Search results for: national food security strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12975

Search results for: national food security strategy

11535 Robust Data Image Watermarking for Data Security

Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan

Abstract:

In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.

Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms

Procedia PDF Downloads 512
11534 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques

Authors: John Onyima, Ikechukwu Ezepue

Abstract:

Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.

Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection

Procedia PDF Downloads 302
11533 Model of Learning Center on OTOP Production Process Based on Sufficiency Economic Philosophy

Authors: Chutikarn Sriviboon, Witthaya Mekhum

Abstract:

The purposes of this research were to analyze and evaluate successful factors in OTOP production process for the developing of learning center on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality. The research has been designed as a qualitative study to gather information from 30 OTOP producers in Bangkontee District, Samudsongkram Province. They were all interviewed on 3 main parts. Part 1 was about the production process including 1) production 2) product development 3) the community strength 4) marketing possibility and 5) product quality. Part 2 evaluated appropriate successful factors including 1) the analysis of the successful factors 2) evaluate the strategy based on Sufficiency Economic Philosophy and 3) the model of learning center on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality. The results showed that the production did not affect the environment with potential in continuing standard quality production. They used the raw materials in the country. On the aspect of product and community strength in the past 1 year, it was found that there was no appropriate packaging showing product identity according to global market standard. They needed the training on packaging especially for food and drink products. On the aspect of product quality and product specification, it was found that the products were certified by the local OTOP standard. There should be a responsible organization to help the uncertified producers pass the standard. However, there was a problem on food contamination which was hazardous to the consumers. The producers should cooperate with the government sector or educational institutes involving with food processing to reach FDA standard. The results from small group discussion showed that the community expected high education and better standard living. Some problems reported by the community included informal debt and drugs in the community. There were 8 steps in developing the model of learning center on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality.

Keywords: production process, OTOP, sufficiency economic philosophy, learning center

Procedia PDF Downloads 375
11532 Portfolio Selection with Active Risk Monitoring

Authors: Marc S. Paolella, Pawel Polak

Abstract:

The paper proposes a framework for large-scale portfolio optimization which accounts for all the major stylized facts of multivariate financial returns, including volatility clustering, dynamics in the dependency structure, asymmetry, heavy tails, and non-ellipticity. It introduces a so-called risk fear portfolio strategy which combines portfolio optimization with active risk monitoring. The former selects optimal portfolio weights. The latter, independently, initiates market exit in case of excessive risks. The strategy agrees with the stylized fact of stock market major sell-offs during the initial stage of market downturns. The advantages of the new framework are illustrated with an extensive empirical study. It leads to superior multivariate density and Value-at-Risk forecasting, and better portfolio performance. The proposed risk fear portfolio strategy outperforms various competing types of optimal portfolios, even in the presence of conservative transaction costs and frequent rebalancing. The risk monitoring of the optimal portfolio can serve as an early warning system against large market risks. In particular, the new strategy avoids all the losses during the 2008 financial crisis, and it profits from the subsequent market recovery.

Keywords: comfort, financial crises, portfolio optimization, risk monitoring

Procedia PDF Downloads 523
11531 Nutrition and Physical Activity in Obese Women

Authors: Shubeska Stratrova S., Muca A., Panovska S. Clinic of endocrinology, diabetes, metabolic disorders, Medical Faculty, Skopje, N. Macedonia

Abstract:

Rationale: Obese subjects have a high energy density diet, low physical activity levels, a sedentary lifestyle, as well as eating disorders, which are considered important risk factors for the development of obesity. Methods: In order to discover the imbalance of energy intake and energy expenditure in obese women (W), two groups of examinees answered questionnaires regarding nutrition and physical activity: 1st group of women with normal body mass index (BMI <25 kg/m²) and 2nd group of obese women with BMI >30 kg/m². Results: 61.11% of obese W from the 2nd group reported good appetite, which was higher than the 1st group (45%). In 55.56% W, frustrations were a provocation for over nutrition. In the 2nd group, 38.89% W ate too much compared to 9.09% W from the 1st group. In the ²ⁿᵈ group, 35.29% W reported consuming food rarely and too much, while 29.41% W reported consuming food often and too much. All examinees from the ²ⁿᵈ group had consumed food in less than 5 hours, compared to only 8.33% W from the ¹ⁿᵈ group and had consumed hyper-caloric food. Consumption of fruits and vegetables was lower in the 2nd group compared to the 1st group. Half of the subjects in the 2nd group were physically inactive, compared to only 8% in the 1st group. All of the examinees in the 2nd group walked for less than 3 hours a day, compared to 54% in the 1st group. In the 2nd group, 67% W reported watching TV very often, 39% reported watching TV longer than 3 hours, which is significantly higher than 8.33% W in the 1st group. Overall, 81.25% of examinees from the 2nd group reported sitting for more than 3 hours a day, which is significantly more compared to the 1st group (45.45%). Conclusions: Obese women are less physically active, have a sedentary lifestyle, good appetite, and consume too much hyper-caloric food very often.

Keywords: (W) obese women, BMI(Body mass Index), nutrition, hyper-caloric food

Procedia PDF Downloads 74
11530 Antiplatelet Activity of Nitrated Fatty Acids from Different Food Sources

Authors: Lyanne Rodriguez, Eduardo Fuentes, Andrés Trostchansky, Felipe Lagos

Abstract:

Nutrition is a crucial strategy to combat cardiovascular diseases (CVD), which remain a leading global cause of mortality. Various studies have demonstrated the antiplatelet properties of commonly consumed fruit and vegetable extracts, particularly tomato and bean extracts. Previous research has indicated potent antiplatelet activity in tomato and common bean pomace, attributed to their high fatty acid content (>30%). Notably, fatty acids can undergo nitration during digestion, catalyzed by the reaction of nitrogen dioxide with unsaturated fatty acids. Understanding the mechanisms underlying the formation of nitrated fatty acids from dietary sources is essential to comprehending their antiplatelet action. This research aims to evaluate the formation of nitrated fatty acids (NO₂-FA) from different foods (tomato pulp and common beans). Specifically, tomato pomace and nitrated bean extracts exhibited concentration-dependent antiplatelet effects when platelets were stimulated with TRAP-6 and collagen (1.18±0.04 and 0.7±0.02 mg/mL, respectively). Furthermore, the antiplatelet potential was associated with the modulation of platelet activation markers, as both nitrated extracts suppressed p-selectin expression, CD63 secretion, and fibrinogen modulation. Additionally, a synergistic effect was observed between both nitrated extracts. Our results suggest that NO₂-FA obtained from different food sources has a promising antiplatelet effect for preventing and treating blood clots. This study adds value to these foods in terms of reducing cardiovascular events.

Keywords: foods, nitrated fatty acids, nitration, platelets

Procedia PDF Downloads 40
11529 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges

Authors: Alvite Singh Ningthoujam

Abstract:

The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.

Keywords: India, Islamic State, Muslim, Security

Procedia PDF Downloads 375
11528 Evaluating Antimicrobial Activity of Selenium Nanoparticles Against Food-Borne Bacteria

Authors: Qunying Yuan, Manjula Bomma, Adrian Rhoden, Zhigang Xiao

Abstract:

Selenium is an essential micronutrient for all mammals and plays an important role in maintaining human physiological functions. The potential applications of selenium as food supplements, cancer-prevention, antimicrobial and anti-inflammatory agents have been investigated in biomedicine and food sciences. Nanoscale of selenium is of particular interest due to its better biocompatibility, higher bioavailability, lower toxicity, more homogeneous distribution, and presumptive controlled release of substances. The objective of this study is to explore whether selenium nanoparticle (SeNP) has the potential to be used as a food preservative to reduce food spoilage. SeNPs were synthesized through ascorbic acid reduction of sodium selenite using the bovine serum albumin (BSA) as capping and stabilizing agent. The chemically synthesized SeNPs had a spherical conformation and a size of 22.8 ± 4.7 nm. FTIR analysis confirmed that the nanoparticles were covered with BSA. We further tested the antimicrobial activity of these SeNPs against common food-borne bacteria. Colony forming unit assay showed that SeNPs exhibited good inhibition on the growth of Listeria Monocytogens (ATCC15313), Staphylococcus epidermidis (ATCC 700583) starting at 0.5µg/mL, but only a moderate inhibitory effect on the growth of Staphylococcus aureus (ATCC12600) and Vibrio alginolyticus (ATCC 33787) at a concentration higher than 10µg/mL and 2.5µg/mL, respectively. There was a mild effect against the growth Salmonella enterica (ATCC19585) when the concentration reached 15µg/mL. No inhibition was observed in the growth of Enterococcus faecalis (ATCC 19433). Surprisingly, SeNPs appeared to promote the growth of Vibrio parahaemolyticus (ATCC43996) and Salmonella enterica (ATCC49284) at 30 µg/mL and above. Our preliminary data suggested that the chemically synthesized SeNPs may be able to inhibit some food-borne bacteria, and SeNP as a food preservative should be used with caution. We will explore the mechanisms of the inhibitory action of chemically synthesized SeNPs on bacterial growth and whether the SeNPs are able to inhibit the development of biofilm and antibiotic resistance.

Keywords: antimicrobial, food-borne bacteria, nanoparticles, selenium

Procedia PDF Downloads 92
11527 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping

Authors: Andre Slonopas, Zona Kostic, Warren Thompson

Abstract:

Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.

Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory

Procedia PDF Downloads 185
11526 The Islamic Advertising Standardisation Revisited of Food Products

Authors: Nurzahidah Haji Jaapar, Anis Husna Abdul Halim, Mohd Faiz Mohamed Yusof, Mohd Dani Muhamad, Sharifah Fadylawaty Syed Abdullah

Abstract:

The growing size of Muslim is recognised with significant increasing of purchasing power in the market. The realm of trade and business has embedded religious values as the new market segments are emerging in offering food products to meet needs and demands of Muslim consumer. The emergence of new market in food industry, advertising is charged with all sort of negative effects includes promoting controversial unsafety and harmful products, wasteful spending and exploiting women and kids. Therefore, this research attempts to examine between previous examinations of advertising standardisation in ancient era and current practices in the market. This paper is based on content analysis of the literature. The results show that there are a bridge gap between the implementation of practices as the advent in industrial 4.0 in using digital advertising by food industry. Thus, this paper is able to recognize the differences between two era and significant in determining the best practices in advertising by following Islamic principles.

Keywords: Islamic advertising, unethical advertising, ethical advertising, Islamic principles

Procedia PDF Downloads 147
11525 Composite Approach to Extremism and Terrorism Web Content Classification

Authors: Kolade Olawande Owoeye, George Weir

Abstract:

Terrorism and extremism activities on the internet are becoming the most significant threats to national security because of their potential dangers. In response to this challenge, law enforcement and security authorities are actively implementing comprehensive measures by countering the use of the internet for terrorism. To achieve the measures, there is need for intelligence gathering via the internet. This includes real-time monitoring of potential websites that are used for recruitment and information dissemination among other operations by extremist groups. However, with billions of active webpages, real-time monitoring of all webpages become almost impossible. To narrow down the search domain, there is a need for efficient webpage classification techniques. This research proposed a new approach tagged: SentiPosit-based method. SentiPosit-based method combines features of the Posit-based method and the Sentistrenght-based method for classification of terrorism and extremism webpages. The experiment was carried out on 7500 webpages obtained through TENE-webcrawler by International Cyber Crime Research Centre (ICCRC). The webpages were manually grouped into three classes which include the ‘pro-extremist’, ‘anti-extremist’ and ‘neutral’ with 2500 webpages in each category. A supervised learning algorithm is then applied on the classified dataset in order to build the model. Results obtained was compared with existing classification method using the prediction accuracy and runtime. It was observed that our proposed hybrid approach produced a better classification accuracy compared to existing approaches within a reasonable runtime.

Keywords: sentiposit, classification, extremism, terrorism

Procedia PDF Downloads 276
11524 Effect of Cellular Water Transport on Deformation of Food Material during Drying

Authors: M. Imran Hossen Khan, M. Mahiuddin, M. A. Karim

Abstract:

Drying is a food processing technique where simultaneous heat and mass transfer take place from surface to the center of the sample. Deformation of food materials during drying is a common physical phenomenon which affects the textural quality and taste of the dried product. Most of the plant-based food materials are porous and hygroscopic in nature that contains about 80-90% water in different cellular environments: intercellular environment and intracellular environment. Transport of this cellular water has a significant effect on material deformation during drying. However, understanding of the scale of deformation is very complex due to diverse nature and structural heterogeneity of food material. Knowledge about the effect of transport of cellular water on deformation of material during drying is crucial for increasing the energy efficiency and obtaining better quality dried foods. Therefore, the primary aim of this work is to investigate the effect of intracellular water transport on material deformation during drying. In this study, apple tissue was taken for the investigation. The experiment was carried out using 1H-NMR T2 relaxometry with a conventional dryer. The experimental results are consistent with the understanding that transport of intracellular water causes cellular shrinkage associated with the anisotropic deformation of whole apple tissue. Interestingly, it is found that the deformation of apple tissue takes place at different stages of drying rather than deforming at one time. Moreover, it is found that the penetration rate of heat energy together with the pressure gradient between intracellular and intercellular environments is the responsible force to rupture the cell membrane.

Keywords: heat and mass transfer, food material, intracellular water, cell rupture, deformation

Procedia PDF Downloads 218
11523 Consumer Welfare in the Platform Economy

Authors: Prama Mukhopadhyay

Abstract:

Starting from transport to food, today’s world platform economy and digital markets have taken over almost every sphere of consumers’ lives. Sellers and buyers are getting connected through platforms, which is acting as an intermediary. It has made consumer’s life easier in terms of time, price, choice and other factors. Having said that, there are several concerns regarding platforms. There are competition law concerns like unfair pricing, deep discounting by the platforms which affect the consumer welfare. Apart from that, the biggest problem is lack of transparency with respect to the business models, how it operates, price calculation, etc. In most of the cases, consumers are unaware of how their personal data are being used. In most of the cases, they are unaware of how algorithm uses their personal data to determine the price of the product or even to show the relevant products using their previous searches. Using personal or non-personal data without consumer’s consent is a huge legal concern. In addition to this, another major issue lies with the question of liability. If a dispute arises, who will be responsible? The seller or the platform? For example, if someone ordered food through a food delivery app and the food was bad, in this situation who will be liable: the restaurant or the food delivery platform? In this paper, the researcher tries to examine the legal concern related to platform economy from the consumer protection and consumer welfare perspectives. The paper analyses the cases from different jurisdictions and approach taken by the judiciaries. The author compares the existing legislation of EU, US and other Asian Countries and tries to highlight the best practices.

Keywords: competition, consumer, data, platform

Procedia PDF Downloads 142
11522 A Structural Equation Model of Risk Perception of Rockfall for Revisit Intention

Authors: Ya-Fen Lee, Yun-Yao Chi

Abstract:

The study aims to explore the relationship between risk perceptions of rockfall and revisit intention using a Structural Equation Modelling (SEM) analysis. A total of 573 valid questionnaires are collected from travelers to Taroko National Park, Taiwan. The findings show the majority of travellers have the medium perception of rockfall risk, and are willing to revisit the Taroko National Park. The revisit intention to Taroko National Park is influenced by hazardous preferences, willingness-to-pay, obstruction and attraction. The risk perception has an indirect effect on revisit intention through influencing willingness-to-pay. The study results can be a reference for mitigation the rockfall disaster.

Keywords: risk perception, rockfall, revisit intention, structural equation modelling

Procedia PDF Downloads 434
11521 A Comparative Study of the Proposed Models for the Components of the National Health Information System

Authors: M. Ahmadi, Sh. Damanabi, F. Sadoughi

Abstract:

National Health Information System plays an important role in ensuring timely and reliable access to Health information which is essential for strategic and operational decisions that improve health, quality and effectiveness of health care. In other words, by using the National Health information system you can improve the quality of health data, information and knowledge used to support decision making at all levels and areas of the health sector. Since full identification of the components of this system for better planning and management influential factors of performance seems necessary, therefore, in this study, different attitudes towards components of this system are explored comparatively. Methods: This is a descriptive and comparative kind of study. The society includes printed and electronic documents containing components of the national health information system in three parts: input, process, and output. In this context, search for information using library resources and internet search were conducted and data analysis was expressed using comparative tables and qualitative data. Results: The findings showed that there are three different perspectives presenting the components of national health information system, Lippeveld, Sauerborn, and Bodart Model in 2000, Health Metrics Network (HMN) model from World Health Organization in 2008 and Gattini’s 2009 model. All three models outlined above in the input (resources and structure) require components of management and leadership, planning and design programs, supply of staff, software and hardware facilities, and equipment. In addition, in the ‘process’ section from three models, we pointed up the actions ensuring the quality of health information system and in output section, except Lippeveld Model, two other models consider information products, usage and distribution of information as components of the national health information system. Conclusion: The results showed that all the three models have had a brief discussion about the components of health information in input section. However, Lippeveld model has overlooked the components of national health information in process and output sections. Therefore, it seems that the health measurement model of network has a comprehensive presentation for the components of health system in all three sections-input, process, and output.

Keywords: National Health Information System, components of the NHIS, Lippeveld Model

Procedia PDF Downloads 420
11520 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems

Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia

Abstract:

The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.

Keywords: cloud computing, data management, multi-tenancy, requirements, security

Procedia PDF Downloads 156
11519 Language Factor in the Formation of National and Cultural Identity of Kazakhstan

Authors: Andabayeva Dina, Avakova Raushangul, Kortabayeva Gulzhamal, Rakhymbay Bauyrzhan

Abstract:

This article attempts to give an overview of the language situation and language planning in Kazakhstan. Statistical data is given and excursion to history of languages in Kazakhstan is done. Particular emphasis is placed on the national- cultural component of the Kazakh people, namely the impact of the specificity of the Kazakh language on ethnic identity. Language is one of the basic aspects of national identity. Recently, in the Republic of Kazakhstan purposeful work on language development has been conducted. Optimal solution of language problems is a factor of interethnic relations harmonization, strengthening and consolidation of the peoples and public consent. Development of languages - one of the important directions of the state policy in the Republic of Kazakhstan. The problem of the state language, as part of national (civil) identification play a huge role in the successful integration process of Kazakh society. And quite rightly assume that one of the foundations of a new civic identity is knowing Kazakh language by all citizens of Kazakhstan. The article is an analysis of the language situation in Kazakhstan in close connection with the peculiarities of cultural identity.

Keywords: Kazakhstan, mentality, language policy, ethnolinguistics, language planning, language personality

Procedia PDF Downloads 634
11518 An Inductive Study of Pop Culture Versus Visual Art: Redefined from the Lens of Censorship in Bangladesh

Authors: Ahmed Tahsin Shams

Abstract:

The right to dissent through any form of art has been facing challenges through various strict legal measures, particularly since 2018 when the Government of Bangladesh passed the Digital Security Act 2018 (DSA). Therefore, the references to ‘popular’ culture mostly include mainstream religious and national festivals and exclude critical intellectual representation of specific political allusions in any form of storytelling: whether wall art or fiction writing, since the post-DSA period in Bangladesh. Through inductive quantitative and qualitative methodological approaches, this paper aims to study the pattern of censorship, detention or custodial tortures against artists and the banning approach by the Bangladeshi government in the last five years, specifically against static visual arts, i.e., cartoon and wall art. The pattern drawn from these data attempts to redefine the popular notion of ‘pop culture’ as an unorganized folk or mass culture. The results also hypothesize how the post-DSA period forcefully constructs ‘pop culture’ as a very organized repetitive deception of enlightenment or entertainment. Thus the argument theorizes that this censoring trend is a fascist approach making the artists subaltern. So, in this socio-political context, these two similar and overlapping elements: culture and art, are vastly separated in two streams: the former being appreciated by the power, and the latter is a fearful concern for the power. Therefore, the purpose of art also shifts from entertainment to an act of rebellion, adding more layers to the new postmodern definition of ‘pop culture.’

Keywords: popular culture, visual arts, censoring trend, fascist approach, subaltern, digital security act

Procedia PDF Downloads 76
11517 Hybrid Control Strategy for Nine-Level Asymmetrical Cascaded H-Bridge Inverter

Authors: Bachir Belmadani, Rachid Taleb, M’hamed Helaimi

Abstract:

Multilevel inverters are well used in high power electronic applications because of their ability to generate a very good quality of waveforms, reducing switching frequency, and their low voltage stress across the power devices. This paper presents the hybrid pulse-width modulation (HPWM) strategy of a uniform step asymmetrical cascaded H-bridge nine-level Inverter (USACHB9LI). The HPWM approach is compared to the well-known sinusoidal pulse-width modulation (SPWM) strategy. Simulation results demonstrate the better performances and technical advantages of the HPWM controller in feeding a high power induction motor.

Keywords: uniform step asymmetrical cascaded h-bridge high-level inverter, hybrid pwm, sinusoidal pwm, high power induction motor

Procedia PDF Downloads 569
11516 The Islamic Grand Tour: The Case of Caravan Hajj Routes

Authors: Akram Atef Rawshdeh

Abstract:

This research aims to prove the role of Islamic pilgrimage caravans in formulating the concept of the tourism industry and the concept of Grand Tours before that which was found in Europe in the medieval and modern Ages, through its duration and the number of tourists who participated in it and its role in providing tourism services from the establishment of castles and inns that were built To accommodate pilgrims during their travels from different regions of the Islamic world to the holy places in Saudi Arabia, as well as food and beverage services, transportation and support services like tourist security and tourist guide services. This research will depend on the historical method

Keywords: grand tour, hajj caravan routes, tourism services, transportation

Procedia PDF Downloads 162
11515 The Model of Learning Centre on OTOP Production Process Based on Sufficiency Economic Philosophy for Sustainable Life Quality

Authors: Napasri Suwanajote

Abstract:

The purposes of this research were to analyse and evaluate successful factors in OTOP production process for the developing of learning centre on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality. The research has been designed as a qualitative study to gather information from 30 OTOP producers in Bangkontee District, Samudsongkram Province. They were all interviewed on 3 main parts. Part 1 was about the production process including 1) production 2) product development 3) the community strength 4) marketing possibility and 5) product quality. Part 2 evaluated appropriate successful factors including 1) the analysis of the successful factors 2) evaluate the strategy based on Sufficiency Economic Philosophy and 3) the model of learning centre on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality. The results showed that the production did not affect the environment with potential in continuing standard quality production. They used the raw materials in the country. On the aspect of product and community strength in the past 1 year, it was found that there was no appropriate packaging showing product identity according to global market standard. They needed the training on packaging especially for food and drink products. On the aspect of product quality and product specification, it was found that the products were certified by the local OTOP standard. There should be a responsible organization to help the uncertified producers pass the standard. However, there was a problem on food contamination which was hazardous to the consumers. The producers should cooperate with the government sector or educational institutes involving with food processing to reach FDA standard. The results from small group discussion showed that the community expected high education and better standard living. Some problems reported by the community included informal debt and drugs in the community. There were 8 steps in developing the model of learning centre on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality.

Keywords: production process, OTOP, sufficiency economic philosophy, marketing management

Procedia PDF Downloads 230
11514 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria

Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue

Abstract:

The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.

Keywords: personal variables, students, perception, school security

Procedia PDF Downloads 77
11513 Monitoring the Effect of Deep Frying and the Type of Food on the Quality of Oil

Authors: Omar Masaud Almrhag, Frage Lhadi Abookleesh

Abstract:

Different types of food like banana, potato and chicken affect the quality of oil during deep fat frying. The changes in the quality of oil were evaluated and compared. Four different types of edible oils, namely, corn oil, soybean, canola, and palm oil were used for deep fat frying at 180°C ± 5°C for 5 h/d for six consecutive days. A potato was sliced into 7-8 cm length wedges and chicken was cut into uniform pieces of 100 g each. The parameters used to assess the quality of oil were total polar compound (TPC), iodine value (IV), specific extinction E1% at 233 nm and 269 nm, fatty acid composition (FAC), free fatty acids (FFA), viscosity (cp) and changes in the thermal properties. Results showed that, TPC, IV, FAC, Viscosity (cp) and FFA composition changed significantly with time (P< 0.05) and type of food. Significant differences (P< 0.05) were noted for the used parameters during frying of the above mentioned three products.

Keywords: frying potato, chicken, frying deterioration, quality of oil

Procedia PDF Downloads 419
11512 Radio Frequency Identification Encryption via Modified Two Dimensional Logistic Map

Authors: Hongmin Deng, Qionghua Wang

Abstract:

A modified two dimensional (2D) logistic map based on cross feedback control is proposed. This 2D map exhibits more random chaotic dynamical properties than the classic one dimensional (1D) logistic map in the statistical characteristics analysis. So it is utilized as the pseudo-random (PN) sequence generator, where the obtained real-valued PN sequence is quantized at first, then applied to radio frequency identification (RFID) communication system in this paper. This system is experimentally validated on a cortex-M0 development board, which shows the effectiveness in key generation, the size of key space and security. At last, further cryptanalysis is studied through the test suite in the National Institute of Standards and Technology (NIST).

Keywords: chaos encryption, logistic map, pseudo-random sequence, RFID

Procedia PDF Downloads 396
11511 Central American Security Issue: Civil War Legacy and Contemporary Challenges

Authors: Olga Andrianova, Lazar Jeifets

Abstract:

The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.

Keywords: Central America, insecurity, instability, post-war countries, violence

Procedia PDF Downloads 471
11510 The Relationships between Autonomy-Based Insula Activity and Learning: A Functional Magnetic Resonance Imaging Study

Authors: Woogul Lee, Johnmarshall Reeve

Abstract:

Learners’ perceived autonomy predicts learners’ interest, engagement, and learning. To understand these processes, we conducted an fMRI experiment. In this experiment, participants saw the national flag and were asked to rate how much they freely wanted to learn about that particular national flag. The participants then learned the characteristics of the national flag. Results showed that (1) the degree of participants’ perceived autonomy was positively correlated with the degree of insula activity, (2) participants’ early-trial insula activity predicted corresponding late-trial dorsolateral prefrontal cortex activity, and (3) the degree of dorsolateral prefrontal cortex activity was positively correlated with the degree of participants’ learning about the characteristics of the national flag. Results suggest that learners’ perceived autonomy predicts learning through the mediation of insula activity associated with intrinsic satisfaction and 'pure self' processes.

Keywords: insular cortex, autonomy, self-determination, dorsolateral prefrontal cortex

Procedia PDF Downloads 201
11509 The Strategic Engine Model: Redefined Strategy Structure, as per Market-and Resource-Based Theory Application, Tested in the Automotive Industry

Authors: Krassimir Todorov

Abstract:

The purpose of the paper is to redefine the levels of structure of corporate, business and functional strategies that were established over the past several decades, to a conceptual model, consisting of corporate, business and operations strategies, that are reinforced by functional strategies. We will propose a conceptual framework of different perspectives in the role of strategic operations as a separate strategic place and reposition the remaining functional strategies as supporting tools, existing at all three levels. The proposed model is called ‘the strategic engine’, since the mutual relationships of its ingredients are identical with main elements and working principle of the internal combustion engine. Based on theoretical essence, related to every strategic level, we will prove that the strategic engine model is useful for managers seeking to safeguard the competitive advantage of their companies. Each strategy level is researched through its basic elements. At the corporate level we examine the scope of firm’s product, the vertical and geographical coverage. At the business level, the point of interest is limited to the SWOT analysis’ basic elements. While at operations level, the key research issue relates to the scope of the following performance indicators: cost, quality, speed, flexibility and dependability. In this relationship, the paper provides a different view for the role of operations strategy within the overall strategy concept. We will prove that the theoretical essence of operations goes far beyond the scope of traditionally accepted business functions. Exploring the applications of Resource-based theory and Market-based theory within the strategic levels framework, we will prove that there is a logical consequence of the theoretical impact in corporate, business and operations strategy – at every strategic level, the validity of one theory is substituted to the level of the other. Practical application of the conceptual model is tested in automotive industry. Actually, the proposed theoretical concept is inspired by a leading global automotive group – Inchcape PLC, listed on the London Stock Exchange, and constituent of the FTSE 250 Index.

Keywords: business strategy, corporate strategy, functional strategies, operations strategy

Procedia PDF Downloads 173
11508 Design of Low-Maintenance Sewer Pump Stations with High-Security Measures for Municipal Applications

Authors: H. V. Smit, V. H. J. de Wet

Abstract:

South African municipalities are dealing with aging and dilapidated infrastructure while faced with challenges in the form of expanding informal settlements, vandalism, theft, and a lack of maintenance which place even more pressure on existing infrastructure. The existing infrastructure was never designed to cater to these challenges, and this becomes evident when evaluating the current state of many municipal sewer pump stations. A need has thus arisen to develop a sewer pump station design concept that will address these challenges and allow for a long-term sustainable solution. This article deals with the design concepts which have been developed for sewer pump stations for an effective reduction in maintenance, improved grit handling, improvement to the operation and maintenance working conditions, and the adoption of high-security design philosophy.

Keywords: high security, low maintenance, municipal application, sewer pump station

Procedia PDF Downloads 106
11507 Robots for City Life: Design Guidelines and Strategy Recommendations for Introducing Robots in Cities

Authors: Akshay Rege, Lara Gomaa, Maneesh Kumar Verma, Sem Carree

Abstract:

The aim of this paper is to articulate design strategies and recommendations for introducing robots into the city life of people based on experiments conducted with robots and semi-autonomous systems in three cities in the Netherlands. This research was carried out by the Spot robotics team of Impact Lab housed within YES!Delft, a start-up accelerator located in Delft, The Netherlands. The premise of this research is to inform the development of the ‘region of the future’ by the Municipality of Rotterdam-Den Haag (MRDH). The paper starts by reporting the desktop research carried out to find and develop multiple use cases for robots to support humans in various activities. Further, the paper reports the user research carried out by crowdsourcing responses collected in public spaces of Rotterdam-Den Haag region and on the internet. Furthermore, based on the knowledge gathered in the initial research, practical experiments were carried out using robots and semi-autonomous systems in order to test and validate our initial research. These experiments were conducted in three cities in the Netherlands which were Rotterdam, The Hague, and Delft. Custom sensor box, Drone, and Boston Dynamics' Spot robot were used to conduct these experiments. Out of thirty use cases, five were tested with experiments which were skyscraper emergency evacuation, human transportation and security, bike lane delivery, mobility tracking, and robot drama. The learnings from these experiments provided us with insights into human-robot interaction and symbiosis in cities which can be used to introduce robots in cities to support human activities, ultimately enabling the transitioning from a human only city life towards a blended one where robots can play a role. Based on these understandings, we formulated design guidelines and strategy recommendations for incorporating robots in the Rotterdam-Den Haag’s region of the future. Lastly, we discuss how our insights in the Rotterdam-Den Haag region can inspire and inform the incorporation of robots in different cities of the world.

Keywords: city life, design guidelines, human-robot Interaction, robot use cases, robotic experiments, strategy recommendations, user research

Procedia PDF Downloads 96
11506 Evolving Maritime Geopolitics of the Indo-Pacific

Authors: Pragya Pandey

Abstract:

A major discussion in the 21st -century international affairs has been around the shifting economic and political center of gravity to Asia. In the maritime realm, it translates into a shift in focus from the Atlantic to the Pacific-Indian Ocean region or what is now popularly called the Indo-Pacific region. The Indo-Pacific is rapidly eclipsing once dominant Asia-Pacific as center of trade, investment, competition and cooperation. The growing inter-connectivity between the Indian Ocean and the Pacific Ocean is bringing forth the ‘confluence of the two seas’. Therefore, the Indo-Pacific strategic arc is acquiring greater salience in consonance with the changing realities of the time. The region is undergoing unprecedented transformation in its security outlook. At present, the region is at an interesting historic epoch- witnessing the simultaneous rise India and China, their economic growth, naval modernization and power projection capabilities, alongside the continued presence of the United States, particularly with its rebalancing strategy. Besides the interplay among the three major stakeholders, other regional players like Japan, Australia, and Indonesia, would play a crucial role in the geopolitical re-arrangement of the Indo-Pacific region. The region will be the future theater of activities to determine the shifts and distribution of sea power, by the virtue of its strategic location, intrinsic value of the energy resources and significant maritime trade routes of the region. Therefore, the central theme of the paper would be to scrutinize the maritime security environment of the region against the backdrop of the tricky geopolitical landscape, contributing to the change in the regional and global balance of power.

Keywords: China, geopolitics, India, United States

Procedia PDF Downloads 258