Search results for: global food security index
12234 The Impact of China’s Waste Import Ban on the Waste Mining Economy in East Asia
Authors: Michael Picard
Abstract:
This proposal offers to shed light on the changing legal geography of the global waste economy. Global waste recycling has become a multi-billion-dollar industry. NASDAQ predicts the emergence of a worldwide 1,296G$ waste management market between 2017 and 2022. Underlining this evolution, a new generation of preferential waste-trade agreements has emerged in the Pacific. In the last decade, Japan has concluded a series of bilateral treaties with Asian countries, and most recently with China. An agreement between Tokyo and Beijing was formalized on 7 May 2008, which forged an economic partnership on waste transfer and mining. The agreement set up International Recycling Zones, where certified recycling plants in China process industrial waste imported from Japan. Under the joint venture, Chinese companies salvage the embedded value from Japanese industrial discards, reprocess them and send them back to Japanese manufacturers, such as Mitsubishi and Panasonic. This circular economy is designed to convert surplus garbage into surplus value. Ever since the opening of Sino-Japanese eco-parks, millions of tons of plastic and e-waste have been exported from Japan to China every year. Yet, quite unexpectedly, China has recently closed its waste market to imports, jeopardizing Japan’s billion-dollar exports to China. China notified the WTO that, by the end of 2017, it would no longer accept imports of plastics and certain metals. Given China’s share of Japanese waste exports, a complete closure of China’s market would require Japan to find new uses for its recyclable industrial trash generated domestically every year. It remains to be seen how China will effectively implement its ban on waste imports, considering the economic interests at stake. At this stage, what remains to be clarified is whether China's ban on waste imports will negatively affect the recycling trade between Japan and China. What is clear, though, is the rapid transformation in the legal geography of waste mining in East-Asia. For decades, East-Asian waste trade had been tied up in an ‘ecologically unequal exchange’ between the Japanese core and the Chinese periphery. This global unequal waste distribution could be measured by the Environmental Stringency Index, which revealed that waste regulation was 39% weaker in the Global South than in Japan. This explains why Japan could legally export its hazardous plastic and electronic discards to China. The asymmetric flow of hazardous waste between Japan and China carried the colonial heritage of international law. The legal geography of waste distribution was closely associated to the imperial construction of an ecological trade imbalance between the Japanese source and the Chinese sink. Thus, China’s recent decision to ban hazardous waste imports is a sign of a broader ecological shift. As a global economic superpower, China announced to the world it would no longer be the planet’s junkyard. The policy change will have profound consequences on the global circulation of waste, re-routing global waste towards countries south of China, such as Vietnam and Malaysia. By the time the Berlin Conference takes place in May 2018, the presentation will be able to assess more accurately the effect of the Chinese ban on the transboundary movement of waste in Asia.Keywords: Asia, ecological unequal exchange, global waste trade, legal geography
Procedia PDF Downloads 21412233 Evaluation of Chromium Fortified-Parboiled Rice Coated with Herbal Extracts: Resistant Starch, and Glycemic Index
Authors: Wisnu Adi Yulianto, Chatarina Lilis Suryani, Mamilisti Susiati, Hendy Indra Permana
Abstract:
Parboiled rice was developed to produce rice that has low glycemic index, especially for diabetics. Yet, parboiled rice is not enough because diabetics also lack of chromium. The sign of chromium (Cr) deficiency in diabetics is impaired glucose tolerance. Cr fortification was done for increasing Cr content in rice. Naturally-occurring compounds that have been proven to improve insulin sensitivity include Cr and polyphenol found in cinnamon, pandan and bay leaf. This research aimed to evaluate content of resistant starch and glycemic index of Cr - fortified - parboiled rice (Cr-PR) coated with herbal extracts. Variety of unhulled rice and forticant used in the experiment were Ciherang and CrCl3, respectively. Three herbal extracts used were cinnamon, pandan and bay leaf. Each concentration of herbal extracts in the amount of 3%, 6%, and 9% were added in the coating substance to coat Cr-PR. Resistant starch (RS) content was determined by enzymatic process through glucooxydase method. Testing of the GI was conducted on 18 non-diabetic volunteers. RS content of Cr-PR coated with herbal extracts ranged between 8.27 – 8.84 % (dry weight). Cr-PR coated with all herbal extracts of 3% concentration had higher RS content than the ones with herbal extracts of 6% and 9% concentration (P <0.05). Value of the rice GI ranged 29 - 40. The lowest GI (29-30) was attained by the rice coated with enrichment of 6-9% cinnamon extract.Keywords: coating, Cr-fortified-parboiled rice, glycemic index, herbal extracts, resistant starch
Procedia PDF Downloads 36412232 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 51712231 Intrusion Detection and Prevention System (IDPS) in Cloud Computing Using Anomaly-Based and Signature-Based Detection Techniques
Authors: John Onyima, Ikechukwu Ezepue
Abstract:
Virtualization and cloud computing are among the fast-growing computing innovations in recent times. Organisations all over the world are moving their computing services towards the cloud this is because of its rapid transformation of the organization’s infrastructure and improvement of efficient resource utilization and cost reduction. However, this technology brings new security threats and challenges about safety, reliability and data confidentiality. Evidently, no single security technique can guarantee security or protection against malicious attacks on a cloud computing network hence an integrated model of intrusion detection and prevention system has been proposed. Anomaly-based and signature-based detection techniques will be integrated to enable the network and its host defend themselves with some level of intelligence. The anomaly-base detection was implemented using the local deviation factor graph-based (LDFGB) algorithm while the signature-based detection was implemented using the snort algorithm. Results from this collaborative intrusion detection and prevention techniques show robust and efficient security architecture for cloud computing networks.Keywords: anomaly-based detection, cloud computing, intrusion detection, intrusion prevention, signature-based detection
Procedia PDF Downloads 31412230 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges
Authors: Alvite Singh Ningthoujam
Abstract:
The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.Keywords: India, Islamic State, Muslim, Security
Procedia PDF Downloads 37712229 Detection of Egg Proteins in Food Matrices (2011-2021)
Authors: Daniela Manila Bianchi, Samantha Lupi, Elisa Barcucci, Sandra Fragassi, Clara Tramuta, Lucia Decastelli
Abstract:
Introduction: The undeclared allergens detection in food products plays a fundamental role in the safety of the allergic consumer. The protection of allergic consumers is guaranteed, in Europe, by Regulation (EU) No 1169/2011 of the European Parliament, which governs the consumer's right to information and identifies 14 food allergens to be mandatorily indicated on food labels: among these, an egg is included. An egg can be present as an ingredient or as contamination in raw and cooked products. The main allergen egg proteins are ovomucoid, ovalbumin, lysozyme, and ovotransferrin. This study presents the results of a survey conducted in Northern Italy aimed at detecting the presence of undeclared egg proteins in food matrices in the latest ten years (2011-2021). Method: In the period January 2011 - October 2021, a total of 1205 different types of food matrices (ready-to-eat, meats, and meat products, bakery and pastry products, baby foods, food supplements, pasta, fish and fish products, preparations for soups and broths) were delivered to Food Control Laboratory of Istituto Zooprofilattico Sperimentale of Piemonte Liguria and Valle d’Aosta to be analyzed as official samples in the frame of Regional Monitoring Plan of Food Safety or in the contest of food poisoning. The laboratory is ISO 17025 accredited, and since 2019, it has represented the National Reference Centre for the detection in foods of substances causing food allergies or intolerances (CreNaRiA). All samples were stored in the laboratory according to food business operator instructions and analyzed within the expiry date for the detection of undeclared egg proteins. Analyses were performed with RIDASCREEN®FAST Ei/Egg (R-Biopharm ® Italia srl) kit: the method was internally validated and accredited with a Limit of Detection (LOD) equal to 2 ppm (mg/Kg). It is a sandwich enzyme immunoassay for the quantitative analysis of whole egg powder in foods. Results: The results obtained through this study showed that egg proteins were found in 2% (n. 28) of food matrices, including meats and meat products (n. 16), fish and fish products (n. 4), bakery and pastry products (n. 4), pasta (n. 2), preparations for soups and broths (n.1) and ready-to-eat (n. 1). In particular, in 2011 egg proteins were detected in 5% of samples, in 2012 in 4%, in 2013, 2016 and 2018 in 2%, in 2014, 2015 and 2019 in 3%. No egg protein traces were detected in 2017, 2020, and 2021. Discussion: Food allergies occur in the Western World in 2% of adults and up to 8% of children. Allergy to eggs is one of the most common food allergies in the pediatrics context. The percentage of positivity obtained from this study is, however, low. The trend over the ten years has been slightly variable, with comparable data.Keywords: allergens, food, egg proteins, immunoassay
Procedia PDF Downloads 14112228 Sensitivity of Credit Default Swaps Premium to Global Risk Factor: Evidence from Emerging Markets
Authors: Oguzhan Cepni, Doruk Kucuksarac, M. Hasan Yilmaz
Abstract:
Risk premium of emerging markets are moving altogether depending on the momentum and shifts in the global risk appetite. However, the magnitudes of these changes in the risk premium of emerging market economies might vary. In this paper, we focus on how global risk factor affects credit default swaps (CDS) premiums of emerging markets using principal component analysis (PCA) and rolling regressions. PCA results indicate that the first common component accounts for almost 76% of common variation in CDS premiums of emerging markets. Additionally, the explanatory power of the first factor seems to be high over sample period. However, the sensitivity to the global risk factor tends to change over time and across countries. In this regard, fixed effects panel regressions are employed to identify the macroeconomic factors driving the heterogeneity across emerging markets. There are two main macroeconomic variables that affect the sensitivity; government debt to GDP and international reserves to GDP. The countries with lower government debt and higher reserves tend to be less subject to the variations in the global risk appetite.Keywords: emerging markets, principal component analysis, credit default swaps, sovereign risk
Procedia PDF Downloads 38412227 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 19412226 Relationships of Driver Drowsiness and Sleep-Disordered Breathing Syndrome
Authors: Cheng-Yu Tsai, Wen-Te Liu, Yin-Tzu Lin, Chen-Chen Lo, Kang Lo
Abstract:
Background: Driving drowsiness related to inadequate or disordered sleep accounts for a major percentage of traffic accidents. Sleep-disordered breathing (SDB) syndrome is a common respiratory disorder during sleep. However, the effects of SDB syndrome on driving fatigue remain unclear. Objective: This study aims to investigate the relationship between SDB pattern and driving drowsiness. Methodologies: The physical condition while driving was obtained from the questionnaires to classify the state of driving fatigue. SDB syndrome was quantified as the polysomnography, and the air flow pattern was collected by the thermistor and nasal pressure cannula. To evaluate the desaturation, the mean hourly number of greater than 3% dips in oxygen saturation was sentenced by reregistered technologist during examination in a hospital in New Taipei City (Taiwan). The independent T-test was used to investigate the correlations between sleep disorders related index and driving drowsiness. Results: There were 880 subjects recruited in this study, who had been done polysomnography for evaluating severity for obstructive sleep apnea syndrome (OSAS) as well as completed the driver condition questionnaire. Four-hundred-eighty-four subjects (55%) were classified as fatigue group, and 396 subjects (45%) were served as the control group. Significantly higher values of snoring index (242.14 ± 205.51 /hours) were observed in the fatigue group (p < 0.01). The value of respiratory disturbance index (RDI) (31.82 ± 19.34 /hours) in fatigue group were significantly higher than the control group (p < 0.01). Conclusion: We observe the considerable association between SDB syndrome and driving drowsiness. To promote traffic safety, SDB syndrome should be controlled and alleviated.Keywords: driving drowsiness, sleep-disordered breathing syndrome, snoring index, respiratory disturbance index.
Procedia PDF Downloads 14112225 Renewable Energy Industry Trends and Its Contributions to the Development of Energy Resilience in an Era of Accelerating Climate Change
Authors: A. T. Asutosh, J. Woo, M. Kouhirostami, M. Sam, A. Khantawang, C. Cuales, W. Ryor, C. Kibert
Abstract:
Climate change and global warming vortex have grown to alarming proportions. Therefore, the need for a shift in the conceptualization of energy production is paramount. Energy practices have been created in the current situation. Fossil fuels continue their prominence, at the expense of renewable sources. Despite this abundance, a large percentage of the world population still has no access to electricity but there have been encouraging signs in global movement from nonrenewable to renewable energy but means to reverse climate change have been elusive. Worldwide, organizations have put tremendous effort into innovation. Conferences and exhibitions act as a platform that allows a broad exchange of information regarding trends in the renewable energy field. The Solar Power International (SPI) conference and exhibition is a gathering of concerned activists, and probably the largest convention of its kind. This study investigates current development in the renewable energy field, analyzing means by which industry is being applied to the issue. In reviewing the 2019 SPI conference, it was found innovations in recycling and assessing the environmental impacts of the solar products that need critical attention. There is a huge movement in the electrical storage but there exists a large gap in the development of security systems. This research will focus on solar energy, but impacts will be relevant to the entire renewable energy market.Keywords: climate change, renewable energy, solar, trends, research, solar power international, SPI
Procedia PDF Downloads 11312224 Impacts of Applying Automated Vehicle Location Systems to Public Bus Transport Management
Authors: Vani Chintapally
Abstract:
The expansion of modest and minimized Global Positioning System (GPS) beneficiaries has prompted most Automatic Vehicle Location (AVL) frameworks today depending solely on satellite-based finding frameworks, as GPS is the most stable usage of these. This paper shows the attributes of a proposed framework for following and dissecting open transport in a run of the mill medium-sized city and complexities the qualities of such a framework to those of broadly useful AVL frameworks. Particular properties of the courses broke down by the AVL framework utilized for the examination of open transport in our study incorporate cyclic vehicle courses, the requirement for particular execution reports, and so forth. This paper particularly manages vehicle movement forecasts and the estimation of station landing time, combined with consequently produced reports on timetable conformance and other execution measures. Another side of the watched issue is proficient exchange of information from the vehicles to the control focus. The pervasiveness of GSM bundle information exchange advancements combined with decreased information exchange expenses have brought on today's AVL frameworks to depend predominantly on parcel information exchange administrations from portable administrators as the correspondences channel in the middle of vehicles and the control focus. This methodology brings numerous security issues up in this conceivably touchy application field.Keywords: automatic vehicle location (AVL), expectation of landing times, AVL security, data administrations, wise transport frameworks (ITS), guide coordinating
Procedia PDF Downloads 38812223 Developing a Video Game (Historia’s Nightmare) and Finding Out if We Can Use It to Raise Social Awareness and Improve Learning
Authors: Hasibul Kabir, Samin Shahriar Tokey, Md. Tofazzal Hossain
Abstract:
One of the most necessary things in the present time is raising social awareness about global warming and climate change among the people. Though many types of mediums and techniques have been used to teach people about this global phenomenon, there are still more effective ways to reach people with useful information about global warming. As many traditional methods to teach people about global warming and climate change did not work well, video games were overdue. To learn how effective a video game can be in this regard, we developed a Video game, "Historia's Nightmare," that teaches people about Global warming and climate change. The game was designed to entertain people and give them an idea about the reasons and consequences of global warming and climate change while not being like traditional educational games. The game threw a mini quiz consisting of two MCQs based on the information shown in the game, where a gamer had to pass the quiz to reach the next level. We published the game on different platforms to let all types of people play and complete our experiment effectively. The game continuously communicated with our server to send data about gamers' performance. We observed the data, including the participants' performance, time spent, quiz score, and the in-game feedback on a regular basis, and finally came to a verdict. In our experiment, we have found that most participants positively accepted the game and learned something new. The participants who spent more on our game performed better in both quiz and the game. Our experiment's result demonstrates that video games can be a great way to teach people something, particularly to raise social awareness about global warming and climate change. It also demonstrates that the game can be a significant element in education and learning improvement.Keywords: video game, global warming, social awareness, climate change, education, feedback
Procedia PDF Downloads 14112222 Food and Feeding Habit of Clarias anguillaris in Tagwai Reservoir, Minna, Niger State, Nigeria
Authors: B. U. Ibrahim, A. Okafor
Abstract:
Sixty-two (62) samples of Clarias anguillaris were collected from Tagwai Reservoir and used for the study. 29 male and 33 female samples were obtained for the study. Body measurement indicated that different sizes were collected for the study. Males, females and combined sexes had standard length and total length means of 26.56±4.99 and 31.13±6.43, 27.17±5.21 and 30.62±5.43, 26.88±5.08 and 30.86±5.88 cm, respectively. The weights of males, females and combined sexes have mean weights of 241.10±96.27, 225.75±78.66 and 232.93±86.95 gm, respectively. Eight items; fish, insects, plant materials, sand grains, crustaceans, algae, detritus and unidentified items were eaten as food by Clarias anguilarias in Tagwai Reservoir. Frequency of occurrence and numerical methods used in stomach contents analysis indicated that fish was the highest, followed by insect, while the lowest was the algae. Frequency of stomach fullness of Clarias anguillaris showed low percentage of empty stomachs or stomachs without food (21.00%) and high percentage of stomachs with food (79.00%), which showed high abundance of food and high feeding intensity during the period of study. Classification of fish based on feeding habits showed that Clarias anguillaris in this study is an omnivore because it consumed both plant and animal materials.Keywords: stomach content, feeding habit, Clarias anguillaris, Tagwai Reservoir
Procedia PDF Downloads 60212221 Socio-Economic Child’S Wellbeing Impasse in South Africa: Towards a Theory-Based Solution Model
Authors: Paulin Mbecke
Abstract:
Research Issue: Under economic constraints, socio-economic conditions of households worsen discounting child’s wellbeing to the bottom of many governments and households’ priority lists. In such situation, many governments fail to rebalance priorities in providing services such as education, housing and social security which are the prerequisites for the wellbeing of children. Consequently, many households struggle to respond to basic needs especially those of children. Although economic conditions play a crucial role in creating prosperity or poverty in households and therefore the wellbeing or misery for children; they are not the sole cause. Research Insights: The review of the South African Index of Multiple Deprivation and the South African Child Gauge establish the extent to which economic conditions impact on the wellbeing or misery of children. The analysis of social, cultural, environmental and structural theories demonstrates that non-economic factors contribute equally to the wellbeing or misery of children, yet, they are disregarded. In addition, the assessment of a child abuse database proves a weak correlation between economic factors (prosperity or poverty) and child’s wellbeing or misery. Theoretical Implications: Through critical social research theory and modelling, the paper proposes a Theory-Based Model that combines different factors to facilitate the understanding of child’s wellbeing or misery. Policy Implications: The proposed model assists in broad policy and decision making and reviews processes in promoting child’s wellbeing and in preventing, intervening and managing child’s misery with regard to education, housing, and social security.Keywords: children, child’s misery, child’s wellbeing, household’s despair, household’s prosperity
Procedia PDF Downloads 28912220 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 15812219 Food Bolus Obstruction: A Rural Hospital’s Experience
Authors: Davina Von Hagt, Genevieve Gibbons, Matt Henderson, Tom Bowles
Abstract:
Purpose: Food bolus obstructions are common emergency surgical presentations, but there is no established management guideline in a rural setting. Intervention usually involves endoscopic removal after initial medical management has failed. Within a rural setting, this falls upon the general surgeon. There are varied endoscopic techniques that may be used. Methodology: A review of the past fifty cases of food bolus obstruction managed at Albany Health Campus was retrospectively reviewed to assess endoscopic findings and techniques. Operation notes, histopathology, imaging, and patient notes were reviewed. Results: 50 patients underwent gastroscopy for food bolus obstruction from August 2017 to March 2021. Ages ranged from 11 months to 95 years, with the majority of patients aged between 30-70 years. 88% of patients were male. Meat was the most common bolus (20% unspecified, 20% steak, 10% chicken, 6% lamb, 4% sausage, 2% pork). At endoscopy, 12% were found not to have a food bolus obstruction. Two patients were found to have oesophageal cancer, and four patients had a stricture and required dilatation. A variety of methods were used to relieve oesophageal obstruction ranging from pushing through to stomach (24 patients), using an overtube (10 patients), raptor (13 patients), and less common instruments such as Roth net, basket, guidewire, and pronged grasper. One patient had an unsuccessful endoscopic retrieval and required theatre for laparoscopic assisted removal with rendezvous endoscopic piecemeal removal via oesophagus and gastrostomy. Conclusion: Food bolus obstruction is a common emergency presentation. Within the rural setting, management requires innovation and teamwork within the safety of the local experience.Keywords: food bolus obstruction, regional hospital, surgical management, innovative surgical treatment
Procedia PDF Downloads 27612218 Formal Verification for Ethereum Smart Contract Using Coq
Authors: Xia Yang, Zheng Yang, Haiyong Sun, Yan Fang, Jingyu Liu, Jia Song
Abstract:
The smart contract in Ethereum is a unique program deployed on the Ethereum Virtual Machine (EVM) to help manage cryptocurrency. The security of this smart contract is critical to Ethereum’s operation and highly sensitive. In this paper, we present a formal model for smart contract, using the separated term-obligation (STO) strategy to formalize and verify the smart contract. We use the IBM smart sponsor contract (SSC) as an example to elaborate the detail of the formalizing process. We also propose a formal smart sponsor contract model (FSSCM) and verify SSC’s security properties with an interactive theorem prover Coq. We found the 'Unchecked-Send' vulnerability in the SSC, using our formal model and verification method. Finally, we demonstrate how we can formalize and verify other smart contracts with this approach, and our work indicates that this formal verification can effectively verify the correctness and security of smart contracts.Keywords: smart contract, formal verification, Ethereum, Coq
Procedia PDF Downloads 69812217 Use of Landsat OLI Images in the Mapping of Landslides: Case of the Taounate Province in Northern Morocco
Authors: S. Benchelha, H. Chennaoui, M. Hakdaoui, L. Baidder, H. Mansouri, H. Ejjaaouani, T. Benchelha
Abstract:
Northern Morocco is characterized by relatively young mountains experiencing a very important dynamic compared to other areas of Morocco. The dynamics associated with the formation of the Rif chain (Alpine tectonics), is accompanied by instabilities essentially related to tectonic movements. The realization of important infrastructures (Roads, Highways,...) represents a triggering factor and favoring landslides. This paper is part of the establishment of landslides susceptibility map and concerns the mapping of unstable areas in the province of Taounate. The landslide was identified using the components of the false color (FCC) of images Landsat OLI: i) the first independent component (IC1), ii) The main component (PC), iii) Normalized difference index (NDI). This mapping for landslides class is validated by in-situ surveys.Keywords: landslides, False Color Composite (FCC), Independent Component Analysis (ICA), Principal Component Analysis (PCA), Normalized Difference Index (NDI), Normalized Difference Mid Red Index (NDMIDR)
Procedia PDF Downloads 29212216 qPCR Method for Detection of Halal Food Adulteration
Authors: Gabriela Borilova, Monika Petrakova, Petr Kralik
Abstract:
Nowadays, European producers are increasingly interested in the production of halal meat products. Halal meat has been increasingly appearing in the EU's market network and meat products from European producers are being exported to Islamic countries. Halal criteria are mainly related to the origin of muscle used in production, and also to the way products are obtained and processed. Although the EU has legislatively addressed the question of food authenticity, the circumstances of previous years when products with undeclared horse or poultry meat content appeared on EU markets raised the question of the effectiveness of control mechanisms. Replacement of expensive or not-available types of meat for low-priced meat has been on a global scale for a long time. Likewise, halal products may be contaminated (falsified) by pork or food components obtained from pigs. These components include collagen, offal, pork fat, mechanically separated pork, emulsifier, blood, dried blood, dried blood plasma, gelatin, and others. These substances can influence sensory properties of the meat products - color, aroma, flavor, consistency and texture or they are added for preservation and stabilization. Food manufacturers sometimes access these substances mainly due to their dense availability and low prices. However, the use of these substances is not always declared on the product packaging. Verification of the presence of declared ingredients, including the detection of undeclared ingredients, are among the basic control procedures for determining the authenticity of food. Molecular biology methods, based on DNA analysis, offer rapid and sensitive testing. The PCR method and its modification can be successfully used to identify animal species in single- and multi-ingredient raw and processed foods and qPCR is the first choice for food analysis. Like all PCR-based methods, it is simple to implement and its greatest advantage is the absence of post-PCR visualization by electrophoresis. qPCR allows detection of trace amounts of nucleic acids, and by comparing an unknown sample with a calibration curve, it can also provide information on the absolute quantity of individual components in the sample. Our study addresses a problem that is related to the fact that the molecular biological approach of most of the work associated with the identification and quantification of animal species is based on the construction of specific primers amplifying the selected section of the mitochondrial genome. In addition, the sections amplified in conventional PCR are relatively long (hundreds of bp) and unsuitable for use in qPCR, because in DNA fragmentation, amplification of long target sequences is quite limited. Our study focuses on finding a suitable genomic DNA target and optimizing qPCR to reduce variability and distortion of results, which is necessary for the correct interpretation of quantification results. In halal products, the impact of falsification of meat products by the addition of components derived from pigs is all the greater that it is not just about the economic aspect but above all about the religious and social aspect. This work was supported by the Ministry of Agriculture of the Czech Republic (QJ1530107).Keywords: food fraud, halal food, pork, qPCR
Procedia PDF Downloads 24912215 Moving beyond Medical Tourism: An Analysis of Intra-Regional Medical Mobility in the Global South
Authors: Tyler D. Cesarone, Tatiana M. Wugalter
Abstract:
The movement of patients from the Global North to the Global South in pursuit of inexpensive healthcare and touristic experiences dominates the academic discourse on international medical travel (IMT). However, medical travel exists in higher numbers between Global South countries as patients who lack trust in, and feel disenfranchised by, their national healthcare systems seek treatment in nearby countries. Through a review of the existing literature, this paper examines patterns of IMT in the Middle East, Southeast Asia, and Southern Africa, distinguishing North-South medical tourism from South-South intra-regional medical mobility (IRMM). Evidence from these case studies demonstrates that notions of medical distrust and disenfranchisement, rooted in low-resourced and poor quality healthcare systems, are key drivers of IRMM in the Global South. The movement of patients from lower income to proximate higher income countries not only reveals tensions between patients and their healthcare systems but widens gaps in the quality of healthcare between departing and destination countries. In analyzing these cross-regional similarities, the paper moves beyond the current literature’s focus on singular case studies to expose global patterns of South-South IRMM. This presents a shift from the traditional focus on North-South medical tourism, demonstrating how disparities in healthcare systems both influence and are influenced by IRMM.Keywords: global South, healthcare quality, international medical travel (IMT), intra-regional medical mobility (IRMM), medical disenfranchisement, medical distrust, medical tourism
Procedia PDF Downloads 40512214 Analysis of Slope in an Excavated Gneiss Rock Using Geological Strength Index (GSI) in Ilorin, Kwara State, Nigeria
Authors: S. A. Agbalajobi, W. A. Bello
Abstract:
The study carried out analysis on slope stability in an excavated gneiss rock using geological strength index (GSI) in Ilorin, Kwara State, Nigeria. A kinematic analysis of planar discontinuity sets in a gneiss deposit was carried out to ascertain the degree of slope stability. Discontinuity orientations in the rock mass were mapped using compass clinometers. The average result of physical and mechanical properties such as specific gravity, unit weight, uniaxial compressive strength, point load index, and Schmidt rebound value are 2.64 g/m3, 25.95 kN/m3, 156 MPa, 6.5 MPa, and 53.12 respectively. Also, a statistical model equation relating the rock strength was developed. The analyses states that the rock face is susceptible to wedge failures having all the geometrical conditions associated with the occurrence of such failures were noticeable. It can be concluded that analyses of discontinuity orientation in relation to cut face direction in rock excavation is essential for mine planning to forestall mine accidents. Assessment of excavated slope methods was evident that one excavation method (blasting and/or use of hydraulic hammer) is applicable for the given rock strength, the ease of excavation decreases as the rock mass quality increases, thus blasting most suitable for such operation.Keywords: slope stability, wedge failure, geological strength index (GSI), discontinuities and excavated slope
Procedia PDF Downloads 52312213 Eco-Index for Assessing Ecological Disturbances at Downstream of a Hydropower Project
Authors: Chandra Upadhyaya, Arup Kumar Sarma
Abstract:
In the North Eastern part of India several hydro power projects are being proposed and execution for some of them are already initiated. There are controversies surrounding these constructions. Impact of these dams in the downstream part of the rivers needs to be assessed so that eco-system and people living downstream are protected by redesigning the projects if it becomes necessary. This may result in reducing the stresses to the affected ecosystem and people living downstream. At present many index based ecological methods are present to assess impact on ecology. However, none of these methods are capable of assessing the affect resulting from dam induced diurnal variation of flow in the downstream. We need environmental flow methodology based on hydrological index which can address the affect resulting from dam induced diurnal variation of flow and play an important role in a riverine ecosystem management and be able to provide a qualitative idea about changes in the habitat for aquatic and riparian species.Keywords: ecosystem, environmental flow assessment, entropy, IHA, TNC
Procedia PDF Downloads 38912212 Investigating the Relationship between the Kuwait Stock Market and Its Marketing Sectors
Authors: Mohamad H. Atyeh, Ahmad Khaldi
Abstract:
The main objective of this research is to measure the relationship between the Kuwait stock Exchange (KSE) index and its two marketing sectors after the new market classification. The findings of this research are important for Public economic policy makers as they need to know if the new system (new classification) is efficient and to what level, to monitor the markets and intervene with appropriate measures. The data used are the daily index of the whole Kuwaiti market and the daily closing price, number of deals and volume of shares traded of two marketing sectors (consumer goods and consumer services) for the period from the 13th of May 2012 till the 12th of December 2016. The results indicate a positive direct impact of the closing price, volume and deals indexes of the consumer goods and the consumer services companies on the overall KSE index, volume and deals of the Kuwaiti stock market (KSE).Keywords: correlation, market capitalization, Kuwait Stock Exchange (KSE), marketing sectors, stock performance
Procedia PDF Downloads 33112211 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria
Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue
Abstract:
The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.Keywords: personal variables, students, perception, school security
Procedia PDF Downloads 8212210 Enactments of Global Citizenship Education: Social Justice in Public Spheres of Education
Authors: Sabrina Jafralie
Abstract:
This proposed chapter explains how civic religious literacy is a means to promote social justice in Canada. It will first present the specific conception of global citizenship education that will undergird the discussion in the chapter. Then, it will offer a conception of civic religious literacy that explains how it promotes social justice as a form of global citizenship education. To illustrate this point, I will list specific examples of social and political inequities in Canada, such as hate crime statistics from 2013-2018 across the country and in specific provinces and cities. I will also highlight different types of discrimination, such as that towards religious minorities, Indigenous peoples, and those that conflate race and religion, and other intersections of identity that civic religious literacy can address. To conclude this initial section of the chapter, I will cite international studies that discuss religious literacy as a means to promote characteristics and aims of global citizenship education.Keywords: Civic Literacy, Pedagogy, Quebec, Social Justice
Procedia PDF Downloads 16812209 Protecting Labor Rights in the Platform Economy: Legal Challenges and Innovative Explorations
Authors: Ruwen Pei
Abstract:
In the rapidly evolving landscape of the digital economy, platform employment has emerged as a transformative labor force, fundamentally altering the traditional paradigms of the employer-employee relationship. This paper provides a comprehensive analysis of the unique dynamics and intricate legal challenges associated with platform work, where workers often navigate precarious labor conditions without the robust safety nets typically afforded in traditional industries. It underscores the limitations of current labor regulations, particularly in addressing pressing concerns such as income volatility and disparate benefits. By drawing insights from diverse global case studies, this study emphasizes the compelling need for platform companies to shoulder their social welfare responsibilities, ensuring fair treatment and security for their workers. Moreover, it critically examines the profound influence of socio-cultural factors and educational awareness on the platform economy, shedding light on the complexities of this emerging labor landscape. Advocating for a harmonious equilibrium between flexibility and security, this paper calls for substantial legal reforms and innovative policy initiatives that can adapt to the evolving nature of work in the digital age. Finally, it anticipates forthcoming trends in the digital economy and platform labor relations, underscoring the significance of proactive adaptation to foster equitable and inclusive employment practices.Keywords: platform employment, labor protections, social welfare, legal reforms, digital economy
Procedia PDF Downloads 8512208 Revival of Old Silk Route and New Maritime Route: An Opportunity for India or Hidden Geopolitics of China
Authors: Geetanjali Sharma
Abstract:
There are always provincial variations which deserve more detailed treatment. Before the arrival of modern era, geography and cultural homogeneity were determining factors of human habitat and migration. Boundaries as if we see them, did not exist earlier. The connectivity of the world was also different as of now. The reinforcement of the old silk route will improve economic cooperation and connectivity between Asian, European and African countries, but obviously, it is designed to improve China’s geopolitical and geostrategic position in the world. The paper is based on the secondary sources of data. Analytical and historical approach has been used to clarify the ties between the old silk routes and new One-Belt-One-Road initiative China. The paper begins with an explanation of the historical background of the old Silk Route, its origin and development, trailed by an analysis of latest declarations by the Chinese leaders to revive it. It also discusses the impacts of this initiative on India’s economy and cultural exchange between associated regions. Lastly, the paper sums up the findings and suggestions for keeping a balance between the security and economic relationship between the countries. It concludes that the silk route is an effort in commencing a ‘grand strategy’ for global trade and cooperation with hidden objectives of China to increase the investment of China in other continents as well. The revival of silk route may prove to be a very helpful in reinforcing cooperation and raising it to a new level of economic establishments. However, China has yet to promote the much-needed political and strategic trust.Keywords: OBOR (One-Belt-One-Road), geopolitics, economic relation, security concerns
Procedia PDF Downloads 29112207 Central American Security Issue: Civil War Legacy and Contemporary Challenges
Authors: Olga Andrianova, Lazar Jeifets
Abstract:
The security issue has always been one of the most sensitive and significant in Latin American context, especially focused on Central American region. Despite the fact that the time of the civil wars has ended, violence, delinquency, insecurity, discrimination still exist and keep relevance in the 21st century. This article is dedicated to consider this kind of problems, to find out the main causes and to propose solution approaches.Keywords: Central America, insecurity, instability, post-war countries, violence
Procedia PDF Downloads 47512206 The Cultural Significance of Recycling - A Native American Perspective
Authors: Martin A. Curry
Abstract:
Madeline Island is a small island community in Wisconsin, USA. Located in Lake Superior, it has been home to the Anishinaabe/Ojibway people for 1000s of years and is known as Moningwankuaning Minis-"The Island of the Golden Breasted Woodpecker". The community relies on summer tourism as its source of income, with a small population of 400 year-round residents. Supervisor Martin A. Curry (Ojibway/German descent) has been working on a fiscally responsible, environmentally principled and culturally centered approach to waste diversion and recycling. The tenets of this program encompass plastics, paper, food waste, local farming, energy production and art education. Through creative writing for the local newspaper and creative interactions, Martin has worked to engage the community in a more robust interest in waste diversion, including setting up a free-will donation store that incorporates elder volunteering opportunities, a compost program that works with the local community garden, biodiesel production and an art program that works with children from the local island school to make paper, grow local food and paint murals. The entirety of this program is based on the Ojibway concept of Mino-Bimadiiziwiin- "The Good Life" and benefits the community and its guests and represents a microcosm of the global dilemmas of waste and recycling.Keywords: recycling, waste diversion, island, Native American, art
Procedia PDF Downloads 12512205 Create and Design Visual Presentation to Promote Thai Cuisine
Authors: Supaporn Wimonchailerk
Abstract:
This research aims to study how to design and create the media to promote Thai cuisine. The study used qualitative research methods by using in-depth interview 3 key informants who have experienced in the production of food or cooking shows in television programs with an aspect of acknowledging Thai foods. The results showed that visual presentation is divided into four categories. First, the light meals should be presented in details via the close-up camera with lighting to make the food look more delicious. Then the curry presentation should be arranged a clear and crisp light focus on a colorful curry paste. Besides the vision of hot steam floating from the plate and a view of curry spread on steamed rice can call great attentions. Third, delivering good appearances of the fried or spicy foods, the images must allow the audiences to see the shine of the coat covering the texture of the food and the colorful of the ingredients. Fourth, the presentation of sweets is recommended to focus on details of food design, composition, and layout.Keywords: media production, television, promote, Thai cuisine
Procedia PDF Downloads 241