance Management System

Authors: Gadisa Alemayehu, Muralidhar Avvari, Atkilt Mulu G.

Abstract:

Since 1962 EC, the Faffa Food Share Company has been producing and supplying flour (famix) and value-added flour (baby food) in Ethiopia. It meets nearly all of the country's total flour demand, both for relief and commercial markets. However, it is incompetent in the international market due to a poor maintenance management system. The results of recorded documents and stopwatches revealed that frequent failure machines, as well as a poor maintenance management system, cause increased production downtimes, resulting in a 29.19 percent decrease in production from the planned production. As a result, the current study's goal is to recommend newly developed software for use in and as a Computerized Maintenance Management System (CMMS). As a result, the system increases machine reliability and decreases the frequency of equipment failure, reducing breakdown time and maintenance costs. The company's overall manufacturing performance improved by 4.45 percent, particularly after the implementation of the CMMS.

Keywords: CMMS, manufacturing performance, delivery, availability, flexibility, Faffa Food Share Company

Procedia PDF Downloads 110
5327 Predictors of Korean Women’s Attitudes toward Family Formation and the Intrahousehold Division of Labor

Authors: Damla Tas, Robert Rudolf

Abstract:

Fast economic development and women empowerment in Korea have contributed to an unprecedented family and gender crisis, with Korean fertility rates at a global record low. This study explores the predictors and time trends of Korean women’s attitudes toward family formation and the household division of labor by using the Korean Longitudinal Survey of Women and Families from 2007 to 2018. Results indicate that education, age, marital status, and motherhood are significantly associated with women’s attitudes toward family formation and gender attitudes toward the intrahousehold division of labor. In addition, more educated women and those aged 26 to 45 are less likely to support traditional marriage and traditional household division of labor statements. Unmarried and divorced women are more likely to support progressive values and roles. Also, retrospective factors such as mothers’ schooling and parents’ relationship are significantly associated with gender role ideology. Our findings also indicate a downward trend in the number of Korean women stating one must have children. The study suggests that Korean families and society need to adjust to women’s changing preferences concerning their societal roles toward less traditional. Hence, a new agreement between men and women is needed on how work can be divided more equally.

Keywords: marriage, family formation, intrahousehold division of labor, gender role attitudes, Korea

Procedia PDF Downloads 65
5326 Assessing Smallholder Farmers’ Perception of Climate Change and Coping Strategies Adopted in the Olifants Catchment of South Africa

Authors: Mary Funke Olabanji, Thando Ndarana, Nerhene Davis, Sylvester Okechukwu Ilo

Abstract:

Scientific evidence indicates that climate change is already being experienced by farmers, and its impacts are felt on agricultural and food systems. Understanding the perceptions of farmers on climate change and how they respond to this change is essential to the development and implementation of appropriate policies for agriculture and food security. This paper aims to contribute to the understanding of farmers’ perceptions of climate change, adopted coping strategies, long-term implications of their adaptation choices, and barriers to their decisions to adapt. Data were randomly collected from 73 respondents in five districts located in the Olifants catchment of South Africa. A combination of descriptive statistics and Chi-Square statistical tests using the Statistical Package for Social Science (SPSS) was used to analyse the data obtained from the survey. Results show that smallholder farmers have an in-depth perception of climate change. The most significant changes perceived by farmers were increased temperature and low rainfall. The results equally revealed that smallholder farmers in the Olifants catchment had adopted several adaptation strategies in response to the perceived climate change. The significant adaptation strategies from the results include changing cropping patterns and planting date, use of improved seed variety, and chemical fertilizers. The study, therefore, concludes that crop diversification and agroforestry were more effective and sustainable in mitigating the impact of climate change.

Keywords: adaptation, climate change, perception, smallholder farmers

Procedia PDF Downloads 156
5325 Utilization of Agro-wastes for Biotechnological Production of Edible Mushroom

Authors: Salami Abiodun Olusola, Bankole Faith Ayobami

Abstract:

Agro-wastes are wastes produced from various agricultural activities and include manures, corncob, plant stalks, hulls, leaves, sugarcane bagasse, oil-palm spadix, and rice bran. In farming situation, the agro-waste is often useless and, thus, discarded. Huge quantities of waste resources generated from Nigerian agriculture could be converted to more useful forms of energy, which could contribute to the country’s primary energy needs and reduce problems associated with waste management. Accumulation of agro-wastes may cause health, safety, and environmental concern. However, biotechnological use of agro-waste could enhance food security through its bioconversion to useful renewable energy. Mushrooms are saprophytes which feed by secreting extracellular enzymes, digesting food externally, and absorb the nutrients in net-like hyphae. Therefore, mushrooms could be exploited for bioconversion of the cheap and numerous agro-wastes for providing nutritious food for animals, human and carbon recycling. The study investigated the bioconversion potentials of Pleurotus florida on agro-wastes using a simple and cost-effective biotechnological method. Four agro-wastes; corncobs, oil-palm spadix, corn straw, and sawdust, were composted and used as substrates while the biological efficiency (BE) and the nutritional composition of P. florida grown on the substrates were determined. Pleurotus florida contained 26.28-29.91% protein, 86.90-89.60% moisture, 0.48-0.91% fat, 19.64-22.82% fibre, 31.37-38.17% carbohydrate and 5.18-6.39% ash. The mineral contents ranged from 342-410 mg/100g Calcium, 1009-1133 mg/100g Phosphorus, 17-21 mg/100g Iron, 277-359 mg/100g Sodium, and 2088-2281 mg/100g Potassium. The highest yield and BE were obtained on corncobs (110 g, 55%), followed by oil-palm spadix (76.05 g, 38%), while the least BE was recorded on corn straw substrate (63.12 g, 31.56%). Utilization of the composted substrates yielded nutritional and edible mushrooms. The study presents biotechnological procedure for bioconversion of agro-wastes to edible and nutritious mushroom for efficient agro-wastes’ management, utilization, and recycling.

Keywords: agrowaste, bioconversion, biotechnology, utilization, recycling

Procedia PDF Downloads 57
5324 Prediction of Ionizing Radiation Doses in Irradiated red Pepper (Capsicum annuum) and Mint (Mentha piperita) by Gel Electrophoresis

Authors: Şeyma Özçirak Ergün, Ergün Şakalar, Emrah Yalazi̇, Nebahat Şahi̇n

Abstract:

Food irradiation is a usage of exposing food to ionising radiation (IR) such as gamma rays. IR has been used to decrease the number of harmful microorganisms in the food such as spices. Excessive usage of IR can cause damage to both food and people who consuming food. And also it causes to damages on food DNA. Generally, IR detection techniques were utilized in literature for spices are Electron Spin Resonance (ESR), Thermos Luminescence (TL). Storage creates negative effect on IR detection method then analyses of samples have been performed without storage in general. In the experimental part, red pepper (Capsicum annuum) and mint (Mentha piperita) as spices were exposed to 0, 0.272, 0.497, 1.06, 3.64, 8.82, and 17.42 kGy ionize radiation. ESR was applied to samples irradiated. DNA isolation from irradiated samples was performed using GIDAGEN Multi Fast DNA isolation kit. The DNA concentration was measured using a microplate reader spectrophotometer (Infinite® 200 PRO-Life Science–Tecan). The concentration of each DNA was adjusted to 50 ng/µL. Genomic DNA was imaged by UV transilluminator (Gel Doc XR System, Bio-Rad) for the estimation of genomic DNA bp-fragment size after IR. Thus, agarose gel profiles of irradiated spices were obtained to determine the change of band profiles. Besides, samples were examined at three different time periods (0, 3, 6 months storage) to show the feasibility of developed method. Results of gel electrophoresis showed especially degradation of DNA of irradiated samples. In conclusion, this study with gel electrophoresis can be used as a basis for the identification of the dose of irradiation by looking at degradation profiles at specific amounts of irradiation. Agarose gel results of irradiated samples were confirmed with ESR analysis. This method can be applied widely to not only food products but also all biological materials containing DNA to predict radiation-induced damage of DNA.

Keywords: DNA, electrophoresis, gel electrophoresis, ionizeradiation

Procedia PDF Downloads 243