Search results for: food security and nutrition
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6250

Search results for: food security and nutrition

4510 Genome-Wide Identification of Genes Resistance to Nitric Oxide in Vibrio parahaemolyticus

Authors: Yantao Li, Jun Zheng

Abstract:

Food poison caused by consumption of contaminated food, especially seafood, is one of most serious public health threats worldwide. Vibrio parahaemolyticus is emerging bacterial pathogen and the leading cause of human gastroenteritis associated with food poison, especially in the southern coastal region of China. To successfully cause disease in host, bacterial pathogens need to overcome the host-derived stresses encountered during infection. One of the toxic chemical species elaborated by the host is nitric oxide (NO). NO is generated by acidified nitrite in the stomach and by enzymes of the inducible NO synthase (iNOS) in the host cell, and is toxic to bacteria. Bacterial pathogens have evolved some mechanisms to battle with this toxic stress. Such mechanisms include genes to sense NO produced from immune system and activate others to detoxify NO toxicity, and genes to repair the damage caused by toxic reactive nitrogen species (RNS) generated during NO toxic stress. However, little is known about the NO resistance in V. parahaemolyticus. In this study, a transposon coupled with next generation sequencing (Tn-seq) technology will be utilized to identify genes for NO resistance in V. parahaemolyticus. Our strategy will include construction the saturating transposon insertion library, transposon library challenging with NO, next generation sequencing (NGS), bioinformatics analysis and verification of the identified genes in vitro and in vivo.

Keywords: vibrio parahaemolyticus, nitric oxide, tn-seq, virulence

Procedia PDF Downloads 263
4509 The Relationship between Knowledge Management Processes and Strategic Thinking at the Organization Level

Authors: Bahman Ghaderi, Hedayat Hosseini, Parviz Kafche

Abstract:

The role of knowledge management processes in achieving the strategic goals of organizations is crucial. To this end, understanding the relationship between knowledge management processes and different aspects of strategic thinking (followed by long-term organizational planning) should be considered. This research examines the relationship between each of the five knowledge management processes (creation, storage, transfer, audit, and deployment) with each dimension of strategic thinking (vision, creativity, thinking, communication and analysis) in one of the major sectors of the food industry in Iran. In this research, knowledge management and its dimensions (knowledge acquisition, knowledge storage, knowledge transfer, knowledge auditing, and finally knowledge utilization) as independent variables and strategic thinking and its dimensions (creativity, systematic thinking, vision, strategic analysis, and strategic communication) are considered as the dependent variable. The statistical population of this study consisted of 245 managers and employees of Minoo Food Industrial Group in Tehran. In this study, a simple random sampling method was used, and data were collected by a questionnaire designed by the research team. Data were analyzed using SPSS 21 software. LISERL software is also used for calculating and drawing models and graphs. Among the factors investigated in the present study, knowledge storage with 0.78 had the most effect, and knowledge transfer with 0.62 had the least effect on knowledge management and thus on strategic thinking.

Keywords: knowledge management, strategic thinking, knowledge management processes, food industry

Procedia PDF Downloads 168
4508 An Analytical Approach to Assess and Compare the Vulnerability Risk of Operating Systems

Authors: Pubudu K. Hitigala Kaluarachchilage, Champike Attanayake, Sasith Rajasooriya, Chris P. Tsokos

Abstract:

Operating system (OS) security is a key component of computer security. Assessing and improving OSs strength to resist against vulnerabilities and attacks is a mandatory requirement given the rate of new vulnerabilities discovered and attacks occurring. Frequency and the number of different kinds of vulnerabilities found in an OS can be considered an index of its information security level. In the present study five mostly used OSs, Microsoft Windows (windows 7, windows 8 and windows 10), Apple’s Mac and Linux are assessed for their discovered vulnerabilities and the risk associated with each. Each discovered and reported vulnerability has an exploitability score assigned in CVSS score of the national vulnerability database. In this study the risk from vulnerabilities in each of the five Operating Systems is compared. Risk Indexes used are developed based on the Markov model to evaluate the risk of each vulnerability. Statistical methodology and underlying mathematical approach is described. Initially, parametric procedures are conducted and measured. There were, however, violations of some statistical assumptions observed. Therefore the need for non-parametric approaches was recognized. 6838 vulnerabilities recorded were considered in the analysis. According to the risk associated with all the vulnerabilities considered, it was found that there is a statistically significant difference among average risk levels for some operating systems, indicating that according to our method some operating systems have been more risk vulnerable than others given the assumptions and limitations. Relevant test results revealing a statistically significant difference in the Risk levels of different OSs are presented.

Keywords: cybersecurity, Markov chain, non-parametric analysis, vulnerability, operating system

Procedia PDF Downloads 180
4507 Dietary Intake, Serum Vitamin D Status, and Sun Exposure of Malaysian Women of Different Ethnicity

Authors: H. Z. M. Chong, M. E. Y. Leong, G. L. Khor, S. C. Loke

Abstract:

Vitamin D insufficiency is reported to be prevalent among women living in different altitudes including the equator where sunshine is available throughout the year. Multiple factors for vitamin D insufficiency include poor intake of vitamin D rich food and inadequate sun exposure, especially among women working indoor with a sedentary lifestyle. Furthermore, Muslim women in Malaysia whose attire covers the entire body are likely to receive poor sun exposure. This research determined serum vitamin D status, vitamin D intake and sun exposure of women aged 20-45 years of different ethnicity in Kuala Lumpur, Malaysia. Blood samples were collected from 106 women for determination of serum 25(OH)D levels. Information about vitamin D intake and sun exposure were obtained by interviewing the subjects using pre-tested questionnaires. The overall mean serum 25(OH)D was found to be 29.9 ± 14 nmol/L. Vitamin D deficiency and insufficiency was prevalent and highest among the Malay women. Less than ten percent of the subjects in this study met the sufficient vitamin D level recommendation of ≥50 nmol/L. Intake of vitamin D rich food such as oily fishes was poor across the different ethnicity. Other dietary sources of vitamin D in the diet were fortified bread and skim milk. On the other hand, the median sunlight exposure of the subjects was 3.9 hours per week. The Malay women reported to have the highest duration being exposed to the sun. Nevertheless, due to cultural clothing practices, these women had the least body surface area exposed to sunlight, resulting in the lowest calculated sun index score compared to the Chinese and the Indians. Low intake of vitamin D rich foods and sun exposure were negatively correlated with serum 25(OH)D level. In conclusion, intake of food sources rich in vitamin D and adequate body surface area exposed to the sun are essential to ensure healthy vitamin D level. Supplementation of vitamin D may be recommended to women whom unable to meet these recommendations.

Keywords: serum 25-OH, sun exposure, vitamin D food frequency, vitamin D deficiency

Procedia PDF Downloads 264
4506 Role of Numerical Simulation as a Tool to Enhance Climate Change Adaptation and Resilient Societies: A Case Study from the Philippines

Authors: Pankaj Kumar

Abstract:

Rapid global changes resulted in unfavorable hydrological, ecological, and environmental changes and cumulatively affected natural resources. As a result, the local communities become vulnerable to water stress, poor hygiene, the spread of diseases, food security, etc.. However, the central point for this vulnerability revolves around water resources and the way people interrelate with the hydrological system. Also, most of the efforts to minimize the adverse effect of global changes are centered on the mitigation side. Hence, countries with poor adaptive capacities and poor governance suffer most in case of disasters. However, several transdisciplinary numerical tools are well designed and are capable of answering “what-if questions” through scenario analysis using a system approach. This study has predicted the future water environment in Marikina River in the National Capital Region, Metro Manila of Philippines, using Water Evaluation and Planning (WEAP), an integrated water resource management tool. Obtained results can answer possible adaptation measures along with their associated uncertainties. It also highlighted various challenges for the policy planners to design adaptation countermeasures as well as to track the progress of achieving SDG 6.0.

Keywords: water quality, Philippines, climate change adaptation, hydrological simulation, wastewater management, weap

Procedia PDF Downloads 99
4505 Innovative Food Related Modification of the Day-Night Task Demonstrates Impaired Inhibitory Control among Patients with Binge-Purge Eating Disorder

Authors: Sigal Gat-Lazer, Ronny Geva, Dan Ramon, Eitan Gur, Daniel Stein

Abstract:

Introduction: Eating disorders (ED) are common psychopathologies which involve distorted body image and eating disturbances. Binge-purge eating disorders (B/P ED) are characterized by repetitive events of binge eating followed by purges. Patients with B/P ED behavior may be seen as impulsive especially when relate to food stimulation and affective conditions. The current study included innovative modification of the day-night task targeted to assess inhibitory control among patients with B/P ED. Methods: This prospective study included 50 patients with B/P ED during acute phase of illness (T1) upon their admission to specialized ED department in tertiary center. 34 patients repeated the study towards discharge to ambulatory care (T2). Treatment effect was evaluated by BMI and emotional questionnaires regarding depression and anxiety by the Beck Depression Inventory and State Trait Anxiety Inventory questionnaires. Control group included 36 healthy controls with matched demographic parameters who performed both T1 and T2 assessments. The current modification is based on the emotional day-night task (EDNT) which involves five emotional stimulation added to the sun and moon pictures presented to participants. In the current study, we designed the food-emotional modification day night task (F-EDNT) food stimulations of egg and banana which resemble the sun and moon, respectively, in five emotional states (angry, sad, happy, scrambled and neutral). During this computerized task, participants were instructed to push on “day” bottom in response to moon and banana stimulations and on “night” bottom when sun and egg were presented. Accuracy (A) and reaction time (RT) were evaluated and compared between EDNT and F-EDNT as a reflection of participants’ inhibitory control. Results: Patients with B/P ED had significantly improved BMI, depression and anxiety scores on T2 compared to T1 (all p<0.001). Task performance was similar among patients and controls in the EDNT without significant A or RT differences in both T1 and T2. On F-EDNT during T1, B/P ED patients had significantly reduced accuracy in 4/5 emotional stimulation compared to controls: angry (73±25% vs. 84±15%, respectively), sad (69±25% vs. 80±18%, respectively), happy (73±24% vs. 82±18%, respectively) and scrambled (74±24% vs. 84±13%, respectively, all p<0.05). Additionally, patients’ RT to food stimuli was significantly faster compared to neutral ones, in both cry and neutral emotional stimulations (356±146 vs. 400±141 and 378±124 vs. 412±116 msec, respectively, p<0.05). These significant differences between groups as a function of stimulus type were diminished on T2. Conclusion: Having to process food related content, in particular in emotional context seems to be impaired in patients with B/P ED during the acute phase of their illness and elicits greater impulsivity. Innovative modification using such procedures seem to be sensitive to patients’ illness phase and thus may be implemented during screening and follow up through the clinical management of these patients.

Keywords: binge purge eating disorders, day night task modification, eating disorders, food related stimulations

Procedia PDF Downloads 378
4504 The Sensitization Profile of Children Allergic to IgE-mediated Cow's Milk Proteins

Authors: Gadiri Sabiha

Abstract:

Introduction : IgE-dependent cow's milk protein allergy (APLV) is one of the most common allergies in children and is one of the three most common allergies observed in children under 6 years of age. Its natural evolution is most often towards healing. The objective is to determine the sensitization profile of patients allergic to cow's milk (VL). Material and method :A retrospective study carried out on a pediatric population (age < 12 years) over a period of four years (2018-2021) in the context of a suspected food allergy to cow's milk proteins carried out on 121 children aged between 8 months -12 years The search for specific IgE was carried out by immunodot (EUROLINE Pediatric; EUROIMMUN) test which allows a semi-quantitative determination of specific IgE. Results 36 patients (29.7%) had a cow's milk protein allergy (ALPV) with a slight female predominance (58.33% girls vs 41.66% boys) The main clinical signs were: acute diarrhoea; vomiting; Intense abdominal pain, and cutaneous signs (pruritus/urticaria) with respective frequencies of 72%; 58%; 44% and 19%. The 3 major and specific VL allergens identified were beta-lactoglobulin 59% caseins 51% and alpha-lactalbumin 29.7%, The profile of sensitization to LV varies according to age, in infants before 1 year of anti-casein, IgE are predominant 83.3%, followed by beta-lactoglobulin 66.66% and alpha-lactolbumin 50% Conclusion CMPA is a frequent pathology which ranks among the three most common food allergies in children. This is the first to appear, most often starting in infants under 6 months old.

Keywords: specific Ige, food allergy, cow 's milk, child

Procedia PDF Downloads 68
4503 Proinflammatory Response of Agglomerated TiO2 Nanoparticles in Human-Immune Cells

Authors: Vaiyapuri Subbarayn Periasamy, Jegan Athinarayanan, Ali A. Alshatwi

Abstract:

The widespread use of Titanium oxide nanoparticles (TiO2-NPs), now are found with different physic-chemical properties (size, shape, chemical properties, agglomeration, etc.) in many processed foods, agricultural chemicals, biomedical products, food packaging and food contact materials, personal care products, and other consumer products used in daily life. Growing evidences have been highlighted that there are risks of physico-chemical properties dependent toxicity with special attention to “TiO2-NPs and human immune system”. Unfortunately, agglomeration and aggregation have frequently been ignored in immuno-toxicological studies, even though agglomeration and aggregation would be expected to affect nanotoxicity since it changes the size, shape, surface area, and other properties of the TiO2-NPs. In this present investigation, we assessed the immune toxic effect of TiO2-NPs on human immune cells Total WBC including Lymphocytes (T cells (CD3+), T helper cells (CD3+, CD4+), Suppressor/cytotoxic T cells (CD3+/CD8+) and NK cells (CD3-/CD16+ and CD56+), Monocytes (CD14+, CD3-) and B lymphocytes (CD19+, CD3-) in order to find the immunological response (IL1A, IL1B, IL2 IL-4, IL5 IL-6, IL-10, IL-12, IL-13, IFN-γ, TGF-β, and TNF-a) and redox gene regulation (TNF, p53, BCl-2, CAT, GSTA4, TNF, CYP1A, POR, SOD1, GSTM3, GPX1, and GSR1)-linking physicochemical properties with special reference to agglomeration of TiO2-NPs. Our findings suggest that TiO2-NPs altered cytokine production, enhanced phagocytic indexing, metabolic stress through specific immune regulatory- genes expression in different WBC subsets and may contribute to pro-inflammatory response. Although TiO2-NPs have great advantages in the personal care products, biomedical, food and agricultural products, its chronic and acute immune-toxicity still need to be assessed carefully with special reference to food and environmental safety.

Keywords: TiO2 nanoparticles, oxidative stress, cytokine, human immune cells

Procedia PDF Downloads 395
4502 Mitigating Food Insecurity and Malnutrition by Promoting Carbon Farming via a Solar-Powered Enzymatic Composting Bioreactor with Arduino-Based Sensors

Authors: Molin A., De Ramos J. M., Cadion L. G., Pico R. L.

Abstract:

Malnutrition and food insecurity represent significant global challenges affecting millions of individuals, particularly in low-income and developing regions. The researchers created a solar-powered enzymatic composting bioreactor with an Arduino-based monitoring system for pH, humidity, and temperature. It manages mixed municipal solid wastes incorporating industrial enzymes and whey additives for accelerated composting and minimized carbon footprint. Within 15 days, the bioreactor yielded 54.54% compost compared to 44.85% from traditional methods, increasing yield by nearly 10%. Tests showed that the bioreactor compost had 4.84% NPK, passing metal analysis standards, while the traditional pit compost had 3.86% NPK; both are suitable for agriculture. Statistical analyses, including ANOVA and Tukey's HSD test, revealed significant differences in agricultural yield across different compost types based on leaf length, width, and number of leaves. The study compared the effects of different composts on Brassica rapa subsp. Chinesis (Petchay) and Brassica juncea (Mustasa) plant growth. For Pechay, significant effects of compost type on plant leaf length (F(5,84) = 62.33, η² = 0.79) and leaf width (F(5,84) = 12.35, η² = 0.42) were found. For Mustasa, significant effects of compost type on leaf length (F(4,70) = 20.61, η² = 0.54), leaf width (F(4,70) = 19.24, η² = 0.52), and number of leaves (F(4,70) = 13.17, η² = 0.43) were observed. This study explores the effectiveness of the enzymatic composting bioreactor and its viability in promoting carbon farming as a solution to food insecurity and malnutrition.

Keywords: malnutrition, food insecurity, enzymatic composting bioreactor, arduino-based monitoring system, enzymes, carbon farming, whey additive, NPK level

Procedia PDF Downloads 52
4501 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 290
4500 Cyber Attacks Management in IoT Networks Using Deep Learning and Edge Computing

Authors: Asmaa El Harat, Toumi Hicham, Youssef Baddi

Abstract:

This survey delves into the complex realm of Internet of Things (IoT) security, highlighting the urgent need for effective cybersecurity measures as IoT devices become increasingly common. It explores a wide array of cyber threats targeting IoT devices and focuses on mitigating these attacks through the combined use of deep learning and machine learning algorithms, as well as edge and cloud computing paradigms. The survey starts with an overview of the IoT landscape and the various types of attacks that IoT devices face. It then reviews key machine learning and deep learning algorithms employed in IoT cybersecurity, providing a detailed comparison to assist in selecting the most suitable algorithms. Finally, the survey provides valuable insights for cybersecurity professionals and researchers aiming to enhance security in the intricate world of IoT.

Keywords: internet of things (IoT), cybersecurity, machine learning, deep learning

Procedia PDF Downloads 26
4499 Cryptography and Cryptosystem a Panacea to Security Risk in Wireless Networking

Authors: Modesta E. Ezema, Chikwendu V. Alabekee, Victoria N. Ishiwu, Ifeyinwa NwosuArize, Chinedu I. Nwoye

Abstract:

The advent of wireless networking in computing technology cannot be overemphasized, it opened up easy accessibility to information resources, networking made easier and brought internet accessibility to our doorsteps, but despite all these, some mishap came in with it that is causing mayhem in today ‘s overall information security. The cyber criminals will always compromise the integrity of a message that is not encrypted or that is encrypted with a weak algorithm.In other to correct the mayhem, this study focuses on cryptosystem and cryptography. This ensures end to end crypt messaging. The study of various cryptographic algorithms, as well as the techniques and applications of the cryptography for efficiency, were all considered in the work., present and future applications of cryptography were dealt with as well as Quantum Cryptography was exposed as the current and the future area in the development of cryptography. An empirical study was conducted to collect data from network users.

Keywords: algorithm, cryptography, cryptosystem, network

Procedia PDF Downloads 340
4498 Blockchain Technology for Secure and Transparent Oil and Gas Supply Chain Management

Authors: Gaurav Kumar Sinha

Abstract:

The oil and gas industry, characterized by its complex and global supply chains, faces significant challenges in ensuring security, transparency, and efficiency. Blockchain technology, with its decentralized and immutable ledger, offers a transformative solution to these issues. This paper explores the application of blockchain technology in the oil and gas supply chain, highlighting its potential to enhance data security, improve transparency, and streamline operations. By leveraging smart contracts, blockchain can automate and secure transactions, reducing the risk of fraud and errors. Additionally, the integration of blockchain with IoT devices enables real-time tracking and monitoring of assets, ensuring data accuracy and integrity throughout the supply chain. Case studies and pilot projects within the industry demonstrate the practical benefits and challenges of implementing blockchain solutions. The findings suggest that blockchain technology can significantly improve trust and collaboration among supply chain participants, ultimately leading to more efficient and resilient operations. This study provides valuable insights for industry stakeholders considering the adoption of blockchain technology to address their supply chain management challenges.

Keywords: blockchain technology, oil and gas supply chain, data security, transparency, smart contracts, IoT integration, real-time tracking, asset monitoring, fraud reduction, supply chain efficiency, data integrity, case studies, industry implementation, trust, collaboration.

Procedia PDF Downloads 32
4497 Self-Selected Intensity and Discounting Rates of Exercise in Comparison with Food and Money in Healthy Adults

Authors: Tamam Albelwi, Robert Rogers, Hans-Peter Kubis

Abstract:

Background: Exercise is widely acknowledged as a highly important health behavior, which reduces risks related to lifestyle diseases like type 2 diabetes, cardiovascular disease. However, exercise adherence is low in high-risk groups and sedentary lifestyle is more the norm than the exception. Expressed reasons for exercise participation are often based on delayed outcomes related to health threats and benefits but also enjoyment. Whether exercise is perceived as rewarding is well established in animal literature but the evidence is sparse in humans. Additionally, the question how stable any reward is perceived with time delays is an important question influencing decision-making (in favor or against a behavior). For the modality exercise, this has not been examined before. We, therefore, investigated the discounting of pre-established self-selected exercise compared with established rewards of food and money with a computer-based discounting paradigm. We hypothesized that exercise will be discounted like an established reward (food and money); however, we expect that the discounting rate is similar to a consumable reward like food. Additionally, we expected that individuals’ characteristics like preferred intensity, physical activity and body characteristics are associated with discount rates. Methods: 71 participants took part in four sessions. The sessions were designed to let participants select their preferred exercise intensity on a treadmill. Participants were asked to adjust their speed for optimizing pleasantness over an exercise period of up to 30 minutes, heart rate and pleasantness rating was measured. In further sessions, the established exercise intensity was modified and tested on perceptual validity. In the last exercise session rates of perceived exertion was measured on the preferred intensity level. Furthermore, participants filled in questionnaires related to physical activity, mood, craving, and impulsivity and answered choice questions on a bespoke computer task to establish discounting rates of their preferred exercise (kex), their favorite food (kfood) and a value-matching amount of money (kmoney). Results: Participants self-selected preferred speed was 5.5±2.24 km/h, at a heart rate of 120.7±23.5, and perceived exertion scale of 10.13±2.06. This shows that participants preferred a light exercise intensity with low to moderate cardiovascular strain based on perceived pleasantness. Computer assessment of discounting rates revealed that exercise was quickly discounted like a consumable reward, no significant difference between kfood and kex (kfood =0.322±0.263; kex=0.223±0.203). However, kmoney (kmoney=0.080±0.02) was significantly lower than the rates of exercise and food. Moreover, significant associations were found between preferred speed and kex (r=-0.302) and between physical activity levels and preferred speed (r=0.324). Outcomes show that participants perceived and discounted self-selected exercise like an established reward (food and money) but was discounted more like consumable rewards. Moreover, exercise discounting was quicker in individuals who preferred lower speeds, being less physically active. This may show that in a choice conflict between exercise and food the delay of exercise (because of distance) might disadvantage exercise as the chosen behavior particular in sedentary people. Conclusion: exercise can be perceived as a reward and is discounted quickly in time like food. Pleasant exercise experience is connected to low to moderate cardiovascular and perceptual strain.

Keywords: delay discounting, exercise, temporal discounting, time perspective

Procedia PDF Downloads 268
4496 Production of Lignocellulosic Enzymes by Bacillus safensis LCX Using Agro-Food Wastes in Solid State Fermentation

Authors: Abeer A. Q. Ahmed, Tracey McKay

Abstract:

The increasing demand for renewable fuels and chemicals is pressuring manufacturing industry toward finding more sustainable cost-effective resources. Lignocellulose, such as agro-food wastes, is a suitable equivalent to petroleum for fine chemicals and fuels production. The complex structure of lignocellulose, however, requires a variety of enzymes in order to degrade its components into their respective building blocks that can be used further for the production of various value added products. This study aimed to isolate bacterial strain with the ability to produce a variety of lignocellulosic enzymes. One bacterial isolate was identified by 16S rRNA gene sequencing and phylogenetic analysis as Bacillus safensis LCX found to have CMCase, xylanase, manganese peroxidase, lignin peroxidase, and laccase activities. The enzymes production was induced by growing Bacillus safensis LCX in solid state fermentation using wheat straw, wheat bran, and corn stover. The activities of enzymes were determined by specific colorimetric assays. This study presents Bacillus safensis LCX as a promising source for lignocellulosic enzymes. These findings can extend the knowledge on agro-food wastes valorization strategies toward a sustainable production of fuels and chemicals.

Keywords: Bacillus safensis LCX, high valued chemicals, lignocellulosic enzymes, solid state fermentation

Procedia PDF Downloads 292
4495 Dietary Pattern derived by Reduced Rank Regression is Associated with Reduced Cognitive Impairment Risk in Singaporean Older Adults

Authors: Kaisy Xinhong Ye, Su Lin Lim, Jialiang Li, Lei Feng

Abstract:

background: Multiple healthful dietary patterns have been linked with dementia, but limited studies have looked at the role of diet in cognitive health in Asians whose eating habits are very different from their counterparts in the west. This study aimed to derive a dietary pattern that is associated with the risk of cognitive impairment (CI) in the Singaporean population. Method: The analysis was based on 719 community older adults aged 60 and above. Dietary intake was measured using a validated semi-quantitative food-frequency questionnaire (FFQ). Reduced rank regression (RRR) was used to extract dietary pattern from 45 food groups, specifying sugar, dietary fiber, vitamin A, calcium, and the ratio of polyunsaturated fat to saturated fat intake (P:S ratio) as response variables. The RRR-derived dietary patterns were subsequently investigated using multivariate logistic regression models to look for associations with the risk of CI. Results: A dietary pattern characterized by greater intakes of green leafy vegetables, red-orange vegetables, wholegrains, tofu, nuts, and lower intakes of biscuits, pastries, local sweets, coffee, poultry with skin, sugar added to beverages, malt beverages, roti, butter, and fast food was associated with reduced risk of CI [multivariable-adjusted OR comparing extreme quintiles, 0.29 (95% CI: 0.11, 0.77); P-trend =0.03]. This pattern was positively correlated with P:S ratio, vitamin A, and dietary fiber and negatively correlated with sugar. Conclusion: A dietary pattern providing high P:S ratio, vitamin A and dietary fiber, and a low level of sugar may reduce the risk of cognitive impairment in old age. The findings have significance in guiding local Singaporeans to dementia prevention through food-based dietary approaches.

Keywords: dementia, cognitive impairment, diet, nutrient, elderly

Procedia PDF Downloads 77
4494 Raising Awareness of Education for Sustainable Development Oriented School Programs and Curriculum

Authors: Dina L. DiSantis

Abstract:

The Japan-U.S. Teacher Exchange Program for Education for Sustainable Development (ESD) provides an opportunity for teachers from the United States and Japan to travel to each other’s countries in order to experience and learn how each country is implementing efforts to educate for sustainability. By offering programs such as the Japan-U.S. Teacher Exchange Program for Education for Sustainable Development (ESD); teachers from both countries become more aware of what ESD school programs and curricula are being implemented in both countries. Teachers gain a greater sense of global interconnectedness when they are given the opportunity to share in each other’s culture and life. The primary objectives of the program are to foster a mutual exchange between the teachers in the United States and Japan, to increase an understanding of culture and educational systems, to give teachers opportunities to collaborate on lessons and projects in areas of sustainability and to enhance professional development opportunities for both U.S and Japanese teachers. The two areas of focus for teachers, are food education and environmental education. Teachers from both countries collaborate and design curriculum and projects for their students in order to help them become more aware of the importance of global sustainability. An overview of the program and the results of an international collaborative project, encouraging local eating and forging a cultural connection to food will be presented.

Keywords: education for sustainable development, environmental education, food education, international collaboration

Procedia PDF Downloads 156
4493 AI-Based Information System for Hygiene and Safety Management of Shared Kitchens

Authors: Jongtae Rhee, Sangkwon Han, Seungbin Ji, Junhyeong Park, Byeonghun Kim, Taekyung Kim, Byeonghyeon Jeon, Jiwoo Yang

Abstract:

The shared kitchen is a concept that transfers the value of the sharing economy to the kitchen. It is a type of kitchen equipped with cooking facilities that allows multiple companies or chefs to share time and space and use it jointly. These shared kitchens provide economic benefits and convenience, such as reduced investment costs and rent, but also increase the risk of safety management, such as cross-contamination of food ingredients. Therefore, to manage the safety of food ingredients and finished products in a shared kitchen where several entities jointly use the kitchen and handle various types of food ingredients, it is critical to manage followings: the freshness of food ingredients, user hygiene and safety and cross-contamination of cooking equipment and facilities. In this study, it propose a machine learning-based system for hygiene safety and cross-contamination management, which are highly difficult to manage. User clothing management and user access management, which are most relevant to the hygiene and safety of shared kitchens, are solved through machine learning-based methodology, and cutting board usage management, which is most relevant to cross-contamination management, is implemented as an integrated safety management system based on artificial intelligence. First, to prevent cross-contamination of food ingredients, we use images collected through a real-time camera to determine whether the food ingredients match a given cutting board based on a real-time object detection model, YOLO v7. To manage the hygiene of user clothing, we use a camera-based facial recognition model to recognize the user, and real-time object detection model to determine whether a sanitary hat and mask are worn. In addition, to manage access for users qualified to enter the shared kitchen, we utilize machine learning based signature recognition module. By comparing the pairwise distance between the contract signature and the signature at the time of entrance to the shared kitchen, access permission is determined through a pre-trained signature verification model. These machine learning-based safety management tasks are integrated into a single information system, and each result is managed in an integrated database. Through this, users are warned of safety dangers through the tablet PC installed in the shared kitchen, and managers can track the cause of the sanitary and safety accidents. As a result of system integration analysis, real-time safety management services can be continuously provided by artificial intelligence, and machine learning-based methodologies are used for integrated safety management of shared kitchens that allows dynamic contracts among various users. By solving this problem, we were able to secure the feasibility and safety of the shared kitchen business.

Keywords: artificial intelligence, food safety, information system, safety management, shared kitchen

Procedia PDF Downloads 62
4492 The Effects of Garlic (Allium sativum) in the Diet on Some Serum Biochemical Parameters of Oscar Fish (Astronotus ocellatus)

Authors: Ali Saghaei, Negar Ghotbeddin, Ebrahim Rajabzadeh Ghatrami, Milad Maniat

Abstract:

The use of herbs as natural additives in fish diets are used to enhance the efficiency and safety systems. The use of herbs, garlic, due to the structure and composition of it has beneficial role in human nutrition and animal nutrition. This study was conducted evaluate the effect different levels of garlic (Allium sativum) powder on the some serum biochemical parameters of Oscar fish (Astronotus ocellatus). Fish were divided into four groups fed on diets containing garlic in different levels; 5 g kg˗1, 10 g kg-1, 20 g kg-1, 30 g kg-1 diet and the control group diet was without garlic. A total number of 300 fish was used and Triplicate groups of Oscar fish with initial weight of 12.43±0.24 g were hand-fed to visual satiation at three meals per day. The experiment extended for two months. Total Protein (TP), Albumin (ALB), Globulin (GLB) and Albumin/Globulin (A/G) ratio, were determined. Based on the results, no significant differences were seen among treatments and control groups during the experimental period for TP, ALB, GLB, and A/G ratio (p > 0.05). Although, the highest amount of serum total protein and globulin levels were observed in diet containing 10 g kg-1 of garlic. Also, the highest value of albumin and A/G were observed in diet containing 20 g kg-1 of garlic, but there were no significant difference with other treatments. The results of this study show that addition of garlic Allium sativum to fish diet can improve fish health.

Keywords: garlic (Allium sativum), serum, Oscar fish (Astronotus ocellatus), iran

Procedia PDF Downloads 476
4491 Effects of Length of Time of Fasting upon Subjective and Objective Variables When Controlling Sleep, Food and Fluid Intakes

Authors: H. Alabed, K. Abuzayan. L. Fgie, K. Zarug

Abstract:

Ramadan requires individuals to abstain from food and fluid intake between sunrise and sunset; physiological considerations predict that poorer mood, physical performance and mental performance will result. In addition, any difficulties will be worsened because preparations for fasting and recovery from it often mean that nocturnal sleep is decreased in length, and this independently affects mood and performance. A difficulty of interpretation in many studies is that the observed changes could be due to fasting but also to the decreased length of sleep and altered food and fluid intakes before and after the daytime fasting. These factors were separated in this study, which took place over three separate days and compared the effects of different durations of fasting (4, 8 or 16h) upon a wide variety of measures (including subjective and objective assessments of performance, body composition, dehydration and responses to a short bout of exercise) - but with an unchanged amount of nocturnal sleep, controlled supper the previous evening, controlled intakes at breakfast and daytime naps not being allowed. Many of the negative effects of fasting observed in previous studies were present in this experiment also. These findings indicate that fasting was responsible for many of the changes previously observed, though some effect of sleep loss, particularly if occurring on successive days (as would occur in Ramadan) cannot be excluded.

Keywords: drinking, eating, mental performance, physical performance, social activity, blood, sleepiness

Procedia PDF Downloads 394
4490 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 140
4489 Quantum Inspired Security on a Mobile Phone

Authors: Yu Qin, Wanjiaman Li

Abstract:

The widespread use of mobile electronic devices increases the complexities of mobile security. This thesis aims to provide a secure communication environment for smartphone users. Some research proves that the one-time pad is one of the securest encryption methods, and that the key distribution problem can be solved by using the QKD (quantum key distribution). The objective of this project is to design an Android APP (application) to exchange several random keys between mobile phones. Inspired by QKD, the developed APP uses the quick response (QR) code as a carrier to dispatch large amounts of one-time keys. After evaluating the performance of APP, it allows the mobile phone to capture and decode 1800 bytes of random data in 600ms. The continuous scanning mode of APP is designed to improve the overall transmission performance and user experience, and the maximum transmission rate of this mode is around 2200 bytes/s. The omnidirectional readability and error correction capability of QR code gives it a better real-life application, and the features of adequate storage capacity and quick response optimize overall transmission efficiency. The security of this APP is guaranteed since QR code is exchanged face-to-face, eliminating the risk of being eavesdropped. Also, the id of QR code is the only message that would be transmitted through the whole communication. The experimental results show this project can achieve superior transmission performance, and the correlation between the transmission rate of the system and several parameters, such as the QR code size, has been analyzed. In addition, some existing technologies and the main findings in the context of the project are summarized and critically compared in detail.

Keywords: one-time pad, QKD (quantum key distribution), QR code, application

Procedia PDF Downloads 143
4488 Multimodal Biometric Cryptography Based Authentication in Cloud Environment to Enhance Information Security

Authors: D. Pugazhenthi, B. Sree Vidya

Abstract:

Cloud computing is one of the emerging technologies that enables end users to use the services of cloud on ‘pay per usage’ strategy. This technology grows in a fast pace and so is its security threat. One among the various services provided by cloud is storage. In this service, security plays a vital factor for both authenticating legitimate users and protection of information. This paper brings in efficient ways of authenticating users as well as securing information on the cloud. Initial phase proposed in this paper deals with an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. Unique identification and slow intrusive formulates an advanced reliability on user-behaviour based biometrics than conventional means of password authentication. By biometric systems, the accounts are accessed only by a legitimate user and not by a nonentity. The biometric templates employed here do not include single trait but multiple, viz., iris and finger prints. The coordinating stage of the authentication system functions on Ensemble Support Vector Machine (SVM) and optimization by assembling weights of base SVMs for SVM ensemble after individual SVM of ensemble is trained by the Artificial Fish Swarm Algorithm (AFSA). Thus it helps in generating a user-specific secure cryptographic key of the multimodal biometric template by fusion process. Data security problem is averted and enhanced security architecture is proposed using encryption and decryption system with double key cryptography based on Fuzzy Neural Network (FNN) for data storing and retrieval in cloud computing . The proposing scheme aims to protect the records from hackers by arresting the breaking of cipher text to original text. This improves the authentication performance that the proposed double cryptographic key scheme is capable of providing better user authentication and better security which distinguish between the genuine and fake users. Thus, there are three important modules in this proposed work such as 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. The extraction of the feature and texture properties from the respective fingerprint and iris images has been done initially. Finally, with the help of fuzzy neural network and symmetric cryptography algorithm, the technique of double key encryption technique has been developed. As the proposed approach is based on neural networks, it has the advantage of not being decrypted by the hacker even though the data were hacked already. The results prove that authentication process is optimal and stored information is secured.

Keywords: artificial fish swarm algorithm (AFSA), biometric authentication, decryption, encryption, fingerprint, fusion, fuzzy neural network (FNN), iris, multi-modal, support vector machine classification

Procedia PDF Downloads 258
4487 Information Needs of Cassava Processors on Small-Scale Cassava Processing in Oyo State, Nigeria

Authors: Rafiat Bolanle Fasasi-Hammed

Abstract:

Cassava is an important food crop in rural households of Nigeria. It has a high potential for product diversification, because it can be processed into various products forms for human consumption and can be made into chips for farm animals, and also starch and starch derivatives. However, cassava roots are highly perishable and contain potentially toxic cyanogenic glycosides which necessitate its processing. Therefore, this study was carried out to assess information needs of cassava processors on food safety practices in Oyo State, Nigeria. Simple random sampling technique was used in the selection of 110 respondents for this study. Descriptive statistics and chi-square were used to analyze the data collected. Results of this study showed that the mean age of the respondents was 39.4 years, majority (78.7%) of the respondents was married, 51.9% had secondary education; 45.8% of the respondents have spent more than 12 years in cassava processing. The mean income realized was ₦26,347.50/month from cassava processing. Information on cassava processing got to the respondents through friends, family and relations (73.6%) and fellow cassava processors (58.6%). Serious constraints identified were ineffective extension agents (93.9%), food safety regulatory agencies (88.1%) and inadequate processing and storage facilities (67.8%). Chi-square results showed that significant relationship existed between socio-economic characteristics of the respondents (χ2 = 29.80, df = 2,), knowledge level (χ2 = 9.26, df = 4), constraints (χ2 = 13.11, df = 2) and information needs at p < 0.05 level of significance. The study recommends that there should be regular training on improved cassava processing methods for the cassava processors in the study area.

Keywords: information, needs, cassava, Oyo State, processing

Procedia PDF Downloads 298
4486 Prospects of Oman as a Destination for Halal Tourism

Authors: Asad Rehman

Abstract:

Although a vast majority relates the concept of ‘halal’ or what is permissible in Islam to food only. However, halal industry covers many sectors such as food, fashion, transport, finance and even tourism. Halal tourism is not just about halal food; it is also about the overall experience, which is amenable with the Shariah (Islamic jurisprudence). Oman has a plethora of natural beauty and many places of interest for all types of tourists. It is one of the most secure and peaceful countries in the world. Having a well-developed Infrastructure, Oman is ready to take its tourism to new heights. The ever-hospitable Omanis are proud of their rich cultural and historical heritage. Thus, Oman appears to have all what it takes to become a prime destination for halal tourism. The objective of this study is to assess the prospects of Oman as a destination for halal tourism. Based on the interviews of experts like academicians, tourism professionals, officials and clerics, Oman’s competitiveness as a destination for halal tourism was assessed by developing a Strengths, Weaknesses, Opportunities and Threats (SWOT) profile. The findings of the SWOT were compared with the data from the Global Muslim Travel Index (GMTI) from the year 2014 to 2018. Based on the analysis, Oman is found to have the right mix of environment and enabling services for halal tourism. However, it is found lacking in public transport, communication and customer outreach. Oman is also found to be losing its rank among the top 10 destinations for halal tourism to close competitors like Qatar, Bahrain, Morocco, etc. The concerned authorities need to make conscious efforts to resolve these issues as it becomes imperative for Oman to revamp its tourism strategy.

Keywords: destination, halal, Islam, SWOT, tourism

Procedia PDF Downloads 145
4485 Agroforestry in Cameroon: Its Perceptions, Advantages and Limits

Authors: Djouhou Fowe Michelle Carole

Abstract:

In the last few decades, there have been considerable efforts by the international community to develop strategies that reduce global poverty and hunger. Despite the modest success in reducing food insecurity, there are still around 795 million people worldwide who remain undernourished, the majority of whom are in sub-Saharan Africa. In many of these impoverished communities, agriculture still remains one of the most important sectors in driving economic growth and reducing poverty. For the growing population, with higher food demand and fixed agricultural land, sustainable intensification is proposed as an important strategy to respond to the challenges of low yields, environmental degradation, and adaptation to climate change. Adoption of agroforestry technologies is increasingly being promoted as a promising solution. This study was conducted to determine the perceptions of the Cameroonian population and farmers on agroforestry. The methodology used was based on a survey to determine their knowledge level of agroforestry, their representation of its advantages and disadvantages, and the reasons that might motivate them whether or not to adopt agroforestry. Participants were randomly selected and received a questionnaire. Data were subjected to a descriptive analysis using SPSS software. The obtained results showed that less than 50% of the general population had already heard about agroforestry at least once; they have basic knowledge about this concept and its advantages. Farmers had been particularly sensitive to tree's food production function and seemed to value their environmental assets. However, various constraints could affect the possible adoption of agroforestry techniques.

Keywords: agroforestry, quality and sustainable agriculture, perceptions, advantages, limits

Procedia PDF Downloads 170
4484 Efficiency of Natural Metabolites on Quality Milk Production in Mixed Breed Cows.

Authors: Mariam Azam, Sajjad Ur Rahman, Mukarram Bashir, Muhammad Tahir, Seemal Javaid, Jawad, Aoun Muhammad, Muhammad Zohaib, Hannan Khan

Abstract:

Products of microbial origin are of great importance as they have proved their value in healthcare and nutrition, use of these microbial metabolites acquired from partially fermented soya hulls and wheat bran along with Saccharomyces cerevisiae (DL-22 S/N) substantiates to be a great source for an increase in the total milk production and quality yield.1×109 CFU/ml cells of Saccharomyces cerevisiae (DL-22 S/N) were further grown under in-vivo conditions for the assessment of quality milk production. Two groups with twelve cows, each having the same physical characteristics (Group A and Group B), were under study, Group A was daily fed with 12gm of biological metabolites and 22% protein-pelleted feed. On the other hand, the animals of Group B were provided with no metabolites in their feed. In thirty days of trial, improvement in the overall health, body score, milk protein, milk fat, yield, incidence rate of mastitis, ash, and solid not fat (SNF) was observed. The collected data showed that the average quality milk production was elevated up to 0.45 liter/h/d. However, a reduction in the milk fats up to 0.45% and uplift in the SNF value up to 0.53% of cow milk was also observed. At the same time, the incidence rate of mastitis recorded for the animals under trial was reduced to half, and improved non specific immunity was reported.

Keywords: microbial metabolites, post-biotics, animal supplements, animal nutrition, proteins, animal production, fermentation

Procedia PDF Downloads 95
4483 Progress, Challenges, and Prospects of Non-Conventional Feed Resources for Livestock Production in Sub-Saharan Africa: A Review

Authors: Clyde Haruzivi, Olusegun Oyebade Ikusika, Thando Conference Mpendulo

Abstract:

Feed scarcity, increasing demand for animal products due to the growing human population, competition for conventional feed resources for humans and animal production, and ever-increasing prices of these feed resources are major constraints to the livestock industry in Sub-Saharan Africa. As a result, the industry is suffering immensely as the cost of production is high, hence the reduced returns. Most affected are the communal and resource-limited farmers who cannot afford the cost of conventional feed resources to supplement feeds, especially in arid and semi-arid areas where the available feed resources are not adequate for maintenance and production. This has tasked researchers and animal scientists to focus on the potential of non-conventional feed resources (NCFRs). Non-conventional feed resources could fill the gap through reduced competition, cost of feed, increased supply, increased profits, and independency as farmers will be utilizing locally available feed resources. Identifying available non-conventional feed resources is vital as it creates possibilities for novel feed industries and markets and implements methods of using these feedstuffs to improve livestock production and livelihoods in Sub-Saharan Africa. Hence, this research work analyses the progress, challenges, and prospects of some non-conventional feed resources in Sub-Saharan Africa.

Keywords: non-conventional, feed resources, livestock production, food security, Sub-Saharan

Procedia PDF Downloads 106
4482 Securitizing Terrorism: A Critical Appraisal of Pakistan’s Counter-Terrorism Approach

Authors: Bilal Zubair

Abstract:

In a constantly challenging internal security environment, Pakistan is making ways to improvise and respond to the new variations in the pervasive phenomenon of terrorism. The state’s endeavors towards securitizing terrorism as an existential threat are both extensive and intensive which have systematically incorporated both military and non-military means. Since 2007, the military has been conducting intermittent operations and by 2014 has successfully neutralized the terrorist ability to target vital security installations and security personal. The terrorists have responded by targeting communities which are soft targets and extremely vulnerable to organized assaults. Within this context, the study aims to explain the emerging trends of terrorism in Pakistan, which multi-layered and complex developments are having far-reaching implications for state and society. With a view to explore the underlining reasons, present trends and ensuing ramifications of the emerging trends in terrorism, this study would examine the following: First, the historical processes and development of Terrorism in Pakistan; secondly the processes of securitization which include political consensus, legal frameworks and military operations against the terrorist groups; thirdly , the socio-cultural dimensions and geopolitical influences on the transforming nature of sectarian terrorism. The study will also highlight the grey areas and weak links in the ongoing securitization process. Finally, the study will thoroughly explore the societal insecurity which is manifested in internal displacements, identity crisis and weakening the socio-political fabric of the state.

Keywords: counter-terrorism, terrorism, sectarianism, securitizing

Procedia PDF Downloads 295
4481 Effects of Length of Time of Fasting Upon Subjective and Objective Variables When Prior Sleep and Food and Fluid Intakes Have Been Controlled

Authors: H. Alabed, K. Abuzayan, J. Ezarrugh, S. Ali, M. Touba

Abstract:

Ramadan requires individuals to abstain from food and fluid intake between sunrise and sunset, Physiological considerations predict that poorer mood, Physical performance and mental performance will result. In addition, Any difficulties will be worsened because preparations for fasting and recovery from it often mean that nocturnal sleep is decreased in length and this independently affects mood and performance. A difficulty of interpretation in many studies is that the observed changes could be due to fasting but also to the decreased length of sleep and altered food and fluid intakes before and after the daytime fasting. These factors were separated in this study, Which took place over three separate days and compared the effects of different durations of fasting (4, 8 or 16 h) upon a wide variety of measures (including subjective and objective assessments of performance, body composition, Dehydration and responses to a short bout of exercise) but with an unchanged amount of nocturnal sleep, Controlled supper the previous evening, Controlled intakes at breakfast and daytime naps not being allowed. Many of the negative effects of fasting observed in previous studies were present in this experiment also. These findings indicate that fasting was responsible for many of the changes previously observed, Though some effect of sleep loss, Particularly if occurring on successive days (as would occur in Ramadan) cannot be excluded.

Keywords: Drinking, eating, mental performance, physical performance, social activity, blood, sleepiness

Procedia PDF Downloads 310