Search results for: national food security strategy
11655 Detection and Tracking for the Protection of the Elderly and Socially Vulnerable People in the Video Surveillance System
Authors: Mobarok Hossain Bhuyain
Abstract:
Video surveillance processing has attracted various security fields transforming it into one of the leading research fields. Today's demand for detection and tracking of human mobility for security is very useful for human security, such as in crowded areas. Accordingly, video surveillance technology has seen a rapid advancement in recent years, with algorithms analyzing the behavior of people under surveillance automatically. The main motivation of this research focuses on the detection and tracking of the elderly and socially vulnerable people in crowded areas. Degenerate people are a major health concern, especially for elderly people and socially vulnerable people. One major disadvantage of video surveillance is the need for continuous monitoring, especially in crowded areas. To assist the security monitoring live surveillance video, image processing, and artificial intelligence methods can be used to automatically send warning signals to the monitoring officers about elderly people and socially vulnerable people.Keywords: human detection, target tracking, neural network, particle filter
Procedia PDF Downloads 16311654 Diversity of Large Mammals in Awash National Park and its Ecosystem Role and Biodiversity Conservation, Ethiopia
Authors: Sintayehu W. Dejene
Abstract:
An ecological and biodiversity conservation study on species composition, population status and habitat association of large mammals and the impact of human interference on their distribution was carried out in Awash National Park, Ethiopia during October, 2012 to July, 2013. A total of 25 species of large mammals were recorded from the study area. Representative sample sites were taken from each habitat type and surveyed using random line transect method. For medium and large mammal survey, indirect methods (foot print and dung) and direct observations were used. Twenty three species of medium to large-sized mammals were identified and recorded from ANP. A total of 25 species of median and large size mammals were recorded from the study area. Out of this, 20 species were rodents of three families and five species were insectivores of two families. Beisa Oryx (Oryx beisa beisa),Soemmerings gazelle (Gazella soemmeringi),Defassa waterbuck (Kobus defassa), Lesser Kudu (Strepsiceros imberbis), Greater Kudu (Strepsiceros strepsiceros), Warthog (Phacochoerus aethiopicus), Baboon (Papio anubis baboon) and Salt's dikdik (Madoqua saltiana) were the most common seen median and large mammals in the study area. Beisa Oryx (Oryx beisa beisa) and Sommering Gazelles (Gazella soemmeringi) are commonly found in the open areas, where as Greater Kudus (Strepsiceros strepsiceros) and Lesser Kudus (Strepsiceros imberbis) was seen in the bushed areas. Defarsa waterbuck (Kobus defassa) was observed in the bushy river area in Northern part of the Park. Anubis baboon (Papio anubis baboon) was seen near to the river side. Hamadryas baboon founded in semi-desert areas of Awash National Park, particularly in Filwoha area. The area is one of a key biodiversity conservation and provide pure water, air, food, grazing land and storage of carbon.Keywords: awash national park, biodiversity, ecosystem value, habitat association, large mammals, population status, species composition
Procedia PDF Downloads 38011653 Secure Cryptographic Operations on SIM Card for Mobile Financial Services
Authors: Kerem Ok, Serafettin Senturk, Serdar Aktas, Cem Cevikbas
Abstract:
Mobile technology is very popular nowadays and it provides a digital world where users can experience many value-added services. Service Providers are also eager to offer diverse value-added services to users such as digital identity, mobile financial services and so on. In this context, the security of data storage in smartphones and the security of communication between the smartphone and service provider are critical for the success of these services. In order to provide the required security functions, the SIM card is one acceptable alternative. Since SIM cards include a Secure Element, they are able to store sensitive data, create cryptographically secure keys, encrypt and decrypt data. In this paper, we design and implement a SIM and a smartphone framework that uses a SIM card for secure key generation, key storage, data encryption, data decryption and digital signing for mobile financial services. Our frameworks show that the SIM card can be used as a controlled Secure Element to provide required security functions for popular e-services such as mobile financial services.Keywords: SIM card, mobile financial services, cryptography, secure data storage
Procedia PDF Downloads 30911652 Neuromarketing in the Context of Food Marketing
Authors: Francesco Pinci
Abstract:
This research investigates the significance of product packaging as an effective marketing tool. By using commercially available pasta as an example, the study specifically examines the visual components of packaging, including color, shape, packaging material, and logo. The insights gained from studies like this are particularly valuable to food and beverage companies as they provide marketers with a deeper understanding of the factors influencing consumer purchasing decisions. The research analyzes data collected through surveys conducted via Google Forms and visual data obtained using iMotions eye-tracker software. The results affirm the importance of packaging design elements, such as color and product information, in shaping consumer buying behavior.Keywords: consumer behaviour, eyetracker, food marketing, neuromarketing
Procedia PDF Downloads 11211651 Ex Situ Conservation Practices for Rare Plants in Living Collections
Authors: Erika Pénzesné Kónya
Abstract:
The conservation programme of various vascular plant species has been started in the Botanical garden o fEszterházy College in Eger cooperating with two national parks in the Northern mountain region and Botanical garden of Eötvös Lóránd University in Budapest. The seeds of the species were collected in the chosen habitats with the permission determined by the National Parks and the conservation specialists. Now we have different numbers of individuals from mainly endemic and relict species. We took some experiments to know how can we germinate and grow up this species succesfully up to blooming and fruiting. In the temperate zone the majority of species after ripening the seeds or corps get dormancy to avoid the inadequate period to germinate. The seeds of species need variously pre-treatment (for example pre-chill) and suitable environment (for example basic medium) to unlock the seed dormancy and germinate in large scale. This impacts are often similar to in their originally habitat. To bloom the plants need suitable types of soil, but we couldn’t grow them in the most fruitful soil of habitat. Suitable microclimate is usually more important for some relict species than the soil, that’s why should we make experiments to find the suitable essential conditions for different species and know all of fenological states of them. These experiments can start a method for growing common wild native plants as food materials.Keywords: ex situ conservation, germination success, soil preference Hungary, regionality, native wild plants
Procedia PDF Downloads 28911650 The Impact of Diversification Strategy on Leverage and Accrual-Based Earnings Management
Authors: Safa Lazzem, Faouzi Jilani
Abstract:
The aim of this research is to investigate the impact of diversification strategy on the nature of the relationship between leverage and accrual-based earnings management through panel-estimation techniques based on a sample of 162 nonfinancial French firms indexed in CAC All-Tradable during the period from 2006 to 2012. The empirical results show that leverage increases encourage managers to manipulate earnings management. Our findings prove that the diversification strategy provides the needed context for this accounting practice to be possible in highly diversified firms. In addition, the results indicate that diversification moderates the relationship between leverage and accrual-based earnings management by changing the nature and the sign of this relationship.Keywords: diversification, earnings management, leverage, panel-estimation techniques
Procedia PDF Downloads 14811649 Issues in the Learning and Construction of a National Music Identity in Multiracial Malaysia: Diversity, Complexity, and Contingency
Authors: Loo Fung Ying, Loo Fung Chiat
Abstract:
The formation of a musical identity that shapes the nation in this multiracial country reveals many complexities, conundrums, and contingencies. Creativity and identity formation at the level of an individual or a collective group further diversified musical expression, representation, and style, which has led to an absence of regularities. In addition, ‘contemporizing accretion,’ borrowing a term used by Schnelle in theology (2009), further complicates musical identity, authenticity, conception, and realization. Thus, in this paper, we attempt to define the issues surrounding the teaching and learning of the multiracial Malaysian national music identity. We also discuss unnecessary power hierarchies, interracial conflicts, and sentiments in the construct of a multiracial national music identity by referring to genetic origins, the evolution of music, and the neglected issues of representation and reception at a global level from a diachronic perspective. Lastly, by synthesizing Ladson-Billings, Gay, Kruger, and West-Burns’s culturally relevant/responsive pedagogical theories, we discuss possible analytic tools for consideration that are more multiculturally relevant and responsive for the teaching, learning, and construction of a multiracial Malaysian national music identity.Keywords: Malaysia, music, multiracial, national music identity, culturally relevant/responsive pedagogy
Procedia PDF Downloads 19911648 Protein Derived Biodegradable Food Packaging Material from Poultry By-Product
Authors: Muhammad Zubair, Aman Ullah, Jianping Wu
Abstract:
During the last decades, petroleum derived synthetic polymers like polyethylene terephthalate, polyvinylchloride, polyethylene, polypropylene and polystyrene has extensively been used in the field of food packaging and mostly are non-degradable. Biopolymers are a good fit for single-use or short-lived products such as food packaging. Spent hens, a poultry by-product which is of little economic value and their disposal are environmentally harmful. Through current study, we have explored the possibility to transform proteins from spent fowl into green food packaging material. Proteins from spent fowl were extracted within 1 hour using pH shift method with recovery of about 74%. Different plasticizers were tried like glycerol, sorbitol, glutaraldehyde, 1,2 ethylene glycol and 1,2 butanediol. Glycerol was the best plasticizer among all these plasticizers. A naturally occurring and non-toxic cross-linking agent, chitosan, was used to form the chitosan/glycerol/protein blend by casting and compression molding techniques. The mechanical properties were characterized using tensile strength analyzer. The nano-reinforcements with homogeneous dispersion of nanoparticles lead to improved physical properties suggesting that these materials have great potential for food packaging applications.Keywords: differential scanning calorimetry, dynamic mechanical analysis, scanning electron microscopy, spent hen
Procedia PDF Downloads 27511647 21st Century Gunboat Diplomacy and Strategic Sea Areas
Authors: Mustafa Avsever
Abstract:
Throughout history, states have attached great importance to seas in terms of economic and security. Advanced civilizations have always founded in coastal regions. Over time, human being has tended to trade and naturally always aimed get more and more. Seas by covering 71% of the earth, provide the greatest economic opportunities for access to raw material resources and the world market. As a result, seas have become the most important areas of conflict over the course of time. Coastal states, use seas as a tool for defense zone, trade, marine transportation and power transfer, they have acquired colonies overseas and increased their capital, raw materials and labor. Societies, have increased their economic prosperity, though their navies in order to retain their welfare and achieve their foreign policy objectives. Sometimes they have imposed their demands through the use or threat of limited naval force in accordance with their interests that is gunboat diplomacy. Today we can see samples of gunboat diplomacy used in the Eastern Mediterranean, during Ukraine crisis, in dispute between North Korea and South Korea and the ongoing power struggle in Asia-Pacific. Gunboat diplomacy has been and continues to be applied consistently in solving problems by the stronger side of the problem. The purpose of this article is to examine using navy under the gunboat diplomacy as an active instrument of foreign policy and security policy and reveal the strategic sea areas in which gunboat diplomacy is used effectively in the matrix of international politics in the 21st century.Keywords: gunboat diplomacy, maritime strategy, sea power, strategic sea lands
Procedia PDF Downloads 43111646 Revival of Old Silk Route and New Maritime Route: An Opportunity for India or Hidden Geopolitics of China
Authors: Geetanjali Sharma
Abstract:
There are always provincial variations which deserve more detailed treatment. Before the arrival of modern era, geography and cultural homogeneity were determining factors of human habitat and migration. Boundaries as if we see them, did not exist earlier. The connectivity of the world was also different as of now. The reinforcement of the old silk route will improve economic cooperation and connectivity between Asian, European and African countries, but obviously, it is designed to improve China’s geopolitical and geostrategic position in the world. The paper is based on the secondary sources of data. Analytical and historical approach has been used to clarify the ties between the old silk routes and new One-Belt-One-Road initiative China. The paper begins with an explanation of the historical background of the old Silk Route, its origin and development, trailed by an analysis of latest declarations by the Chinese leaders to revive it. It also discusses the impacts of this initiative on India’s economy and cultural exchange between associated regions. Lastly, the paper sums up the findings and suggestions for keeping a balance between the security and economic relationship between the countries. It concludes that the silk route is an effort in commencing a ‘grand strategy’ for global trade and cooperation with hidden objectives of China to increase the investment of China in other continents as well. The revival of silk route may prove to be a very helpful in reinforcing cooperation and raising it to a new level of economic establishments. However, China has yet to promote the much-needed political and strategic trust.Keywords: OBOR (One-Belt-One-Road), geopolitics, economic relation, security concerns
Procedia PDF Downloads 28311645 National Image in the Age of Mass Self-Communication: An Analysis of Internet Users' Perception of Portugal
Authors: L. Godinho, N. Teixeira
Abstract:
Nowadays, massification of Internet access represents one of the major challenges to the traditional powers of the State, among which the power to control its external image. The virtual world has also sparked the interest of social sciences which consider it a new field of study, an immense open text where sense is expressed. In this paper, that immense text has been accessed to so as to understand the perception Internet users from all over the world have of Portugal. Ours is a quantitative and qualitative approach, as we have resorted to buzz, thematic and category analysis. The results confirm the predominance of sea stereotype in others' vision of the Portuguese people, and evidence that national image has adapted to network communication through processes of individuation and paganization.Keywords: national image, internet, self-communication, perception
Procedia PDF Downloads 25511644 Influence of Security on Fan Attendance during Nigeria Professional Football League Matches
Authors: B. O. Diyaolu
Abstract:
The stadium transcends a field of play to cultural heritage of a club especially when there is security of life and property and a conducive environment with exciting media facilities, CCTV and adequate field of play. Football fans love watching their clubs’ matches especially when nothing discourages their presence in the stadium. This study investigated the influence of security on fans’ attendance during Nigeria Professional Football League matches. Descriptive survey research design was used and the population consists of all Nigeria Professional Football League fans. Simple random sampling technique was used to pick a state from the six geo-political zones. 600 respondents comprising male and female fans were sampled from the ten selected vendors’ stands in each selected state. A structured questionnaire on Security and Fan attendance scale (SFAS) was used. The instrument consists of two sections. Section A seeks information on demographic data of the respondents, while section B was used to elicit information on security and fans’ attendance. The modified instrument which consists of 20 items has a reliability coefficient of 0.73. The hypothesis was tested at 0.05 significance level. The completed questionnaire was collated, coded and analyzed using descriptive statistics of frequency counts and percentage and inferential statistics of chi-square (X2). Findings of this study revealed that adequate security significantly influences fan attendance during Nigeria Professional Football League matches. There is no sport that can develop if the facilities in use are inadequate. Improving the condition of the stadium in Nigeria is paramount to the development of the Nigeria Professional Football League. All stakeholders in the organization of the League must put into consideration the need to improve the standard of the stadium as it will help to increase the attendance of fans during matches. Only the standard ones should be used during matches.Keywords: adequate security, fans attendance, football fans, football stadium, Nigeria professional football league
Procedia PDF Downloads 11311643 E-government Status and Impact on Development in the Arab Region
Authors: Sukaina Al-Nasrawi, Maysoun Ibrahim
Abstract:
Information and communication technologies (ICT) have affected recent public administration and governance. Electronic Government (e-government) services were developed to simplify government procedures and improve interaction with citizens on one hand and to create new governance models to empower citizens and involve them in the decision-making process while increasing transparency on another hand. It is worth noting that efficient governance models enable sustainable development at the social and economic levels. Currently, the status of e-government national strategies and implementation programs vary from one country to another. This variance in the development levels of e-government initiatives and applications noted the digital divide between countries of the same region, thereby highlighting the difficulty to reach regional integration. Many Arab countries realized the need for a well-articulated e-government strategy and launched national e-government initiatives. In selected Arab countries, the focus of e-government initiatives and programs shifted from the provision of services to advanced concepts such as open data initiatives. This paper aims at over viewing the e-government achievements of Arab countries and areas for enhancement, and share best practices in the area.of the best e-government programmes from the Arab region the world. It will also shed the light on the impact of the information society in general and e-government, in specific, on the social and economic development in the Arab region.Keywords: Information and Communication Technologies (ICT), services, e-government, development, Arab region, digital divide, citizens
Procedia PDF Downloads 28911642 Arabic Scholar’s Governance Advocacy and Nigeria’s National Security in Nigeria: Perspective of Al-Shaykh Usman Bin Fodio
Authors: Mohammad Jamiu Abdullahi, Shykh Ahmed Abdussalam
Abstract:
The emergence of Arabic on the shore of West Africa heralded the practise of Islam and advocation for a just and egalitarian society. Islam, it was argued, has been perverted and subverted by the Hausa leadership. This necessitated the call for reforming Islam. Al-Shaykh Usman Bin Fodio grabbed the opportunity and fought the perverts to restore the glory of Islam and establish shari'ah way of life. This was the practice, especially in the northern part of Nigeria until the incursion of colonialism. The conquest of the colonial master halted the rule of jihadi leaderships and subjected them to colonialism under which only some aspects of Islamic system considered potentially beneficial to the British interest were retained. The current socio-political and economic crises in Nigeria has necessitated the need to look inwardly to the bulk of works, in Arabic, left behind by the Muslim scholars to help to salvage the country from its present political crisis, economic paralysis and legal decadence. This paper, therefore, examines the relevance of Arabic literary works that housed political/legal theories to salvaging the country from its present political crises, economic paralysis and legal decadence.Keywords: Arabic Fodio Nigeria security, advocacy governance scholar Usman, British colonial perspective shaykh, leadership Islam jihad politics
Procedia PDF Downloads 33311641 Role of Additional Food Resources in an Ecosystem with Two Discrete Delays
Authors: Ankit Kumar, Balram Dubey
Abstract:
This study proposes a three dimensional prey-predator model with additional food, provided to predator individuals, including gestation delay in predators and delay in supplying the additional food to predators. It is assumed that the interaction between prey and predator is followed by Holling type-II functional response. We discussed the steady states and their local and global asymptotic behavior for the non-delayed system. Hopf-bifurcation phenomenon with respect to different parameters has also been studied. We obtained a range of predator’s tendency factor on provided additional food, in which the periodic solutions occur in the system. We have shown that oscillations can be controlled from the system by increasing the tendency factor. Moreover, the existence of periodic solutions via Hopf-bifurcation is shown with respect to both the delays. Our analysis shows that both delays play an important role in governing the dynamics of the system. It changes the stability behavior into instability behavior. The direction and stability of Hopf-bifurcation are also investigated through the normal form theory and the center manifold theorem. Lastly, some numerical simulations and graphical illustrations have been carried out to validate our analytical findings.Keywords: additional food, gestation delay, Hopf-bifurcation, prey-predator
Procedia PDF Downloads 12811640 Impact of Green Marketing Mix Strategy and CSR on Organizational Performance: An Empirical Study of Manufacturing Sector of Pakistan
Authors: Syeda Shawana Mahasan, Muhammad Farooq Akhtar
Abstract:
The objective of this study is to analyze the influence of the green marketing mix strategy and corporate social responsibility (CSR) on the performance of an organization, taking into account the mediating effect of corporate image. The impact of frugal innovation and corporate activism is being examined. The data was gathered from executives at various levels of management, including top, middle, and lower-level managers, from a total of 550 manufacturing enterprises of different sizes, ranging from small to medium to large. The collected replies are processed and analyzed using SMART PLS version 4.0.0.0. The application of PLS-SEM demonstrates that the green marketing mix strategy and corporate social responsibility have a significant impact on organizational performance. Therefore, it is imperative for organizations to effectively adopt environmentally sustainable and socially conscious methods within their operations. The results indicate that the corporate image has a key role in mediating the relationship between the green marketing mix strategy, corporate social responsibility, and organizational performance. This demonstrates the imperative for organizations to actively enhance their favorable reputation among stakeholders. The combination of frugal innovation and corporate activism enhances the connection between corporate image and organizational performance. The current study assists managers in recognizing the significance of these particular constructs in maintaining the long-term performance of the organization.Keywords: green marketing mix strategy, CSR, corporate image, organizational performance, frugal innovation, corporate activism
Procedia PDF Downloads 3611639 General Awareness of Teenagers in Information Security
Authors: Magdaléna Náplavová, Tomáš Ludík, Petr Hrůza, František Božek
Abstract:
The use of IT equipment has become a part of every day. However, each device that is part of cyberspace should be secured against unauthorized use. It is very important to know the basics of these security devices, but also the basics of safe conduct their owners. This information should be part of every curriculum computer science education in primary and secondary schools. Therefore, the work focuses on the education of pupils in primary and secondary schools on the Internet. Analysis of the current state describes approaches to the education of pupils in security issues on the Internet. The paper presents a questionnaire-based survey which was carried out in the Czech Republic, whose task was to ascertain the level of opinion pupils in primary and secondary schools on the issue of communication in social networks. The research showed that awareness of socio-pathological phenomena on the Internet environment is very low. Based on the results it was proposed appropriate ways of teaching to this issue and its inclusion a proposal of curriculum for primary and secondary schools.Keywords: information security, cyber space, general awareness, questionnaire, socio-pathological phenomena, educational system
Procedia PDF Downloads 38911638 The Planning Strategies of Public Sports Facilities Based on the Field Investigation: Case Study of Songyuan, China
Authors: Li Hua Li, Ling Ling Li
Abstract:
With the National Fitness Program being established as a national strategy by the Chinese government, Chinese old planning strategies of sports facilities which are based on the purpose for hosting high-level sports events have been failed to meet the rapid growth of Chinese residents’ healthy needs. As the most important carrier for promoting the health of citizens in China, public sports facilities may have further conflicts when they are planned without considering the characteristics of the city itself and the fitness needs of the urban residents. With the planning practice in Songyuan in northeastern China, this paper explores the key planning strategies of public sports facilities through the field investigation to obtain the current situation of public sports facilities in Songyuan and the questionnaire to get the date of Songyuan residents’ fitness characteristics and needs. Findings from this investigation suggest that the planning of public sports facilities in Songyuan should first increase the quantities of public sports facilities at the community level, which could match the fitness population and meet the fitness needs in Songyuan. Secondly, the planning should combine with other available resources, such as urban parks, squares and other places where Songyuan residents often choose to do physical activities to enhance the vitality of public sports facilities. Finally, the planning should also link the urban transportation system in Songyuan to improve the accessibility and efficiency of public sports facilities. All these planning strategies could provide essential information for updating the urban and regional design of Songyuan.Keywords: field investigation, healthy needs, public sports facilities, planning strategies, questionnaire
Procedia PDF Downloads 23611637 New Security Approach of Confidential Resources in Hybrid Clouds
Authors: Haythem Yahyaoui, Samir Moalla, Mounir Bouden, Skander ghorbel
Abstract:
Nowadays, Cloud environments are becoming a need for companies, this new technology gives the opportunities to access to the data anywhere and anytime, also an optimized and secured access to the resources and gives more security for the data which stored in the platform, however, some companies do not trust Cloud providers, in their point of view, providers can access and modify some confidential data such as bank accounts, many works have been done in this context, they conclude that encryption methods realized by providers ensure the confidentiality, although, they forgot that Cloud providers can decrypt the confidential resources. The best solution here is to apply some modifications on the data before sending them to the Cloud in the objective to make them unreadable. This work aims on enhancing the quality of service of providers and improving the trust of the customers.Keywords: cloud, confidentiality, cryptography, security issues, trust issues
Procedia PDF Downloads 37511636 Effects of Different Food Matrices on Viscosity and Protein Degradation during in vitro Digestion
Authors: Gulay Oncu Ince, Sibel Karakaya
Abstract:
Food is a worldwide concern. Among the factors that have influences on human health, food, nutrition and life style have been regarded as the most important factors since they can be intervened. While some parts of the world has been faced with food shortages and hence, chronic metabolic diseases, the other part of the world have been emerged from over consumption of food. Both situations can result in shorter life expectancy and represent a major global health problem. Hunger, satiety and appetite sensation form a balance ensures the operation of feeding behavior between food intake and energy consumption. Satiety is one of the approaches that is effective in ensuring weight control and avoid eating more in the postprandial period. By manipulating the microstructure of food macro and micronutrient bioavailability may be increased or reduced. For the food industry appearance, texture, taste structural properties as well as the gastrointestinal tract behavior of the food after the consumption is becoming increasingly important. Also, this behavior has been the subject of several researches in recent years by the scientific community. Numerous studies have been published about changing the food matrix in order to increase expected impacts. In this study, yogurts were enriched with caseinomacropeptide (CMP), whey protein (WP), CMP and sodium alginate (SA), and WP + SA in order to produce goat yogurts having different food matrices. SDS Page profiles of the samples after in vitro digestion and viscosities of the stomach digesta at different share rates were determined. Energy values were 62.11kcal/100 g, 70.27 kcal/100 g, 70.61 kcal/100 g, 71.20 kcal/100 g and 71.67 kcal/100 g for control, CMP added WP added, WP + SA added, and CMP + SA added yogurts respectively. The results of viscosity analysis showed that control yogurt had the lowest viscosity value and this was followed by CMP added, WP added, CMP + SA added and WP + SA added yogurts, respectively. Protein contents of the stomach and duedonal digests of the samples after subjected to two different in vitro digestion methods were changed between 5.34-5.91 mg protein / g sample and 16.93-19.75 mg protein /g of sample, respectively. Viscosity measurements of the stomach digests showed that CMP + SA added yogurt displayed the highest viscosity value in both in vitro digestion methods. There were differences between the protein profiles of the stomach and duedonal digests obtained by two different in vitro digestion methods (p<0.05).Keywords: caseinomacropeptide, protein profile, whey protein, yogurt
Procedia PDF Downloads 48711635 Addressing Security and Privacy Issues in a Smart Environment by Using Block-Chain as a Preemptive Technique
Authors: Shahbaz Pervez, Aljawharah Almuhana, Zahida Parveen, Samina Naz, Hira Tariq, Seyed Hosseini, Muhammad Awais Azam
Abstract:
With the latest development in the field of cutting-edge technologies, there is a rapid increase in the use of technology-oriented gadgets. In a recent scenario of the tech era, there is increasing demand to fulfill our day-to-day routine tasks with the help of technological gadgets. We are living in an era of technology where trends have been changing, and a race to introduce a new technology gadget has already begun. Smart cities are getting more popular with every passing day; city councils and governments are under enormous pressure to provide the latest services for their citizens and equip them with all the latest facilities. Thus, ultimately, they are going more into smart cities infrastructure building, providing services to their inhabitants with a single click from their smart devices. This trend is very exciting, but on the other hand, if some incident of security breach happens due to any weaker link, the results would be catastrophic. This paper addresses potential security and privacy breaches with a possible solution by using Blockchain technology in IoT enabled environment.Keywords: blockchain, cybersecurity, DDOS, intrusion detection, IoT, RFID, smart devices security, smart services
Procedia PDF Downloads 11611634 Evidence of Total Mercury Biomagnification in Tropical Estuary Lagoon in East Coast of Peninsula, Malaysia
Authors: Quang Dung Le, Kentaro Tanaka, Viet Dung Luu, Kotaro Shirai
Abstract:
Mercury pollutant is great concerns in globe due to its toxicity and biomagnification through the food web. Recently increasing approaches of stable isotope analyses which have applied in food-web structure are enabled to elucidate more insight trophic transfer of pollutants in ecosystems. In this study, the integration of total mercury (Hg) and stable isotopic analyses (δ13C and δ15N) were measured from basal food sources to invertebrates and fishes in order to determine Hg transfer in Setiu lagoon food webs. The average Hg concentrations showed the increasing trend from low to high trophic levels. The result also indicated that potential Hg exposure from inside mangrove could be higher than that from the tidal flat of mangrove creek. Fish Hg concentrations are highly variable, and many factors driving this variability need further examinations. A positive correlation found between Hg concentrations and δ15N values (the trophic magnification factor was 3.02), suggesting Hg biomagnification through the lagoon food web. Almost all Hg concentrations in fishes and mud crabs did not present a risk for human consumption, however, the Hg concentrations of Caranx ignobilis exceed the permitted level could raise a concern of the potential risk for the marine system. Further investigations should be done to elucidate whether trophic relay relates to high Hg concentrations of some fish species in coastal systems.Keywords: mercury, transfer, stable isotopes, health risk, mangrove, food web
Procedia PDF Downloads 30711633 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions
Authors: Behnam Zahednejad, Saeed Kosari
Abstract:
Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif
Procedia PDF Downloads 10011632 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)
Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram
Abstract:
The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)
Procedia PDF Downloads 9211631 Enhancing Technical Trading Strategy on the Bitcoin Market using News Headlines and Language Models
Authors: Mohammad Hosein Panahi, Naser Yazdani
Abstract:
we present a technical trading strategy that leverages the FinBERT language model and financial news analysis with a focus on news related to a subset of Nasdaq 100 stocks. Our approach surpasses the baseline Range Break-out strategy in the Bitcoin market, yielding a remarkable 24.8% increase in the win ratio for all Friday trades and an impressive 48.9% surge in short trades specifically on Fridays. Moreover, we conduct rigorous hypothesis testing to establish the statistical significance of these improvements. Our findings underscore considerable potential of our NLP-driven approach in enhancing trading strategies and achieving greater profitability within financial markets.Keywords: quantitative finance, technical analysis, bitcoin market, NLP, language models, FinBERT, technical trading
Procedia PDF Downloads 7311630 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria
Authors: Theresa Chinyere ONU
Abstract:
This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.Keywords: education, social terrorism, women, Nigeria
Procedia PDF Downloads 58211629 An Example of University Research Driving University-Industry Collaboration
Authors: Stephen E. Cross, Donald P. McConnell
Abstract:
In the past decade, market pressures and decreasing U.S. federal budgets for science and technology have led to a fundamental change in expectations for corporate investments in innovation. The trend to significant, sustained corporate research collaboration with major academic centres has called for rethinking the balance between academic and corporate roles in these relationships. The Georgia Institute of Technology has developed a system-focused strategy for transformational research focused on grand challenges in areas of importance both to faculty and to industry collaborators. A model of an innovation ecosystem is used to guide both research and university-industry collaboration. The paper describes the strategy, the model, and the results to date including the benefits both to university research and industry collaboration. Key lessons learned are presented based on this experience.Keywords: ecosystem, industry collaboration, innovation, research strategy
Procedia PDF Downloads 41911628 Security Practices of the European Union on Migration: An Analysis of the Frontex Within the Framework of Biopolitics
Authors: Gizem Ertürk, Nursena Dinç
Abstract:
The Aegean area has always been an important transit point for migration; however, the establishment of the European Union gave further impetus to the migration phenomenon and increased the significance of the area within this context. The migration waves have been more visible in the area in recent decades, and particularly after the “2015 Migration Crisis,” this issue has been subject to further securitization in the EU. In this conjuncture, the Frontex, which is an agency set up by the EU in 2005 for the purpose of managing and coordinating the border control efforts, has become more functional in the relevant area, but at the same time, have some questionable actions within the context of human rights. This paper problematizes the rationality behind the existence and practices of such a structure and attempts to make a political and legal analysis of the security practices of the European Union against migration within a framework based on the biopolitics approaches of Michel Foucault and Giorgio Agamben. The dataset of this paper, which focuses on the agency in question by taking it as a case, is formed by making use of the existing literature on the EU’s security policies, the relevant official texts of the Union and Frontex reports on migration practices in and around the Aegean Sea.Keywords: migration, biopolitics, Frontex, security, European union, securitization
Procedia PDF Downloads 13711627 Vibration Absorption Strategy for Multi-Frequency Excitation
Authors: Der Chyan Lin
Abstract:
Since the early introduction by Ormondroyd and Den Hartog, vibration absorber (VA) has become one of the most commonly used vibration mitigation strategies. The strategy is most effective for a primary plant subjected to a single frequency excitation. For continuous systems, notable advances in vibration absorption in the multi-frequency system were made. However, the efficacy of the VA strategy for systems under multi-frequency excitation is not well understood. For example, for an N degrees-of-freedom (DOF) primary-absorber system, there are N 'peak' frequencies of large amplitude vibration per every new excitation frequency. In general, the usable range for vibration absorption can be greatly reduced as a result. Frequency modulated harmonic excitation is a commonly seen multi-frequency excitation example: f(t) = cos(ϖ(t)t) where ϖ(t)=ω(1+α sin(δt)). It is known that f(t) has a series expansion given by the Bessel function of the first kind, which implies an infinity of forcing frequencies in the frequency modulated harmonic excitation. For an SDOF system of natural frequency ωₙ subjected to f(t), it can be shown that amplitude peaks emerge at ω₍ₚ,ₖ₎=(ωₙ ± 2kδ)/(α ∓ 1),k∈Z; i.e., there is an infinity of resonant frequencies ω₍ₚ,ₖ₎, k∈Z, making the use of VA strategy ineffective. In this work, we propose an absorber frequency placement strategy for SDOF vibration systems subjected to frequency-modulated excitation. An SDOF linear mass-spring system coupled to lateral absorber systems is used to demonstrate the ideas. Although the mechanical components are linear, the governing equations for the coupled system are nonlinear. We show using N identical absorbers, for N ≫ 1, that (a) there is a cluster of N+1 natural frequencies around every natural absorber frequency, and (b) the absorber frequencies can be moved away from the plant's resonance frequency (ω₀) as N increases. Moreover, we also show the bandwidth of the VA performance increases with N. The derivations of the clustering and bandwidth widening effect will be given, and the superiority of the proposed strategy will be demonstrated via numerical experiments.Keywords: Bessel function, bandwidth, frequency modulated excitation, vibration absorber
Procedia PDF Downloads 15111626 Evaluation of Nutritional Potential of Five Unexplored Wild Edible Food Plants from Eastern Himalayan Biodiversity Hotspot Region (India)
Authors: Pallabi Kalita, Hui Tag, Loxmi Jamoh, H. N. Sarma, A. K. Das
Abstract:
Wild edible food plants contain a number of organic phytochemical that have been linked to the promotion of good health. These plants used by the local people of Arunachal Pradesh (Northeast India) are found to have high nutritional potential to maintain general balance diet. A study was conducted to evaluate the nutritional potential of five commonly found, unexplored wild food plants namely, Piper pedicellatum C. DC (leaves), Gonostegia hirta (Blume ex Hassk.) Miq. (leaves), Mussaenda roxburghii Hook. f. (leaves), Solanum spirale Roxb. (leaves and fruits) and Cyathea spinulosa Wall. ex Hook. (pith portion and tender rachis) from East Siang District of Arunachal Pradesh Northeast (India) for ascertaining their suitability for utilization as supplementary food. Results of study revealed that P. pedicellatum, C. spinulosa, and S. spirale (leaves) are the most promising species which have high nutritional content out of the five wild food plants investigated which is required for the normal growth and development of human.Keywords: wild edible plants, gross energy, Gonostegia hirta, Cyathea spinulosa
Procedia PDF Downloads 329