Search results for: logit regression model and food security
22217 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 29722216 In a Situation of Great Distress: Cross Border Migration and the Quest for Enduring Security in North-East Nigeria
Authors: Nuhu Bitrus Mailabari
Abstract:
Nigeria is a highly multifarious nation trapped between affluence and affliction. On one hand, the state has vast territorial size, economic strength, relative internal cohesion, and good external linkages. On the other, it is bedeviled with enormous challenges. It is common knowledge that the North-East geo-political zone has suffered colossal destruction for the most part of the last ten years due to the activities of the insurgent group Boko Haram. Several factors (political, economic, religious, socio-cultural) have been credited with the heightened insecurity in the region. Without a doubt, the security crisis in the region has rekindled several discussions critical to Nigeria’s security architecture. However, the debate on finding an enduring solution to the devastation in the North East continually neglects the nexus between cross border migration and national security. Using content analysis, this paper debates two main issues that continue to affect security in the North East. One, the cumulative impact of the Economic Community of West African States (ECOWAS) protocol on the free movement of people and goods. Two, the porous nature of Nigeria’s borders. Theoretically, the paper will rely on the systems theory because of its broad focus on structure, linkage, and process. The work concludes in twofold. First, that cross border migration and poor border management processes further worsened the political and socio-economic conditions of a region that is already in a bad state. Secondly, in addition to the existing strategies, Nigeria must develop a holistic approach including new methods of handling cross border movements in solving the security issues.Keywords: border, cross border, migration, Nigeria, northeast region, security
Procedia PDF Downloads 16422215 Food Preference of Monomorium Destructor
Authors: Ussawit Srisakrapikoop, Art-Ong Pradatsundarasar, Duangkhae Sitthicharoenchai
Abstract:
Monomorium destructor or Singapore ant is one of the common household pests. It causes nuisance and damage to household. Due to the fact that there are many queens in one colony (polygyny), so this ant can quickly increase its population in a short time in the urban environment. This study has been conducted at Faculty of Science, Chulalongkorn University in the field condition. Ant food preference was conducted for 3 replicates per month by using six food choices including 20% sucrose solution, 20% sucrose agar, pork liver, smashed pork liver, pork fat and lard. The number of ants of each bait choice was counted and the orders of ant accessing baits were also recorded. The results showed that the 20% sucrose agar was the most attractive significantly following by pork liver and pork fat. The ants also most accessed to the pork liver bait choice in the first place. It can be suggested that the ant control by baiting should consist of mixture of carbohydrate, protein and lipid in solid form with suitable ratios.Keywords: baits, food preference, monomorium destructor, Singapore ant
Procedia PDF Downloads 25522214 Assortative Education and Working Arrangement among Married Couples in Indonesia
Authors: Ratu Khabiba, Qisha Quarina
Abstract:
This study aims to analyse the effect of married couples’ assortative educational attainments on the division of economic activities among themselves in the household. This study contributes to the literature on women’s participation in employment, especially among married women, to see whether the traditional values about gender roles in the household still continue to shape the employment participation among married women in Indonesia, despite increasing women’s human capital through education. This study utilizes the Indonesian National Socioeconomic Survey (SUSENAS) 2016 and estimates the results using the multinomial logit model. Our results show that compared to high-educated educational homogamy couples, educational heterogamy couples, especially hypergamy, have a higher probability of being a single-worker type. Moreover, the high-educated educational homogamy couples have the highest probability of being a dual-worker type. Thus, we found evidence that the traditional values of gender role segregation seem to still play a significant role in married women’s employment decision in Indonesia, particularly for couples’ with educational heterogamy and low-educated educational homogamy couples.Keywords: assortative education, dual-worker, hypergamy, homogamy, traditional values, women labor participation
Procedia PDF Downloads 11722213 The Impact of Undocumented Migration on Human Security in Northern Nigeria
Authors: Targba Aondowase
Abstract:
Undocumented migration along Nigeria’s boarder with Cameroon, Chad and Niger is a key issue in tackling the human security challenges in the region as the security situation cannot be contained without proper boarder control. The paper adopts migration systems theory which asserts that migration alters the social, cultural, economic, and institutional conditions at both the sending and receiving ends to explain the influence of unregistered migrants on institutional changes as it affects the security situation in Northern Nigeria. It was found that undocumented migration is majorly influenced by poverty, illegal trade, wars and asylum. The study also discovers that Nigerian boarders are porous with over 250 footpaths that link directly to Cameroon, Chad and Niger, making the proliferation of small arms and light weapons a transnational organized crime in the region. These porous borders are unmanned by security operatives with limited government presence in the boarder communities. The study also found that undocumented immigrants are easily integrated into the northern communities due to common religious beliefs and race where they carry out normal and civic functions without obstruction. The paper concluded that the level of undocumented migration in Northern Nigeria is high due to unmanned and porous borders. The paper therefore recommended that the security agencies should be strengthened through adequate funding, innovative technology, sound policies and proficient processes that will help protect the country’s borders. The National Populations Commission and the National Identity Management Commission should be strengthened to have a good data base of the country’s citizens and there should be international cooperation between the neighbouring countries to tackle illegal migration and illegal trade along the borders. The findings and recommendations of this paper will serve as a guide towards curtailing the impact of undocumented migration on human security in Northern Nigeria.Keywords: human security, impact, migration, undocumented
Procedia PDF Downloads 33422212 Separating Landform from Noise in High-Resolution Digital Elevation Models through Scale-Adaptive Window-Based Regression
Authors: Anne M. Denton, Rahul Gomes, David W. Franzen
Abstract:
High-resolution elevation data are becoming increasingly available, but typical approaches for computing topographic features, like slope and curvature, still assume small sliding windows, for example, of size 3x3. That means that the digital elevation model (DEM) has to be resampled to the scale of the landform features that are of interest. Any higher resolution is lost in this resampling. When the topographic features are computed through regression that is performed at the resolution of the original data, the accuracy can be much higher, and the reported result can be adjusted to the length scale that is relevant locally. Slope and variance are calculated for overlapping windows, meaning that one regression result is computed per raster point. The number of window centers per area is the same for the output as for the original DEM. Slope and variance are computed by performing regression on the points in the surrounding window. Such an approach is computationally feasible because of the additive nature of regression parameters and variance. Any doubling of window size in each direction only takes a single pass over the data, corresponding to a logarithmic scaling of the resulting algorithm as a function of the window size. Slope and variance are stored for each aggregation step, allowing the reported slope to be selected to minimize variance. The approach thereby adjusts the effective window size to the landform features that are characteristic to the area within the DEM. Starting with a window size of 2x2, each iteration aggregates 2x2 non-overlapping windows from the previous iteration. Regression results are stored for each iteration, and the slope at minimal variance is reported in the final result. As such, the reported slope is adjusted to the length scale that is characteristic of the landform locally. The length scale itself and the variance at that length scale are also visualized to aid in interpreting the results for slope. The relevant length scale is taken to be half of the window size of the window over which the minimum variance was achieved. The resulting process was evaluated for 1-meter DEM data and for artificial data that was constructed to have defined length scales and added noise. A comparison with ESRI ArcMap was performed and showed the potential of the proposed algorithm. The resolution of the resulting output is much higher and the slope and aspect much less affected by noise. Additionally, the algorithm adjusts to the scale of interest within the region of the image. These benefits are gained without additional computational cost in comparison with resampling the DEM and computing the slope over 3x3 images in ESRI ArcMap for each resolution. In summary, the proposed approach extracts slope and aspect of DEMs at the lengths scales that are characteristic locally. The result is of higher resolution and less affected by noise than existing techniques.Keywords: high resolution digital elevation models, multi-scale analysis, slope calculation, window-based regression
Procedia PDF Downloads 12622211 Lifestyle Factors Associated With Overweight/obesity Status In Croatian Adolescents: A Population-Based Study
Authors: Lovro Štefan
Abstract:
The main purpose of the present study was to investigate the associations between the overweight/obesity status and lifestyle factors. In this cross-sectional study, participants were 1950 urban secondary-school students (54.7% of female students) aged 17-18 years old. Dependent variable was body-mass index status derived from self-reported height and weight. The outcome was binarised, where participants with value <25 kg/m2 were collapsed into „normal“, while those ≥25 kg/m2 into „overweight/obesity“ category. Independent variables were gender, type of school, physical activity, sedentary behaviour, self-rated health, self-perceived socioeconomic status and psychological distress. The associations between the dependent and independent variables were analyzed by using multiple logistic regression analysis. In the univariate model, being overweight/obese was significantly associated with being a male student (OR 0.31; 95% CI 0.23 to 0.42), attending a vocational school (OR 1.87; 95% CI 1.42 to 2.48), not meeting the recommendations for moderate-to-vigorous physical activity (OR 0.44; 95% CI 0.22 to 0.88), more time spending in sedentary behaviour (OR 1.53; 95% CI 1.07 to 2.19), poor self-rated health (OR 0.35, 95% CI 0.20 to 0.56) and lower socioeconomic status (OR 0.63; 95% CI 0.48 to 0.84). In the multivariate model, the same associations occured between the dependent and independent variable. In both models, psychological distress was not associated with being overweight/obese. In conclusion, our findings suggest, that lifestyle factors are independently associated with body-mass indexKeywords: body mass index, secondary-school students, Croatia, physical activity, sedentary behaviour, logistic regression
Procedia PDF Downloads 8822210 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East
Authors: Zahra Bakhtiari
Abstract:
Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy
Procedia PDF Downloads 8022209 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 28222208 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 43622207 Automating and Optimization Monitoring Prognostics for Rolling Bearing
Authors: H. Hotait, X. Chiementin, L. Rasolofondraibe
Abstract:
This paper presents a continuous work to detect the abnormal state in the rolling bearing by studying the vibration signature analysis and calculation of the remaining useful life. To achieve these aims, two methods; the first method is the classification to detect the degradation state by the AOM-OPTICS (Acousto-Optic Modulator) method. The second one is the prediction of the degradation state using least-squares support vector regression and then compared with the linear degradation model. An experimental investigation on ball-bearing was conducted to see the effectiveness of the used method by applying the acquired vibration signals. The proposed model for predicting the state of bearing gives us accurate results with the experimental and numerical data.Keywords: bearings, automatization, optimization, prognosis, classification, defect detection
Procedia PDF Downloads 11722206 Scientometrics Analysis of Food Supply Chain Risk Assessment Literature: Based On Web of Science Record 1996-2014
Authors: Mohsen Shirani, Shadi Asadzandi, Micaela Demichela
Abstract:
This paper presents the results of a study to assess crucial aspects and the strength of the scientific basis of a typically interdisciplinary, applied field: food supply chain risk assessment research. Our approach is based on an advanced scientometrics analysis with novel elements to assess the influence and dissemination of research results and to measure interdisciplinary. This paper aims to describe the quantity and quality of the publication trends in food supply chain risk assessment. The population under study was composed of 266 articles from database web of science. The results were analyzed based on date of publication, type of document, language of the documents, source of publications, subject areas, authors and their affiliations, and the countries involved in developing the articles.Keywords: food supply chain, risk assessment, scientometrics, web of science
Procedia PDF Downloads 49422205 Foreign Investment, Technological Diffusion and Competiveness of Exports: A Case for Textile Industry in Pakistan
Authors: Syed Toqueer Akhter, Muhammad Awais
Abstract:
Pakistan is a country which is gifted by naturally abundant resources these resources are a pioneer towards a prospect and developed country. Pakistan is the fourth largest exporter of the textile in the world and with the passage of time the competitiveness of these exports is subject to a decline. With a lot of International players in the textile world like China, Bangladesh, India, and Sri Lanka, Pakistan needs to put up a lot of effort to compete with these countries. This research paper would determine the impact of Foreign Direct Investment upon technological diffusion and that how significantly it may be affecting on export performance of the country. It would also demonstrate that with the increase in Foreign Direct Investment, technological diffusion, strong property rights, and using different policy tools, export competitiveness of the country could be improved. The research has been carried out using time series data from 1995 to 2013 and the results have been estimated by using competing Econometrics modes such as Robust regression and Generalized least squares so that to consolidate the impact of the Foreign Investments and Technological diffusion upon export competitiveness comprehensively. Distributed Lag model has also been used to encompass the lagged effect of policy tools variables used by the government. Model estimates entail that 'FDI' and 'Technological Diffusion' do have a significant impact on the competitiveness of the exports of Pakistan. It may also be inferred that competitiveness of Textile Sector requires integrated policy framework, primarily including the reduction in interest rates, providing subsides, and manufacturing of value added products.Keywords: high technology export, robust regression, patents, technological diffusion, export competitiveness
Procedia PDF Downloads 49522204 Examining the Acceptability of Destination Local Food by Domestic Tourist Visiting Northern Nigeria
Authors: Eldah Ephraim Buba, Jamila Mohammed Waziri
Abstract:
There are challenges faced by tourist in respect of choosing food while in tourism destination. Food is very important in the choice of holiday of tourist. Many tourists choose a destination not only because of physical attraction but they choose destination where they will not encounter challenges in respect to food. The study is aimed at examining the acceptability of northern delicacies by tourists from other parts of Nigeria. Six delicacies were produced and presented to 50 tourists who are randomly picked from the south-east, south-west, south-south and the middle belt of Nigeria. The study found out that Danwake, Masa, and Kwadon zogale were generally accepted by majority of the respondents. Although, the respondents were not comfortable with the appearance of danwake, other aspect of the checklist was accepted. Tuwon shinkafa miyan taushe was accepted in terms of appearance but rejected in terms of taste and texture. ‘Yar Tsame and dindikolo were generally rejected. The study recommended that caterers, attraction owners and hoteliers should include such meals in their menu so that tourist will enjoy the gastronomy of the northern part of Nigeria.Keywords: acceptability, examination, food, tourism
Procedia PDF Downloads 38522203 Sustainability through Resilience: How Emergency Responders Cope with Stressors
Authors: Sophie Kroeling, Agnetha Schuchardt
Abstract:
Striving for sustainability brings a lot of challenges for different fields of interest, e. g. security or health concerns. In Germany, civil protection is predominantly carried out by emergency responders who perform essential tasks of civil protection. Based on theoretical concepts of different psychological stress theories this contribution focuses on the question, how the resilience of emergency responders can be improved. The goal is to identify resources and successful coping strategies that help to prevent and reduce negative outcomes during or after stressful events. The paper will present results from a qualitative analysis of semi-structured qualitative interviews with 20 emergency responders. These results provide insights into the complexity of coping processes (e. g. controlling the situation, downplaying perceived personal threats through humor) and show the diversity of stressors (like complexity of the disastrous situation, intrusive press and media, or lack of social support within the organization). Self-efficacy expectation was a very important resource for coping with stressful situations. The results served as a starting point for a quantitative survey (that was conducted in March 2017), the development of education and training tools for emergency responders and the improvement of critical incident stress management processes. First results from the quantitative study with more than 700 participants show that, e. g., the emergency responders use social coping within their private social network and also within their aid organization and that both are correlated to resilience. Moreover, missing information, bureaucratic problems and social conflicts within the organization are events that the majority of the participants considered very onerous. Further results from regression analysis will be presented. The proposed paper will combine findings from the qualitative study with the quantitative results, illustrating figures and correlations with respective statements from the interviews. At the end, suggestions for the improvement of the emergency responder’s resilience are given and it is discussed how this can make a contribution to strive for civil security and furthermore a sustainable development.Keywords: civil security, emergency responders, stress, resilience, resources
Procedia PDF Downloads 14322202 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 33922201 Assessment of the Bataan Peninsula State University Food Technology Situation
Authors: Rosemarie P. Ongoco, Rowena S. Badua, Kristine Joy S. Simpao, Ria L. Dizon
Abstract:
Food Technology (FT) has become a very powerful field in dealing with the processing of food making it available, safe, tasty and convenient. Bataan Peninsula State University (BPSU) has been offering FT as a major of the Bachelor of Science in Industrial Technology, both in the Main and Orani campuses since the 1970s. With the different orientation of FT offered in state universities and colleges, whether it is skill or science-based, this study aims to assess the current FT situation in BPSU. Curriculum, faculty profile and facilities of FT in BPSU were assessed and compared to the other FT related program in three state universities in Region III; Nueva Ecija University of Science and Technology, Pampanga Agricultural College, and Central Luzon State University. Data were gathered through structured interview, ocular inspection for the facilities and questionnaires for the teacher and students’ personal interest. Results show that BPSU’s FT program is more likely similar to the one offered in NEUST. PAC is offering a similar course but is more business and management-oriented BS Home Economics while CLSU is offering a science and technology-related course, BS Home Economics while CLSU is offering a science and technology-related course, BS Food Technology. BPSU students more intercede in cooking and baking while doing sales report, dishwashing and food packaging are the activities faculty and students are least interested. Mechanized machines in cooking and baking are also suggested by the majority of the students in BPSU. In conclusion, BPSU’s program in BS IT major in Food Technology must be improved in the aspects of curriculum, faculty profile, and facilities. It is recommended for the department to consider the curriculum, faculty profile, and facilities. It is recommended for the department to consider the curriculum of NEUST in the BS IT major in Food Technology.Keywords: food technology, curriculum, technology, assessment
Procedia PDF Downloads 34422200 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 64222199 The Determination of Contamination Rate of Traditional White Cheese in Behbahan Markets to Coliforms and Pathogenic Escherichia Coli
Authors: Sana Mohammad Jafar, Hossaini Seyahi Zohreh
Abstract:
Infections and food intoxication caused by microbial contamination of food is of major issues in different countries, and diseases caused by the consumption of contaminated food included a large percentage of the country's health problems. Since traditional cheese for cultural reasons, good taste and smell in many parts of the area still has the important place in people's food basket, transmission of pathogenic bacteria could be at risk human health through the consumption of this food. In this study selected randomly 100 samples of 250 grams of traditional cheeses supplied in the city Behbahan market and adjacent to the ice was transferred to the laboratory and microbiological tests were performed immediately. According to the results, from 100 samples tested traditional cheese, 94 samples (94% of samples) were contaminated with coliforms, which of this number 75 samples (75% of samples) the contamination rate was higher than the limit (more than 100 cfu/g). Of the total samples, 36 samples (36% of samples) were contaminated with fecal coliform which of this number 30 samples (30% of samples) were contaminated with Escherichia.coli bacteria. Based on the results of agglutination test,no samples was found positive as pathogenic Escherichia.coli.Keywords: determination, traditional cheese, Behbahan, Escherichia coli
Procedia PDF Downloads 50222198 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 43422197 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 4722196 Plant Genetic Diversity in Home Gardens and Its Contribution to Household Economy in Western Part of Ethiopia
Authors: Bedilu Tafesse
Abstract:
Home gardens are important social and cultural spaces where knowledge related to agricultural practice is transmitted and through which households may improve their income and livelihood. High levels of inter- and intra-specific plant genetic diversity are preserved in home gardens. Plant diversity is threatened by rapid and unplanned urbanization, which increases environmental problems such as heating, pollution, loss of habitats and ecosystem disruption. Tropical home gardens have played a significant role in conserving plant diversity while providing substantial benefits to households. This research aimed to understand the relationship between household characteristics and plant diversity in western Ethiopia home gardens and the contributions of plants to the household economy. Plant diversity and different uses of plants were studied in a random sample of 111 suburban home gardens in the Ilu Ababora, Jima and Wellega suburban area, western Ethiopia, based on complete garden inventories followed by household surveys on socio-economic status during 2012. A total of 261 species of plants were observed, of which 41% were ornamental plants, 36% food plants, and 22% medicinal plants. Of these 16% were sold commercially to produce income. Avocado, bananas, and other fruits produced in excess. Home gardens contributed the equivalent of 7% of total annual household income in terms of food and commercial sales. Multiple regression analysis showed that education, time spent in gardening, land for cultivation, household expenses, primary conservation practices, and uses of special techniques explained 56% of the total plant diversity. Food, medicinal and commercial plant species had significant positive relationships with time spent gardening and land area for gardening. Education and conservation practices significantly affected food and medicinal plant diversity. Special techniques used in gardening showed significant positive relations with ornamental and commercial plants. Reassessments in different suburban and urban home gardens and proper documentation using same methodology is essential to build a firm policy for enhancing plant diversity and related values to households and surroundings.Keywords: plant genetic diversity, urbanization, suburban home gardens, Ethiopia
Procedia PDF Downloads 30222195 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 14222194 Sarvathobhadram-Organic Initiative: Cooperative Model for Resilient Agriculture by Adopting System of Rice Intensification
Authors: Sreeni K. R.
Abstract:
Sarvathobhadram-Organic–Farmers Cooperative was helpful in supporting small and marginal farmers in customizing, adapting, and tailoring the system to their specific requirements. The Farmers Club, which has 50 members, was founded in May 2020 to create additional cash while also encouraging farmers to shift to organic farming. The club's mission is to ensure food security, livelihood, and entrepreneurship in the Anthikad Block Panchayat. The project addressed climate change and resilience, collaborating with government departments and utilizing convergence to maximize the schemes accessible to farmers in panchayath. The transformation was sluggish initially, but it accelerated over time, indicating that farmers have variable levels of satisfaction based on a variety of circumstances. This paper examines the changing trend in the area after adopting organic farming using the SRI method, the increase in production, and the success of the convergence method. It also attempts to find out various constraints faced by farmers during the paradigm shift from conventional methods to organic, and the results have proven that SRI should be considered as a potential cultivation method for all farmer's groups (Padasekharam).Keywords: Sarvathobhadram-Organic, Thanniyam gram Panchayat, organic Joythi rice, convergence method, Jeevamirtham, natural methods, system of rice intensification
Procedia PDF Downloads 14222193 Ecological Concerns in Food Systems: An Ethnographical Approach on Vegan Impact in Governmentality
Authors: Jessica Gonzalez
Abstract:
Veganism, along with different types of vegetarianism, consists in the abstinence of animal products. Far from being only an alimentary regulation, it stands as a political posture against the food industry generating itself a set of beliefs, prohibitions, and attitudes that compel the individual to a reevaluation of his obligations towards the environment. Veganism defends animal rights and at the same time reinforces a different conception of natural resources embodying it in alimentary restrictions. These practices emerge in the context of alimentary modernity, which is characterized by bringing new concerns to the consumer. An increased skepticism towards the government ability to protect food supply; a notable distrust toward the market guaranties on providing safe food with sustainable techniques and the desire to react to the neoliberal forms of exploitation are some of its consequences of this phenomenon. This study aims to approach the concept of governmentality as a coproduced system of legitimized practices and knowledge, formed by the interaction of the different actors that are involved. In a scenario where the State seems to retreat from centralized regulation of food production giving up importance to citizens, dietary consultants, farmers, and stockbreeders, veganism plays its role on the conformation of distinctive forms of environmentalism, nature rights and responses to ecological crisis. The ethnographic method allows observing the mechanisms of interaction of consumers and discourses with the mainstream food system, providing evidence about the means of generation of new conceptions about nature and the environment. The paper focuses on how the dietary restrictions, consumption patterns and public discourses of vegans in Barcelona impact local consumption, demonstrating its relevance as a mechanism that associates particular concerns about food with political economy.Keywords: animal rights, environmentalism, food system, governmentality, veganism
Procedia PDF Downloads 12722192 Development of a Multi-User Country Specific Food Composition Table for Malawi
Authors: Averalda van Graan, Joelaine Chetty, Malory Links, Agness Mwangwela, Sitilitha Masangwi, Dalitso Chimwala, Shiban Ghosh, Elizabeth Marino-Costello
Abstract:
Food composition data is becoming increasingly important as dealing with food insecurity and malnutrition in its persistent form of under-nutrition is now coupled with increasing over-nutrition and its related ailments in the developing world, of which Malawi is not spared. In the absence of a food composition database (FCDB) inherent to our dietary patterns, efforts were made to develop a country-specific FCDB for nutrition practice, research, and programming. The main objective was to develop a multi-user, country-specific food composition database, and table from existing published and unpublished scientific literature. A multi-phased approach guided by the project framework was employed. Phase 1 comprised a scoping mission to assess the nutrition landscape for compilation activities. Phase 2 involved training of a compiler and data collection from various sources, primarily; institutional libraries, online databases, and food industry nutrient data. Phase 3 subsumed evaluation and compilation of data using FAO and IN FOODS standards and guidelines. Phase 4 concluded the process with quality assurance. 316 Malawian food items categorized into eight food groups for 42 components were captured. The majority were from the baby food group (27%), followed by a staple (22%) and animal (22%) food group. Fats and oils consisted the least number of food items (2%), followed by fruits (6%). Proximate values are well represented; however, the percent missing data is huge for some components, including Se 68%, I 75%, Vitamin A 42%, and lipid profile; saturated fat 53%, mono-saturated fat 59%, poly-saturated fat 59% and cholesterol 56%. A multi-phased approach following the project framework led to the development of the first Malawian FCDB and table. The table reflects inherent Malawian dietary patterns and nutritional concerns. The FCDB can be used by various professionals in nutrition and health. Rising over-nutrition, NCD, and changing diets challenge us for nutrient profiles of processed foods and complete lipid profiles.Keywords: analytical data, dietary pattern, food composition data, multi-phased approach
Procedia PDF Downloads 9322191 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm
Authors: Vahid Bayrami Rad
Abstract:
Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.Keywords: arduino board, artificial intelligence, image processing, solenoid lock
Procedia PDF Downloads 6622190 Spatial Differentiation Patterns and Influencing Mechanism of Urban Greening in China: Based on Data of 289 Cities
Authors: Fangzheng Li, Xiong Li
Abstract:
Significant differences in urban greening have occurred in Chinese cities, which accompanied with China's rapid urbanization. However, few studies focused on the spatial differentiation of urban greening in China with large amounts of data. The spatial differentiation pattern, spatial correlation characteristics and the distribution shape of urban green space ratio, urban green coverage rate and public green area per capita were calculated and analyzed, using Global and Local Moran's I using data from 289 cities in 2014. We employed Spatial Lag Model and Spatial Error Model to assess the impacts of urbanization process on urban greening of China. Then we used Geographically Weighted Regression to estimate the spatial variations of the impacts. The results showed: 1. a significant spatial dependence and heterogeneity existed in urban greening values, and the differentiation patterns were featured by the administrative grade and the spatial agglomeration simultaneously; 2. it revealed that urbanization has a negative correlation with urban greening in Chinese cities. Among the indices, the the proportion of secondary industry, urbanization rate, population and the scale of urban land use has significant negative correlation with the urban greening of China. Automobile density and per capita Gross Domestic Product has no significant impact. The results of GWR modeling showed that the relationship between urbanization and urban greening was not constant in space. Further, the local parameter estimates suggested significant spatial variation in the impacts of various urbanization factors on urban greening.Keywords: China’s urbanization, geographically weighted regression, spatial differentiation pattern, urban greening
Procedia PDF Downloads 45922189 Support Vector Regression for Retrieval of Soil Moisture Using Bistatic Scatterometer Data at X-Band
Authors: Dileep Kumar Gupta, Rajendra Prasad, Pradeep Kumar, Varun Narayan Mishra, Ajeet Kumar Vishwakarma, Prashant K. Srivastava
Abstract:
An approach was evaluated for the retrieval of soil moisture of bare soil surface using bistatic scatterometer data in the angular range of 200 to 700 at VV- and HH- polarization. The microwave data was acquired by specially designed X-band (10 GHz) bistatic scatterometer. The linear regression analysis was done between scattering coefficients and soil moisture content to select the suitable incidence angle for retrieval of soil moisture content. The 250 incidence angle was found more suitable. The support vector regression analysis was used to approximate the function described by the input-output relationship between the scattering coefficient and corresponding measured values of the soil moisture content. The performance of support vector regression algorithm was evaluated by comparing the observed and the estimated soil moisture content by statistical performance indices %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE). The values of %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE) were found 2.9451, 1.0986, and 0.9214, respectively at HH-polarization. At VV- polarization, the values of %Bias, root mean squared error (RMSE) and Nash-Sutcliffe Efficiency (NSE) were found 3.6186, 0.9373, and 0.9428, respectively.Keywords: bistatic scatterometer, soil moisture, support vector regression, RMSE, %Bias, NSE
Procedia PDF Downloads 42622188 Young Adult Gay Men's Healthcare Access in the Era of the Affordable Care Act
Authors: Marybec Griffin
Abstract:
Purpose: The purpose of this cross-sectional study was to get a better understanding of healthcare usage and satisfaction among young adult gay men (YAGM), including the facility used as the usual source of healthcare, preference for coordinated healthcare, and if their primary care provider (PCP) adequately addressed the health needs of gay men. Methods: Interviews were conducted among n=800 YAGM in New York City (NYC). Participants were surveyed about their sociodemographic characteristics and healthcare usage and satisfaction access using multivariable logistic regression models. The surveys were conducted between November 2015 and June 2016. Results: The mean age of the sample was 24.22 years old (SD=4.26). The racial and ethnic background of the participants is as follows: 35.8% (n=286) Black Non-Hispanic, 31.9% (n=225) Hispanic/Latino, 20.5% (n=164) White Non-Hispanic, 4.4% (n=35) Asian/Pacific Islander, and 6.9% (n=55) reporting some other racial or ethnic background. 31.1% (n=249) of the sample had an income below $14,999. 86.7% (n=694) report having either public or private health insurance. For usual source of healthcare, 44.6% (n=357) of the sample reported a private doctor’s office, 16.3% (n=130) reported a community health center, and 7.4% (n=59) reported an urgent care facility, and 7.6% (n=61) reported not having a usual source of healthcare. 56.4% (n=451) of the sample indicated a preference for coordinated healthcare. 54% (n=334) of the sample were very satisfied with their healthcare. Findings from multivariable logistical regression models indicate that participants with higher incomes (AOR=0.54, 95% CI 0.36-0.81, p < 0.01) and participants with a PCP (AOR=0.12, 95% CI 0.07-0.20, p < 0.001) were less likely to use a walk-in facility as their usual source of healthcare. Results from the second multivariable logistic regression model indicated that participants who experienced discrimination in a healthcare setting were less likely to prefer coordinated healthcare (AOR=0.63, 95% CI 0.42-0.96, p < 0.05). In the final multivariable logistic model, results indicated that participants who had disclosed their sexual orientation to their PCP (AOR=2.57, 95% CI 1.25-5.21, p < 0.01) and were comfortable discussing their sexual activity with their PCP (AOR=8.04, 95% CI 4.76-13.58, p < 0.001) were more likely to agree that their PCP adequately addressed the healthcare needs of gay men. Conclusion: Understanding healthcare usage and satisfaction among YAGM is necessary as the healthcare landscape changes, especially given the relatively recent addition of urgent care facilities. The type of healthcare facility used as a usual source of care influences the ability to seek comprehensive and coordinated healthcare services. While coordinated primary and sexual healthcare may be ideal, individual preference for this coordination among YAGM is desired but may be limited due to experiences of discrimination in primary care settings.Keywords: healthcare policy, gay men, healthcare access, Affordable Care Act
Procedia PDF Downloads 236