Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6110

Search results for: food security and nutrition

4850 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 422
4849 Use of Linear Programming for Optimal Production in a Production Line in Saudi Food Co.

Authors: Qasim M. Kriri

Abstract:

Few Saudi Arabia production companies face financial profit issues until this moment. This work presents a linear integer programming model that solves a production problem of a Saudi Food Company in Saudi Arabia. An optimal solution to the above-mentioned problem is a Linear Programming solution. In this regard, the main purpose of this project is to maximize profit. Linear Programming Technique has been used to derive the maximum profit from production of natural juice at Saudi Food Co. The operations of production of the company were formulated and optimal results are found out by using Lindo Software that employed Sensitivity Analysis and Parametric linear programming in order develop Linear Programming. In addition, the parameter values are increased, then the values of the objective function will be increased.

Keywords: parameter linear programming, objective function, sensitivity analysis, optimize profit

Procedia PDF Downloads 184
4848 Hierarchical Cluster Analysis of Raw Milk Samples Obtained from Organic and Conventional Dairy Farming in Autonomous Province of Vojvodina, Serbia

Authors: Lidija Jevrić, Denis Kučević, Sanja Podunavac-Kuzmanović, Strahinja Kovačević, Milica Karadžić

Abstract:

In the present study, the Hierarchical Cluster Analysis (HCA) was applied in order to determine the differences between the milk samples originating from a conventional dairy farm (CF) and an organic dairy farm (OF) in AP Vojvodina, Republic of Serbia. The clustering was based on the basis of the average values of saturated fatty acids (SFA) content and unsaturated fatty acids (UFA) content obtained for every season. Therefore, the HCA included the annual SFA and UFA content values. The clustering procedure was carried out on the basis of Euclidean distances and Single linkage algorithm. The obtained dendrograms indicated that the clustering of UFA in OF was much more uniform compared to clustering of UFA in CF. In OF, spring stands out from the other months of the year. The same case can be noticed for CF, where winter is separated from the other months. The results could be expected because the composition of fatty acids content is greatly influenced by the season and nutrition of dairy cows during the year.

Keywords: chemometrics, clustering, food engineering, milk quality

Procedia PDF Downloads 258
4847 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 109
4846 Relevance in the Water-Energy-Food nexus: an Opportunity for Promoting Socio Economic Development in Algeria

Authors: Nadjib Drouiche

Abstract:

Water resources in Algeria are scarce, often low quality, fragile, and unevenly distributed in space and time. The pressure on water resources can be associated with industrial development, a steady population growth, and demanding land irrigation measures. These conditions createa tense competitionfor managing waterresourcesand sharing thembetween agricultural development, drinking water supply, industrial activities, etc. Moreover, the impact of climate change has placed in the forefront national policies focused on the water-energy-food nexus (WEF). In this context, desalination membrane technologies could play an increasing rolefor supporting segments of the Algerian economy that are heavily water-dependent. By implementing water reuse and desalination strategies together in the agricultural sector, there is an opportunity to expand the access to healthy food and clean water, thereby keeping the WEF nexus effects under control.

Keywords: desalination, mitigation, climate change, sustainable development goals

Procedia PDF Downloads 81
4845 Making Food Science Education and Research Activities More Attractive for University Students and Food Enterprises by Utilizing Open Innovative Space-Approach

Authors: Anna-Maria Saarela

Abstract:

At the Savonia University of Applied Sciences (UAS), curriculum and studies have been improved by applying an Open Innovation Space approach (OIS). It is based on multidisciplinary action learning. The key elements of OIS-ideology are work-life orientation, and student-centric communal learning. In this approach, every participant can learn from each other and innovations will be created. In this social innovation educational approach, all practices are carried out in close collaboration with enterprises in real-life settings, not in classrooms. As an example, in this paper, Savonia UAS’s Future Food RDI hub (FF) shows how OIS practices are implemented by providing food product development and consumer research services for enterprises in close collaboration with academicians, students and consumers. In particular one example of OIS experimentation in the field is provided by a consumer research carried out utilizing verbal analysis protocol combined with audio-visual observation (VAP-WAVO). In this case, all co-learners were acting together in supermarket settings to collect the relevant data for a product development and the marketing department of a company. The company benefitted from the results obtained, students were more satisfied with their studies, educators and academicians were able to obtain good evidence for further collaboration as well as renewing curriculum contents based on the requirements of working life. In addition, society will benefit over time as young university adults find careers more easily through their OIS related food science studies. Also this knowledge interaction model re-news education practices and brings working-life closer to educational research institutes.

Keywords: collaboration, education, food science, industry, knowledge transfer, RDI, student

Procedia PDF Downloads 355
4844 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 143
4843 Drying Kinetics of Okara (Soy Pulp) Using the Multi-Commodity Heat Pump Dryer (MCHPD)

Authors: Lorcelie B. Taclan, Jolly S. Balila, Maribel Balagtas, Eunice M. Aclan, Myrtle C. Orbon, Emson Y. Taclan, Irenea A. Centeno

Abstract:

Okara (soy pulp), a by-product and waste from the production of soymilk, tufo and tokwa and soybean-based vegan food products is readily available in the university thrice a week. The Food Factory owned and managed by AUP produces these food products weekly. Generally the study was conducted to determine the drying kinetics of soya pulp using the MCHPD. Specifically, it aimed to establish the time of drying; moisture loss per hour and percent moisture content of soya pulp and to establish the dried okara as an ingredient to other foods. The MCHPD is drying equipment that has an ideal drying condition of 50.00C and 10.0% relative humidity. Fresh and wet soya pulp were weighed at 1.0 kg per tray (21 drying trays), laid on the trays lined with cheese cloth. The MCHPD was set to desired drying conditions. Weight loss was monitored every hour and calculated using standard formulas. Research results indicated that the drying time for soya pulp was 19.0 hours; the % moisture content was reduced from 87.6.0% to 9.7.0% at an average moisture loss of 3.0 g/hr. The nutritional values of okara were favorably maintained with enhanced color. The dried okara was added as an ingredient to other healthy bakery products produced by the AUP Food Factory. Making use of okara would add nutritional values to other food products and would also help waste management concerns inside the university.

Keywords: okara, MCHPD, drying kinetics, nutritional values, waste management

Procedia PDF Downloads 377
4842 Obtaining Nutritive Powder from Peel of Mangifera Indica L. (Mango) as a Food Additive

Authors: Chajira Garrote, Laura Arango, Lourdes Merino

Abstract:

This research explains how to obtain nutritious powder from a variety of ripe mango peels Hilacha (Mangifera indica L.) to use it as a food additive. Also, this study intends to use efficiently the by-products resulting from the operations of mango pulp manufacturing process by processing companies with the aim of giving them an added value. The physical and chemical characteristics of the mango peels and the benefits that may help humans, were studied. Unit operations are explained for the processing of mango peels and the production of nutritive powder as a food additive. Emphasis is placed on the preliminary operations applied to the raw material and on the drying method, which is very important in this project to obtain the suitable characteristics of the nutritive powder. Once the powder was obtained, it was subjected to laboratory tests to determine its functional properties: water retention capacity (WRC) and oil retention capacity (ORC), also a sensory analysis for the powder was performed to determine the product profile. The nutritive powder from the ripe mango peels reported excellent WRC and ORC values: 7.236 g of water / g B.S. and 1.796 g water / g B.S. respectively and the sensory analysis defined a complete profile of color, odor and texture of the nutritive powder, which is suitable to use it in the food industry.

Keywords: mango, peel, powder, nutritive, functional properties, sensory analysis

Procedia PDF Downloads 335
4841 Efficiency and Scale Elasticity in Network Data Envelopment Analysis: An Application to International Tourist Hotels in Taiwan

Authors: Li-Hsueh Chen

Abstract:

Efficient operation is more and more important for managers of hotels. Unlike the manufacturing industry, hotels cannot store their products. In addition, many hotels provide room service, and food and beverage service simultaneously. When efficiencies of hotels are evaluated, the internal structure should be considered. Hence, based on the operational characteristics of hotels, this study proposes a DEA model to simultaneously assess the efficiencies among the room production division, food and beverage production division, room service division and food and beverage service division. However, not only the enhancement of efficiency but also the adjustment of scale can improve the performance. In terms of the adjustment of scale, scale elasticity or returns to scale can help to managers to make decisions concerning expansion or contraction. In order to construct a reasonable approach to measure the efficiencies and scale elasticities of hotels, this study builds an alternative variable-returns-to-scale-based two-stage network DEA model with the combination of parallel and series structures to explore the scale elasticities of the whole system, room production division, food and beverage production division, room service division and food and beverage service division based on the data of international tourist hotel industry in Taiwan. The results may provide valuable information on operational performance and scale for managers and decision makers.

Keywords: efficiency, scale elasticity, network data envelopment analysis, international tourist hotel

Procedia PDF Downloads 207
4840 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 88
4839 Ecological Networks: From Structural Analysis to Synchronization

Authors: N. F. F. Ebecken, G. C. Pereira

Abstract:

Ecological systems are exposed and are influenced by various natural and anthropogenic disturbances. They produce various effects and states seeking response symmetry to a state of global phase coherence or stability and balance of their food webs. This research project addresses the development of a computational methodology for modeling plankton food webs. The use of algorithms to establish connections, the generation of representative fuzzy multigraphs and application of technical analysis of complex networks provide a set of tools for defining, analyzing and evaluating community structure of coastal aquatic ecosystems, beyond the estimate of possible external impacts to the networks. Thus, this study aims to develop computational systems and data models to assess how these ecological networks are structurally and functionally organized, to analyze the types and degree of compartmentalization and synchronization between oscillatory and interconnected elements network and the influence of disturbances on the overall pattern of rhythmicity of the system.

Keywords: ecological networks, plankton food webs, fuzzy multigraphs, dynamic of networks

Procedia PDF Downloads 281
4838 Cloud Shield: Model to Secure User Data While Using Content Delivery Network Services

Authors: Rachna Jain, Sushila Madan, Bindu Garg

Abstract:

Cloud computing is the key powerhouse in numerous organizations due to shifting of their data to the cloud environment. In recent years it has been observed that cloud-based-services are being used on large scale for content storage, distribution and processing. Various issues have been observed in cloud computing environment that need to be addressed. Security and privacy are found topmost concern area. In this paper, a novel security model is proposed to secure data by utilizing CDN services like image to icon conversion. CDN Service is a content delivery service which converts an image to icon, word to pdf & Latex to pdf etc. Presented model is used to convert an image into icon by keeping image secret. Here security of image is imparted so that image should be encrypted and decrypted by data owners only. It is also discussed in the paper that how server performs multiplication and selection on encrypted data without decryption. The data can be image file, word file, audio or video file. Moreover, the proposed model is capable enough to multiply images, encrypt them and send to a server application for conversion. Eventually, the prime objective is to encrypt an image and convert the encrypted image to image Icon by utilizing homomorphic encryption.

Keywords: cloud computing, user data security, homomorphic encryption, image multiplication, CDN service

Procedia PDF Downloads 319
4837 Halal Authentication for Some Product Collected from Jordanian Market Using Real-Time PCR

Authors: Omar S. Sharaf

Abstract:

The mitochondrial 12s rRNA (mt-12s rDNA) gene for pig-specific was developed to detect material from pork species in different products collected from Jordanian market. The amplification PCR products of 359 bp and 531 bp were successfully amplified from the cyt b gene of pig the amplification product using mt-12S rDNA gene were successfully produced a single band with a molecular size of 456 bp. In the present work, the PCR amplification of mtDNA of cytochrome b has been shown as a suitable tool for rapid detection of pig DNA. 100 samples from different dairy, gelatin and chocolate based products and 50 samples from baby food formula were collected and tested to a presence of any pig derivatives. It was found that 10% of chocolate based products, 12% of gelatin and 56% from dairy products and 5.2% from baby food formula showed single band from mt-12S rDNA gene.

Keywords: halal food, baby infant formula, chocolate based products, PCR, Jordan

Procedia PDF Downloads 515
4836 Soil Composition in Different Agricultural Crops under Application of Swine Wastewater

Authors: Ana Paula Almeida Castaldelli Maciel, Gabriela Medeiros, Amanda de Souza Machado, Maria Clara Pilatti, Ralpho Rinaldo dos Reis, Silvio Cesar Sampaio

Abstract:

Sustainable agricultural systems are crucial to ensuring global food security and the long-term production of nutritious food. Comprehensive soil and water management practices, including nutrient management, balanced fertilizer use, and appropriate waste management, are essential for sustainable agriculture. Swine wastewater (SWW) treatment has become a significant focus due to environmental concerns related to heavy metals, antibiotics, resistant pathogens, and nutrients. In South America, small farms use soil to dispose of animal waste, a practice that is expected to increase with global pork production. The potential of SWW as a nutrient source is promising, contributing to global food security, nutrient cycling, and mineral fertilizer reduction. Short- and long-term studies evaluated the effects of SWW on soil and plant parameters, such as nutrients, heavy metals, organic matter (OM), cation exchange capacity (CEC), and pH. Although promising results have been observed in short- and medium-term applications, long-term applications require more attention due to heavy metal concentrations. Organic soil amendment strategies, due to their economic and ecological benefits, are commonly used to reduce the bioavailability of heavy metals. However, the rate of degradation and initial levels of OM must be monitored to avoid changes in soil pH and release of metals. The study aimed to evaluate the long-term effects of SWW application on soil fertility parameters, focusing on calcium (Ca), magnesium (Mg), and potassium (K), in addition to CEC and OM. Experiments were conducted at the Universidade Estadual do Oeste do Paraná, Brazil, using 24 drainage lysimeters for nine years, with different application rates of SWW and mineral fertilization. Principal Component Analysis (PCA) was then conducted to summarize the composite variables, known as principal components (PC), and limit the dimensionality to be evaluated. The retained PCs were then correlated with the original variables to identify the level of association between each variable and each PC. Data were interpreted using Analysis of Variance - ANOVA for general linear models (GLM). As OM was not measured in the 2007 soybean experiment, it was assessed separately from PCA to avoid loss of information. PCA and ANOVA indicated that crop type, SWW, and mineral fertilization significantly influenced soil nutrient levels. Soybeans presented higher concentrations of Ca, Mg, and CEC. The application of SWW influenced K levels, with higher concentrations observed in SWW from biodigesters and higher doses of swine manure. Variability in nutrient concentrations in SWW due to factors such as animal age and feed composition makes standard recommendations challenging. OM levels increased in SWW-treated soils, improving soil fertility and structure. In conclusion, the application of SWW can increase soil fertility and crop productivity, reducing environmental risks. However, careful management and long-term monitoring are essential to optimize benefits and minimize adverse effects.

Keywords: contamination, water research, biodigester, nutrients

Procedia PDF Downloads 31
4835 Effect of Phaseolus vulgaris Inoculation on P. vulgaris and Zea mays Growth and Yield Cultivated in Intercropping

Authors: Nour Elhouda Abed, Bedj Mimi, Wahid Slimani, Mourad Atif, Abdelhakim Ouzzane, Hocine Irekti, Abdelkader Bekki

Abstract:

The most frequent system of cereal production in Algeria is fallow-wheat. This is an extensive system that meets only the half needs some cereals and fodder demand. Resorption of fallow has become a strategic necessity to ensure food security in response to the instability of supply and the persistence of higher food prices on the world market. Despite several attempts to replace the fallow by crop cultures, choosing the best crop remains. Today, the agronomic and economic interests of legumes are demonstrated. However, their crop culture remains marginalized because of the weakness and instability of their performance. In the context of improving legumes and cereals crops as well as fallow resorption, we undertook to test, in the field, the effect of rhizobial inoculation of Phaseolus vulgaris in association with Zea Mays. We firstly studied the genetic diversity of rhizobial strains that nodulate P.vulgaris isolated from fifteen (15) different regions. ARDRA had shown 18 different genetic profiles. Symbiotic characterization highlighted a strain that highly significantly improved the fresh and dry weight of the host plant, in comparison to the negative control (un-inoculated) and the positive control (inoculated with the reference strain CIAT 899). In the field, the selected strain increased significantly the growth and yield of P.vulgaris and Zea Mays comparing to the non-inoculated control. However, the mix inoculation (selected strain+ Ciat 899) had not given the best parameters showing, thus, no synergy between the strains. These results indicate the replacing fallow by a crop legume in intercropping with cereals crops.

Keywords: fallow, intercropping, inoculation, legumes-cereals

Procedia PDF Downloads 343
4834 Feasibility Study of Iraq' Decomposition and Its Effects on the Region

Authors: Ebrahim Rahmani, Siyamak Moazeni

Abstract:

According to the Iraq's first constitutional law (approved 2005), Iraq is an independent with sovereignty and its governmental structure is parliamentary democratic republic and federal. Even in reforms in 2009, this article of law did not changed at all. But considering the existence of this emphasis and clarity which is mentioned in the law, different and sometimes contradictory interpretations and positions are expressed about federalism in the way that we can say, considering the importance of the matter, federalism is a focus point to create and expansion of the cold war among leaders of different groups of the country. Iraq's today political and security position has granted the suitable opportunity to Iraq's Kurdistan in appearing of the recent security crisis to increase its share from the central political power or to achieve to its independent dream. The federalism the weakest point of Iraq's territorial integrity in a way that if different groups do not come to a consensus about it and do not think about a mechanism which is accepted by all of them, this can effect on and Iraq's political stability and security. Iraq's Kurdistan follows the option of disintegration and separation under the shadow of political and security changes, even with existence of some Iraqi groups' hopes regarding the improvement of situation after parliament election and also considering Masoud Barezani's power will for separation from Iraq as well as regarding special international changes and disintegration of Karime from Ukraine and ISIS crises; concerns have been created among regional and international powers and interior players. In this article, a paradox due constitutional law about federalism, Iraq's central government view and its politicians to the matter and the regional effect of this action on region's geopolitics are reviewed as well.

Keywords: constitutional law, federalism, decomposition, Iraq's Kurdistan

Procedia PDF Downloads 305
4833 Cyber Warfare and Cyber Terrorism: An Analysis of Global Cooperation and Cyber Security Counter Measures

Authors: Mastoor Qubra

Abstract:

Cyber-attacks have frequently disrupted the critical infrastructures of the major global states and now, cyber threat has become one of the dire security risks for the states across the globe. Recently, ransomware cyber-attacks, wannacry and petya, have affected hundreds of thousands of computer servers and individuals’ private machines in more than hundred countries across Europe, Middle East, Asia, United States and Australia. Although, states are rapidly becoming aware of the destructive nature of this new security threat and counter measures are being taken but states’ isolated efforts would be inadequate to deal with this heinous security challenge, rather a global coordination and cooperation is inevitable in order to develop a credible cyber deterrence policy. Hence, the paper focuses that coordinated global approach is required to deter posed cyber threat. This paper intends to analyze the cyber security counter measures in four dimensions i.e. evaluation of prevalent strategies at bilateral level, initiatives and limitations for cooperation at global level, obstacles to combat cyber terrorism and finally, recommendations to deter the threat by applying tools of deterrence theory. Firstly, it focuses on states’ efforts to combat the cyber threat and in this regard, US-Australia Cyber Security Dialogue is comprehensively illustrated and investigated. Secondly, global partnerships and strategic and analytic role of multinational organizations, particularly United Nations (UN), to deal with the heinous threat, is critically analyzed and flaws are highlighted, for instance; less significance of cyber laws within international law as compared to other conflict prone issues. In addition to this, there are certain obstacles and limitations at national, regional and global level to implement the cyber terrorism counter strategies which are presented in the third section. Lastly, by underlining the gaps and grey areas in the current cyber security counter measures, it aims to apply tools of deterrence theory, i.e. defense, attribution and retaliation, in the cyber realm to contribute towards formulating a credible cyber deterrence strategy at global level. Thus, this study is significant in understanding and determining the inevitable necessity of counter cyber terrorism strategies.

Keywords: attribution, critical infrastructure, cyber terrorism, global cooperation

Procedia PDF Downloads 250
4832 Intrusion Detection System Based on Peer to Peer

Authors: Alireza Pour Ebrahimi, Vahid Abasi

Abstract:

Recently by the extension of internet usage, Research on the intrusion detection system takes a significant importance. Many of improvement systems prevent internal and external network attacks by providing security through firewalls and antivirus. In recently years, intrusion detection systems gradually turn from host-based systems and depend on O.S to the distributed systems which are running on multiple O.S. In this work, by considering the diversity of computer networks whit respect to structure, architecture, resource, services, users and also security goals requirement a fully distributed collaborative intrusion detection system based on peer to peer architecture is suggested. in this platform each partner device (matched device) considered as a peer-to-peer network. All transmitted information to network are visible only for device that use security scanning of a source. Experimental results show that the distributed architecture is significantly upgradeable in respect to centralized approach.

Keywords: network, intrusion detection system, peer to peer, internal and external network

Procedia PDF Downloads 522
4831 Detecting Black Hole Attacks in Body Sensor Networks

Authors: Sara Alshehri, Bayan Alenzi, Atheer Alshehri, Samia Chelloug, Zainab Almry, Hussah Albugmai

Abstract:

This paper concerns body area networks sensor that collect signals around a human body. The black hole attacks are the main security challenging problem because the data traffic can be dropped at any node. The focus of our proposed solution is to efficiently route data packets while detecting black hole nodes.

Keywords: body sensor networks, security, black hole, routing, broadcasting, OMNeT++

Procedia PDF Downloads 620
4830 Compliance Of Dialysis patients With Nutrition Guidelines: Insights From A Questionnaire

Authors: Zeiler M., Stadler D., Schmaderer C.

Abstract:

Over the years of dialysis treatment, most patients experience significant weight loss. The primary emphasis in earlier research was the underlying mechanism of protein energy wasting and the subsequent malnutrition inflammation syndrome. In the interest to provide an effective and rapid solution for the patients, the aim of this study is identifying individual influences of their assumed reduced dietary intake, such as nausea, appetite loss and taste changes, and to determine whether the patients adhere to their nutrition guidelines. A prospective, controlled study with 38 end-stage renal disease patients was performed using a questionnaire to reflect their diet within the last 12 months. Thereby, the daily intake for the most important macro-and micronutrients was calculated to be compared with the individual KDQOI-guideline value, as well as controls matched in age and gender. The majority of the study population did not report symptoms commonly associated with dialysis, such as nausea or inappetence, and denied any change in dietary behavior since receiving renal replacement therapy. The patients’ daily intake of energy (3080kcal ± 1266) and protein (89,9g [53,4-142,0]) did not differ significantly from the controls (energy intake: 3233kcal ± 1046, p=0,597; protein intake: 103,7g [90,1-125,5], p=0,120). The average difference to the individual calculated KDQOI-guideline was +176,0kcal ± 1156 (p=0,357) for energy intake and -1,75g ± 45,9 (p=0,491) for protein intake. However, there was an observed imbalance in the distribution of macronutrients, with a preference for fats over proteins. The patients’ daily intake of sodium (5,4g [ 2,95-10,1]) was higher than in the controls (4,1g [2,04-5,99], p= 0,058) whereas both values for potassium (3,7g ± 1,84) and phosphorous (1,79g ± 0,91) went significantly below the controls’ values (potassium intake: 4,89g ± 1,74, p=0,014; phosphorous intake: 2,04g ± 0,64, p=0,038). Thus, the values exceeded the calculated KDQOI-recommendation by + 3,3g [0,63-7,90] (p<0,001) for sodium, +1,49g ± 1,84 (p<0,001) for potassium and +0,89g ± 0,91 (p<0,001) for phosphorous. Contrary to the assumption, the patients did not under-eat. Nevertheless, their diets did not align with the recommended values. These findings highlight the need for intervention and education among patients and that regular dietary monitoring could prevent unhealthy nutrition habits. The elaboration of individual references instead of standardized guidelines could increase the compliance to the advised diet so that interdisciplinary comorbidities do not develop or worsen.

Keywords: compliance, dialysis, end-stage renal disease, KDQOI, malnutrition, nutrition guidelines, questionnaire, salt intake

Procedia PDF Downloads 53
4829 Utilization of Juncus acutus as Alternative Feed Resource in Ruminants

Authors: Nurcan Cetinkaya

Abstract:

The aim of this paper is to bring about the utilization of Juncus acutus as an alternative roughage resource in ruminant nutrition. In Turkey, JA is prevailing plant of the natural grassland in Kizilirmak Delta, Samsun. Crude nutrient values such as crude protein (CP), ether extract (EE), organic matter (OM), neutral detergent fiber (NDF), acid detergent fiber (ADF), and acid detergent lignin(ADL) including antioxidant activity, total phenolic and flavonoid compounds, total organic matter digestibility (OMD) and metabolisable energy (ME) values of Juncus acutus stem, seed, and also its mixture with maize silage were estimated. and published. Furthermore, the effects of JA over rumen cellulolitic bacteria were studied. The obtained results from different studies conducted on JA by our team show that Juncus acutus may be a new roughage source in ruminant nutrition.

Keywords: antioxidant activity, cellulolytic bacteria, Juncus acutus, organic matter digestibility

Procedia PDF Downloads 253
4828 Computational Approaches for Ballistic Impact Response of Stainless Steel 304

Authors: A. Mostafa

Abstract:

This paper presents a numerical study on determination of ballistic limit velocity (V50) of stainless steel 304 (SS 304) used in manufacturing security screens. The simulated ballistic impact tests were conducted on clamped sheets with different thicknesses using ABAQUS/Explicit nonlinear finite element (FE) package. The ballistic limit velocity was determined using three approaches, namely: numerical tests based on material properties, FE calculated residual velocities and FE calculated residual energies. Johnson-Cook plasticity and failure criterion were utilized to simulate the dynamic behaviour of the SS 304 under various strain rates, while the well-known Lambert-Jonas equation was used for the data regression for the residual velocity and energy model. Good agreement between the investigated numerical methods was achieved. Additionally, the dependence of the ballistic limit velocity on the sheet thickness was observed. The proposed approaches present viable and cost-effective assessment methods of the ballistic performance of SS 304, which will support the development of robust security screen systems.

Keywords: ballistic velocity, stainless steel, numerical approaches, security screen

Procedia PDF Downloads 138
4827 Total-Reflection X-Ray Spectroscopy as a Tool for Element Screening in Food Samples

Authors: Hagen Stosnach

Abstract:

The analytical demands on modern instruments for element analysis in food samples include the analysis of major, trace and ultra-trace essential elements as well as potentially toxic trace elements. In this study total reflection, X-ray fluorescence analysis (TXRF) is presented as an analytical technique, which meets the requirements, defined by the Association of Official Agricultural Chemists (AOAC) regarding the limit of quantification, repeatability, reproducibility and recovery for most of the target elements. The advantages of TXRF are the small sample mass required, the broad linear range from µg/kg up to wt.-% values, no consumption of gases or cooling water, and the flexible and easy sample preparation. Liquid samples like alcoholic or non-alcoholic beverages can be analyzed without any preparation. For solid food samples, the most common sample pre-treatment methods are mineralization, direct deposition of the sample onto the reflector without/with minimal treatment, mainly as solid suspensions or after extraction. The main disadvantages are due to the possible peaks overlapping, which may lower the accuracy of quantitative analysis and the limit in the element identification. This analytical technique will be presented by several application examples, covering a broad range of liquid and solid food types.

Keywords: essential elements, toxic metals, XRF, spectroscopy

Procedia PDF Downloads 117
4826 Nutritional Status of Surgical and Orthopedic Patients: 3B Ward

Authors: Jitaree Tantiyasawatdikul, Bantita Jadnok, Sarunya Tijana

Abstract:

Background: Nutritional status is an important factor before, during, and after an operation. It can help wound healing. If the patients have good nutritional status before and after an operation, wound healing can occur more easily. It can strengthen the immune system leading to decreased infection, reduced length of stay, and reducing the cost to patients and caregivers. Therefore, screening to evaluate the nutritional status of patients in 3B becomes the database for further developing the treatment and also will lead to excellent service from the interdisciplinary team. Objective: To study the nutritional status of patients in surgical ward 3B at Surgical and Orthopedics Nursing Division, Srinagarind Hospital. Method: A descriptive study, to evaluate the nutritional status of 86 patients admitted in 3B between October 2014 and March 2015.The instruments used in this study consisted of two parts: 1) personal data, 2) Screening nutritional status. The data were analyzed by percentage and mean. Results: A sample population of 86 patients aged 22-81 years old, mean age 52.59years, 90.69% are married, female were 55.81%, regular diet 70.93%, patients with no problem oral cavity was 87.21%.The sample population had high incidence of CA 47.67% and secondly cardiovascular disease 36.05 %. Patients with high-risk nutrition was 12.79 % including 45.45% cardiovascular disease and 36.36% CA. Screening of nutritional status of high-risk nutrition was 39.36% severe triceps skinfold (TSF), severe mid-arm muscle circumference(MAMC) 9.09% and severe total lymphocyte 39.36%. Conclusion: The result of nutritional status screening of surgical ward 3B found 12.79% patients with high-risk nutrition including 45.45% with cardiovascular disease .There was no problem with oral cavity and eating.

Keywords: nutritional status, screening, surgical patients, 3B ward, Srinagarind Hospital

Procedia PDF Downloads 306
4825 Effect of Packaging Material and Water-Based Solutions on Performance of Radio Frequency Identification for Food Packaging Applications

Authors: Amelia Frickey, Timothy (TJ) Sheridan, Angelica Rossi, Bahar Aliakbarian

Abstract:

The growth of large food supply chains demanded improved end-to-end traceability of food products, which has led to companies being increasingly interested in using smart technologies such as Radio Frequency Identification (RFID)-enabled packaging to track items. As technology is being widely used, there are several technological or economic issues that should be overcome to facilitate the adoption of this track-and-trace technology. One of the technological challenges of RFID technology is its sensitivity to different environmental form factors, including packaging materials and the content of the packaging. Although researchers have assessed the performance loss due to the proximity of water and aqueous solutions, there is still the need to further investigate the impacts of food products on the reading range of RFID tags. However, to the best of our knowledge, there are not enough studies to determine the correlation between RFID tag performance and food beverages properties. The goal of this project was to investigate the effect of the solution properties (pH and conductivity) and different packaging materials filled with food-like water-based solutions on the performance of an RFID tag. Three commercially available ultra high-frequency RFID tags were placed on three different bottles and filled with different concentrations of water-based solutions, including sodium chloride, citric acid, sucrose, and ethanol. Transparent glass, Polyethylneterephtalate (PET), and Tetrapak® were used as the packaging materials commonly used in the beverage industries. Tag readability (Theoretical Read Range, TRR) and sensitivity (Power on Tag Forward, PoF) were determined using an anechoic chamber. First, the best place to attach the tag for each packaging material was investigated using empty and water-filled bottles. Then, the bottles were filled with the food-like solutions and tested with the three different tags and the PoF and TRR at the fixed frequency of 915MHz. In parallel, the pH and conductivity of solutions were measured. The best-performing tag was then selected to test the bottles filled with wine, orange, and apple juice. Despite various solutions altering the performance of each tag, the change in tag performance had no correlation with the pH or conductivity of the solution. Additionally, packaging material played a significant role in tag performance. Each tag tested performed optimally under different conditions. This study is the first part of comprehensive research to determine the regression model for the prediction of tag performance behavior based on the packaging material and the content. More investigations, including more tags and food products, are needed to be able to develop a robust regression model. The results of this study can be used by RFID tag manufacturers to design suitable tags for specific products with similar properties.

Keywords: smart food packaging, supply chain management, food waste, radio frequency identification

Procedia PDF Downloads 95
4824 The Academic-Practitioner Nexus in Countering Terrorism in New Zealand

Authors: John Battersby, Rhys Ball

Abstract:

After the 15 March 2019 Mosque attacks in Christchurch, the New Zealand security sector has had to address its training and preparedness levels for dealing with contemporary terrorist threats as well as potential future manifestations of terrorism. From time to time, members of the academic community from Australia and New Zealand have been asked to assist agencies in this endeavour. In the course of 2018, New Zealand security sector professionals working in the counter-terrorism area were interviewed about how they regarded academic contributions to understanding terrorism and counter-terrorism. Responses were mixed, ranging from anti-intellectualism, a belief that the inability to access classified material rendered academic work practically useless - to some genuine interest and desire for broad based academic studies on issues practitioners did not have the time to look at. Twelve months later, researchers have revisited those spoken to prior to the Brenton Tarrant 15 March shooting to establish if there has been a change in the way academic research is perceived, viewed and valued, and what key factors have contributed to this shift in thinking. This paper takes this data, combined with a consideration of the literature on higher education within professional police and intelligence forces, and on the general perception of academics by practitioners, to present a series of findings that will contribute to a more proactive and effective set of engagements, between two distinct but important security sectors, that reflect more closely with international practice.

Keywords: academic, counter terrorism, intelligence, practitioner, research, security

Procedia PDF Downloads 86
4823 Description of Reported Foodborne Diseases in Selected Communities within the Greater Accra Region-Ghana: Epidemiological Review of Surveillance Data

Authors: Benjamin Osei-Tutu, Henrietta Awewole Kolson

Abstract:

Background: Acute gastroenteritis is one of the frequently reported Out-Patient Department (OPD) cases. However, the causative pathogens of these cases are rarely identified at the OPD due to delay in laboratory results or failure to obtain specimens before antibiotics is administered. Method: A retrospective review of surveillance data from the Adentan Municipality, Accra, Ghana that were recorded in the National foodborne disease surveillance system of Ghana, was conducted with the main aim of describing the epidemiology and food practice of cases reported from the Adentan Municipality. The study involved a retrospective review of surveillance data kept on patients who visited health facilities that are involved in foodborne disease surveillance in Ghana, from January 2015 to December 2016. Results: A total of 375 cases were reviewed and these were classified as viral hepatitis (hepatitis A and E), cholera (Vibrio cholerae), dysentery (Shigella sp.), typhoid fever (Salmonella sp.) or gastroenteritis. Cases recorded were all suspected case and the average cases recorded per week was 3. Typhoid fever and dysentery were the two main clinically diagnosed foodborne illnesses. The highest number of cases were observed during the late dry season (Feb to April), which marks the end of the dry season and the beginning of the rainy season. Relatively high number of cases was also observed during the late wet seasons (Jul to Oct) when the rainfall is the heaviest. Home-made food and street vended food were the major sources of suspected etiological food, recording 49.01% and 34.87% of the cases respectively. Conclusion: Majority of cases recorded were classified as gastroenteritis due to the absence of laboratory confirmation. Few cases were classified as typhoid fever and dysentery based on clinical symptoms presented. Patients reporting with foodborne diseases were found to consume home meal and street vended foods as their predominant source of food.

Keywords: accra, etiologic food, food poisoning, gastroenteritis, illness, surveillance

Procedia PDF Downloads 196
4822 Process for Analyzing Information Security Risks Associated with the Incorporation of Online Dispute Resolution Systems in the Context of Conciliation in Colombia

Authors: Jefferson Camacho Mejia, Jenny Paola Forero Pachon, Luis Carlos Gomez Florez

Abstract:

The innumerable possibilities offered by the use of Information Technology (IT) in the development of different socio-economic activities has made a change in the social paradigm and the emergence of the so-called information and knowledge society. The Colombian government, aware of this reality, has been promoting the use of IT as part of the E-government strategy adopted in the country. However, it is well known that the use of IT implies the existence of certain threats that put the security of information in the digital environment at risk. One of the priorities of the Colombian government is to improve access to alternative justice through IT, in particular, access to Alternative Dispute Resolution (ADR): conciliation, arbitration and friendly composition; by means of which it is sought that the citizens directly resolve their differences. To this end, a trend has been identified in the use of Online Dispute Resolution (ODR) systems, which extend the benefits of ADR to the digital environment through the use of IT. This article presents a process for the analysis of information security risks associated with the incorporation of ODR systems in the context of conciliation in Colombia, based on four fundamental stages identified in the literature: (I) Identification of assets, (II) Identification of threats and vulnerabilities (III) Estimation of the impact and 4) Estimation of risk levels. The methodological design adopted for this research was the grounded theory, since it involves interactions that are applied to a specific context and from the perspective of diverse participants. As a result of this investigation, the activities to be followed are defined to carry out an analysis of information security risks, in the context of the conciliation in Colombia supported by ODR systems, thus contributing to the estimation of the risks to make possible its subsequent treatment.

Keywords: alternative dispute resolution, conciliation, information security, online dispute resolution systems, process, risk analysis

Procedia PDF Downloads 215
4821 Control of Spoilage Fungi by Lactobacilli

Authors: Laref Nora, Guessas Bettache

Abstract:

Lactic acid bacteria (LAB) have a major potential to be used in biopreservation methods because they are safe to consume (GRAS: generally regarded as safe) and they naturally occurring microflora of many foods. The preservative action of LAB is due to several antimicrobial metabolites, including lactic acid, acetic acid, hydrogen peroxide, bacteriocins, carbon dioxide, diacetyl, and reuterin. Several studies have focused on the antifungal activity compounds from natural sources for biopreservation in alternatives to chemical use. LAB has an antifungal activity which may inhibit food spoilage fungi. Lactobacillus strains isolated from silage prepared in our laboratory by fermentation of grass in anaerobic condition were screened for antifungal activity with overlay assay against Aspergillus spp. The antifungal compounds were originated from organic acids; inhibitory activity did not change after treatment with proteolytic enzymes. Lactobacillus strains were able also to inhibit Trichoderma spp, Penicillium spp, Fusarium roseum, and Stemphylim spp by confrontation assay. The inhibitory activity could be detected against the mould Aspergillus spp in the apricot juice but not in a bakery product. These antifungal compounds have the potential to be used as food biopreservation to inhibit conidia germination, and mycelia growth of spoilage fungi depending on food type, pH of food especially in heat, and cold processed foods.

Keywords: lactic acid bacteria, Lactobacillus, Aspergillus, antifungal activity

Procedia PDF Downloads 306