Search results for: logit regression model and food security
22068 Evaluation of Two DNA Extraction Methods for Minimal Porcine (Pork) Detection in Halal Food Sample Mixture Using Taqman Real-time PCR Technique
Authors: Duaa Mughal, Syeda Areeba Nadeem, Shakil Ahmed, Ishtiaq Ahmed Khan
Abstract:
The identification of porcine DNA in Halal food items is critical to ensuring compliance with dietary restrictions and religious beliefs. In Islam, Porcine is prohibited as clearly mentioned in Quran (Surah Al-Baqrah, Ayat 173). The purpose of this study was to compare two DNA extraction procedures for detecting 0.001% of porcine DNA in processed Halal food sample mixtures containing chicken, camel, veal, turkey and goat meat using the TaqMan Real-Time PCR technology. In this research, two different commercial kit protocols were compared. The processed sample mixtures were prepared by spiking known concentration of porcine DNA to non-porcine food matrices. Afterwards, TaqMan Real-Time PCR technique was used to target a particular porcine gene from the extracted DNA samples, which was quantified after extraction. The results of the amplification were evaluated for sensitivity, specificity, and reproducibility. The results of the study demonstrated that two DNA extraction techniques can detect 0.01% of porcine DNA in mixture of Halal food samples. However, as compared to the alternative approach, Eurofins| GeneScan GeneSpin DNA Isolation kit showed more effective sensitivity and specificity. Furthermore, the commercial kit-based approach showed great repeatability with minimal variance across repeats. Quantification of DNA was done by using fluorometric assay. In conclusion, the comparison of DNA extraction methods for detecting porcine DNA in Halal food sample mixes using the TaqMan Real-Time PCR technology reveals that the commercial kit-based approach outperforms the other methods in terms of sensitivity, specificity, and repeatability. This research helps to promote the development of reliable and standardized techniques for detecting porcine DNA in Halal food items, religious conformity and assuring nutritional.Keywords: real time PCR (qPCR), DNA extraction, porcine DNA, halal food authentication, religious conformity
Procedia PDF Downloads 7622067 European Food Safety Authority (EFSA) Safety Assessment of Food Additives: Data and Methodology Used for the Assessment of Dietary Exposure for Different European Countries and Population Groups
Authors: Petra Gergelova, Sofia Ioannidou, Davide Arcella, Alexandra Tard, Polly E. Boon, Oliver Lindtner, Christina Tlustos, Jean-Charles Leblanc
Abstract:
Objectives: To assess chronic dietary exposure to food additives in different European countries and population groups. Method and Design: The European Food Safety Authority’s (EFSA) Panel on Food Additives and Nutrient Sources added to Food (ANS) estimates chronic dietary exposure to food additives with the purpose of re-evaluating food additives that were previously authorized in Europe. For this, EFSA uses concentration values (usage and/or analytical occurrence data) reported through regular public calls for data by food industry and European countries. These are combined, at individual level, with national food consumption data from the EFSA Comprehensive European Food Consumption Database including data from 33 dietary surveys from 19 European countries and considering six different population groups (infants, toddlers, children, adolescents, adults and the elderly). EFSA ANS Panel estimates dietary exposure for each individual in the EFSA Comprehensive Database by combining the occurrence levels per food group with their corresponding consumption amount per kg body weight. An individual average exposure per day is calculated, resulting in distributions of individual exposures per survey and population group. Based on these distributions, the average and 95th percentile of exposure is calculated per survey and per population group. Dietary exposure is assessed based on two different sets of data: (a) Maximum permitted levels (MPLs) of use set down in the EU legislation (defined as regulatory maximum level exposure assessment scenario) and (b) usage levels and/or analytical occurrence data (defined as refined exposure assessment scenario). The refined exposure assessment scenario is sub-divided into the brand-loyal consumer scenario and the non-brand-loyal consumer scenario. For the brand-loyal consumer scenario, the consumer is considered to be exposed on long-term basis to the highest reported usage/analytical level for one food group, and at the mean level for the remaining food groups. For the non-brand-loyal consumer scenario, the consumer is considered to be exposed on long-term basis to the mean reported usage/analytical level for all food groups. An additional exposure from sources other than direct addition of food additives (i.e. natural presence, contaminants, and carriers of food additives) is also estimated, as appropriate. Results: Since 2014, this methodology has been applied in about 30 food additive exposure assessments conducted as part of scientific opinions of the EFSA ANS Panel. For example, under the non-brand-loyal scenario, the highest 95th percentile of exposure to α-tocopherol (E 307) and ammonium phosphatides (E 442) was estimated in toddlers up to 5.9 and 8.7 mg/kg body weight/day, respectively. The same estimates under the brand-loyal scenario in toddlers resulted in exposures of 8.1 and 20.7 mg/kg body weight/day, respectively. For the regulatory maximum level exposure assessment scenario, the highest 95th percentile of exposure to α-tocopherol (E 307) and ammonium phosphatides (E 442) was estimated in toddlers up to 11.9 and 30.3 mg/kg body weight/day, respectively. Conclusions: Detailed and up-to-date information on food additive concentration values (usage and/or analytical occurrence data) and food consumption data enable the assessment of chronic dietary exposure to food additives to more realistic levels.Keywords: α-tocopherol, ammonium phosphatides, dietary exposure assessment, European Food Safety Authority, food additives, food consumption data
Procedia PDF Downloads 32422066 A Feasibility Study of Waste (d) Potential: Synergistic Effect Evaluation by Co-digesting Organic Wastes and Kinetics of Biogas Production
Authors: Kunwar Paritosh, Sanjay Mathur, Monika Yadav, Paras Gandhi, Subodh Kumar, Nidhi Pareek, Vivekanand Vivekanand
Abstract:
A significant fraction of energy is wasted every year managing the biodegradable organic waste inadequately as development and sustainability are the inherent enemies. The management of these waste is indispensable to boost its optimum utilization by converting it to renewable energy resource (here biogas) through anaerobic digestion and to mitigate greenhouse gas emission. Food and yard wastes may prove to be appropriate and potential feedstocks for anaerobic co-digestion for biogas production. The present study has been performed to explore the synergistic effect of co-digesting food waste and yard trimmings from MNIT campus for enhanced biogas production in different ratios in batch tests (37±10C, 90 rpm, 45 days). The results were overwhelming and showed that blending two different organic waste in proper ratio improved the biogas generation considerably, with the highest biogas yield (2044±24 mLg-1VS) that was achieved at 75:25 of food waste to yard waste ratio on volatile solids (VS) basis. The yield was 1.7 and 2.2 folds higher than the mono-digestion of food or yard waste (1172±34, 1016±36mLg-1VS) respectively. The increase in biogas production may be credited to optimum C/N ratio resulting in higher yield. Also Adding TiO2 nanoparticles showed virtually no effect on biogas production as sometimes nanoparticles enhance biogas production. ICP-MS, FTIR analysis was carried out to gain an insight of feedstocks. Modified Gompertz and logistics models were applied for the kinetic study of biogas production where modified Gompertz model showed goodness-of-fit (R2=0.9978) with the experimental results.Keywords: anaerobic co-digestion, biogas, kinetics, nanoparticle, organic waste
Procedia PDF Downloads 38422065 Behavior, Temperament and Food Intake of Urban Indian Adolescents
Authors: Preeti Khanna, Bani T. Aeri
Abstract:
Background: Recent studies have indicated challenges that hamper health and wellbeing of a vast majority of adolescents in developing countries. Many modifiable factors like behavior and temperament related to food intake among adolescents have not been adequately explored. The aim of the proposed research is to study the impact of behavior and temperament on food intake and diet quality of adolescents. Objectives: In the present study data on dietary behavior and anthropometry of adolescent boys & girls (aged 13-16 years) studying in public schools of Delhi will be gathered to ascertain the quality of diet among adolescent boys and girls and to study the effect of behavior and temperament on diet quality of adolescents. Methods: In total, 400 adolescents will participate in this cross-sectional study. Weight and height of adolescents will be measured and BMI will be calculated. Information will be obtained on their socio-demographic profile and various factors influencing their Food Choices and diet quality such as body image perception, Behavior, temperament, locus of control and parental influence. Expected results: Several direct effects of adolescent traits and behavior on food intake will be observed. Maturational patterns and gender differences in behavior traits will be assessed. By profiling of the behavior and temperament traits, we will have a better understanding of impact of these factors on weight and eating behaviors in overweight/obese or even underweight adolescents. Conclusions: The proposed study will highlight the association of behavioral factors with nutritional status of adolescents. It will also serve as a strategic approach for the obesity prevention and health management policies designed for adolescents.Keywords: behaviour, temperament, food intake, adolescents
Procedia PDF Downloads 24222064 Effect of Environmental Conditions on E. Coli o157:h7 Atcc 43888 and L. Monocytogenes Atcc 7644 Cell Surface Hydrophobicity, Motility and Cell Attachment on Food-Contact Surfaces
Authors: Stanley Dula, Oluwatosini A. Ijabadeniyi
Abstract:
Biofilm formation is a major source of materials and foodstuffs contamination, contributing to occurrence of pathogenic and spoilage microbes in food processing resulting in food spoilage, transmission of diseases and significant food hygiene and safety issues. This study elucidates biofilm formation of E. coli O157:H7 and L. monocytogenes ATCC 7644 grown under food related environmental stress conditions of varying pH (5.0;7.0; and 8.5) and temperature (15, 25 and 37 ℃). Both strains showed confluent biofilm formation at 25 ℃ and 37 ℃, at pH 8.5 after 5 days. E. coli showed curli fimbriae production at various temperatures, while L. monocytogenes did not show pronounced expression. Swarm, swimming and twitching plate assays were used to determine strain motilities. Characterization of cell hydrophobicity was done using the microbial adhesion to hydrocarbons (MATH) assay using n-hexadecane. Both strains showed hydrophilic characteristics as they fell within a < 20 % interval. FT-IR revealed COOH at 1622 cm-1, and a strong absorption band at 3650 cm-1 – 3200 cm-1 indicating the presence of both -OH and -NH groups. Both strains were hydrophilic and could form biofilm at different combinations of temperature and pH. EPS produced in both species proved to be an acidic hetero-polysaccharide.Keywords: biofilm, pathogens, hydrophobicity, motility
Procedia PDF Downloads 23522063 Robust Data Image Watermarking for Data Security
Authors: Harsh Vikram Singh, Ankur Rai, Anand Mohan
Abstract:
In this paper, we propose secure and robust data hiding algorithm based on DCT by Arnold transform and chaotic sequence. The watermark image is scrambled by Arnold cat map to increases its security and then the chaotic map is used for watermark signal spread in middle band of DCT coefficients of the cover image The chaotic map can be used as pseudo-random generator for digital data hiding, to increase security and robustness .Performance evaluation for robustness and imperceptibility of proposed algorithm has been made using bit error rate (BER), normalized correlation (NC), and peak signal to noise ratio (PSNR) value for different watermark and cover images such as Lena, Girl, Tank images and gain factor .We use a binary logo image and text image as watermark. The experimental results demonstrate that the proposed algorithm achieves higher security and robustness against JPEG compression as well as other attacks such as addition of noise, low pass filtering and cropping attacks compared to other existing algorithm using DCT coefficients. Moreover, to recover watermarks in proposed algorithm, there is no need to original cover image.Keywords: data hiding, watermarking, DCT, chaotic sequence, arnold transforms
Procedia PDF Downloads 51322062 The Spatial Analysis of Wetland Ecosystem Services Valuation on Flood Protection in Tone River Basin
Authors: Tingting Song
Abstract:
Wetlands are significant ecosystems that provide a variety of ecosystem services for humans, such as, providing water and food resources, purifying water quality, regulating climate, protecting biodiversity, and providing cultural, recreational, and educational resources. Wetlands also provide benefits, such as reduction of flood, storm damage, and soil erosion. The flood protection ecosystem services of wetlands are often ignored. Due to climate change, the flood caused by extreme weather in recent years occur frequently. Flood has a great impact on people's production and life with more and more economic losses. This study area is in the Tone river basin in the Kanto area, Japan. It is the second-longest river with the largest basin area in Japan, and it is still suffering heavy economic losses from floods. Tone river basin is one of the rivers that provide water for Tokyo and has an important impact on economic activities in Japan. The purpose of this study was to investigate land-use changes of wetlands in the Tone River Basin, and whether there are spatial differences in the value of wetland functions in mitigating economic losses caused by floods. This study analyzed the land-use change of wetland in Tone River, based on the Landsat data from 1980 to 2020. Combined with flood economic loss, wetland area, GDP, population density, and other social-economic data, a geospatial weighted regression model was constructed to analyze the spatial difference of wetland ecosystem service value. Now, flood protection mainly relies on such a hard project of dam and reservoir, but excessive dependence on hard engineering will cause the government huge financial pressure and have a big impact on the ecological environment. However, natural wetlands can also play a role in flood management, at the same time they can also provide diverse ecosystem services. Moreover, the construction and maintenance cost of natural wetlands is lower than that of hard engineering. Although it is not easy to say which is more effective in terms of flood management. When the marginal value of a wetland is greater than the economic loss caused by flood per unit area, it may be considered to rely on the flood storage capacity of the wetland to reduce the impact of the flood. It can promote the sustainable development of wetlands ecosystem. On the other hand, spatial analysis of wetland values can provide a more effective strategy for flood management in the Tone river basin.Keywords: wetland, geospatial weighted regression, ecosystem services, environment valuation
Procedia PDF Downloads 9922061 Nutrition and Physical Activity in Obese Women
Authors: Shubeska Stratrova S., Muca A., Panovska S. Clinic of endocrinology, diabetes, metabolic disorders, Medical Faculty, Skopje, N. Macedonia
Abstract:
Rationale: Obese subjects have a high energy density diet, low physical activity levels, a sedentary lifestyle, as well as eating disorders, which are considered important risk factors for the development of obesity. Methods: In order to discover the imbalance of energy intake and energy expenditure in obese women (W), two groups of examinees answered questionnaires regarding nutrition and physical activity: 1st group of women with normal body mass index (BMI <25 kg/m²) and 2nd group of obese women with BMI >30 kg/m². Results: 61.11% of obese W from the 2nd group reported good appetite, which was higher than the 1st group (45%). In 55.56% W, frustrations were a provocation for over nutrition. In the 2nd group, 38.89% W ate too much compared to 9.09% W from the 1st group. In the ²ⁿᵈ group, 35.29% W reported consuming food rarely and too much, while 29.41% W reported consuming food often and too much. All examinees from the ²ⁿᵈ group had consumed food in less than 5 hours, compared to only 8.33% W from the ¹ⁿᵈ group and had consumed hyper-caloric food. Consumption of fruits and vegetables was lower in the 2nd group compared to the 1st group. Half of the subjects in the 2nd group were physically inactive, compared to only 8% in the 1st group. All of the examinees in the 2nd group walked for less than 3 hours a day, compared to 54% in the 1st group. In the 2nd group, 67% W reported watching TV very often, 39% reported watching TV longer than 3 hours, which is significantly higher than 8.33% W in the 1st group. Overall, 81.25% of examinees from the 2nd group reported sitting for more than 3 hours a day, which is significantly more compared to the 1st group (45.45%). Conclusions: Obese women are less physically active, have a sedentary lifestyle, good appetite, and consume too much hyper-caloric food very often.Keywords: (W) obese women, BMI(Body mass Index), nutrition, hyper-caloric food
Procedia PDF Downloads 7422060 The Influence of the Islamic State (IS) on India: Recent Developments and Challenges
Authors: Alvite Singh Ningthoujam
Abstract:
The most recent terror phenomenon, which is also known as the Islamic State of Iraq and Syria (ISIS), or Islamic State (IS), has its influence felt in South Asia. This dreaded Sunni militant group, today, has become a concern in India as well. Already affected by various terror activities in the country, the influence of the IS on the radicalised Muslim youths in India has been watched closely by the security agencies. There had already been a few IS-related incidents in India due to which this issue has emerged as a threat or challenge to India’s internal security. The rapid radicalisation of youths in a few states where there are sizeable Muslim populations has gone, to some extent, in favour of the IS, particularly in the terror outfit’s recruitment process. What has added to the worry of the Indian security agencies is the announcement of the Al-Qaeda leader, Ayman al-Zawahari, of the creation of the Al-Qaeda in the Indian Subcontinent. In fact, this is a worrisome factor as both the militant groups, that is, al-Qaeda and ISIS, have a similar objective to target India and to turn this South Asian country as one of the recruiting grounds for extremists. There is also a possibility that an Indian Mujahedeen (IM) man was believed to be instrumental in recruiting for the ISIS poor Muslims in a few Indian states. If this nexus between ISIS and India’s home-grown terror groups manages to establish a robust link, then the headache of combating such amalgamated force will be a hard task for Indian security agencies. In the wake of the above developments, this paper would seek to analyse the developing trend in India in regard to IS. It would also bring out the reasons as to why further penetration of the IS influence on India would be a grave concern in the internal security of the country. The last section of the paper would highlight the steps that have been taken by the Indian government to tackle this menace effectively.Keywords: India, Islamic State, Muslim, Security
Procedia PDF Downloads 37522059 Dietary Habits and Cardiovascular Risk factors Among the Patients of the Coronary Artery Disease: A Case Control Study
Authors: Muhammad Kamran Hanif Khan, Fahad Mushtaq
Abstract:
Globally, the death rate from cardiovascular disease has risen over the past 20 years, but especially in low and middle-income countries (LMICS), reports the World Health Organization (WHO). Around 17.5 million deaths, or 31% of all deaths worldwide in 2012, were attributed to CVD, 80% of which occurred in low- and middle-income nations, and eighty five percent of all worldwide disability is attributable to cardiovascular disease. This study assessed the dietary habit and Cardiovascular Risk factors among the patients of coronary artery disease against matched controls. The research was a case-control study. Sample size for this case-control study was 410 CAD cases and 410 healthy controls. The case-control ratio was 1:1. Patients diagnosed with coronary artery disease were recruited from the outpatient departments and emergency rooms of four hospitals in Pakistan. The ages of people who were diagnosed with coronary artery disease were not significantly different from (mean 57.97 7.39 years) the healthy controls (mean 57.12 6.73 years). In order to determine the relationship between food consumption and the two binary outcomes, logistic regression analysis was carried out. Chicken (0.340 (0.245-0.47), p-value 0.0001), beef (0.38 (0.254-0.56), p-value 0.0001), eggs (0.297 (0.208-0.426), p-value 0.0001), and junk food (0.249 (0.167-0.372), p-value 0.0001)) were protective, while yogurt consumption more than twice weekly was risk. Conclusion: In conclusion, poor dietary habits are closely linked to the risk of CAD. Investigations based on dietary trends offer vital and practical knowledge about societal patterns.Keywords: dietary habbits, cardiovasculardisease, CVD risk factors, hypercholesterolemia
Procedia PDF Downloads 8022058 Evaluating Antimicrobial Activity of Selenium Nanoparticles Against Food-Borne Bacteria
Authors: Qunying Yuan, Manjula Bomma, Adrian Rhoden, Zhigang Xiao
Abstract:
Selenium is an essential micronutrient for all mammals and plays an important role in maintaining human physiological functions. The potential applications of selenium as food supplements, cancer-prevention, antimicrobial and anti-inflammatory agents have been investigated in biomedicine and food sciences. Nanoscale of selenium is of particular interest due to its better biocompatibility, higher bioavailability, lower toxicity, more homogeneous distribution, and presumptive controlled release of substances. The objective of this study is to explore whether selenium nanoparticle (SeNP) has the potential to be used as a food preservative to reduce food spoilage. SeNPs were synthesized through ascorbic acid reduction of sodium selenite using the bovine serum albumin (BSA) as capping and stabilizing agent. The chemically synthesized SeNPs had a spherical conformation and a size of 22.8 ± 4.7 nm. FTIR analysis confirmed that the nanoparticles were covered with BSA. We further tested the antimicrobial activity of these SeNPs against common food-borne bacteria. Colony forming unit assay showed that SeNPs exhibited good inhibition on the growth of Listeria Monocytogens (ATCC15313), Staphylococcus epidermidis (ATCC 700583) starting at 0.5µg/mL, but only a moderate inhibitory effect on the growth of Staphylococcus aureus (ATCC12600) and Vibrio alginolyticus (ATCC 33787) at a concentration higher than 10µg/mL and 2.5µg/mL, respectively. There was a mild effect against the growth Salmonella enterica (ATCC19585) when the concentration reached 15µg/mL. No inhibition was observed in the growth of Enterococcus faecalis (ATCC 19433). Surprisingly, SeNPs appeared to promote the growth of Vibrio parahaemolyticus (ATCC43996) and Salmonella enterica (ATCC49284) at 30 µg/mL and above. Our preliminary data suggested that the chemically synthesized SeNPs may be able to inhibit some food-borne bacteria, and SeNP as a food preservative should be used with caution. We will explore the mechanisms of the inhibitory action of chemically synthesized SeNPs on bacterial growth and whether the SeNPs are able to inhibit the development of biofilm and antibiotic resistance.Keywords: antimicrobial, food-borne bacteria, nanoparticles, selenium
Procedia PDF Downloads 9222057 The Effects of Different Parameters of Wood Floating Debris on Scour Rate Around Bridge Piers
Authors: Muhanad Al-Jubouri
Abstract:
A local scour is the most important of the several scours impacting bridge performance and security. Even though scour is widespread in bridges, especially during flood seasons, the experimental tests could not be applied to many standard highway bridges. A computational fluid dynamics numerical model was used to solve the problem of calculating local scouring and deposition for non-cohesive silt and clear water conditions near single and double cylindrical piers with the effect of floating debris. When FLOW-3D software is employed with the Rang turbulence model, the Nilsson bed-load transfer equation and fine mesh size are considered. The numerical findings of single cylindrical piers correspond pretty well with the physical model's results. Furthermore, after parameter effectiveness investigates the range of outcomes based on predicted user inputs such as the bed-load equation, mesh cell size, and turbulence model, the final numerical predictions are compared to experimental data. When the findings are compared, the error rate for the deepest point of the scour is equivalent to 3.8% for the single pier example.Keywords: local scouring, non-cohesive, clear water, computational fluid dynamics, turbulence model, bed-load equation, debris
Procedia PDF Downloads 6822056 Advances of Image Processing in Precision Agriculture: Using Deep Learning Convolution Neural Network for Soil Nutrient Classification
Authors: Halimatu S. Abdullahi, Ray E. Sheriff, Fatima Mahieddine
Abstract:
Agriculture is essential to the continuous existence of human life as they directly depend on it for the production of food. The exponential rise in population calls for a rapid increase in food with the application of technology to reduce the laborious work and maximize production. Technology can aid/improve agriculture in several ways through pre-planning and post-harvest by the use of computer vision technology through image processing to determine the soil nutrient composition, right amount, right time, right place application of farm input resources like fertilizers, herbicides, water, weed detection, early detection of pest and diseases etc. This is precision agriculture which is thought to be solution required to achieve our goals. There has been significant improvement in the area of image processing and data processing which has being a major challenge. A database of images is collected through remote sensing, analyzed and a model is developed to determine the right treatment plans for different crop types and different regions. Features of images from vegetations need to be extracted, classified, segmented and finally fed into the model. Different techniques have been applied to the processes from the use of neural network, support vector machine, fuzzy logic approach and recently, the most effective approach generating excellent results using the deep learning approach of convolution neural network for image classifications. Deep Convolution neural network is used to determine soil nutrients required in a plantation for maximum production. The experimental results on the developed model yielded results with an average accuracy of 99.58%.Keywords: convolution, feature extraction, image analysis, validation, precision agriculture
Procedia PDF Downloads 31322055 Defining Affecting Factors on Rate of Car E-Customers' Satisfaction – a Case Study of Iran Khodro Co.
Authors: Majid Mohammadi, Mohammad Yosef Zadeh, Vahid Naderi Darshori
Abstract:
The main purpose of this research is concreting of satisfaction literature for obtain index with online content in carmaker industry. The study measures customer satisfaction of online and collect from similar studies with reference to a model of online satisfaction, they are attempting to complete. Statistical communities of research are online customers' carmaker Iran Khodro has been buying the company's products in the last six months. One of the innovative measures in this study is that, customer reviews are obtained through an Internet site. Reliability of the data collected in this study, the Cronbach's alpha coefficient was approved. The coefficient of 0.828 was calculated for the questionnaire. To test the hypothesis, the Pearson correlation coefficient was used. To ensure the correctness of initial theoretical model, we used regression analyzes and structural equation weight and finally, the results obtained with little change to the basic model of research, are improved and completed. At last obtain the perceived value has most direct effect on online car customers satisfaction.Keywords: customer satisfaction, online satisfaction, online customer, car
Procedia PDF Downloads 40322054 Cyber Security Enhancement via Software Defined Pseudo-Random Private IP Address Hopping
Authors: Andre Slonopas, Zona Kostic, Warren Thompson
Abstract:
Obfuscation is one of the most useful tools to prevent network compromise. Previous research focused on the obfuscation of the network communications between external-facing edge devices. This work proposes the use of two edge devices, external and internal facing, which communicate via private IPv4 addresses in a software-defined pseudo-random IP hopping. This methodology does not require additional IP addresses and/or resources to implement. Statistical analyses demonstrate that the hopping surface must be at least 1e3 IP addresses in size with a broad standard deviation to minimize the possibility of coincidence of monitored and communication IPs. The probability of breaking the hopping algorithm requires a collection of at least 1e6 samples, which for large hopping surfaces will take years to collect. The probability of dropped packets is controlled via memory buffers and the frequency of hops and can be reduced to levels acceptable for video streaming. This methodology provides an impenetrable layer of security ideal for information and supervisory control and data acquisition systems.Keywords: moving target defense, cybersecurity, network security, hopping randomization, software defined network, network security theory
Procedia PDF Downloads 18522053 The Islamic Advertising Standardisation Revisited of Food Products
Authors: Nurzahidah Haji Jaapar, Anis Husna Abdul Halim, Mohd Faiz Mohamed Yusof, Mohd Dani Muhamad, Sharifah Fadylawaty Syed Abdullah
Abstract:
The growing size of Muslim is recognised with significant increasing of purchasing power in the market. The realm of trade and business has embedded religious values as the new market segments are emerging in offering food products to meet needs and demands of Muslim consumer. The emergence of new market in food industry, advertising is charged with all sort of negative effects includes promoting controversial unsafety and harmful products, wasteful spending and exploiting women and kids. Therefore, this research attempts to examine between previous examinations of advertising standardisation in ancient era and current practices in the market. This paper is based on content analysis of the literature. The results show that there are a bridge gap between the implementation of practices as the advent in industrial 4.0 in using digital advertising by food industry. Thus, this paper is able to recognize the differences between two era and significant in determining the best practices in advertising by following Islamic principles.Keywords: Islamic advertising, unethical advertising, ethical advertising, Islamic principles
Procedia PDF Downloads 14722052 Attachment as a Predictor for Cognitive Rigidity
Authors: Barbara Gawda
Abstract:
Attachment model formed in childhood has an important impact on emotional development, personality, and social relationships. Attachment is also thought to have an impact on construction of affective-cognitive schemas and cognitive functioning. The aim of the current study was to verify whether there is an association between attachment and cognitive rigidity defined as dogmatism and intolerance of ambiguity. The analysis of 180 participants (persons of a similar age and education level, number of men and women was equal) was conducted. To test the attachment styles, the Revised Experiences in Close Relationships Inventory (ECR-R) was used. To examine cognitive rigidity, the Rokeach and Budner questionnaires were used. A multiple regression model was employed to examine whether attachment styles are predictors for dogmatism. The results confirmed that fearful-ambivalent attachment is the main predictor for dogmatism but not for intolerance of ambiguity.Keywords: attachment styles, cognitive rigidity, dogmatism, intolerance of ambiguity
Procedia PDF Downloads 33522051 Nuclear Fuel Safety Threshold Determined by Logistic Regression Plus Uncertainty
Authors: D. S. Gomes, A. T. Silva
Abstract:
Analysis of the uncertainty quantification related to nuclear safety margins applied to the nuclear reactor is an important concept to prevent future radioactive accidents. The nuclear fuel performance code may involve the tolerance level determined by traditional deterministic models producing acceptable results at burn cycles under 62 GWd/MTU. The behavior of nuclear fuel can simulate applying a series of material properties under irradiation and physics models to calculate the safety limits. In this study, theoretical predictions of nuclear fuel failure under transient conditions investigate extended radiation cycles at 75 GWd/MTU, considering the behavior of fuel rods in light-water reactors under reactivity accident conditions. The fuel pellet can melt due to the quick increase of reactivity during a transient. Large power excursions in the reactor are the subject of interest bringing to a treatment that is known as the Fuchs-Hansen model. The point kinetic neutron equations show similar characteristics of non-linear differential equations. In this investigation, the multivariate logistic regression is employed to a probabilistic forecast of fuel failure. A comparison of computational simulation and experimental results was acceptable. The experiments carried out use the pre-irradiated fuels rods subjected to a rapid energy pulse which exhibits the same behavior during a nuclear accident. The propagation of uncertainty utilizes the Wilk's formulation. The variables chosen as essential to failure prediction were the fuel burnup, the applied peak power, the pulse width, the oxidation layer thickness, and the cladding type.Keywords: logistic regression, reactivity-initiated accident, safety margins, uncertainty propagation
Procedia PDF Downloads 28922050 Effect of Cellular Water Transport on Deformation of Food Material during Drying
Authors: M. Imran Hossen Khan, M. Mahiuddin, M. A. Karim
Abstract:
Drying is a food processing technique where simultaneous heat and mass transfer take place from surface to the center of the sample. Deformation of food materials during drying is a common physical phenomenon which affects the textural quality and taste of the dried product. Most of the plant-based food materials are porous and hygroscopic in nature that contains about 80-90% water in different cellular environments: intercellular environment and intracellular environment. Transport of this cellular water has a significant effect on material deformation during drying. However, understanding of the scale of deformation is very complex due to diverse nature and structural heterogeneity of food material. Knowledge about the effect of transport of cellular water on deformation of material during drying is crucial for increasing the energy efficiency and obtaining better quality dried foods. Therefore, the primary aim of this work is to investigate the effect of intracellular water transport on material deformation during drying. In this study, apple tissue was taken for the investigation. The experiment was carried out using 1H-NMR T2 relaxometry with a conventional dryer. The experimental results are consistent with the understanding that transport of intracellular water causes cellular shrinkage associated with the anisotropic deformation of whole apple tissue. Interestingly, it is found that the deformation of apple tissue takes place at different stages of drying rather than deforming at one time. Moreover, it is found that the penetration rate of heat energy together with the pressure gradient between intracellular and intercellular environments is the responsible force to rupture the cell membrane.Keywords: heat and mass transfer, food material, intracellular water, cell rupture, deformation
Procedia PDF Downloads 21822049 Establishing Community-Based Pro-Biodiversity Enterprise in the Philippines: A Climate Change Adaptation Strategy towards Agro-Biodiversity Conservation and Local Green Economic Development
Authors: Dina Magnaye
Abstract:
In the Philippines, the performance of the agricultural sector is gauged through crop productivity and returns from farm production rather than the biodiversity in the agricultural ecosystem. Agricultural development hinges on the overall goal of increasing productivity through intensive agriculture, monoculture system, utilization of high yielding varieties in plants, and genetic upgrading in animals. This merits an analysis of the role of agro-biodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. These enterprises conserve biodiversity while equitably sharing production income in the utilization of biological resources. The study aims to determine how community-based pro-biodiversity enterprises become instrumental in local climate change adaptation and agro-biodiversity conservation as input to local green economic development planning. It also involves an assessment of the role of agrobiodiversity in terms of increasing productivity, food security and economic returns from community-based pro-biodiversity enterprises. The perceptions of the local community members both in urban and upland rural areas on community-based pro-biodiversity enterprises were evaluated. These served as a basis in developing a planning modality that can be mainstreamed in the management of local green economic enterprises to benefit the environment, provide local income opportunities, conserve species diversity, and sustain environment-friendly farming systems and practices. The interviews conducted with organic farmer-owners, entrepreneur-organic farmers, and organic farm workers revealed that pro-biodiversity enterprise such as organic farming involved the cyclic use of natural resources within the carrying capacity of a farm; recognition of the value of tradition and culture especially in the upland rural area; enhancement of socio-economic capacity; conservation of ecosystems in harmony with nature; and climate change mitigation. The suggested planning modality for community-based pro-biodiversity enterprises for a green economy encompasses four (4) phases to include community resource or capital asset profiling; stakeholder vision development; strategy formulation for sustained enterprises; and monitoring and evaluation.Keywords: agro-biodiversity, agro-biodiversity conservation, local green economy, organic farming, pro-biodiversity enterprise
Procedia PDF Downloads 36122048 Consumer Protection Law For Users Mobile Commerce as a Global Effort to Improve Business in Indonesia
Authors: Rina Arum Prastyanti
Abstract:
Information technology has changed the ways of transacting and enabling new opportunities in business transactions. Problems to be faced by consumers M Commerce, among others, the consumer will have difficulty accessing the full information about the products on offer and the forms of transactions given the small screen and limited storage capacity, the need to protect children from various forms of excess supply and usage as well as errors in access and disseminate personal data, not to mention the more complex problems as well as problems agreements, dispute resolution that can protect consumers and assurance of security of personal data. It is no less important is the risk of payment and personal information of payment dal am also an important issue that should be on the swatch solution. The purpose of this study is 1) to describe the phenomenon of the use of Mobile Commerce in Indonesia. 2) To determine the form of legal protection for the consumer use of Mobile Commerce. 3) To get the right type of law so as to provide legal protection for consumers Mobile Commerce users. This research is a descriptive qualitative research. Primary and secondary data sources. This research is a normative law. Engineering conducted engineering research library collection or library research. The analysis technique used is deductive analysis techniques. Growing mobile technology and more affordable prices as well as low rates of provider competition also affects the increasing number of mobile users, Indonesia is placed into 4 HP users in the world, the number of mobile phones in Indonesia is estimated at around 250.1 million telephones with a population of 237 556. 363. Indonesian form of legal protection in the use of mobile commerce still a part of the Law No. 11 of 2008 on Information and Electronic Transactions and until now there is no rule of law that specifically regulates mobile commerce. Legal protection model that can be applied to protect consumers of mobile commerce users ensuring that consumers get information about potential security and privacy challenges they may face in m commerce and measures that can be used to limit the risk. Encourage the development of security measures and built security features. To encourage mobile operators to implement data security policies and measures to prevent unauthorized transactions. Provide appropriate methods both time and effectiveness of redress when consumers suffer financial loss.Keywords: mobile commerce, legal protection, consumer, effectiveness
Procedia PDF Downloads 36322047 Consumer Welfare in the Platform Economy
Authors: Prama Mukhopadhyay
Abstract:
Starting from transport to food, today’s world platform economy and digital markets have taken over almost every sphere of consumers’ lives. Sellers and buyers are getting connected through platforms, which is acting as an intermediary. It has made consumer’s life easier in terms of time, price, choice and other factors. Having said that, there are several concerns regarding platforms. There are competition law concerns like unfair pricing, deep discounting by the platforms which affect the consumer welfare. Apart from that, the biggest problem is lack of transparency with respect to the business models, how it operates, price calculation, etc. In most of the cases, consumers are unaware of how their personal data are being used. In most of the cases, they are unaware of how algorithm uses their personal data to determine the price of the product or even to show the relevant products using their previous searches. Using personal or non-personal data without consumer’s consent is a huge legal concern. In addition to this, another major issue lies with the question of liability. If a dispute arises, who will be responsible? The seller or the platform? For example, if someone ordered food through a food delivery app and the food was bad, in this situation who will be liable: the restaurant or the food delivery platform? In this paper, the researcher tries to examine the legal concern related to platform economy from the consumer protection and consumer welfare perspectives. The paper analyses the cases from different jurisdictions and approach taken by the judiciaries. The author compares the existing legislation of EU, US and other Asian Countries and tries to highlight the best practices.Keywords: competition, consumer, data, platform
Procedia PDF Downloads 14222046 Autophagy Acceleration and Self-Healing by the Revolution against Frequent Eating, High Glycemic and Unabsorbable Substances as One Meal a Day Plan
Authors: Reihane Mehrparvar
Abstract:
Human age could exceed further by altering gene expression through food intaking, although as a consequence of recent century eating patterns, human life-span getting shorter by emerging irregulating in autophagy mechanism, insulin, leptin, gut microbiota which are important etiological factors of type-2 diabetes, obesity, infertility, cancer, metabolic and autoimmune diseases. However, restricted calorie intake and vigorous exercise might be beneficial for losing weight and metabolic regulation in a short period but could not be implementable in the long term as a way of life. Therefore, the lack of a dietary program that is compatible with the genes of the body is essential. Sweet and high-glycemic-index (HGI) foods were associated with type-2 diabetes and cancer morbidity. The neuropsychological perspective characterizes the inclination of sweet and HGI-food consumption as addictive behavior; hence this process engages preference of gut microbiota, neural node, and dopaminergic functions. Moreover, meal composition is not the only factor that affects body hemostasis. In this narrative review, it is believed to attempt to investigate how the body responded to different food intakes and represent an accurate model based on current evidence. Eating frequently and ingesting unassimilable protein and carbohydrates may not be compatible with human genes and could cause impairments in the self-renovation mechanism. This trajectory indicates our body is more adapted to starvation and eating animal meat and marrow. Here has been recommended a model that takes into account three important factors: frequent eating, meal composition, and circadian rhythm, which may offer a promising intervention for obesity, inflammation, cardiovascular, autoimmune disorder, type-2 diabetes, insulin resistance, infertility, and cancer through intensifying autophagy-mechanism and eliminate medical costs.Keywords: metabolic disease, anti-aging, type-2 diabetes, autophagy
Procedia PDF Downloads 8022045 SPBAC: A Semantic Policy-Based Access Control for Database Query
Authors: Aaron Zhang, Alimire Kahaer, Gerald Weber, Nalin Arachchilage
Abstract:
Access control is an essential safeguard for the security of enterprise data, which controls users’ access to information resources and ensures the confidentiality and integrity of information resources [1]. Research shows that the more common types of access control now have shortcomings [2]. In this direction, to improve the existing access control, we have studied the current technologies in the field of data security, deeply investigated the previous data access control policies and their problems, identified the existing deficiencies, and proposed a new extension structure of SPBAC. SPBAC extension proposed in this paper aims to combine Policy-Based Access Control (PBAC) with semantics to provide logically connected, real-time data access functionality by establishing associations between enterprise data through semantics. Our design combines policies with linked data through semantics to create a "Semantic link" so that access control is no longer per-database and determines that users in each role should be granted access based on the instance policy, and improves the SPBAC implementation by constructing policies and defined attributes through the XACML specification, which is designed to extend on the original XACML model. While providing relevant design solutions, this paper hopes to continue to study the feasibility and subsequent implementation of related work at a later stage.Keywords: access control, semantic policy-based access control, semantic link, access control model, instance policy, XACML
Procedia PDF Downloads 8722044 Specification of Requirements to Ensure Proper Implementation of Security Policies in Cloud-Based Multi-Tenant Systems
Authors: Rebecca Zahra, Joseph G. Vella, Ernest Cachia
Abstract:
The notion of cloud computing is rapidly gaining ground in the IT industry and is appealing mostly due to making computing more adaptable and expedient whilst diminishing the total cost of ownership. This paper focuses on the software as a service (SaaS) architecture of cloud computing which is used for the outsourcing of databases with their associated business processes. One approach for offering SaaS is basing the system’s architecture on multi-tenancy. Multi-tenancy allows multiple tenants (users) to make use of the same single application instance. Their requests and configurations might then differ according to specific requirements met through tenant customisation through the software. Despite the known advantages, companies still feel uneasy to opt for the multi-tenancy with data security being a principle concern. The fact that multiple tenants, possibly competitors, would have their data located on the same server process and share the same database tables heighten the fear of unauthorised access. Security is a vital aspect which needs to be considered by application developers, database administrators, data owners and end users. This is further complicated in cloud-based multi-tenant system where boundaries must be established between tenants and additional access control models must be in place to prevent unauthorised cross-tenant access to data. Moreover, when altering the database state, the transactions need to strictly adhere to the tenant’s known business processes. This paper focuses on the fact that security in cloud databases should not be considered as an isolated issue. Rather it should be included in the initial phases of the database design and monitored continuously throughout the whole development process. This paper aims to identify a number of the most common security risks and threats specifically in the area of multi-tenant cloud systems. Issues and bottlenecks relating to security risks in cloud databases are surveyed. Some techniques which might be utilised to overcome them are then listed and evaluated. After a description and evaluation of the main security threats, this paper produces a list of software requirements to ensure that proper security policies are implemented by a software development team when designing and implementing a multi-tenant based SaaS. This would then assist the cloud service providers to define, implement, and manage security policies as per tenant customisation requirements whilst assuring security for the customers’ data.Keywords: cloud computing, data management, multi-tenancy, requirements, security
Procedia PDF Downloads 15622043 Forecasting of COVID-19 Cases, Hospitalization Admissions, and Death Cases Based on Wastewater Sars-COV-2 Surveillance Using Copula Time Series Model
Authors: Hueiwang Anna Jeng, Norou Diawara, Nancy Welch, Cynthia Jackson, Rekha Singh, Kyle Curtis, Raul Gonzalez, David Jurgens, Sasanka Adikari
Abstract:
Modeling effort is needed to predict the COVID-19 trends for developing management strategies and adaptation measures. The objective of this study was to assess whether SARS-CoV-2 viral load in wastewater could serve as a predictor for forecasting COVID-19 cases, hospitalization cases, and death cases using copula-based time series modeling. SARS-CoV-2 RNA load in raw wastewater in Chesapeake VA was measured using the RT-qPCR method. Gaussian copula time series marginal regression model, incorporating an autoregressive moving average model and the copula function, served as a forecasting model. COVID-19 cases were correlated with wastewater viral load, hospitalization cases, and death cases. The forecasted trend of COVID-19 cases closely paralleled one of the reported cases, with over 90% of the forecasted COVID-19 cases falling within the 99% confidence interval of the reported cases. Wastewater SARS-CoV-2 viral load could serve as a predictor for COVID-19 cases and hospitalization cases.Keywords: COVID-19, modeling, time series, copula function
Procedia PDF Downloads 6622042 The Islamic Grand Tour: The Case of Caravan Hajj Routes
Authors: Akram Atef Rawshdeh
Abstract:
This research aims to prove the role of Islamic pilgrimage caravans in formulating the concept of the tourism industry and the concept of Grand Tours before that which was found in Europe in the medieval and modern Ages, through its duration and the number of tourists who participated in it and its role in providing tourism services from the establishment of castles and inns that were built To accommodate pilgrims during their travels from different regions of the Islamic world to the holy places in Saudi Arabia, as well as food and beverage services, transportation and support services like tourist security and tourist guide services. This research will depend on the historical methodKeywords: grand tour, hajj caravan routes, tourism services, transportation
Procedia PDF Downloads 16222041 The Effect of Gender and Resources on Entrepreneurial Activity
Authors: Frederick Nyakudya
Abstract:
In this paper, we examine the relationship between human capital, personal wealth and social capital to explain the differential start-up rates between female and male entrepreneurs. Since our dependent variable is dichotomous, we examine the determinants of these using a maximum likelihood logit estimator. We used the Global Entrepreneurship Monitor database covering the period 2006 to 2009 with 421 usable cases drawn from drawn from the Lower Layer Super Output Areas in the East Midlands in the United Kingdom. we found evidence that indicates that a female positively moderate the positive relationships between indicators of human capital, personal wealth and social capital with start-up activity. The findings have implications for programs, policies, and practices to encourage more females to engage in start-up activity.Keywords: entrepreneurship, star-up, gender, GEM
Procedia PDF Downloads 10722040 Personal Variables and Students’ Perception of School Security in Secondary Schools in Calabar Municipality, Cross River State, Nigeria
Authors: James Bassey Ejue, Dorn Cklaimz Enamhe, Helen Francis Ejue
Abstract:
The study examined the influence of personal variables such as sex, type of school, and parental socio-economic status on secondary school students’ perception of school security. To guide the study, three null hypotheses were formulated. The research design adopted was the survey design, and a 20-item instrument was constructed and validated by the researchers through a test-retest procedure. The sample size for the study comprised 2,198 students made up of male and female students selected through a stratified random sampling technique. This was drawn from a study population of 21,988, made up of 12,635 students and 9353 students from public and private secondary schools, respectively. Data were analyzed using an independent t-test statistical tool. The findings showed that female students were more fearful in their perception of school security; the students in private schools perceived school to be more insecure than those in public schools; and the students from high parental socio-economic status are more associated with the perception of school as insecure than the ones from low parental socio-economic status. Based on these findings, it was recommended that, among others, more reassuring measures be put in place to check school security for females, for those in private schools, and for those from high parental socio-economic status. School counsellors should also be guided accordingly in designing intervention strategies.Keywords: personal variables, students, perception, school security
Procedia PDF Downloads 7722039 The Impact of Governance on Happiness: Evidence from Quantile Regressions
Authors: Chiung-Ju Huang
Abstract:
This study utilizes the quantile regression analysis to examine the impact of governance (including democratic quality and technical quality) on happiness in 101 countries worldwide, classified as “developed countries” and “developing countries”. The empirical results show that the impact of democratic quality and technical quality on happiness is significantly positive for “developed countries”, while is insignificant for “developing countries”. The results suggest that the authorities in developed countries can enhance the level of individual happiness by means of improving the democracy quality and technical quality. However, for developing countries, promoting the quality of governance in order to enhance the level of happiness may not be effective. Policy makers in developed countries may pay more attention on increasing real GDP per capita instead of promoting the quality of governance to enhance individual happiness.Keywords: governance, happiness, multiple regression, quantile regression
Procedia PDF Downloads 279