Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6464

Search results for: household food security

5144 A Review on Factors Influencing Implementation of Secure Software Development Practices

Authors: Sri Lakshmi Kanniah, Mohd Naz’ri Mahrin

Abstract:

More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.

Keywords: secure software development, software development, software security, systematic literature review

Procedia PDF Downloads 349
5143 Urbanization Effects on the Food-Water-Energy Nexus within Ecosystem Services: A Case Study of the Beijing-Tianjin-Hebei Urban Agglomeration in China

Authors: Ke Yang, QiHan, Bauke de Veirs

Abstract:

This study addresses the need for coordinated management of natural resources in urban agglomeration. Using ecosystem services theory, The study explore the relationship between land use in the Beijing-Tianjin-Hebei (B-T-H) region and the Food-Water-Energy (F-W-E) nexus from 2000 to 2030. We assess ecosystem services using the InVEST: Habitat Quality (HQ), Water Yield (WY), Carbon Sequestration (CS), Soil Retention (SDR), and Food Production (FP). The study find an annual expansion of construction land alongside a significant decline in cultivated land. Additionally, HQ, CS, and per capita FP decline annually until 2020 and are expected to persist through 2030. In contrast, WY and SDR grow annually but may decline by 2030. Spearman coefficient analysis reveals synergies between HQ and CS, SDR and CS, and SDR and HQ, with trade-offs between CS and WY and HQ and WY. Utilizing the K-means clustering analysis method, we introduce county-based spatial planning for the F-W-E system, offering valuable insights and recommendations for sustainable resource management.

Keywords: food-water-energy (F-W-E), ecosystem services, trade-offs and synergies, ecosystem service bundle, county-based

Procedia PDF Downloads 45
5142 Brazilian Public Security: Governability and Constitutional Change

Authors: Gabriel Dolabella, Henrique Rangel, Stella Araújo, Carlos Bolonha, Igor de Lazari

Abstract:

Public security is a common subject on the Brazilian political agenda. The seventh largest economy in the world has high crime and insecurity rates. Specialists try to explain this social picture based on poverty, inequality or public policies addressed to drug trafficking. This excerpt approaches State measures to handle that picture. Therefore, the public security - law enforcement institutions - is at the core of this paper, particularly the relationship among federal and state law enforcement agencies, mainly ruled by a system of urgency. The problems are informal changes on law enforcement management and public opinion collaboration to these changes. Whenever there were huge international events, Brazilian armed forces occupied streets to assure law enforcement - ensuring the order. This logic, considered in the long time, could impact the federal structure of the country. The post-madisonian theorists verify that urgency is often associated to delegation of powers, which is true for Brazilian law enforcement, but here there is a different delegation: States continuously delegate law enforcement powers to the federal government throughout the use of Armed Forces. Therefore, the hypothesis is: Brazil is under a political process of federalization of public security. The political framework addressed here can be explained by the disrespect of legal constraints and the failure of rule of law theoretical models. The methodology of analysis is based on general criteria. Temporally, this study investigates events from 2003, when discussions about the disarmament statute begun. Geographically, this study is limited to Brazilian borders. Materially, the analysis result from the observation of legal resources and political resources (pronouncements of government officials). The main parameters are based on post-madisonianism and federalization of public security can be assessed through credibility and popularity that allow evaluation of this political process of constitutional change. The objective is to demonstrate how the Military Forces are used in public security, not as a random fact or an isolated political event, in order to understand the political motivations and effects that stem from that use from an institutional perspective.

Keywords: public security, governability, rule of law, federalism

Procedia PDF Downloads 656
5141 Food Poisoning (Salmonellosis) as a Public Health Problem Through Consuming the Meat and Eggs of the Carrier Birds

Authors: M.Younus, M. Athar Khan, Asif Adrees

Abstract:

The present research endeavour was made to investigate the Public Health impact of Salmonellosis through consuming the meat and eggs of the carrier’s birds and to see the prevalence of Salmonella enteritidis and Salmonella typhimurium from poultry feed, poultry meat, and poultry eggs and their role in the chain of transmission of salmonellae to human beings and causing food poisoning. The ultimate objective was to generate data to improve the quality of poultry products and human health awareness. Salmonellosis is one of the most wide spread food borne zoonoses in all the continents of the world. The etiological agents Salmonella enteritidis and Salmonella typhimurium not only produce the disease but during the convalescent phase (after the recovery of disease) remain carriers for indefinite period of time. The carrier state was not only the source of spread of disease with in the poultry but also caused typhoid fever in humans. The chain of transmission started from poultry feed to poultry meat and ultimately to humans as dead end hosts. In this experiment a total number of 200 samples of human stool and blood were collected randomly (100 samples of human stool and 100 samples of human blood) of 100 patients suspected from food poisoning patients from different hospitals of Lahore area for the identification of Salmonella enteritidis and Salmonella typhimurium through PCR method in order to see the public health impact of Salmonellosis through consuming the meat and eggs of the carrier birds. On the average 14 and 10 stool samples were found positive against Salmonella enteritidis and Salmonella typhimurium from each of the 25 patients from each hospital respectively in case of suspected food poisoning patients. Similarly on an average 5% and 6% blood samples were found positive from 25 patients of each hospital respectively. There was a significant difference (P< 0.05) in the sero positivity of stool and blood samples of suspected food poisoning patients as far as Salmonella enteritidis and Salmonella typhimurium was concerned. However there was no significant difference (P<0.05) between the hospitals.

Keywords: salmonella, zoonosis, food, transmission, eggs

Procedia PDF Downloads 646
5140 The Dietary Behavior of Eating Alone in Middle-Aged Populations by Body Mass Index (BMI)

Authors: Pil Kyoo Jo, Youngmee Lee, Jee Young Kim, Yu Jin Oh, Sohyun Park, Young Ha Joo, Hye Suk Kim, Semi Kang

Abstract:

A growing number of people are living alone and eating alone. People might have different dietary behaviors between eating alone and eating with others, it can influence their weight and health. The purpose of this study was to investigate the dietary behavior of eating alone in middle-aged populations in South Korea. We used the nationally representative data from the 5th Korea National Health and Nutrition Examination Survey (KNHANES), 2010-2012 and a cross-sectional survey on the eating behaviors among adults (N=1318, 530 men, 788 women) aged from 20 to 54 years. Results showed that ‘underweight’ group ate more amount of food when eating with others compared to eating alone and ‘overweight’ and ‘obesity’ groups had opposite respondent (p<0.05). When having a meal alone, ‘underweight’ group ate food until didn’t feel hungry and ‘overweight’ and ‘obesity’ groups ate leftover food even they felt full (p<0.01). The ‘overweight’ and ‘obesity’ groups usually ate alone than ‘underweight’ group did (p<0.05). All groups had faster meal time when eating alone than eating with others and usually ate processed foods for convenience when eating alone. Younger people, aged 10-30, ate more processed food than older people did. South Koreans spend nearly 45% of their total food consumption from processed foods. This research was supported by the National Research Foundation of Korea for 2011 Korea-Japan Basic Scientific Cooperation Program (NRF-2011B00003). This work was supported by the Ministry of Education of the Republic of Korea and the National Research Foundation of Korea (NRF-2015S1A5B6037369).

Keywords: BMI, dietary behavior, eating alone, middle-aged populations

Procedia PDF Downloads 253
5139 Extent of Fruit and Vegetable Waste at Wholesaler Stage of the Food Supply Chain in Western Australia

Authors: P. Ghosh, S. B. Sharma

Abstract:

The growing problem of food waste is causing unacceptable economic, environmental and social impacts across the globe. In Australia, food waste is estimated at about AU$8 billion per year; however, information on the extent of wastage at different stages of the food value chain from farm to fork is very limited. This study aims to identify causes for and extent of food waste at wholesaler stage of the food value chain in the state of Western Australia. It also explores approaches applied to reduce and utilize food waste by the wholesalers. The study was carried out at Perth city market in Caning Vale, the main wholesale distribution centre for fruits and vegetables in Western Australia. A survey questionnaire was prepared and shared with 51 wholesalers and their responses to 10 targeted questions on quantity of produce (fruits and vegetables) delivery received and further supplied, reasons for waste generation and innovations applied or being considered to reduce and utilize food waste. Data were computed using the Statistical Package for the Social Sciences (SPSS version 21). Among the wholesalers 52% were primary wholesalers (buy produce directly from growers) and 48% were secondary wholesalers (buy produce in bulk from major wholesalers and supply to the local retail market, caterers, and customers with specific requirements). Average fruit and vegetable waste was 180 Kilogram per week per primary wholesaler and 30 Kilogram per secondary wholesaler. Based on this survey, the fruit and vegetable waste at wholesaler stage was estimated at about 286 tonnes per year. The secondary wholesalers distributed pre-ordered commodities, which minimized the potential to cause waste. Non-parametric test (Mann Whitney test) was carried out to assess contributions of wholesalers to waste generation. Over 56% of secondary wholesalers generally had nothing to bin as waste. Pearson’s correlation coefficient analysis showed positive correlation (r = 0.425; P=0.01) between the quantity of produce received and waste generated. Low market demand was the predominant reason identified by the wholesalers for waste generation. About a third of the wholesalers suggested that high cosmetic standards for fruits and vegetables - appearance, shape, and size - should be relaxed to reduce waste. Donation of unutilized fruits and vegetables to charity was overwhelmingly (95%) considered as one of the best options for utilization of discarded produce. The extent of waste at other stages of fruit and vegetable supply chain is currently being studied.

Keywords: food waste, fruits and vegetables, supply chain, waste generation

Procedia PDF Downloads 294
5138 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 247
5137 Signs, Signals and Syndromes: Algorithmic Surveillance and Global Health Security in the 21st Century

Authors: Stephen L. Roberts

Abstract:

This article offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The article traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This article demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This article argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the article also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this article demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice of global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.

Keywords: algorithms, global health, pandemic, surveillance

Procedia PDF Downloads 165
5136 Educational Institutional Approach for Livelihood Improvement and Sustainable Development

Authors: William Kerua

Abstract:

The PNG University of Technology (Unitech) has mandatory access to teaching, research and extension education. Given such function, the Agriculture Department has established the ‘South Pacific Institute of Sustainable Agriculture and Rural Development (SPISARD)’ in 2004. SPISARD is established as a vehicle to improve farming systems practiced in selected villages by undertaking pluralistic extension method through ‘Educational Institutional Approach’. Unlike other models, SPISARD’s educational institutional approach stresses on improving the whole farming systems practiced in a holistic manner and has a two-fold focus. The first is to understand the farming communities and improve the productivity of the farming systems in a sustainable way to increase income, improve nutrition and food security as well as livelihood enhancement trainings. The second is to enrich the Department’s curriculum through teaching, research, extension and getting inputs from farming community. SPISARD has established number of model villages in various provinces in Papua New Guinea (PNG) and with many positive outcome and success stories. Adaption of ‘educational institutional approach’ thus binds research, extension and training into one package with the use of students and academic staff through model village establishment in delivering development and extension to communities. This centre (SPISARD) coordinates the activities of the model village programs and linkages. The key to the development of the farming systems is establishing and coordinating linkages, collaboration, and developing partnerships both within and external institutions, organizations and agencies. SPISARD has a six-point step strategy for the development of sustainable agriculture and rural development. These steps are (i) establish contact and identify model villages, (ii) development of model village resource centres for research and trainings, (iii) conduct baseline surveys to identify problems/needs of model villages, (iv) development of solution strategies, (v) implementation and (vi) evaluation of impact of solution programs. SPISARD envisages that the farming systems practiced being improved if the villages can be made the centre of SPISARD activities. Therefore, SPISARD has developed a model village approach to channel rural development. The model village when established become the conduit points where teaching, training, research, and technology transfer takes place. This approach is again different and unique to the existing ones, in that, the development process take place in the farmers’ environment with immediate ‘real time’ feedback mechanisms based on the farmers’ perspective and satisfaction. So far, we have developed 14 model villages and have conducted 75 trainings in 21 different areas/topics in 8 provinces to a total of 2,832 participants of both sex. The aim of these trainings is to directly participate with farmers in the pursuit to improving their farming systems to increase productivity, income and to secure food security and nutrition, thus to improve their livelihood.

Keywords: development, educational institutional approach, livelihood improvement, sustainable agriculture

Procedia PDF Downloads 141
5135 AMBICOM: An Ambient Computing Middleware Architecture for Heterogeneous Environments

Authors: Ekrem Aksoy, Nihat Adar, Selçuk Canbek

Abstract:

Ambient Computing or Ambient Intelligence (AmI) is emerging area in computer science aiming to create intelligently connected environments and Internet of Things. In this paper, we propose communication middleware architecture for AmI. This middleware architecture addresses problems of communication, networking, and abstraction of applications, although there are other aspects (e.g. HCI and Security) within general AmI framework. Within this middleware architecture, any application developer might address HCI and Security issues with extensibility features of this platform.

Keywords: AmI, ambient computing, middleware, distributed-systems, software-defined networking

Procedia PDF Downloads 262
5134 Runtime Monitoring Using Policy-Based Approach to Control Information Flow for Mobile Apps

Authors: Mohamed Sarrab, Hadj Bourdoucen

Abstract:

Mobile applications are verified to check the correctness or evaluated to check the performance with respect to specific security properties such as availability, integrity, and confidentiality. Where they are made available to the end users of the mobile application is achievable only to a limited degree using software engineering static verification techniques. The more sensitive the information, such as credit card data, personal medical information or personal emails being processed by mobile application, the more important it is to ensure the confidentiality of this information. Monitoring non-trusted mobile application during execution in an environment where sensitive information is present is difficult and unnerving. The paper addresses the issue of monitoring and controlling the flow of confidential information during non-trusted mobile application execution. The approach concentrates on providing a dynamic and usable information security solution by interacting with the mobile users during the run-time of mobile application in response to information flow events.

Keywords: mobile application, run-time verification, usable security, direct information flow

Procedia PDF Downloads 364
5133 Addressing Urban Security Challenges in Nigeria through Neighborhood Renewal: A Reflection of Mokola World Bank Slum Upgrading Pilot Project

Authors: Tabiti S. Tabiti, A. M. Jinadu, Daramola Japheth

Abstract:

Urban insecurity is among the challenges militating against sustainable urban governance; in the first place it distorts the peace of urban areas making them unsafe. On the other hand it hinders the effective performance of urban functions. Urban security challenges manifest in different forms such as, street violence, theft and robbery, accidents of different types kidnapping, killings etc.. Efforts to address urban security challenges in Nigeria have been concentrated in legislative, law enforcement and the use of community vigilante groups. However in this study, the place of physical planning strategy through effective neighbourhood renewal as practiced in Mokola is presented as an effective complementary approach for addressing urban insecurity. On this backdrop, the paper recommends the need for gradual rehabilitation of urban slum neighborhoods by the state government in collaboration with World Bank and other development financiers. The local governments should be made autonomy in Nigeria so as to make them more responsible to the people. Other recommendations suggested in the paper include creating enabling environment that will promote economic empowerment and public enlightment on personal and community sanitation. It is certain that if these recommendations are adopted the challenge of urban insecurity will reduce significantly in Nigerian cities.

Keywords: neighbourhood renewal, pilot project, slum upgrading, urban security

Procedia PDF Downloads 425
5132 Application of Interferometric Techniques for Quality Control Oils Used in the Food Industry

Authors: Andres Piña, Amy Meléndez, Pablo Cano, Tomas Cahuich

Abstract:

The purpose of this project is to propose a quick and environmentally friendly alternative to measure the quality of oils used in food industry. There is evidence that repeated and indiscriminate use of oils in food processing cause physicochemical changes with formation of potentially toxic compounds that can affect the health of consumers and cause organoleptic changes. In order to assess the quality of oils, non-destructive optical techniques such as Interferometry offer a rapid alternative to the use of reagents, using only the interaction of light on the oil. Through this project, we used interferograms of samples of oil placed under different heating conditions to establish the changes in their quality. These interferograms were obtained by means of a Mach-Zehnder Interferometer using a beam of light from a HeNe laser of 10mW at 632.8nm. Each interferogram was captured, analyzed and measured full width at half-maximum (FWHM) using the software from Amcap and ImageJ. The total of FWHMs was organized in three groups. It was observed that the average obtained from each of the FWHMs of group A shows a behavior that is almost linear, therefore it is probable that the exposure time is not relevant when the oil is kept under constant temperature. Group B exhibits a slight exponential model when temperature raises between 373 K and 393 K. Results of the t-Student show a probability of 95% (0.05) of the existence of variation in the molecular composition of both samples. Furthermore, we found a correlation between the Iodine Indexes (Physicochemical Analysis) and the Interferograms (Optical Analysis) of group C. Based on these results, this project highlights the importance of the quality of the oils used in food industry and shows how Interferometry can be a useful tool for this purpose.

Keywords: food industry, interferometric, oils, quality control

Procedia PDF Downloads 358
5131 Mobile Payment over NFC: The M-Check System Case

Authors: Karima Maazouz, Habib Benlahmer, Naceur Achtaich

Abstract:

The realization of mobile payments will make possible new and unforeseen ways of convenience and m-commerce. Mobile payment today benefit from technology and trends. NFC technology is creating a new era of contactless mobile payment. the “M-check” is a mobile payment system provides a new way facilitating transaction with high valued payment and enable new m-commerce. The objective of the paper is to propose a new solution for m-payment. The proposed combination of m-check system and NFC offers acceptable security for payment mobile, client’s satisfaction, and simplifies the process payment between clients and merchants.

Keywords: M-payment, NFC, M-check, M-commerce, security

Procedia PDF Downloads 577
5130 Password Cracking on Graphics Processing Unit Based Systems

Authors: N. Gopalakrishna Kini, Ranjana Paleppady, Akshata K. Naik

Abstract:

Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system.

Keywords: GPGPU, password cracking, secret key, user authentication

Procedia PDF Downloads 265
5129 Plant Extracts: Chemical Analysis, Investigation of Antioxidant, Antibacterial, and Antifungal Activities and Their Applications in Food Packaging Materials

Authors: Mohammed Sabbah, Asmaa Al-Asmar, Doaa Abu-Hani, Fuad Al-Rimawi

Abstract:

Plant extracts are an increasingly popular natural product with a wide range of potential applications in food, industrial, and health care industries. They are rich in polyphenolic compounds and flavonoids, which have been demonstrated to possess a variety of beneficial properties, including antimicrobial and antioxidant activity. Plant extracts have been found to possess antimicrobial activity against a variety of foodborne pathogens and can be used as a natural preservative to extend the shelf life of food products. They have also strong antioxidant activity, which can reduce the formation of free radicals and oxidation of food components. Recently there is an increase interest in bio-based polymers to be used as innovative “bioplastics” for industrial exploitation e.g. packaging materials for food products. Additionally, incorporation of active compounds (e.g. antioxidants and antimicrobials) in bio-polymer materials is of particular interest since such active polymers can be used as active packaging materials (with antimicrobial and antioxidant activity). In this work, different plant extracts have been characterized for their phenolic compounds, flavonoids content, antioxidant activity (both as free radical scavenging ability and reducing ability), and antimicrobial activity against gram positive and negative bacteria (Escherichia coli; Staphylococcus aureus, and Pseudomonas aeruginosa) as well as antifungal activities (against yeast, mold and Botrytis cinera/a plant pathogen). Results showed that many extracts are rich with polyphenolic compounds and flavonoids and have strong antioxidant activities, and rich with phytochemicals (e.g. rutin, quercetin, oleuropein, tyrosol and hydroxytyrosol). Some extracts showed antibacterial activity against both gram positive and negative bacteria as well as antifungal activities and can work, therefore, as preservatives for food or pharmaceutical industries. As an application, two extracts were used as additive to pectin-based packaging film, and results showed that the addition of these extracts significantly improve their functionality as antimicrobial and antioxidant activity. These biomaterials, therefore can be used in food packaging materials to extend the shelf life of food products.

Keywords: plant extracts, antioxidants, flavonoids, bioplastic, edible biofilm, packaging materials

Procedia PDF Downloads 58
5128 Effect of Credit Use on Technical Efficiency of Cassava Farmers in Ondo State, Nigeria

Authors: Adewale Oladapo, Carolyn A. Afolami

Abstract:

Agricultural production should be the major financial contributor to the Nigerian economy; however, the petroleum sector had taken the importance attached to this sector. The situation tends to be more worsening unless necessary attention is given to adequate credit supply among food crop farmers. This research analyses the effect of credit use on the technical efficiency of cassava farmers in Ondo State, Nigeria. Primary data were collected from two hundred randomly selected cassava farmers through a multistage sampling procedure in the study area. Data were analysed using descriptive statistics and stochastic frontier analysis (SFA). Findings revealed that 95.0% of the farmers were male while 56.0% had no formal education and were married. The SFA showed that cassava farmer’s efficiency increased with farm size, herbicide and planting material at 5%,10% and 1% respectively but decreased with fertilizer application at 1% level while farmers’ age, education, household size, experience and access to credit increased technical inefficiency at 10%. The study concluded that cassava farmers are technically inefficient in the use of farm resources and recommended that adequate and workable agricultural policy measures that will ensure availability and efficient fertilizer distribution should be put in place to increase efficiency. Furthermore, the government should encourage youth participation in cassava production and ensure improvement in farmer’s access to credit to increase farmer’s technical efficiency.

Keywords: agriculture, access to credit, cassava farmers, technical efficiency

Procedia PDF Downloads 162
5127 Urban Agriculture for Sustainable Cities: Using Wastewater and Urban Wetlands as Resource

Authors: Hussnain Mukhtar, Yu-Pin Lin

Abstract:

This paper deals with the concept of ecologically engineered system for sustainable agriculture production with the view of sustainable cities development. Sustainable cities offer numerous eco-services to its inhabitants, and where, among other issues, wastewater nutrients can be considered to be a valuable resource to be used for a sustainable enhancement of urban agriculture in wetlands. Existing cities can be transferred from being only consumer of food and other agriculture product into important resource conserving and sustainable generators of these products. The review provides the food production capacity through introduction of wastewater into urban wetlands, potential for nutrient recovery and ecological engineering intervention to reduce the risk of food contamination by pathogens. Finally, we discuss the potential nutrients accumulating in our cities, as an important aspect of sustainable urban development.

Keywords: ecological engineering, nutrient recovery, pathogens, urban agriculture, wetlands

Procedia PDF Downloads 240
5126 Formulation and Nutrition Analysis of Low-Sugar Snack Bars

Authors: S. Kongtun-Janphuk, S. Niwitpong Jr., J. Saengsai

Abstract:

Low-sugar snack bars were formulated with 3 main formulas depending on the main ingredient, which were peanut-green bean-sesame, apple, and prune. The most acceptable formula of each group was obtained by sensory evaluation using a nine-point hedonic scale. The moisture content, total ash, protein, fat and fiber were analyzed by the standard methods of AOAC. The peanut-mung bean-sesame snack bar showed the highest protein content (88.32%) and total fat (0.48%) with the lowest of fiber content (0.01%) while the prune formula showed the lowest protein content (71.91%) and total fat (0.21%) with the highest of fiber content (0.03%). This result indicated that the prune formula could be used as diet food to assist in weight loss program.

Keywords: low-sugar snack bar, diet food, nutrition analysis, food formulation

Procedia PDF Downloads 377
5125 Mental Well-Being and Quality of Life: A Comparative Study of Male Leather Tannery and Non-Tannery Workers of Kanpur City, India

Authors: Gyan Kashyap, Shri Kant Singh

Abstract:

Improved mental health can be articulated as a good physical health and quality of life. Mental health plays an important role in survival of any one’s life. In today’s time people living with stress in life due to their personal matters, health problems, unemployment, work environment, living environment, substance use, life style and many more important reasons. Many studies confirmed that the significant proportion of mental health people increasing in India. This study is focused on mental well-being of male leather tannery workers in Kanpur city, India. Environment at work place as well as living environment plays an important health risk factors among leather tannery workers. Leather tannery workers are more susceptible to many chemicals and physical hazards, just because they are liable to be affected by their exposure to lots of hazardous materials and processes during tanning work in very hazardous work environment. The aim of this study to determine the level of mental health disorder and quality of life among male leather tannery and non-tannery workers in Kanpur city, India. This study utilized the primary data from the cross- sectional household study which was conducted from January to June, 2015 on tannery and non-tannery workers as a part of PhD program from the Jajmau area of Kanpur city, India. The sample of 286 tannery and 295 non-tannery workers has been collected from the study area. We have collected information from the workers of age group 15-70 those who were working at the time of survey for at least one year. This study utilized the general health questionnaire (GHQ-12) and work related stress scale to test the mental wellbeing of male tannery and non-tannery workers. By using GHQ-12 and work related stress scale, Polychoric factor analysis method has been used for best threshold and scoring. Some of important question like ‘How would you rate your overall quality of life’ on Likert scale to measure the quality of life, their earnings, education, family size, living condition, household assets, media exposure, health expenditure, treatment seeking behavior and food habits etc. Results from the study revealed that around one third of tannery workers had severe mental health problems then non-tannery workers. Mental health problem shown the statistically significant association with wealth quintile, 56 percent tannery workers had severe mental health problem those belong to medium wealth quintile. And 42 percent tannery workers had moderate mental health problem among those from the low wealth quintile. Work related stress scale found the statistically significant results for tannery workers. Large proportion of tannery and non-tannery workers reported they are unable to meet their basic needs from their earnings and living in worst condition. Important result from the study, tannery workers who were involved in beam house work in tannery (58%) had severe mental health problem. This study found the statistically significant association with tannery work and mental health problem among tannery workers.

Keywords: GHQ-12, mental well-being, factor analysis, quality of life, tannery workers

Procedia PDF Downloads 372
5124 A Graph Theoretic Algorithm for Bandwidth Improvement in Computer Networks

Authors: Mehmet Karaata

Abstract:

Given two distinct vertices (nodes) source s and target t of a graph G = (V, E), the two node-disjoint paths problem is to identify two node-disjoint paths between s ∈ V and t ∈ V . Two paths are node-disjoint if they have no common intermediate vertices. In this paper, we present an algorithm with O(m)-time complexity for finding two node-disjoint paths between s and t in arbitrary graphs where m is the number of edges. The proposed algorithm has a wide range of applications in ensuring reliability and security of sensor, mobile and fixed communication networks.

Keywords: disjoint paths, distributed systems, fault-tolerance, network routing, security

Procedia PDF Downloads 425
5123 Use of Linear Programming for Optimal Production in a Production Line in Saudi Food Co.

Authors: Qasim M. Kriri

Abstract:

Few Saudi Arabia production companies face financial profit issues until this moment. This work presents a linear integer programming model that solves a production problem of a Saudi Food Company in Saudi Arabia. An optimal solution to the above-mentioned problem is a Linear Programming solution. In this regard, the main purpose of this project is to maximize profit. Linear Programming Technique has been used to derive the maximum profit from production of natural juice at Saudi Food Co. The operations of production of the company were formulated and optimal results are found out by using Lindo Software that employed Sensitivity Analysis and Parametric linear programming in order develop Linear Programming. In addition, the parameter values are increased, then the values of the objective function will be increased.

Keywords: parameter linear programming, objective function, sensitivity analysis, optimize profit

Procedia PDF Downloads 187
5122 Static Analysis of Security Issues of the Python Packages Ecosystem

Authors: Adam Gorine, Faten Spondon

Abstract:

Python is considered the most popular programming language and offers its own ecosystem for archiving and maintaining open-source software packages. This system is called the python package index (PyPI), the repository of this programming language. Unfortunately, one-third of these software packages have vulnerabilities that allow attackers to execute code automatically when a vulnerable or malicious package is installed. This paper contributes to large-scale empirical studies investigating security issues in the python ecosystem by evaluating package vulnerabilities. These provide a series of implications that can help the security of software ecosystems by improving the process of discovering, fixing, and managing package vulnerabilities. The vulnerable dataset is generated using the NVD, the national vulnerability database, and the Snyk vulnerability dataset. In addition, we evaluated 807 vulnerability reports in the NVD and 3900 publicly known security vulnerabilities in Python Package Manager (pip) from the Snyk database from 2002 to 2022. As a result, many Python vulnerabilities appear in high severity, followed by medium severity. The most problematic areas have been improper input validation and denial of service attacks. A hybrid scanning tool that combines the three scanners bandit, snyk and dlint, which provide a clear report of the code vulnerability, is also described.

Keywords: Python vulnerabilities, bandit, Snyk, Dlint, Python package index, ecosystem, static analysis, malicious attacks

Procedia PDF Downloads 111
5121 Relevance in the Water-Energy-Food nexus: an Opportunity for Promoting Socio Economic Development in Algeria

Authors: Nadjib Drouiche

Abstract:

Water resources in Algeria are scarce, often low quality, fragile, and unevenly distributed in space and time. The pressure on water resources can be associated with industrial development, a steady population growth, and demanding land irrigation measures. These conditions createa tense competitionfor managing waterresourcesand sharing thembetween agricultural development, drinking water supply, industrial activities, etc. Moreover, the impact of climate change has placed in the forefront national policies focused on the water-energy-food nexus (WEF). In this context, desalination membrane technologies could play an increasing rolefor supporting segments of the Algerian economy that are heavily water-dependent. By implementing water reuse and desalination strategies together in the agricultural sector, there is an opportunity to expand the access to healthy food and clean water, thereby keeping the WEF nexus effects under control.

Keywords: desalination, mitigation, climate change, sustainable development goals

Procedia PDF Downloads 85
5120 Making Food Science Education and Research Activities More Attractive for University Students and Food Enterprises by Utilizing Open Innovative Space-Approach

Authors: Anna-Maria Saarela

Abstract:

At the Savonia University of Applied Sciences (UAS), curriculum and studies have been improved by applying an Open Innovation Space approach (OIS). It is based on multidisciplinary action learning. The key elements of OIS-ideology are work-life orientation, and student-centric communal learning. In this approach, every participant can learn from each other and innovations will be created. In this social innovation educational approach, all practices are carried out in close collaboration with enterprises in real-life settings, not in classrooms. As an example, in this paper, Savonia UAS’s Future Food RDI hub (FF) shows how OIS practices are implemented by providing food product development and consumer research services for enterprises in close collaboration with academicians, students and consumers. In particular one example of OIS experimentation in the field is provided by a consumer research carried out utilizing verbal analysis protocol combined with audio-visual observation (VAP-WAVO). In this case, all co-learners were acting together in supermarket settings to collect the relevant data for a product development and the marketing department of a company. The company benefitted from the results obtained, students were more satisfied with their studies, educators and academicians were able to obtain good evidence for further collaboration as well as renewing curriculum contents based on the requirements of working life. In addition, society will benefit over time as young university adults find careers more easily through their OIS related food science studies. Also this knowledge interaction model re-news education practices and brings working-life closer to educational research institutes.

Keywords: collaboration, education, food science, industry, knowledge transfer, RDI, student

Procedia PDF Downloads 358
5119 A Comparative Analysis of Asymmetric Encryption Schemes on Android Messaging Service

Authors: Mabrouka Algherinai, Fatma Karkouri

Abstract:

Today, Short Message Service (SMS) is an important means of communication. SMS is not only used in informal environment for communication and transaction, but it is also used in formal environments such as institutions, organizations, companies, and business world as a tool for communication and transactions. Therefore, there is a need to secure the information that is being transmitted through this medium to ensure security of information both in transit and at rest. But, encryption has been identified as a means to provide security to SMS messages in transit and at rest. Several past researches have proposed and developed several encryption algorithms for SMS and Information Security. This research aims at comparing the performance of common Asymmetric encryption algorithms on SMS security. The research employs the use of three algorithms, namely RSA, McEliece, and RABIN. Several experiments were performed on SMS of various sizes on android mobile device. The experimental results show that each of the three techniques has different key generation, encryption, and decryption times. The efficiency of an algorithm is determined by the time that it takes for encryption, decryption, and key generation. The best algorithm can be chosen based on the least time required for encryption. The obtained results show the least time when McEliece size 4096 is used. RABIN size 4096 gives most time for encryption and so it is the least effective algorithm when considering encryption. Also, the research shows that McEliece size 2048 has the least time for key generation, and hence, it is the best algorithm as relating to key generation. The result of the algorithms also shows that RSA size 1024 is the most preferable algorithm in terms of decryption as it gives the least time for decryption.

Keywords: SMS, RSA, McEliece, RABIN

Procedia PDF Downloads 146
5118 Drying Kinetics of Okara (Soy Pulp) Using the Multi-Commodity Heat Pump Dryer (MCHPD)

Authors: Lorcelie B. Taclan, Jolly S. Balila, Maribel Balagtas, Eunice M. Aclan, Myrtle C. Orbon, Emson Y. Taclan, Irenea A. Centeno

Abstract:

Okara (soy pulp), a by-product and waste from the production of soymilk, tufo and tokwa and soybean-based vegan food products is readily available in the university thrice a week. The Food Factory owned and managed by AUP produces these food products weekly. Generally the study was conducted to determine the drying kinetics of soya pulp using the MCHPD. Specifically, it aimed to establish the time of drying; moisture loss per hour and percent moisture content of soya pulp and to establish the dried okara as an ingredient to other foods. The MCHPD is drying equipment that has an ideal drying condition of 50.00C and 10.0% relative humidity. Fresh and wet soya pulp were weighed at 1.0 kg per tray (21 drying trays), laid on the trays lined with cheese cloth. The MCHPD was set to desired drying conditions. Weight loss was monitored every hour and calculated using standard formulas. Research results indicated that the drying time for soya pulp was 19.0 hours; the % moisture content was reduced from 87.6.0% to 9.7.0% at an average moisture loss of 3.0 g/hr. The nutritional values of okara were favorably maintained with enhanced color. The dried okara was added as an ingredient to other healthy bakery products produced by the AUP Food Factory. Making use of okara would add nutritional values to other food products and would also help waste management concerns inside the university.

Keywords: okara, MCHPD, drying kinetics, nutritional values, waste management

Procedia PDF Downloads 381
5117 Obtaining Nutritive Powder from Peel of Mangifera Indica L. (Mango) as a Food Additive

Authors: Chajira Garrote, Laura Arango, Lourdes Merino

Abstract:

This research explains how to obtain nutritious powder from a variety of ripe mango peels Hilacha (Mangifera indica L.) to use it as a food additive. Also, this study intends to use efficiently the by-products resulting from the operations of mango pulp manufacturing process by processing companies with the aim of giving them an added value. The physical and chemical characteristics of the mango peels and the benefits that may help humans, were studied. Unit operations are explained for the processing of mango peels and the production of nutritive powder as a food additive. Emphasis is placed on the preliminary operations applied to the raw material and on the drying method, which is very important in this project to obtain the suitable characteristics of the nutritive powder. Once the powder was obtained, it was subjected to laboratory tests to determine its functional properties: water retention capacity (WRC) and oil retention capacity (ORC), also a sensory analysis for the powder was performed to determine the product profile. The nutritive powder from the ripe mango peels reported excellent WRC and ORC values: 7.236 g of water / g B.S. and 1.796 g water / g B.S. respectively and the sensory analysis defined a complete profile of color, odor and texture of the nutritive powder, which is suitable to use it in the food industry.

Keywords: mango, peel, powder, nutritive, functional properties, sensory analysis

Procedia PDF Downloads 342
5116 Efficiency and Scale Elasticity in Network Data Envelopment Analysis: An Application to International Tourist Hotels in Taiwan

Authors: Li-Hsueh Chen

Abstract:

Efficient operation is more and more important for managers of hotels. Unlike the manufacturing industry, hotels cannot store their products. In addition, many hotels provide room service, and food and beverage service simultaneously. When efficiencies of hotels are evaluated, the internal structure should be considered. Hence, based on the operational characteristics of hotels, this study proposes a DEA model to simultaneously assess the efficiencies among the room production division, food and beverage production division, room service division and food and beverage service division. However, not only the enhancement of efficiency but also the adjustment of scale can improve the performance. In terms of the adjustment of scale, scale elasticity or returns to scale can help to managers to make decisions concerning expansion or contraction. In order to construct a reasonable approach to measure the efficiencies and scale elasticities of hotels, this study builds an alternative variable-returns-to-scale-based two-stage network DEA model with the combination of parallel and series structures to explore the scale elasticities of the whole system, room production division, food and beverage production division, room service division and food and beverage service division based on the data of international tourist hotel industry in Taiwan. The results may provide valuable information on operational performance and scale for managers and decision makers.

Keywords: efficiency, scale elasticity, network data envelopment analysis, international tourist hotel

Procedia PDF Downloads 213
5115 Towards an Enhanced Compartmental Model for Profiling Malware Dynamics

Authors: Jessemyn Modiini, Timothy Lynar, Elena Sitnikova

Abstract:

We present a novel enhanced compartmental model for malware spread analysis in cyber security. This paper applies cyber security data features to epidemiological compartmental models to model the infectious potential of malware. Compartmental models are most efficient for calculating the infectious potential of a disease. In this paper, we discuss and profile epidemiologically relevant data features from a Domain Name System (DNS) dataset. We then apply these features to epidemiological compartmental models to network traffic features. This paper demonstrates how epidemiological principles can be applied to the novel analysis of key cybersecurity behaviours and trends and provides insight into threat modelling above that of kill-chain analysis. In applying deterministic compartmental models to a cyber security use case, the authors analyse the deficiencies and provide an enhanced stochastic model for cyber epidemiology. This enhanced compartmental model (SUEICRN model) is contrasted with the traditional SEIR model to demonstrate its efficacy.

Keywords: cybersecurity, epidemiology, cyber epidemiology, malware

Procedia PDF Downloads 91