Search results for: food and nutrition security
4926 Identity of Cultural Food: A Case Study of Traditional Mon Cuisine in Bangkok, Thailand
Authors: Saruda Nitiworakarn
Abstract:
This research aims to identify traditional Mon cuisines as well as gather and classify traditional cuisines of Mon communities in Bangkok. The studying of this research is used by methodology of the quantitative research. Using the questionnaire as the method in collecting information from sampling totally amount of 450 persons analyzed via frequency, percentage and mean value. The results showed that a variety of traditional Mon cuisines of Bangkok could split into 6 categories of meat diet with 54 items and 6 categories of desserts with 19 items.Keywords: cultural identity, traditional food, Mon cuisine, Thailand
Procedia PDF Downloads 3074925 How COVID-19 Pandemic Contingency Measures Impacted on Environmental Practices in Food Service in Portugal
Authors: Ada Rocha, Beatriz Almeida, Cláudia Viegas
Abstract:
Considering the growing trend of food consumption outside the home, Food Service units (FSU) achieved importance and responsibility in feeding the population. FSU have a strong environmental impact since the large-scale production of meals implies a high use of resources and produce high amounts of waste with economic and environmental consequences. At the end of 2019, with the emergence of the Covid-19 pandemic, this effort towards sustainability was affected by the contingency measures imposed to stop the spread of the virus. Preventive measures in FSU, include the provision of cutlery and paper napkins in individual bags, the use of disposable paper towels, the supply of individual portions of bread and spices, as well as bottled water. These measures are, in many cases, a setback and an obstacle to the implementation of more sustainable practices and imply greater consumption of natural resources and materials. The present study aimed to assess the impact of the implementation of the contingency measures for the Covid-19 pandemic on the environmental practices of FSU in Portugal. A questionnaire was developed to characterize the FSU and the impact of the implementation of contingency measures for the Covid-19 pandemic. A great impact of the implementation of the contingency measures in the sustainability of FSU was observed, highlighting concerns about the need to keep these measures, some of them adopted due to fear of the unknown and its consequences on an ongoing successful process. Policymakers should keep only the ones that may prove to be efficient and positive and abandon or relieve the unnecessary ones.Keywords: COVID-19, environment, food service, sustainability, SGD
Procedia PDF Downloads 694924 A Novel Software Model for Enhancement of System Performance and Security through an Optimal Placement of PMU and FACTS
Authors: R. Kiran, B. R. Lakshmikantha, R. V. Parimala
Abstract:
Secure operation of power systems requires monitoring of the system operating conditions. Phasor measurement units (PMU) are the device, which uses synchronized signals from the GPS satellites, and provide the phasors information of voltage and currents at a given substation. The optimal locations for the PMUs must be determined, in order to avoid redundant use of PMUs. The objective of this paper is to make system observable by using minimum number of PMUs & the implementation of stability software at 22OkV grid for on-line estimation of the power system transfer capability based on voltage and thermal limitations and for security monitoring. This software utilizes State Estimator (SE) and synchrophasor PMU data sets for determining the power system operational margin under normal and contingency conditions. This software improves security of transmission system by continuously monitoring operational margin expressed in MW or in bus voltage angles, and alarms the operator if the margin violates a pre-defined threshold.Keywords: state estimator (SE), flexible ac transmission systems (FACTS), optimal location, phasor measurement units (PMU)
Procedia PDF Downloads 4104923 Sea Border Dispute between Greece and Turkey in the Mediterrenean: Implications for Turkey’s Maritime Security and Its Military Spending
Authors: Aslihan Caliskan
Abstract:
The term Mediterranean comes from the Latin “mediterraneus” (Medius, "middle" plus Terra, "land, earth"). For the ancient Romans, the Mediterranean was the center of the earth as they knew it. The desire to gain control of the Mediterranean has led to disputes between many nations throughout history, some of which continue to this day. The recent major natural gas discoveries in the Mediterranean have aggravated ongoing tensions in some neighboring countries. The sea border dispute between Turkey and Greece & Greek-Cypriot side is one of the most critical conflicts in the Mediterranean Sea region. This unresolved dispute has many implications for all countries involved, as well as for third parties that have direct or indirect interests in the region. The research question of this context is what are the implications of this controversial sea border problem on the maritime security of Turkey and its military spending. In this paper, the quantitative method is used. Records from the Turkish Defense Ministry, data from the Turkish naval forces have been obtained. In addition, literature research and the United Nations Convention on the Law of the Sea (UNCLOS) application cases were evaluated, and an incident analysis was carried out. This research shows that the sea border dispute issue has a significant impact on the Turkish military both in terms of the structures required to ensure maritime and border security, as well as rising military costs and its macroeconomic implications. The paper begins with a brief overview of relevant principles and methods applied for delimiting th esea borders. The paper continues with a brief description and a background of the sea border dispute between Turkey and Greece & Greek-Cypriot side in the light of the United Nations Convention on the Law of the Sea (UNCLOS). An analysis of the implications of the dispute on Turkey’s maritime security and its military spending is provided in the following chapters. The paper ends with concluding remarks of the author, including suggestions for the way forward.Keywords: sea border security, mediterranean sea, greece-turkey dispute, limitation of sea, united nations convention on the law of the sea (UNCLOS)
Procedia PDF Downloads 1864922 Emperical Correlation for Measurement of Thermal Diffusivity of Spherical Shaped Food Products under Forced Convection Environment
Authors: M. Riaz, Inamur Rehman, Abhishek Sharma
Abstract:
The present work is the development of an experimental method for determining the thermal diffusivity variations with temperature of selected regular shaped solid fruits and vegetables subjected to forced convection cooling. Experimental investigations were carried on the sample chosen (potato and brinjal), which is approximately of spherical geometry. The variation of temperature within the food product is measured at several locations from centre to skin, under forced convection environment using a deep freezer, maintained at -10°C.This method uses one dimensional Fourier equation applied to regular shapes. For this, the experimental temperature data obtained from cylindrical and spherical shaped products during pre-cooling was utilised. Such temperature and thermal diffusivity profiles can be readily used with other information such as degradation rate, etc. to evaluate thermal treatments based on cold air cooling methods for storage of perishable food products.Keywords: thermal diffusivity, skin temperature, precooling, forced convection, regular shaped
Procedia PDF Downloads 4604921 Use of Geoinformatics and Mathematical Equations to Assess Erosion and Soil Fertility in Cassava Growing Areas in Maha Sarakham Province, Thailand
Authors: Sasirin Srisomkiew, Sireewan Ratsadornasai, Tanomkwan Tipvong, Isariya Meesing
Abstract:
Cassava is an important food source in the tropics and has recently gained attention as a potential source of biofuel that can replace limited fossil fuel sources. As a result, the demand for cassava production to support industries both within the country and abroad has increased. In Thailand, most farmers prefer to grow cassava in sandy and sandy loam areas where the soil has low natural fertility. Cassava is a tuber plant that has large roots to store food, resulting in the absorption of large amounts of nutrients from the soil, such as nitrogen, phosphorus, and potassium. Therefore, planting cassava in the same area for a long period causes soil erosion and decreases soil fertility. The loss of soil fertility affects the economy, society, and food and energy security of the country. Therefore, it is necessary to know the level of soil fertility and the amount of nutrients in the soil. To address this problem, this study applies geo-informatics technology and mathematical equations to assess erosion and soil fertility and to analyze factors affecting the amount of cassava production in Maha Sarakham Province. The results show that the area for cassava cultivation has increased in every district of Maha Sarakham Province between 2015-2022, with the total area increasing to 180,922 rai or 5.47% of the province’s total area during this period. Furthermore, it was found that it is possible to assess areas with soil erosion problems that had a moderate level of erosion in areas with high erosion rates ranging from 5-15 T/rai/year. Soil fertility assessment and information obtained from the soil nutrient map for 2015–2023 reveal that farmers in the area have improved the soil by adding chemical fertilizers along with organic fertilizers, such as manure and green manure, to increase the amount of nutrients in the soil. This is because the soil resources of Maha Sarakham Province mostly have relatively low agricultural potential due to the soil texture being sand and sandy loam. In this scenario, the ability to absorb nutrients is low, and the soil holds little water, so it is naturally low in fertility. Moreover, agricultural soil problems were found, including the presence of saline soil, sandy soil, and acidic soil, which is a serious restriction on land use because it affects the release of nutrients into the soil. The results of this study may be used as a guideline for managing soil resources and improving soil quality to prevent soil degradation problems that may occur in the future.Keywords: Cassava, geoinformatics, soil erosion, soil fertility, land use change
Procedia PDF Downloads 524920 The Prevalence of Organized Retail Crime in Riyadh, Saudi Arabia
Authors: Saleh Dabil
Abstract:
This study investigates the level of existence of organized retail crime in supermarkets of Riyadh, Saudi Arabia. The store managers, security managers and general employees were asked about the types of retail crimes occur in the stores. Three independent variables were related to the report of organized retail theft. The independent variables are: (1) the supermarket profile (volume, location, standard and type of the store), (2) the social physical environment of the store (maintenance, cleanness and overall organizational cooperation), (3) the security techniques and loss prevention electronics techniques used. The theoretical framework of this study based on the social disorganization theory. This study concluded that the organized retail theft, in specific, organized theft is moderately apparent in Riyadh stores. The general result showed that the environment of the stores has an effect on the prevalence of organized retail theft with relation to the gender of thieves, age groups, working shift, type of stolen items as well as the number of thieves in one case. Among other reasons, some factors of the organized theft are: economic pressure of customers based on the location of the store. The dealing of theft also was investigated to have a clear picture of stores dealing with organized retail theft. The result showed that mostly, thieves sent without any action and sometimes given written warning. Very few cases dealt with by police. There are other factors in the study can be looked up in the text. This study suggests solving the problem of organized theft; first is ‘the well distributing of the duties and responsibilities between the employees especially for security purposes’. Second is ‘installation of strong security system’ and ‘making well-designed store layout’. Third is ‘giving training for general employees’ and ‘to give periodically security skills training of employees’. There are other suggestions in the study can be looked up in the text.Keywords: organized crime, retail, theft, loss prevention, store environment
Procedia PDF Downloads 1964919 Impact of Maternal Nutrition on Newborn Anthropometry and Hemoglobin
Authors: Vinay Mishra, Meena Malkani
Abstract:
Objectives: To study the effect of physical maternal nutritional markers (viz. weight, height, gestational weight gain, BMI) and third-trimester haemoglobin concentration on anthropometry and cord blood haemoglobin of their newborn. Methods: Study area: Post-natal ward of a tertiary care hospital in an urban area. Study population: All post-partum women and their newborns. Sample size: 100. Maternal and neonatal data and anthropometric measurements were recorded in semi-structured case proforma. Data analysis: The data obtained was analysed using SPSS 20 software.The comparison between the groups was done using One-Way Analysis of Variance for two groups. For more than two groups comparisons further posthoc analysis was done using Tukey test. Pearson correlation coefficient was used for correlating the variables. A P value less than 0.05 was considered significant. Results: 1. Out of the 100 studied mothers, 52% were anaemic. 2. Cord blood haemoglobin values decreased significantly with the order of birth. 3. Cord blood haemoglobin of normal-weight newborns is significantly higher as compared to that of LBW newborns. 4. Cord blood haemoglobin has strong statistical significance with maternal anaemia. 5. Pre-pregnancy weight and gestational weight gain significantly influence the neonates anthropometry. Conclusions: 1. Birth order has a prominent inverse effect on the cord blood haemoglobin. 2. Majority of the expectant mothers are anaemic and give birth to LBW babies with reduced anthropometric markers. 3. Pre-pregnancy weight, height and gestational weight gain has a very significant impact on the neonatal anthropometry. 4. Thus, maternal nutrition during gestation and during the crucial periods of growth in the pre-child bearing age group has a very significant impact on foetal development.Keywords: maternal nutrition, anthropometry, cord blood hemoglobin, newborn
Procedia PDF Downloads 3924918 Eradicating Micronutrient Deficiency through Biofortification
Authors: Ihtasham Hamza
Abstract:
In the contemporary world, where the West is afflicted by the diseases of excess nutrition, much of the rest globe suffers at the hands of hunger. A troubling constituent of hunger is micronutrient deficiency, also called hidden hunger. Major dependence on calorie-rich diets and low diet diversification are responsible for high malnutrition rates, especially in African and Asian countries. But the dilemma isn’t immune to solutions. Highlighting the substantial cause to be sole dependence on staples for food, biofortification has emerged as a novel tool to confront the widely distributed jeopardize of hidden hunger. Biofortification potentials the better nutritional approachability to commonalities overcoming various difficulties and reaching the doorstep. The crops associated with biofortification offer a rural-based involvement that, proposal, primarily reaches these more remote populations, which comprise a majority of the malnourished in many countries, and then penetrates to urban populations as assembly overages are marketed. Initial investments in agricultural research at a central location can generate high recurrent benefits at low cost as adapted biofortified cultivars become widely available in countries across time at low recurrent costs as opposed to supplementation which is comparatively expensive and requires continued financing over time, which may be imperilled by fluctuating political curiosity.Keywords: biofortified crops, hunger, malnutrition, agricultural practices
Procedia PDF Downloads 2884917 A Medical Vulnerability Scoring System Incorporating Health and Data Sensitivity Metrics
Authors: Nadir A. Carreon, Christa Sonderer, Aakarsh Rao, Roman Lysecky
Abstract:
With the advent of complex software and increased connectivity, the security of life-critical medical devices is becoming an increasing concern, particularly with their direct impact on human safety. Security is essential, but it is impossible to develop completely secure and impenetrable systems at design time. Therefore, it is important to assess the potential impact on the security and safety of exploiting a vulnerability in such critical medical systems. The common vulnerability scoring system (CVSS) calculates the severity of exploitable vulnerabilities. However, for medical devices it does not consider the unique challenges of impacts to human health and privacy. Thus, the scoring of a medical device on which human life depends (e.g., pacemakers, insulin pumps) can score very low, while a system on which human life does not depend (e.g., hospital archiving systems) might score very high. In this paper, we propose a medical vulnerability scoring system (MVSS) that extends CVSS to address the health and privacy concerns of medical devices. We propose incorporating two new parameters, namely health impact, and sensitivity impact. Sensitivity refers to the type of information that can be stolen from the device, and health represents the impact on the safety of the patient if the vulnerability is exploited (e.g., potential harm, life-threatening). We evaluate fifteen different known vulnerabilities in medical devices and compare MVSS against two state-of-the-art medical device-oriented vulnerability scoring systems and the foundational CVSS.Keywords: common vulnerability system, medical devices, medical device security, vulnerabilities
Procedia PDF Downloads 1664916 Performance Analysis of Elliptic Curve Cryptography Using Onion Routing to Enhance the Privacy and Anonymity in Grid Computing
Authors: H. Parveen Begam, M. A. Maluk Mohamed
Abstract:
Grid computing is an environment that allows sharing and coordinated use of diverse resources in dynamic, heterogeneous and distributed environment using Virtual Organization (VO). Security is a critical issue due to the open nature of the wireless channels in the grid computing which requires three fundamental services: authentication, authorization, and encryption. The privacy and anonymity are considered as an important factor while communicating over publicly spanned network like web. To ensure a high level of security we explored an extension of onion routing, which has been used with dynamic token exchange along with protection of privacy and anonymity of individual identity. To improve the performance of encrypting the layers, the elliptic curve cryptography is used. Compared to traditional cryptosystems like RSA (Rivest-Shamir-Adelman), ECC (Elliptic Curve Cryptosystem) offers equivalent security with smaller key sizes which result in faster computations, lower power consumption, as well as memory and bandwidth savings. This paper presents the estimation of the performance improvements of onion routing using ECC as well as the comparison graph between performance level of RSA and ECC.Keywords: grid computing, privacy, anonymity, onion routing, ECC, RSA
Procedia PDF Downloads 3984915 Assessing Acute Toxicity and Endocrine Disruption Potential of Selected Packages Internal Layers Extracts
Authors: N. Szczepanska, B. Kudlak, G. Yotova, S. Tsakovski, J. Namiesnik
Abstract:
In the scientific literature related to the widely understood issue of packaging materials designed to have contact with food (food contact materials), there is much information on raw materials used for their production, as well as their physiochemical properties, types, and parameters. However, not much attention is given to the issues concerning migration of toxic substances from packaging and its actual influence on the health of the final consumer, even though health protection and food safety are the priority tasks. The goal of this study was to estimate the impact of particular foodstuff packaging type, food production, and storage conditions on the degree of leaching of potentially toxic compounds and endocrine disruptors to foodstuffs using the acute toxicity test Microtox and XenoScreen YES YAS assay. The selected foodstuff packaging materials were metal cans used for fish storage and tetrapak. Five stimulants respectful to specific kinds of food were chosen in order to assess global migration: distilled water for aqueous foods with a pH above 4.5; acetic acid at 3% in distilled water for acidic aqueous food with pH below 4.5; ethanol at 5% for any food that may contain alcohol; dimethyl sulfoxide (DMSO) and artificial saliva were used in regard to the possibility of using it as an simulation medium. For each packaging three independent variables (temperature and contact time) factorial design simulant was performed. Xenobiotics migration from epoxy resins was studied at three different temperatures (25°C, 65°C, and 121°C) and extraction time of 12h, 48h and 2 weeks. Such experimental design leads to 9 experiments for each food simulant as conditions for each experiment are obtained by combination of temperature and contact time levels. Each experiment was run in triplicate for acute toxicity and in duplicate for estrogen disruption potential determination. Multi-factor analysis of variation (MANOVA) was used to evaluate the effects of the three main factors solvent, temperature (temperature regime for cup), contact time and their interactions on the respected dependent variable (acute toxicity or estrogen disruption potential). From all stimulants studied the most toxic were can and tetrapak lining acetic acid extracts that are indication for significant migration of toxic compounds. This migration increased with increase of contact time and temperature and justified the hypothesis that food products with low pH values cause significant damage internal resin filling. Can lining extracts of all simulation medias excluding distilled water and artificial saliva proved to contain androgen agonists even at 25°C and extraction time of 12h. For tetrapak extracts significant endocrine potential for acetic acid, DMSO and saliva were detected.Keywords: food packaging, extraction, migration, toxicity, biotest
Procedia PDF Downloads 1814914 Efficient Reduction of Organophosphate Pesticide from Fruits and Vegetables Using Cost Effective Neutralizer
Authors: Debjani Dasgupta, Aman Zalawadia, Anuj Thapa, Pranjali Sing, Ashish Dabade
Abstract:
Organophosphate group pesticides are common pesticide group, which gain entry into food product due to incomplete removal of pesticide residues. The current food industry raw material handling process is not sufficient to eliminate pesticide residues. A neutralizer was used to neutralize the residues of pesticide on Vitis vinifera (Grapes). The water based dilution of neutralizer was demonstrated on fruits like grapes. Analysis for pesticides in water wash and neutralizer wash was carried out using GCMS. Fruits washed with neutralizer exhibited 72.95% removal of pesticides compared with normal water wash method. An economical chemical neutralizer can be used to remove such residues in raw material handling at industrial scale with minor modification in process to achieve minimum pesticide entry into final food products.Keywords: GCMS, organophosphate, raw material handling, Vitis vinifera, pesticide neutralizer
Procedia PDF Downloads 2734913 Security Analysis of Mod. S Transponder Technology and Attack Examples
Authors: M. Rutkowski, J. Cwiklak, M. Grzegorzewski, M. Adamski
Abstract:
All class A Airplanes have to be equipped with Mod. S transponder for ATC surveillance purposes. This technology was designed to provide a robust and dependable solution to localize, identify and exchange data with the airplane. The purpose of this paper is to analyze potential hazards that are a result of lack of any security or encryption on a design level. Secondary Surveillance Radars rely on an active response from an airplane. SSR radar installation is broadcasting a directional interrogation signal to the planes in range on 1030MHz frequency with DPSK modulation. If the interrogation is correctly received by the transponder located on the plane, a proper answer is sent on 1090MHz with PPM modulation containing plane’s SQUAWK, barometric altitude, GPS coordinates and 24bit unique address code. This technology does not use any kind of encryption. All of the specifications from the previous chapter can be found easily on the internet. Since there is no encryption or security measure to ensure the credibility of the sender and message, it is highly hazardous to use such technology to ensure the safety of the air traffic. The only thing that identifies the airplane is the 24-bit unique address. Most of the planes have been sniffed by aviation enthusiasts and cataloged in web databases. In the moment of writing this article, The PoFung Technologies has announced that they are planning to release all band SDR transceiver – this device would be more than enough to build your own Mod. S Transponder. With fake transponder, a potential terrorist can identify as a different airplane. By replacing the transponder in a poorly controlled airspace, hijackers can enter another airspace identifying themselves as another plane and land in the desired area.Keywords: flight safety, hijack, mod S transponder, security analysis
Procedia PDF Downloads 2954912 Predicting Food Waste and Losses Reduction for Fresh Products in Modified Atmosphere Packaging
Authors: Matar Celine, Gaucel Sebastien, Gontard Nathalie, Guilbert Stephane, Guillard Valerie
Abstract:
To increase the very short shelf life of fresh fruits and vegetable, Modified Atmosphere Packaging (MAP) allows an optimal atmosphere composition to be maintained around the product and thus prevent its decay. This technology relies on the modification of internal packaging atmosphere due to equilibrium between production/consumption of gases by the respiring product and gas permeation through the packaging material. While, to the best of our knowledge, benefit of MAP for fresh fruits and vegetable has been widely demonstrated in the literature, its effect on shelf life increase has never been quantified and formalized in a clear and simple manner leading difficult to anticipate its economic and environmental benefit, notably through the decrease of food losses. Mathematical modelling of mass transfers in the food/packaging system is the basis for a better design and dimensioning of the food packaging system. But up to now, existing models did not permit to estimate food quality nor shelf life gain reached by using MAP. However, shelf life prediction is an indispensable prerequisite for quantifying the effect of MAP on food losses reduction. The objective of this work is to propose an innovative approach to predict shelf life of MAP food product and then to link it to a reduction of food losses and wastes. In this purpose, a ‘Virtual MAP modeling tool’ was developed by coupling a new predictive deterioration model (based on visual surface prediction of deterioration encompassing colour, texture and spoilage development) with models of the literature for respiration and permeation. A major input of this modelling tool is the maximal percentage of deterioration (MAD) which was assessed from dedicated consumers’ studies. Strawberries of the variety Charlotte were selected as the model food for its high perishability, high respiration rate; 50-100 ml CO₂/h/kg produced at 20°C, allowing it to be a good representative of challenging post-harvest storage. A value of 13% was determined as a limit of acceptability for the consumers, permitting to define products’ shelf life. The ‘Virtual MAP modeling tool’ was validated in isothermal conditions (5, 10 and 20°C) and in dynamic temperature conditions mimicking commercial post-harvest storage of strawberries. RMSE values were systematically lower than 3% for respectively, O₂, CO₂ and deterioration profiles as a function of time confirming the goodness of model fitting. For the investigated temperature profile, a shelf life gain of 0.33 days was obtained in MAP compared to the conventional storage situation (no MAP condition). Shelf life gain of more than 1 day could be obtained for optimized post-harvest conditions as numerically investigated. Such shelf life gain permitted to anticipate a significant reduction of food losses at the distribution and consumer steps. This food losses' reduction as a function of shelf life gain has been quantified using a dedicated mathematical equation that has been developed for this purpose.Keywords: food losses and wastes, modified atmosphere packaging, mathematical modeling, shelf life prediction
Procedia PDF Downloads 1834911 An Alternative Semi-Defined Larval Diet for Rearing of Sand Fly Species Phlebotomus argentipes in Laboratory
Authors: Faizan Hassan, Seema Kumari, V. P. Singh, Pradeep Das, Diwakar Singh Dinesh
Abstract:
Phlebotomus argentipes is an established vector for Visceral Leishmaniasis in Indian subcontinent. Laboratory colonization of Sand flies is imperative in research on vectors, which requires a proper diet for their larvae and adult growth that ultimately affects their survival and fecundity. In most of the laboratories, adult Sand flies are reared on rabbit blood feeding/artificial blood feeding and their larvae on fine grinded rabbit faeces as a sole source of food. Rabbit faeces are unhygienic, difficult to handle, high mites infestation as well as owing to bad odour which creates menacing to human users ranging from respiratory problems to eye infection and most importantly it does not full fill all the nutrients required for proper growth and development. It is generally observed that the adult emergence is very low in comparison to egg hatched, which may be due to insufficient food nutrients provided to growing larvae. To check the role of food nutrients on larvae survival and adult emergence, a high protein rich artificial diet for sand fly larvae were used in this study. The composition of artificial diet to be tested includes fine grinded (9 gm each) Rice, Pea nuts & Soyabean balls. These three food ingredients are rich source of all essential amino acids along with carbohydrate and minerals which is essential for proper metabolism and growth. In this study artificial food was found significantly more effective for larval development and adult emergence than rabbit faeces alone (P value >0.05). The weight of individual larvae was also found higher in test pots than the control. This study suggest that protein plays an important role in insect larvae development and adding carbohydrate will also enhances the fecundity of insects larvae.Keywords: artificial food, nutrients, Phlebotomus argentipes, sand fly
Procedia PDF Downloads 3054910 Evaluating Global ‘Thing’ Security of Consumer Products
Authors: Achutha Raman
Abstract:
Today's brave new world features a bonanza of digitally interconnected products, or ‘things,’ that improve convenience, possibilities, and in some cases efficiency for consumers. Nonetheless, even as the market accelerates, this Internet of ‘things’ is subject to substantial leakage of consumer personal data. First defining the fluid concept of ‘things,’ this paper subsequently uses case studies taken from the EU, Asia, and the US, to highlight large gaps and comprehensively evaluate the state of security for consumer ‘things.’ Ultimately, this paper offers several ways of improving the present status quo, and especially focuses on an evaluative approach that augments the standard mechanism of Firmware Over the Air Updates, and ought to be easily implementable.Keywords: cybersecurity, FOTA, Internet of Things, transnational privacy
Procedia PDF Downloads 2184909 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 3204908 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 1344907 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security
Authors: Irfan U. Din
Abstract:
The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)
Procedia PDF Downloads 2904906 Counter-Terrorism and Civil Society in Nigeria
Authors: Emeka Thaddues Njoku
Abstract:
Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.Keywords: counter-terrorism, civil society organizations, freedom, terrorism
Procedia PDF Downloads 3914905 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 2804904 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 2994903 Chocomerr (Merr Leaves Chocolate) Alternative Food in Increasing Breastmilk Quantity
Authors: Rara Wulan Anggareni, Narita Putri, Riski Septianing Astuti
Abstract:
Breastfeeding is a key to prevent mortality and morbidity in children. It is also the second highest risk responsible for Disability Adjusted Life Years (DALYs) among children below five years old. UNICEF estimates that during 1995 – 2003, there are only about 38% infants in developing countries who get to be exclusively breastfed during the first six months of their lives. According to Demography and Health Survey in Indonesia 2007, breastfeed practice rate still considered as low which is about 41%. One of the factors causing the low breastfeed practice rate in Indonesia is the anxiety and postpartum depression, and also the weanling dilemma in which mother feels that her breastmilk cannot suffice infant needs. Those factors finally resulting into low or even stopped production of breastmilk. Breastmilk production can be enhanced by consuming food containing phytosterol and lactogoga effect. Food with the highest phytosterol level is Sauropus androgynus (L.) Merr leaf (merr leaf). In this study, we made alternative food which named Chocomerr for breastfeeding mothers. Chocomerr consists of merr leaves which have lactogoga effect and chocolate for relaxation. Based on organoleptic tests conducted towards 2 age groups, which are 18 – 21 and 25 – 40 years old, this product gets good acceptance in taste, texture, and colour categories. Chocomerr can be used as an alternative way for increasing breastmilk production to aim for the decreasing number of DALYs among children aged under 5 years old.Keywords: breastfeeding, increasing, chocolate, merr leaves
Procedia PDF Downloads 4334902 A Comparative Human Rights Analysis of Deprivation of Citizenship as a Counterterrorism Instrument: An Evaluation of Belgium
Authors: Louise Reyntjens
Abstract:
In response to Islamic-inspired terrorism and the growing trend of foreign fighters, European governments are increasingly relying on the deprivation of citizenship as a security tool. This development fits within a broader securitization of immigration, where the terrorist threat is perceived as emanating from abroad. As a result, immigration law became more and more ‘securitized’. The European migration crisis has reinforced this trend. This research evaluates the deprivation of citizenship from a human rights perspective. For this, the author selected four European countries for a comparative study: Belgium, France, the United Kingdom and Sweden. All these countries face similar social and security issues, vitalizing (the debate on) deprivation of citizenship as a counterterrorism tool. Yet, they adopt a very different approach on this: The United Kingdom positions itself on the repressive side of the spectrum. Sweden on the other hand, also ‘securitized’ its immigration policy after the recent terrorist hit in Stockholm but remains on the tolerant side of the spectrum. Belgium and France are situated in between. This contribution evaluates the deprivation of citizenship in Belgium. Belgian law has provided the possibility to strip someone of their Belgian citizenship since 1919. However, the provision long remained a dead letter. The 2015 Charlie Hebdo attacks in Paris sparked a series of legislative changes, elevating the deprivation measure to a key security tool in Belgian law. Yet, the measure raises profound human rights issues. Firstly, it infringes the right to private and family life. As provided by Article 8 (2) European Court of Human Right (ECHR), this right can be limited if necessary for national security and public safety. Serious questions can however be raised about the necessity for the national security of depriving an individual of its citizenship. Behavior giving rise to this measure will generally be governed by criminal law. From a security perspective, criminal detention will thus already provide in removing the individual from society. Moreover, simply stripping an individual of its citizenship and deporting them constitutes a failure of criminal law’s responsibility to prosecute criminal behavior. Deprivation of citizenship is also discriminatory, because it differentiates, without a legitimate reason, between those liable to deprivation and those who are not. It thereby installs a secondary class of citizens, violating the European Court of Human Right’s principle that no distinction can be tolerated between children on the basis of the status of their parents. If followed by expulsion, deprivation also seriously jeopardizes the right to life and prohibition of torture. This contribution explores the human rights consequences of citizenship deprivation as a security tool in Belgium. It also offers a critical view on its efficacy for protecting national security.Keywords: Belgium, counterterrorism strategies, deprivation of citizenship, human rights, immigration law
Procedia PDF Downloads 1254901 Assessment Of Factors Affecting Sustainability of Rice (Oryza sativa) Processing and Marketing in Ogun State, Nigeria
Authors: A. M. Omoare, O. O. Sofowora, W. O. Oyediran
Abstract:
The study was carried out to assess the factors affecting the sustainability of rice processing and marketing in Ogun State, Nigeria. Multi-stage sampling technique was used to select one hundred and twenty (120) respondents for the study. Descriptive statistics was used to describe the objectives while hypotheses were analyzed with Pearson Product Moment Correlation. The result showed that most (85%) of the respondents was less than 50 years old and had been in rice business for more than 6 years. The majority (66.67%) of the respondents got their capitals from cooperative societies. All (100%) the respondents used rice as household food security and source of income. However, efficient rice processing and marketing were affected by inadequate manpower capacity development and inputs. There was a positive and significant relationship between socio-economic characteristics and processing techniques (p < 0.05). It is hereby recommended that extension service providers should introduce improved rice processing systems to the rice millers traders in the study area.Keywords: sustainability, rice processing, marketing, constraints, millers traders
Procedia PDF Downloads 3934900 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 4854899 The Relationship between Body Image, Eating Behavior and Nutritional Status for Female Athletes
Authors: Selen Muftuoglu, Dilara Kefeli
Abstract:
The present study was conducted by using the cross-sectional study design and to determine the relationship between body image, eating behavior and nutritional status in 80 female athletes who were basketball, volleyball, flag football, indoor soccer, and ice hockey players. This study demonstrated that 70.0% of the female athletes had skipped meal. Also, female athletes had a normal body mass index (BMI), but 65.0% of them indicated that want to be thinner. On the other hand, we analyzed that their daily nutrients intake, so we observed that 43.4% of the energy was from the fatty acids, especially saturated fatty acids, and they had lower fiber, calcium and iron intake. Also, we found that BMI, waist circumference, waist to hip ratio were negatively correlated with Multidimensional Body-Self Relations Questionnaire and The Dutch Eating Behavior Questionnaire score and they were lower in who had meal skipped or not received diet therapy. As a conclusion, nutrition education is frequently neglected in sports programs. There is a paucity of nutrition education interventions among different sports.Keywords: body image, eating behavior, eating disorders, female athletes, nutritional status
Procedia PDF Downloads 1624898 The Effects of the Interaction between Prenatal Stress and Diet on Maternal Insulin Resistance and Inflammatory Profile
Authors: Karen L. Lindsay, Sonja Entringer, Claudia Buss, Pathik D. Wadhwa
Abstract:
Maternal nutrition and stress are independently recognized as among the most important factors that influence prenatal biology, with implications for fetal development and poor pregnancy outcomes. While there is substantial evidence from non-pregnancy human and animal studies that a complex, bi-directional relationship exists between nutrition and stress, to the author’s best knowledge, their interaction in the context of pregnancy has been significantly understudied. The aim of this study is to assess the interaction between maternal psychological stress and diet quality across pregnancy and its effects on biomarkers of prenatal insulin resistance and inflammation. This is a prospective longitudinal study of N=235 women carrying a healthy, singleton pregnancy, recruited from prenatal clinics of the University of California, Irvine Medical Center. Participants completed a 4-day ambulatory assessment in early, middle and late pregnancy, which included multiple daily electronic diary entries using Ecological Momentary Assessment (EMA) technology on a dedicated study smartphone. The EMA diaries gathered moment-level data on maternal perceived stress, negative mood, positive mood and quality of social interactions. The numerical scores for these variables were averaged across each study time-point and converted to Z-scores. A single composite variable for 'STRESS' was computed as follows: (Negative mood+Perceived stress)–(Positive mood+Social interaction quality). Dietary intakes were assessed by three 24-hour dietary recalls conducted within two weeks of each 4-day assessment. Daily nutrient and food group intakes were averaged across each study time-point. The Alternative Healthy Eating Index adapted for pregnancy (AHEI-P) was computed for early, middle and late pregnancy as a validated summary measure of diet quality. At the end of each 4-day ambulatory assessment, women provided a fasting blood sample, which was assayed for levels of glucose, insulin, Interleukin (IL)-6 and Tumor Necrosis Factor (TNF)-α. Homeostasis Model Assessment of Insulin Resistance (HOMA-IR) was computed. Pearson’s correlation was used to explore the relationship between maternal STRESS and AHEI-P within and between each study time-point. Linear regression was employed to test the association of the stress-diet interaction (STRESS*AHEI-P) with the biological markers HOMA-IR, IL-6 and TNF-α at each study time-point, adjusting for key covariates (pre-pregnancy body mass index, maternal education level, race/ethnicity). Maternal STRESS and AHEI-P were significantly inversely correlated in early (r=-0.164, p=0.018) and mid-pregnancy (-0.160, p=0.019), and AHEI-P from earlier gestational time-points correlated with later STRESS (early AHEI-P x mid STRESS: r=-0.168, p=0.017; mid AHEI-P x late STRESS: r=-0.142, p=0.041). In regression models, the interaction term was not associated with HOMA-IR or IL-6 at any gestational time-point. The stress-diet interaction term was significantly associated with TNF-α according to the following patterns: early AHEI-P*early STRESS vs early TNF-α (p=0.005); early AHEI-P*early STRESS vs mid TNF-α (p=0.002); early AHEI-P*mid STRESS vs mid TNF-α (p=0.005); mid AHEI-P*mid STRESS vs mid TNF-α (p=0.070); mid AHEI-P*late STRESS vs late TNF-α (p=0.011). Poor diet quality is significantly related to higher psychosocial stress levels in pregnant women across gestation, which may promote inflammation via TNF-α. Future prenatal studies should consider the combined effects of maternal stress and diet when evaluating either one of these factors on pregnancy or infant outcomes.Keywords: diet quality, inflammation, insulin resistance, nutrition, pregnancy, stress, tumor necrosis factor-alpha
Procedia PDF Downloads 2004897 Farmers’ Awareness of Pillars of Planting for Food and Jobs Programme in Ghana
Authors: Franklin Nantui Mabe, Gideon Danso-Abbeam, Dennis Sedem Ehiakpor
Abstract:
In order for the government of Ghana through the Ministry of Food and Agriculture to motivate farmers to adopt improved agricultural technologies, expand their farms and encourage youth to enter into agricultural production so as to increase crop productivity, “Planting for Food and Jobs” (PFJ) programme was launched in April 2017. The PFJ programme covers five pillars, namely, provision of subsidized and improved seeds; subsidized fertilizer; agricultural extension services; establishment of markets; and e-agriculture. This study assesses the awareness of farmers about the packages of these pillars using the Likert scale, paired t-test and Spearman’s rank correlation coefficient. The study adopted a mixed research design. A semi-structured questionnaire and checklist were used to collect data. The data collection was done using interviews and focus group discussions. The PFJ pillar farmers are much aware is a subsidy on fertilizer followed by a subsidy on improved seeds. Electronic agriculture is a pillar with the lowest level of awareness. There is a strong positive correlation between awareness of fertilizer and seed packages suggestion their complementarities. Lack of information/awareness of the packages of the programme can affect farmers’ participation in all the pillars. Farmers, in particular, should be educated for them to know what they are entitled to in each of the pillars. The programme implementation plan should also be made available to farmers as a guide.Keywords: awareness, planting for food and jobs, programme, farmers, likert scale
Procedia PDF Downloads 231