Search results for: global food security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 13498

Search results for: global food security index

12208 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria

Authors: Nuhu Bitrus Mailabari

Abstract:

Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.

Keywords: border, cross border, migration, Nigeria, northeast region, security

Procedia PDF Downloads 161
12207 Evaluation of Superabsorbent Application on Corn Yield under Deficit Irrigation

Authors: Davoud Khodadadi Dehkordi

Abstract:

This research was planned in order to study the effect of drought stress and different levels of Superabsorbent and their effect on grain yield, biologic yield and harvest index. In this study, 3 different depths of irrigation were considered as the main treatment I1, I2, I3 as 100, 75 and 50 percent of water requirement of plants respectively and different levels of Superabsorbent were used as secondary treatment (S0, S1, S2 and S3, equal to 0 (control), 15, 30 and 45 gr/m2 respectively). According to the results, independent effects of irrigation and Superabsorbent treatments at 1% level on biologic and grain yield of corn were significant. In addition, independent effect of irrigation treatments at 5% level on harvest index was significant. But independent effect of Superabsorbent treatments on harvest index was not significant.

Keywords: corn, deficit irrigation, superabsorbent, yield

Procedia PDF Downloads 356
12206 Food Preference of Monomorium Destructor

Authors: Ussawit Srisakrapikoop, Art-Ong Pradatsundarasar, Duangkhae Sitthicharoenchai

Abstract:

Monomorium destructor or Singapore ant is one of the common household pests. It causes nuisance and damage to household. Due to the fact that there are many queens in one colony (polygyny), so this ant can quickly increase its population in a short time in the urban environment. This study has been conducted at Faculty of Science, Chulalongkorn University in the field condition. Ant food preference was conducted for 3 replicates per month by using six food choices including 20% sucrose solution, 20% sucrose agar, pork liver, smashed pork liver, pork fat and lard. The number of ants of each bait choice was counted and the orders of ant accessing baits were also recorded. The results showed that the 20% sucrose agar was the most attractive significantly following by pork liver and pork fat. The ants also most accessed to the pork liver bait choice in the first place. It can be suggested that the ant control by baiting should consist of mixture of carbohydrate, protein and lipid in solid form with suitable ratios.

Keywords: baits, food preference, monomorium destructor, Singapore ant

Procedia PDF Downloads 251
12205 Financial Assets Return, Economic Factors and Investor's Behavioral Indicators Relationships Modeling: A Bayesian Networks Approach

Authors: Nada Souissi, Mourad Mroua

Abstract:

The main purpose of this study is to examine the interaction between financial asset volatility, economic factors and investor's behavioral indicators related to both the company's and the markets stocks for the period from January 2000 to January2020. Using multiple linear regression and Bayesian Networks modeling, results show a positive and negative relationship between investor's psychology index, economic factors and predicted stock market return. We reveal that the application of the Bayesian Discrete Network contributes to identify the different cause and effect relationships between all economic, financial variables and psychology index.

Keywords: Financial asset return predictability, Economic factors, Investor's psychology index, Bayesian approach, Probabilistic networks, Parametric learning

Procedia PDF Downloads 144
12204 Explore the Effect of Telecare for the Elderly in Preventing and Delaying the Quality of Disability Care with Bluetooth Brainwave Equipment

Authors: Jui-Chen Huang

Abstract:

The purpose of this study is to explore the effects of telecare on preventing and delaying the quality of disability care in elderly people with portable comfort Bluetooth brainwave devices with remote healthcare functions. Through the teaching videos and remotely teaching the elderly, which had ever learned the care courses of the prevent and delay disability, these elderly did muscle strength training. Then this paper explores the effect of training with the data by SPSS 18.0 statistical software. The data is collected with pre-test, post-test and analyze data from the measure of the Bluetooth brain wave equipment including the pressure index, relaxation index, attention and fatigue index of the elderly. In this study, 30 elderly people who had taken preventive and delayed disability care courses were studied to explore the effect of their care quality improvement. The results showed that the pressure index, relaxation index, attention, and fatigue index of the elderly had statistically significant differences in two months. It can be seen that elderly people who have been treated to prevent and delay disability care courses can significantly improve their care quality if they continue to receive intensive training to prevent and delay disability through remote mode. This telecare is applied to the elderly program that has been used to prevent and delay disability care courses. It is worth continuing to promote, and it is recommended that follow-up studies be conducted in a longer-term manner to explore long-term benefits. It can solve the current insufficiency of long-term care resources, but the demand is urgent.

Keywords: telecare, bluetooth brainwave equipment, prevention and delay of disability, the elderly, care quality

Procedia PDF Downloads 146
12203 The Impact of Undocumented Migration on Human Security in Northern Nigeria

Authors: Targba Aondowase

Abstract:

Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.

Keywords: human security, impact, migration, undocumented

Procedia PDF Downloads 332
12202 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East

Authors: Zahra Bakhtiari

Abstract:

Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.

Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy

Procedia PDF Downloads 76
12201 Understanding Narrative Transformations of Ebola in Negotiations of Epidemic Risk

Authors: N. W. Paul, M. Banerjee

Abstract:

Discussing the nexus between global health policy and local practices, this article addresses the recent Ebola outbreak as a role model for narrative co-constructions of epidemic risk. We will demonstrate in how far a theory-driven and methodologically rooted analysis of narrativity can help to improve mechanisms of prevention and intervention whenever epidemic risk needs to be addressed locally in order to contribute to global health. Analyzing the narrative transformation of Ebola, we will also address issues of transcultural problem-solving and of normative questions at stake. In this regard, we seek to contribute to a better understanding of a key question of global health and justice as well as to the underlying ethical questions. By highlighting and analyzing the functions of narratives, this paper provides a translational approach to refine our practices by which we address epidemic risk, be it on the national, the transnational or the global scale.

Keywords: ebola, epidemic risk, medical ethics, medical humanities

Procedia PDF Downloads 448
12200 Demand for Index Based Micro-Insurance (IBMI) in Ethiopia

Authors: Ashenafi Sileshi Etefa, Bezawit Worku Yenealem

Abstract:

Micro-insurance is a relatively new concept that is just being introduced in Ethiopia. For an agrarian economy dominated by small holder farming and vulnerable to natural disasters, mainly drought, the need for an Index-Based Micro Insurance (IBMI) is crucial. Since IBMI solves moral hazard, adverse selection, and access issues to poor clients, it is preferable over traditional insurance products. IBMI is being piloted in drought prone areas of Ethiopia with the aim of learning and expanding the service across the country. This article analyses the demand of IBMI and the barriers to demand and finds that the demand for IBMI has so far been constrained by lack of awareness, trust issues, costliness, and the level of basis risk; and recommends reducing the basis risk and increasing the role of government and farmer cooperatives.

Keywords: agriculture, index based micro-insurance (IBMI), drought, micro-finance institution (MFI)

Procedia PDF Downloads 286
12199 Security Analysis of SIMSec Protocol

Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci

Abstract:

Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.

Keywords: End-to-end encryption, key exchange, SIM card, smart card

Procedia PDF Downloads 282
12198 e-Learning Security: A Distributed Incident Response Generator

Authors: Bel G Raggad

Abstract:

An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.

Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection

Procedia PDF Downloads 433
12197 E-Commerce Implementation to Support Customize Clothes for Obese People

Authors: Hamza Al-Hazmi, Tabrej Khan

Abstract:

Obesity is today a global phenomenon that affects all countries, all types of societies regardless of age, sex, and income. The average value of the relative body mass index (BMI) has increased, which indicates an increasing obesity problem in the population. Nowadays obesity is a global problem, and mass production of clothes is standard size. People have a problem to find best-fitted clothes. The goal of the project is to develop an E-Commerce web portal as a new, innovative and customize clothing production system for obese people. This research has a long-term objective and short-term objective. The long-term objectives are (1) utilize online Web portal to improve tailors’ income, and (2) provide a free online platform to the tailors and customers in order to stitch clothes. Then, the short-term objective are (1) identify e-commerce’s requirements, (2) analyze and design the e-commerce application, and (3) build and implement the e-commerce application to Customized Clothes for Overweight people. This application can hopefully improve the tailors’ income and provide an easy way for customers to choose a fabric, apply style and provide measurement. This e-commerce application is not limited to obese or overweight people but also for other people who want to stitch cloth from tailors. MySQL and PHP we are going to use for developing the application.

Keywords: e-commerce, obesity, PHP, customize clothes

Procedia PDF Downloads 339
12196 Scientometrics Analysis of Food Supply Chain Risk Assessment Literature: Based On Web of Science Record 1996-2014

Authors: Mohsen Shirani, Shadi Asadzandi, Micaela Demichela

Abstract:

This paper presents the results of a study to assess crucial aspects and the strength of the scientific basis of a typically interdisciplinary, applied field: food supply chain risk assessment research. Our approach is based on an advanced scientometrics analysis with novel elements to assess the influence and dissemination of research results and to measure interdisciplinary. This paper aims to describe the quantity and quality of the publication trends in food supply chain risk assessment. The population under study was composed of 266 articles from database web of science. The results were analyzed based on date of publication, type of document, language of the documents, source of publications, subject areas, authors and their affiliations, and the countries involved in developing the articles.

Keywords: food supply chain, risk assessment, scientometrics, web of science

Procedia PDF Downloads 493
12195 Contested Visions of Exploration in IR: Theoretical Engagements, Reflections and New Agendas on the Dynamics of Global Order

Authors: Ananya Sharma

Abstract:

International Relations is a discipline of paradoxes. The State is the dominant political institution, with mainstream analysis theorizing the State, but theory remains at best a reactionary monolith. Critical Theorists have been pushing the envelope and to that extent, there has been a clear shift in the dominant discourse away from State-centrism to individuals and group-level behaviour. This paradigm shift has been accompanied with more nuanced conceptualizations of other variables at play–power, security, and trust, to name a few. Yet, the ambit of “what is discussed” remains primarily embedded in realist conceptualizations. With this background in mind, this paper will attempt to understand, juxtapose and evaluate how “order” has been conceptualized in International Relations theory. This paper is a tentative attempt to present a “state of the art” and in the process, set the stage for a deeper study to draw attention to what the author feels is a gaping lacuna in IR theory. The paper looks at how different branches of international relations theory envisage world order and the silences embedded therein. Further, by locating order and disorder inhabiting the same reality along a continuum, alternative readings of world orders are drawn from the critical theoretical traditions, in which various articulations of justice impart the key normative pillar to the world order.

Keywords: global justice, international relations theory, legitimacy, world order

Procedia PDF Downloads 342
12194 Examining the Acceptability of Destination Local Food by Domestic Tourist Visiting Northern Nigeria

Authors: Eldah Ephraim Buba, Jamila Mohammed Waziri

Abstract:

There are challenges faced by tourist in respect of choosing food while in tourism destination. Food is very important in the choice of holiday of tourist. Many tourists choose a destination not only because of physical attraction but they choose destination where they will not encounter challenges in respect to food. The study is aimed at examining the acceptability of northern delicacies by tourists from other parts of Nigeria. Six delicacies were produced and presented to 50 tourists who are randomly picked from the south-east, south-west, south-south and the middle belt of Nigeria. The study found out that Danwake, Masa, and Kwadon zogale were generally accepted by majority of the respondents. Although, the respondents were not comfortable with the appearance of danwake, other aspect of the checklist was accepted. Tuwon shinkafa miyan taushe was accepted in terms of appearance but rejected in terms of taste and texture. ‘Yar Tsame and dindikolo were generally rejected. The study recommended that caterers, attraction owners and hoteliers should include such meals in their menu so that tourist will enjoy the gastronomy of the northern part of Nigeria.

Keywords: acceptability, examination, food, tourism

Procedia PDF Downloads 385
12193 Effect of Cloud Computing on Enterprises

Authors: Amir Rashid

Abstract:

Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.

Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS

Procedia PDF Downloads 336
12192 Combined Effect of Global Warming and Water Structures on Rivers’ Water Quality and Aquatic Life: Case Study of Esna Barrage on the Nile River in Egypt

Authors: Sherine A. El Baradei

Abstract:

Global warming and climatic change are very important topics that are being studied and investigated nowadays as they have lots of diverse impacts on mankind, water quality, aquatic life, wildlife,…etc. Also, many water and hydraulics structures like dams and barrages are being built every day to satisfy water consumption needs, irrigation purposes and power generating purposes. Each of global warming and water structures alone has diversity of impacts on water quality and aquatic life in rivers. This research is investigating the dual combined effect of both water structures and global warming on the water quality and aquatic life through mathematical modeling. A case study of the Esna Barrage on the Nile River in Egypt is being studied. This research study is taking into account the effects of both seasons; namely, winter and summer and their effects on air and hence water temperature of the Nile reach under study. To do so, the study is conducted on the last 23 years to investigate the effect of global warming and climatic change on the studied river water. The mathematical model is then combining the dual effect of the Esna barrage and the global warming on the water quality; as well as, on aquatic life of the Nile reach under study. From the results of the mathematical model, it could be concluded that the dual effect of water structures and global warming is very negative on the water quality and the aquatic life in rivers upstream those structures.

Keywords: aquatic life, barrages, climatic change, dissolved oxygen, global warming, river, water quality, water structures

Procedia PDF Downloads 364
12191 Assessment of the Bataan Peninsula State University Food Technology Situation

Authors: Rosemarie P. Ongoco, Rowena S. Badua, Kristine Joy S. Simpao, Ria L. Dizon

Abstract:

Food Technology (FT) has become a very powerful field in dealing with the processing of food making it available, safe, tasty and convenient. Bataan Peninsula State University (BPSU) has been offering FT as a major of the Bachelor of Science in Industrial Technology, both in the Main and Orani campuses since the 1970s. With the different orientation of FT offered in state universities and colleges, whether it is skill or science-based, this study aims to assess the current FT situation in BPSU. Curriculum, faculty profile and facilities of FT in BPSU were assessed and compared to the other FT related program in three state universities in Region III; Nueva Ecija University of Science and Technology, Pampanga Agricultural College, and Central Luzon State University. Data were gathered through structured interview, ocular inspection for the facilities and questionnaires for the teacher and students’ personal interest. Results show that BPSU’s FT program is more likely similar to the one offered in NEUST. PAC is offering a similar course but is more business and management-oriented BS Home Economics while CLSU is offering a science and technology-related course, BS Home Economics while CLSU is offering a science and technology-related course, BS Food Technology. BPSU students more intercede in cooking and baking while doing sales report, dishwashing and food packaging are the activities faculty and students are least interested. Mechanized machines in cooking and baking are also suggested by the majority of the students in BPSU. In conclusion, BPSU’s program in BS IT major in Food Technology must be improved in the aspects of curriculum, faculty profile, and facilities. It is recommended for the department to consider the curriculum, faculty profile, and facilities. It is recommended for the department to consider the curriculum of NEUST in the BS IT major in Food Technology.

Keywords: food technology, curriculum, technology, assessment

Procedia PDF Downloads 341
12190 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 641
12189 Legal Regulation of Personal Information Data Transmission Risk Assessment: A Case Study of the EU’s DPIA

Authors: Cai Qianyi

Abstract:

In the midst of global digital revolution, the flow of data poses security threats that call China's existing legislative framework for protecting personal information into question. As a preliminary procedure for risk analysis and prevention, the risk assessment of personal data transmission lacks detailed guidelines for support. Existing provisions reveal unclear responsibilities for network operators and weakened rights for data subjects. Furthermore, the regulatory system's weak operability and a lack of industry self-regulation heighten data transmission hazards. This paper aims to compare the regulatory pathways for data information transmission risks between China and Europe from a legal framework and content perspective. It draws on the “Data Protection Impact Assessment Guidelines” to empower multiple stakeholders, including data processors, controllers, and subjects, while also defining obligations. In conclusion, this paper intends to solve China's digital security shortcomings by developing a more mature regulatory framework and industry self-regulation mechanisms, resulting in a win-win situation for personal data protection and the development of the digital economy.

Keywords: personal information data transmission, risk assessment, DPIA, internet service provider, personal information data transimission, risk assessment

Procedia PDF Downloads 55
12188 A Global Organizational Theory for the 21st Century

Authors: Troy A. Tyre

Abstract:

Organizational behavior and organizational change are elements of the ever-changing global business environment. Leadership and organizational behavior are 21st century disciplines. Network marketing organizations need to understand the ever-changing nature of global business and be ready and willing to adapt to the environment. Network marketing organizations have a challenge keeping up with a rapid escalation in global growth. Network marketing growth has been steady and global. Network marketing organizations have been slow to develop a 21st century global strategy to manage the rapid escalation of growth degrading organizational behavior, job satisfaction, increasing attrition, and degrading customer service. Development of an organizational behavior and leadership theory for the 21st century to help network marketing develops a global business strategy to manage the rapid escalation in growth that affects organizational behavior. Managing growth means organizational leadership must develop and adapt to the organizational environment. Growth comes with an open mind and one’s departure from the comfort zone. Leadership growth operates in the tacit dimension. Systems thinking and adaptation of mental models can help shift organizational behavior. Shifting the organizational behavior requires organizational learning. Organizational learning occurs through single-loop, double-loop, and triple-loop learning. Triple-loop learning is the most difficult, but the most rewarding. Tools such as theory U can aid in developing a landscape for organizational behavioral development. Additionally, awareness to espoused and portrayed actions is imperatives. Theories of motivation, cross-cultural diversity, and communications are instrumental in founding an organizational behavior suited for the 21st century.

Keywords: global, leadership, network marketing, organizational behavior

Procedia PDF Downloads 550
12187 The Determination of Contamination Rate of Traditional White Cheese in Behbahan Markets to Coliforms and Pathogenic Escherichia Coli

Authors: Sana Mohammad Jafar, Hossaini Seyahi Zohreh

Abstract:

Infections and food intoxication caused by microbial contamination of food is of major issues in different countries, and diseases caused by the consumption of contaminated food included a large percentage of the country's health problems. Since traditional cheese for cultural reasons, good taste and smell in many parts of the area still has the important place in people's food basket, transmission of pathogenic bacteria could be at risk human health through the consumption of this food. In this study selected randomly 100 samples of 250 grams of traditional cheeses supplied in the city Behbahan market and adjacent to the ice was transferred to the laboratory and microbiological tests were performed immediately. According to the results, from 100 samples tested traditional cheese, 94 samples (94% of samples) were contaminated with coliforms, which of this number 75 samples (75% of samples) the contamination rate was higher than the limit (more than 100 cfu/g). Of the total samples, 36 samples (36% of samples) were contaminated with fecal coliform which of this number 30 samples (30% of samples) were contaminated with Escherichia.coli bacteria. Based on the results of agglutination test,no samples was found positive as pathogenic Escherichia.coli.

Keywords: determination, traditional cheese, Behbahan, Escherichia coli

Procedia PDF Downloads 500
12186 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption

Procedia PDF Downloads 433
12185 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare

Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon

Abstract:

This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.

Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty

Procedia PDF Downloads 353
12184 The Relationship among Exercise Participation, Job Stress and Job Satisfaction: A Study on Food Service Employees in Taiwan

Authors: Jui-Hsiu Chang

Abstract:

As an increasing number of restaurants are growing, the demand for man force in the food service industry is dramatically increasing as well. However, food service workers often complete the heavy workload, infrequent breaks, long hours and shifts. With the overwhelming workload, many workers have experienced high injury rates. As a result, the restaurant industry reports a higher employee turnover rate compare to other service industries in Taiwan. Restaurant managers are seeing ways to retain good employees in order to provide good quality service for daily operation. The purpose of this study was to explore the relationship among exercise participation, job stress and job satisfaction on the food service employees. In addition, to examine how the job stress affected their job satisfaction. A survey using a self-reported questionnaire was conducted to collect data, and 269 questionnaires were collected for data analysis. The obtained materials were analyzed using descriptive statistic, independent t-test, one-way ANOVA, linear regression analysis. The results show that 1. Job stress had a significantly negative influence on employees’ job satisfaction. 2. Exercise participation had significantly positive influence on employees’ job satisfaction. 3. Job stress and job satisfaction varied among the groups of respondent with different level of exercise involvement. Furthermore, the practical implications were proposed for the food service company management when developing daily operational strategies.

Keywords: exercise participation, food service employees, job satisfaction, job stress

Procedia PDF Downloads 266
12183 Design of Bayesian MDS Sampling Plan Based on the Process Capability Index

Authors: Davood Shishebori, Mohammad Saber Fallah Nezhad, Sina Seifi

Abstract:

In this paper, a variable multiple dependent state (MDS) sampling plan is developed based on the process capability index using Bayesian approach. The optimal parameters of the developed sampling plan with respect to constraints related to the risk of consumer and producer are presented. Two comparison studies have been done. First, the methods of double sampling model, sampling plan for resubmitted lots and repetitive group sampling (RGS) plan are elaborated and average sample numbers of the developed MDS plan and other classical methods are compared. A comparison study between the developed MDS plan based on Bayesian approach and the exact probability distribution is carried out.

Keywords: MDS sampling plan, RGS plan, sampling plan for resubmitted lots, process capability index (PCI), average sample number (ASN), Bayesian approach

Procedia PDF Downloads 295
12182 Analyzing Safety Incidents using the Fatigue Risk Index Calculator as an Indicator of Fatigue within a UK Rail Franchise

Authors: Michael Scott Evans, Andrew Smith

Abstract:

The feeling of fatigue at work could potentially have devastating consequences. The aim of this study was to investigate whether the well-established objective indicator of fatigue – the Fatigue Risk Index (FRI) calculator used by the rail industry is an effective indicator to the number of safety incidents, in which fatigue could have been a contributing factor. The study received ethics approval from Cardiff University’s Ethics Committee (EC.16.06.14.4547). A total of 901 safety incidents were recorded from a single British rail franchise between 1st June 2010 – 31st December 2016, into the Safety Management Information System (SMIS). The safety incident types identified that fatigue could have been a contributing factor were: Signal Passed at Danger (SPAD), Train Protection & Warning System (TPWS) activation, Automatic Warning System (AWS) slow to cancel, failed to call, and station overrun. From the 901 recorded safety incidents, the scheduling system CrewPlan was used to extract the Fatigue Index (FI) score and Risk Index (RI) score of all train drivers on the day of the safety incident. Only the working rosters of 64.2% (N = 578) (550 men and 28 female) ranging in age from 24 – 65 years old (M = 47.13, SD = 7.30) were accessible for analyses. Analysis from all 578 train drivers who were involved in safety incidents revealed that 99.8% (N = 577) of Fatigue Index (FI) scores fell within or below the identified guideline threshold of 45 as well as 97.9% (N = 566) of Risk Index (RI) scores falling below the 1.6 threshold range. Their scores represent good practice within the rail industry. These findings seem to indicate that the current objective indicator, i.e. the FRI calculator used in this study by the British rail franchise was not an effective predictor of train driver’s FI scores and RI scores, as safety incidents in which fatigue could have been a contributing factor represented only 0.2% of FI scores and 2.1% of RI scores. Further research is needed to determine whether there are other contributing factors that could provide a better indication as to why there is such a significantly large proportion of train drivers who are involved in safety incidents, in which fatigue could have been a contributing factor have such low FI and RI scores.

Keywords: fatigue risk index calculator, objective indicator of fatigue, rail industry, safety incident

Procedia PDF Downloads 177
12181 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective

Authors: Justyna Żywiołek, Marek Matulewski

Abstract:

Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.

Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis

Procedia PDF Downloads 45
12180 Civic Engagement and Political Participation in Bangladesh

Authors: Syeda Salina Aziz, Tanvir Ahmed Mozumder

Abstract:

Citizenship is an important concept of democracy which broadly defines the relationship between the state and its citizens; at the same time, it analyzes the rights and duties of a citizen. The universal citizenship principle demands that citizens should be aware of the political system, possess democratic attitudes, and join the political activity. Bangladesh presents an interesting case for democracy; the democratic practices in the country have been long introduced, have been interrupted several times, and the democratic values and practices have yet to be established in the country. These transitions have influenced citizens’ ideologies and participation in decision-making and also shaped their expectations differently. In this backdrop, this paper aims to understand and explain the citizenship behavior of Bangladeshi nationals. Based on nationally representative household survey data of 4000 respondents, this paper creates a composite citizenship index which is a combination of three separate indices, including participation index, knowledge and awareness index, and ideology index. The paper then tries to explain the factors that affect the citizenship index. Using fixed effect regression analysis, the paper intends to explore the association between citizenship and socio-demographic variables, including education, location, gender, and exposure to the media of respondents. Additionally, using national election polls, the paper creates a variable to measure long-term support towards the current ruling party and tests whether and how this affects the citizenship variables.

Keywords: citizenship, political participation, Bangladesh, stronghold

Procedia PDF Downloads 76
12179 The Global-Local Dimension in Cognitive Control after Left Lateral Prefrontal Cortex Damage: Evidence from the Non-Verbal Domain

Authors: Eleni Peristeri, Georgia Fotiadou, Ianthi-Maria Tsimpli

Abstract:

The local-global dimension has been studied extensively in healthy controls and preference for globally processed stimuli has been validated in both the visual and auditory modalities. Critically, the local-global dimension has an inherent interference resolution component, a type of cognitive control, and left-prefrontal-cortex-damaged (LPFC) individuals have exhibited inability to override habitual response behaviors in item recognition tasks that involve representational interference. Eight patients with damage in the left PFC (age range: 32;5 to 69;0. Mean age: 54;6 yrs) and twenty age- and education-matched language-unimpaired adults (mean age: 56;7yrs) have participated in the study. Distinct performance patterns were found between the language-unimpaired and the LPFC-damaged group which have mainly stemmed from the latter’s difficulty with inhibiting global stimuli in incongruent trials. Overall, the local-global attentional dimension affects LPFC-damaged individuals with non-fluent aphasia in non-language domains implicating distinct types of inhibitory processes depending on the level of processing.

Keywords: left lateral prefrontal cortex damage (LPFC), local-global non-language attention, representational interference, non-fluent aphasia

Procedia PDF Downloads 464