Search results for: foods security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 3279

Search results for: foods security

1509 Concepts of the Covid-19 Pandemic and the Implications of Vaccines for Health Security in Nigeria and Diasporas

Authors: Wisdom Robert Duruji

Abstract:

The outbreak of SARS-CoV-2 serotype infection was recorded in January 2020 in Wuhan City, Hubei Province, China. This study examines the concepts of the COVID-19 pandemic and the implications of vaccines for health security in Nigeria and Diasporas. It challenges the widely accepted assumption that the first case of coronavirus infection in Nigeria was recorded on February 27th, 2020, in Lagos. The study utilizes a range of research methods to achieve its objectives. These include the double-layered culture technique, literature review, website knowledge, Google search, news media information, academic journals, fieldwork, and on-site observations. These diverse methods allow for a comprehensive analysis of the concepts and the implications being studied. The study finds that coronavirus infection can be asymptomatic; it may be the antigenicity of the leukocytes (white blood cells), which produce immunogenic hapten or interferons (α, β and γ) that fight infectious parasites, was an immune response that prevented severe virulence in healthy individuals; the reason healthy patients of coronavirus infection in Nigeria naturally recovered after two to three weeks of on-set of infection and test negative. However, the fatality data from the Nigerian Centre for Disease Control (NCDC) is incorrect in this study’s finding; it perused that the fatalities were primarily due to underlying ailments, hunger, and malnutrition in debilitated, comorbid, or compromised patients. This study concluded that the kits and Polymerase Chain Reaction (PCR) machine currently used by the Nigerian Centre for Disease Control (NCDC) in testing and confirming COVID-19 in Nigeria is not ideal; it is programmed and negates separating the strain to its specific serotypes amongst its genera coronavirus, and family Coronaviridae; and might have confirmed patients with the symptoms of febrile caused by cough, catarrh, typhoid and malaria parasites as Covid-19 positive. Therefore, it is recommended that the coronavirus species infected in Nigeria are opportunistic parasites that thrive in human immuno-suppressed conditions like the herpesvirus; it cannot be eradicated by vaccines; the only virucides are interferons, immunoglobulins, and probably synthetic antiviral guanosine drugs like copegus or ribavirin. The findings emphasized that COVID-19 is not the primary pandemic disease in Nigeria; the lockdown was a mirage and not necessary; but rather, pandemic diseases in Nigeria are corruption, nepotism, hunger, and malnutrition caused by ineptitude in governance, religious dichotomy, and ethnic conflicts.

Keywords: coronavirus, corruption, Covid-19 pandemic, lock-down, Nigeria, vaccine

Procedia PDF Downloads 62
1508 Magnitude and Determinants of Overweight and Obesity among High School Adolescents in Addis Ababa, Ethiopia

Authors: Mulugeta Shegaze, Mekitie Wondafrash, Alemayehu A. Alemayehu, Shikur Mohammed, Zewdu Shewangezaw, Mukerem Abdo, Gebresilasea Gendisha

Abstract:

Background: The 2004 World Health Assembly called for specific actions to halt the overweight and obesity epidemic that is currently penetrating urban populations in the developing world. Adolescents require particular attention due to their vulnerability to develop obesity and the fact that adolescent weight tracks strongly into adulthood. However, there is scarcity of information on the modifiable risk factors to be targeted for primary intervention among urban adolescents in Ethiopia. This study was aimed at determining the magnitude and risk factors of overweight and obesity among high school adolescents in Addis Ababa. Methods: An institution-based cross-sectional study was conducted in February and March 2014 on 456 randomly selected adolescents from 20 high schools in Addis Ababa city.  Demographic data and other risk factors of overweight and obesity were collected using self-administered structured questionnaire, whereas anthropometric measurements of weight and height were taken using calibrated equipment and standardized techniques. The WHO STEPS instrument for chronic disease risk was applied to assess dietary habit and physical activity. Overweight and obesity status was determined based on BMI-for-age percentiles of WHO 2007 reference population. Results: The prevalence rates of overweight, obesity, and overall overweight/ obesity among high school adolescents in Addis Ababa were 9.7% (95%CI = 6.9-12.4%), 4.2% (95%CI = 2.3-6.0%), and 13.9% (95%CI = 10.6-17.1%), respectively. Overweight/obesity prevalence was highest among female adolescents, in private schools, and in the higher wealth category. In multivariable regression model, being female [AOR(95%CI) = 5.4(2.5,12.1)], being from private school [AOR(95%CI) = 3.0(1.4,6.2)], having >3 regular meals [AOR(95%CI) = 4.0(1.3,13.0)], consumption of sweet foods [AOR(95%CI) = 5.0(2.4,10.3)] and spending >3 hours/day sitting [AOR(95%CI) = 3.5(1.7,7.2)] were found to increase overweight/ obesity risk, whereas high Total Physical Activity level [AOR(95%CI) = 0.21(0.08,0.57)] and better nutrition knowledge [AOR(95%CI) = 0.160.07,0.37)] were found protective. Conclusions: More than one in ten of the high school adolescents were affected by overweight/obesity with dietary habit and physical activity are important modifiable risk factors. Well-tailored nutrition education program targeting lifestyle change should be initiated with more emphasis to female adolescents and students in private schools.

Keywords: adolescents, NCDs, overweight, obesity

Procedia PDF Downloads 303
1507 Design of Identification Based Adaptive Control for Fermentation Process in Bioreactor

Authors: J. Ritonja

Abstract:

The biochemical technology has been developing extremely fast since the middle of the last century. The main reason for such development represents a requirement for large production of high-quality biologically manufactured products such as pharmaceuticals, foods, and beverages. The impact of the biochemical industry on the world economy is enormous. The great importance of this industry also results in intensive development in scientific disciplines relevant to the development of biochemical technology. In addition to developments in the fields of biology and chemistry, which enable to understand complex biochemical processes, development in the field of control theory and applications is also very important. In the paper, the control for the biochemical reactor for the milk fermentation was studied. During the fermentation process, the biophysical quantities must be precisely controlled to obtain the high-quality product. To control these quantities, the bioreactor’s stirring drive and/or heating system can be used. Available commercial biochemical reactors are equipped with open loop or conventional linear closed loop control system. Due to the outstanding parameters variations and the partial nonlinearity of the biochemical process, the results obtained with these control systems are not satisfactory. To improve the fermentation process, the self-tuning adaptive control system was proposed. The use of the self-tuning adaptive control is suggested because the parameters’ variations of the studied biochemical process are very slow in most cases. To determine the linearized mathematical model of the fermentation process, the recursive least square identification method was used. Based on the obtained mathematical model the linear quadratic regulator was tuned. The parameters’ identification and the controller’s synthesis are executed on-line and adapt the controller’s parameters to the fermentation process’ dynamics during the operation. The use of the proposed combination represents the original solution for the control of the milk fermentation process. The purpose of the paper is to contribute to the progress of the control systems for the biochemical reactors. The proposed adaptive control system was tested thoroughly. From the obtained results it is obvious that the proposed adaptive control system assures much better following of the reference signal as a conventional linear control system with fixed control parameters.

Keywords: adaptive control, biochemical reactor, linear quadratic regulator, recursive least square identification

Procedia PDF Downloads 118
1506 Development of an Instrument for Measurement of Thermal Conductivity and Thermal Diffusivity of Tropical Fruit Juice

Authors: T. Ewetumo, K. D. Adedayo, Festus Ben

Abstract:

Knowledge of the thermal properties of foods is of fundamental importance in the food industry to establish the design of processing equipment. However, for tropical fruit juice, there is very little information in literature, seriously hampering processing procedures. This research work describes the development of an instrument for automated thermal conductivity and thermal diffusivity measurement of tropical fruit juice using a transient thermal probe technique based on line heat principle. The system consists of two thermocouple sensors, constant current source, heater, thermocouple amplifier, microcontroller, microSD card shield and intelligent liquid crystal. A fixed distance of 6.50mm was maintained between the two probes. When heat is applied, the temperature rise at the heater probe measured with time at time interval of 4s for 240s. The measuring element conforms as closely as possible to an infinite line source of heat in an infinite fluid. Under these conditions, thermal conductivity and thermal diffusivity are simultaneously measured, with thermal conductivity determined from the slope of a plot of the temperature rise of the heating element against the logarithm of time while thermal diffusivity was determined from the time it took the sample to attain a peak temperature and the time duration over a fixed diffusivity distance. A constant current source was designed to apply a power input of 16.33W/m to the probe throughout the experiment. The thermal probe was interfaced with a digital display and data logger by using an application program written in C++. Calibration of the instrument was done by determining the thermal properties of distilled water. Error due to convection was avoided by adding 1.5% agar to the water. The instrument has been used for measurement of thermal properties of banana, orange and watermelon. Thermal conductivity values of 0.593, 0.598, 0.586 W/m^o C and thermal diffusivity values of 1.053 ×〖10〗^(-7), 1.086 ×〖10〗^(-7), and 0.959 ×〖10〗^(-7) 〖m/s〗^2 were obtained for banana, orange and water melon respectively. Measured values were stored in a microSD card. The instrument performed very well as it measured the thermal conductivity and thermal diffusivity of the tropical fruit juice samples with statistical analysis (ANOVA) showing no significant difference (p>0.05) between the literature standards and estimated averages of each sample investigated with the developed instrument.

Keywords: thermal conductivity, thermal diffusivity, tropical fruit juice, diffusion equation

Procedia PDF Downloads 351
1505 A Systematic Approach for Analyzing Multiple Cyber-Physical Attacks on the Smart Grid

Authors: Yatin Wadhawan, Clifford Neuman, Anas Al Majali

Abstract:

In this paper, we evaluate the resilience of the smart grid system in the presence of multiple cyber-physical attacks on its distinct functional components. We discuss attack-defense scenarios and their effect on smart grid resilience. Through contingency simulations in the Network and PowerWorld Simulator, we analyze multiple cyber-physical attacks that propagate from the cyber domain to power systems and discuss how such attacks destabilize the underlying power grid. The analysis of such simulations helps system administrators develop more resilient systems and improves the response of the system in the presence of cyber-physical attacks.

Keywords: smart grid, gas pipeline, cyber- physical attack, security, resilience

Procedia PDF Downloads 307
1504 Polish Police in the Fight against Terrorism and Cyberterrorism

Authors: Izabela Nowicka, Jacek Dworzecki

Abstract:

The paper will be presented to selected legal and organizational solutions for the prevention and combating of terrorism by the police in Poland. Development will include information on the organization and functioning of the police anti-terrorist sub-units, whose officers are on the front line of the fight against terrorism. They will be presented to the conditions and cases of use of firearms by police officers in the course of special operations aimed against organizations and terrorist groups, and the perpetrators of criminal acts of terrorism as well as the legal foundation for the Polish police to take immediate counterterrorism operations. Article will be prepared in the context of an international research project entitled. Understand the Dimensions of Organised Crime and Terrorist Networks for Developing Effective and Efficient Security Solutions for First-line-practitioners and Professionals [Project: H2020-FCT-2015, No: 700688].

Keywords: the fight against terrorism, police, Poland, takedown

Procedia PDF Downloads 328
1503 Urban Rail Transit CBTC Computer Interlocking Subsystem Relying on Multi-Template Pen Point Tracking Algorithm

Authors: Xinli Chen, Xue Su

Abstract:

In the urban rail transit CBTC system, interlocking is considered one of the most basic sys-tems, which has the characteristics of logical complexity and high-security requirements. The development and verification of traditional interlocking subsystems are entirely manual pro-cesses and rely too much on the designer, which often hides many uncertain factors. In order to solve this problem, this article is based on the multi-template nib tracking algorithm for model construction and verification, achieving the main safety attributes and using SCADE for formal verification. Experimental results show that this method helps to improve the quality and efficiency of interlocking software.

Keywords: computer interlocking subsystem, penpoint tracking, communication-based train control system, multi-template tip tracking

Procedia PDF Downloads 152
1502 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing

Procedia PDF Downloads 387
1501 Analysis of Business Intelligence Tools in Healthcare

Authors: Avishkar Gawade, Omkar Bansode, Ketan Bhambure, Bhargav Deore

Abstract:

In recent year wide range of business intelligence technology have been applied to different area in order to support decision making process BI enables extraction of knowledge from data store. BI tools usually used in public health field for financial and administrative purposes.BI uses a dashboard in presentation stage to deliver information to information to end users.In this paper,we intend to analyze some open source BI tools on the market and their applicability in the clinical sphere taking into consideration the general characteristics of the clinical environment.A pervasive BI platform was developed using a real case in order to prove the tool viability.Analysis of various BI Tools in done with the help of several parameters such as data security,data integration,data quality reporting and anlaytics,performance,scalability and cost effectivesness.

Keywords: CDSS, EHR, business intelliegence, tools

Procedia PDF Downloads 132
1500 Industrial and Technological Applications of Brewer’s Spent Malt

Authors: Francielo Vendruscolo

Abstract:

During industrial processing of raw materials of animal and vegetable origin, large amounts of solid, liquid and gaseous wastes are generated. Solid residues are usually materials rich in carbohydrates, protein, fiber and minerals. Brewer’s spent grain (BSG) is the main waste generated in the brewing industry, representing 85% of the waste generated in this industry. It is estimated that world’s BSG generation is approximately 38.6 x 106 t per year and represents 20-30% (w/w) of the initial mass of added malt, resulting in low commercial value by-product, however, does not have economic value, but it must be removed from the brewery, as its spontaneous fermentation can attract insects and rodents. For every 100 grams in dry basis, BSG has approximately 68 g total fiber, being divided into 3.5 g of soluble fiber and 64.3 g of insoluble fiber (cellulose, hemicellulose and lignin). In addition to dietary fibers, depending on the efficiency of the grinding process and mashing, BSG may also have starch, reducing sugars, lipids, phenolics and antioxidants, emphasizing that its composition will depend on the barley variety and cultivation conditions, malting and technology involved in the production of beer. BSG demands space for storage, but studies have proposed alternatives such as the use of drying, extrusion, pressing with superheated steam, and grinding to facilitate storage. Other important characteristics that enhance its applicability in bioremediation, effluent treatment and biotechnology, is the surface area (SBET) of 1.748 m2 g-1, total pore volume of 0.0053 cm3 g-1 and mean pore diameter of 121.784 Å, characterized as a macroporous and possess fewer adsorption properties but have great ability to trap suspended solids for separation from liquid solutions. It has low economic value; however, it has enormous potential for technological applications that can improve or add value to this agro-industrial waste. Due to its composition, this material has been used in several industrial applications such as in the production of food ingredients, fiber enrichment by its addition in foods such as breads and cookies in bioremediation processes, substrate for microorganism and production of biomolecules, bioenergy generation, and civil construction, among others. Therefore, the use of this waste or by-product becomes essential and aimed at reducing the amount of organic waste in different industrial processes, especially in breweries.

Keywords: brewer’s spent malt, agro-industrial residue, lignocellulosic material, waste generation

Procedia PDF Downloads 206
1499 Risk, Capital Buffers, and Bank Lending: The Adjustment of Euro Area Banks

Authors: Laurent Maurin, Mervi Toivanen

Abstract:

This paper estimates euro area banks’ internal target capital ratios and investigates whether banks’ adjustment to the targets have an impact on credit supply and holding of securities during the financial crisis in 2005-2011. Using data on listed banks and country-specific macro-variables a partial adjustment model is estimated in a panel context. The results indicate, firstly, that an increase in the riskiness of banks’ balance sheets influences positively on the target capital ratios. Secondly, the adjustment towards higher equilibrium capital ratios has a significant impact on banks’ assets. The impact is found to be more size-able on security holdings than on loans, thereby suggesting a pecking order.

Keywords: Euro area, capital ratios, credit supply, partial adjustment model

Procedia PDF Downloads 443
1498 Social Media Engagement in Academic Library to Advocate Participatory Service towards Dynamic Learning Community

Authors: Siti Marlia Abd Rahim, Mad Khir Johari Abdullah Sani

Abstract:

The ever-increasing use of social media applications by library users has raised concerns about the purpose and effectiveness of these platforms in academic libraries. While social media has the potential to revolutionize library services, its usage for non-educational purposes and security concerns have hindered its full potential. This paper aims to address the user behavioral factors affecting social media engagement in academic libraries and examine the impact of social media engagement on user participation. Additionally, it seeks to measure the effect of user participation in social media on the development of powerful learning communities.

Keywords: social media adoption, social media engagement, academic library, social media in academic library, learning community

Procedia PDF Downloads 109
1497 Antioxidant Activity and Microbiological Quality of Functional Bread Enriched with Morus Alba Leaf Extract during Storage

Authors: Joanna Kobus-Cisowska, Daria Szymanowska, Piotr Szulc, Oskar Szczepaniak, Marcin Dziedzinski, Szymon Byczkiewicz

Abstract:

A wide range of food products is offered on the market. However, increasing consumer awareness of the impact of food on health causes a growing interest in enriched products. Cereal products are an important element of the daily diet of man. In the literature, no data was found on the impact of Morus alba preparations on the content of active ingredients and properties of wholemeal bread. Mulberry leaves (Morus alba L) are a rich source of bioactive compounds with multidirectional antioxidant activity, which means that they can be a component of new foods that prevent disease or support therapy and improve the patient's health. The aim of the study was to assess the impact of the addition of white mulberry leaf extract on the antioxidant activity of bread. It has been shown that bread can be a carrier of biologically active substances from mulberry leaves, because the addition of mulberry at a sensory acceptable level and meeting microbiological requirements significantly influenced the increase in the content of bioactive ingredients and the antioxidant activity of bread. The addition of mulberry leaf water extract to bread increased the level of flavonols and phenolic acids, in particular protocatechic, chlorogenic gallic and caffeic acid and isoquercetin and rutine, and also increased the antioxidant potential, which were microbiological stable during 5 days storage. It has been shown also that the addition of Morus alba preparations has a statistically significant effect on anti-radical activity. In addition, there were no differences in activity in DPPH · and ABTS · + tests between post-storage samples. This means that the compounds responsible for the anti-radical activity present in the bread were not inactivated during storage. It was found that the tested bread was characterized by high microbiological purity, which is indicated by the obtained results of analyzes performed for the titers of indicator microorganisms and the absence of pathogens. In the tested products from the moment of production throughout the entire storage period, no undesirable microflora was found, which proves their safety and guarantees microbiological stability during the storage period.

Keywords: antioxidants, bread, extract, quality

Procedia PDF Downloads 169
1496 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 325
1495 Effectiveness of a Healthy Lifestyle Combined with Abdominal Massage on Treating Infertility Due to Endometriosis and Adhesions in the Fallopian Tubes

Authors: Flora Tajiki

Abstract:

Undoubtedly, the desire to experience the beauty of motherhood is a dream for every woman, and delays in achieving this can have significant psychological consequences. Endometriosis, which is the presence of endometrial tissue in organs other than the uterus, can cause infertility through adhesion and inflammation. The fallopian tubes play a crucial role in transferring the egg to the uterus; if adhesions are present, the chances of natural pregnancy decrease, while the likelihood of ectopic pregnancy and miscarriage increases. In cases of mild adhesions observed during hysterosalpingography or laparoscopy, the tubes may open, but in severe adhesions, this is usually not possible. The aim of this study is to assess the effectiveness of a healthy lifestyle combined with massage of the uterine and ovarian areas in relieving adhesions in the fallopian tubes and treating the complications of endometriosis. This case study focuses on a 33-year-old woman, who married at 20, and experienced a miscarriage five years ago that required curettage. Following this, a hysterosalpingography revealed blockages in both fallopian tubes. A laparoscopic examination also indicated endometriosis and specialists in infertility ruled out the possibility of natural pregnancy. Three years ago, she underwent an unsuccessful IVF procedure. Two years ago, she began a lifestyle modification program that included improving sleep patterns, eliminating sugar and preservatives, avoiding red meat and gluten, eating a balanced diet, walking, exercising, and incorporating beneficial foods like olive oil, almonds, and nutritious vegetables, along with abdominal massage using chamomile oil. She also took vitamin C and vitamin D supplements. After approximately twenty weeks of these methods, and given that infertility centers had indicated that surgery and repeated IVF were the only options for her to conceive, she became pregnant naturally and had a successful pregnancy and delivery. Endometriosis is one of the significant factors contributing to infertility and adhesions in the fallopian tubes and uterus, and unfortunately, it has no definitive cure and can recur even after surgery. The treatment of similar cases emphasizes lifestyle modifications, and this approach has proven to be both cost-effective and harmless. Therefore, it seems essential to focus on this treatment strategy.

Keywords: infertility, endometriosis, adhesions, fallopian tubes, healthy lifestyle, lifestyle modifications, abdominal massage, case study, natural pregnancy, ivf, psychological consequences, uterine health, complementary treatments, nutrition, women's health.

Procedia PDF Downloads 3
1494 Use of Cloud Computing and Smart Devices in Healthcare

Authors: Nikunj Agarwal, M. P. Sebastian

Abstract:

Cloud computing can reduce the start-up expenses of implementing EHR (Electronic Health Records). However, many of the healthcare institutions are yet to implement cloud computing due to the associated privacy and security issues. In this paper, we analyze the challenges and opportunities of implementing cloud computing in healthcare. We also analyze data of over 5000 US hospitals that use Telemedicine applications. This analysis helps to understand the importance of smart phones over the desktop systems in different departments of the healthcare institutions. The wide usage of smartphones and cloud computing allows ubiquitous and affordable access to the health data by authorized persons, including patients and doctors. Cloud computing will prove to be beneficial to a majority of the departments in healthcare. Through this analysis, we attempt to understand the different healthcare departments that may benefit significantly from the implementation of cloud computing.

Keywords: cloud computing, smart devices, healthcare, telemedicine

Procedia PDF Downloads 391
1493 The Impact of Technology on Cultural Heritage among Preschool Children

Authors: Adenike Akinrotimi

Abstract:

Globally, education has been identified as vital tool for any form of development for any society (community); be it economic, social, political and cultural development. It is the determinant level of prosperity, welfare, security and sustenance of the people of a particular community. Education could be formal, informal and non-formal. Cultural development of an individual and of the community as it were is a lifelong process, where individual learns from daily experiences, exposure to the environment at home, at work, at play and it enriches human and environmental potentials. This type of education can be referred to as cultural heritage. It is built on learner participation and assimilation. Preschool programme also referred to as Early Childhood Education is critical to holistic development of a child cultural development inclusive. This paper examines the impact that technology has on cultural heritage among preschool children.

Keywords: cultural heritage, education, pre-school, technology

Procedia PDF Downloads 391
1492 Rebuilding Christchurch's Infrastructure: An Analysis of Political Mismanagement

Authors: Hugh Byrd, Steve Matthewnan

Abstract:

The devastation of the city centre of Christchurch, New Zealand, after the 2010 and 2011 earthquakes presented an opportunity to rebuild infrastructure in a coordinated and efficient manner to allow for a city that was energy efficient, low carbon, resilient and provided both energy security and justice. The research described in this paper records the processes taken to attempt to rebuild the energy infrastructure. The story is one of political decisions overriding appropriate technology and ultimately is a lesson in how not to handle the implementation of post-disaster energy infrastructure. Lack of clarity in decision making by central government and then not pursuing consultant’s recommendations led to a scheme that was effectively abandoned in 2016 and described as ‘a total failure’. The paper records the critical events that occurred and explains why the proposed energy infrastructure was both politically and technologically inappropriate.

Keywords: energy infrastructure, policy and governance, post-disaster rebuilding

Procedia PDF Downloads 166
1491 Development and Evaluation of a Calcium Rich Plant-Based Supplement on Bone Turnover of Peri and Post Menopausal Women

Authors: Gayathri.G, Hemamalini.A.J, Chandrasekaran.A

Abstract:

Problem statement: Nutritional deficiency, especially calcium, may lead to poor bone formation and mineralization. Although there are plenty of synthetic supplements available, it is essential to make a calcium rich food supplement accessible to combat calcium deficiency that could be readily prepared at the household level. Thus the current study aimed to formulate and standardize an indigenous low-cost calcium-rich food supplement and to study the impact of supplementation on the bone resorption and formation markers. Methods: A Randomized controlled trial was conducted with 60 subjects distributed equally in control and experimental groups, including perimenopausal and postmenopausal women. A plant-based calcium-rich product was developed and supplemented in form of balls as a midmorning and evening snack by addition of optimized proportions of leaves of Sesbania Grandiflora, seeds of Sesamum indicum, Eleusine coracana, Glycine max, Vigna mungo for a period of 6 months. Postmenopausal and perimenopausal women received 1200mg and 800mg of calcium per day from the supplemented, respectively. Outcome measures like serum calcium; betacrosslaps (bone resorption marker) and total P1NP (bone absorption marker) were assessed after 3 months and after 6 months. Results: There were no significant changes seen in the serum calcium and total P1NP levels (bone formation marker) among the subjects during the supplementation period. The bone resorption marker (betacrosslaps) reduced in all the groups and the reduction (0.32 ± 0.130 ng/ml to 0.25 ± 0.130 ng/ml) was found to be statistically highly significant (p < 0.01) in experimental group of perimenopausal subjects and significant (p < 0.05) in experimental group of postmenopausal subjects (1.11 ± 0.290 ng/ml to 0.42 ± 0.263 ng/ml). Conclusion: With the current severe calcium deficiency in the Indian population, integrating low-cost, calcium-rich native foods that could be readily prepared at household level would be useful in raising the nutritional consumption of calcium, which would, in turn, decrease bone turnover.

Keywords: calcium, sesbania grandiflora, sesamum indicum, eleusine coracana, glycine max, vigna mungo, postmenopause, perimenopause, bone resorption, bone absorption, betacrosslaps, total P1NP

Procedia PDF Downloads 129
1490 Human Behavior Modeling in Video Surveillance of Conference Halls

Authors: Nour Charara, Hussein Charara, Omar Abou Khaled, Hani Abdallah, Elena Mugellini

Abstract:

In this paper, we present a human behavior modeling approach in videos scenes. This approach is used to model the normal behaviors in the conference halls. We exploited the Probabilistic Latent Semantic Analysis technique (PLSA), using the 'Bag-of-Terms' paradigm, as a tool for exploring video data to learn the model by grouping similar activities. Our term vocabulary consists of 3D spatio-temporal patch groups assigned by the direction of motion. Our video representation ensures the spatial information, the object trajectory, and the motion. The main importance of this approach is that it can be adapted to detect abnormal behaviors in order to ensure and enhance human security.

Keywords: activity modeling, clustering, PLSA, video representation

Procedia PDF Downloads 391
1489 End to End Monitoring in Oracle Fusion Middleware for Data Verification

Authors: Syed Kashif Ali, Usman Javaid, Abdullah Chohan

Abstract:

In large enterprises multiple departments use different sort of information systems and databases according to their needs. These systems are independent and heterogeneous in nature and sharing information/data between these systems is not an easy task. The usage of middleware technologies have made data sharing between systems very easy. However, monitoring the exchange of data/information for verification purposes between target and source systems is often complex or impossible for maintenance department due to security/access privileges on target and source systems. In this paper, we are intended to present our experience of an end to end data monitoring approach at middle ware level implemented in Oracle BPEL for data verification without any help of monitoring tool.

Keywords: service level agreement, SOA, BPEL, oracle fusion middleware, web service monitoring

Procedia PDF Downloads 476
1488 Kidnapping of Migrants by Drug Cartels in Mexico as a New Trend in Contemporary Slavery

Authors: Itze Coronel Salomon

Abstract:

The rise of organized crime and violence related to drug cartels in Mexico has created serious challenges for the authorities to provide security to those who live within its borders. However, to achieve a significant improvement in security is absolute respect for fundamental human rights by the authorities. Irregular migrants in Mexico are at serious risk of abuse. Research by Amnesty International as well as reports of the NHRC (National Human Rights) in Mexico, have indicated the major humanitarian crisis faced by thousands of migrants traveling in the shadows. However, the true extent of the problem remains invisible to the general population. The fact that federal and state governments leave no proper record of abuse and do not publish reliable data contributes to ignorance and misinformation, often spread by the media that portray migrants as the source of crime rather than their victims. Discrimination and intolerance against irregular migrants can generate greater hostility and exclusion. According to the modus operandi that has been recorded criminal organizations and criminal groups linked to drug trafficking structures deprive migrants of their liberty for forced labor and illegal activities related to drug trafficking, even some have been kidnapped for be trained as murderers . If the victim or their family cannot pay the ransom, the kidnapped person may suffer torture, mutilation and amputation of limbs or death. Migrant women are victims of sexual abuse during her abduction as well. In 2011, at least 177 bodies were identified in the largest mass grave found in Mexico, located in the town of San Fernando, in the border state of Tamaulipas, most of the victims were killed by blunt instruments, and most seemed to be immigrants and travelers passing through the country. With dozens of small graves discovered in northern Mexico, this may suggest a change in tactics between organized crime groups to the different means of obtaining revenue and reduce murder profile methods. Competition and conflict over territorial control drug trafficking can provide strong incentives for organized crime groups send signals of violence to the authorities and rival groups. However, as some Mexican organized crime groups are increasingly looking to take advantage of income and vulnerable groups, such as Central American migrants seem less interested in advertising his work to authorities and others, and more interested in evading detection and confrontation. This paper pretends to analyze the introduction of this new trend of kidnapping migrants for forced labors by drug cartels in Mexico into the forms of contemporary slavery and its implications.

Keywords: international law, migration, transnational organized crime

Procedia PDF Downloads 410
1487 Artificial Intelligence and Governance in Relevance to Satellites in Space

Authors: Anwesha Pathak

Abstract:

With the increasing number of satellites and space debris, space traffic management (STM) becomes crucial. AI can aid in STM by predicting and preventing potential collisions, optimizing satellite trajectories, and managing orbital slots. Governance frameworks need to address the integration of AI algorithms in STM to ensure safe and sustainable satellite activities. AI and governance play significant roles in the context of satellite activities in space. Artificial intelligence (AI) technologies, such as machine learning and computer vision, can be utilized to process vast amounts of data received from satellites. AI algorithms can analyse satellite imagery, detect patterns, and extract valuable information for applications like weather forecasting, urban planning, agriculture, disaster management, and environmental monitoring. AI can assist in automating and optimizing satellite operations. Autonomous decision-making systems can be developed using AI to handle routine tasks like orbit control, collision avoidance, and antenna pointing. These systems can improve efficiency, reduce human error, and enable real-time responsiveness in satellite operations. AI technologies can be leveraged to enhance the security of satellite systems. AI algorithms can analyze satellite telemetry data to detect anomalies, identify potential cyber threats, and mitigate vulnerabilities. Governance frameworks should encompass regulations and standards for securing satellite systems against cyberattacks and ensuring data privacy. AI can optimize resource allocation and utilization in satellite constellations. By analyzing user demands, traffic patterns, and satellite performance data, AI algorithms can dynamically adjust the deployment and routing of satellites to maximize coverage and minimize latency. Governance frameworks need to address fair and efficient resource allocation among satellite operators to avoid monopolistic practices. Satellite activities involve multiple countries and organizations. Governance frameworks should encourage international cooperation, information sharing, and standardization to address common challenges, ensure interoperability, and prevent conflicts. AI can facilitate cross-border collaborations by providing data analytics and decision support tools for shared satellite missions and data sharing initiatives. AI and governance are critical aspects of satellite activities in space. They enable efficient and secure operations, ensure responsible and ethical use of AI technologies, and promote international cooperation for the benefit of all stakeholders involved in the satellite industry.

Keywords: satellite, space debris, traffic, threats, cyber security.

Procedia PDF Downloads 65
1486 Zero Net Energy Communities and the Impacts to the Grid

Authors: Heidi von Korff

Abstract:

The electricity grid is changing in terms of flexibility. Distributed generation (DG) policy is being discussed worldwide and implemented. Developers and utilities are seeking a pathway towards Zero Net Energy (ZNE) communities and the interconnection to the distribution grid. Using the VISDOM platform for establishing a method for managing and monitoring energy consumption loads of ZNE communities as a capacity resource for the grid. Reductions in greenhouse gas emissions and energy security are primary policy drivers for incorporating high-performance energy standards and sustainability practices in residential households, such as a market transformation of ZNE and nearly ZNE (nZNE) communities. This research investigates how load data impacts ZNE, to see if there is a correlation to the daily load variations in a single ZNE home. Case studies will include a ZNE community in California and a nearly ZNE community (All – Electric) in the Netherlands, which both are in measurement and verification (M&V) phases and connected to the grid for simulations of methods.

Keywords: zero net energy, distributed generation, renewable energy, zero net energy community

Procedia PDF Downloads 302
1485 Strategic Workplace Security: The Role of Malware and the Threat of Internal Vulnerability

Authors: Modesta E. Ezema, Christopher C. Ezema, Christian C. Ugwu, Udoka F. Eze, Florence M. Babalola

Abstract:

Some employees knowingly or unknowingly contribute to loss of data and also expose data to threat in the process of getting their jobs done. Many organizations today are faced with the challenges of how to secure their data as cyber criminals constantly devise new ways of attacking the organization’s secret data. However, this paper enlists the latest strategies that must be put in place in order to protect these important data from being attacked in a collaborative work place. It also introduces us to Advanced Persistent Threats (APTs) and how it works. The empirical study was conducted to collect data from the employee in data centers on how data could be protected from malicious codes and cyber criminals and their responses are highly considered to help checkmate the activities of malicious code and cyber criminals in our work places.

Keywords: data, employee, malware, work place

Procedia PDF Downloads 378
1484 Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

Abstract:

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: IDS, DDoS, MLP, KDD

Procedia PDF Downloads 232
1483 The Impact of Artificial Intelligence on Human Developments Obligations and Theories

Authors: Seham Elia Moussa Shenouda

Abstract:

The relationship between development and human rights has long been the subject of academic debate. To understand the dynamics between these two concepts, various principles are adopted, from the right to development to development-based human rights. Despite the initiatives taken, the relationship between development and human rights remains unclear. However, the overlap between these two views and the idea that efforts should be made in the field of human rights have increased in recent years. It is then evaluated whether the right to sustainable development is acceptable or not. The article concludes that the principles of sustainable development are directly or indirectly recognized in various human rights instruments, which is a good answer to the question posed above. This book therefore cites regional and international human rights agreements such as , as well as the jurisprudence and interpretative guidelines of human rights institutions, to prove this hypothesis.

Keywords: sustainable development, human rights, the right to development, the human rights-based approach to development, environmental rights, economic development, social sustainability human rights protection, human rights violations, workers’ rights, justice, security

Procedia PDF Downloads 28
1482 Analysis of Unconditional Conservatism and Earnings Quality before and after the IFRS Adoption

Authors: Monica Santi, Evita Puspitasari

Abstract:

International Financial Reporting Standard (IFRS) has developed the principle based accounting standard. Based on this, IASB then eliminated the conservatism concept within accounting framework. Conservatism concept represents a prudent reaction to uncertainty to try to ensure that uncertainties and risk inherent in business situations are adequately considered. The conservatism concept has two ingredients: conditional conservatism or ex-post (news depending prudence) and unconditional conservatism or ex-ante (news-independent prudence). IFRS in substance disregards the unconditional conservatism because the unconditional conservatism can cause the understatement assets or overstated liabilities, and eventually the financial statement would be irrelevance since the information does not represent the real fact. Therefore, the IASB eliminate the conservatism concept. However, it does not decrease the practice of unconditional conservatism in the financial statement reporting. Therefore, we expected the earnings quality would be affected because of this situation, even though the IFRS implementation was expected to increase the earnings quality. The objective of this study was to provide empirical findings about the unconditional conservatism and the earnings quality before and after the IFRS adoption. The earnings per accrual measure were used as the proxy for the unconditional conservatism. If the earnings per accrual were negative (positive), it meant the company was classified as the conservative (not conservative). The earnings quality was defined as the ability of the earnings in reflecting the future earnings by considering the earnings persistence and stability. We used the earnings response coefficient (ERC) as the proxy for the earnings quality. ERC measured the extant of a security’s abnormal market return in response to the unexpected component of reporting earning of the firm issuing that security. The higher ERC indicated the higher earnings quality. The manufacturing companies listed in the Indonesian Stock Exchange (IDX) were used as the sample companies, and the 2009-2010 period was used to represent the condition before the IFRS adoption, and 2011-2013 was used to represent the condition after the IFRS adoption. Data was analyzed using the Mann-Whitney test and regression analysis. We used the firm size as the control variable with the consideration the firm size would affect the earnings quality of the company. This study had proved that the unconditional conservatism had not changed, either before and after the IFRS adoption period. However, we found the different findings for the earnings quality. The earnings quality had decreased after the IFRS adoption period. This empirical results implied that the earnings quality before the IFRS adoption was higher. This study also had found that the unconditional conservatism positively influenced the earnings quality insignificantly. The findings implied that the implementation of the IFRS had not decreased the unconditional conservatism practice and has not altered the earnings quality of the manufacturing company. Further, we found that the unconditional conservatism did not affect the earnings quality. Eventhough the empirical result shows that the unconditional conservatism gave positive influence to the earnings quality, but the influence was not significant. Thus, we concluded that the implementation of the IFRS did not increase the earnings quality.

Keywords: earnings quality, earnings response coefficient, IFRS Adoption, unconditional conservatism

Procedia PDF Downloads 256
1481 Effects of Roasting as Preservative Method on Food Value of the Runner Groundnuts, Arachis hypogaea

Authors: M. Y. Maila, H. P. Makhubele

Abstract:

Roasting is one of the oldest preservation method used in foods such as nuts and seeds. It is a process by which heat is applied to dry foodstuffs without the use of oil or water as a carrier. Groundnut seeds, also known as peanuts when sun dried or roasted, are among the oldest oil crops that are mostly consumed as a snack, after roasting in many parts of South Africa. However, roasting can denature proteins, destroy amino acids, decrease nutritive value and induce undesirable chemical changes in the final product. The aim of this study, therefore, was to evaluate the effect of various roasting times on the food value of the runner groundnut seeds. A constant temperature of 160 °C and various time-intervals (20, 30, 40, 50 and 60 min) were used for roasting groundnut seeds in an oven. Roasted groundnut seeds were then cooled and milled to flour. The milled sundried, raw groundnuts served as reference. The proximate analysis (moisture, energy and crude fats) was performed and the results were determined using standard methods. The antioxidant content was determined using HPLC. Mineral (cobalt, chromium, silicon and iron) contents were determined by first digesting the ash of sundried and roasted seed samples in 3M Hydrochloric acid and then determined by Atomic Absorption Spectrometry. All results were subjected to ANOVA through SAS software. Relative to the reference, roasting time significantly (p ≤ 0.05) reduced moisture (71%–88%), energy (74%) and crude fat (5%–64%) of the runner groundnut seeds, whereas the antioxidant content was significantly (p ≤ 0.05) increased (35%–72%) with increasing roasting time. Similarly, the tested mineral contents of the roasted runner groundnut seeds were also significantly (p ≤ 0.05) reduced at all roasting times: cobalt (21%–83%), chromium (48%–106%) and silicon (58%–77%). However, the iron content was significantly (p ≤ 0.05) unaffected. Generally, the tested runner groundnut seeds had higher food value in the raw state than in the roasted state, except for the antioxidant content. Moisture is a critical factor affecting the shelf life, texture and flavor of the final product. Loss of moisture ensures prolonged shelf life, which contribute to the stability of the roasted peanuts. Also, increased antioxidant content in roasted groundnuts is essential in other health-promoting compounds. In conclusion, the overall reduction in the proximate and mineral contents of the runner groundnuts seeds due to roasting is sufficient to suggest influences of roasting time on the food value of the final product and shelf life.

Keywords: dry roasting, legume, oil source, peanuts

Procedia PDF Downloads 278
1480 Household Energy Usage in Nigeria: Emerging Advances for Sustainable Development

Authors: O. A. Akinsanya

Abstract:

This paper presents the emerging trends in household energy usage in Nigeria for sustainable development. The paper relied on a direct appraisal of energy use in the residential sector and the use of a structured questionnaire to establish the usage pattern, energy management measures and emerging advances. The use of efficient appliances, retrofitting, smart building and smart attitude are some of the benefitting measures. The paper also identified smart building, prosumer activities, hybrid energy use, improved awareness, and solar stand-alone street/security lights as the trend and concluded that energy management strategies would result in a significant reduction in the monthly bills and peak loads as well as the total electricity consumption in Nigeria and therefore it is good for sustainable development.

Keywords: household, energy, trends, strategy, sustainable, Nigeria

Procedia PDF Downloads 60