Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6110

Search results for: food security and nutrition

4730 Counter-Terrorism and Civil Society in Nigeria

Authors: Emeka Thaddues Njoku

Abstract:

Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.

Keywords: counter-terrorism, civil society organizations, freedom, terrorism

Procedia PDF Downloads 361
4729 Frequency of Tube Feeding in Aboriginal and Non-aboriginal Head and Neck Cancer Patients and the Impact on Relapse and Survival Outcomes

Authors: Kim Kennedy, Daren Gibson, Stephanie Flukes, Chandra Diwakarla, Lisa Spalding, Leanne Pilkington, Andrew Redfern

Abstract:

Introduction: Head and neck cancer and treatments are known for their profound effect on nutrition and tube feeding is a common requirement to maintain nutrition. Aim: We aimed to evaluate the frequency of tube feeding in Aboriginal and non-Aboriginal patients, and to examine the relapse and survival outcomes in patients who require enteral tube feeding. Methods: We performed a retrospective cohort analysis of 320 head and neck cancer patients from a single centre in Western Australia, identifying 80 Aboriginal patients and 240 non-Aboriginal patients matched on a 1:3 ratio by site, histology, rurality, and age. Data collected included patient demographics, tumour features, treatment details, and cancer and survival outcomes. Results: Aboriginal and non-Aboriginal patients required feeding tubes at similar rates (42.5% vs 46.2% respectively), however Aboriginal patients were far more likely to fail to return to oral nutrition, with 26.3% requiring long-term tube feeding versus only 15% of non-Aboriginal patients. In the overall study population, 27.5% required short-term tube feeding, 17.8% required long-term enteral tube nutrition, and 45.3% of patients did not have a feeding tube at any point. Relapse was more common in patients who required tube feeding, with relapses in 42.1% of the patients requiring long-term tube feeding, 31.8% in those requiring a short-term tube, versus 18.9% in the ‘no tube’ group. Survival outcomes for patients who required a long-term tube were also significantly poorer when compared to patients who only required a short-term tube, or not at all. Long-term tube-requiring patients were half as likely to survive (29.8%) compared to patients requiring a short-term tube (62.5%) or no tube at all (63.5%). Patients requiring a long-term tube were twice as likely to die with active disease (59.6%) as patients with no tube (28%), or a short term tube (33%). This may suggest an increased relapse risk in patients who require long-term feeding, due to consequences of malnutrition on cancer and treatment outcomes, although may simply reflect that patients with recurrent disease were more likely to have longer-term swallowing dysfunction due to recurrent disease and salvage treatments. Interestingly long-term tube patients were also more likely to die with no active disease (10.5%) (compared with short-term tube requiring patients (4.6%), or patients with no tube (8%)), which is likely reflective of the increased mortality associated with long-term aspiration and malnutrition issues. Conclusions: Requirement for tube feeding was associated with a higher rate of cancer relapse, and in particular, long-term tube feeding was associated with a higher likelihood of dying from head and neck cancer, but also a higher risk of dying from other causes without cancer relapse. This data reflects the complex effect of head and neck cancer and its treatments on swallowing and nutrition, and ultimately, the effects of malnutrition, swallowing dysfunction, and aspiration on overall cancer and survival outcomes. Tube feeding was seen at similar rates in Aboriginal and non-Aboriginal patient, however failure to return to oral intake with a requirement for a long-term feeding tube was seen far more commonly in the Aboriginal population.

Keywords: head and neck cancer, enteral tube feeding, malnutrition, survival, relapse, aboriginal patients

Procedia PDF Downloads 82
4728 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 259
4727 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code

Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue

Abstract:

Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.

Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology

Procedia PDF Downloads 273
4726 Social Marketing – An Integrated and Comprehensive Nutrition Communication Strategy to Improve the Iron Nutriture among Preschool Children

Authors: Manjula Kola, K. Chandralekha

Abstract:

Anaemia is one of the world’s most widespread health problems. Prevalence of anemia in south Asia is among the highest in the world. Iron deficiency anemia accounts for almost 85 percent of all types of anemia in India and affects more than half of the total population. Women of childbearing age particularly pregnant women, infants, preschool children and adolescents are at greatest risk of developing iron deficiency anemia. In India, 74 percent children between 6-35 months of age are anemic. Children between 1-6 years in major cities are found with a high prevalence rate of 64.8 percent. Iron deficiency anemia is not only a public health problem, but also a development problem. Its prevention and reduction must be viewed as investment in human capital that will enhance development and reduce poverty. Ending this hidden hunger in the form of iron deficiency is the most important achievable international health goal. Eliminating the underlying problem is essential to the sustained elimination of the iron deficiency anemia. The intervention programmes toward the sustained elimination need to be broadly based so that interventions become accepted community practices. Hence, intervention strategies need to go well beyond traditional health and nutrition systems and based upon empowering people and communities so that they will be capable of arranging for and sustaining an adequate intake of foods with respect to iron, independent of external support. Such strategies must necessarily be multisectoral and integrate interventions with social communications, evaluation and surveillance. The main objective of the study was to design a community based Nutrition intervention using theoretical framework of social marketing to sustain improvement of iron nutriture among preschool children. In order to carryout the study eight rural communities In Chittoor district of Andhra Pradesh, India were selected. A formative research was carryout for situational analysis and baseline data was generated with regard to demographic and socioeconomic status, dietary intakes, Knowledge, Attitude and Practices of the mothers of preschool children, clinical and hemoglobin status of the target group. Based on the formative research results, the research area was divides into four groups as experimental area I,II,III and control area. A community based, integrated and comprehensive social marketing intervention was designed based on various theories and models of nutrition education/ communication. In Experimental area I, Nutrition intervention using social marketing and a weekly iron folic acid supplementation was given to improve iron nutriture of preschool children. In experimental area II, Social marketing alone was implemented and in experimental area III Iron supplementation alone was given. No intervention was given in control area. The Impact evaluation revealed that among different interventions tested, the integrated social marketing intervention resulted best outcomes. The overall observations of the study state that social marketing, an integrated and functional strategy for nutrition communication to prevent and control iron deficiency. Various theoretical frame works / models for nutrition communication facilitate to design culturally appropriate interventions thus achieved improvements in the knowledge, attitude and practices there by resulting successful impact on nutritional status of the target groups.

Keywords: anemia, iron deficiency, social marketing, theoretical framework

Procedia PDF Downloads 385
4725 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium

Authors: Louise Reyntjens

Abstract:

In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.

Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law

Procedia PDF Downloads 104
4724 An Investigation of the Compliance of Kermanian College Students' Diet with Who/Fao Nutrition Targets

Authors: Farideh Doostan, Sahar Mohseni Taklloo, Mohammad Nosrati

Abstract:

Chronic diseases are non-communicable and largely preventable by lifestyle changes including healthy diet consumption. They are the most common cause of death in the world and projected to increase by 15% globally between 2010 and 2020.The hazardous effects of behavioral and dietary risk factors on chronic disease have been established in prospective cohort studies and randomized trials. Because of some changes occur in college students’ lifestyle, assessment of dietary risk factors is important in these populations. Objective: This research was the first study that conducted to evaluate dietary intakes of Kermanian college students with WHO/FAO nutritional objectives. Material and Methods: In this descriptive cross-sectional study, 229 healthy college students of health faculty in Kerman University of Medical Sciences that do not intake any medical drugs were recruited using multistage sampling in 2013.Usual dietary intake was collected using a valid Food Frequency Questionnaire (FFQ) and diet quality was calculated based on WHO nutrient goals. To analysis of data between two groups, independent sample t. test and man whitney were applied. Results: Two hundred and twenty-nine college students; 151 females (65.9%) and 78 males (34.1%), the mean age of 21.9 years were studied. The mean of the Body Mass Index (Kg/m2) and Waist Circumference (cm) in males were 22.34 ±3.52 and 80.76±11.16 and in females were 21.19±2.62 and 73.67±7.65 respectively. Mean of daily cholesterol intake in males was significantly more than females (305±101 VS 268±98; P=0.008) and more than WHO/FAO recommendation (less than 300 mg/day). The mean of daily sodium intake in men and women were 10.4±1 and 10.9±5.3 respectively. These amounts were more than WHO/FAO recommendation (less than 2g/day). In addition, women were consumed fruit and vegetables more than men (839±336 VS 638±281; p ‹ 0.001) and these amounts were more than WHO/FAO recommendation (more than 400g/day) in both groups. Other intake indices were in the range of WHO/FAO recommendations, So that Percent of calories intake from total fat, saturated fatty acids, polyunsaturated fatty acids and added sugar were in compliance with WHO/FAO recommendations. Conclusion: Cholesterol intake in men and sodium intake in all participants were more than WHO/FAO recommendation. These dietary components are the most important causes of cardiovascular disease (one of the main causes of death in our population). These results indicated that proper nutritional education and interventions are needed in this population.

Keywords: college students, food intake, WHO /FAO nutrient intake goals, Kerman

Procedia PDF Downloads 380
4723 An Efficient Encryption Scheme Using DWT and Arnold Transforms

Authors: Ali Abdrhman M. Ukasha

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption

Procedia PDF Downloads 457
4722 Reducing Stunting, Low Birth Weight and Underweight in Anuradhapura District in Sri Lanka, by Identifying and Addressing the Underlying Determinants of Under-Nutrition and Strengthening Families and Communities to Address Them

Authors: Saman Kumara, Duminda Guruge, Krishani Jayasinghe

Abstract:

Introduction: Nutrition strongly influences good health and development in early life. This study, based on a health promotion approach, used a community-based intervention to improve child nutrition. The approach provides the community with control of interventions, thereby building its capacity and empowering individuals and communities. The aim of this research was to reduce stunting, low birth weight and underweight in communities from Anuradhapura District in Sri Lanka, by identifying and addressing the underlying determinants of under-nutrition and strengthening families and communities to address them. Methods: A health promotion intervention was designed and implemented-based on a logical framework developed in collaboration with members of targeted community. Community members’ implements action, so they fully own the process. Members of the community identify and address the most crucial determinants of health including child health and development and monitor the initial results of their action and modify action to optimize outcomes as well as future goals. Group Discussion, group activities, awareness programs, cluster meetings, community tools and sharing success stories were major activities to address determinants. Continuous data collection was planned at different levels. Priority was given to strengthening the ability of families and groups or communities to collect meaningful data and analyze these themselves. Results: Enthusiasm and interest of the mother, happiness of the child/ family, dietary habits, money management, tobacco and alcohol use of fathers, media influences, illnesses in the child or others, hygiene and sanitary practices, community sensitiveness and domestic violence were the major perceived determinants elicited from the study. There were around 1000 well-functioning mothers groups in this district. ‘Happiness calendar’, ‘brain calendar’, ‘money tool’ and ‘stimulation books’ were created by the community members, to address determinants and measure the process. Evaluation of the process has shown positive early results, such as improvement of feeding habits among mothers, innovative ways of providing early stimulation and responsive care, greater involvement of fathers in childcare and responsive feeding. There is a positive movement of communities around child well-being through interactive play areas. Family functioning and community functioning improved. Use of alcohol and tobacco declined. Community money management improved. Underweight was reduced by 40%. Stunting and low birth weight among under-fives also declined within one year. Conclusion: The health promotion intervention was effective in changing the determinants of under-nutrition in early childhood. Addressing the underlying determinants of under-nutrition in early childhood can be recommended for similar contexts.

Keywords: birth-weight, community, determinants, stunting, underweight

Procedia PDF Downloads 130
4721 Assessment Of Factors Affecting Sustainability of Rice (Oryza sativa) Processing and Marketing in Ogun State, Nigeria

Authors: A. M. Omoare, O. O. Sofowora, W. O. Oyediran

Abstract:

The study was carried out to assess the factors affecting the sustainability of rice processing and marketing in Ogun State, Nigeria. Multi-stage sampling technique was used to select one hundred and twenty (120) respondents for the study. Descriptive statistics was used to describe the objectives while hypotheses were analyzed with Pearson Product Moment Correlation. The result showed that most (85%) of the respondents was less than 50 years old and had been in rice business for more than 6 years. The majority (66.67%) of the respondents got their capitals from cooperative societies. All (100%) the respondents used rice as household food security and source of income. However, efficient rice processing and marketing were affected by inadequate manpower capacity development and inputs. There was a positive and significant relationship between socio-economic characteristics and processing techniques (p < 0.05). It is hereby recommended that extension service providers should introduce improved rice processing systems to the rice millers traders in the study area.

Keywords: sustainability, rice processing, marketing, constraints, millers traders

Procedia PDF Downloads 372
4720 Chocomerr (Merr Leaves Chocolate) Alternative Food in Increasing Breastmilk Quantity

Authors: Rara Wulan Anggareni, Narita Putri, Riski Septianing Astuti

Abstract:

Breastfeeding is a key to prevent mortality and morbidity in children. It is also the second highest risk responsible for Disability Adjusted Life Years (DALYs) among children below five years old. UNICEF estimates that during 1995 – 2003, there are only about 38% infants in developing countries who get to be exclusively breastfed during the first six months of their lives. According to Demography and Health Survey in Indonesia 2007, breastfeed practice rate still considered as low which is about 41%. One of the factors causing the low breastfeed practice rate in Indonesia is the anxiety and postpartum depression, and also the weanling dilemma in which mother feels that her breastmilk cannot suffice infant needs. Those factors finally resulting into low or even stopped production of breastmilk. Breastmilk production can be enhanced by consuming food containing phytosterol and lactogoga effect. Food with the highest phytosterol level is Sauropus androgynus (L.) Merr leaf (merr leaf). In this study, we made alternative food which named Chocomerr for breastfeeding mothers. Chocomerr consists of merr leaves which have lactogoga effect and chocolate for relaxation. Based on organoleptic tests conducted towards 2 age groups, which are 18 – 21 and 25 – 40 years old, this product gets good acceptance in taste, texture, and colour categories. Chocomerr can be used as an alternative way for increasing breastmilk production to aim for the decreasing number of DALYs among children aged under 5 years old.

Keywords: breastfeeding, increasing, chocolate, merr leaves

Procedia PDF Downloads 410
4719 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems

Authors: Borhan Marzougui

Abstract:

Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.

Keywords: IoT, DDoS, attacks, botnet, security, agents

Procedia PDF Downloads 121
4718 Farmers’ Awareness of Pillars of Planting for Food and Jobs Programme in Ghana

Authors: Franklin Nantui Mabe, Gideon Danso-Abbeam, Dennis Sedem Ehiakpor

Abstract:

In order for the government of Ghana through the Ministry of Food and Agriculture to motivate farmers to adopt improved agricultural technologies, expand their farms and encourage youth to enter into agricultural production so as to increase crop productivity, “Planting for Food and Jobs” (PFJ) programme was launched in April 2017. The PFJ programme covers five pillars, namely, provision of subsidized and improved seeds; subsidized fertilizer; agricultural extension services; establishment of markets; and e-agriculture. This study assesses the awareness of farmers about the packages of these pillars using the Likert scale, paired t-test and Spearman’s rank correlation coefficient. The study adopted a mixed research design. A semi-structured questionnaire and checklist were used to collect data. The data collection was done using interviews and focus group discussions. The PFJ pillar farmers are much aware is a subsidy on fertilizer followed by a subsidy on improved seeds. Electronic agriculture is a pillar with the lowest level of awareness. There is a strong positive correlation between awareness of fertilizer and seed packages suggestion their complementarities. Lack of information/awareness of the packages of the programme can affect farmers’ participation in all the pillars. Farmers, in particular, should be educated for them to know what they are entitled to in each of the pillars. The programme implementation plan should also be made available to farmers as a guide.

Keywords: awareness, planting for food and jobs, programme, farmers, likert scale

Procedia PDF Downloads 210
4717 How Hormesis Impacts Practice of Ecological Risk Assessment and Food Safety Assessment

Authors: Xiaoxian Zhang

Abstract:

Guidelines of ecological risk assessment (ERA) and food safety assessment (FSA) used nowadays, based on an S-shaped threshold dose-response curve (SDR), fail to consider hormesis, a reproducible biphasic dose-response model represented as a J-shaped or an inverted U-shaped curve, that occurs in the real-life environment across multitudinous compounds on cells, organisms, populations, and even the ecosystem. Specifically, in SDR-based ERA and FSA practice, predicted no effect concentration (PNEC) is calculated separately for individual substances from no observed effect concentration (NOEC, usually equivalent to 10% effect concentration (EC10) of a contaminant or food condiment) over an assessment coefficient that is bigger than 1. Experienced researchers doubted that hormesis in the real-life environment might lead to a waste of limited human and material resources in ERA and FSA practice, but related data are scarce. In this study, hormetic effects on bioluminescence of Aliivibrio fischeri (A. f) induced by sulfachloropyridazine (SCP) under 40 conditions to simulate the real-life scenario were investigated, and hormetic effects on growth of human MCF-7 cells caused by brown sugar and mascavado sugar were found likewise. After comparison of related parameters, it has for the first time been proved that there is a 50% probability for safe concentration (SC) of contaminants and food condiments to fall within the hormetic-stimulatory range (HSR) or left to HSR, revealing the unreliability of traditional parameters in standardized (eco)toxicological studies, and supporting qualitatively and quantitatively the over-strictness of ERA and FSA resulted from misuse of SDR. This study provides a novel perspective for ERA and FSA practitioners that hormesis should dominate and conditions where SDR works should only be singled out on a specific basis.

Keywords: dose-response relationship, food safety, ecological risk assessment, hormesis

Procedia PDF Downloads 115
4716 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security

Authors: Magdalena Musiał-Karg

Abstract:

The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.

Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)

Procedia PDF Downloads 212
4715 The Role of Urban Agriculture in Enhancing Food Supply and Export Potential: A Case Study of Neishabour, Iran

Authors: Mohammadreza Mojtahedi

Abstract:

Rapid urbanization presents multifaceted challenges, including environmental degradation and public health concerns. As the inevitability of urban sprawl continues, it becomes essential to devise strategies to alleviate its pressures on natural ecosystems and elevate socio-economic benchmarks within cities. This research investigates urban agriculture's economic contributions, emphasizing its pivotal role in food provisioning and export potential. Adopting a descriptive-analytical approach, field survey data was primarily collected via questionnaires. The tool's validity was affirmed by expert opinions, and its reliability secured by achieving a Cronbach's alpha score over 0.70 from 30 preliminary questionnaires. The research encompasses Neishabour's populace of 264,375, extracting a sample size of 384 via Cochran's formula. Findings reveal the significance of urban agriculture in food supply and its potential for exports, underlined by a p-value < 0.05. Neishabour's urban farming can augment the export of organic commodities, fruits, vegetables, ornamental plants, and foster product branding. Moreover, it supports the provision of fresh produce, bolstering dietary quality. Urban agriculture further impacts urban development metrics—enhancing environmental quality, job opportunities, income levels, and aesthetics, while promoting rainwater utilization. Popular cultivations include peaches, Damask roses, and poultry, tailored to available spaces. Structural equation modeling indicates urban agriculture's overarching influence, accounting for a 56% variance, predominantly in food sufficiency and export proficiency.

Keywords: urban agriculture, food supply, export potential, urban development, environmental health, structural equation modeling

Procedia PDF Downloads 38
4714 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm

Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima

Abstract:

In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.

Keywords: cloud space, AES, FTP, NetBeans IDE

Procedia PDF Downloads 184
4713 Literature Review: Microalgae as Functional Foods with Solvent Free Extraction

Authors: Angela Justina Kumalaputri

Abstract:

Indonesia, as a maritime country, has abundant marine living resources yet has not been optimally utilized. So far, we only focusing on fisheries. In the other hand, Indonesia, as the country with the fourth longest coastline, is a very good cultivation place for microalgae. Microalgae can be diversified to many important products, such as food, fuel, pharmaceutical products, functional food, and cosmetics.This research is focusing on the literature study about types of microalgae as sources for functional foods (such as antioxidants), including the contents and the separation methods. The research methods which we use are: (1) Literature study about various microalgaes (2) Literature study about extractions using supercritical fluid of CO₂, which are free from toxic organic solvents, environmentally friendly, and safe for food products. Supercritical fluid extraction using CO₂ (low critical points: temperature at 31.1 oC and pressure at 72.9 bars) could be done at a low temperature which are suitable for temperature labile compounds, low energy, and faster extraction time compared with conventional method of extraction.

Keywords: antioxidants, supercritical fluid extraction, solvent-free extraction, microalgae

Procedia PDF Downloads 53
4712 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method

Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah

Abstract:

Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.

Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption

Procedia PDF Downloads 497
4711 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity

Authors: Jean Rosemond Dora, Karol Nemoga

Abstract:

In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.

Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model

Procedia PDF Downloads 149
4710 Analysis of the Content of Sugars, Vitamin C, Preservatives, Synthetic Dyes, Sweeteners, Sodium and Potassium and Microbiological Purity in Selected Products Made From Fruit and Vegetables in Small Regional Factories and in Large Food Corporations

Authors: Katarzyna Miśkiewicz, Magdalena Lasoń-Rydel, Małgorzata Krępska, Katarzyna Sieczyńska, Iwona Masłowska-Lipowicz, Katarzyna Ławińska

Abstract:

The aim of the study was to analyse a selection of 12 pasteurised products made from fruit and vegetables, such as fruit juices, fruit drinks, jams, marmalades and jam produced by small regional factories as well as large food corporations. The research was carried out as part of the project "Innovative system of healthy and regional food distribution", funded by the Ministry of Education and Science (Poland), which aims to create an economically and organisationally strong agri-food industry in Poland through effective cooperation between scientific and socio-economic actors. The main activities of the project include support for the creation of new distribution channels for regional food products and their easy access to a wide group of potential customers while maintaining the highest quality standards. One of the key areas of the project is food quality analyses conducted to indicate the competitive advantage of regional products. Presented here are studies on the content of sugars, vitamin C, preservatives, synthetic colours, sweeteners, sodium and potassium, as well as studies on the microbiological purity of selected products made from fruit and vegetables. The composition of products made from fruit and vegetables varies greatly and depends on both the type of raw material and the way it is processed. Of the samples tested, fruit drinks contained the least amount of sugars, and jam and marmalade made by large producers and bought in large chain stores contained the most. However, the low sugar content of some fruit drinks is due to the presence of the sweetener sucralose in their composition. The vitamin C content of the samples varied, being higher in products where it was added during production. All products made in small local factories were free of food additives such as preservatives, sweeteners and synthetic colours, indicating their superiority over products made by large producers. Products made in small local factories were characterised by a relatively high potassium content. The microbiological purity of commercial products was confirmed - no Salmonella spp. were detected, and the number of mesophilic bacteria, moulds, yeasts, and β-glucuronidase-positive E. coli was below the limit of quantification.

Keywords: fruit and vegetable products, sugars, food additives, HPLC, ICP-OES

Procedia PDF Downloads 70
4709 Variation in the Traditional Knowledge of Curcuma longa L. in North-Eastern Algeria

Authors: A. Bouzabata, A. Boukhari

Abstract:

Curcuma longa L. (Zingiberaceae), commonly known as turmeric, has a long history of traditional uses for culinary purposes as a spice and a food colorant. The present study aimed to document the ethnobotanical knowledge about Curcuma longa and to assess the variation in the herbalists’ experience in Northeastern Algeria. Data were collected by semi-structured questionnaires and direct interviews with 30 herbalists. Ethnobotanical indices, including the fidelity level (FL%), the relative frequency citation (RFC) and use value (UV) were determined by quantitative methods. Diversity in the knowledge was analyzed using univariate, non-parametric and multivariate statistical methods. Three main categories of uses were recorded for C. longa: for food, for medicine and for cosmetic purposes. As a medicine, turmeric was used for the treatment of gastrointestinal, dermatological and hepatic diseases. Medicinal and food uses were correlated with both forms of use (rhizome and powder). The age group did not influence the use. Multivariate analyses showed a significant variation in traditional knowledge, associated with the use value, origin, quality and efficacy of the drug. These findings suggested that the geographical origin of C. longa affected the use in Algeria.

Keywords: curcuma, indices, knowledge, variation

Procedia PDF Downloads 525
4708 Prevalence of Fast-Food Consumption on Overweight or Obesity on Employees (Age Between 25-45 Years) in Private Sector; A Cross-Sectional Study in Colombo, Sri Lanka

Authors: Arosha Rashmi De Silva, Ananda Chandrasekara

Abstract:

This study seeks to comprehensively examine the influence of fast-food consumption and physical activity levels on the body weight of young employees within the private sector of Sri Lanka. The escalating popularity of fast food has raised concerns about its nutritional content and associated health ramifications. To investigate this phenomenon, a cohort of 100 individuals aged between 25 and 45, employed in Sri Lanka's private sector, participated in this research. These participants provided socio-demographic data through a standardized questionnaire, enabling the characterization of their backgrounds. Additionally, participants disclosed their frequency of fast-food consumption and engagement in physical activities, utilizing validated assessment tools. The collected data was meticulously compiled into an Excel spreadsheet and subjected to rigorous statistical analysis. Descriptive statistics, such as percentages and proportions, were employed to delineate the body weight status of the participants. Employing chi-square tests, our study identified significant associations between fast-food consumption, levels of physical activity, and body weight categories. Furthermore, through binary logistic regression analysis, potential risk factors contributing to overweight and obesity within the young employee cohort were elucidated. Our findings revealed a disconcerting trend, with 6% of participants classified as underweight, 32% within the normal weight range, and a substantial 62% categorized as overweight or obese. These outcomes underscore the alarming prevalence of overweight and obesity among young private-sector employees, particularly within the bustling urban landscape of Colombo, Sri Lanka. The data strongly imply a robust correlation between fast-food consumption, sedentary behaviors, and higher body weight categories, reflective of the evolving lifestyle patterns associated with the nation's economic growth. This study emphasizes the urgent need for effective interventions to counter the detrimental effects of fast-food consumption. The implementation of awareness campaigns elucidating the adverse health consequences of fast food, coupled with comprehensive nutritional education, can empower individuals to make informed dietary choices. Workplace interventions, including the provision of healthier meal alternatives and the facilitation of physical activity opportunities, are essential in fostering a healthier workforce and mitigating the escalating burden of overweight and obesity in Sri Lanka

Keywords: fast food consumption, obese, overweight, physical activity level

Procedia PDF Downloads 22
4707 Understanding the Basics of Information Security: An Act of Defense

Authors: Sharon Q. Yang, Robert J. Congleton

Abstract:

Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.

Keywords: cybercrimes, hacking technologies, higher education, information security, libraries

Procedia PDF Downloads 110
4706 Informal Governance as Response to Institutional Paralysis

Authors: Stefanie Kasparek

Abstract:

The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.

Keywords: agenda-setting, decision-making, international governance, UNSC

Procedia PDF Downloads 170
4705 Potential of Macroalgae Ulva lactuca for Municipal Wastewater Treatment and Fruitfly Food

Authors: Shuang Qiu, Lingfeng Wang, Zhipeng Chen, Shijian Ge

Abstract:

Macroalgae are considered a promising approach for wastewater treatment as well as an alternative animal feed in addition to a biofuel feedstock. Their large size and/or tendency to grow as dense floating mats or substrate-attached turfs lead to lower separation and drying costs than microalgae. In this study, the macroalgae species Ulva lactuca (U. lactuca) were used to investigate their capacity for treating municipal wastewaters, and the feasibility of using the harvested biomass as an alternative food source for the fruitfly Drosophila melanogaster, an animal model for biological research. Results suggested that U. lactuca could successfully grow on three types of wastewaters studied with biomass productivities of 8.12-64.3 g DW (dry weight)/(m²∙d). The secondary wastewater (SW) was demonstrated as the most effective wastewater medium for U. lactuca growth. However, both high nitrogen (92.5-98.9%) and phosphorus (64.5-88.6%) removal efficiencies were observed in all wastewaters, particularly in primary wastewater (PW) and SW, however, in central wastewater (CW), the highest removal rates were obtained (N 24.7 ± 0.97 and P 0.69 ± 0.01 mg/(g DW·d)). Additionally, the inclusion of 20% washed U. lactuca with 80% standard fruitfly food (w/w) resulted in a longer lifespan and more stable body weights in flies. On the other hand, similar results were not obtained for the food treatment with the addition of 20 % unwashed U. lactuca. This study suggests a promising method for the macroalgae-based treatment of municipal wastewater and the biomass for animal feed.

Keywords: animal feed, flies, macroalgae, nutrient recovery, Ulva lactuca, wastewater

Procedia PDF Downloads 100
4704 Comparison of Methods for the Detection of Biofilm Formation in Yeast and Lactic Acid Bacteria Species Isolated from Dairy Products

Authors: Goksen Arik, Mihriban Korukluoglu

Abstract:

Lactic acid bacteria (LAB) and some yeast species are common microorganisms found in dairy products and most of them are responsible for the fermentation of foods. Such cultures are isolated and used as a starter culture in the food industry because of providing standardisation of the final product during the food processing. Choice of starter culture is the most important step for the production of fermented food. Isolated LAB and yeast cultures which have the ability to create a biofilm layer can be preferred as a starter in the food industry. The biofilm formation could be beneficial to extend the period of usage time of microorganisms as a starter. On the other hand, it is an undesirable property in pathogens, since biofilm structure allows a microorganism become more resistant to stress conditions such as antibiotic presence. It is thought that the resistance mechanism could be turned into an advantage by promoting the effective microorganisms which are used in the food industry as starter culture and also which have potential to stimulate the gastrointestinal system. Development of the biofilm layer is observed in some LAB and yeast strains. The resistance could make LAB and yeast strains dominant microflora in the human gastrointestinal system; thus, competition against pathogen microorganisms can be provided more easily. Based on this circumstance, in the study, 10 LAB and 10 yeast strains were isolated from various dairy products, such as cheese, yoghurt, kefir, and cream. Samples were obtained from farmer markets and bazaars in Bursa, Turkey. As a part of this research, all isolated strains were identified and their ability of biofilm formation was detected with two different methods and compared with each other. The first goal of this research was to determine whether isolates have the potential for biofilm production, and the second was to compare the validity of two different methods, which are known as “Tube method” and “96-well plate-based method”. This study may offer an insight into developing a point of view about biofilm formation and its beneficial properties in LAB and yeast cultures used as a starter in the food industry.

Keywords: biofilm, dairy products, lactic acid bacteria, yeast

Procedia PDF Downloads 238
4703 Firefighting Means in Food Industries

Authors: Racim Rifaat Ferdjani, Zineddine Chetoui

Abstract:

The goal of our work is to provide a tool that helps control and ensures a global view of the means of firefighting (MLCI) in a food production plant (for example Hamoud Boualem plant). We divided the site into 4 zones, then we identified the firefighting means (MLCI) present in each zone, taking into account their type, weight, location, and fire class as well as their compliance with respect to the regulations in force while assigning them an alphanumeric reference which makes it possible to deduce everything. Thus, the use of a tool in the form of an Excel table was made concrete, and an average compliance rate of 45% was therefore obtained.

Keywords: MLCI, firefighting means, Hamoud, Boualem

Procedia PDF Downloads 102
4702 Conservation Agriculture and Precision Water Management in Alkaline Soils under Rice-Wheat Cropping System: Effect on Wheat Productivity and Irrigation Water Use-a Case Study from India

Authors: S. K. Kakraliya, H. S. Jat, Manish Kakraliya, P. C. Sharma, M. L. Jat

Abstract:

The biggest challenge in agriculture is to produce more food for the continually increasing world population with in the limited land and water resources. Serious water deficits and reducing natural resources are some of the major threats to the agricultural sustainability in many regions of South Asia. Food and water security may be gained by bringing improvement in the crop water productivity and the amount produced per unit of water consumed. Improvement in the crop water productivity may be achieved by pursuing alternative modern agronomics approaches, which are more friendly and efficient in utilizing natural resources. Therefore, a research trial on conservation agriculture (CA) and precision water management (PWM) was conducted in 2018-19 at Karnal, India to evaluate the effect on crop productivity and irrigation in sodic soils under rice-wheat (RW) systems of Indo-Gangetic Plains (IGP). Eight scenarios were compared varied in the tillage, crop establishment, residue and irrigarion management i.e., {First four scenarios irrigated with flood irrigation method;Sc1-Conventional tillage (CT) without residue, Sc2-CT with residue, Sc3- Zero tillage (ZT) without residue, Sc4-ZT with residue}, and {last four scenarios irrigated with sub-surface drip irrigation method; Sc5-ZT without residue, Sc6- ZT with residue, Sc7-ZT inclusion legume without residue and Sc8- ZT inclusion legume with residue}. Results revealed that CA-flood irrigation (S3, Sc4) and CA-PWM system (Sc5, Sc6, Sc7 and Sc8) recorded about ~5% and ~15% higher wheat yield, respectively compared to Sc1. Similar, CA-PWM saved ~40% irrigation water compared to Sc1. Rice yield was not different under different scenarios in the first year (kharif 2019) but almost half irrigation water saved under CA-PWM system. Therefore, results of our study on modern agronomic practices including CA and precision water management (subsurface drip irrigation) for RW rotation would be addressed the existing and future challenges in the RW system.

Keywords: Sub-surface drip, Crop residue, Crop yield , Zero tillage

Procedia PDF Downloads 100
4701 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security

Authors: Temitope Francis Abiodun

Abstract:

The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.

Keywords: terrorism, non-violent state actors, private sector intelligence, security

Procedia PDF Downloads 120