Search results for: food security status
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8608

Search results for: food security status

6538 Internet of Things Networks: Denial of Service Detection in Constrained Application Protocol Using Machine Learning Algorithm

Authors: Adamu Abdullahi, On Francisca, Saidu Isah Rambo, G. N. Obunadike, D. T. Chinyio

Abstract:

The paper discusses the potential threat of Denial of Service (DoS) attacks in the Internet of Things (IoT) networks on constrained application protocols (CoAP). As billions of IoT devices are expected to be connected to the internet in the coming years, the security of these devices is vulnerable to attacks, disrupting their functioning. This research aims to tackle this issue by applying mixed methods of qualitative and quantitative for feature selection, extraction, and cluster algorithms to detect DoS attacks in the Constrained Application Protocol (CoAP) using the Machine Learning Algorithm (MLA). The main objective of the research is to enhance the security scheme for CoAP in the IoT environment by analyzing the nature of DoS attacks and identifying a new set of features for detecting them in the IoT network environment. The aim is to demonstrate the effectiveness of the MLA in detecting DoS attacks and compare it with conventional intrusion detection systems for securing the CoAP in the IoT environment. Findings: The research identifies the appropriate node to detect DoS attacks in the IoT network environment and demonstrates how to detect the attacks through the MLA. The accuracy detection in both classification and network simulation environments shows that the k-means algorithm scored the highest percentage in the training and testing of the evaluation. The network simulation platform also achieved the highest percentage of 99.93% in overall accuracy. This work reviews conventional intrusion detection systems for securing the CoAP in the IoT environment. The DoS security issues associated with the CoAP are discussed.

Keywords: algorithm, CoAP, DoS, IoT, machine learning

Procedia PDF Downloads 62
6537 Dosimetric Application of α-Al2O3:C for Food Irradiation Using TA-OSL

Authors: A. Soni, D. R. Mishra, D. K. Koul

Abstract:

α-Al2O3:C has been reported to have deeper traps at 600°C and 900°C respectively. These traps have been reported to accessed at relatively earlier temperatures (122 and 322 °C respectively) using thermally assisted OSL (TA-OSL). In this work, the dose response α-Al2O3:C was studied in the dose range of 10Gy to 10kGy for its application in food irradiation in low ( upto 1kGy) and medium(1 to 10kGy) dose range. The TOL (Thermo-optically stimulated luminescence) measurements were carried out on RisØ TL/OSL, TL-DA-15 system having a blue light-emitting diodes (λ=470 ±30nm) stimulation source with power level set at the 90% of the maximum stimulation intensity for the blue LEDs (40 mW/cm2). The observations were carried on commercial α-Al2O3:C phosphor. The TOL experiments were carried out with number of active channel (300) and inactive channel (1). Using these settings, the sample is subjected to linear thermal heating and constant optical stimulation. The detection filter used in all observations was a Hoya U-340 (Ip ~ 340 nm, FWHM ~ 80 nm). Irradiation of the samples was carried out using a 90Sr/90Y β-source housed in the system. A heating rate of 2 °C/s was preferred in TL measurements so as to reduce the temperature lag between the heater plate and the samples. To study the dose response of deep traps of α-Al2O3:C, samples were irradiated with various dose ranging from 10 Gy to 10 kGy. For each set of dose, three samples were irradiated. In order to record the TA-OSL, initially TL was recorded up to a temperature of 400°C, to deplete the signal due to 185°C main dosimetry TL peak in α-Al2O3:C, which is also associated with the basic OSL traps. After taking TL readout, the sample was subsequently subjected to TOL measurement. As a result, two well-defined TA-OSL peaks at 121°C and at 232°C occur in time as well as temperature domain which are different from the main dosimetric TL peak which occurs at ~ 185°C. The linearity of the integrated TOL signal has been measured as a function of absorbed dose and found to be linear upto 10kGy. Thus, it can be used for low and intermediate dose range of for its application in food irradiation. The deep energy level defects of α-Al2O3:C phosphor can be accessed using TOL section of RisØ reader system.

Keywords: α-Al2O3:C, deep traps, food irradiation, TA-OSL

Procedia PDF Downloads 288
6536 China’s Hedging Strategy in Response to the Russia-Ukraine Conflict

Authors: Zhao Xinlei

Abstract:

The outbreak of the Ukraine crisis has had an important impact on the global political and economic order, especially the global food crisis and energy crisis, thus aggravating social and political conflicts. At the same time, with the intensification of the Ukraine crisis, the United States and European countries have imposed severe economic sanctions on Russia to prevent and contain Russia's special military operations against Ukraine. The essence of the Ukraine crisis is a geopolitical conflict and competition between Russia and the United States. For a long time, the United States has always regarded Russia as a serious strategic crisis and challenge. Therefore, for the United States, the outbreak of the Ukraine crisis is an extremely important opportunity to condemn and stop Russia's actions from an international perspective. In this process, China plays a very special role. This special positioning is not only reflected in the long-term friendly relationship between China and Russia and mutual support and assistance on the international stage but also in the complex economic relationship and interdependence between China and the United States. Therefore, China has adopted a "hedging strategy" in dealing with the Ukrainian crisis, and the use of the hedging strategy not only plays a special role in safeguarding China's own security and interests but also because China can act as an intermediary to coordinate Russia and the United States to promote the resolution of the Ukrainian crisis in a peaceful manner.

Keywords: Ukraine crisis Russia-Ukraine conflict balanced strategy Sino-US competition

Procedia PDF Downloads 73
6535 New Requirements of the Fifth Dimension of War: Planning of Cyber Operation Capabilities

Authors: Mehmet Kargaci

Abstract:

Transformation of technology and strategy has been the main factor for the evolution of war. In addition to land, maritime, air and space domains, cyberspace has become the fifth domain with emerge of internet. The current security environment has become more complex and uncertain than ever before. Moreover, warfare has evaluated from conventional to irregular, asymmetric and hybrid war. Weak actors such as terrorist organizations and non-state actors has increasingly conducted cyber-attacks against strong adversaries. Besides, states has developed cyber capabilities in order to defense critical infrastructure regarding the cyber threats. Cyber warfare will be key in future security environment. Although what to do has been placed in operational plans, how to do has lacked and ignored as to cyber defense and attack. The purpose of the article is to put forward a model for how to conduct cyber capabilities in a conventional war. First, cyber operations capabilities will be discussed. Second put forward the necessities of cyberspace environment and develop a model for how to plan an operation using cyber operation capabilities, finally the assessment of the applicability of cyber operation capabilities and offers will be presented.

Keywords: cyber war, cyber threats, cyber operation capabilities, operation planning

Procedia PDF Downloads 329
6534 Resilient Security System with Toll Free Call Services: Case Study of Adama City

Authors: Shanko Chura Aredo, Hailu Jeldie Wodajo, Muktar Jeylan, Kedir Ilka, Abdulnasir Husein

Abstract:

Toll-free numbers are calling numbers that have unique three or four digit numbers and that don’t require payment from phone lines in order to be called. With the help of these numbers, callers can connect with nearby organizations and/or people without incurring far-reaching fees. Calls to assistance centers are especially popular from toll-free phones. In the past, toll-free services have offered prospective clients and other parties a simple and cost-free means of getting in touch with enterprises. Nevertheless, unless they have an ”unlimited calling” plan, wireless subscribers will be billed for the airtime minutes used during a toll-free call. In Adama, the second largest city in Ethiopia, a call center has been installed as part of smart security system and serving since January 2023 for collection of complaints from different community levels. The call center is situated at the mayor office and has 11 active workers, 4 of these working the night time and the remaining during day time. The information reported in the form of complaints from individuals and groups are illegal constructions, illegal trade, income concealment or hiding, giving and receiving bribe, informing new faces of suspected enemies and exposing individual or group conflicts. This technology has been found to bring a significant outcome in minimizing illegal acts, public safety threats and service delivery problems.

Keywords: smart, safety, crime, call center, security

Procedia PDF Downloads 46
6533 Home-Based Care with Follow-Up at Outpatient Unit or Community-Follow-Up Center with/without Food Supplementation and/or Psychosocial Stimulation of Children with Moderate Acute Malnutrition in Bangladesh

Authors: Md Iqbal Hossain, Tahmeed Ahmed, Kenneth H. Brown

Abstract:

Objective: To assess the effect of community-based follow up, with or without food-supplementation and/or psychosocial stimulation, as an alternative to current hospital-based follow-up of children with moderate-acute-malnutrition (WHZ < -2 to -3) (MAM). Design/methods: The study was conducted at the ICDDR,B Dhaka Hospital and in four urban primary health care centers of Dhaka, Bangladesh during 2005-2007. The efficacy of five different randomly assigned interventions was compared with respect to the rate of completion of follow-up, growth and morbidity in 227 MAM children aged 6-24 months who were initially treated at ICDDR,B for diarrhea and/or other morbidities. The interventions were: 1) Fortnightly follow-up care (FFC) at the ICDDR,B’s outpatient-unit, including growth monitoring, health education, and micro-nutrient supplementation (H-C, n=49). 2) FFC at community follow-up unit (CNFU) [established in the existing urban primary health-care centers close to the residence of the child] but received the same regimen as H-C (C-C, n=53). 3) As per C-C plus cereal-based supplementary food (SF) (C-SF, n=49). The SF packets were distributed on recruitment and at every visit in CNFU [@1 packet/day for 6–11 and 2 packets/day for 12-24 month old children. Each packet contained 20g toasted rice-powder, 10g toasted lentil-powder, 5g molasses, and 3g soy bean oil, to provide a total of ~ 150kcal with 11% energy from protein]. 4) As per C-C plus psychosocial stimulation (PS) (C-PS, n=43). PS consisted of child-stimulation and parental-counseling conducted by trained health workers. 5) As per C-C plus both SF+PS (C-SF+PS, n=33). Results: A total of 227children (48.5% female), with a mean ± SD age of 12.6 ±3.8 months, and WHZ of - 2.53±0.28 enrolled. Baseline characteristics did not differ by treatment group. The rate of spontaneous attendance at scheduled follow-up visits gradually decreased in all groups. Follow-up attendance and gain in weight and length were greater in groups C-SF, C-SF+PS, and C-PS than C-C, and these indicators were observed least in H-C. Children in the H-C group more often suffered from diarrhea (25 % vs. 4-9%) and fever (28% vs. 8-11%) than other groups (p < 0.05). Children who attended at least five of the total six scheduled follow-up visits gained more in weight (median: 0.86 vs. 0.62 kg, p=0.002), length (median: 2.4 vs. 2.0 cm, p=0.009) than those who attended fewer. Conclusions: Community-based service delivery, especially including supplementary food with or without psychosocial stimulation, permits better rehabilitation of children with MAM compared to current hospital outpatients-based care. By scaling the community-based follow-up including food supplementation with or without psychosocial stimulation, it will be possible to rehabilitate a greater number of MAM children in a better way.

Keywords: community-based management, moderate acute malnutrition, psychosocial stimulation, supplementary food

Procedia PDF Downloads 428
6532 Marketing Social Innovation: Finding Competitive Advantage in Social Enterprise Methodology

Authors: Ted Gournelos

Abstract:

Marketing approaches in practice and academic literature usually foreground the importance of product and brand awareness in strategy. Decisions emphasize justifications and promotions of existing projects, which has the unintended consequence of pushing marketing, public relations, and other communications to secondary strategies and tactics rather than as inherent pieces of organizational development. In other words, marketers implement what others have already decided. This is a challenge not only for the communications field, but also for the organizations themselves, since integrated communications employees are often the primary, if not the only, touchpoints for client/customer/user research and interaction. Organizations thus become increasingly out of touch, raising the risk of public or human resources crisis and decreasing the focus on opportunities for development and growth. This paper will discuss the potential for social entrepreneurship to refocus marketing and communications professionals on primary strategy, and suggest best practices for developing initiatives not only to impact marketing efforts themselves, but also the guiding organizational approaches to project management, human resources, corporate social responsibility, and research. It will provide a comparative analysis of social media marketing efforts conducted by food security non-governmental organizations from several countries, pointing out both flaws and areas of opportunity for integration with for-profit organizational strategy, and discuss the implications of descriptive, proactive, and interactive messaging.

Keywords: social enterprise, strategy, innovation, social media

Procedia PDF Downloads 311
6531 An Attribute Based Access Control Model with POL Module for Dynamically Granting and Revoking Authorizations

Authors: Gang Liu, Huimin Song, Can Wang, Runnan Zhang, Lu Fang

Abstract:

Currently, resource sharing and system security are critical issues. This paper proposes a POL module composed of PRIV ILEGE attribute (PA), obligation and log which improves attribute based access control (ABAC) model in dynamically granting authorizations and revoking authorizations. The following describes the new model termed PABAC in terms of the POL module structure, attribute definitions, policy formulation and authorization architecture, which demonstrate the advantages of it. The POL module addresses the problems which are not predicted before and not described by access control policy. It can be one of the subject attributes or resource attributes according to the practical application, which enhances the flexibility of the model compared with ABAC. A scenario that illustrates how this model is applied to the real world is provided.

Keywords: access control, attribute based access control, granting authorizations, privilege, revoking authorizations, system security

Procedia PDF Downloads 350
6530 Efficient Internal Generator Based on Random Selection of an Elliptic Curve

Authors: Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche

Abstract:

The random number generation (RNG) presents a significant importance for the security and the privacy of numerous applications, such as RFID technology and smart cards. Since, the quality of the generated bit sequences is paramount that a weak internal generator for example, can directly cause the entire application to be insecure, and thus it makes no sense to employ strong algorithms for the application. In this paper, we propose a new pseudo random number generator (PRNG), suitable for cryptosystems ECC-based, constructed by randomly selecting points from several elliptic curves randomly selected. The main contribution of this work is the increasing of the generator internal states by extending the set of its output realizations to several curves auto-selected. The quality and the statistical characteristics of the proposed PRNG are validated using the Chi-square goodness of fit test and the empirical Special Publication 800-22 statistical test suite issued by NIST.

Keywords: PRNG, security, cryptosystem, ECC

Procedia PDF Downloads 436
6529 Effects of Temperature and the Use of Bacteriocins on Cross-Contamination from Animal Source Food Processing: A Mathematical Model

Authors: Benjamin Castillo, Luis Pastenes, Fernando Cerdova

Abstract:

The contamination of food by microbial agents is a common problem in the industry, especially regarding the elaboration of animal source products. Incorrect manipulation of the machinery or on the raw materials can cause a decrease in production or an epidemiological outbreak due to intoxication. In order to improve food product quality, different methods have been used to reduce or, at least, to slow down the growth of the pathogens, especially deteriorated, infectious or toxigenic bacteria. These methods are usually carried out under low temperatures and short processing time (abiotic agents), along with the application of antibacterial substances, such as bacteriocins (biotic agents). This, in a controlled and efficient way that fulfills the purpose of bacterial control without damaging the final product. Therefore, the objective of the present study is to design a secondary mathematical model that allows the prediction of both the biotic and abiotic factor impact associated with animal source food processing. In order to accomplish this objective, the authors propose a three-dimensional differential equation model, whose components are: bacterial growth, release, production and artificial incorporation of bacteriocins and changes in pH levels of the medium. These three dimensions are constantly being influenced by the temperature of the medium. Secondly, this model adapts to an idealized situation of cross-contamination animal source food processing, with the study agents being both the animal product and the contact surface. Thirdly, the stochastic simulations and the parametric sensibility analysis are compared with referential data. The main results obtained from the analysis and simulations of the mathematical model were to discover that, although bacterial growth can be stopped in lower temperatures, even lower ones are needed to eradicate it. However, this can be not only expensive, but counterproductive as well in terms of the quality of the raw materials and, on the other hand, higher temperatures accelerate bacterial growth. In other aspects, the use and efficiency of bacteriocins are an effective alternative in the short and medium terms. Moreover, an indicator of bacterial growth is a low-level pH, since lots of deteriorating bacteria are lactic acids. Lastly, the processing times are a secondary agent of concern when the rest of the aforementioned agents are under control. Our main conclusion is that when acclimating a mathematical model within the context of the industrial process, it can generate new tools that predict bacterial contamination, the impact of bacterial inhibition, and processing method times. In addition, the mathematical modeling proposed logistic input of broad application, which can be replicated on non-meat food products, other pathogens or even on contamination by crossed contact of allergen foods.

Keywords: bacteriocins, cross-contamination, mathematical model, temperature

Procedia PDF Downloads 132
6528 Polysaccharide-Based Oral Delivery Systems for Site Specific Delivery in Gastro-Intestinal Tract

Authors: Kaarunya Sampathkumar, Say Chye Joachim Loo

Abstract:

Oral delivery is regarded as the facile method for the administration of active pharmaceutical ingredients (API) and drug carriers. In an initiative towards sustainable nanotechnology, an oral nano-delivery system has been developed that is made entirely of food-based materials and can also act as a site-specific delivery device depending on the stimulus encountered in different parts of the gastrointestinal tract (GIT). The delivery system has been fabricated from food grade polysaccharide materials like chitosan and starch through electrospraying technique without the use of any organic solvents. A nutraceutical extracted from an Indian medicinal plant, has been loaded into the nano carrier to test its efficacy in encapsulation and stimuli based release of the active ingredient. The release kinetics of the nutraceutical from the carrier was evaluated in simulated gastric, intestinal and colonic fluid and was found to be triggered both by the enzymes and the pH in each part of the intestinal tract depending on the polysaccharide being used. The toxicity of the nanoparticles on the intestinal epithelial cells was tested and found to be relatively safe for up to 24 hours at a concentration of 0.2 mg/mL with cellular uptake also being observed. The developed nano carrier thus serves as a promising delivery vehicle for targeted delivery to different parts of the GIT with the inherent conditions of the GIT itself acting as the stimulus. In addition, being fabricated from food grade materials, the carrier could be potentially used for the targeted delivery of nutrients through functional foods.

Keywords: bioavailability, chitosan, delivery systems, encapsulation

Procedia PDF Downloads 205
6527 Evaluation of Nematicidal Action of Some Botanicals on Plant-Parasitic Nematode

Authors: Lakshmi, Yakshita Awasthi, Deepika, Lovleen Jha, Archna Kumar

Abstract:

From the back of centuries, plant-parasitic nematodes (PPN) have been recognized as a major threat to agriculturalists globally. It causes 21.3% global food loss annually. The utilization of harmful chemical pesticides to minimize the nematode population may cause acute and delayed health hazards and harmful impacts on human health. In recent years, a variety of plants have been evaluated for their nematicidal properties and efficacy in the management of plant-parasitic nematodes. Several Phyto-nematicides are available, but most of them are incapable of sustainable management of PPN, especially Meloidogyne spp. Thus, there is a great need for a new eco-friendly, highly efficient, sustainable control measure for this nematode species. Keeping all these facts and after reviewing the literature, aqueous extract of Cymbopogon citratus, Tagetes erecta, and Azadirachta indica were prepared by adding distilled water (1 g sample mixed with 10ml of water). In vitro studies were conducted to evaluate the efficacious nature of targeted botanicals against PPN Meloidogyne spp. The mortality status of PPN was recorded by counting the live and dead individuals after applying 100μl of selected extract. The impact was observed at different time durations, i.e., 24h and 48h. The result showed that the highest 100% mortality was at 48h in all three extracts. Thus, these extracts, with the addition of a suitable shelf-life enhancer, may be exploited in different nematode control programs as an economical, sustainable measure.

Keywords: Meloidogyne, Cymbopogon citratus, Tagetes erecta, Azadirachta indica, nematicidal

Procedia PDF Downloads 150
6526 Mitigating Denial of Service Attacks in Information Centric Networking

Authors: Bander Alzahrani

Abstract:

Information-centric networking (ICN) using architectures such as Publish-Subscribe Internet Routing Paradigm (PSIRP) is one of the promising candidates for a future Internet, has recently been under the spotlight by the research community to investigate the possibility of redesigning the current Internet architecture to solve many issues such as routing scalability, security, and quality of services issues.. The Bloom filter-based forwarding is a source-routing approach that is used in the PSIRP architecture. This mechanism is vulnerable to brute force attacks which may lead to denial-of-service (DoS) attacks. In this work, we present a new forwarding approach that keeps the advantages of Bloom filter-based forwarding while mitigates attacks on the forwarding mechanism. In practice, we introduce a special type of forwarding nodes called Edge-FW to be placed at the edge of the network. The role of these node is to add an extra security layer by validating and inspecting packets at the edge of the network against brute-force attacks and check whether the packet contains a legitimate forwarding identifier (FId) or not. We leverage Certificateless Aggregate Signature (CLAS) scheme with a small size of 64-bit which is used to sign the FId. Hence, this signature becomes bound to a specific FId. Therefore, malicious nodes that inject packets with random FIds will be easily detected and dropped at the Edge-FW node when the signature verification fails. Our preliminary security analysis suggests that with the proposed approach, the forwarding plane is able to resist attacks such as DoS with very high probability.

Keywords: bloom filter, certificateless aggregate signature, denial-of-service, information centric network

Procedia PDF Downloads 192
6525 Maternal Nutrition Supplementation for Improving Progress and Outcome of Pregnancy in a Tribal Block of Maharashtra

Authors: Rajnish Gourh, Nitesh Sharma, Nikhil Patil

Abstract:

Introduction: Adequate nutrition is essential for improving pregnancy and its outcomes. Failure to comply with the required daily intake of nutrition can lead to complications threatening both mother and child survival. Objectives: To provide access to nutritious diet to mothers in antenatal and post-natal stage for supporting a healthy progressive pregnancy, positive delivery outcome, and lactation and to promote regular consumption of the foods by the mothers and help overcome the dietary gap by nutrition education during pregnancy time. Methodology: Total of 95 ANC mothers were identified from Malvada PHC area, in Palghar district of Maharashtra. This short-term cohort intended for the proposed supplementation and education was targeted for follow-up until birth and six-months of post-natal period. In month of May 2016 to June 2017. Results: Average weight of women was observed 40.01kg, (SD- 5.024) at registered for ANC at Centre in the first month. In same month, average Haemoglobin level of women was observed 9.13gm/dl. Average increase in weight of women during pregnancy in month October 2016 was 48.83kg. Birth weight of 14 babies was less than 2 kgs. 13 babies with birth weight in range of 2.1kgs to 2.4kgs. 68 babies with birth weight in range of 2.5kg to 3kg and above. Conclusion: Importance of consumption of food, improving levels of nutrient intake and outcome of delivery was excellent.

Keywords: delivery status, nutrition, pregnancy, education

Procedia PDF Downloads 156
6524 Modelling of Groundwater Resources for Al-Najaf City, Iraq

Authors: Hayder H. Kareem, Shunqi Pan

Abstract:

Groundwater is a vital water resource in many areas in the world, particularly in the Middle-East region where the water resources become scarce and depleting. Sustainable management and planning of the groundwater resources become essential and urgent given the impact of the global climate change. In the recent years, numerical models have been widely used to predict the flow pattern and assess the water resources security, as well as the groundwater quality affected by the contaminants transported. In this study, MODFLOW is used to study the current status of groundwater resources and the risk of water resource security in the region centred at Al-Najaf City, which is located in the mid-west of Iraq and adjacent to the Euphrates River. In this study, a conceptual model is built using the geologic and hydrogeologic collected for the region, together with the Digital Elevation Model (DEM) data obtained from the "Global Land Cover Facility" (GLCF) and "United State Geological Survey" (USGS) for the study area. The computer model is also implemented with the distributions of 69 wells in the area with the steady pro-defined hydraulic head along its boundaries. The model is then applied with the recharge rate (from precipitation) of 7.55 mm/year, given from the analysis of the field data in the study area for the period of 1980-2014. The hydraulic conductivity from the measurements at the locations of wells is interpolated for model use. The model is calibrated with the measured hydraulic heads at the locations of 50 of 69 wells in the domain and results show a good agreement. The standard-error-of-estimate (SEE), root-mean-square errors (RMSE), Normalized RMSE and correlation coefficient are 0.297 m, 2.087 m, 6.899% and 0.971 respectively. Sensitivity analysis is also carried out, and it is found that the model is sensitive to recharge, particularly when the rate is greater than (15mm/year). Hydraulic conductivity is found to be another parameter which can affect the results significantly, therefore it requires high quality field data. The results show that there is a general flow pattern from the west to east of the study area, which agrees well with the observations and the gradient of the ground surface. It is found that with the current operational pumping rates of the wells in the area, a dry area is resulted in Al-Najaf City due to the large quantity of groundwater withdrawn. The computed water balance with the current operational pumping quantity shows that the Euphrates River supplies water into the groundwater of approximately 11759 m3/day, instead of gaining water of 11178 m3/day from the groundwater if no pumping from the wells. It is expected that the results obtained from the study can provide important information for the sustainable and effective planning and management of the regional groundwater resources for Al-Najaf City.

Keywords: Al-Najaf city, conceptual modelling, groundwater, unconfined aquifer, visual MODFLOW

Procedia PDF Downloads 202
6523 Insights on the Halal Status of Antineoplastic and Immunomodulating Agents and Nutritional and Dietary Supplements in Malaysia

Authors: Suraiya Abdul Rahman, Perasna M. Varma, Amrahi Buang, Zhari Ismail, Wan Rosalina W. Rosli, Ahmad Rashidi M. Tahir

Abstract:

Background: Muslims has the obligation to ensure that everything they consume including medicines should be halal. With the growing demands for halal medicines in October 2012, Malaysia has launched the world's first Halal pharmaceutical standards called Malaysian Standard MS 2424:2012 Halal Pharmaceuticals-General Guidelines to serve as a basic requirement for halal pharmaceuticals in Malaysia. However, the biggest challenge faced by pharmaceutical companies to comply is finding the origin or source of the ingredients and determine their halal status. Aim: This study aims to determine the halal status of the antineoplastic and immunomodulating agents, and nutritional and dietary supplements by analysing the origin of their active pharmaceutical ingredients (API) and excipients to provide an insight on the common source and halal status of pharmaceutical ingredients and an indication on adjustment required in order to be halal compliance. Method: The ingredients of each product available in a government hospital in central of Malaysia and their sources were determined from the product package leaflets, information obtained from manufacturer, reliable websites and standard pharmaceutical references. The ingredients were categorised as halal, musbooh or haram based on the definition set in MS2424. Results: There were 162 medications included in the study where 123 (76%) were under the antineoplastic and immunomodulating agents group, while 39 (24%) were nutritional and dietary supplements. In terms of the medication halal status, the proportion of halal, musbooh and haram were 40.1% (n=65), 58.6% (n=95) and 1.2% (n=2) respectively. With regards to the API, there were 89 (52%) different active ingredient identified for antineoplastic and immunomodulating agents with the proportion of 89.9% (n=80) halal and 10.1% (n=9) were mushbooh. There were 83 (48%) active ingredient from the nutritional and dietary supplements group with proportion of halal and masbooh were 89.2% (n=74) and 10.8% (n=9) respectively. No haram APIs were identified in all therapeutic classes. There were a total of 176 excipients identified from the products ranges. It was found that majority of excipients are halal with the proportion of halal, masbooh and haram were at 82.4% (n=145), 17% (n=30) and 0.6% (n=1) respectively. With regards of the sources of the excipeints, most of masbooh excipients (76.7%, n = 23) were classified as masbooh because they have multiple possible origin which consist of animals, plant or others. The remaining 13.3% and 10% were classified as masbooh due to their ethanol and land animal origin respectively. The one haram excipient was gelatine of bovine-porcine origin. Masbooh ingredients found in this research were glycerol, tallow, lactose, polysorbate, dibasic sodium phosphate, stearic acid and magnesium stearate. Ethanol, gelatine, glycerol and magnesium stearate were the most common ingredients classified as mushbooh. Conclusion: This study shows that most API and excipients are halal. However the majority of the medicines in these products categories are mushbooh due to certain excipients only, which could be replaced with halal alternative excipients. This insight should encourage the pharmaceutical products manufacturers to go for halal certification to meet the increasing demand for Halal certified medications for the benefit of mankind.

Keywords: antineoplastic and immunomodulation agents, halal pharmaceutical, MS2424, nutritional and dietary supplements

Procedia PDF Downloads 294
6522 Impact of Network Workload between Virtualization Solutions on a Testbed Environment for Cybersecurity Learning

Authors: Kevin Fernagut, Olivier Flauzac, Erick M. G. Robledo, Florent Nolot

Abstract:

The adoption of modern lightweight virtualization often comes with new threats and network vulnerabilities. This paper seeks to assess this with a different approach studying the behavior of a testbed built with tools such as Kernel-Based Virtual Machine (KVM), Linux Containers (LXC) and Docker, by performing stress tests within a platform where students experiment simultaneously with cyber-attacks, and thus observe the impact on the campus network and also find the best solution for cyber-security learning. Interesting outcomes can be found in the literature comparing these technologies. It is, however, difficult to find results of the effects on the global network where experiments are carried out. Our work shows that other physical hosts and the faculty network were impacted while performing these trials. The problems found are discussed, as well as security solutions and the adoption of new network policies.

Keywords: containerization, containers, cybersecurity, cyberattacks, isolation, performance, virtualization, virtual machines

Procedia PDF Downloads 139
6521 Development of a Robust Protein Classifier to Predict EMT Status of Cervical Squamous Cell Carcinoma and Endocervical Adenocarcinoma (CESC) Tumors

Authors: ZhenlinJu, Christopher P. Vellano, RehanAkbani, Yiling Lu, Gordon B. Mills

Abstract:

The epithelial–mesenchymal transition (EMT) is a process by which epithelial cells acquire mesenchymal characteristics, such as profound disruption of cell-cell junctions, loss of apical-basolateral polarity, and extensive reorganization of the actin cytoskeleton to induce cell motility and invasion. A hallmark of EMT is its capacity to promote metastasis, which is due in part to activation of several transcription factors and subsequent downregulation of E-cadherin. Unfortunately, current approaches have yet to uncover robust protein marker sets that can classify tumors as possessing strong EMT signatures. In this study, we utilize reverse phase protein array (RPPA) data and consensus clustering methods to successfully classify a subset of cervical squamous cell carcinoma and endocervical adenocarcinoma (CESC) tumors into an EMT protein signaling group (EMT group). The overall survival (OS) of patients in the EMT group is significantly worse than those in the other Hormone and PI3K/AKT signaling groups. In addition to a shrinkage and selection method for linear regression (LASSO), we applied training/test set and Monte Carlo resampling approaches to identify a set of protein markers that predicts the EMT status of CESC tumors. We fit a logistic model to these protein markers and developed a classifier, which was fixed in the training set and validated in the testing set. The classifier robustly predicted the EMT status of the testing set with an area under the curve (AUC) of 0.975 by Receiver Operating Characteristic (ROC) analysis. This method not only identifies a core set of proteins underlying an EMT signature in cervical cancer patients, but also provides a tool to examine protein predictors that drive molecular subtypes in other diseases.

Keywords: consensus clustering, TCGA CESC, Silhouette, Monte Carlo LASSO

Procedia PDF Downloads 457
6520 Extracellular Phytase from Lactobacillus fermentum spp KA1: Optimization of Enzyme Production and Its Application for Improving the Nutritional Quality of Rice Bran

Authors: Neha Sharma, Kanthi K. Kondepudi, Naveen Gupta

Abstract:

Phytases are phytate specific phosphatases catalyzing the step-wise dephosphorylation of phytate, which acts as an anti-nutritional factor in food due to its strong binding capacity to minerals. In recent years microbial phytases have been explored for improving nutritional quality of food. But the major limitation is acceptability of phytases from these microorganisms. Therefore, efforts are being made to isolate organisms which are generally regarded as safe for human consumption such as Lactic Acid Bacteria (LAB). Phytases from these organisms will have an edge over other phytase sources due to its probiotic attributes. Only few LAB have been reported to give phytase activity that too is generally seen as intracellular. LAB producing extracellular phytase will be more useful as it can degrade phytate more effectively. Moreover, enzyme from such isolate will have application in food processing also. Only few species of Lactobacillus producing extracellular phytase have been reported so far. This study reports the isolation of a probiotic strain of Lactobacillus fermentum spp KA1 which produces extracellular phytase. Conditions for the optimal production of phytase have been optimized and the enzyme production resulted in an approximately 13-fold increase in yield. The phytate degradation potential of extracellular phytase in rice bran has been explored and conditions for optimal degradation were optimized. Under optimal conditions, there was 43.26% release of inorganic phosphate and 6.45% decrease of phytate content.

Keywords: Lactobacillus, phytase, phytate reduction, rice bran

Procedia PDF Downloads 183
6519 Health Assessment and Disorders of External Respiration Function among Physicians

Authors: A. G. Margaryan

Abstract:

Aims and Objectives: Assessment of health status and detection disorders of external respiration functions (ERF) during preventative medical examination among physicians of Armenia. Subjects and Methods: Overall, fifty-nine physicians (17 men and 42 women) were examined and spirometry was carried out. The average age of the physicians was 50 years old. The studies were conducted on the Micromedical MicroLab 3500 Spirometer. Results: 25.4% among 59 examined physicians are overweight; 22.0% of them suffer from obesity. Two physicians are currently smokers. About half of the examined physicians (50.8%) at the time of examination were diagnosed with some diseases and had different health-related problems (excluding the problems related to vision and hearing). FVC was 2.94±0.1, FEV1 – 2.64±0.1, PEF – 329.7±19.9, and FEV1%/FVC – 89.7±1.3. Pathological changes of ERF are identified in 23 (39.0%) cases. 28.8% of physicians had first degree of restrictive disorders, 3.4% – first degree of combined obstructive/ restrictive disorders, 6.8% – second degree of combined obstructive/ restrictive disorders. Only three physicians with disorders of the ERF were diagnosed with chronic bronchitis and bronchial asthma. There were no statistically significant changes in ERF depending on the severity of obesity (P> 0.05). Conclusion: The study showed the prevalence of ERF among physicians, observing mainly mild and moderate changes in ERF parameters.

Keywords: Armenia, external respiration function, health status, physicians

Procedia PDF Downloads 193
6518 Usability and Biometric Authentication of Electronic Voting System

Authors: Nighat Ayub, Masood Ahmad

Abstract:

In this paper, a new voting system is developed and its usability is evaluated. The main feature of this system is the biometric verification of the voter and then a few easy steps to cast a vote. As compared to existing systems available, e.g dual vote, the new system requires no training in advance. The security is achieved via multiple key concept (another part of this project). More than 100 student voters were participated in the election from University of Malakanad, Chakdara, PK. To achieve the reliability, the voters cast their votes in two ways, i.e. paper based and electronic based voting using our new system. The results of paper based and electronic voting system are compared and it is concluded that the voters cast their votes for the intended candidates on the electronic voting system. The voters were requested to fill a questionnaire and the results of the questionnaire are carefully analyzed. The results show that the new system proposed in this paper is more secure and usable than other systems.

Keywords: e-voting, security, usability, authentication

Procedia PDF Downloads 386
6517 Importance of Ethics in Cloud Security

Authors: Pallavi Malhotra

Abstract:

This paper examines the importance of ethics in cloud computing. In the modern society, cloud computing is offering individuals and businesses an unlimited space for storing and processing data or information. Most of the data and information stored in the cloud by various users such as banks, doctors, architects, engineers, lawyers, consulting firms, and financial institutions among others require a high level of confidentiality and safeguard. Cloud computing offers centralized storage and processing of data, and this has immensely contributed to the growth of businesses and improved sharing of information over the internet. However, the accessibility and management of data and servers by a third party raise concerns regarding the privacy of clients’ information and the possible manipulations of the data by third parties. This document suggests the approaches various stakeholders should take to address various ethical issues involving cloud-computing services. Ethical education and training is key to all stakeholders involved in the handling of data and information stored or being processed in the cloud.

Keywords: IT ethics, cloud computing technology, cloud privacy and security, ethical education

Procedia PDF Downloads 314
6516 Similarities and Differences in Values of Young Women and Their Parents: The Effect of Value Transmission and Value Change

Authors: J. Fryt, K. Pietras, T. Smolen

Abstract:

Intergenerational similarities in values may be effect of value transmission within families or socio-cultural trends prevailing at a specific point in time. According to salience hypothesis, salient family values may be transmitted more frequently. On the other hand, many value studies reveal that generational shift from social values (conservation and self-transcendence) to more individualistic values (openness to change and self-enhancement) suggest that value transmission and value change are two different processes. The first aim of our study was to describe similarities and differences in values of young women and their parents. The second aim was to determine which value similarities may be due to transmission within families. Ninety seven Polish women aged 19-25 and both their mothers and fathers filled in the Portrait Value Questionaire. Intergenerational similarities in values between women were found in strong preference for benevolence, universalism and self-direction as well as low preference for power. Similarities between younger women and older men were found in strong preference for universalism and hedonism as well as lower preference for security and tradition. Young women differed from older generation in strong preference for stimulation and achievement as well as low preference for conformity. To identify the origin of intergenerational similarities (whether they are the effect of value transmission within families or not), we used the comparison between correlations of values in family dyads (mother-daughter, father-daughter) and distribution of correlations in random intergenerational dyads (random mother-daughter, random father-daughter) as well as peer dyads (random daughter-daughter). Values representing conservation (security, tradition and conformity) as well as benevolence and power were transmitted in families between women. Achievement, power and security were transmitted between fathers and daughters. Similarities in openness to change (self-direction, stimulation and hedonism) and universalism were not stronger within families than in random intergenerational and peer dyads. Taken together, our findings suggest that despite noticeable generation shift from social to more individualistic values, we can observe transmission of parents’ salient values such as security, tradition, benevolence and achievement.

Keywords: value transmission, value change, intergenerational similarities, differences in values

Procedia PDF Downloads 421
6515 The Role of Moroccan Salafist Radicalism in Creating Threat to Spain’s Security

Authors: Stanislaw Kosmynka

Abstract:

Although the genesis of the activity of fighting salafist radicalism in Spain dates back to the 80’s, the development of extremism of this kind manifested itself only in the next decade. Its first permanently functioning structures in this country in the second half of 90’s of 20th century came from Algieria and Syria. At the same time it should be emphasized that this distinction is in many dimensions conventional, the more so because they consisted also of immigrants from other coutries of Islam, particularly from Morocco. The paper seeks to understand the radical salafist challenge for Spain in the context of some terrorist networks consisted of immigrants from Morocco. On the eve of the new millennium Moroccan jihadists played an increasingly important role. Although the activity of these groups had for many years mainly logistical and propaganda character, the bomb attack carried out on 11 March 2004 in Madrid constituted an expression of open forms of terrorism, directed against the authorities and society of Spain and reflected the narration of representatives of the trend of the global jihad. The people involved in carrying out that act of violence were to a large extent Moroccan immigrants; also in the following years among the cells of radicals in Spain Moroccans stood out many times. That is why the forms and directions of activity of these extremists in Spain, also after 11th March 2004 and in the actual context of the impact of Islamic State, are worth presenting. The paper is focused on threats to the security of Spain and the region and remains connected with the issues of mutual relations of the society of a host country with immigrant communities which to a large degree come from this part of Maghreb.

Keywords: jihadi terrorism, Morocco, radical salafism, security, Spain, terrorist cells, threat

Procedia PDF Downloads 518
6514 IT and Security Experts' Innovation and Investment Front for IT-Entrepreneurship in Pakistan

Authors: Ahmed Mateen, Zhu Qingsheng, Muhammad Awais, Muhammad Yahya Saeed

Abstract:

This paper targets the rising factor of entrepreneurship innovation, which lacks in Pakistan as compared to the other countries or the regions like China, India, and Malaysia, etc. This is an exploratory and explanatory study. Major aspects have identified as the direction for the policymakers while highlighting the issues in true spirit. IT needs to be considered not only as a technology but also as itself growing as a new community. IT management processes are complex and broad, so generally requires extensive attention to the collective aspects of human variables, capital and technology. In addition, projects tend to have a special set of critical success factors, and if these are processed and given attention, it will improve the chances of successful implementation. This is only possible with state of the art intelligent decision support systems and accumulating IT staff to some extent in decision processes. This paper explores this issue carefully and discusses six issues to observe the implemented strength and possible enhancement.

Keywords: security and defense forces, IT-incentives, big IT-players, IT-entrepreneurial-culture

Procedia PDF Downloads 209
6513 A Modified QuEChERS Method Using Activated Carbon Fibers as r-DSPE Sorbent for Sample Cleanup: Application to Pesticides Residues Analysis in Food Commodities Using GC-MS/MS

Authors: Anshuman Srivastava, Shiv Singh, Sheelendra Pratap Singh

Abstract:

A simple, sensitive and effective gas chromatography tandem mass spectrometry (GC-MS/MS) method was developed for simultaneous analysis of multi pesticide residues (organophosphate, organochlorines, synthetic pyrethroids and herbicides) in food commodities using phenolic resin based activated carbon fibers (ACFs) as reversed-dispersive solid phase extraction (r-DSPE) sorbent in modified QuEChERS (Quick Easy Cheap Effective Rugged Safe) method. The acetonitrile-based QuEChERS technique was used for the extraction of the analytes from food matrices followed by sample cleanup with ACFs instead of traditionally used primary secondary amine (PSA). Different physico-chemical characterization techniques such as Fourier transform infrared spectroscopy, scanning electron microscopy, X-ray diffraction and Brunauer-Emmet-Teller surface area analysis were employed to investigate the engineering and structural properties of ACFs. The recovery of pesticides and herbicides was tested at concentration levels of 0.02 and 0.2 mg/kg in different commodities such as cauliflower, cucumber, banana, apple, wheat and black gram. The recoveries of all twenty-six pesticides and herbicides were found in acceptable limit (70-120%) according to SANCO guideline with relative standard deviation value < 15%. The limit of detection and limit of quantification of the method was in the range of 0.38-3.69 ng/mL and 1.26 -12.19 ng/mL, respectively. In traditional QuEChERS method, PSA used as r-DSPE sorbent plays a vital role in sample clean-up process and demonstrates good recoveries for multiclass pesticides. This study reports that ACFs are better in terms of removal of co-extractives in comparison of PSA without compromising the recoveries of multi pesticides from food matrices. Further, ACF replaces the need of charcoal in addition to the PSA from traditional QuEChERS method which is used to remove pigments. The developed method will be cost effective because the ACFs are significantly cheaper than the PSA. So the proposed modified QuEChERS method is more robust, effective and has better sample cleanup efficiency for multiclass multi pesticide residues analysis in different food matrices such as vegetables, grains and fruits.

Keywords: QuEChERS, activated carbon fibers, primary secondary amine, pesticides, sample preparation, carbon nanomaterials

Procedia PDF Downloads 259
6512 Analyzing the Contamination of Some Food Crops Due to Mineral Deposits in Ondo State, Nigeria

Authors: Alexander Chinyere Nwankpa, Nneka Ngozi Nwankpa

Abstract:

In Nigeria, the Federal government is trying to make sure that everyone has access to enough food that is nutritiously adequate and safe. But in the southwest of Nigeria, notably in Ondo State, the most valuable minerals such as oil and gas, bitumen, kaolin, limestone talc, columbite, tin, gold, coal, and phosphate are abundant. Therefore, some regions of Ondo State are now linked to large quantities of natural radioactivity as a result of the mineral presence. In this work, the baseline radioactivity levels in some of the most important food crops in Ondo State were analyzed, allowing for the prediction of probable radiological health impacts. To this effect, maize (Zea mays), yam (Dioscorea alata) and cassava (Manihot esculenta) tubers were collected from the farmlands in the State because they make up the majority of food's nutritional needs. Ondo State was divided into eight zones in order to provide comprehensive coverage of the research region. At room temperature, the maize (Zea mays), yam (Dioscorea alata), and cassava (Manihot esculenta) samples were dried until they reached a consistent weight. They were pulverized, homogenized, and 250 g packed in a 1-liter Marinelli beaker and kept for 28 days to achieve secular equilibrium. The activity concentrations of Radium-226 (Ra-226), Thorium-232 (Th-232), and Potassium-40 (K-40) were determined in the food samples using Gamma-ray spectrometry. Firstly, the Hyper Pure Germanium detector was calibrated using standard radioactive sources. The gamma counting, which lasted for 36000s for each sample, was carried out in the Centre for Energy Research and Development, Obafemi Awolowo University, Ile-Ife, Nigeria. The mean activity concentration of Ra-226, Th-232 and K-40 for yam were 1.91 ± 0.10 Bq/kg, 2.34 ± 0.21 Bq/kg and 48.84 ± 3.14 Bq/kg, respectively. The content of the radionuclides in maize gave a mean value of 2.83 ± 0.21 Bq/kg for Ra-226, 2.19 ± 0.07 Bq/kg for Th-232 and 41.11 ± 2.16 Bq/kg for K-40. The mean activity concentrations in cassava were 2.52 ± 0.31 Bq/kg for Ra-226, 1.94 ± 0.21 Bq/kg for Th-232 and 45.12 ± 3.31 Bq/kg for K-40. The average committed effective doses in zones 6-8 were 0.55 µSv/y for the consumption of yam, 0.39 µSv/y for maize, and 0.49 µSv/y for cassava. These values are higher than the annual dose guideline of 0.35 µSv/y for the general public. Therefore, the values obtained in this work show that there is radiological contamination of some foodstuffs consumed in some parts of Ondo State. However, we recommend that systematic and appropriate methods also need to be established for the measurement of gamma-emitting radionuclides since these constitute important contributors to the internal exposure of man through ingestion, inhalation, or wound on the body.

Keywords: contamination, environment, radioactivity, radionuclides

Procedia PDF Downloads 90
6511 Food Supply Chain Optimization: Achieving Cost Effectiveness Using Predictive Analytics

Authors: Jayant Kumar, Aarcha Jayachandran Sasikala, Barry Adrian Shepherd

Abstract:

Public Distribution System is a flagship welfare programme of the Government of India with both historical and political significance. Targeted at lower sections of society,it is one of the largest supply chain networks in the world. There has been several studies by academics and planning commission about the effectiveness of the system. Our study focuses on applying predictive analytics to aid the central body to keep track of the problem of breach of service level agreement between the two echelons of food supply chain. Each shop breach is leading to a potential additional inventory carrying cost. Thus, through this study, we aim to show that aided with such analytics, the network can be made more cost effective. The methods we illustrate in this study are applicable to other commercial supply chains as well.

Keywords: PDS, analytics, cost effectiveness, Karnataka, inventory cost, service level JEL classification: C53

Procedia PDF Downloads 519
6510 Microfluidic Synthesis of Chlorophyll Extraction–Loaded PCL Composite Microparticles Developed as Health Food

Authors: Ching-Ju Hsiao, Mao-Chen Huang, Pei-Fan Chen, Ruo-Yun Chung, Jiun-Hua Chou, Chih-Hui Yang, Keng-Shiang Huang, Jei-Fu Shaw

Abstract:

Chlorophyll has many benefits for human body. It is known to improve the health of the circulatory, digestive, immune and detoxification systems of the body. However, Chl can’t be preserved at the environment of high temperature and light exposure for a long time due to it is chemical structure is easily degradable. This characteristic causes that human body is difficult to absorb Chl effective components. In order to solve this problem, we utilize polycaprolactone (PCL) polymer encapsulation technology to increase the stability of Chl. In particular, we also established a microfluidic platform provide the control of composite beads diameter. The new composite beads is potential to be a health food. Result show that Chl effective components via the microfludic platform can be encapsulated effectively and still preserve its effective components.

Keywords: chlorophyll, PCL, PVA, microfluidic

Procedia PDF Downloads 539
6509 A Theoretical Analysis on the Controversial Issue of Teaching Professional in the Institutionalized Perspective

Authors: Tien-Hui Chiang, Q. Zhou

Abstract:

For structural-functionalism, one set of the common traits of traditional professionals, such as medical practitioners and engineers, can be viewed as the criteria for evaluating whether a given occupation has the right of claiming its professional status or not. Under the influence of this professionalism, teaching practitioners have devoted themselves to acquiring this right as evidenced by the fact that initial training has been extended to even the level of postgraduate. However, for interactionalists, professionalism adopts a predetermined assumption so that it ignores the dynamic nature of social development, which is able to regulate the professional status of a given occupation. Such an interactive approach highlights the concept of professionalization. Furthermore, Marxists argue that structural-functionalists have ignored the impact of proletarianization on the white collar. While professionals gradually lose their control over their practices, the title of profession functions as a self-regulated icon that prevents them from collaborating with the working class and, in turn, creates the ideology of de-politicization sustaining the interests of the ruling class. This article adopts a theoretical analysis on these contradictory arguments. It argues that these criticisms neglect the influence of the institutionalized value system on social operation, which is the core element in sustaining the notion of the profession.

Keywords: teaching profession, professionalism, professionalization, proletarianialization, institutionalized value system

Procedia PDF Downloads 330