Search results for: national food security strategy
10998 National Standard of Canada for Psychological Health and Safety in the Workplace: A Critical Review
Authors: Lucie Cote, Isabelle Rodier
Abstract:
The main objective of the research was to identify demonstrated mechanisms promoting psychological well-being and psychological health in the workplace, and to take a critical look at the 'National Standard of Canada for Psychological Health and Safety in the Workplace - Prevention, Promotion and Guidance to Staged Implementation (Standard)' as a mechanism to promote the psychological well-being and psychological health in the workplace. A review of the scientific literature was conducted, and a case study was done using data from a Canadian federal department. The following six mechanisms with an efficiency supported by most of the studies reviewed were identified: improving psychological well-being in the workplace literacy; strengthening the resilience of employees; creating an environmentally friendly and healthy workplace; promoting a healthy lifestyle; taking into account psychological characteristics in the drafting of job descriptions and tasks during the hiring process; and offering psychological self-care tools. The Standard offers several mechanisms beyond those previously identified and their implementation can be demanding. Research based on objective data and addressing the magnitude of the effect would be required.Keywords: critical review, national standard of Canada, psychological health, workplace
Procedia PDF Downloads 23710997 The Use of Classifiers in Image Analysis of Oil Wells Profiling Process and the Automatic Identification of Events
Authors: Jaqueline Maria Ribeiro Vieira
Abstract:
Different strategies and tools are available at the oil and gas industry for detecting and analyzing tension and possible fractures in borehole walls. Most of these techniques are based on manual observation of the captured borehole images. While this strategy may be possible and convenient with small images and few data, it may become difficult and suitable to errors when big databases of images must be treated. While the patterns may differ among the image area, depending on many characteristics (drilling strategy, rock components, rock strength, etc.). Previously we developed and proposed a novel strategy capable of detecting patterns at borehole images that may point to regions that have tension and breakout characteristics, based on segmented images. In this work we propose the inclusion of data-mining classification strategies in order to create a knowledge database of the segmented curves. These classifiers allow that, after some time using and manually pointing parts of borehole images that correspond to tension regions and breakout areas, the system will indicate and suggest automatically new candidate regions, with higher accuracy. We suggest the use of different classifiers methods, in order to achieve different knowledge data set configurations.Keywords: image segmentation, oil well visualization, classifiers, data-mining, visual computer
Procedia PDF Downloads 30210996 Application of Modulo-2 Arithmetic in Securing Communicated Messages throughout the Globe
Authors: Ejd Garba, Okike Benjamin
Abstract:
Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key.Keywords: arithmetic, cyber space, modulo-2, information security
Procedia PDF Downloads 31910995 Improving Security in Healthcare Applications Using Federated Learning System With Blockchain Technology
Authors: Aofan Liu, Qianqian Tan, Burra Venkata Durga Kumar
Abstract:
Data security is of the utmost importance in the healthcare area, as sensitive patient information is constantly sent around and analyzed by many different parties. The use of federated learning, which enables data to be evaluated locally on devices rather than being transferred to a central server, has emerged as a potential solution for protecting the privacy of user information. To protect against data breaches and unauthorized access, federated learning alone might not be adequate. In this context, the application of blockchain technology could provide the system extra protection. This study proposes a distributed federated learning system that is built on blockchain technology in order to enhance security in healthcare. This makes it possible for a wide variety of healthcare providers to work together on data analysis without raising concerns about the confidentiality of the data. The technical aspects of the system, including as the design and implementation of distributed learning algorithms, consensus mechanisms, and smart contracts, are also investigated as part of this process. The technique that was offered is a workable alternative that addresses concerns about the safety of healthcare while also fostering collaborative research and the interchange of data.Keywords: data privacy, distributed system, federated learning, machine learning
Procedia PDF Downloads 13010994 Shaabi in the City: On Modernizing Sounds and Exclusion in Egyptian Cities
Authors: Mariam Aref Mahmoud
Abstract:
After centuries of historical development, Egypt is no stranger to national identity frustrations. What may or may not be counted as this “national identity” becomes a source of contention. Today, after decades of neoliberal reform, Cairo has become the center of Egypt’s cultural debacle. At its heart, the Egyptian capital serves as Egypt’s extension into global capitalism, its flailing hope to become part of the modernized, cosmopolitan world. Yet, to converge into this image of cosmopolitanism, Cairo must silence the perceived un-modernized sounds, cultures, and spaces that arise from within its alleyways. Currently, the agitation surrounding shaabi music, particularly, that of mahraganat, places these contentions to the center of the modernization debates. This paper will discuss the process through which the conversations between modernization, space, and culture have taken place through a historical analysis of national identity formation under Egypt’s neoliberal regimes. Through this, the paper concludes that music becomes a spatial force through which public space, identity, and globalization must be contested. From these findings researchers can then analyze Cairo through not only its physical landscapes, but also its metaphysical features – such as the soundscape.Keywords: music, space, globalization, Cairo
Procedia PDF Downloads 10810993 Threat of Islamic State of Khorasan in Pakistan and Afghanistan Region: Impact on Regional Security
Authors: Irfan U. Din
Abstract:
The growing presence and operational capacity of Islamic State aka Daesh, which emerged in Pak-Afghan region in 2015, poses a serious threat to the already fragile state of the security situation in the region. This paper will shed light on the current state of IS-K network in the Pak-Afghan region and will explain how its presence and operational capacity in the northern and central Afghanistan has increased despite intensive military operations against the group in Nangarhar province – the stronghold of IS-K. It will also explore the role of Pakistani Taliban in the emergence and expansion of IS-K in the region and will unveil the security implication of growing nexus of IS-K and transnational organized groups for the region in Post NATO withdrawal scenario. The study will be qualitative and will rely on secondary and primary data to explore the topic. For secondary data existing literature on the topic will be extensively reviewed while for primary data in-depth interviews will be conducted with subject experts, Taliban commanders, and field researchers.Keywords: Islamic State of Khorasan (IS-K), North Atlantic Treaty Organization (NATO), Pak-Afghan Region, Transnational Organized Crime (TNOC)
Procedia PDF Downloads 28910992 The Aftermath of Insurgency on Educational Attainment in Nigeria: A Peril on National Development
Authors: David Chapola Nggada
Abstract:
This is a survey designed to find out the impact of the ongoing insurgency in north eastern Nigeria on educational attainment. It is a mixture of both qualitative and quantitative research work on a sample size of 71 secondary school students currently displaced from Baga Biu and Monguno areas of Borno State, now residing as internally displaced persons(IDPs) in Gombe and Yola IDP camps. This was done through both semi structured interview and questionnaire administration. Statistical methods used include percentage and cross tables to gain specific insight into different dimensions of what this implies. Two major aspects of the impact covered were impact on individual student and impact on societal development. These two dimensions were measured against national development variables and analyzed against reviewed literature and findings across the globe. A combination of theories from different fields led to a deeper and better insight. The results confirm a significant relationship between educational attainment and the development of the north east region and Nigeria as a whole. Recommendations were made on ways of reintegrating this group back to the educational system.Keywords: education, insurgency, national development, threat
Procedia PDF Downloads 24210991 Manufacturing the Authenticity of Dokkaebi’s Visual Representation in Tourist Marketing
Authors: Mikyung Bak
Abstract:
The dokkaebi, a beloved icon of Korean culture, is represented as an elf, goblin, monster, dwarf, or any similar creature in different media, such as animated shows, comics, soap operas, and movies. It is often described as a mythical creature with a horn or horns and long teeth, wearing tiger-skin pants or a grass skirt, and carrying a magic stick. Many Korean researchers agree on the similarity of the image of the Korean dokkaebi with that of the Japanese oni, a view that is regard as negative from an anti-colonial or nationalistic standpoint. They cite such similarity between the two mythical creatures as evidence that Japanese colonialism persists in Korea. The debate on the originality of dokkaebi’s visual representation is an issue that must be addressed urgently. This research demonstrates through a diagram the plurality of interpretations of dokkaebi’s visual representations in what are considered ‘authentic’ images of dokkaebi in Korean art and culture. This diagram presents the opinions of four major groups in the debate, namely, the scholars of Korean literature and folklore, art historians, authors, and artists. It also shows the creation of new dokkaebi visual representations in popular media, including those influenced by the debate. The diagram further proves that dokkaebi’s representations varied, which include the typical persons or invisible characters found in Korean literature, original Korean folk characters in traditional art, and even universal spirit characters. They are also visually represented by completely new creatures as well as oni-based mythical beings and the actual oni itself. The earlier dokkaebi representations were driven by the creation of a national ideology or national cultural paradigm and, thus, were more uniform and protected. In contrast, the more recent representations are influenced by the Korean industrial strategy of ‘cultural economics,’ which is concerned with the international rather than the domestic market. This recent Korean cultural strategy emphasizes diversity and commonality with the global culture rather than originality and locality. It employs traditional cultural resources to construct a global image. Consequently, dokkaebi’s recent representations have become more common and diverse, thereby incorporating even oni’s characteristics. This argument has rendered the grounds of the debate irrelevant. The dokkaebi has been used recently for tourist marketing purposes, particularly in revitalizing interest in regions considered the cradle of various traditional dokkaebi tales. These campaign strategies include the Jeju-do Dokkaebi Park, Koksung Dokkaebi Land, as well as the Taebaek and Sokri-san Dokkaebi Festivals. Almost dokkaebi characters are identical to the Japanese oni in tourist marketing. However, the pursuit for dokkaebi’s authentic visual representation is less interesting and fruitful than the appreciation of the entire spectrum of dokkaebi images that have been created. Thus, scholars and stakeholders must not exclude the possibilities for a variety of potentials within the visual culture. The same sentiment applies to traditional art and craft. This study aims to contribute to a new visualization of the dokkaebi that embraces the possibilities of both folk craft and art, which continue to be uncovered by diverse and careful researchers in a still-developing field.Keywords: Dokkaebi, post-colonial period, representation, tourist marketing
Procedia PDF Downloads 27810990 Assessing the Threat of Dual Citizenship to State Interests: A Case Study of Sri Lanka
Authors: Kasuri Kaushalya Pathirana Pahamunu Pathirannehelage
Abstract:
Recent changes in the international system challenged the traditional idea of citizenship, prompting a need for a clearer definition. With the rapid globalization and shifting geopolitical dynamics, the concept of dual citizenship has emerged as a focal point of debate regarding its implications for state interests. As borders become less rigid and people identify with multiple nationalities, the traditional idea of citizenship is changing. This change is especially important given the increased connections between countries and the challenges that sovereign states face. While many countries accept dual citizenship, others are hesitant, seeing it as a potential threat to their national goals. This difference underscores the complicated relationship between national interests and the evolving concept of citizenship in the modern world. This study seeks to critically assess whether dual citizenship represents a significant threat to sovereign states by examining its effects across economic, social, and political sectors. Employing qualitative methodologies, including the analysis of published articles, reports, government acts, and a mix of primary and secondary sources, this research delves into the complexities surrounding dual citizenship. The findings reveal a nuanced landscape, showcasing both positive and negative impacts on state sovereignty and international cooperation. By exploring the tension between multinationalism and state interests, particularly through the lens of Sri Lanka’s evolving policies, this study aims to contribute valuable insights to the fields of political science and international relations, ultimately addressing the question of dual citizenship's implications for state interests. The evolving framework of dual citizenship in Sri Lanka provides a unique opportunity to examine its implications for various aspects of the nation. Specifically, this study will analyse the impact of dual citizenship on the country's economy, international cooperation, and social development. By exploring these dimensions, the research aims to provide a comprehensive understanding of how dual citizenship influences not only individual rights but also broader state interests and development goals within the context of globalization. It’s crucial to assess the potential threats posed by dual citizenship, as it can impact national security, economic stability, social unity, and political issues within countries. Understanding these effects is important for policymakers and researchers as they work to balance globalization with the need to protect state sovereignty. Dual citizenship presents a complex interplay of challenges and benefits to state interests, influencing critical areas such as international cooperation and state sovereignty. On the one hand, it can foster stronger ties between nations, enhance economic collaboration, and encourage cultural exchange, ultimately contributing to more robust international relationships. On the other hand, it may create tensions related to national identity, complicate governance, and raise concerns about loyalty and allegiance, which can challenge the notion of state sovereignty. As countries navigate these dual realities, it becomes essential to carefully assess and manage the implications of dual citizenship. By doing so, states can harness the potential advantages while addressing the associated risks, ultimately striving for a balance that promotes both national interests and international relations.Keywords: dual citizenship, globalization, sustainable development, nationalism
Procedia PDF Downloads 1510989 Counter-Terrorism and Civil Society in Nigeria
Authors: Emeka Thaddues Njoku
Abstract:
Since 2009, the Nigerian Government has established diverse counter-terrorism legislations and practices in response terrorism in North Eastern part of the country. However, these measures have hampered not only the ability of civil society organizations to sustain the autonomous spaces that define/locate them at the intersection between the state and public but also the balance between freedom and security. Hence, this study examines the various elements associated with the interface between the counter terrorism security framework of the government and the capacity of civil society organizations to carry out their mandates in Nigeria. In order to achieve this, the survey research of the ex-post facto type will be adopted using the multi-stage sampling technique. A total of two hundred (200) copies of questionnaire will be administered to members of the civil society organizations and 24 In-Depth Interviews (IDI) will be conducted for officials of security agencies, Ministry of Defence and operators of civil society organizations. Fifty respondents will be drawn from each civil society organisations in the areas of humanitarian assistance, human rights Advocacy, development-oriented, peace-building. Moreover, 24 interviewees drawn from the key members of the security agencies (6), Ministry of Defence (6) and 12 operators of civil society organizations-three respondents each will represent the four civil society organizations mentioned above. Also, secondary data will be used to complement In-depth Interview (IDI) sessions. All collected data will be coded and analysed using descriptive statistics of frequency counts and simple percentage in the Statistical Package for Social Science (SPSS). Content analysis will be used for the In-depth interview and secondary data.Keywords: counter-terrorism, civil society organizations, freedom, terrorism
Procedia PDF Downloads 38810988 An Application of Contingent Valuation Method in Valuing Protected Area: A Case Study of Pulau Kukup National Parks
Authors: A. Mukrimah, M. Mohd Parid, H. F. Lim
Abstract:
Wetland ecosystem has valuable resources that contribute to national income generation and public well-being, either directly by resources that have a market value or indirectly by resources that have no market value. Economic approach is used to evaluate the resources to determine the best use of wetland resources and should be emphasized in policy development planning. This approach is to prevent imbalance in the allocation of resources and welfare benefits. A case study was conducted in 2016 to assess the economic value of wetland ecosystem services at Pulau Kukup National Parks (PKNP). This study has applied dichotomous choice survey design Contingent Valuation Method (CVM) to investigate empirically the willingness-to-pay (WTP) by the public. The study interviewed 400 household respondents at Pontian, Johor. Analysis showed 81% of household interviewed were willing to contribute to the Wetland Conservation Trust Fund. The results also indicated that on average a household was willing to pay RM87 annually. By taking into account 21,664 households in Pontian district in 2016, public’s contribution to conserves wetland ecosystem at PKNP was calculated to be RM1, 884,334. From the public’s interest to contribute to the conservation of wetland ecosystem services at PKNP, it indicates that more concerted effort is needed by both the federal and state governments to conserve and rehabilitate the mangrove ecosystem in Malaysia.Keywords: environmental economy, economic valuation, choice experiment, Pulau Kukup national parks
Procedia PDF Downloads 19010987 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing
Authors: Jaimin Patel
Abstract:
Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack
Procedia PDF Downloads 27810986 Secure Distance Bounding Protocol on Ultra-WideBand Based Mapping Code
Authors: Jamel Miri, Bechir Nsiri, Ridha Bouallegue
Abstract:
Ultra WidBand-IR physical layer technology has seen a great development during the last decade which makes it a promising candidate for short range wireless communications, as they bring considerable benefits in terms of connectivity and mobility. However, like all wireless communication they suffer from vulnerabilities in terms of security because of the open nature of the radio channel. To face these attacks, distance bounding protocols are the most popular counter measures. In this paper, we presented a protocol based on distance bounding to thread the most popular attacks: Distance Fraud, Mafia Fraud and Terrorist fraud. In our work, we study the way to adapt the best secure distance bounding protocols to mapping code of ultra-wideband (TH-UWB) radios. Indeed, to ameliorate the performances of the protocol in terms of security communication in TH-UWB, we combine the modified protocol to ultra-wideband impulse radio technology (IR-UWB). The security and the different merits of the protocols are analyzed.Keywords: distance bounding, mapping code ultrawideband, terrorist fraud, physical layer technology
Procedia PDF Downloads 29710985 Fast Robust Switching Control Scheme for PWR-Type Nuclear Power Plants
Authors: Piyush V. Surjagade, Jiamei Deng, Paul Doney, S. R. Shimjith, A. John Arul
Abstract:
In sophisticated and complex systems such as nuclear power plants, maintaining the system's stability in the presence of uncertainties and disturbances and obtaining a fast dynamic response are the most challenging problems. Thus, to ensure the satisfactory and safe operation of nuclear power plants, this work proposes a new fast, robust optimal switching control strategy for pressurized water reactor-type nuclear power plants. The proposed control strategy guarantees a substantial degree of robustness, fast dynamic response over the entire operational envelope, and optimal performance during the nominal operation of the plant. To improve the robustness, obtain a fast dynamic response, and make the system optimal, a bank of controllers is designed. Various controllers, like a baseline proportional-integral-derivative controller, an optimal linear quadratic Gaussian controller, and a robust adaptive L1 controller, are designed to perform distinct tasks in a specific situation. At any instant of time, the most suitable controller from the bank of controllers is selected using the switching logic unit that designates the controller by monitoring the health of the nuclear power plant or transients. The proposed switching control strategy optimizes the overall performance and increases operational safety and efficiency. Simulation studies have been performed considering various uncertainties and disturbances that demonstrate the applicability and effectiveness of the proposed switching control strategy over some conventional control techniques.Keywords: switching control, robust control, optimal control, nuclear power control
Procedia PDF Downloads 13210984 The Examination And Assurance Of The Microbiological Safety Pertaining To Raw Milk And its Derived Processed Products
Authors: Raana Babadi Fathipour
Abstract:
The production of dairy holds significant importance in the sustenance of billions of individuals worldwide, as they rely on milk and its derived products for daily consumption. In addition to being a source of essential nutrients crucial for human well-being, such as proteins, fats, vitamins, and minerals; dairy items are witnessing an increasing demand worldwide. Amongst all the factors contributing to the quality and safety assurance of dairy products, the strong focus lies on maintaining high standards in raw milk procurement. Raw milk serves as an externally nutritious medium for various microorganisms due to its inherent properties. This poses a considerable challenge for the dairy industry in ensuring that microbial contamination is minimized throughout every stage of the value chain. Despite implementing diverse process technologies—both conventional and innovative—the occurrence of microbial spoilage still results in substantial losses within this industry context. Moreover, milk and dairy products have been associated with numerous cases of foodborne illnesses across the globe. Various pathogens such as Salmonella serovars, Campylobacter spp., Shiga toxin-producing Escherichia coli, Listeria monocytogenes, and enterotoxin producing Staphylococcus aureus are commonly identified as the culprits behind these outbreaks in the dairy industry. The effective management of food safety within this sector necessitates a proactive and risk-based approach to reform. However, this strategy presents difficulties for developing nations where informal value chains dominate the dairy sector. Whether operating on a small or large scale or falling within formal or informal realms, it is imperative that the dairy industry adheres to principles of good hygiene practices and good manufacturing practices. Additionally, identifying and managing potential sources of contamination is crucial in mitigating challenges pertaining to quality and safety precautions.Keywords: dairy value chain, microbial contamination, food safety, hygiene
Procedia PDF Downloads 6910983 Chocomerr (Merr Leaves Chocolate) Alternative Food in Increasing Breastmilk Quantity
Authors: Rara Wulan Anggareni, Narita Putri, Riski Septianing Astuti
Abstract:
Breastfeeding is a key to prevent mortality and morbidity in children. It is also the second highest risk responsible for Disability Adjusted Life Years (DALYs) among children below five years old. UNICEF estimates that during 1995 – 2003, there are only about 38% infants in developing countries who get to be exclusively breastfed during the first six months of their lives. According to Demography and Health Survey in Indonesia 2007, breastfeed practice rate still considered as low which is about 41%. One of the factors causing the low breastfeed practice rate in Indonesia is the anxiety and postpartum depression, and also the weanling dilemma in which mother feels that her breastmilk cannot suffice infant needs. Those factors finally resulting into low or even stopped production of breastmilk. Breastmilk production can be enhanced by consuming food containing phytosterol and lactogoga effect. Food with the highest phytosterol level is Sauropus androgynus (L.) Merr leaf (merr leaf). In this study, we made alternative food which named Chocomerr for breastfeeding mothers. Chocomerr consists of merr leaves which have lactogoga effect and chocolate for relaxation. Based on organoleptic tests conducted towards 2 age groups, which are 18 – 21 and 25 – 40 years old, this product gets good acceptance in taste, texture, and colour categories. Chocomerr can be used as an alternative way for increasing breastmilk production to aim for the decreasing number of DALYs among children aged under 5 years old.Keywords: breastfeeding, increasing, chocolate, merr leaves
Procedia PDF Downloads 43210982 Globalization as Instrument for Multi-National Corporation in Transforming Asian’s Perspective towards Clean Water Consumption
Authors: Atanta Gian
Abstract:
It is inevitable that globalization has succeeded in transforming the world today. The influence of globalization has emerged in almost every aspect of life nowadays, especially in shaping the perception of the people. It can be seen on how easy for people are affected by the information surrounding them. Due to globalization, the flow of information has become more rapid along with the development of technology. People tend to believe in information that they actually get by themselves, if there is information where most of the people believe it is true, then this information could be categorized as factual and relevant. Therefore if people gain information on what is best for them in terms of daily consumption, then this information could transform their perspective, and it becomes a consideration in selecting their needs for daily consumption. By looking at this trend, the author sees that globalization could be used by Multi-National Corporation (MNC) to enhance the promotion of their products. This is applied by shaping the perspectives of the world regarding what is the best for them. Multi-National Corporation which has better technology in terms of the development of their external promotion could utilize this opportunity to affect people’s perspectives into what they want. In this paper, the author would like to elaborate how globalization is applied by MNC to shape people’s perspective regarding what is the best for them. The author would utilize a case study to analyze on how MNC could transform the perspectives of Asian people regarding the necessary of having a better quality drinking water, which in this case, MNC has shaped the perspective of Asian people in choosing their product by promoting the bottled water as the best choice for them. In the end of this paper, author would come to a conclusion that MNCs are able to shape the world’s perspective regarding the needs of their products which is supported by the globalization that is happening now.Keywords: consumption, globalisation, influence, information technology, multi-national corporations
Procedia PDF Downloads 20810981 Assessment Of Factors Affecting Sustainability of Rice (Oryza sativa) Processing and Marketing in Ogun State, Nigeria
Authors: A. M. Omoare, O. O. Sofowora, W. O. Oyediran
Abstract:
The study was carried out to assess the factors affecting the sustainability of rice processing and marketing in Ogun State, Nigeria. Multi-stage sampling technique was used to select one hundred and twenty (120) respondents for the study. Descriptive statistics was used to describe the objectives while hypotheses were analyzed with Pearson Product Moment Correlation. The result showed that most (85%) of the respondents was less than 50 years old and had been in rice business for more than 6 years. The majority (66.67%) of the respondents got their capitals from cooperative societies. All (100%) the respondents used rice as household food security and source of income. However, efficient rice processing and marketing were affected by inadequate manpower capacity development and inputs. There was a positive and significant relationship between socio-economic characteristics and processing techniques (p < 0.05). It is hereby recommended that extension service providers should introduce improved rice processing systems to the rice millers traders in the study area.Keywords: sustainability, rice processing, marketing, constraints, millers traders
Procedia PDF Downloads 39010980 An Efficient Encryption Scheme Using DWT and Arnold Transforms
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The color image is decomposed into red, green, and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using a key image that has same original size and is generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours of color image recovery can be obtained with accepted level of distortion using Canny edge detector. Experiments have demonstrated that proposed algorithm can fully encrypt 2D color image and completely reconstructed without any distortion. It has shown that the color image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: color image, wavelet transform, edge detector, Arnold transform, lossy image encryption
Procedia PDF Downloads 48210979 Climate Change and Its Effects on Terrestrial Insect Diversity in Mukuruthi National Park, Nilgiri Biosphere Reserve, Tamilnadu, India
Authors: M. Elanchezhian, C. Gunasekaran, A. Agnes Deepa, M. Salahudeen
Abstract:
In recent years climate change is one of the most emerging threats facing by biodiversity both the animals and plants species. Elevated carbon dioxide and ozone concentrations, extreme temperature, changes in rainfall patterns, insects-plant interaction are the main criteria that affect biodiversity. In the present study, which emphasis the climate change and its effects on terrestrial insect diversity in Mukuruthi National Park a protected areas of Western Ghats in India. Sampling was done seasonally at the three areas using pitfall traps, over the period of January to December 2013. The statistical findings were done by Shannon wiener diversity index (H). A significant seasonal variation pattern was detected for total insect’s diversity at the different study areas. Totally nine orders of insects were recorded. Diversity and abundance of terrestrial insects shows much difference between the Natural, Shoal forest and the Grasslands.Keywords: biodiversity, climate change, mukuruthi national park, terrestrial invertebrates
Procedia PDF Downloads 51510978 The Use of Educational Language Games
Authors: April Love Palad, Charita B. Lasala
Abstract:
Mastery on English language is one of the important goals of all English language teachers. This goal can be seen based from the students’ actual performance using the target language which is English. Learning the English language includes hard work where efforts need to be exerted and this can be attained gradually over a long period of time. It is extremely important for all English language teachers to know the effects of incorporating games in teaching. Whether this strategy can have positive or negative effects in students learning, teachers should always consider what is best for their learners. Games may help and provide confidents language learners. These games help teachers to create context in which the language is suitable and significant. Focusing in accuracy and fluency is the heart of this study and this will be obtain in either teaching English using the traditional method or teaching English using language games. It is very important for all English teachers to know which strategy is effective in teaching English to be able to cope with students’ underachievement in this subject. This study made use of the comparative-experimental method. It made use of the pre-post test design with the aim to explore the effectiveness of the language games as strategy used in language teaching for high school students. There were two groups of students being observed, the controlled and the experimental, employing the two strategies in teaching English –traditional and with the use of language games. The scores obtained by two samples were compared to know the effectiveness of the two strategies in teaching English. In this study, it found out that language games help improve students’ fluency and accuracy in the use of target language and this is very evident in the results obtained in the pre-test and post –test result as well the mean gain scores by the two groups of students. In addition, this study also gives us a clear view on the positive effects on the use of language games in teaching which also supported by the related studies based from this research. The findings of the study served as the bases for the creation of the proposed learning plan that integrated language games that teachers may use in their own teaching. This study further concluded that language games are effective in developing students’ fluency in using the English language. This justifies that games help encourage students to learn and be entertained at the same time. Aside from that, games also promote developing language competency. This study will be very useful to teachers who are in doubt in the use of this strategy in their teaching.Keywords: language games, experimental, comparative, strategy, language teaching, methodology
Procedia PDF Downloads 41710977 Effect of Formulated Insect Enriched Sprouted Soybean /Millet Based Food on Gut Health Markers in Albino Wistar Rats
Authors: Gadanya, A.M., Ponfa, S., Jibril, M.M., Abubakar, S. M.
Abstract:
Background: Edible insects such as grasshopper are important sources of food for humans, and have been consumed as traditional foods by many indigenous communities especially in Africa, Asia, and Latin America. These communities have developed their skills and techniques in harvesting, preparing, consuming, and preserving edible insects, widely contributing to the role played by the use of insects in human nutrition. Aim/ objective: This study was aimed at determining the effect of insect enriched sprouted soyabean /millet based food on some gut health markers in albino rats. Methods. Four different formulations of Complementary foods (i.e Complementary Food B (CFB): sprouted millet (SM), Complementary Food C (CFC): sprouted soyabean (SSB), Complementary Food D (CFD): sprouted soybean and millet (SSBM) in a ratio of (50:50) and Complementary Food E (CFE): insect (grasshopper) enriched sprouted soybean and millet (SSBMI) in a ratio of (50:25:25)) were prepared. Proximate composition and short chain fatty acid contents were determined. Thirty albino rats were divided into5 groups of six rats each. Group 1(CDA) were fed with basal diet and served as a control group, while groups 2,3,4 and 5 were fed with the corresponding complimentary foods CFB, CFC, CFD and CFE respectively daily for four weeks. Concentrations of fecal protein, serum total carotenoids and nitric oxide were determined. DNA extraction for molecular isolation and characterization were carried out followed by PCR, the use of mega 11 software and NCBI blast for construction of the phylogenetic tree and organism identification respectively. Results: Significant increase (P<0.05) in percentage ash, fat, protein and moisture contents, as well as short chain fatty acid (acetate, butyrate and propionate) concentrations were recorded in the insect enriched sprouted composite food (CFE) when compared with the CFA, CFB, CFC and CFD composite food. Faecal protein, carotenoid and nitric oxide concentrations were significantly lower (P>0.05) in group 5 in comparison to groups 1to 4. Ruminococcus bromii and Bacteroidetes were molecularly isolated and characterized by 16s rRNA from the sprouted millet/sprouted soybean and the insect enriched sprouted soybean/sprouted millet based food respectively. The presence of these bacterial strains in the feaces of the treated rats is an indication that the gut of the treated rats is colonized by good gut bacteria, hence, an improved gut health. Conclusion: Insect enriched sprouted soya bean/sprouted millet based complementary diet showed a high composition of ash, fat, protein and fiber. Thus, could increase the availability of short chain fatty acids whose role to the host organism cannot be overemphasized. It was also found to have decrease the level of faecal protein, carotenoid and nitric oxide in the serum which is an indication of an improvement in the immune system function.Keywords: gut-health, insect, millet, soybean, sprouted
Procedia PDF Downloads 6710976 Farmers’ Awareness of Pillars of Planting for Food and Jobs Programme in Ghana
Authors: Franklin Nantui Mabe, Gideon Danso-Abbeam, Dennis Sedem Ehiakpor
Abstract:
In order for the government of Ghana through the Ministry of Food and Agriculture to motivate farmers to adopt improved agricultural technologies, expand their farms and encourage youth to enter into agricultural production so as to increase crop productivity, “Planting for Food and Jobs” (PFJ) programme was launched in April 2017. The PFJ programme covers five pillars, namely, provision of subsidized and improved seeds; subsidized fertilizer; agricultural extension services; establishment of markets; and e-agriculture. This study assesses the awareness of farmers about the packages of these pillars using the Likert scale, paired t-test and Spearman’s rank correlation coefficient. The study adopted a mixed research design. A semi-structured questionnaire and checklist were used to collect data. The data collection was done using interviews and focus group discussions. The PFJ pillar farmers are much aware is a subsidy on fertilizer followed by a subsidy on improved seeds. Electronic agriculture is a pillar with the lowest level of awareness. There is a strong positive correlation between awareness of fertilizer and seed packages suggestion their complementarities. Lack of information/awareness of the packages of the programme can affect farmers’ participation in all the pillars. Farmers, in particular, should be educated for them to know what they are entitled to in each of the pillars. The programme implementation plan should also be made available to farmers as a guide.Keywords: awareness, planting for food and jobs, programme, farmers, likert scale
Procedia PDF Downloads 22810975 Time Series Analysis on the Production of Fruit Juice: A Case Study of National Horticultural Research Institute (Nihort) Ibadan, Oyo State
Authors: Abiodun Ayodele Sanyaolu
Abstract:
The research was carried out to investigate the time series analysis on quarterly production of fruit juice at the National Horticultural Research Institute Ibadan from 2010 to 2018. Documentary method of data collection was used, and the method of least square and moving average were used in the analysis. From the calculation and the graph, it was glaring that there was increase, decrease, and uniform movements in both the graph of the original data and the tabulated quarter values of the original data. Time series analysis was used to detect the trend in the highest number of fruit juice and it appears to be good over a period of time and the methods used to forecast are additive and multiplicative models. Since it was observed that the production of fruit juice is usually high in January of every year, it is strongly advised that National Horticultural Research Institute should make more provision for fruit juice storage outside this period of the year.Keywords: fruit juice, least square, multiplicative models, time series
Procedia PDF Downloads 14010974 How Hormesis Impacts Practice of Ecological Risk Assessment and Food Safety Assessment
Authors: Xiaoxian Zhang
Abstract:
Guidelines of ecological risk assessment (ERA) and food safety assessment (FSA) used nowadays, based on an S-shaped threshold dose-response curve (SDR), fail to consider hormesis, a reproducible biphasic dose-response model represented as a J-shaped or an inverted U-shaped curve, that occurs in the real-life environment across multitudinous compounds on cells, organisms, populations, and even the ecosystem. Specifically, in SDR-based ERA and FSA practice, predicted no effect concentration (PNEC) is calculated separately for individual substances from no observed effect concentration (NOEC, usually equivalent to 10% effect concentration (EC10) of a contaminant or food condiment) over an assessment coefficient that is bigger than 1. Experienced researchers doubted that hormesis in the real-life environment might lead to a waste of limited human and material resources in ERA and FSA practice, but related data are scarce. In this study, hormetic effects on bioluminescence of Aliivibrio fischeri (A. f) induced by sulfachloropyridazine (SCP) under 40 conditions to simulate the real-life scenario were investigated, and hormetic effects on growth of human MCF-7 cells caused by brown sugar and mascavado sugar were found likewise. After comparison of related parameters, it has for the first time been proved that there is a 50% probability for safe concentration (SC) of contaminants and food condiments to fall within the hormetic-stimulatory range (HSR) or left to HSR, revealing the unreliability of traditional parameters in standardized (eco)toxicological studies, and supporting qualitatively and quantitatively the over-strictness of ERA and FSA resulted from misuse of SDR. This study provides a novel perspective for ERA and FSA practitioners that hormesis should dominate and conditions where SDR works should only be singled out on a specific basis.Keywords: dose-response relationship, food safety, ecological risk assessment, hormesis
Procedia PDF Downloads 14410973 The Role of Urban Agriculture in Enhancing Food Supply and Export Potential: A Case Study of Neishabour, Iran
Authors: Mohammadreza Mojtahedi
Abstract:
Rapid urbanization presents multifaceted challenges, including environmental degradation and public health concerns. As the inevitability of urban sprawl continues, it becomes essential to devise strategies to alleviate its pressures on natural ecosystems and elevate socio-economic benchmarks within cities. This research investigates urban agriculture's economic contributions, emphasizing its pivotal role in food provisioning and export potential. Adopting a descriptive-analytical approach, field survey data was primarily collected via questionnaires. The tool's validity was affirmed by expert opinions, and its reliability secured by achieving a Cronbach's alpha score over 0.70 from 30 preliminary questionnaires. The research encompasses Neishabour's populace of 264,375, extracting a sample size of 384 via Cochran's formula. Findings reveal the significance of urban agriculture in food supply and its potential for exports, underlined by a p-value < 0.05. Neishabour's urban farming can augment the export of organic commodities, fruits, vegetables, ornamental plants, and foster product branding. Moreover, it supports the provision of fresh produce, bolstering dietary quality. Urban agriculture further impacts urban development metrics—enhancing environmental quality, job opportunities, income levels, and aesthetics, while promoting rainwater utilization. Popular cultivations include peaches, Damask roses, and poultry, tailored to available spaces. Structural equation modeling indicates urban agriculture's overarching influence, accounting for a 56% variance, predominantly in food sufficiency and export proficiency.Keywords: urban agriculture, food supply, export potential, urban development, environmental health, structural equation modeling
Procedia PDF Downloads 5510972 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 14110971 Exploring Forest Biomass Changes in Romania in the Last Three Decades
Authors: Remus Pravalie, Georgeta Bandoc
Abstract:
Forests are crucial for humanity and biodiversity, through the various ecosystem services and functions they provide all over the world. Forest ecosystems are vital in Romania as well, through their various benefits, known as provisioning (food, wood, or fresh water), regulating (water purification, soil protection, carbon sequestration or control of climate change, floods, and other hazards), cultural (aesthetic, spiritual, inspirational, recreational or educational benefits) and supporting (primary production, nutrient cycling, and soil formation processes, with direct or indirect importance for human well-being) ecosystem services. These ecological benefits are of great importance in Romania, especially given the fact that forests cover extensive areas countrywide, i.e. ~6.5 million ha or ~27.5% of the national territory. However, the diversity and functionality of these ecosystem services fundamentally depend on certain key attributes of forests, such as biomass, which has so far not been studied nationally in terms of potential changes due to climate change and other driving forces. This study investigates, for the first time, changes in forest biomass in Romania in recent decades, based on a high volume of satellite data (Landsat images at high spatial resolutions), downloaded from the Google Earth Engine platform and processed (using specialized software and methods) across Romanian forestland boundaries from 1987 to 2018. A complex climate database was also investigated across Romanian forests over the same 32-year period, in order to detect potential similarities and statistical relationships between the dynamics of biomass and climate data. The results obtained indicated considerable changes in forest biomass in Romania in recent decades, largely triggered by the climate change that affected the country after 1987. Findings on the complex pattern of recent forest changes in Romania, which will be presented in detail in this study, can be useful to national policymakers in the fields of forestry, climate, and sustainable development.Keywords: forests, biomass, climate change, trends, romania
Procedia PDF Downloads 15210970 The Role of Metacognitive Strategy Intervention through Dialogic Interaction on Listeners’ Level of Cognitive Load
Authors: Ali Babajanzade, Hossein Bozorgian
Abstract:
Cognitive load plays an important role in learning in general and L2 listening comprehension in particular. This study is an attempt to investigate the effect of metacognitive strategy intervention through dialogic interaction (MSIDI) on L2 listeners’ cognitive load. A mixed-method design with 50 participants of male and female Iranian lower-intermediate learners between 20 to 25 years of age was used. An experimental group (n=25) received weekly interventions based on metacognitive strategy intervention through dialogic interaction for ten sessions. The second group, which was control (n=25), had the same listening samples with the regular procedure without a metacognitive intervention program in each session. The study used three different instruments: a) a modified version of the cognitive load questionnaire, b) digit span tests, and c) focused group interviews to investigate listeners’ level of cognitive load throughout the process. Results testified not only improvements in listening comprehension in MSIDI but a radical shift of cognitive load rate within this group. In other words, listeners experienced a lower level of cognitive load in MSIDI in comparison with their peers in the control group.Keywords: cognitive load theory, human mental functioning, metacognitive theory, listening comprehension, sociocultural theory
Procedia PDF Downloads 14510969 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security
Authors: Magdalena Musiał-Karg
Abstract:
The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)
Procedia PDF Downloads 238