Search results for: food security and nutrition
4488 Structural Stress of Hegemon’s Power Loss: A Pestle Analysis for Pacification and Security Policy Plan
Authors: Sehrish Qayyum
Abstract:
Active military power contention is shifting to economic and cyberwar to retain hegemony. Attuned Pestle analysis confirms that structural stress of hegemon’s power loss drives a containment approach towards caging actions. Ongoing diplomatic, asymmetric, proxy and direct wars are increasing stress hegemon’s power retention due to tangled military and economic alliances. It creates the condition of catalepsy with defective reflexive control which affects the core warfare operations. When one’s own power is doubted it gives power to one’s own doubt to ruin all planning either done with superlative cost-benefit analysis. Strategically calculated estimation of Hegemon’s power game since the early WWI to WWII, WWII-to Cold War and then to the current era in three chronological periods exposits that Thucydides’s trap became the reason for war broke out. Thirst for power is the demise of imagination and cooperation for better sense to prevail instead it drives ashes to dust. Pestle analysis is a wide array of evaluation from political and economic to legal dimensions of the state matters. It helps to develop the Pacification and Security Policy Plan (PSPP) to avoid hegemon’s structural stress of power loss in fact, in turn, creates an alliance with maximum amicable outputs. PSPP may serve to regulate and pause the hurricane of power clashes. PSPP along with a strategic work plan is based on Pestle analysis to deal with any conceivable war condition and approach for saving international peace. Getting tangled into self-imposed epistemic dilemmas results in regret that becomes the only option of performance. It is a generic application of probability tests to find the best possible options and conditions to develop PSPP for any adversity possible so far. Innovation in expertise begets innovation in planning and action-plan to serve as a rheostat approach to deal with any plausible power clash.Keywords: alliance, hegemon, pestle analysis, pacification and security policy plan, security
Procedia PDF Downloads 1044487 Self-Serving or Self-Effacing: An Analysis of the Zimbabwe-United Kingdom Diaspora`S Role in Human Rights Advocacy
Authors: J.T. Chivanga
Abstract:
This paper conceptualizes the significance of human rights activism by the Zimbabwean diaspora in the United Kingdom by analyzing how the diaspora advocates for the promotion of the rights of the people in Zimbabwe. It critiques the strategic essentialism theory that is used by the government of Zimbabwe as a basis to discredit the work of transnational advocacy groups. The research advances this position by articulating that the diaspora does not falsify nor simplify them to garner external support on the human rights situation in Zimbabwe. It establishes and shows the significance of transnational advocacy by articulating how the Zimbabwean diaspora addresses and brings to the attention of the international community human rights violations in Zimbabwe that would otherwise not have seen the light of day due to the absence of a conducive environment in that country that stifles the organization of protests under repressive laws such as the public order and security act of 2009.Keywords: strategic essentialism, transnational advocacy, public order and security act, Zimbabwe diaspora
Procedia PDF Downloads 2414486 Variance-Aware Routing and Authentication Scheme for Harvesting Data in Cloud-Centric Wireless Sensor Networks
Authors: Olakanmi Oladayo Olufemi, Bamifewe Olusegun James, Badmus Yaya Opeyemi, Adegoke Kayode
Abstract:
The wireless sensor network (WSN) has made a significant contribution to the emergence of various intelligent services or cloud-based applications. Most of the time, these data are stored on a cloud platform for efficient management and sharing among different services or users. However, the sensitivity of the data makes them prone to various confidentiality and performance-related attacks during and after harvesting. Various security schemes have been developed to ensure the integrity and confidentiality of the WSNs' data. However, their specificity towards particular attacks and the resource constraint and heterogeneity of WSNs make most of these schemes imperfect. In this paper, we propose a secure variance-aware routing and authentication scheme with two-tier verification to collect, share, and manage WSN data. The scheme is capable of classifying WSN into different subnets, detecting any attempt of wormhole and black hole attack during harvesting, and enforcing access control on the harvested data stored in the cloud. The results of the analysis showed that the proposed scheme has more security functionalities than other related schemes, solves most of the WSNs and cloud security issues, prevents wormhole and black hole attacks, identifies the attackers during data harvesting, and enforces access control on the harvested data stored in the cloud at low computational, storage, and communication overheads.Keywords: data block, heterogeneous IoT network, data harvesting, wormhole attack, blackhole attack access control
Procedia PDF Downloads 834485 Enhancing Email Security: A Multi-Layered Defense Strategy Approach and an AI-Powered Model for Identifying and Mitigating Phishing Attacks
Authors: Anastasios Papathanasiou, George Liontos, Athanasios Katsouras, Vasiliki Liagkou, Euripides Glavas
Abstract:
Email remains a crucial communication tool due to its efficiency, accessibility and cost-effectiveness, enabling rapid information exchange across global networks. However, the global adoption of email has also made it a prime target for cyber threats, including phishing, malware and Business Email Compromise (BEC) attacks, which exploit its integral role in personal and professional realms in order to perform fraud and data breaches. To combat these threats, this research advocates for a multi-layered defense strategy incorporating advanced technological tools such as anti-spam and anti-malware software, machine learning algorithms and authentication protocols. Moreover, we developed an artificial intelligence model specifically designed to analyze email headers and assess their security status. This AI-driven model examines various components of email headers, such as "From" addresses, ‘Received’ paths and the integrity of SPF, DKIM and DMARC records. Upon analysis, it generates comprehensive reports that indicate whether an email is likely to be malicious or benign. This capability empowers users to identify potentially dangerous emails promptly, enhancing their ability to avoid phishing attacks, malware infections and other cyber threats.Keywords: email security, artificial intelligence, header analysis, threat detection, phishing, DMARC, DKIM, SPF, ai model
Procedia PDF Downloads 554484 Microbial Quality Assessment of Indian White Shrimp, Penaeus Indicus from Southwest Bangladesh
Authors: Saima Sharif Nilla, Mahmudur Rahman Khan, Anisur Rahman Khan, Ghulam Mustafa1
Abstract:
The microbial quality of Indian white shrimp (Peneaus indicus) from Bagerhat, Khulna and Satkhira of southwest Bangladesh was assessed where the parameters varied with different sources and the quality was found to be poor for Satkhira shrimp samples. Shrimp samples in fresh condition were collected to perform the microbial assessment and 10 pathogenic isolates for antibiotic sensitivity test to 12 antibiotics. The results show that total bacterial count of all the samples were beyond the acceptable limit 105 cfu/g. In case of total coliform and E. coli density, no substantial difference (p<0.5) was found between the different shrimp samples from different districts and also high quantity of TC exceeding the limit (>102 cfu/g) proves the poor quality of shrimp. The FC abundance found in shrimps of Bagerhat and Satkhira was similar and significantly higher (p<0.5) than that of Khulna samples. No significant difference (p<0.5) was found among the high density of Salmonella-Shigella, Vibrio spp., and Staphylococcus spp. of the shrimp samples from the source places. In case of antibiotic sensitivity patterns, all of them were resistant to ampicillin, Penicillin and sensitive to kanamycin. Most of the isolates were frequently sensitive to ciprofloxacin and streptomycin in the sensitivity test. In case of nutritional composition, no significant difference (t-test, p<0.05) was found among protein, lipid, moisture and ash contents of shrimp samples. The findings prove that shrimp under this study was more or less contaminated and samples from Satkhira were highly privileged with food borne pathogens which confirmed the unhygienic condition of the shrimp farms as well as the presence of antibiotic resistance bacteria in shrimp fish supposed to threat food safety and deteriorate the export quality.Keywords: food borne pathogens, satkhira, penaeus indicus, antibiotic sensitivity, southwest Bangladesh, food safety
Procedia PDF Downloads 7044483 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain
Authors: Tarun Chand, Michael Jurczyk
Abstract:
With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development
Procedia PDF Downloads 654482 Extraction and Encapsulation of Carotenoids from Carrot
Authors: Gordana Ćetković, Sanja Podunavac-Kuzmanović, Jasna Čanadanović-Brunet, Vesna Tumbas Šaponjac, Vanja Šeregelj, Jelena Vulić, Slađana Stajčić
Abstract:
The color of food is one of the decisive factors for consumers. Potential toxicity of artificial food colorants has led to the consumers' preference for natural products over products with artificial colors. Natural pigments have many bioactive functions, such as antioxidant, provitamin and many other. Having this in mind, the acceptability of natural colorants by the consumers is much higher. Being present in all photosynthetic plant tissues carotenoids are probably most widespread pigments in nature. Carrot (Daucus carota) is a good source of functional food components. Carrot is especially rich in carotenoids, mainly α- and β-carotene and lutein. For this study, carrot was extracted using classical extraction with hexane and ethyl acetate, as well as supercritical CO₂ extraction. The extraction efficiency was evaluated by estimation of carotenoid yield determined spectrophotometrically. Classical extraction using hexane (18.27 mg β-carotene/100 g DM) was the most efficient method for isolation of carotenoids, compared to ethyl acetate classical extraction (15.73 mg β-carotene/100 g DM) and supercritical CO₂ extraction (0.19 mg β-carotene/100 g DM). Three carrot extracts were tested in terms of antioxidant activity using DPPH and reducing power assay as well. Surprisingly, ethyl acetate extract had the best antioxidant activity on DPPH radicals (AADPPH=120.07 μmol TE/100 g) while hexane extract showed the best reducing power (RP=1494.97 μmol TE/100 g). Hexane extract was chosen as the most potent source of carotenoids and was encapsulated in whey protein by freeze-drying. Carotenoid encapsulation efficiency was found to be high (89.33%). Based on our results it can be concluded that carotenoids from carrot can be efficiently extracted using hexane and classical extraction method. This extract has the potential to be applied in encapsulated form due to high encapsulation efficiency and coloring capacity. Therefore it can be used for dietary supplements development and food fortification.Keywords: carotenoids, carrot, extraction, encapsulation
Procedia PDF Downloads 2704481 Identification of a Novel Maize Dehydration-Responsive Gene with a Potential Role in Improving Maize Drought Tolerance
Authors: Kyle Phillips, Ndiko Ludidi
Abstract:
Global climate change has resulted in altered rainfall patterns, which has resulted in annual losses in maize crop yields due to drought. Therefore it is important to produce maize cultivars that are more drought-tolerant, which is not an easily accomplished task as plants have a plethora of physical and biochemical adaptation methods. One such mechanism is the drought-induced expression of enzymatic and non-enzymatic proteins which assist plants to resist the effects of drought on their growth and development. One of these proteins is AtRD22 which has been identified in Arabidopsis thaliana. Using an in silico approach, a maize protein with 48% sequence homology to AtRD22 has been identified. This protein appears to be localized in the extracellular matrix, similarly to AtRD22. Promoter analysis of the encoding gene reveals cis-acting elements suggestive of induction of the gene’s expression by abscisic acid (ABA). Semi-quantitative transcriptomic analysis of the putative maize RD22 has revealed an increase in transcript levels after the exposure to drought. Current work elucidates the effect of up-regulation and silencing of the maize RD22 gene on the tolerance of maize to drought. The potential role of the maize RD22 gene in maize drought tolerance can be used as a tool to improve food security.Keywords: abscisic acid, drought-responsive cis-acting elements, maize drought tolerance, RD22
Procedia PDF Downloads 4634480 Application of Active Chitosan Coating Incorporated with Spirulina Extract as a Potential Food Packaging Material for Enhancing Quality and Shelf Life of Shrimp
Authors: Rafik Balti, Nourhene Zayoud, Mohamed Ben Mansour, Abdellah Arhaliass, Anthony Masse
Abstract:
Application of edible films and coatings with natural active compounds for enhancing storage stability of food products is a promising active packaging approach. Shrimp are generally known as valuable seafood products around the world because of their delicacy and good nutritional. However, shrimp is highly vulnerable to quality deterioration associated with biochemical, microbiological or physical changes during postmortem storage, which results in the limited shelf life of the product. Chitosan is considered as a functional packaging component for maintaining the quality and increasing the shelf life of perishable foods. The present study was conducted to evaluate edible coating of crab chitosan containing variable levels of ethanolic extract of Spirulina on microbiological (mesophilic aerobic, psychrotrophic, lactic acid bacteria, and enterobacteriacea), chemical (pH, TVB-N, TMA-N, PV, TBARS) and sensory (odor, color, texture, taste, and overall acceptance) properties of shrimp during refrigerated storage. Also, textural and color characteristics of coated shrimp were performed. According to the obtained results, crab chitosan in combination with Spirulina extract was very effective in order to extend the shelf life of shrimp during storage in refrigerated condition.Keywords: food packaging, chitosan, spirulina extract, white shrimp, shelf life
Procedia PDF Downloads 2084479 Emergence of Fluoroquinolone Resistance in Pigs, Nigeria
Authors: Igbakura I. Luga, Alex A. Adikwu
Abstract:
A comparison of resistance to quinolones was carried out on isolates of Shiga toxin-producing Escherichia coliO157:H7 from cattle and mecA and nuc genes harbouring Staphylococcus aureus from pigs. The isolates were separately tested in the first and current decades of the 21st century. The objective was to demonstrate the dissemination of resistance to this frontline class of antibiotic by bacteria from food animals and bring to the limelight the spread of antibiotic resistance in Nigeria. A total of 10 isolates of the E. coli O157:H7 and 9 of mecA and nuc genes harbouring S. aureus were obtained following isolation, biochemical testing, and serological identification using the Remel Wellcolex E. coli O157:H7 test. Shiga toxin-production screening in the E. coli O157:H7 using the verotoxin E. coli reverse passive latex agglutination (VTEC-RPLA) test; and molecular identification of the mecA and nuc genes in S. aureus. Detection of the mecA and nuc genes were carried out using the protocol by the Danish Technical University (DTU) using the following primers mecA-1:5'-GGGATCATAGCGTCATTATTC-3', mecA-2: 5'-AACGATTGTGACACGATAGCC-3', nuc-1: 5'-TCAGCAAATGCATCACAAACAG-3', nuc-2: 5'-CGTAAATGCACTTGCTTCAGG-3' for the mecA and nuc genes, respectively. The nuc genes confirm the S. aureus isolates and the mecA genes as being methicillin-resistant and so pathogenic to man. The fluoroquinolones used in the antibiotic resistance testing were norfloxacin (10 µg) and ciprofloxacin (5 µg) in the E. coli O157:H7 isolates and ciprofloxacin (5 µg) in the S. aureus isolates. Susceptibility was tested using the disk diffusion method on Muller-Hinton agar. Fluoroquinolone resistance was not detected from isolates of E. coli O157:H7 from cattle. However, 44% (4/9) of the S. aureus were resistant to ciprofloxacin. Resistance of up to 44% in isolates of mecA and nuc genes harbouring S. aureus is a compelling evidence for the rapid spread of antibiotic resistance from bacteria in food animals from Nigeria. Ciprofloxacin is the drug of choice for the treatment of Typhoid fever, therefore widespread resistance to it in pathogenic bacteria is of great public health significance. The study concludes that antibiotic resistance in bacteria from food animals is on the increase in Nigeria. The National Food and Drug Administration and Control (NAFDAC) agency in Nigeria should implement the World Health Organization (WHO) global action plan on antimicrobial resistance. A good starting point can be coordinating the WHO, Office of International Epizootics (OIE), Food and Agricultural Organization (FAO) tripartite draft antimicrobial resistance monitoring and evaluation (M&E) framework in Nigeria.Keywords: Fluoroquinolone, Nigeria, resistance, Staphylococcus aureus
Procedia PDF Downloads 4564478 Biotechnological Interventions for Crop Improvement in Nutricereal Pearl Millet
Authors: Supriya Ambawat, Subaran Singh, C. Tara Satyavathi, B. S. Rajpurohit, Ummed Singh, Balraj Singh
Abstract:
Pearl millet [Pennisetum glaucum (L.) R. Br.] is an important staple food of the arid and semiarid tropical regions of Asia, Africa, and Latin America. It is rightly termed as nutricereal as it has high nutrition value and a good source of carbohydrate, protein, fat, ash, dietary fiber, potassium, magnesium, iron, zinc, etc. Pearl millet has low prolamine fraction and is gluten free which is useful for people having a gluten allergy. It has several health benefits like reduction in blood pressure, thyroid, diabe¬tes, cardiovascular and celiac diseases but its direct consumption as food has significantly declined due to several reasons. Keeping this in view, it is important to reorient the ef¬forts to generate demand through value-addition and quality improvement and create awareness on the nutritional merits of pearl millet. In India, through Indian Council of Agricultural Research-All India Coordinated Research Project on Pearl millet, multilocational coordinated trials for developed hybrids were conducted at various centers. The gene banks of pearl millet contain varieties with high levels of iron and zinc which were used to produce new pearl millet varieties with elevated iron levels bred with the high‐yielding varieties. Thus, using breeding approaches and biochemical analysis, a total of 167 hybrids and 61 varieties were identified and released for cultivation in different agro-ecological zones of the country which also includes some biofortified hybrids rich in Fe and Zn. Further, using several biotechnological interventions such as molecular markers, next-generation sequencing (NGS), association mapping, nested association mapping (NAM), MAGIC populations, genome editing, genotyping by sequencing (GBS), genome wide association studies (GWAS) advancement in millet improvement has become possible by identifying and tagging of genes underlying a trait in the genome. Using DArT markers very high density linkage maps were constructed for pearl millet. Improved HHB67 has been released using marker assisted selection (MAS) strategies, and genomic tools were used to identify Fe-Zn Quantitative Trait Loci (QTL). The draft genome sequence of millet has also opened various ways to explore pearl millet. Further, genomic positions of significantly associated simple sequence repeat (SSR) markers with iron and zinc content in the consensus map is being identified and research is in progress towards mapping QTLs for flour rancidity. The sequence information is being used to explore genes and enzymatic pathways responsible for rancidity of flour. Thus, development and application of several biotechnological approaches along with biofortification can accelerate the genetic gain targets for pearl millet improvement and help improve its quality.Keywords: Biotechnological approaches, genomic tools, malnutrition, MAS, nutricereal, pearl millet, sequencing.
Procedia PDF Downloads 1844477 Characteristics and Prevalence of Anaemia among Mothers and Young Children in Rural Uganda
Authors: Pamela E. Mukaire
Abstract:
Anemia and chronic energy deficiency are significant manifestations of poor nutritional health. Anaemia and nutritional status screening are practical ways for assessing the prevalence of iron deficiency anemia in the food insecure populations with large groups of childbearing women and children. The objective of the study was to assess anemia prevalence and other clinical manifestations of malnutrition among pairs of mothers and young children in rural Uganda. This community cross-sectional study used consecutive sampling to select 214 mothers and 214 children for the study. Data was generated using structured questionnaire, anthropometric measurements and on site analysis for anemia. Bivariable and multivariable analyses were used to assess the effect of different factors on anaemia. Of the 214 mothers, 54.2% were 25-34 years of age, 76.7% unmarried, 63% low income, and 55% had more than four children. Of the 214 children, 57% were female, 50% between 1 to 3 years of age and 35% under one year, and. Overall, 38% of the households had more 4 children under the age of 12. The prevalence of anemia was 48% for mothers and 72% for children; 20.6% of mothers had moderate to severe chronic energy deficiency, 39% had moderately-severe anaemia (10 to 7.1 g/dL). Among children, 53% had moderately-severe anaemia, and 18.2% had severe anaemia. Parity X2 =20, p < .037, number of children under 12 years living in a household X2 =10, p < .015, and child’s gender X2 =6.5, p < .038, had a significant relationship with maternal anaemia. There was a significant relationship between household income X2 =10, p < .005, marital status X2 =9, p < .011, owing a piece of land X2 =18, p < .000, owing home X2 =7, p < .036, and anaemia in children. The prevalence of anemia was high in both mothers and children. Income, marital status, owing a piece of land, owing home, number of children under age 12 in a household were associated with anaemia. Hence, efforts should be made for early diagnosis and management of anaemia deficiencies with special emphasis on those households with large number of children under age 12.Keywords: anemia, maternal-child, nutrition, rural population
Procedia PDF Downloads 2814476 Detection of Mustard Traces in Food by an Official Food Safety Laboratory
Authors: Clara Tramuta, Lucia Decastelli, Elisa Barcucci, Sandra Fragassi, Samantha Lupi, Enrico Arletti, Melissa Bizzarri, Daniela Manila Bianchi
Abstract:
Introdution: Food allergies occurs, in the Western World, 2% of adults and up to 8% of children. The protection of allergic consumers is guaranted, in Eurrope, by Regulation (EU) No 1169/2011 of the European Parliament which governs the consumer's right to information and identifies 14 food allergens to be mandatory indicated on the label. Among these, mustard is a popular spice added to enhance the flavour and taste of foods. It is frequently present as an ingredient in spice blends, marinades, salad dressings, sausages, and other products. Hypersensitivity to mustard is a public health problem since the ingestion of even low amounts can trigger severe allergic reactions. In order to protect the allergic consumer, high performance methods are required for the detection of allergenic ingredients. Food safety laboratories rely on validated methods that detect hidden allergens in food to ensure the safety and health of allergic consumers. Here we present the test results for the validation and accreditation of a Real time PCR assay (RT-PCR: SPECIALfinder MC Mustard, Generon), for the detection of mustard traces in food. Materials and Methods. The method was tested on five classes of food matrices: bakery and pastry products (chocolate cookies), meats (ragù), ready-to-eat (mixed salad), dairy products (yogurt), grains, and milling products (rice and barley flour). Blank samples were spiked starting with the mustard samples (Sinapis Alba), lyophilized and stored at -18 °C, at a concentration of 1000 ppm. Serial dilutions were then prepared to a final concentration of 0.5 ppm, using the DNA extracted by ION Force FAST (Generon) from the blank samples. The Real Time PCR reaction was performed by RT-PCR SPECIALfinder MC Mustard (Generon), using CFX96 System (BioRad). Results. Real Time PCR showed a limit of detection (LOD) of 0.5 ppm in grains and milling products, ready-to-eat, meats, bakery, pastry products, and dairy products (range Ct 25-34). To determine the exclusivity parameter of the method, the ragù matrix was contaminated with Prunus dulcis (almonds), peanut (Arachis hypogaea), Glycine max (soy), Apium graveolens (celery), Allium cepa (onion), Pisum sativum (peas), Daucus carota (carrots), and Theobroma cacao (cocoa) and no cross-reactions were observed. Discussion. In terms of sensitivity, the Real Time PCR confirmed, even in complex matrix, a LOD of 0.5 ppm in five classes of food matrices tested; these values are compatible with the current regulatory situation that does not consider, at international level, to establish a quantitative criterion for the allergen considered in this study. The Real Time PCR SPECIALfinder kit for the detection of mustard proved to be easy to use and particularly appreciated for the rapid response times considering that the amplification and detection phase has a duration of less than 50 minutes. Method accuracy was rated satisfactory for sensitivity (100%) and specificity (100%) and was fully validated and accreditated. It was found adequate for the needs of the laboratory as it met the purpose for which it was applied. This study was funded in part within a project of the Italian Ministry of Health (IZS PLV 02/19 RC).Keywords: allergens, food, mustard, real time PCR
Procedia PDF Downloads 1664475 Judicial Review of Indonesia's Position as the First Archipelagic State to implement the Traffic Separation Scheme to Establish Maritime Safety and Security
Authors: Rosmini Yanti, Safira Aviolita, Marsetio
Abstract:
Indonesia has several straits that are very important as a shipping lane, including the Sunda Strait and the Lombok Strait, which are the part of the Indonesian Archipelagic Sea Lane (IASL). An increase in traffic on the Marine Archipelago makes the task of monitoring sea routes increasingly difficult. Indonesia has proposed the establishment of a Traffic Separation Scheme (TSS) in the Sunda Strait and the Lombok Strait and the country now has the right to be able to conceptualize the TSS as well as the obligation to regulate it. Indonesia has the right to maintain national safety and sovereignty. In setting the TSS, Indonesia needs to issue national regulations that are in accordance with international law and the general provisions of the IMO (International Maritime Organization) can then be used as guidelines for maritime safety and security in the Sunda Strait and the Lombok Strait. The research method used is a qualitative method with the concept of linguistic and visual data collection. The source of the data is the analysis of documents and regulations. The results show that the determination of TSS was justified by International Law, in accordance with article 22, article 41, and article 53 of the United Nations Convention on the Law of the Sea (UNCLOS) 1982. The determination of TSS by the Indonesian government would be in accordance with COLREG (International Convention on Preventing Collisions at Sea) 10, which has been designed to follow IASL. Thus, TSS can provide a function as a safety and monitoring medium to minimize ship accidents or collisions, including the warship and aircraft of other countries that cross the IASL.Keywords: archipelago state, maritime law, maritime security, traffic separation scheme
Procedia PDF Downloads 1274474 New Teaching Tools for a Modern Representation of Chemical Bond in the Course of Food Science
Authors: Nicola G. G. Cecca
Abstract:
In Italian IPSSEOAs, high schools that give a vocational education to students that will work in the field of Enogastronomy and Hotel Management, the course of Food Science allows the students to start and see food as a mixture of substances that they will transform during their profession. These substances are characterized not only by a chemical composition but also by a molecular structure that makes them nutritionally active. But the increasing number of new products proposed by Food Industry, the modern techniques of production and transformation, the innovative preparations required by customers have made many information reported in the most wide spread Food Science textbooks not up-to-date or too poor for the people who will work in catering sector. Often Authors offer information aged to Bohr’s Atomic Model and to the ‘Octet Rule’ proposed by G.N. Lewis to describe the Chemical Bond, without giving any reference to new as Orbital Atomic Model and Molecular Orbital Theory that, in the meantime, start to be old themselves. Furthermore, this antiquated information precludes an easy understanding of a wide range of properties of nutritive substances and many reactions in which the food constituents are involved. In this paper, our attention is pointed out to use GEOMAG™ to represent the dynamics with which the chemical bond is formed during the synthesis of the molecules. GEOMAG™ is a toy, produced by the Swiss Company Geomagword S.A., pointed to stimulate in children, aged between 6-10 years, their fantasy and their handling ability and constituted by metallic spheres and metallic magnetic bars coated by coloured plastic materials. The simulation carried out with GEOMAG™ is based on the similitude existing between the Coulomb’s force and the magnetic attraction’s force and in particular between the formulae with which they are calculated. The electrostatic force (F in Newton) that allows the formation of the chemical bond can be calculated by mean Fc = kc q1 q2/d2 where: q1 e q2 are the charge of particles [in Coulomb], d is the distance between the particles [in meters] and kc is the Coulomb’s constant. It is surprising to observe that the attraction’s force (Fm) acting between the magnetic extremities of GEOMAG™ used to simulate the chemical bond can be calculated in the same way by using the formula Fm = km m1 m2/d2 where: m1 e m2 represent the strength of the poles [A•m], d is the distance between the particles [m], km = μ/4π in which μ is the magnetic permeability of medium [N•A-2]. The magnetic attraction can be tested by students by trying to keep the magnetic elements of GEOMAG™ separate by hands or trying to measure by mean an appropriate dynamometric system. Furthermore, by using a dynamometric system to measure the magnetic attraction between the GEOMAG™ elements is possible draw a graphic F=f(d) to verify that the curve obtained during the simulation is very similar to that one hypnotized, around the 1920’s by Linus Pauling to describe the formation of H2+ in according with Molecular Orbital Theory.Keywords: chemical bond, molecular orbital theory, magnetic attraction force, GEOMAG™
Procedia PDF Downloads 2674473 Analysis of Trends and Challenges of Using Renewable Biomass for Bioplastics
Authors: Namasivayam Navaranjan, Eric Dimla
Abstract:
The world needs more quality food, shelter and transportation to meet the demands of growing population and improving living standard of those who currently live below the poverty line. Materials are essential commodities for various applications including food and pharmaceutical packaging, building and automobile. Petroleum based plastics are widely used materials amongst others for these applications and their demand is expected to increase. Use of plastics has environment related issues because considerable amount of plastic used worldwide is disposed in landfills, where its resources are wasted, the material takes up valuable space and blights communities. Some countries have been implementing regulations and/or legislations to increase reuse, recycle, renew and remanufacture materials as well as to minimise the use of non-environmentally friendly materials such as petroleum plastics. However, issue of material waste is still a concern in the countries who have low environmental regulations. Development of materials, mostly bioplastics from renewable biomass resources has become popular in the last decade. It is widely believed that the potential for up to 90% substitution of total plastics consumption by bioplastics is technically possible. The global demand for bioplastics is estimated to be approximately six times larger than in 2010. Recently, standard polymers like polyethylene (PE), polypropylene (PP), Polyvinyl Chloride (PVC) or Polyethylene terephthalate (PET), but also high-performance polymers such as polyamides or polyesters have been totally or partially substituted by their renewable equivalents. An example is Polylactide (PLA) being used as a substitute in films and injection moulded products made of petroleum plastics, e.g. PET. The starting raw materials for bio-based materials are usually sugars or starches that are mostly derived from food resources, partially also recycled materials from food or wood processing. The risk in lower food availability by increasing price of basic grains as a result of competition with biomass-based product sectors for feedstock also needs to be considered for the future bioplastic production. Manufacturing of bioplastic materials is often still reliant upon petroleum as an energy and materials source. Life Cycle Assessment (LCA) of bioplastic products has being conducted to determine the sustainability of a production route. However, the accuracy of LCA depends on several factors and needs improvement. Low oil price and high production cost may also limit the technically possible growth of these plastics in the coming years.Keywords: bioplastics, plastics, renewable resources, biomass
Procedia PDF Downloads 3074472 Online Dietary Management System
Authors: Kyle Yatich Terik, Collins Oduor
Abstract:
The current healthcare system has made healthcare more accessible and efficient by the use of information technology through the implementation of computer algorithms that generate menus based on the diagnosis. While many systems just like these have been created over the years, their main objective is to help healthy individuals calculate their calorie intake and assist them by providing food selections based on a pre-specified calorie. That application has been proven to be useful in some ways, and they are not suitable for monitoring, planning, and managing hospital patients, especially that critical condition their dietary needs. The system also addresses a number of objectives, such as; the main objective is to be able to design, develop and implement an efficient, user-friendly as well as and interactive dietary management system. The specific design development objectives include developing a system that will facilitate a monitoring feature for users using graphs, developing a system that will provide system-generated reports to the users, dietitians, and system admins, design a system that allows users to measure their BMI (Body Mass Index), the system will also provide food template feature that will guide the user on a balanced diet plan. In order to develop the system, further research was carried out in Kenya, Nairobi County, using online questionnaires being the preferred research design approach. From the 44 respondents, one could create discussions such as the major challenges encountered from the manual dietary system, which include no easily accessible information of the calorie intake for food products, expensive to physically visit a dietitian to create a tailored diet plan. Conclusively, the system has the potential of improving the quality of life of people as a whole by providing a standard for healthy living and allowing individuals to have readily available knowledge through food templates that will guide people and allow users to create their own diet plans that consist of a balanced diet.Keywords: DMS, dietitian, patient, administrator
Procedia PDF Downloads 1594471 Eco-Ethology of Bees Visitors on Vicia faba L. var. Major (Fabaceae) in Algeria
Authors: L. Bendifallah, S. Doumandji, K. Louadi, S. Iserbyt, F. Acheuk
Abstract:
Due to their ecological key position and diversity, plant-bee relationships constitute excellent models to understand the processes of food specialisation. The purpose of this study is to define and identify the most important species of bees foraging broadbean flowers, we estimated morphological, phonological and behavioural features. We discuss the results by considering the food specialisation level of the visitor. In the studied populations (Algiers, Algeria), visiting bees belong to four different genus: Apis, Andrena, Eucera and Xylocopa. Eucera is foraging broad beans flowers during months of April, May. The genus Andrena and Xylocopa were found on weeds after the flowering period of beans. The two species have not a preferred type of vegetation compared to Eucera. The main pollinators were generalist bees such as Apis mellifera L. and Xylocopa pubescens Spinola (Apidae), and specialist bees such Eucera numida Lep. (Apidae). The results show that no one of the studied species, neither the specialist, nor the generalist ones, share adaptative morphological or behavioural features that may improve foraging on Vicia faba. However, there is a narrow synchronisation between the daily and yearly phenologies of Eucera numida and those of V. faba. This could be an adaptation of the specialist bee to its host plant. Thus, the food specialisation of Eucera numida, as for most specialist bees, would be more linked to its adapted phenology than to an adapted morphology.Keywords: Vicia faba, bees, pollinators, Algeria
Procedia PDF Downloads 3194470 Social Media Factor in Security Environment
Authors: Cetin Arslan, Senol Tayan
Abstract:
Social media is one of the most important and effective means of social interaction among people in which they create, share and exchange their ideas via photos, videos or voice messages. Although there are lots of communication tools, social media sites are the most prominent ones that allows the users articulate themselves in a matter of seconds all around the world with almost any expenses and thus, they became very popular and widespread after its emergence. As the usage of social media increases, it becomes an effective instrument in social matters. While it is possible to use social media to emphasize basic human rights and protest some failures of any government as in “Arab Spring”, it is also possible to spread propaganda and misinformation just to cause long lasting insurgency, upheaval, turmoil or disorder as an instrument of intervention to internal affairs and state sovereignty by some hostile groups or countries. It is certain that “social media” has positive effects on democracies letting people have chance to express themselves and to organize, but it is also obvious that the misuse of it, is very common that even a five-minute-long video can cause to wage a campaign against a country. Although it looks anti-democratic, when you consider the catastrophic effects of misuse of social media, it is a kind of area that serious precautions are to be taken without limiting democratic rights while allowing constant and perpetual share but preventing the criminal events. This article begins with the current developments in social media and gives some examples on misuse of it. Second part tries to put emphasize on the legal basis that can prevent criminal activities and the upheavals and insurgencies against state security. Last part makes comparison between democratic countries and international organizations’’ actions against such activities and proposes some further actions that are compatible with democratic norms.Keywords: democracy, disorder, security, Social Media
Procedia PDF Downloads 3664469 AI-Powered Models for Real-Time Fraud Detection in Financial Transactions to Improve Financial Security
Authors: Shanshan Zhu, Mohammad Nasim
Abstract:
Financial fraud continues to be a major threat to financial institutions across the world, causing colossal money losses and undermining public trust. Fraud prevention techniques, based on hard rules, have become ineffective due to evolving patterns of fraud in recent times. Against such a background, the present study probes into distinct methodologies that exploit emergent AI-driven techniques to further strengthen fraud detection. We would like to compare the performance of generative adversarial networks and graph neural networks with other popular techniques, like gradient boosting, random forests, and neural networks. To this end, we would recommend integrating all these state-of-the-art models into one robust, flexible, and smart system for real-time anomaly and fraud detection. To overcome the challenge, we designed synthetic data and then conducted pattern recognition and unsupervised and supervised learning analyses on the transaction data to identify which activities were fishy. With the use of actual financial statistics, we compare the performance of our model in accuracy, speed, and adaptability versus conventional models. The results of this study illustrate a strong signal and need to integrate state-of-the-art, AI-driven fraud detection solutions into frameworks that are highly relevant to the financial domain. It alerts one to the great urgency that banks and related financial institutions must rapidly implement these most advanced technologies to continue to have a high level of security.Keywords: AI-driven fraud detection, financial security, machine learning, anomaly detection, real-time fraud detection
Procedia PDF Downloads 404468 Dosimetric Application of α-Al2O3:C for Food Irradiation Using TA-OSL
Authors: A. Soni, D. R. Mishra, D. K. Koul
Abstract:
α-Al2O3:C has been reported to have deeper traps at 600°C and 900°C respectively. These traps have been reported to accessed at relatively earlier temperatures (122 and 322 °C respectively) using thermally assisted OSL (TA-OSL). In this work, the dose response α-Al2O3:C was studied in the dose range of 10Gy to 10kGy for its application in food irradiation in low ( upto 1kGy) and medium(1 to 10kGy) dose range. The TOL (Thermo-optically stimulated luminescence) measurements were carried out on RisØ TL/OSL, TL-DA-15 system having a blue light-emitting diodes (λ=470 ±30nm) stimulation source with power level set at the 90% of the maximum stimulation intensity for the blue LEDs (40 mW/cm2). The observations were carried on commercial α-Al2O3:C phosphor. The TOL experiments were carried out with number of active channel (300) and inactive channel (1). Using these settings, the sample is subjected to linear thermal heating and constant optical stimulation. The detection filter used in all observations was a Hoya U-340 (Ip ~ 340 nm, FWHM ~ 80 nm). Irradiation of the samples was carried out using a 90Sr/90Y β-source housed in the system. A heating rate of 2 °C/s was preferred in TL measurements so as to reduce the temperature lag between the heater plate and the samples. To study the dose response of deep traps of α-Al2O3:C, samples were irradiated with various dose ranging from 10 Gy to 10 kGy. For each set of dose, three samples were irradiated. In order to record the TA-OSL, initially TL was recorded up to a temperature of 400°C, to deplete the signal due to 185°C main dosimetry TL peak in α-Al2O3:C, which is also associated with the basic OSL traps. After taking TL readout, the sample was subsequently subjected to TOL measurement. As a result, two well-defined TA-OSL peaks at 121°C and at 232°C occur in time as well as temperature domain which are different from the main dosimetric TL peak which occurs at ~ 185°C. The linearity of the integrated TOL signal has been measured as a function of absorbed dose and found to be linear upto 10kGy. Thus, it can be used for low and intermediate dose range of for its application in food irradiation. The deep energy level defects of α-Al2O3:C phosphor can be accessed using TOL section of RisØ reader system.Keywords: α-Al2O3:C, deep traps, food irradiation, TA-OSL
Procedia PDF Downloads 2984467 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm
Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio
Abstract:
The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.Keywords: algorithm, CoAP, DoS, IoT, machine learning
Procedia PDF Downloads 794466 Home-Based Care with Follow-Up at Outpatient Unit or Community-Follow-Up Center with/without Food Supplementation and/or Psychosocial Stimulation of Children with Moderate Acute Malnutrition in Bangladesh
Authors: Md Iqbal Hossain, Tahmeed Ahmed, Kenneth H. Brown
Abstract:
Objective: To assess the effect of community-based follow up, with or without food-supplementation and/or psychosocial stimulation, as an alternative to current hospital-based follow-up of children with moderate-acute-malnutrition (WHZ < -2 to -3) (MAM). Design/methods: The study was conducted at the ICDDR,B Dhaka Hospital and in four urban primary health care centers of Dhaka, Bangladesh during 2005-2007. The efficacy of five different randomly assigned interventions was compared with respect to the rate of completion of follow-up, growth and morbidity in 227 MAM children aged 6-24 months who were initially treated at ICDDR,B for diarrhea and/or other morbidities. The interventions were: 1) Fortnightly follow-up care (FFC) at the ICDDR,B’s outpatient-unit, including growth monitoring, health education, and micro-nutrient supplementation (H-C, n=49). 2) FFC at community follow-up unit (CNFU) [established in the existing urban primary health-care centers close to the residence of the child] but received the same regimen as H-C (C-C, n=53). 3) As per C-C plus cereal-based supplementary food (SF) (C-SF, n=49). The SF packets were distributed on recruitment and at every visit in CNFU [@1 packet/day for 6–11 and 2 packets/day for 12-24 month old children. Each packet contained 20g toasted rice-powder, 10g toasted lentil-powder, 5g molasses, and 3g soy bean oil, to provide a total of ~ 150kcal with 11% energy from protein]. 4) As per C-C plus psychosocial stimulation (PS) (C-PS, n=43). PS consisted of child-stimulation and parental-counseling conducted by trained health workers. 5) As per C-C plus both SF+PS (C-SF+PS, n=33). Results: A total of 227children (48.5% female), with a mean ± SD age of 12.6 ±3.8 months, and WHZ of - 2.53±0.28 enrolled. Baseline characteristics did not differ by treatment group. The rate of spontaneous attendance at scheduled follow-up visits gradually decreased in all groups. Follow-up attendance and gain in weight and length were greater in groups C-SF, C-SF+PS, and C-PS than C-C, and these indicators were observed least in H-C. Children in the H-C group more often suffered from diarrhea (25 % vs. 4-9%) and fever (28% vs. 8-11%) than other groups (p < 0.05). Children who attended at least five of the total six scheduled follow-up visits gained more in weight (median: 0.86 vs. 0.62 kg, p=0.002), length (median: 2.4 vs. 2.0 cm, p=0.009) than those who attended fewer. Conclusions: Community-based service delivery, especially including supplementary food with or without psychosocial stimulation, permits better rehabilitation of children with MAM compared to current hospital outpatients-based care. By scaling the community-based follow-up including food supplementation with or without psychosocial stimulation, it will be possible to rehabilitate a greater number of MAM children in a better way.Keywords: community-based management, moderate acute malnutrition, psychosocial stimulation, supplementary food
Procedia PDF Downloads 4394465 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict
Authors: Zhao Xinlei
Abstract:
The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition
Procedia PDF Downloads 814464 Effects of Temperature and the Use of Bacteriocins on Cross-Contamination from Animal Source Food Processing: A Mathematical Model
Authors: Benjamin Castillo, Luis Pastenes, Fernando Cerdova
Abstract:
The contamination of food by microbial agents is a common problem in the industry, especially regarding the elaboration of animal source products. Incorrect manipulation of the machinery or on the raw materials can cause a decrease in production or an epidemiological outbreak due to intoxication. In order to improve food product quality, different methods have been used to reduce or, at least, to slow down the growth of the pathogens, especially deteriorated, infectious or toxigenic bacteria. These methods are usually carried out under low temperatures and short processing time (abiotic agents), along with the application of antibacterial substances, such as bacteriocins (biotic agents). This, in a controlled and efficient way that fulfills the purpose of bacterial control without damaging the final product. Therefore, the objective of the present study is to design a secondary mathematical model that allows the prediction of both the biotic and abiotic factor impact associated with animal source food processing. In order to accomplish this objective, the authors propose a three-dimensional differential equation model, whose components are: bacterial growth, release, production and artificial incorporation of bacteriocins and changes in pH levels of the medium. These three dimensions are constantly being influenced by the temperature of the medium. Secondly, this model adapts to an idealized situation of cross-contamination animal source food processing, with the study agents being both the animal product and the contact surface. Thirdly, the stochastic simulations and the parametric sensibility analysis are compared with referential data. The main results obtained from the analysis and simulations of the mathematical model were to discover that, although bacterial growth can be stopped in lower temperatures, even lower ones are needed to eradicate it. However, this can be not only expensive, but counterproductive as well in terms of the quality of the raw materials and, on the other hand, higher temperatures accelerate bacterial growth. In other aspects, the use and efficiency of bacteriocins are an effective alternative in the short and medium terms. Moreover, an indicator of bacterial growth is a low-level pH, since lots of deteriorating bacteria are lactic acids. Lastly, the processing times are a secondary agent of concern when the rest of the aforementioned agents are under control. Our main conclusion is that when acclimating a mathematical model within the context of the industrial process, it can generate new tools that predict bacterial contamination, the impact of bacterial inhibition, and processing method times. In addition, the mathematical modeling proposed logistic input of broad application, which can be replicated on non-meat food products, other pathogens or even on contamination by crossed contact of allergen foods.Keywords: bacteriocins, cross-contamination, mathematical model, temperature
Procedia PDF Downloads 1434463 Polysaccharide-Based Oral Delivery Systems for Site Specific Delivery in Gastro-Intestinal Tract
Authors: Kaarunya Sampathkumar, Say Chye Joachim Loo
Abstract:
Oral delivery is regarded as the facile method for the administration of active pharmaceutical ingredients (API) and drug carriers. In an initiative towards sustainable nanotechnology, an oral nano-delivery system has been developed that is made entirely of food-based materials and can also act as a site-specific delivery device depending on the stimulus encountered in different parts of the gastrointestinal tract (GIT). The delivery system has been fabricated from food grade polysaccharide materials like chitosan and starch through electrospraying technique without the use of any organic solvents. A nutraceutical extracted from an Indian medicinal plant, has been loaded into the nano carrier to test its efficacy in encapsulation and stimuli based release of the active ingredient. The release kinetics of the nutraceutical from the carrier was evaluated in simulated gastric, intestinal and colonic fluid and was found to be triggered both by the enzymes and the pH in each part of the intestinal tract depending on the polysaccharide being used. The toxicity of the nanoparticles on the intestinal epithelial cells was tested and found to be relatively safe for up to 24 hours at a concentration of 0.2 mg/mL with cellular uptake also being observed. The developed nano carrier thus serves as a promising delivery vehicle for targeted delivery to different parts of the GIT with the inherent conditions of the GIT itself acting as the stimulus. In addition, being fabricated from food grade materials, the carrier could be potentially used for the targeted delivery of nutrients through functional foods.Keywords: bioavailability, chitosan, delivery systems, encapsulation
Procedia PDF Downloads 2124462 Marketing Social Innovation: Finding Competitive Advantage in Social Enterprise Methodology
Authors: Ted Gournelos
Abstract:
Marketing approaches in practice and academic literature usually foreground the importance of product and brand awareness in strategy. Decisions emphasize justifications and promotions of existing projects, which has the unintended consequence of pushing marketing, public relations, and other communications to secondary strategies and tactics rather than as inherent pieces of organizational development. In other words, marketers implement what others have already decided. This is a challenge not only for the communications field, but also for the organizations themselves, since integrated communications employees are often the primary, if not the only, touchpoints for client/customer/user research and interaction. Organizations thus become increasingly out of touch, raising the risk of public or human resources crisis and decreasing the focus on opportunities for development and growth. This paper will discuss the potential for social entrepreneurship to refocus marketing and communications professionals on primary strategy, and suggest best practices for developing initiatives not only to impact marketing efforts themselves, but also the guiding organizational approaches to project management, human resources, corporate social responsibility, and research. It will provide a comparative analysis of social media marketing efforts conducted by food security non-governmental organizations from several countries, pointing out both flaws and areas of opportunity for integration with for-profit organizational strategy, and discuss the implications of descriptive, proactive, and interactive messaging.Keywords: social enterprise, strategy, innovation, social media
Procedia PDF Downloads 3194461 Cryptographic Resource Allocation Algorithm Based on Deep Reinforcement Learning
Authors: Xu Jie
Abstract:
As a key network security method, cryptographic services must fully cope with problems such as the wide variety of cryptographic algorithms, high concurrency requirements, random job crossovers, and instantaneous surges in workloads. Its complexity and dynamics also make it difficult for traditional static security policies to cope with the ever-changing situation. Cyber Threats and Environment. Traditional resource scheduling algorithms are inadequate when facing complex decision-making problems in dynamic environments. A network cryptographic resource allocation algorithm based on reinforcement learning is proposed, aiming to optimize task energy consumption, migration cost, and fitness of differentiated services (including user, data, and task security) by modeling the multi-job collaborative cryptographic service scheduling problem as a multi-objective optimized job flow scheduling problem and using a multi-agent reinforcement learning method, efficient scheduling and optimal configuration of cryptographic service resources are achieved. By introducing reinforcement learning, resource allocation strategies can be adjusted in real-time in a dynamic environment, improving resource utilization and achieving load balancing. Experimental results show that this algorithm has significant advantages in path planning length, system delay and network load balancing and effectively solves the problem of complex resource scheduling in cryptographic services.Keywords: cloud computing, cryptography on-demand service, reinforcement learning, workflow scheduling
Procedia PDF Downloads 104460 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities
Authors: Mehmet Kargaci
Abstract:
Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning
Procedia PDF Downloads 3334459 Effect of Improved Potato Varieties Adoption on Farmers' Income in Ethiopia: An Endogenous Switching Approach
Authors: Tsion Tekalegn
Abstract:
In Ethiopia, improved potato varieties are essential for food security, but smallholders' adoption of improved technologies limits their productivity. For this study, data was collected based on a structured questionnaire randomly collected from the 329 sample farmers (158 adopters and 171 non-adopters). We estimate the adoption of improved variety and causal impact using Endogenous Switching Regression (ESR), and a propensity Score Matching (PSM) was used to test the treatment effect. This helps us estimate the effect of improved potato variety on smallholder farmer income by controlling for the role of the selection bias problem stemming from both observed and unobserved heterogeneity. According to the result, key determinants influencing adoption include livestock ownership, access to extension services, and farming experience, which positively affect the likelihood of adopting improved varieties. In contrast, access to irrigation negatively correlates with adoption, suggesting that farmers with reliable water sources perceive less need for improved varieties. The ESR model result confirmed that improved potato variety adoption increases the smallholder farmer income with an estimated gain of 8.77%. Thus, to improve the potato variety of the farming households, the government should give due emphasis to potato production, and the extension services need to be strengthened.Keywords: adoption, improved potato varieties, endogenous switching regression, Ethiopia
Procedia PDF Downloads 32