Search results for: nutrition security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3443

Search results for: nutrition security

1913 Enhancing Strategic Counter-Terrorism: Understanding How Familial Leadership Influences the Resilience of Terrorist and Insurgent Organizations in Asia

Authors: Andrew D. Henshaw

Abstract:

The research examines the influence of familial and kinship based leadership on the resilience of politically violent organizations. Organizations of this type frequently fight in the same conflicts though are called 'terrorist' or 'insurgent' depending on political foci of the time, and thus different approaches are used to combat them. The research considers them correlated phenomena with significant overlap and identifies strengths and vulnerabilities in resilience processes. The research employs paired case studies to examine resilience in organizations under significant external pressure, and achieves this by measuring three variables. 1: Organizational robustness in terms of leadership and governance. 2. Bounce-back response efficiency to external pressures and adaptation to endogenous and exogenous shock. 3. Perpetuity of operational and attack capability, and political legitimacy. The research makes three hypotheses. First, familial/kinship leadership groups have a significant effect on organizational resilience in terms of informal operations. Second, non-familial/kinship organizations suffer in terms of heightened security transaction costs and social economics surrounding recruitment, retention, and replacement. Third, resilience in non-familial organizations likely stems from critical external supports like state sponsorship or powerful patrons, rather than organic resilience dynamics. The case studies pair familial organizations with non-familial organizations. Set 1: The Haqqani Network (HQN) - Pair: Lashkar-e-Toiba (LeT). Set 2: Jemaah Islamiyah (JI) - Pair: The Abu Sayyaf Group (ASG). Case studies were selected based on three requirements, being: contrasting governance types, exposure to significant external pressures and, geographical similarity. The case study sets were examined over 24 months following periods of significantly heightened operational activities. This enabled empirical measurement of the variables as substantial external pressures came into force. The rationale for the research is obvious. Nearly all organizations have some nexus of familial interconnectedness. Examining familial leadership networks does not provide further understanding of how terrorism and insurgency originate, however, the central focus of the research does address how they persist. The sparse attention to this in existing literature presents an unexplored yet important area of security studies. Furthermore, social capital in familial systems is largely automatic and organic, given at birth or through kinship. It reduces security vetting cost for recruits, fighters and supporters which lowers liabilities and entry costs, while raising organizational efficiency and exit costs. Better understanding of these process is needed to exploit strengths into weaknesses. Outcomes and implications of the research have critical relevance to future operational policy development. Increased clarity of internal trust dynamics, social capital and power flows are essential to fracturing and manipulating kinship nexus. This is highly valuable to external pressure mechanisms such as counter-terrorism, counterinsurgency, and strategic intelligence methods to penetrate, manipulate, degrade or destroy the resilience of politically violent organizations.

Keywords: Counterinsurgency (COIN), counter-terrorism, familial influence, insurgency, intelligence, kinship, resilience, terrorism

Procedia PDF Downloads 316
1912 Addressing Undernourishment of Pupils in a Depressed Community through Feeding Program and Vitamin Supplementation

Authors: Alma M. Corpuz

Abstract:

This study evaluated the supplemental feeding program for 59 undernourished pupils in an elementary school located in one of the depressed communities in Tarlac City, Philippines in SY 2013-2014. Pupils were fed for one month with heavy breakfast and afternoon snacks. They were also given vitamins daily. Findings revealed that most of the pupils regained normal Body Mass Indices (BMIs) during a routine weighing in the school opening. In addition, results revealed that the academic performance of the pupils in the 4th Quarter, after the feeding program, was higher compared to the 3rd Quarter period. The researchers recommended that school extension programs should prioritize activities to address malnutrition among pupils to help them perform well in academics. In addition, feeding programs must include heavy meal plans like what was implemented in this project. The feeding program must also include giving of milk and vitamins to ensure significant improvement in their nutrition. It is also important that feacalysis and deworming be performed before the feeding program and proper handwashing be integrated into the feeding activity.

Keywords: wasted, severely wasted, body mass index, supplemental feeding

Procedia PDF Downloads 279
1911 Selenium Content in Agricultural Soils and Wheat from the Balkan Peninsula

Authors: S. Krustev, V. Angelova, P. Zaprjanova

Abstract:

Selenium (Se) is an essential micro-nutrient for human and animals but it is highly toxic. Its organic compounds play an important role in biochemistry and nutrition of the cells. Concentration levels of this element in the different regions of the world vary considerably. This study aimed to compare the availability and levels of the Se in some rural areas of the Balkan Peninsula and relationship with the concentrations of other trace elements. For this purpose soil samples and wheat grains from different regions of Bulgaria, Serbia, Nord Macedonia, Romania, and Greece situated far from large industrial centers have been analyzed. The main methods for their determination were the atomic spectral techniques – atomic absorption and plasma atomic emission. As a result of this study, data on microelements levels from the main grain-producing regions of the Balkan Peninsula were determined and systematized. The presented results confirm the low levels of Se in this region: 0.222– 0.962 mg.kg-1 in soils and 0.001 - 0.005 mg.kg-1 in wheat grains and require measures to offset the effect of this deficiency.

Keywords: agricultural soils, balkan peninsula, rural areas, selenium

Procedia PDF Downloads 136
1910 Nutrient Foramina in the Shaft of Long Bones of Upper Limb

Authors: Madala Venkateswara Rao

Abstract:

The major blood supply to the long bones occurs through the nutrient arteries, which enters through the nutrient foramina. This is the study of nutrient Foramina in the shaft of upper limb long bones taken from the department of Anatomy at Narayana medical college nellore. Nutrient foramina play an important role in nutrition and growth of the bones. Most of the nutrient arteries follow the rule, 'to the elbow I go, from the knee I flee' but they are very variable in position. Their number, location, direction & its importance in the growing end of long bones were studied in the long bones of upper limb. The present study has variations in the position & direction of long bones especially in the radius & ulna, as most of the nutrient foramina are found in anterior surface of upper 1/3rd and middle 1/3rd of these bones. The study of nutrient foramina is not only of academic interest but also in medico-legal practice in relation to their position. Careful observation has also been made on the position of nutrient foramina in relation to upper end of long bones. This study also gives importance of length long bones to know the height of an individual. With the knowledge of variations in the nutrient foramen, placement of internal fixation devices can be appropriately done.

Keywords: nutrient artery, nutrient foramina, shaft of long bones, upper limb bones

Procedia PDF Downloads 504
1909 Development Of Diabetes Mellitus In Overweight People

Authors: Ashiraliyev SHavkat

Abstract:

Relevance of the topic: Diabetes mellitus in overweight people development and absence of treatment measures. Objective: to give patients the correct instructions on proper nutrition, to organize a network of preventive and therapeutic measures. Materials and methods: Multidisciplinary Tashkent Medical Academy. As a result of objective observations in patients who applied to the clinic, 28 11 overweight patients had to type 2 diabetes. Diabetesmellituswasdiagnosed. Results: 11.5 mmol / L on an empty stomach in the morning. EDT yes. Pathogenesis: fat content in the diet of patients with diabetes mellitus. Carbohydrate foods make up 60%. Eating disorders and physical inactivity As a result, the accumulation of glucose in the form of fat increases, and this is constantly in the blood, which led to an increase in the number of fatty acids. Clinic: Frequent fasting in 11 patients (hypothalamus). Associated with glucose deficiency), drinking 8-9 liters of water per day of blood in 7 people Systolic pressure 150 diastolic pressures 100. Sensation of ants in 3 people and poor eyesight in 5 people. Conclusion: Explain to patients that nutritional guidelines should be followed. Assign active movement in accordance with the energy entering the body.

Keywords: mellitus, diabetes, pathogenesis, clinic

Procedia PDF Downloads 94
1908 Renovation of Dilapidated Areas and Sustainable Reconstruction of Various Parts of Tehran, Iran

Authors: Alireza Rahpeyma

Abstract:

One of the most significant challenges faced by cities is inefficient and deteriorated urban fabric. Deteriorated areas bring about numerous issues, including economic, social, physical, and infrastructural problems, sewage management, environmental concerns, and security issues. One of the crucial necessities of modern urban life is the revitalization and renovation of these urban fabrics. Another important aspect is preserving a cohesive cultural and social identity during the urban renewal process. Urban renovation and upgrading are not a one-time occurrence but rather an ongoing process that ultimately needs to become ingrained in the system. This process is not swift; it involves sensitive and intricate stages that require well-designed plans within short, medium, and long-term timeframes. To revitalize dilapidated areas, a comprehensive understanding of the urban region's sustainability is essential. The goal of this study is to provide a suitable model for the upgrading and renewal of areas 2, 4, 5, 7, 8, and 10 in Tehran, preserving the heritage within these urban fabrics (urban assets), including the valuable morphologies of these areas, to prevent financial wastage. This study was conducted descriptively and analytically using the SWOT technique and GIS software. The research results regarding urban upgrading and renewal bring about the following points: 1) Urban upgrading and renewal ensure satisfactory efficiency, justice, environmental quality, safety and security, hygiene, sewage management, and the comfort and aesthetics of urban spaces. 2) Employing the above processes in old city centers re-establishes the historical and cultural connection between people and their past, a past that is evolving and improving and will not repeat itself. 3) Despite the expansion and growth of Iranian cities, cultural and national identity can be preserved by adhering to healthy urban revitalization principles. 4) Proper urban upgrading and renewal prevent social fragmentation, deviant behavioral patterns, psychological and occupational disorders, and financial losses. In general, preserving the identity and urban life in renovation and upgrading must be comprehensive, encompassing various dimensions, including physical, social, economic, political, and administrative aspects.

Keywords: dilapidated areas, renovation, sustainable reconstruction, Tehran-Iran

Procedia PDF Downloads 59
1907 Community Policing: Exploring the Police and Community Participation for Crime Control in Bia West of Ghana

Authors: Bertha Korang Gyimah, Obed Asamoah, Kenross, T. Asamoah

Abstract:

In every human community, crimes or offenses cannot be eliminated, but as crimes are expected, there should be bodies that will control and prevent the crimes. There has been an increasing rate of crime, such as armed robbery, kidnapping, murder, and other forms of violence in the country. Community participation in crime control cannot be left out in Ghana. Several works have been conducted to deal with the importance of community participation in policing, but the causes of communities not fully participating in community policing have been left out. The main aim of the research was to assess the impact of community policing and why the communities are reluctant to partake in community policing to help control crime in Bia West. There have been perceptions about Police that, they expose informant after they give the police tip-off which put the whistleblower life in danger. This has made the community not to get involved in security issues in the community they live in. This situation has posed a serious threat to the Ghana Police Service and its ability to position itself strategically in order to carry out a perfect investigation to bring the perpetrators into custody and to protect their lives and property, as well as the maintenance of law and order. Due to less data on community participation in the Ghana Police Service, the research adopted an interpretative framework to assess the meaning connoted to community policing from the perspectives of the stakeholders themselves. The qualitative research method was used. There was an engagement of the police and community where focus group discussions and individual in-depth interviews were organized in the randomly selected communities in the district. Key informant interviews were used to solicit views of the people why they are reluctant to give information to the police to help them take the perpetrators to book. In the data collected, it was observed that most of the people have been under threats of offenders after they come back from the prisons, it was also observed that some of the unprofessional police personnel’s expose the whistleblowers who put their lives in danger. The data obtained were analyzed using simple Analytical tool SPSS and Excel. Based on the analysis, it was observed that a high number of people in the communities contacted had not made their mind to participate in any security issues. Based on the views of the community, there should be a high level of professionalism in the recruitment system of the Ghana police service to come out with professional police officers who can abide by the rules and regulations governing the profession.

Keywords: community, bia west, Ghana, participation, police

Procedia PDF Downloads 148
1906 Repository Blockchain for Collaborative Blockchain Ecosystem

Authors: Razwan Ahmed Tanvir, Greg Speegle

Abstract:

Collaborative blockchain ecosystems allow diverse groups to cooperate on tasks while providing properties such as decentralization and transaction security. We provide a model that uses a repository blockchain to manage hard forks within a collaborative system such that a single process (assuming that it has knowledge of the requirements of each fork) can access all of the blocks within the system. The repository blockchain replaces the need for Inter Blockchain Communication (IBC) within the ecosystem by navigating the networks. The resulting construction resembles a tree instead of a chain. A proof-of-concept implementation performs a depth-first search on the new structure.

Keywords: hard fork, shared governance, inter blockchain communication, blockchain ecosystem, regular research paper

Procedia PDF Downloads 26
1905 FPGA Implementation of the BB84 Protocol

Authors: Jaouadi Ikram, Machhout Mohsen

Abstract:

The development of a quantum key distribution (QKD) system on a field-programmable gate array (FPGA) platform is the subject of this paper. A quantum cryptographic protocol is designed based on the properties of quantum information and the characteristics of FPGAs. The proposed protocol performs key extraction, reconciliation, error correction, and privacy amplification tasks to generate a perfectly secret final key. We modeled the presence of the spy in our system with a strategy to reveal some of the exchanged information without being noticed. Using an FPGA card with a 100 MHz clock frequency, we have demonstrated the evolution of the error rate as well as the amounts of mutual information (between the two interlocutors and that of the spy) passing from one step to another in the key generation process.

Keywords: QKD, BB84, protocol, cryptography, FPGA, key, security, communication

Procedia PDF Downloads 189
1904 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 444
1903 Advancements in Smart Home Systems: A Comprehensive Exploration in Electronic Engineering

Authors: Chukwuka E. V., Rowling J. K., Rushdie Salman

Abstract:

The field of electronic engineering encompasses the study and application of electrical systems, circuits, and devices. Engineers in this discipline design, analyze and optimize electronic components to develop innovative solutions for various industries. This abstract provides a brief overview of the diverse areas within electronic engineering, including analog and digital electronics, signal processing, communication systems, and embedded systems. It highlights the importance of staying abreast of advancements in technology and fostering interdisciplinary collaboration to address contemporary challenges in this rapidly evolving field.

Keywords: smart home engineering, energy efficiency, user-centric design, security frameworks

Procedia PDF Downloads 91
1902 All at Sea: Why OT / IT Infrastructure Is So Complex and the Challenges of Securing These on a Cruise Ship

Authors: Ken Munro

Abstract:

Cruise ships are possibly the most complex collection of systems it is possible to find in one physical, moving location. Propulsion, navigation, power generation and more, combined with a hotel, restaurant, casino, theatre etc, with safety and fire control systems to boot. That complexity creates huge challenges with keeping OT and IT systems apart. Ships engines are often remotely managed, network segregation is often defeated through troubleshooting when at sea. This session will refer to multiple entertaining and informative tales of taking control of ships, including accessing a ships Azipods via a game simulator for passengers. Fortunately, genuine attacks against vessels are very rare, but the effects and impacts to world trade are becoming increasingly obvious.

Keywords: maritime security, cybersecurity, OT, IT, networks

Procedia PDF Downloads 38
1901 Smart Trust Management for Vehicular Networks

Authors: Amel Ltifi, Ahmed Zouinkhi, Med Salim Bouhlel

Abstract:

Spontaneous networks such as VANET are in general deployed in an open and thus easily accessible environment. Therefore, they are vulnerable to attacks. Trust management is one of a set of security solutions dedicated to this type of networks. Moreover, the strong mobility of the nodes (in the case of VANET) makes the establishment of a trust management system complex. In this paper, we present a concept of ‘Active Vehicle’ which means an autonomous vehicle that is able to make decision about trustworthiness of alert messages transmitted about road accidents. The behavior of an “Active Vehicle” is modeled using Petri Nets.

Keywords: active vehicle, cooperation, petri nets, trust management, VANET

Procedia PDF Downloads 411
1900 Nutritional Status of Food Insecure Students, UWC

Authors: E. C. Swart, E. Kunneke

Abstract:

Background: Disparities in food security exist between communities and households across the country, reflecting continuing social and economic inequalities. The purpose of this study was to investigate the presence of food insecurity amongst UWC students. Method: Cross-sectional study recruited 200 students via email and cellphone from an ICS generated list of randomly selected students aged 18-25. Data collection took place during the first two weeks of term 3. Individual appointments were made with consenting participants and conducted in English by trained BSc Dietetics students. Data was analysed using SPSS. The hunger scale used by Stats SA (October 2010) was used. Dietary intake was assessed using a single 24hr recall. Results: Sixty-three percent of the students reported that they do experience some food insecurity whilst 14.5% reported to go hungry due to inadequate access to food. Coping mechanisms during periods of food insecurity include: Asking a friend, neighbour, family member (40%); Borrow (15%); Steal (none); Casual jobs (12%). Anthropometric status of students did not differ statistically significantly by food security status. A statistically significantly greater proportion of Xhosa speaking students reported inadequate money for food. Students residing in residences off campus appear to be least food secure in terms of money available and limiting food intake, whilst those residing at home are less food insecure. Similar proportions of students who receive bursaries or whose parents are paying reported going hungry whilst those who supports themselves never goes hungry. Mean nutrient intake during the previous 24 hours of students who reported inadequate resources to buy food, who eat less due to inadequate resources and who goes hungry only differed statistically significantly for Vitamin B (go hungry) and for fibre (money shortage). In general the nutrient intake is lower for those who reported to eat less and go hungry except for added sugar, vitamin A and folate (go hungry), and energy, fibre, iron, riboflavin and folate (eat less). For students who reported to have inadequate money to buy food, the mean nutrient intake was higher except for calcium and thiamin. The mean body mass index of this group of students was also higher even though the difference was not statistically significant. Conclusion: Hunger is present on campus however a single 24hr recall did not confirm statistically significant lower nutrient intakes for students who reported different levels of food insecurity.

Keywords: anthropometry, dietary intake, nutritional status, students

Procedia PDF Downloads 378
1899 Educaton for Social Reconstruction: Impact of Social Terrorism on Women Education in Nigeria

Authors: Theresa Chinyere ONU

Abstract:

This paper examines the effect of social terrorism on education in Nigeria. The article looked into some prevailing conditions of international political unrest and insecurity. The fear and risk of these conditions to national security and the struggle for power establishment which has further intensified and taken the shape of terrorism has imposed devastating effects on the growth and prosperity of Nigeria; as traffic patterns get disturbed, hospitals and schools get dysfunctional. This has also affected the educational standard in Nigeria as parents are no longer comfortable in sending their children to schools in some states for the fear of terrorist attacks. The study emphasized the integrated the effort of the government management institutions.

Keywords: education, social terrorism, women, Nigeria

Procedia PDF Downloads 588
1898 Influence of Error Correction Codes on the Quality of Optical Broadband Connections

Authors: Mouna Hemdi, Jamel bel Hadj Tahar

Abstract:

The increasing development of multimedia applications requiring the simultaneous transport of several different services contributes to the evolution of the need for very high-speed network. In this paper, we propose an effective solution to achieve the very high speed while retaining elements of the optical transmission channel. So our study focuses on error correcting codes that aim for quality improvement on duty. We present a comparison of the quality of service for single channels and integrating the code BCH, RS and LDPC in order to find the best code in the different conditions of the transmission.

Keywords: code error correction, high speed broadband, optical transmission, information systems security

Procedia PDF Downloads 396
1897 Macroscopic Evaluation of the Effect of Low-Level Laser and Plasma Jet on Wound Healing in Rats

Authors: Zahra Tabarsi, Mehdi Marjani, Alireza Najafpour, Alborz Mirzade

Abstract:

The aim of this study was to evaluate and compare the macroscopic effect of low level laser and plasma jet for wound healing in rats. The study was performed on 40 old male white rats with an average weight of 250 g and an average age of the same age. After preparing the rats from Ibn Sina Research Institute, they were kept the same for one week under environmental conditions such as temperature, humidity and light, and nutrition such as the type of diet and the number of meals. Then, to start the research, rats were randomly divided into two groups (A): laser treatment of wounds, group (B): plasma wound treatment. All rats were inhibited 4 hours before each anesthesia under conditions of abstinence and up to 2 hours after drinking water. Rats were anesthetized by intraperitoneal injection of ketamine 10% and xylazine 2%.After scrubbing between two shoulders of each rat, a circular wound was created by sterile 5 mm biopsy puncture. Group A rats were treated with low level laser in three sessions and group B in three sessions with argon plasma. Based on the observed results, it seems that Low level laser radiation has more acceptable and appropriate effects than cold plasma on the healing of rat skin wounds.

Keywords: low-level laser, plasma jet, rat, wound healing

Procedia PDF Downloads 115
1896 Implementation of Invisible Digital Watermarking

Authors: V. Monisha, D. Sindhuja, M. Sowmiya

Abstract:

Over the decade, the applications about multimedia have been developed rapidly. The advancement in the communication field at the faster pace, it is necessary to protect the data during transmission. Thus, security of multimedia contents becomes a vital issue, and it is a need for protecting the digital content against malfunctions. Digital watermarking becomes the solution for the copyright protection and authentication of data in the network. In multimedia applications, embedded watermarks should be robust, and imperceptible. For improving robustness, the discrete wavelet transform is used. Both encoding and extraction algorithm can be done using MATLAB R2012a. In this Discrete wavelet transform (DWT) domain of digital image, watermarking algorithm is used, and hardware implementation can be done on Xilinx based FPGA.

Keywords: digital watermarking, DWT, robustness, FPGA

Procedia PDF Downloads 416
1895 Proposal of Data Collection from Probes

Authors: M. Kebisek, L. Spendla, M. Kopcek, T. Skulavik

Abstract:

In our paper we describe the security capabilities of data collection. Data are collected with probes located in the near and distant surroundings of the company. Considering the numerous obstacles e.g. forests, hills, urban areas, the data collection is realized in several ways. The collection of data uses connection via wireless communication, LAN network, GSM network and in certain areas data are collected by using vehicles. In order to ensure the connection to the server most of the probes have ability to communicate in several ways. Collected data are archived and subsequently used in supervisory applications. To ensure the collection of the required data, it is necessary to propose algorithms that will allow the probes to select suitable communication channel.

Keywords: communication, computer network, data collection, probe

Procedia PDF Downloads 364
1894 Influence of Javascript Programming on the Developement of Web and Mobile Application

Authors: Abdul Basit Kiani

Abstract:

Web technologies are growing rapidly in the current era with the increasing development of the web, various novel web technologies emerged to web applications, compared to HTML. JavaScript is the language that provided a dynamic web site which actively interacts with users. The JavaScript language supports the Model View Controller (MVC) architecture that maintains a readable code and clearly separates parts of the program code. Our research is focused on the comparison of the popular JavaScript frameworks; Angular JS, Django, Node JS, Laravel. These frameworks are rely on MVC. In this paper, we will discuss the merits and demerits of each framework, the influence on the application speed, testing methods, for example, JS applications, and methods to advance code security.

Keywords: java script, react, nodejs, htmlcsss

Procedia PDF Downloads 130
1893 Using Agility in Building Business Process Management Solutions

Authors: Krešimir Fertalj, Mladen Matejaš

Abstract:

In turbulent modern economy, the companies need to properly manage their business processes. Well defined and stable business processes ensure the security of crucial data and application, and provide a quality product or service to the end customer. On the other side constant changes on the market, new regulatory provisions and emerging new technologies require the need of issuing prompt and effective changes of business process. In this article, we explore the use of agile principles in working with business process management (BPM) solutions. We deal with difficulties in BPM development cycle, review the benefits of using agility and choose the basic agile principles that ensure the success of a BPM project.

Keywords: agile development, BPM environment, Kanban, SCRUM, XP

Procedia PDF Downloads 327
1892 The Applicability of General Catholic Canon Law during the Ongoing Migration Crisis in Hungary

Authors: Lorand Ujhazi

Abstract:

The vast majority of existing canonical studies about migration are focused on examining the general pastoral and legal regulations of the Catholic Church. The weakness of this approach is that it ignores a number of important factors; like the financial, legal and personal circumstances of a particular church or the canonical position of certain organizations which actually look after the immigrants. This paper is a case study, which analyses the current and historical migration related policies and activities of the Catholic Church in Hungary. To achieve this goal the study uses canon law, historical publications, various instructions and communications issued by church superiors, Hungarian and foreign media reports and the relevant Hungarian legislation. The paper first examines how the Hungarian Catholic Church assisted migrants like Armenians fleeing from the Ottoman Empire, Poles escaping during the Second World War, East German and Romanian citizens in the 1980s and refugees from the former Yugoslavia in the 1990s. These events underline the importance of past historical experience in the development of contemporary pastoral and humanitarian policy of the Catholic Church in Hungary. Then the paper turns to the events of the ongoing crisis by describing the unique challenges faced by churches in transit countries like Hungary. Then the research contrasts these findings with the typical responsibilities of churches in countries which are popular destinations for immigrants. The next part of the case study focuses on the changes to the pre-crisis legal and canonical framework which influenced the actions of hierarchical and charity organizations in Hungary. Afterwards, the paper illustrates the dangers of operating in an unclear legal environment, where some charitable activities of the church like a fundraising campaign may be interpreted as a national security risk by state authorities. Then the paper presents the reactions of Hungarian academics to the current migration crisis and finally it offers some proposals how to improve parts of Canon Law which govern immigration. The conclusion of the paper is that during the formulation of the central refugee policy of the Catholic Church decision makers must take into consideration the peculiar circumstances of its particular churches. This approach may prevent disharmony between the existing central regulations, the policy of the Vatican and the operations of the local church organizations.

Keywords: canon law, Catholic Church, civil law, Hungary, immigration, national security

Procedia PDF Downloads 310
1891 Hierarchical Cluster Analysis of Raw Milk Samples Obtained from Organic and Conventional Dairy Farming in Autonomous Province of Vojvodina, Serbia

Authors: Lidija Jevrić, Denis Kučević, Sanja Podunavac-Kuzmanović, Strahinja Kovačević, Milica Karadžić

Abstract:

In the present study, the Hierarchical Cluster Analysis (HCA) was applied in order to determine the differences between the milk samples originating from a conventional dairy farm (CF) and an organic dairy farm (OF) in AP Vojvodina, Republic of Serbia. The clustering was based on the basis of the average values of saturated fatty acids (SFA) content and unsaturated fatty acids (UFA) content obtained for every season. Therefore, the HCA included the annual SFA and UFA content values. The clustering procedure was carried out on the basis of Euclidean distances and Single linkage algorithm. The obtained dendrograms indicated that the clustering of UFA in OF was much more uniform compared to clustering of UFA in CF. In OF, spring stands out from the other months of the year. The same case can be noticed for CF, where winter is separated from the other months. The results could be expected because the composition of fatty acids content is greatly influenced by the season and nutrition of dairy cows during the year.

Keywords: chemometrics, clustering, food engineering, milk quality

Procedia PDF Downloads 282
1890 Managing Virtual Teams in a Pandemic

Authors: M. Jafari Toosy, A. Zamani

Abstract:

This article, considering the result of pandemics at the international level and all activities and projects performed virtually and the need for resource management and virtual teams in this period identifies the components of virtual management after searching the available resources. Exploration of virtual management in the pandemic era is explored in 10 international articles. The results of research with this method and according to the tasks and topics related to management knowledge and definition of virtual teams can be divided into topics such as planning, decision making, control, organization, leadership, attention to growth and capability, resources and facilities, Communication, creativity, innovation and security. In order to explain the nature of virtual management, a definition of virtual management was provided.

Keywords: management, virtual, virtual team management, pandemic, team

Procedia PDF Downloads 192
1889 RFID and Intelligence: A Smart Authentication Method for Blind People​

Authors: V. Vishu, R. Manimegalai

Abstract:

A combination of Intelligence and Radio frequency identification to bring an enhanced authentication method for the improvement of visually challenged people. The main goal is to provide an improved authentication by combining Advanced Encryption Standard algorithm and Intelligence. Here the encryption key will be generated as a combination of intelligent information from sensors and tag values. The main challenges are security, privacy and cost. Besides, the method was created to evaluate the amount of interaction between sensors and significant influence on the level of visually challenged people’s mental and physical states. The proposal is to apply various ideas on independent living or to assist them for a good life.

Keywords: AES, encryption, intelligence, smart key

Procedia PDF Downloads 246
1888 Alternative Animal Feed Additive Obtain with Different Drying Methods from Carrot Unsuitable for Human Consumption

Authors: Rabia Göçmen, Gülşah Kanbur, Sinan Sefa Parlat

Abstract:

This study was conducted to determine that carrot powder obtain by different drying methods (oven and vacuum-freeze dryer) of carrot unfit for human consumption that whether feed additives in animal nutrition or not. Carrots randomly divided 2 groups. First group was dried by using oven, second group was by using vacuum freeze dryer methods. Dried carrot prepared from fresh carrot was analysed nutrient matter (energy, crude protein, crude oil, crude ash, beta carotene, mineral concentration and colour). The differences between groups in terms of energy, crude protein, ash, Ca and Mg was not significant (P> 0,05). Crude oil, P, beta carotene content and colour values (L, a, b) with vacuum-freeze dryer group was greater than oven group (P<0,05). Consequently, carrot powder obtained by drying the vacuum-freeze dryer method can be used as a source of carotene.

Keywords: carrot, vacuum freeze dryer, oven, beta carotene

Procedia PDF Downloads 328
1887 Parallel Hybrid Honeypot and IDS Architecture to Detect Network Attacks

Authors: Hafiz Gulfam Ahmad, Chuangdong Li, Zeeshan Ahmad

Abstract:

In this paper, we proposed a parallel IDS and honeypot based approach to detect and analyze the unknown and known attack taxonomy for improving the IDS performance and protecting the network from intruders. The main theme of our approach is to record and analyze the intruder activities by using both the low and high interaction honeypots. Our architecture aims to achieve the required goals by combing signature based IDS, honeypots and generate the new signatures. The paper describes the basic component, design and implementation of this approach and also demonstrates the effectiveness of this approach reducing the probability of network attacks.

Keywords: network security, intrusion detection, honeypot, snort, nmap

Procedia PDF Downloads 571
1886 An Algorithm Based on the Nonlinear Filter Generator for Speech Encryption

Authors: A. Belmeguenai, K. Mansouri, R. Djemili

Abstract:

This work present a new algorithm based on the nonlinear filter generator for speech encryption and decryption. The proposed algorithm consists on the use a linear feedback shift register (LFSR) whose polynomial is primitive and nonlinear Boolean function. The purpose of this system is to construct Keystream with good statistical properties, but also easily computable on a machine with limited capacity calculated. This proposed speech encryption scheme is very simple, highly efficient, and fast to implement the speech encryption and decryption. We conclude the paper by showing that this system can resist certain known attacks.

Keywords: nonlinear filter generator, stream ciphers, speech encryption, security analysis

Procedia PDF Downloads 299
1885 Suggestions to the Legislation about Medical Ethics and Ethics Review in the Age of Medical Artificial Intelligence

Authors: Xiaoyu Sun

Abstract:

In recent years, the rapid development of Artificial Intelligence (AI) has extensively promoted medicine, pharmaceutical, and other related fields. The medical research and development of artificial intelligence by scientific and commercial organizations are on the fast track. The ethics review is one of the critical procedures of registration to get the products approved and launched. However, the SOPs for ethics review is not enough to guide the healthy and rapid development of artificial intelligence in healthcare in China. Ethical Review Measures for Biomedical Research Involving Human Beings was enacted by the National Health Commission of the People's Republic of China (NHC) on December 1st, 2016. However, from a legislative design perspective, it was neither updated timely nor in line with the trends of AI international development. Therefore, it was great that NHC published a consultation paper on the updated version on March 16th, 2021. Based on the most updated laws and regulations in the States and EU, and in-depth-interviewed 11 subject matter experts in China, including lawmakers, regulators, and key members of ethics review committees, heads of Regulatory Affairs in SaMD industry, and data scientists, several suggestions were proposed on top of the updated version. Although the new version indicated that the Ethics Review Committees need to be created by National, Provincial and individual institute levels, the review authorities of different levels were not clarified. The suggestion is that the precise scope of review authorities for each level should be identified based on Risk Analysis and Management Model, such as the complicated leading technology, gene editing, should be reviewed by National Ethics Review Committees, it will be the job of individual institute Ethics Review Committees to review and approve the clinical study with less risk such as an innovative cream to treat acne. Furthermore, to standardize the research and development of artificial intelligence in healthcare in the age of AI, more clear guidance should be given to data security in the layers of data, algorithm, and application in the process of ethics review. In addition, transparency and responsibility, as two of six principles in the Rome Call for AI Ethics, could be further strengthened in the updated version. It is the shared goal among all countries to manage well and develop AI to benefit human beings. Learned from the other countries who have more learning and experience, China could be one of the most advanced countries in artificial intelligence in healthcare.

Keywords: biomedical research involving human beings, data security, ethics committees, ethical review, medical artificial intelligence

Procedia PDF Downloads 171
1884 Patient Reported Experience of in-Patient Orthognathic Care in an NHS Hospital, in Comparison to a Private Hospital

Authors: R. Litt, A. Kana, K. House

Abstract:

The primary aim of this patient-related experience questionnaire was to gain a better understanding of our patients' experience as inpatients when they undergo orthognathic surgery. The secondary aim of this study was to identify ways in which we can improve the orthognathic inpatient experience and to share this with other units. All patients who received orthognathic surgery at an NHS hospital - Bristol Royal Infirmary, England, over the course of 6 months were asked to complete a questionnaire regarding their care. This data was then analysed and compared to the same questionnaire given to patients treated in a private hospital where orthognathic surgery was completed. All treatment was completed by the same surgeon. The design of the questions took into account NICE (National Institute for Health and Care Excellence) guidance on improving the experience of patient care. Particularly taking into account patients' essential requirements of care, for example, assessing and managing pain, ensuring adequate and appropriate nutrition, and ensuring the patients' personal needs are regularly reviewed and addressed. Overall the patient-related experience after orthognathic surgery was comparable in both the NHS and private hospitals. However, the questionnaire highlighted aspects of inpatient care after orthognathic surgery that can easily be improved in order to provide our patients with the best possible care.

Keywords: orthognathic surgery, patient feedback, jaw surgery, inpatient experience

Procedia PDF Downloads 153