Search results for: national food security strategy
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 12975

Search results for: national food security strategy

11475 Yoghurt Kepel Stelechocarpus burahol as an Effort of Functional Food Diversification from Region of Yogyakarta

Authors: Dian Nur Amalia, Rifqi Dhiemas Aji, Tri Septa Wahyuningsih, Endang Wahyuni

Abstract:

Kepel fruit (Stelechocarpus burahol) is a scarce fruit that belongs as a logogram of Daerah Istimewa Yogyakarta. Kepel fruit can be used as substance of beauty treatment product, such as deodorant and good for skin health, and also contains antioxidant compound. Otherwise, this fruit is scarcely cultivated by people because of its image as a palace fruit and also the flesh percentage just a little, so it has low economic value. The flesh of kepel fruit is about 49% of its whole fruit. This little part as supporting point why kepel fruit has to be extracted and processed with the other product. Yoghurt is milk processing product that also have a role as functional food. Economically, the price of yoghurt is higher than whole milk or other milk processing product. Yoghurt is usually added with flavor of dye from plant or from chemical substance. Kepel fruit has a role as flavor in yoghurt, besides as product that good for digestion, yoghurt with kepel also has function as “beauty” food. Writing method that used is literature study by looking for the potential of kepel fruit as a local fruit of Yogyakarta and yoghurt as milk processing product. The process just like making common yoghurt because kepel fruit just have a role as flavor substance, so it does not affect to the other processing of yoghurt. Food diversification can be done as an effort to increase the value of local resources that proper to compete in Asean Economic Community (AEC), one of the way is producing kepel yoghurt.

Keywords: kepel, yoghurt, Daerah Istimewa Yogyakarta, functional food

Procedia PDF Downloads 317
11474 Controlled Chemotherapy Strategy Applied to HIV Model

Authors: Shohel Ahmed, Md. Abdul Alim, Sumaiya Rahman

Abstract:

Optimal control can be helpful to test and compare different vaccination strategies of a certain disease. The mathematical model of HIV we consider here is a set of ordinary differential equations (ODEs) describing the interactions of CD4+T cells of the immune system with the human immunodeficiency virus (HIV). As an early treatment setting, we investigate an optimal chemotherapy strategy where control represents the percentage of effect the chemotherapy has on the system. The aim is to obtain a new optimal chemotherapeutic strategy where an isoperimetric constraint on the chemotherapy supply plays a crucial role. We outline the steps in formulating an optimal control problem, derive optimality conditions and demonstrate numerical results of an optimal control for the model. Numerical results illustrate how such a constraint alters the optimal vaccination schedule and its effect on cell-virus interactions.

Keywords: chemotherapy of HIV, optimal control involving ODEs, optimality conditions, Pontryagin’s maximum principle

Procedia PDF Downloads 329
11473 Radar Fault Diagnosis Strategy Based on Deep Learning

Authors: Bin Feng, Zhulin Zong

Abstract:

Radar systems are critical in the modern military, aviation, and maritime operations, and their proper functioning is essential for the success of these operations. However, due to the complexity and sensitivity of radar systems, they are susceptible to various faults that can significantly affect their performance. Traditional radar fault diagnosis strategies rely on expert knowledge and rule-based approaches, which are often limited in effectiveness and require a lot of time and resources. Deep learning has recently emerged as a promising approach for fault diagnosis due to its ability to learn features and patterns from large amounts of data automatically. In this paper, we propose a radar fault diagnosis strategy based on deep learning that can accurately identify and classify faults in radar systems. Our approach uses convolutional neural networks (CNN) to extract features from radar signals and fault classify the features. The proposed strategy is trained and validated on a dataset of measured radar signals with various types of faults. The results show that it achieves high accuracy in fault diagnosis. To further evaluate the effectiveness of the proposed strategy, we compare it with traditional rule-based approaches and other machine learning-based methods, including decision trees, support vector machines (SVMs), and random forests. The results demonstrate that our deep learning-based approach outperforms the traditional approaches in terms of accuracy and efficiency. Finally, we discuss the potential applications and limitations of the proposed strategy, as well as future research directions. Our study highlights the importance and potential of deep learning for radar fault diagnosis. It suggests that it can be a valuable tool for improving the performance and reliability of radar systems. In summary, this paper presents a radar fault diagnosis strategy based on deep learning that achieves high accuracy and efficiency in identifying and classifying faults in radar systems. The proposed strategy has significant potential for practical applications and can pave the way for further research.

Keywords: radar system, fault diagnosis, deep learning, radar fault

Procedia PDF Downloads 90
11472 Radiation Usage Impact of on Anti-Nutritional Compounds (Antitrypsin and Phytic Acid) of Livestock and Poultry Foods

Authors: Mohammad Khosravi, Ali Kiani, Behroz Dastar, Parvin Showrang

Abstract:

Review was carried out on important anti-nutritional compounds of livestock and poultry foods and the effect of radiation usage. Nowadays, with advancement in technology, different methods have been considered for the optimum usage of nutrients in livestock and poultry foods. Steaming, extruding, pelleting, and the use of chemicals are the most common and popular methods in food processing. Use of radiation in food processing researches in the livestock and poultry industry is currently highly regarded. Ionizing (electrons, gamma) and non-ionizing beams (microwave and infrared) are the most useable rays in animal food processing. In recent researches, these beams have been used to remove and reduce the anti-nutritional factors and microbial contamination and improve the digestibility of nutrients in poultry and livestock food. The evidence presented will help researchers to recognize techniques of relevance to them. Simplification of some of these techniques, especially in developing countries, must be addressed so that they can be used more widely.

Keywords: antitrypsin, gamma anti-nutritional components, phytic acid, radiation

Procedia PDF Downloads 342
11471 Implementation of Total Quality Management in Public Sector: Case of Tunisia

Authors: Rafla Hchaichi

Abstract:

The public administration is currently experiencing in the field of quality unprecedented effervescence. However, in a globalized world more and more competitive, public services are confronted with the need to improve their performances which push public companies to implement quality approaches. Quality approaches have taken diverse forms such as service commitment, labels, certifications and the Common Assessment Framework. This paper provides an overview on the strategy for administrative development in Tunisia since the Carthaginian civilization until today. It outlines the evolution of quality management in the Tunisian public context while focusing on the National Referential of Quality of Administrative Services.

Keywords: quality approach, the common assessment framework, service commitment, label, certification, quality of public service, performance of public service, Tunisian Public Service

Procedia PDF Downloads 553
11470 Colorful Ethnoreligious Map of Iraq and the Current Situation of Minorities in the Country

Authors: Meszár Tárik

Abstract:

The aim of the study is to introduce the minority groups living in Iraq and to shed light on their current situation. The Middle East is a rather heterogeneous region in ethnic terms. It includes many ethnic, national, religious, linguistic, or ethnoreligious groups. The relationship between the majority and minority is the main cause of various conflicts in the region. It seems that most of the post-Ottoman states have not yet developed a unified national identity capable of integrating their multi-ethnic societies. The issue of minorities living in the Middle East is highly politicized and controversial, as the various Arab states consider the treatment of minorities as their internal affair, do not recognize discrimination or even deny the existence of any kind of minorities on their territory. This attitude of the Middle Eastern states may also be due to the fact that the minority issue can be abused and can serve as a reference point for the intervention policies of Western countries at any time. Methodologically, the challenges of these groups are perceived through the manifestos of prominent individuals and organizations belonging to minorities. The basic aim is to present the minorities’ own history in dealing with the issue. It also introduces the different ethnic and religious minorities in Iraq and analyzes their situation during the operation of the terrorist organization „Islamic State” and in the aftermath. It is clear that the situation of these communities deteriorated significantly with the advance of ISIS, but it is also clear that even after the expulsion of the militant group, we cannot necessarily report an improvement in this area, especially in terms of the ability of minorities to assert their interests and physical security. The emergence of armed militias involved in the expulsion of ISIS sometimes has extremely negative effects on them. Until the interests of non-Muslims are adequately represented at the local level and in the legislature, most experts and advocates believe that little will change in their situation. When conflicts flare, many Iraqi citizens usually leave Iraq, but because of the poor public security situation (threats from terrorist organizations, interventions by other countries), emigration causes serious problems not only outside the country’s borders but also within the country. Another ominous implication for minorities is that their communities are very slow if ever, to return to their homes after fleeing their own settlements. An important finding of the study is that this phenomenon is changing the face of traditional Iraqi settlements and threatens to plunge groups that have lived there for thousands of years into the abyss of history. Therefore, we not only present the current situation of minorities living in Iraq but also discuss their future possibilities.

Keywords: Middle East, Iraq, Islamic State, minorities

Procedia PDF Downloads 85
11469 The Strategy of Orbit Avoidance for Optical Remote Sensing Satellite

Authors: Dianxun Zheng, Wuxing Jing, Lin Hetong

Abstract:

Optical remote sensing satellite, always running on the Sun-synchronous orbit, equipped laser warning equipment to alert CCD camera from laser attack. There have three ways to protect the CCD camera, closing the camera cover satellite attitude maneuver and satellite orbit avoidance. In order to enhance the safety of optical remote sensing satellite in orbit, this paper explores the strategy of satellite avoidance. The avoidance strategy is expressed as the evasion of pre-determined target points in the orbital coordinates of virtual satellite. The so-called virtual satellite is a passive vehicle which superposes a satellite at the initial stage of avoidance. The target points share the consistent cycle time and the same semi-major axis with the virtual satellite, which ensures the properties of the Sun-synchronous orbit remain unchanged. Moreover, to further strengthen the avoidance capability of satellite, it can perform multi-object avoid maneuvers. On occasions of fulfilling the orbit tasks of the satellite, the orbit can be restored back to virtual satellite through orbit maneuvers. There into, the avoid maneuvers adopts pulse guidance. and the fuel consumption is also optimized. The avoidance strategy discussed in this article is applicable to avoidance for optical remote sensing satellite when encounter the laser hostile attacks.

Keywords: optical remote sensing satellite, always running on the sun-synchronous

Procedia PDF Downloads 398
11468 Influence of Thermal Treatments on Ovomucoid as Allergenic Protein

Authors: Nasser A. Al-Shabib

Abstract:

Food allergens are most common non-native form when exposed to the immune system. Most food proteins undergo various treatments (e.g. thermal or proteolytic processing) during food manufacturing. Such treatments have the potential to impact the chemical structure of food allergens so as to convert them to more denatured or unfolded forms. The conformational changes in the proteins may affect the allergenicity of treated-allergens. However, most allergenic proteins possess high resistance against thermal modification or digestive enzymes. In the present study, ovomucoid (a major allergenic protein of egg white) was heated in phosphate-buffered saline (pH 7.4) at different temperatures, aqueous solutions and on different surfaces for various times. The results indicated that different antibody-based methods had different sensitivities in detecting the heated ovomucoid. When using one particular immunoassay‚ the immunoreactivity of ovomucoid increased rapidly after heating in water whereas immunoreactivity declined after heating in alkaline buffer (pH 10). Ovomucoid appeared more immunoreactive when dissolved in PBS (pH 7.4) and heated on a stainless steel surface. To the best of our knowledge‚ this is the first time that antibody-based methods have been applied for the detection of ovomucoid adsorbed onto different surfaces under various conditions. The results obtained suggest that use of antibodies to detect ovomucoid after food processing may be problematic. False assurance will be given with the use of inappropriate‚ non-validated immunoassays such as those available commercially as ‘Swab’ tests. A greater understanding of antibody-protein interaction after processing of a protein is required.

Keywords: ovomucoid, thermal treatment, solutions, surfaces

Procedia PDF Downloads 446
11467 Protecting Right to Life and Combating Terrorism through the Instrument of Law in Nigeria

Authors: Oyekan Kolawole Jamiu

Abstract:

The right to life is a moral principle based on the belief that a human being has the right to life and, in particular, should not be unjustly killed by another human being. However, the most worrisome security challenge in Nigeria which has cut short the lives of innocent Nigerians is the activities of the dreaded terrorist group known as Boko Haram (which means Western Education is a sin). Between 2004 till date, over 15000 people have been gruesomely murdered by this terrorist group. However, despite the facts that suspected terrorists are arrested and paraded almost on a daily basis, cases of terrorism in our courts in Nigeria today have not been expeditiously dealt with by the judiciary. This paper examines the concept of right to life. The right to life is an inherent right for each and every person. From his or her birth; the individual is considered a living being that must be protected. The right to life connotes also right to live and grow in a healthy environment where there is appropriate health care, qualitative education and adequate security of lives and property. The paper also examines the fight against terrorism and the duty of the government to protect right to life of every individual even in the midst of the fight against terrorism. The paper further reviews the Terrorism Act 2011(as amended) and the clogs in the wheel of prosecution of suspected terrorists. The paper concludes that since terrorism is a new security challenge, to prevent conflict of interest, only one security agency should be trained and saddled with the responsibility of prosecuting suspected terrorist, Law should be enacted to compel intelligent gathering and sharing of information among security agencies and in addition, a special court should be established to deal expeditiously with cases of terrorism in Nigeria.

Keywords: terrorism, intelligent gathering, right to life, prosecution

Procedia PDF Downloads 347
11466 Incorporating Popular Nigerian Music into the School Curriculum: A Potential for National Development

Authors: David O. A. Ogunrinade

Abstract:

The significance of education to the growth and development of man is imperative. The Nigerian education philosophy and national objectives are geared towards self-realization, social, cultural, and economic, just to mention a few. The acquisition of skills and abilities, both mental and physical, for individual to live and contribute to the development of society should be of major importance to a functional education curriculum. This study specifically set out to examine the momentous potentials of popular music as a veritable tool to be properly incorporated into the curriculum of music education in Nigeria. This will equip the learners to be self-reliant and contribute to the national economy. Interviews with exponents of Nigerian popular music and the stakeholders in the music industry, as well as audio-visual materials were employed to elicit information. Findings reveal that there are lots of potentials and dexterities in popular music that can enable Nigerian music graduates to contribute their own quota to the national development of the nation, as well as being useful to themselves. If the Nigerian society is not to be plagued by a breed of unemployable youths who could not raise the economic productivity of the country, it is deemed pertinent that the music curriculum as one of the vocational education needs to be reviewed to incorporate popular music, as well as to reflect more of the Nigerian cultural heritage.

Keywords: popular music, music curriculum, music in schools, popular music prospect

Procedia PDF Downloads 159
11465 Mass Media and Electoral Conflict Management in Kogi State, Nigeria

Authors: Okpanachi Linus Odiji, Chris Ogwu Attah

Abstract:

Election is no doubt widely assumed as one of the most suitable means of resolving political quagmires even though it has never been bereft of conflict which can manifest before, during, or after polls. What, however, advances democracy and promotes electoral integrity is the existence and effectiveness of institutional frameworks for electoral conflict management. Electoral conflicts are no doubt unique in the sense that they represent the struggles of people over the control of public resources. In most cases, the stakes involved are high and emotional that they do not only undermine inter-group relationship but also threaten national security. The need, therefore, for an effectively functional conflict management apparatus becomes imperative. While at the State level, there exist numerous governmental initiatives at various electoral stages aimed at managing conflicts, this paper examines the activities of the mass media, which is another prominent stakeholder in the electoral process. Even though media influence has increased tremendously in the last decade, researchers are yet to agree on its utility in the management of conflicts. Guided by the social responsibility theory of media reporting and drawing data from observed trends in Kogi state, the paper, which context analyses the 2019 gubernatorial election coverage in the state, observes both conflict escalation and de-escalation roles in the media. To mitigate conflict reporting misrepresentation, therefore, a common approach to conflict reporting should be designed and ordered by the National Broadcasting Commission as well as the Nigerian Press Council. This should be garnished with the training of journalists on conflict reporting and development of a standard conflict reporting procedure.

Keywords: conflict management, electoral conflict, mass media, media reporting

Procedia PDF Downloads 148
11464 Effects of Food Habits on Road Accidents Due to Micro-Sleepiness and Analysis of Attitudes to Develop a Food Product as a Preventive Measure

Authors: Rumesh Liyanage, S. B. Nawaratne, K. K. D. S. Ranaweera, Indira Wickramasinghe, K. G. S. C. Katukurunda

Abstract:

Study it was attempted to identify an effect of food habits and publics’ attitudes on micro-sleepiness and preventive measures to develop a food product to combat. Statistical data pertaining to road accidents were collected from, Sri Lanka Police Traffic Division and a pre-tested questionnaire was used to collect data from 250 respondents. They were selected representing drivers (especially highway drivers), private and public sector workers (shift based) and cramming students (university and school). Questionnaires were directed to fill independently and personally and collected data were analyzed statistically. Results revealed that 76.84, 96.39 and 80.93% out of total respondents consumed rice for all three meals which lead to ingesting higher glycemic meals. Taking two hyper glycemic meals before 14.00h was identified as a cause of micro-sleepiness within these respondents. Peak level of road accidents were observed at 14.00 - 20.00h (38.2%)and intensity of micro-sleepiness falls at the same time period (37.36%) while 14.00 to 16.00h was the peak time, 16.00 to 18.00h was the least; again 18.00 to 20.00h it reappears slightly. Even though respondents of the survey expressed that peak hours of micro- sleepiness is 14.00-16.00h, according to police reports, peak hours fall in between 18.00-20.00h. Out of the interviewees, 69.27% strongly wanted to avoid micro-sleepiness and intend to spend LKR 10-20 on a commercial product to combat micro sleepiness. As age-old practices to suppress micro-sleepiness are time taken, modern day respondents (51.64%) like to have a quick solution through a drink. Therefore, food habits of morning and noon may cause for micro- sleepiness while dinner may cause for both, natural and micro-sleepiness due to the heavy glycemic load of food. According to the study micro-sleepiness, can be categorized into three zones such as low-risk zone (08.00-10.00h and 18.00-20.00h), manageable zone (10.00-12.00h), and high- risk zone (14.00-16.00h).

Keywords: food habits, glycemic load, micro-sleepiness, road accidents

Procedia PDF Downloads 543
11463 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 250
11462 The Clash of the Clans in the British Divorce

Authors: Samuel Gary Beckton

Abstract:

Ever since the Scottish Independence Referendum in 2014, there has been a threat of a second referendum. However, if there was another referendum and the majority favoured independence, it is highly likely to be by a small majority. In this paper, it will look into the hypothetical situation of what could have happened if Scotland had voted in favour of independence in 2014. If this occurred, there would be many Unionists within Scotland, including devoted supporters of the Better Together campaign. There was a possibility of some Scottish Unionists not willing to accept the result of the Referendum unchallenged and use their right of self-determination through the UN Charter for their region to remain within the United Kingdom. The Shetland and Orkney Islands contemplated of opting out of an independent Scotland in 2013. This caught the attention of some politicians and the media, via confirming the possibility of some form of partition in Scotland and could have gained extra attention if partition quickly became a matter of ‘need’ instead of ‘want’. Whilst some Unionists may have used petitions and formed pressure groups to voice their claims, others may have used more hard-line tactics to achieve their political objectives, including possible protest marches and acts of civil unrest. This could have possibly spread sectarian violence between Scottish Unionists and Nationalists. Glasgow has a serious issue of this kind of sectarianism, which has escalated in recent years. This is due to the number communities that have been established from Irish Immigrants, which maintain links with Northern Irish loyalists and republicans. Some Scottish Unionists not only have sympathy towards Northern Irish loyalists but actively participate with the paramilitary groups and gave support. Scottish loyalists could use these contacts to create their own paramilitary group(s), with aid from remaining UK (RUK) benefactors. Therefore, this could have resulted in the RUK facing a serious security dilemma, with political and ethical consequences to consider. The RUK would have the moral obligation to protect Scottish Unionists from persecution and recognise their right of self-determination, whilst ensuring the security and well-being of British citizens within and outside of Scotland. This work takes into consideration the lessons learned from the ‘Troubles’ in Northern Ireland. As an era of ‘Troubles’ could occur in Scotland, extending into England and Northern Ireland. This is due to proximity, the high number of political, communal and family links in Scotland to the RUK, and the delicate peace process within Northern Ireland which shares a similar issue. This paper will use British and Scottish Government documents prior to the Scottish referendum to argue why partition might happen and use cartography of maps of a potential partition plan for Scotland. Reports from the UK National Statistics, National Rail, and Ministry of Defence shall also be utilised, and use of journal articles that were covering the referendum.

Keywords: identity, nationalism, Scotland, unionism

Procedia PDF Downloads 165
11461 A Research Analysis on the Source Technology and Convergence Types

Authors: Kwounghee Choi

Abstract:

Technological convergence between the various sectors is expected to have a very large impact on future industrial and economy. This study attempts to do empirical approach between specific technologies’ classification. For technological convergence classification, it is necessary to set the target technology to be analyzed. This study selected target technology from national research and development plan. At first we found a source technology for analysis. Depending on the weight of source technology, NT-based, BT-based, IT-based, ET-based, CS-based convergence types were classified. This study aims to empirically show the concept of convergence technology and convergence types. If we use the source technology to classify convergence type, it will be useful to make practical strategies of convergence technology.

Keywords: technology convergence, source technology, convergence type, R&D strategy, technology classification

Procedia PDF Downloads 483
11460 The Reality of E-Commerce in Egypt and Its Role in Enhancing Companies' Competitiveness

Authors: Esam El Gohary

Abstract:

— The companies’ ability to survive and compete in the fierce competition is determined by its competitiveness level. With the spread of information technology use and appearance of online shopping, it became crucial for companies to adopt e-commerce system to increase its competitiveness. This paper was conducted with the purpose of determine how increasing the service value through e-commerce factors (competitive strategy, ICT infrastructures, logistics, security, human resources and innovation) can enhance companies' competitiveness. The problem of this paper is summarized in the absence of the thorough awareness of e-commerce benefits for business owners and customers, as well as how to reduce the intangibility attributes of e-commerce. For this purpose this paper describes the e-commerce in Egypt and its success factors (infrastructures, legal and regulatory environment, human resources and innovation), as well as displays the barriers of such factor, to investigate the significant of these factors on increasing service value and enhance companies' competitiveness. This paper revealed that e-commerce companies have many opportunities to enhance its competitiveness in Egypt, which is enhanced by several factors. The most important factors are “strong ICT infrastructure, qualified and skilled human resources, in addition to the distinctive logistics that distinguish Egypt due to its location, strong legal and regulatory environment and Innovation, as well as the competitive strategy. As well as, companies encounter several threats such as; the lack of infrastructures and logistics in rural areas, the absence of the inclusive understanding and awareness of e-commerce, fear from e-payment transactions and fraud, the ambiguity and burdensome of customs. Through the research findings several recommendations were introduced to both government and companies to overcome threats and exploit opportunities to improve performance and enhance companies' competitiveness.

Keywords: e-commerce competitiveness, e-commerce factors, e-commerce in Egypt, information technology

Procedia PDF Downloads 101
11459 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study

Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly

Abstract:

In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.

Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions

Procedia PDF Downloads 81
11458 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 480
11457 Language Choice and Language Maintenance of Northeastern Thai Staff in Suan Sunandha Rajabhat University

Authors: Napasri Suwanajote

Abstract:

The purposes of this research were to analyze and evaluate successful factors in OTOP production process for the developing of learning center on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality. The research has been designed as a qualitative study to gather information from 30 OTOP producers in Bangkontee District, Samudsongkram Province. They were all interviewed on 3 main parts. Part 1 was about the production process including 1) production, 2) product development, 3) the community strength, 4) marketing possibility, and 5) product quality. Part 2 evaluated appropriate successful factors including 1) the analysis of the successful factors, 2) evaluate the strategy based on Sufficiency Economic Philosophy, and 3) the model of learning center on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality. The results showed that the production did not affect the environment with potential in continuing standard quality production. They used the raw materials in the country. On the aspect of product and community strength in the past 1 year, it was found that there was no appropriate packaging showing product identity according to global market standard. They needed the training on packaging especially for food and drink products. On the aspect of product quality and product specification, it was found that the products were certified by the local OTOP standard. There should be a responsible organization to help the uncertified producers pass the standard. However, there was a problem on food contamination which was hazardous to the consumers. The producers should cooperate with the government sector or educational institutes involving with food processing to reach FDA standard. The results from small group discussion showed that the community expected high education and better standard living. Some problems reported by the community included informal debt and drugs in the community. There were 8 steps in developing the model of learning center on OTOP production process based on Sufficiency Economic Philosophy for sustainable life quality.

Keywords: production process, OTOP, sufficiency economic philosophy, language choice

Procedia PDF Downloads 236
11456 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 163
11455 Characterization and Selection of Phosphorus Deficiency Tolerant Genotypes in Nigeria Based on Morpho-Physiologic Traits

Authors: Umego Chukwudi T., Ntui Valentine O., Uyoh Edak A.

Abstract:

Phosphorus (P) deficiency has been identified as a major hindrance to rice production the world over. Eleven (11) rice genotypes predominantly used by local farmers in Nigeria were studied for their responses to P deficient conditions. The characterization was based on morpho-physiologic parameters. The genotypes were screened using a hydroponic system in a modified Hoagland’s solution. Morphological and physiologic parameters, including Plant height (PH), number of tillers per plant, shoot dry weight (SDW), shoot phosphate concentration (SPC), and chlorophyll content, were recorded after exposure to three levels of phosphate concentration (0µM, 400 µM, and 800 µM). The data obtained were subjected to analysis of variance (ANOVA), and the means were separated using least significance difference tests. The results obtained showed that P starvation caused a significant (p≤0.05) reduction in PH, SDW, and tillering and also triggered a significant (p≤0.05) increase in root length among the genotypes. The Pearsons correlation coefficient was used to estimate the relationships among studied parameters, and a significant negative correlation was observed between plant height and root length. FARO63 was identified as a highly tolerant genotype to P deficiency with a low (0.24) SPC and higher (4.81) phosphate utilization efficiency (PUE). This study has identified FARO63 as a true tolerant genotype to Phosphate deficiency, which will be useful in breeding for phosphate deficiency tolerance in rice and thus combating food insecurity.

Keywords: phosphate deficiency, rice genotypes, hydroponic system, food security

Procedia PDF Downloads 108
11454 Novel Marketing Strategy To Increase Sales Revenue For SMEs Through Social Media

Authors: Kruti Dave

Abstract:

Social media marketing is an essential component of 21st-century business. Social media platforms enable small and medium-sized businesses to enhance brand recognition, generate leads and sales. However, the research on social media marketing is still fragmented and focuses on specific topics, such as effective communication techniques. Since the various ways in which social media impacts individuals and companies alike, the authors of this article focus on the origin, impacts, and current state of Social Media, emphasizing their significance as customer empowerment agents. It illustrates their potential and current responsibilities as part of the corporate business strategy and also suggests several methods to engage them as marketing tools. The focus of social media marketing ranges from defenders to explorers, the culture of Social media marketing encompasses the poles of conservatism and modernity, social media marketing frameworks lie between hierarchies and networks, and its management goes from autocracy to anarchy. This research proposes an integrative framework for small and medium-sized businesses through social media, and the influence of the same will be measured. This strategy will help industry experts to understand this new era. We propose an axiom: Social Media is always a function of marketing as a revenue generator.

Keywords: social media, marketing strategy, media marketing, brand awareness, customer engagement, revenue generator, brand recognition

Procedia PDF Downloads 196
11453 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 72
11452 Experimental Study of Solar Drying of Verbena in Three Types of Solar Dryers

Authors: Llham Lhoume, Rachid Tadili, Nora Arbaoui

Abstract:

One of the most crucial ways to combat food insecurity is to minimize crop losses, food drying is one of the most organic, effective, low-cost and energy-efficient food preservation methods. In this regard, we undertake in this study an experimental evaluation and analysis of the thermal performance of different natural convection drying systems: a solar greenhouse dryer, an indirect solar dryer with a single compartment and a solar dryer with two compartments. These systems have been implemented at the Solar Energy and Environment Laboratory of Mohammed V University (Morocco). The objective of this work is to study the feasibility of converting a solar greenhouse into a solar dryer for use during the summer. On the other hand, to study the thermal performances of this greenhouse dryer by comparing it with other solar dryers. The experimental study showed that the drying of verbena leaves took 6 hours in the indirect dryer 1, 3 hours in the indirect dryer, 2 and 4 hours in the greenhouse dryer, but the amortization period of the solar greenhouse dryer is lower than the other two solar dryers. The results of this study provide key information on the implementation and performance of these systems for drying a food of great global interest.

Keywords: solar energy, drying, agriculture, biotechnologie

Procedia PDF Downloads 79
11451 Food Losses Reducing by Extending the Minimum Durability Date of Thermally Processed Products

Authors: Dorota Zielińska, Monika Trząskowska, Anna Łepecka, Katarzyna Neffe-Skocińska, Beata Bilska, Marzena Tomaszewska, Danuta Kołożyn-Krajewska

Abstract:

Minimum durability date (MDD) labeled food is known to have a long shelf life. A properly stored or transported food retains its physical, chemical, microbiological, and sensory properties up to MDD. The aim of the study was to assess the sensory quality and microbiological safety of selected thermally processed products,i.e., mayonnaise, jam, and canned tuna within and after MDD. The scope of the study was to determine the markers of microbiological quality, i.e., the total viable count (TVC), the Enterobacteriaceae count and the total yeast and mold (TYMC) count on the last day of MDD and after 1 and 3 months of storage, after the MDD expired. In addition, the presence of Salmonella and Listeria monocytogenes was examined on the last day of MDD. The sensory quality of products was assessed by quantitative descriptive analysis (QDA), the intensity of differentiators (quality features), and overall quality were defined and determined. It was found that during three months storage of tested food products, after the MDD expired, the microbiological quality slightly decreased, however, regardless of the tested sample, TVC was at the level of <3 log cfu/g, similarly, the Enterobacretiaceae, what indicates the good microbiological quality of the tested foods. The TYMC increased during storage but did not exceed 2 logs cfu/g of product. Salmonella and Listeria monocytogenes were not found in any of the tested food samples. The sensory quality of mayonnaise negatively changed during storage. After three months from the expiry of MDD, a decrease in the "fat" and "egg" taste and aroma intensity, as well as the "density" were found. The "sour" taste intensity of blueberry jam after three months of storage was slightly higher, compared to the jam tested on the last day of MDD, without affecting the overall quality. In the case of tuna samples, an increase in the "fishy" taste and aroma intensity was observed during storage, and the overall quality did not change. Tested thermally processed products (mayonnaise, jam, and canned tuna) were characterized by good microbiological and sensory quality on the last day of MDD, as well as after three months of storage under conditions recommended by the producer. These findings indicate the possibility of reducing food losses by extending or completely abolishing the MDD of selected thermal processed food products.

Keywords: food wastes, food quality and safety, mayonnaise, jam, tuna

Procedia PDF Downloads 128
11450 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 454
11449 Optimized Approach for Secure Data Sharing in Distributed Database

Authors: Ahmed Mateen, Zhu Qingsheng, Ahmad Bilal

Abstract:

In the current age of technology, information is the most precious asset of a company. Today, companies have a large amount of data. As the data become larger, access to data for some particular information is becoming slower day by day. Faster data processing to shape it in the form of information is the biggest issue. The major problems in distributed databases are the efficiency of data distribution and response time of data distribution. The security of data distribution is also a big issue. For these problems, we proposed a strategy that can maximize the efficiency of data distribution and also increase its response time. This technique gives better results for secure data distribution from multiple heterogeneous sources. The newly proposed technique facilitates the companies for secure data sharing efficiently and quickly.

Keywords: ER-schema, electronic record, P2P framework, API, query formulation

Procedia PDF Downloads 331
11448 The Ugliness of Eating: Resistance to Depicting Consumption in Visual Arts

Authors: Constance Kirker

Abstract:

While there is general agreement that food itself can be beautiful, thousands of still-life masterpieces over the years attest to this, depicting the act of eating, actually placing food in one’s mouth and chewing is seemingly taboo. The environment created around consumption -dining rooms, linens, china, flowers- is consciously choreographed to provide a pleasing aesthetic experience. Yet artists, from Roman frescoes painters to contemporary photographers, create images from feasts to solitary subjects that rarely show food or drink touching lips, chewing, or swallowing. Of the countless paintings of the Last Supper, the food remains on the table. Rarely is Adam or Eve shown taking a bite of the apple, initiating Original Sin. In the few examples that do depict food-in-mouth, Goya’s Saturn Devouring His Son, or the ubiquitous photos of the “wedding smash” with brides and grooms pushing wedding cake into each other’s mouths, the images are seemingly intended to be particularly ugly or humorous in a distasteful way. This paper will explore theories that include the rules of etiquette, some determined hundreds of years ago and still followed today, that imply eating is a metaphor for gluttony, implicit sexuality of eating, the distortion of the face while eating and the simple practicality of the difficulty of an artist’s model maintaining a chewing position. If art is a reflection of society, what drives the universal impulse to hide this very human function?

Keywords: aesthetics, senses, taboo, consumption

Procedia PDF Downloads 72
11447 Determination of Energy and Nutrients Composition of Potential Ready-to-Use Therapeutic Food Formulated from Locally Available Resources

Authors: Amina Sa'id Muhammad, Asmau Ishaq Alhassan, Beba Raymond, Fatima Bello

Abstract:

Severe acute malnutrition (SAM) remains a major killer of children under five years of age. Nigeria has the second highest burden of stunted children in the world, with a national prevalence rate of 32 percent of children under five. An estimated 2 million children in Nigeria suffer from severe acute malnutrition (SAM), and 3.9% of children in northwest Nigeria suffer from SAM, which is significantly higher than the national average of 2.1%. Community-Based Management of Acute Malnutrition (CMAM) has proven to be an effective intervention in the treatment of SAM in children using Ready-to-Use Therapeutic Food (RUTF). Ready-to-use therapeutic food (RUTF) is a key component for the treatment of Severe Acute Malnutrition. It contains all the energy and nutrients required for rapid catch-up growth and used particularly in the treatment of children over 6 months of age with SAM without medical complications. However, almost all RUTFs are currently imported to Nigeria from other countries. Shortages of RUTF due to logistics (shipping costs, delays, donor fatigue etc) and funding issues present a threat to the achievement of the 2030 World Health Assembly (WHA) targets for reducing malnutrition in addition to 2030 SDGs 2 (Zero Hunger), 3 (Good Health and Wellbeing), 12 (Responsible Consumption and Production), and 17 (Partnerships for the Goals), thus undermining its effectiveness in combating malnutrition On the other hand, the availability of human and material resources that will aid local production of RUTF presents an opportunity to fill in the gap in regular RUTF supply. About one thousand Nigerian children die of malnutrition-related causes every day, reaching a total of 361,000 each year. Owing to the high burden of malnutrition in Nigeria, the local production of RUTF is a logical step, that will ensure increased availability, acceptability, access, and efficiency in supply, and at lower costs. Objective(s): The objectives of this study were therefore, to formulate RUTF from locally available resources and to determine its energy and nutrients composition, incommensurate with the standard/commercial RUTF. Methods: Three samples of RUTF were formulated using locally available resources (soya beans, wheat, rice, baobab, brown-sugar, date palm and soya oil); which were subjected to various analysis to determine their energy/proximate composition, vitamin and mineral contents and organoleptic properties were also determined using sensory evaluation. Results: The energy values of the three samples of locally produced RUTF were found to be in conformity with WHO recommendation of ≥ 500 kcal per 100g. The energy values of the three RUTF samples produced in the current study were found to be 563.08, 503.67 and 528.98 kcal respectively. Sample A, B and C had protein content of 13.56% 16.71% and 14.62% respectively, which were higher than that of commercial RUTF (10.9%). Conclusions/recommendations: The locally formulated RUTF samples had energy value of more than 500 kcal per 100g; with an appreciable amount of macro and micro nutrients. The appearance, taste, flavor and general acceptability of the formulated RUTF samples were also commendable.

Keywords: energy, malnutrition, nutrients, RUTF

Procedia PDF Downloads 39
11446 Repeated Batch Cultivation: A Novel Empty and Fill Strategy for the Enhanced Production of a Biodegradable Polymer, Polyhydroxy Alkanoate by Alcaligenes latus

Authors: Geeta Gahlawat, Ashok Kumar Srivastava

Abstract:

In the present study, a simple drain and fill protocol strategy of repeated batch was adopted for enhancement in polyhydroxyalkanoates (PHAs) production using alcaligenes latus DSM 1124. Repeated batch strategy helped in increasing the longevity of otherwise decaying culture in the bioreactor by supplementing fresh substrates during each cycle of repeated-batch. The main advantages of repeated batch are its ease of operation, enhancement of culture stability towards contamination, minimization of pre-culture effects and maintenance of organism at high growth rates. The cultivation of A. latus was carried out in 7 L bioreactor containing 4 L optimized nutrient medium and a comparison with the batch mode fermentation was done to evaluate the performance of repeated batch in terms of PHAs accumulation and productivity. The statistically optimized medium recipe consisted of: 25 g/L Sucrose, 2.8 g/L (NH4)2SO4, 3.25 g/L KH2PO4, 3.25 g/L Na2HPO4, 0.2 g/L MgSO4, 1.5 mL/L trace element solution. In this strategy, 20% (v/v) of the culture broth was removed from the reactor and supplemented with an equal volume of fresh medium when sucrose concentration inside the reactor decreased below 8 g/L. The fermenter was operated for three repeated batch cycles and fresh nutrient feeding was done at 27 h, 48 h, and 60 h. Repeated batch operation resulted in a total biomass of 27.89 g/L and PHAs concentration 20.55 g/L at the end of 69 h which was a marked improvement as compared to batch cultivation (8.71 g/L biomass and 6.24 g/L PHAs). This strategy demonstrated 3.3 fold and 1.8 fold increase in PHAs concentration and volumetric productivity, respectively as compared to batch cultivation. Repeated batch cultivation strategy had also the benefit of avoiding non-productive time period required for cleaning, refilling and sterilization of bioreactor, thereby increasing the overall volumetric productivity and making the entire process cost-effective too.

Keywords: alcaligenes, biodegradation, polyhydroxyalkanoates, repeated batch

Procedia PDF Downloads 368