Search results for: food and nutrition security
5102 Studies on the Proximate Composition and Functional Properties of Extracted Cocoyam Starch Flour
Authors: Adebola Ajayi, Francis B. Aiyeleye, Olakunke M. Makanjuola, Olalekan J. Adebowale
Abstract:
Cocoyam, a generic term for both xanthoma and colocasia, is a traditional staple root crop in many developing countries in Africa, Asia and the Pacific. It is mostly cultivated as food crop which is very rich in vitamin B6, magnesium and also in dietary fiber. The cocoyam starch is easily digested and often used for baby food. Drying food is a method of food preservation that removes enough moisture from the food so bacteria, yeast and molds cannot grow. It is a one of the oldest methods of preserving food. The effect of drying methods on the proximate composition and functional properties of extracted cocoyam starch flour were studied. Freshly harvested cocoyam cultivars at matured level were washed with portable water, peeled, washed and grated. The starch in the grated cocoyam was extracted, dried using sun drying, oven and cabinet dryers. The extracted starch flour was milled into flour using Apex mill and packed and sealed in low-density polyethylene film (LDPE) 75 micron thickness with Nylon sealing machine QN5-3200HI and kept for three months under ambient temperature before analysis. The result showed that the moisture content, ash, crude fiber, fat, protein and carbohydrate ranged from 6.28% to 12.8% 2.32% to 3.2%, 0.89% to 2.24%%, 1.89% to 2.91%, 7.30% to 10.2% and 69% to 83% respectively. The functional properties of the cocoyam starch flour ranged from 2.65ml/g to 4.84ml/g water absorption capacity, 1.95ml/g to 3.12ml/g oil absorption capacity, 0.66ml/g to 7.82ml/g bulk density and 3.82% to 5.30ml/g swelling capacity. Significant difference (P≥0.5) was not obtained across the various drying methods used. The drying methods provide extension to the shelf-life of the extracted cocoyam starch flour.Keywords: cocoyam, extraction, oven dryer, cabinet dryer
Procedia PDF Downloads 2955101 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 4335100 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.Keywords: asymmetrical warfare, conventional forces, security, terrorism
Procedia PDF Downloads 2625099 Assessment of Body Mass Index among Children of Primary School in Behbahan City
Authors: Hosseini Siahi Zohreh, Sana Mohammad Jafar
Abstract:
With increase in fat and over weight in children and its undesirable effects on different organisms of the body and since many of the sicknesses are due to over weight and with losing weight these sicknesses disappear, and on the other hand with mal nutrition and under weight in children other kind of sicknesses such as derogation of body's security system, frequent infection, insufficient growth, shortness, and delay in maturity etc. are some of the signs of being under weight. Therefore recognition of signs of over weight and under weight and their prevalence in children are important. To determine this difficulty we have used the body mass index as screening tool since it is very prevalent and a good and important guide and has very good relation with body fat in children. In this study 2321 students from primary schools in Behbahan have been chosen randomly and evaluated by height and weight and their body mass index have been calculated and then recorded on the BMI percentile diagram which is for age and gender. The following results obtained: The amount of total fat, over weight and slimness are 9.3, 12.1 and 12.32 percent respectively. Therefore 21.4% of the children were over weighted. It did not show any meaningful statistical relation in fat conditions among boys and girls, but there has been a meaningful statistical relation in slimness among boys and girls.Keywords: assessment, students, Behbahan, Body Mass Index
Procedia PDF Downloads 5195098 Comparison of Nutritional Status of Asthmatic vs Non-Asthmatic Adults
Authors: Ayesha Mushtaq
Abstract:
Asthma is a pulmonary disease in which blockade of the airway takes place due to inflammation as a response to certain allergens. Breathing troubles, cough, and dyspnea are one of the few symptoms. Several studies have indicated a significant effect on asthma due to changes in dietary routines. Certain food items, such as oily foods and other materials, are known to cause an increase in the symptoms of asthma. Low dietary intake of fruits and vegetables may be important in relation to asthma prevalence. The objective of this study is to assess and compare the nutritional status of asthmatic and non-asthmatic patients. The significance of this study lies in the factor that it will help nutritionists to arrange a feasible dietary routine for asthmatic patients. This research was conducted at the Pulmonology Department of the Pakistan Institute of Medical Science Islamabad. About thirty hundred thirty-four million people are affected by asthma worldwide. Pakistan is on the verge of being an uplifted urban population and asthma cases are increasingly high these days. Several studies suggest an increase in the Asthmatic patient population due to improper diet. This is a cross-sectional study aimed at assessing the nutritious standing of Asthmatic and non-asthmatic patients. This research took place at the Pakistan Institute of Medical Sciences (PIMS), Islamabad, Pakistan. The research included asthmatic and non-asthmatic patients coming to the pulmonology department clinic at the Pakistan Institute of Medical Sciences (PIMS). These patients were aged between 20-60 years. A questionnaire was developed for these patients to estimate their dietary plans in these patients. The methodology included four sections. The first section was the Socio-Demographic profile, which included age, gender, monthly income and occupation. The next section was anthropometric measurements which included the weight, height and body mass index (BMI) of an individual. The next section, section three, was about the biochemical attributes, such as for biochemical profiling, pulmonary function testing (PFT) was performed. In the next section, Dietary habits were assessed by a food frequency questionnaire (FFQ) through food habits and consumption pattern was assessed. The next section life style data, in which the person's level of physical activity, sleep and smoking habits were assessed. The next section was statistical analysis. All the data obtained from the study were statistically analyzed and assessed. Most of the asthma Patients were females, with weight more than normal or even obese. Body Mass Index (BMI) was higher in asthma Patients than those in non-Asthmatic ones. When the nutritional Values were assessed, we came to know that these patients were low on certain nutrients and their diet included more junk and oily food than healthy vegetables and fruits. Beverages intake was also included in the same assessment. It is evident from this study that nutritional status has a contributory effect on asthma. So, patients on the verge of developing asthma or those who have developed asthma should focus on their diet, maintain good eating habits and take healthy diets, including fruits and vegetables rather than oily foods. Proper sleep may also contribute to the control of asthma.Keywords: BMI, nutrition, PAL, diet
Procedia PDF Downloads 775097 Functional Food Industry in Thailand: Perspectives from Government, Education, and Private Sector
Authors: Charintorn Suwannawong, Tananpon Yavilas, Sopida Boonaneksap, Chotika Viriyarattanasak, Chairath Tangduangdee
Abstract:
With increasing aging population and health conscious consumers, the demand for health promoting products such as functional foods, dietary supplements, and nutraceutical products has continuously increased in Thailand. Nevertheless, the strategic framework for regulatory functional food developments in Thailand is still unclear. The objective of this study was to survey stakeholders’ perspectives on three scopes, consisting of 1) the current status 2) obstacles, and 3) future trend for the development and production of functional foods in Thailand. A survey was conducted by interviewing ten experts from governmental organization, industrial sector and academic institute. The obtained results show that there is no established definition for functional foods in Thailand. There is a variety of raw materials that are capable to be potential ingredients for functional food production in Thailand and exported to global market. However, the scaling up technology into a commercial production is limited. Moreover, there is a need to establish the infrastructures, such as testing laboratory, and regulatory standards for quality control and ensuring product safety. This information is useful for government in the development of the strategic framework and policy statement on improvement of functional food industry in Thailand.Keywords: functional foods, interview, perspective, Thailand
Procedia PDF Downloads 2855096 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 7895095 A Study on Consumer Awareness, Safety Perceptions and Practices About Food Preservatives and Flavouring Agents Used in Packed / Canned Foods from South India
Authors: Harsha Kumar H. N., Anshu Kumar Jha, Khushboo Kamal Taneja, Krishan Kabra, Mohamed Hafeez Sadiq
Abstract:
Introduction: The increasing use of preservatives and flavouring agents has the potential to cause health problem among the people. There are no published studies from India exploring the awareness, safety perception, & practices about Food Preservatives (FPs) and Flavouring Agents (FAs). So this study was conducted with the objectives of assessing the awareness, safety perceptions & practices about Food Preservatives (FPs), Flavouring Agents (FAs) in commonly bought / purchased packed food items. Materials & method: This cross-sectional study was conducted in January 2012. Sample size of 126 was computed using the formula for infinite population. People who bought packed food items in malls were approached and requested to fill a pre-tested semi-structured questionnaire. The questionnaire explored awareness, safety perception & practices of FPs & FAs. Data was then analyzed using SPSS version 10.0. Chi-square test was used to know if the observed differences were statistically significant. ‘p’ value <0.05 was considered significant. Results: Totally 123 people (males- 48.8% and females-51.2%) participated (response rate of 97.6%) in the study. Majority of the people were aware about presence of ‘FPs’ (91.7%) and ‘FAs’ (84.9%) though their knowledge was inadequate. Breakup of the study subjects according to level of awareness about FPs was as follows (%): Good (37.4), Satisfactory (40.6), Poor (22) & FAs (%): Good (49.6), Satisfactory (36) & Poor (14). Distribution according to type of practices for FPs was as follows (%): Favourable (14), Unfavourable (86) & FAs (%): Favourable (30.5), Unfavourable (69.5). There was a gap between knowledge and practices. Conclusion: Though there was awareness, the knowledge was inadequate. Unfavourable practices were observed. The gaps in the knowledge and unhealthy practices need to be addressed by public awareness campaign.Keywords: food preservatives, flavouring agents, knowledge and practices, general population
Procedia PDF Downloads 5325094 Triplex Detection of Pistacia vera, Arachis hypogaea and Pisum sativum in Processed Food Products Using Probe Based PCR
Authors: Ergün Şakalar, Şeyma Özçirak Ergün, Emrah Yalazi̇, Emine Altinkaya, Cengiz Ataşoğlu
Abstract:
In recent years, food allergies which cause serious health problems affect to public health around the world. Foodstuffs which contain allergens are either intentionally used as ingredients or are encased as contaminant in food products. The prevalence of clinical allergy to peanuts and nuts is estimated at about 0.4%-1.1% of the adult population, representing the allergy to pistachio the 7% of the cases of tree nut causing allergic reactions. In order to protect public health and enforce the legislation, methods for sensitive analysis of pistachio and peanut contents in food are required. Pea, pistachio and peanut are used together, to reduce the cost in food production such as baklava, snack foods.DNA technology-based methods in food analysis are well-established and well-roundedtools for species differentiation, allergen detection. Especially, the probe-based TaqMan real-time PCR assay can amplify target DNA with efficiency, specificity, and sensitivity.In this study, pistachio, peanut and pea were finely ground and three separate series of triplet mixtures containing 0.1, 1, 10, 100, 1000, 10,000 and 100,000 mg kg-1 of each sample were prepared for each series, to a final weight of 100 g. DNA from reference samples and industrial products was successfully extracted with the GIDAGEN® Multi-Fast DNA Isolation Kit. TaqMan probes were designed for triplex determination of ITS, Ara h 3 and pea lectin genes which are specific regions for identification pistachio, peanut and pea, respectively.The real-time PCR as quantitative detected pistachio, peanut and pea in these mixtures down to the lowest investigated level of 0.1, 0.1 and 1 mg kg-1, respectively. Also, the methods reported here are capable of detecting of as little as 0.001% level of peanut DNA, 0,000001% level of pistachio DNA and 0.000001% level of pea DNA. We accomplish that the quantitative triplex real-time PCR method developed in this study canbe applied to detect pistachio, peanut and peatraces for three allergens at once in commercial food products.Keywords: allergens, DNA, real-time PCR, TaqMan probe
Procedia PDF Downloads 2565093 Consumer Knowledge and Behavior in the Aspect of Food Waste
Authors: Katarzyna Neffe-Skocinska, Marzena Tomaszewska, Beata Bilska, Dorota Zielinska, Monika Trzaskowska, Anna Lepecka, Danuta Kolozyn-Krajewska
Abstract:
The aim of the study was to assess Polish consumer behavior towards food waste, including knowledge of information on food labels. The survey was carried out using the CAPI (computer assisted personal interview) method, which involves interviewing the respondent using mobile devices. The research group was a representative sample for Poland due to demographic variables: gender, age, place of residence. A total of 1.115 respondents participated in the study (51.1% were women and 48.9% were men). The questionnaire included questions on five thematic aspects: 1. General knowledge and sources of information on the phenomenon of food waste; 2. Consumption of food after the date of minimum durability; 3. The meanings of the phrase 'best before ...'; 4. Indication of the difference between the meaning of the words 'best before ...' and 'use by'; 5. Indications products marked with the phrase 'best before ...'. It was found that every second surveyed Pole met with the topic of food waste (54.8%). Among the respondents, the most popular source of information related to the research topic was television (89.4%), radio (26%) and the Internet (24%). Over a third of respondents declared that they consume food after the date of minimum durability. Only every tenth (9.8%) respondent does not pay attention to the expiry date and type of consumed products (durable and perishable products). Correctly 39.8% of respondents answered the question: How do you understand the phrase 'best before ...'? In the opinion of 42.8% of respondents, the statements 'best before ...' and 'use by' mean the same thing, while 36% of them think differently. In addition, more than one-fifth of respondents could not respond to the questions. In the case of products of the indication information 'best before ...', more than 40% of the respondents chosen perishable products, e.g., yoghurts and durable, e.g., groats. A slightly lower percentage of indications was recorded for flour (35.1%), sausage (32.8%), canned corn (31.8%), and eggs (25.0%). Based on the assessment of the behavior of Polish consumers towards the phenomenon of food waste, it can be concluded that respondents have elementary knowledge of the study subject. Noteworthy is the good conduct of most respondents in terms of compliance with shelf life and dates of minimum durability of food products. The publication was financed on the basis of an agreement with the National Center for Research and Development No. Gospostrateg 1/385753/1/NCBR/2018 for the implementation and financing of the project under the strategic research and development program social and economic development of Poland in the conditions of globalizing markets – GOSPOSTRATEG - acronym PROM.Keywords: food waste, shelf life, dates of durability, consumer knowledge and behavior
Procedia PDF Downloads 1745092 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism
Authors: Adamu Buba
Abstract:
As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.Keywords: challenges, security, governance, ecowas, response
Procedia PDF Downloads 2565091 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 4845090 Adopting Data Science and Citizen Science to Explore the Development of African Indigenous Agricultural Knowledge Platform
Authors: Steven Sam, Ximena Schmidt, Hugh Dickinson, Jens Jensen
Abstract:
The goal of this study is to explore the potential of data science and citizen science approaches to develop an interactive, digital, open infrastructure that pulls together African indigenous agriculture and food systems data from multiple sources, making it accessible and reusable for policy, research and practice in modern food production efforts. The World Bank has recognised that African Indigenous Knowledge (AIK) is innovative and unique among local and subsistent smallholder farmers, and it is central to sustainable food production and enhancing biodiversity and natural resources in many poor, rural societies. AIK refers to tacit knowledge held in different languages, cultures and skills passed down from generation to generation by word of mouth. AIK is a key driver of food production, preservation, and consumption for more than 80% of citizens in Africa, and can therefore assist modern efforts of reducing food insecurity and hunger. However, the documentation and dissemination of AIK remain a big challenge confronting librarians and other information professionals in Africa, and there is a risk of losing AIK owing to urban migration, modernisation, land grabbing, and the emergence of relatively small-scale commercial farming businesses. There is also a clear disconnect between the AIK and scientific knowledge and modern efforts for sustainable food production. The study combines data science and citizen science approaches through active community participation to generate and share AIK for facilitating learning and promoting knowledge that is relevant for policy intervention and sustainable food production through a curated digital platform based on FAIR principles. The study adopts key informant interviews along with participatory photo and video elicitation approach, where farmers are given digital devices (mobile phones) to record and document their every practice involving agriculture, food production, processing, and consumption by traditional means. Data collected are analysed using the UK Science and Technology Facilities Council’s proven methodology of citizen science (Zooniverse) and data science. Outcomes are presented in participatory stakeholder workshops, where the researchers outline plans for creating the platform and developing the knowledge sharing standard framework and copyrights agreement. Overall, the study shows that learning from AIK, by investigating what local communities know and have, can improve understanding of food production and consumption, in particular in times of stress or shocks affecting the food systems and communities. Thus, the platform can be useful for local populations, research, and policy-makers, and it could lead to transformative innovation in the food system, creating a fundamental shift in the way the North supports sustainable, modern food production efforts in Africa.Keywords: Africa indigenous agriculture knowledge, citizen science, data science, sustainable food production, traditional food system
Procedia PDF Downloads 825089 Modulation of Fish Allergenicity towards the Production of a Low Allergen Farmed Fish
Authors: Denise Schrama, Claudia Raposo, Pedro Rodrigues
Abstract:
Background: Food allergies are conducted by a hypersensitive response of the immune system. These allergies are a global concern for the public health. Consumption of fish is increasing worldwide as it is a healthy meat with high nutritional value. Unfortunately, fish can cause adverse immune-mediate reactions, affecting part of the population with higher incidence in children. β-parvalbumin, a small, highly conserved stable, calcium or magnesium binding muscle protein is the main fish allergen. In fish-allergic patients, cross-reactivity between different fish species exist due to recognition of highly identical protein regions. Enolases, aldolases, or fish gelatin are other identified fish allergens in some fish species. With no available cure for fish allergies, clinical management is only based on an avoidance diet aiming at the total exclusion of offending food. Methods: Mediterranean fish (S. aurata and D. labrax) were fed specifically designed diets, enriched in components that target the expression or inactivation of parvalbumin (creatine and EDTA, respectively). After 90 days fish were sampled and biological tissues were excised. Proteomics was used to access fish allergens characterization and expression in muscle while IgE assays to confirm the lower allergenic potential are conducted in patients with history of fish allergies. Fish welfare and quality of flesh were established with biochemical, texture and sensorial analysis. Results: Fish welfare shows no major impact between diets. In case of creatine supplementation in D. labrax proteomic analysis show a slight decrease in parvalbumin expression. No accumulation of this compound was found in muscle. For EDTA supplementation in S. aurata IgE assay show a slight decrease in allergenicity when using sera of fish allergic patients. Conclusion: Supplementation with these two compounds seems to change slightly the allergenicity of the two mean Mediterranean species.Keywords: fish allergies, fish nutrition, proteomics, aquaculture
Procedia PDF Downloads 1565088 Local Governments Supporting Environmentally Sustainable Meals to Protect the Planet and People
Authors: Magdy Danial Riad
Abstract:
Introduction: The ability of our world to support the expanding population after 2050 is at risk due to the food system's global role in poor health, climate change, and resource depletion. Healthy, equitable, and sustainable food systems must be achieved from the point of production through consumption in order to meet several of the sustainable development goals (SDG) targets. There is evidence that changing the local food environment can effectively change dietary habits in a community. The purpose of this article is to outline the policy initiatives taken by local governments to support environmentally friendly eating habits. Methods: Five databases were searched for peer-reviewed articles that described local government authorities' implementation of environmentally sustainable eating habits, were located in cities that had signed the Milan Urban Food Policy Pact, were published after 2015, were available in English, and described policy interventions. Data extraction was a two-step approach that started with extracting information from the included study and ended with locating information unique to policies in the grey literature. Results: 45 papers that described a variety of policy initiatives from low-, middle-, and high-income countries met the inclusion criteria. A variety of desired dietary behaviors were the focus of policy action, including reducing food waste, procuring food locally and in season, boosting breastfeeding, avoiding overconsumption, and consuming more plant-based meals and fewer items derived from animals. Conclusions: In order to achieve SDG targets, local governments are under pressure to implement evidence-based interventions. This study can help direct local governments toward evidence-based policy measures to improve regional food systems and support ecologically friendly eating habits.Keywords: meals, planet, poor health, eating habits
Procedia PDF Downloads 535087 Compliance Of Dialysis patients With Nutrition Guidelines: Insights From A Questionnaire
Authors: Zeiler M., Stadler D., Schmaderer C.
Abstract:
Over the years of dialysis treatment, most patients experience significant weight loss. The primary emphasis in earlier research was the underlying mechanism of protein energy wasting and the subsequent malnutrition inflammation syndrome. In the interest to provide an effective and rapid solution for the patients, the aim of this study is identifying individual influences of their assumed reduced dietary intake, such as nausea, appetite loss and taste changes, and to determine whether the patients adhere to their nutrition guidelines. A prospective, controlled study with 38 end-stage renal disease patients was performed using a questionnaire to reflect their diet within the last 12 months. Thereby, the daily intake for the most important macro-and micronutrients was calculated to be compared with the individual KDQOI-guideline value, as well as controls matched in age and gender. The majority of the study population did not report symptoms commonly associated with dialysis, such as nausea or inappetence, and denied any change in dietary behavior since receiving renal replacement therapy. The patients’ daily intake of energy (3080kcal ± 1266) and protein (89,9g [53,4-142,0]) did not differ significantly from the controls (energy intake: 3233kcal ± 1046, p=0,597; protein intake: 103,7g [90,1-125,5], p=0,120). The average difference to the individual calculated KDQOI-guideline was +176,0kcal ± 1156 (p=0,357) for energy intake and -1,75g ± 45,9 (p=0,491) for protein intake. However, there was an observed imbalance in the distribution of macronutrients, with a preference for fats over proteins. The patients’ daily intake of sodium (5,4g [ 2,95-10,1]) was higher than in the controls (4,1g [2,04-5,99], p= 0,058) whereas both values for potassium (3,7g ± 1,84) and phosphorous (1,79g ± 0,91) went significantly below the controls’ values (potassium intake: 4,89g ± 1,74, p=0,014; phosphorous intake: 2,04g ± 0,64, p=0,038). Thus, the values exceeded the calculated KDQOI-recommendation by + 3,3g [0,63-7,90] (p<0,001) for sodium, +1,49g ± 1,84 (p<0,001) for potassium and +0,89g ± 0,91 (p<0,001) for phosphorous. Contrary to the assumption, the patients did not under-eat. Nevertheless, their diets did not align with the recommended values. These findings highlight the need for intervention and education among patients and that regular dietary monitoring could prevent unhealthy nutrition habits. The elaboration of individual references instead of standardized guidelines could increase the compliance to the advised diet so that interdisciplinary comorbidities do not develop or worsen.Keywords: compliance, dialysis, end-stage renal disease, KDQOI, malnutrition, nutrition guidelines, questionnaire, salt intake
Procedia PDF Downloads 685086 Utilization of Juncus acutus as Alternative Feed Resource in Ruminants
Authors: Nurcan Cetinkaya
Abstract:
The aim of this paper is to bring about the utilization of Juncus acutus as an alternative roughage resource in ruminant nutrition. In Turkey, JA is prevailing plant of the natural grassland in Kizilirmak Delta, Samsun. Crude nutrient values such as crude protein (CP), ether extract (EE), organic matter (OM), neutral detergent fiber (NDF), acid detergent fiber (ADF), and acid detergent lignin(ADL) including antioxidant activity, total phenolic and flavonoid compounds, total organic matter digestibility (OMD) and metabolisable energy (ME) values of Juncus acutus stem, seed, and also its mixture with maize silage were estimated. and published. Furthermore, the effects of JA over rumen cellulolitic bacteria were studied. The obtained results from different studies conducted on JA by our team show that Juncus acutus may be a new roughage source in ruminant nutrition.Keywords: antioxidant activity, cellulolytic bacteria, Juncus acutus, organic matter digestibility
Procedia PDF Downloads 2835085 Challenges in E-Government: Conceptual Views and Solutions
Authors: Rasim Alguliev, Farhad Yusifov
Abstract:
Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.Keywords: electron government, public administration, information security, web-analytics, social networks, data mining
Procedia PDF Downloads 4735084 Nutritional Status of Surgical and Orthopedic Patients: 3B Ward
Authors: Jitaree Tantiyasawatdikul, Bantita Jadnok, Sarunya Tijana
Abstract:
Background: Nutritional status is an important factor before, during, and after an operation. It can help wound healing. If the patients have good nutritional status before and after an operation, wound healing can occur more easily. It can strengthen the immune system leading to decreased infection, reduced length of stay, and reducing the cost to patients and caregivers. Therefore, screening to evaluate the nutritional status of patients in 3B becomes the database for further developing the treatment and also will lead to excellent service from the interdisciplinary team. Objective: To study the nutritional status of patients in surgical ward 3B at Surgical and Orthopedics Nursing Division, Srinagarind Hospital. Method: A descriptive study, to evaluate the nutritional status of 86 patients admitted in 3B between October 2014 and March 2015.The instruments used in this study consisted of two parts: 1) personal data, 2) Screening nutritional status. The data were analyzed by percentage and mean. Results: A sample population of 86 patients aged 22-81 years old, mean age 52.59years, 90.69% are married, female were 55.81%, regular diet 70.93%, patients with no problem oral cavity was 87.21%.The sample population had high incidence of CA 47.67% and secondly cardiovascular disease 36.05 %. Patients with high-risk nutrition was 12.79 % including 45.45% cardiovascular disease and 36.36% CA. Screening of nutritional status of high-risk nutrition was 39.36% severe triceps skinfold (TSF), severe mid-arm muscle circumference(MAMC) 9.09% and severe total lymphocyte 39.36%. Conclusion: The result of nutritional status screening of surgical ward 3B found 12.79% patients with high-risk nutrition including 45.45% with cardiovascular disease .There was no problem with oral cavity and eating.Keywords: nutritional status, screening, surgical patients, 3B ward, Srinagarind Hospital
Procedia PDF Downloads 3265083 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.Keywords: cloud storage security, sharing storage, attributes, Hash algorithm
Procedia PDF Downloads 3905082 Innovative Power Engineering in a Selected Rural Commune
Authors: Pawel Sowa, Joachim Bargiel
Abstract:
This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.Keywords: energy security, mini energy centres , power engineering, power supply reliability
Procedia PDF Downloads 3005081 Dietary Micronutritient and Health among Youth in Algeria
Authors: Allioua Meryem
Abstract:
Similar to much of the developing world, Algeria is currently undergoing an epidemiological transition. While mal- and under-nutrition and infectious diseases used to be the main causes of poor health, today there is a higher proportion of chronic, non-communicable diseases (NCDs), including cardiovascular disease, diabetes mellitus, cancer, etc. According to estimates for Algeria from the World Health Organization (WHO), NCDs accounted for 63% of all deaths in 2010. The objective of this study was the assessment of eating habits and anthropometric characteristics in a group of youth aged 15 to 19 years in Tlemcen. This study was conducted on a total effective of 806 youth enrolled in a descriptive cross-sectional study; the classification of nutritional status has been established by international standards IOTF, youth were defined as obese if they had a BMI ≥ 95th percentile, and youth with 85th ≤ BMI ≤ 95th percentile were defined as overweight. Wc is classified by the criteria HD, Wc with moderate risk ≥ 90th percentile and Wc with high risk ≥ 95th percentile. The dietary assessment was based on a 24-hour dietary recall assisted by food records. USDA’S nutrient database for Nutrinux® program was used to analyze dietary intake. Nutrients adequacy ratio was calculated by dividing daily individual intake to dietary recommended intake DRI for each nutrient. 9% of the population was overweight, 3% was obese, 7.5% had abdominal obesity, foods eaten in moderation are chips, cookies, chocolate 1-3 times/day and increased consumption of fried foods in the week, almost half of youth consume sugary drinks more than 3 times per week, we observe a decreased intake of energy, protein (P < 0.001, P = 0.003), SFA (P = 0.018), the NAR of phosphorus, iron, magnesium, vitamin B6, vitamin E, folate, niacin, and thiamin reflecting less consumption of fruit, vegetables, milk, and milk products. Youth surveyed have eating habits at risk of developing obesity and chronic disease.Keywords: food intake, health, anthropometric characteristics, Algeria
Procedia PDF Downloads 5405080 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2955079 Application of Probiotics in the Management of Food Allergies: A Review
Authors: Amir Hosseinvand
Abstract:
Probiotics have health-giving effects on the human body, so by stimulating the immune system, they prevent many occurrences they are diseases and food allergies in humans. There are various bacteria in the human digestive system; some are useful, some are harmless, and other groups of bacteria are harmful to human health. These bacteria should be in balance in the body of people in a normal state. In certain conditions, such as a person's high stress, aging, continuous use of antibiotics, or improper diet, the intestinal microbial flora has changed, and these changes cause some diseases in people. Probiotics have health benefits for the human body and are often found in the digestive system of healthy people. Nevertheless, fermented foods such as fermented dairy products such as yogurt, cheese, buttermilk or fermented pickles contain some species of these bacteria that are useful. But the important point that should be noted is that due to modern and industrial life, high fat and high protein diets, and excessive use of antibiotics, the number of these bacteria in people's bodies has decreased, and it is necessary to consume probiotics either in the form of probiotic foods or in the form of supplements. Probiotics with mild stimulation of the immune system increase the immunity level of the body and prevent the occurrence of food allergies in people.Keywords: human health, dairy products, food allergies, probiotic
Procedia PDF Downloads 365078 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 655077 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees
Authors: Afsana Afsar Tuly
Abstract:
The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar
Procedia PDF Downloads 1465076 Cryptography Based Authentication Methods
Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf
Abstract:
This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.Keywords: information security, cryptography, system access control, authentication, network security
Procedia PDF Downloads 4715075 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 1405074 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme
Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe
Abstract:
The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code
Procedia PDF Downloads 425073 A Comparative Assessment of the FoodSupply Vulnerability to Large-Scale Disasters in OECD Countries
Authors: Karolin Bauer, Anna Brinkmann
Abstract:
Vulnerabilities in critical infrastructure can cause significant difficulties for the affected population during crises. Securing the food supply as part of the critical infrastructure in crisis situations is an essential part of public services and a ground stone for a successful concept of civil protection. In most industrialized countries, there are currently no comparative studies regarding the food supply of the population during crisis and disaster events. In order to mitigate the potential impact in case of major disasters in Germany, it is absolutely necessary to investigate how the food supply can be secured. The research project aims to provide in-depth research on the experiences gathered during past large-scale disasters in the 34 OECD member countries in order to discover alternatives for an updated civil protection system in Germany. The basic research question is: "Which international approaches and structures of civil protection have been proven and would be useful to modernize the German civil protection with regards to the critical infrastructure and food supply?" Research findings should be extracted from an extensive literature review covering the entire research period as well as from personal and online-based interviews with experts and responsible persons from involved institutions. The capability of the research project insists on the deliberate choice to investigate previous large-scale disasters to formulate important and practical approaches to modernize civil protection in Germany.Keywords: food supply, vulnerabilty, critical infratstructure, large-scale disaster
Procedia PDF Downloads 336