Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6704

Search results for: household food security

4604 Computational Chemical-Composition of Carbohydrates in the Context of Healthcare Informatics

Authors: S. Chandrasekaran, S. Nandita, M. Shivathmika, Srikrishnan Shivakumar

Abstract:

The objective of the research work is to analyze the computational chemical-composition of carbohydrates in the context of healthcare informatics. The computation involves the representation of complex chemical molecular structure of carbohydrate using graph theory and in a deployable Chemical Markup Language (CML). The parallel molecular structure of the chemical molecules with or without other adulterants for the sake of business profit can be analyzed in terms of robustness and derivatization measures. The rural healthcare program should create awareness in malnutrition to reduce ill-effect of decomposition and help the consumers to know the level of such energy storage mixtures in a quantitative way. The earlier works were based on the empirical and wet data which can vary from time to time but cannot be made to reuse the results of mining. The work is carried out on the quantitative computational chemistry on carbohydrates to provide a safe and secure right to food act and its regulations.

Keywords: carbohydrates, chemical-composition, chemical markup, robustness, food safety

Procedia PDF Downloads 378
4603 Issues and Challenges of Tribals in India: A Case of Andhra Pradesh

Authors: P. Lalitha

Abstract:

Economic and social empowerment and educational upliftment of socially disadvantaged groups and marginalized sections of society is necessary for achieving faster and more inclusive development. Programmes are being implemented through states, government’s apex corporations, and NGOs for the up-liftment of disadvantaged and marginalized sections of society. As per the primary data collected, a majority of tribal land holdings (60%) are below 2 hectare and only 5% are above 10 hectares. However, the ownership of large holdings does not give a distinct advantage unless the land is of good quality. There are areas in which even large holdings beyond 5 hectares are not sufficient to meet the food necessity of the tribal families all-round the year. Some initiatives e.g. grain-golas, jhum cultivation, wadi project, Joint Forest Management(JFM), enhancing Livelihood and Health through Traditional Knowledge Management, Associating Individual Rural Volunteers (IRVs) in SHG Bank Linkage Programme have been taken in various tribal areas of the country.

Keywords: tribals, unemployment, health, food

Procedia PDF Downloads 293
4602 The Lethal Autonomy and Military Targeting Process

Authors: Serdal Akyüz, Halit Turan, Mehmet Öztürk

Abstract:

The future security environment will have new battlefield and enemies. The boundaries of battlefield and the identity of enemies cannot be noticed easily. The politicians may not want to lose their soldiers in very risky operations. This approach will pave the way for smart machines like war robots and new drones. These machines will have the decision-making ability and act simultaneously. This ability can change the military targeting process. Military targeting process (MTP) benefits from a wide scope of lethal and non-lethal weapons to reach an intended end-state. This process is now managed by people but in the future smart machines can do it by themselves. At first sight, this development seems useful for humanity owing to decrease the casualties in war. Using robots -which can decide, detect, deliver and asses without human support- for homeland security and against terrorist has very crucial risks and threats. Besides, it can decrease the havoc but also increase the collateral damages. This paper examines the current use of smart war machines, military targeting process and presents a new approach to MTP from lethal autonomy concept's point of view.

Keywords: the autonomous weapon systems, the lethal autonomy, military targeting process (MTP)

Procedia PDF Downloads 431
4601 Blockchain in Saudi E-Government: A Systematic Literature Review

Authors: Haitham Assiri, Priyadarsi Nanda

Abstract:

The world is gradually entering the fourth industrial revolution. E-Government services are scaling government operations across the globe. However, as promising as an e-Government system would be, it is also susceptible to malicious attacks if not properly secured. This study found out that, in Saudi Arabia, the e-Government website, Yesser is vulnerable to external attacks. Obviously, this can lead to a breach of data integrity and privacy. In this paper, a Systematic Literature Review was conducted to explore possible ways the Kingdom of Saudi Arabia can take necessary measures to strengthen its e-Government system using Blockchain. Blockchain is one of the emerging technologies shaping the world through its applications in finance, elections, healthcare, etc. It secures systems and brings more transparency. A total of 28 papers were selected for this SLR, and 19 of the papers significantly showed that blockchain could enhance the security and privacy of Saudi’s e-government system. Other papers also concluded that blockchain is effective, albeit with the integration of other technologies like IoT, AI and big data. These papers have been analysed to sieve out the findings and set the stage for future research into the subject.

Keywords: blockchain, data integrity, e-government, security threats

Procedia PDF Downloads 253
4600 PUF-Based Lightweight Iot Secure Authentication Chip Design

Authors: Wenxuan Li, Lei Li, Jin Li, Yuanhang He

Abstract:

This paper designed a secure chip for IoT communication security integrated with the PUF-based firmware protection scheme. Then, the Xilinx Kintex-7 and STM-32 were used for the prototype verification. Firmware protection worked well on FPGA and embedded platforms. For the ASIC implementation of the PUF module, contact PUF is chosen. The post-processing method and its improvement are analyzed with emphasis. This paper proposed a more efficient post-processing method for contact PUF named SXOR, which has practical value for realizing lightweight security modules in IoT devices. The analysis was carried out under the hypothesis that the contact holes are independent and combine the existing data in the open literature. The post-processing effects of SXOR and XOR are basically the same under the condition that the proposed post-processing circuit occupies only 50.6% of the area of XOR. The average Hamming weight of the PUF output bit sequence obtained by the proposed post-processing method is 0.499735, and the average Hamming weight obtained by the XOR-based post-processing method is 0.499999.

Keywords: PUF, IoT, authentication, secure communication, encryption, XOR

Procedia PDF Downloads 147
4599 Exploring the Determinants of Boko Haram Terrorism in Nigerian Security Systems and Economy

Authors: Abara Onu, Augustine Mina Ephraim, Emmanuel Teidi

Abstract:

Terrorism has been a major challenge and is so dare to the Nigerian government in recent times. The actions and activities of the Islamic sect known as Boko Haram had led to enormous loss of lives and properties in the country, mostly the Northern part of Nigeria. Some of these activities entails bombings, suicide attacks, intimidations, sporadic gunfire of the unarmed, blameless and innocent Nigerians, burning of police stations and churches, kidnappings, raping of school girls and women. Nigeria has also been included amongst one of the terrorist countries of the world. This has serious implications for the development of Nigerian economy. Although, Nigeria had made several worried hard work to deal with these challenges masqueraded by terrorism and insecurity in the country but the rate of insurgency and insecurity is still worrisome. The study looks at exploring the determinants of Boko Haram terrorism in Nigerian security systems and economy. Data used for the study work was from questionnaire administered, using Analysis of Variance (ANOVA) method to analyse the data. The result shows that Ideology and funding are significant basic factors that propelled the Boko Haram group in Nigeria. The Boko Haram disaster poses a significant threat to Nigeria’s economy and the military is the best option and solution in tackling the Boko Haram menace in Nigeria. The work x-rayed the following recommendations; government should declare war on terrorism and as well seek support and cooperation from international communities who in time or the other might have faced with this kind ugly experience and challenge and were able to tackle it. Nigerian Military needs to be more empowered with high dangerous weapons to combat the insurgency as well as beef up security across the Country to curb the threats.

Keywords: terrorism, economy, Boko Haram, Nigeria

Procedia PDF Downloads 266
4598 Accessibility of Social Justice through Social Security in Indian Organisations: Analysis Based on Workforce

Authors: Neelima Rashmi Lakra

Abstract:

India was among one of the highly developed economy up to 1850 due to its cottage industries. During the end of the 18th century, modern industrial enterprises began with the first cotton mill in Bombay, the jute mill near Calcutta and the coal mine in Raniganj. This was counted as the real beginning of industry in 1854 in India. Prior to this period people concentrated only to agriculture, menial service or handicraft, and the introduction of industries exposed them to the disciplines of factory which was very tedious for them. With increasing number of factories been setup adding on to mining and introduction of railway, World War Period (1914-19), Second World War Period (1939-45) and the Great Depression (1929-33) there were visible change in the nature of work for the people, which resulted in outburst of strike for various reasons in these factories. Here, with India’s independence there was emergence of public sector industries and labour legislations were introduced. Meanwhile, trade unions came to notice to the rescue of the oppressed but failed to continue till long. Soon after, with the New Economic Policy organisations came across to face challenges to perform their best, where social justice for the workmen was in question. On these backdrops, studies were found discussing the central human capabilities which could be addressed through Social Security schemes. Therefore, this study was taken up to look at the reforms and legislations mainly meant for the welfare of the labour. This paper will contribute to the large number of Indian population who are serving in public sectors in India since the introduction of industries and will complement the issue of social justice through social security measures among this huge crowd serving the nation. The objectives of the study include; to find out what labour Legislations have already been existing in India, the role of Trade Union Movement, to look at the effects of New Economic Policy on these reforms and its effects and measures taken for the workforce employed in the public sectors and finally, if these measures fulfil the social justice aspects for the larger society on whole. The methodology followed collection of data from books, journal articles, reports, company reports and manuals focusing mainly on Indian studies and the data was analysed following content analysis method. The findings showed the measures taken for Social Security, but there were also reflections of very few particular additions or amendments to these Acts and provisions with the onset of New Liberalisation Policy. Therefore, the study concluded examining the social justice aspects in the context of a developing economy and discussing the recommendations.

Keywords: public sectors, social justice, social security schemes, trade union movement

Procedia PDF Downloads 454
4597 ChaQra: A Cellular Unit of the Indian Quantum Network

Authors: Shashank Gupta, Iteash Agarwal, Vijayalaxmi Mogiligidda, Rajesh Kumar Krishnan, Sruthi Chennuri, Deepika Aggarwal, Anwesha Hoodati, Sheroy Cooper, Ranjan, Mohammad Bilal Sheik, Bhavya K. M., Manasa Hegde, M. Naveen Krishna, Amit Kumar Chauhan, Mallikarjun Korrapati, Sumit Singh, J. B. Singh, Sunil Sud, Sunil Gupta, Sidhartha Pant, Sankar, Neha Agrawal, Ashish Ranjan, Piyush Mohapatra, Roopak T., Arsh Ahmad, Nanjunda M., Dilip Singh

Abstract:

Major research interests on quantum key distribution (QKD) are primarily focussed on increasing 1. point-to-point transmission distance (1000 Km), 2. secure key rate (Mbps), 3. security of quantum layer (device-independence). It is great to push the boundaries on these fronts, but these isolated approaches are neither scalable nor cost-effective due to the requirements of specialised hardware and different infrastructure. Current and future QKD network requires addressing different sets of challenges apart from distance, key rate, and quantum security. In this regard, we present ChaQra -a sub-quantum network with core features as 1) Crypto agility (integration in the already deployed telecommunication fibres), 2) Software defined networking (SDN paradigm for routing different nodes), 3) reliability (addressing denial-of-service with hybrid quantum safe cryptography), 4) upgradability (modules upgradation based on scientific and technological advancements), 5) Beyond QKD (using QKD network for distributed computing, multi-party computation etc). Our results demonstrate a clear path to create and accelerate quantum secure Indian subcontinent under the national quantum mission.

Keywords: quantum network, quantum key distribution, quantum security, quantum information

Procedia PDF Downloads 62
4596 An Integrated Solid Waste Management Strategy for Semi-Urban and Rural Areas of Pakistan

Authors: Z. Zaman Asam, M. Ajmal, R. Saeed, H. Miraj, M. Muhammad Ahtisham, B. Hameed, A. -Sattar Nizami

Abstract:

In Pakistan, environmental degradation and consequent human health deterioration has rapidly accelerated in the past decade due to solid waste mismanagement. As the situation worsens with time, establishment of proper waste management practices is urgently needed especially in semi urban and rural areas of Pakistan. This study uses a concept of Waste Bank, which involves a transfer station for collection of sorted waste fractions and its delivery to the targeted market such as recycling industries, biogas plants, composting facilities etc. The management efficiency and effectiveness of Waste Bank depend strongly on the proficient sorting and collection of solid waste fractions at household level. However, the social attitude towards such a solution in semi urban/rural areas of Pakistan demands certain prerequisites to make it workable. Considering these factors the objectives of this study are to: [A] Obtain reliable data about quantity and characteristics of generated waste to define feasibility of business and design factors, such as required storage area, retention time, transportation frequency of the system etc. [B] Analyze the effects of various social factors on waste generation to foresee future projections. [C] Quantify the improvement in waste sorting efficiency after awareness campaign. We selected Gujrat city of Central Punjab province of Pakistan as it is semi urban adjoined by rural areas. A total of 60 houses (20 from each of the three selected colonies), belonging to different social status were selected. Awareness sessions about waste segregation were given through brochures and individual lectures in each selected household. Sampling of waste, that households had attempted to sort, was then carried out in the three colored bags that were provided as part of the awareness campaign. Finally, refined waste sorting, weighing of various fractions and measurement of dry mass was performed in environmental laboratory using standard methods. It was calculated that sorting efficiency of waste improved from 0 to 52% as a result of the awareness campaign. The generation of waste (dry mass basis) on average from one household was 460 kg/year whereas per capita generation was 68 kg/year. Extrapolating these values for Gujrat Tehsil, the total waste generation per year is calculated to be 101921 tons dry mass (DM). Characteristics found in waste were (i) organic decomposable (29.2%, 29710 tons/year DM), (ii) recyclables (37.0%, 37726 tons/year DM) that included plastic, paper, metal and glass, and (iii) trash (33.8%, 34485 tons/year DM) that mainly comprised of polythene bags, medicine packaging, pampers and wrappers. Waste generation was more in colonies with comparatively higher income and better living standards. In future, data collection for all four seasons and improvements due to expansion of awareness campaign to educational institutes will be quantified. This waste management system can potentially fulfill vital sustainable development goals (e.g. clean water and sanitation), reduce the need to harvest fresh resources from the ecosystem, create business and job opportunities and consequently solve one of the most pressing environmental issues of the country.

Keywords: integrated solid waste management, waste segregation, waste bank, community development

Procedia PDF Downloads 146
4595 Decision Making Regarding Spouse Selection and Women's Autonomy in India: Exploring the Linkage

Authors: Nivedita Paul

Abstract:

The changing character of marriage be it arranged marriage, love marriage, polygamy, informal unions, all signify different gender relations in everyday lives. Marriages in India are part and parcel of the kinship and cultural practices. Arranged marriage is still the dominant form of marriage where spouse selection is the initiative and decision of the parents; but its form is changing, as women are now actively participating in spouse selection but with parental consent. Spouse selection related decision making is important because marriage as an institution brings social change and gender inequality; especially in a women’s life as marriages in India are mostly patrilocal. Moreover, the amount of say in spouse selection can affect a woman’s reproductive rights, domestic violence issues, household resource allocation, communication possibilities with the spouse/husband, marital life, etc. The present study uses data from Indian Human Development Survey II (2011-12) which is a nationally representative multitopic survey that covers 41,554 households. Currently, married women of age group 15-49 in their first marriage; whose year of marriage is from 1970s to 2000s have been taken for the study. Based on spouse selection experiences, the sample of women has been divided into three marriage categories-self, semi and family arranged. Women in self arranged or love marriage is the sole decision maker in choosing the partner, in semi arranged marriage or arranged marriage with consent both parents and women together take the decision, whereas in family arranged or arranged marriage without consent only parents take the decision. The main aim of the study is to find the relationship between spouse selection experiences and women’s autonomy in India. Decision making in economic matters, child and health related decision making, mobility and access to resources are taken to be proxies of autonomy. Method of ordinal regression has been used to find the relationship between spouse selection experiences and autonomy after marriage keeping other independent variables as control factors. Results show that women in semi arranged marriage have more decision making power regarding financial matters of the household, health related matters, mobility and accessibility to resources, when compared to women in family, arranged marriages. For freedom of movement and access to resources women in self arranged marriage have the highest say or exercise greatest power. Therefore, greater participation of women (even though not absolute control) in spouse selection may lead to greater autonomy after marriage.

Keywords: arranged marriage, autonomy, consent, spouse selection

Procedia PDF Downloads 153
4594 A New Block Cipher for Resource-Constrained Internet of Things Devices

Authors: Muhammad Rana, Quazi Mamun, Rafiqul Islam

Abstract:

In the Internet of Things (IoT), many devices are connected and accumulate a sheer amount of data. These Internet-driven raw data need to be transferred securely to the end-users via dependable networks. Consequently, the challenges of IoT security in various IoT domains are paramount. Cryptography is being applied to secure the networks for authentication, confidentiality, data integrity and access control. However, due to the resource constraint properties of IoT devices, the conventional cipher may not be suitable in all IoT networks. This paper designs a robust and effective lightweight cipher to secure the IoT environment and meet the resource-constrained nature of IoT devices. We also propose a symmetric and block-cipher based lightweight cryptographic algorithm. The proposed algorithm increases the complexity of the block cipher, maintaining the lowest computational requirements possible. The proposed algorithm efficiently constructs the key register updating technique, reduces the number of encryption rounds, and adds a new layer between the encryption and decryption processes.

Keywords: internet of things, cryptography block cipher, S-box, key management, security, network

Procedia PDF Downloads 118
4593 Merchants’ Attitudes towards Tourism Development in Mahane Yehuda Market: A Case Study

Authors: Rotem Mashkov, Noam Shoval

Abstract:

In an age when a tourist’s gaze is more focused on the daily lives of locals, it is evident that local food markets are being rediscovered. Traditional urban markets succeed in reinventing themselves as a space for consumption, recreation, and culture, enabling authentic experiences and interpersonal interactions with the local culture. Alongside this, the pressure of tourism development may result in commercialization and retail gentrification to the point of losing the sense of local identity. The issue of finding a balance between tourism development and the preservation of unique local features is at the heart of this study and is being tested using the case of the Mahane Yehuda market in Jerusalem. The research question—how merchants respond to tourism development in the Mahane Yehuda food market— focuses on local traders, a group of players who are usually absent from the research arenas, although they influence tourism development as well as influenced by it. Three main research methods were integrated into this study. The first two methods, a survey of articles survey and comparative mapping of the business mix, were used to characterize the changes in the Mahane Yehuda market both consciously and physically. The third research method, involving in-depth interviews with merchants, was used to examine the traders' attitudes and responses to tourism development. The findings indicate that there has been a turnaround in the market image over the past decade and a half. Additionally, there has been a significant physical change in the business mix, reflected by a decline of 15% in the number of stalls selling food products and delicacies. The data from the interviews on the traders’ attitudes towards tourism development were inconclusive; there were disagreements among the traders about the economic contribution of tourism development in relation to their dependence on the tourism industry. However, there was a consensus on the need for authentic elements in the marketplace. The findings of the study also indicate a strong link between the merchants’ response to tourism development and their stall ownership status as the merchant could exercise their position in various ways depending on the possession type.

Keywords: business mix, Jerusalem, local food markets, Mahane Yehuda market, merchants’ attitude, ownership status, retail gentrification, tourism development, traditional urban markets

Procedia PDF Downloads 140
4592 Effect of Inflorescence Removal and Earthing-Up Times on Growth and Yield of Potato (Solanum tuberosum L.) at Jimma Southwestern Ethiopia

Authors: Dessie Fisseha, Derbew Belew, Ambecha Olika

Abstract:

Potato is a high-potential food security crop in Ethiopia. However, the yield and productivity of the crop have been far below the world average. This is due to several factors, including appropriate agronomic practices, such as time of earthing-up and inflorescence management. A field experiment was conducted at Jimma, Southwest Ethiopia, during 2016/17 under irrigation to determine the effect of time of earthing-up and inflorescence removal on the growth, yield, and quality of potatoes. The treatments consisted of a time of earthing-up (no earthing-up, earthing-up at 15, 30, and 45 days after complete plant emergence) and inflorescence removal (inflorescence removed and not removed). Potato variety (Belete) was used for this experiment. A 2x4 factorial experiment was laid out with three replications. Data collected on the growth, yield, and quality components of potatoes were analyzed using SAS Version 9.3 statistical software. Inflorescence removal affected the majority of the growth and yield parameters, while the time of earthing-up affected all growth, yield, and quality (green tuber number) parameters. Earthing-up at 15 days in combination with inflorescence removal (at 60 days after complete plant emergence) gave better plant growth and maximum tuber yield of the Belete potato variety under irrigated conditions. Since the current research was conducted at one location, in one season, and with one potato cultivar (Belete), it would be advisable to repeat the experiment so as to arrive at a final conclusion and subsequent recommendation.

Keywords: Belete, earthing-up, inflorescence, yield

Procedia PDF Downloads 80
4591 Epidemiological-Anatomopathological-Immunohistochemical Profile of Gastric Cancer throughout Eastern Algeria

Authors: S. Tebibel, R. L. Bouchouka, C. Mechati, S. Messaoudi

Abstract:

The stomach cancer or gastric cancer is an aggressive cancer with a significant geographic disparity. The decrease in frequency is attributed to refrigeration, which has several beneficial consequences, increased consumption of fresh fruits and vegetables, reduced consumption of salt, which was widely used as a food preservative, and less contamination of food by carcinogenic compounds. The infection with Helicobacter pylori is responsible for progressive inflammatory changes in the gastric mucosa usually evolving into stomach cancer in 80% of cases. Methodology: This epidemiological and analytical study concerns 65 patients (46 men and 19 women) with gastric adenocarcinomas with an average age of 56.5 years and a male predominance with a sex ratio of 2.4. Results and Discussion: In this series, the clinical symptoms are dominated by epigastralgia (72.31%), vomiting (27,69%), and slimming (24,62%). The FOGD (Oeso-Gastro Duodenal Fibroscopy) performed in the 65 patients revealed a predominance of the antro-pyloric localization in 19 cases (i.e., 29.23%) and anulcerative budding appearance in 33 subjects (50,77%). Histologically, the moderately differentiated adenocarcinoma is found in 30.77% of patients, followed by well differentiated adenocarcinoma with 26.15% of patients. The immunohistochemical study revealed a positive labeling of half of the T cells by anti-CD3 AC, and a positive labeling of anti-CD20 AC in a diffuse and intense manner, with the presence of CD20-positive lymphoepithelial lesions compatible with CD20 a low grade MALT non-Hodgkin's lymphoma. Conclusion: This framework of analysis revealed some risk factors for gastric cancer, such as food, hygiene, Helicobacter pylori infection, smoking and family history.

Keywords: cancer, Helicobacter pylori, immunohistochemistry, stomach

Procedia PDF Downloads 130
4590 Securing Health Monitoring in Internet of Things with Blockchain-Based Proxy Re-Encryption

Authors: Jerlin George, R. Chitra

Abstract:

The devices with sensors that can monitor your temperature, heart rate, and other vital signs and link to the internet, known as the Internet of Things (IoT), have completely transformed the way we control health. Providing real-time health data, these sensors improve diagnostics and treatment outcomes. Security and privacy matters when IoT comes into play in healthcare. Cyberattacks on centralized database systems are also a problem. To solve these challenges, the study uses blockchain technology coupled with proxy re-encryption to secure health data. ThingSpeak IoT cloud analyzes the collected data and turns them into blockchain transactions which are safely kept on the DriveHQ cloud. Transparency and data integrity are ensured by blockchain, and secure data sharing among authorized users is made possible by proxy re-encryption. This results in a health monitoring system that preserves the accuracy and confidentiality of data while reducing the safety risks of IoT-driven healthcare applications.

Keywords: internet of things, healthcare, sensors, electronic health records, blockchain, proxy re-encryption, data privacy, data security

Procedia PDF Downloads 23
4589 Higher Consumption of White Rice Increase the Risk of Metabolic Syndrome in Adults with Abdominal Obesity

Authors: Zahra Bahadoran, Parvin Mirmiran, Fereidoun Azizi

Abstract:

Background: Higher consumption of white rice has been suggested as a risk factor for development of metabolic abnormalities. In this study we investigated the association between consumption of white rice and the 3-year occurrence of metabolic syndrome (MetS) in adults with and without abdominal obesity. Methods: This longitudinal study was conducted within the framework of the Tehran Lipid and Glucose Study on 1476 adults, aged 19-70 years. Dietary intakes were measured, using a 168-food items validated semi-quantitative food frequency questionnaire at baseline. Biochemical and anthropometric measurements were evaluated at both baseline (2006-2008) and after 3-year follow-up (2009-2011). MetS and its components were defined according to the diagnostic criteria proposed by NCEP ATP III, and the new cutoff points of waist circumference for Iranian adults. Multiple logistic regression models were used to estimate the occurrence of the MetS in each quartile of white rice consumption. Results: The mean age of participants was 37.8±12.3 y, and mean BMI was 26.0±4.5 kg/m2 at baseline. The prevalence of MetS in subjects with abdominal obesity was significantly higher (40.9 vs. 16.2%, P<0.01). There was no significant difference in white rice consumption between the two groups. Mean daily intake of white rice was 93±59, 209±58, 262±60 and 432±224 g/d, in the first to fourth quartiles of white rice, respectively. Stratified analysis by categories of waist circumference showed that higher consumption of white rice was more strongly related to the risk of metabolic syndrome in participants who had abdominal obesity (OR: 2.34, 95% CI:1.14-4.41 vs. OR:0.99, 95% CI:0.60-1.65) Conclusion: We demonstrated that higher consumption of white rice may be a risk for development of metabolic syndrome in adults with abdominal obesity.

Keywords: white rice, abdominal obesity, metabolic syndrome, food science, triglycerides

Procedia PDF Downloads 451
4588 Cybersecurity Protection Structures: The Case of Lesotho

Authors: N. N. Mosola, K. F. Moeketsi, R. Sehobai, N. Pule

Abstract:

The Internet brings increasing use of Information and Communications Technology (ICT) services and facilities. Consequently, new computing paradigms emerge to provide services over the Internet. Although there are several benefits stemming from these services, they pose several risks inherited from the Internet. For example, cybercrime, identity theft, malware etc. To thwart these risks, this paper proposes a holistic approach. This approach involves multidisciplinary interactions. The paper proposes a top-down and bottom-up approach to deal with cyber security concerns in developing countries. These concerns range from regulatory and legislative areas, cyber awareness, research and development, technical dimensions etc. The main focus areas are highlighted and a cybersecurity model solution is proposed. The paper concludes by combining all relevant solutions into a proposed cybersecurity model to assist developing countries in enhancing a cyber-safe environment to instill and promote a culture of cybersecurity.

Keywords: cybercrime, cybersecurity, computer emergency response team, computer security incident response team

Procedia PDF Downloads 163
4587 Modeling and Stability Analysis of Viral Propagation in Wireless Mesh Networking

Authors: Haowei Chen, Kaiqi Xiong

Abstract:

This paper aims to answer how malware will propagate in Wireless Mesh Networks (WMNs) and how communication radius and distributed density of nodes affects the process of spreading. The above analysis is essential for devising network-wide strategies to counter malware. We answer these questions by developing an improved dynamical system that models malware propagation in the area where nodes were uniformly distributed. The proposed model captures both the spatial and temporal dynamics regarding the malware spreading process. Equilibrium and stability are also discussed based on the threshold of the system. If the threshold is less than one, the infected nodes disappear, and if the threshold is greater than one, the infected nodes asymptotically stabilize at the endemic equilibrium. Numerical simulations are investigated about communication radius and distributed density of nodes in WMNs, which allows us to draw various insights that can be used to guide security defense.

Keywords: Bluetooth security, malware propagation, wireless mesh networks, stability analysis

Procedia PDF Downloads 104
4586 Factors Affecting Sense of Community in Residential Communities Case Study: Residential Communities in Tehran, Iran

Authors: Parvin Foroughifar

Abstract:

The concept of sense of community refers to residents’ sense of attachment and commitment to the other residents in a residential community. It is implicitly indicative of the mental image of a physical environment in which the residents enjoy strong social ties. Sense of community, a crucial factor in improving quality of life and social welfare, leads to life satisfaction in a residential community. Despite the important functions of such a notion, few empirical studies, to the best of the authors' knowledge, have been so far carried out in Iran to investigate the effective factors in sharpening the sense of community in residential communities. This survey research examined sense of community in 360 above 20-year old residents of three residential communities in Tehran, Iran using cluster sampling and questionnaire. The study yielded the result that variables of local social ties, social control and trust, sense of security, length of residence, use of public spaces, and mixed land use have a significant relationship with sense of community.

Keywords: sense of community, local social ties, sense of security, public space, residential community, Tehran

Procedia PDF Downloads 197
4585 Development of Terrorist Threat Prediction Model in Indonesia by Using Bayesian Network

Authors: Hilya Mudrika Arini, Nur Aini Masruroh, Budi Hartono

Abstract:

There are more than 20 terrorist threats from 2002 to 2012 in Indonesia. Despite of this fact, preventive solution through studies in the field of national security in Indonesia has not been conducted comprehensively. This study aims to provide a preventive solution by developing prediction model of the terrorist threat in Indonesia by using Bayesian network. There are eight stages to build the model, started from literature review, build and verify Bayesian belief network to what-if scenario. In order to build the model, four experts from different perspectives are utilized. This study finds several significant findings. First, news and the readiness of terrorist group are the most influent factor. Second, according to several scenarios of the news portion, it can be concluded that the higher positive news proportion, the higher probability of terrorist threat will occur. Therefore, the preventive solution to reduce the terrorist threat in Indonesia based on the model is by keeping the positive news portion to a maximum of 38%.

Keywords: Bayesian network, decision analysis, national security system, text mining

Procedia PDF Downloads 395
4584 The Use of TV and the Internet in the Social Context

Authors: Khulood Miliany

Abstract:

This study examines the media habits of young people in Saudi Arabia, in particular their use of the Internet and television in the domestic sphere, and how use of the Internet impacts upon other activities. In order to address the research questions, focus group interviews were conducted with Saudi university students. The study found that television has become a central part of social life within the household where television represents a main source for family time, particularly in Ramadan while the Internet is a solitary activity where it is used in more private spaces. Furthermore, Saudi females were also more likely to have their Internet access monitored and circumscribed by family members, with parents controlling the location and the amount of time spent using the Internet.

Keywords: domestication of technology, internet, social context, television, young people

Procedia PDF Downloads 303
4583 Degradation Study of Food Colorants by SingletOxygen

Authors: A. T. Toci, M. V. B. Zanoni

Abstract:

The advanced oxidation processes have been defined as destructive technologies treatment of wastewater. These involve the formation of powerful oxidizing agents (usually hydroxyl radical .OH) capable of reacting with organic compounds present in wastewater, transforming damaging substances in CO2 and H2O (mineralization) or other innocuous products. However, the photochemical degradation with singlet oxygen has been little explored as oxidative pathway for the treatment of effluents containing food colorants. The molecular oxygen is an effective suppressor of organic molecules in the triplet excited state. One of the possible results of the physical withdrawal is the formation of singlet oxygen. Studies with singlet oxygen (1O2) show an high reactivity of the excited state of the molecule with olefins, aromatic hydrocarbons and a number of other organic and inorganic compounds. Its reactivity is about 2500 times larger than the oxygen in the ground state. Thus, in this work, it was studied the degradation of some dyes used in food industry (tartrazine, sunset yellow, erythrosine and carmoisine) by singlet oxygen. The sensitizer used for generating the 1O2 was methylene blue, which has a quantum yield generation of 0.50. Samples were prepared in water at a concentration of 5 ppm and irradiated with a sunlight simulator (Newport brand, model no. 67005) by consecutive 8h. The absorption spectra of UV-Vis molecules were made each hour irradiation. The degradation kinetics for each dye was determined using the maximum length of each dye absorption. The analysis by UV-Vis revealed that the processes were very efficient for the colorants sunset yellow and carmoisine. Both presented degradation kinetics of order zero with degradation constants 0.416 and 0.104, respectively. In the case of sunset yellow degradation reached 53% after 7h irradiation, Demonstrating the process efficiency. The erithrosine presented during the period irradiated a oscillating degradation kinetics, which requires further study. In the other hand, tartrazine was stable in the presence of 1O2. The investigation of the dyes degradation products owned degradation by 1O2 are underway, the techniques used for this are MS and NMR. The results of this study will enable the application of the cleanest methods for the treatment of industrial effluents, as there are other non-toxic and polluting molecules to generate 1O2.

Keywords: food colourants, singlet oxygen, degradation, wastewater, oxidative

Procedia PDF Downloads 398
4582 African Traditional Method of Social Control Mechanism: A Sociological Review of Native Charms in Farm Security in Ayetoro Community, Ogun State, Nigeria

Authors: Adebisi A. Sunday, Babajide Adeokin

Abstract:

The persistent rise in farm theft in rural region of Nigeria is attributed to the lack of adequate and effective policing in the regions; thus, this brought about the inevitable introduction of native charms on farmlands as a means of fortification of harvests against theft in Ayetoro community. The use of charm by farmers as security on farmlands is a traditional crime control mechanism that is largely based on unwritten laws which greatly influenced the lives of people, and their attitudes toward the society. This research presents a qualitative sociological study on how native charms are deployed by farmers for protection against theft. The study investigated the various types of charms that are employed as security measures among farmers in Ayetoro community and the rationale behind the use of these mechanisms as farm security. The study utilized qualitative method to gather data in the research process. Under the qualitative method, in-depth interview method was adopted to generate a robust and detailed data from the respondents. Also the data generated were analysed qualitatively using thematic content analysis and simple description which was preceded by transcription of data from the recorder. It was revealed that amidst numerous charms known, two major charms are used on farmlands as a measure of social control in Ayetoro community, Ogun state South West Nigeria. Furthermore, the result of this study showed that, the desire for safekeeping of harvest from pilferers and the heavy punishments dispense on offenders by native charms are the reasons why farmers deploy charms on their farms. In addition, findings revealed that the adoption of these charms for protection has improved yields among farmers in the community because the safety of harvest has been made possible by virtue of the presence of various charms in the farm lands. Therefore, based on the findings of this study, it is recommended that such measures should be recognized in mainstream social control mechanisms in the fight against crime in Nigeria and the rest of the world. Lastly, native charms could be installed in all social and cooperate organisation and position of authority to prevent theft of valuables and things hold with utmost importance.

Keywords: Ayetoro, farm theft, mechanism, native charms, Pilferer

Procedia PDF Downloads 149
4581 Electrochemical Study of Ti-O Modified Electrode towards Tyrosinase Catalytic Activity

Authors: Riya Thomas, Denis Music, Tautgirdas Ruzgas

Abstract:

The detection of tyrosinase holds considerable interest in the domains of food nutrition and human health due to its significant role in causing a detrimental effect on the colour, flavour, and nutritional value of food as well as in the synthesis of melanin causing skin melanoma. Compared to other conventional analytical techniques, electrochemical (EC) sensors are highly promising owing to their quick response, great sensitivity, ease of use, and low cost. Particularly, titania nanoparticle-based electrochemical sensors have drawn special attention in identifying several biomolecules including enzymes, antibodies, and receptors, owing to their enhanced electrocatalytic activity and electron-accepting properties. In this study, Ti-O film-modified electrode is fabricated using reactive magnetron sputtering, and its affinity towards tyrosinase is examined via electrochemical methods. To comprehend the physiochemical and surface properties-governed electrocatalytic activity of modified electrodes, Ti-O films are grown under various compositional ranges and deposition temperature, and their corresponding electrochemical activity towards tyrosinase is studied. Further, to understand the underlying atomistic mechanisms and electronic-scale electrochemical characteristics, density functional theory (DFT) is employed. The main goal of the current work is to determine the correlation between macroscopic measurements and the underlying atomic properties to improve the tyrosinase activity on Ti-O surfaces. Moreover, this work offers an intriguing new perspective on the use of Ti-O-modified electrodes to detect tyrosinase in the areas of clinical diagnosis, skincare, and food science.

Keywords: density functional theory, electrochemical sensor, Ti-O film, tyrosinase

Procedia PDF Downloads 27
4580 Adaptative Metabolism of Lactic Acid Bacteria during Brewers' Spent Grain Fermentation

Authors: M. Acin-Albiac, P. Filannino, R. Coda, Carlo G. Rizzello, M. Gobbetti, R. Di Cagno

Abstract:

Demand for smart management of large amounts of agro-food by-products has become an area of major environmental and economic importance worldwide. Brewers' spent grain (BSG), the most abundant by-product generated in the beer-brewing process, represents an example of valuable raw material and source of health-promoting compounds. To the date, the valorization of BSG as a food ingredient has been limited due to poor technological and sensory properties. Tailored bioprocessing through lactic acid bacteria (LAB) fermentation is a versatile and sustainable means for the exploitation of food industry by-products. Indigestible carbohydrates (e.g., hemicelluloses and celluloses), high phenolic content, and mostly lignin make of BSG a hostile environment for microbial survival. Hence, the selection of tailored starters is required for successful fermentation. Our study investigated the metabolic strategies of Leuconostoc pseudomesenteroides and Lactobacillus plantarum strains to exploit BSG as a food ingredient. Two distinctive BSG samples from different breweries (Italian IT- and Finish FL-BSG) were microbially and chemically characterized. Growth kinetics, organic acid profiles, and the evolution of phenolic profiles during the fermentation in two BSG model media were determined. The results were further complemented with gene expression targeting genes involved in the degradation cellulose, hemicelluloses building blocks, and the metabolism of anti-nutritional factors. Overall, the results were LAB genus dependent showing distinctive metabolic capabilities. Leuc. pseudomesenteroides DSM 20193 may degrade BSG xylans while sucrose metabolism could be furtherly exploited for extracellular polymeric substances (EPS) production to enhance BSG pro-technological properties. Although L. plantarum strains may follow the same metabolic strategies during BSG fermentation, the mode of action to pursue such strategies was strain-dependent. L. plantarum PU1 showed a great preference for β-galactans compared to strain WCFS1, while the preference for arabinose occurred at different metabolic phases. Phenolic compounds profiling highlighted a novel metabolic route for lignin metabolism. These findings will allow an improvement of understanding of how lactic acid bacteria transform BSG into economically valuable food ingredients.

Keywords: brewery by-product valorization, metabolism of plant phenolics, metabolism of lactic acid bacteria, gene expression

Procedia PDF Downloads 132
4579 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 165
4578 Prospects in Development of Ecofriendly Biopesticides in Management of Postharvest Fungal Deterioration of Cassava (Manihot esculenta Crantz)

Authors: Anderson Chidi Amadioha, Promise Chidi Kenkwo, A. A. Markson

Abstract:

Cassava (Manihot esculenta Crantz) is an important food and cash crop that provide cheap source of carbohydrate for food, feed and raw material for industries hence a commodity for feature economic development of developing countries. Despite the importance, its production potentials is undermined by disease agents that greatly reduce yield and render it unfit for human consumption and industrial use. Pathogenicity tests on fungal isolates from infected cassava revealed Aspergillus flavus, Rhizopus stolonifer, Aspergillus niger, and Trichodderma viride as rot-causing organisms. Water and ethanol extracts of Piper guineense, Ocimum graticimum, Cassia alata, and Tagetes erecta at 50% concentration significantly inhibited the radial growth of the pathogens in vitro and their development and spread in vivo. Low cassava rot incidence and severity was recorded when the extracts were applied before than after spray inoculating with spore suspension (1x105 spores/ml of distilled water) of the pathogenic organisms. The plant materials are readily available, and their extracts are biodegradable and cost effective. The fungitoxic potentials of extracts of these plant materials could be exploited as potent biopesticides in the management of postharvest fungal deterioration of cassava especially in developing countries where synthetic fungicides are not only scarce but also expensive for resource poor farmers who produce over 95% of the food consumed.

Keywords: cassava, biopesticides, in vitro, in vivo, pathogens, plant extracts

Procedia PDF Downloads 184
4577 Performance Analysis of Vapour Compression Refrigeration System with Alternate Refrigerants

Authors: K. Parthiban, P. Pradeep, I. Pon Surya Prakash, S. Vinoth, A. Murugan

Abstract:

The main aim of this project is to analyze the performance of vapor compression refrigeration system with alternate refrigerants. Currently we are using R134a as refrigerant. It is used in both household and industrial appliances as refrigerant. It has an advantage that the ozone depletion potential is zero i.e. R134a does not affects ozone layer. But its Global warming potential is considerably high. Also the compressor failure occurs frequently. Hence this project deals with how the performance of R134a varies with blended refrigerants such as R416a and R407c. This analysis is based on how much the Co-efficient of Performance (COP) varies with different refrigerants.

Keywords: compressor, condenser, expansion valve, evaporator

Procedia PDF Downloads 326
4576 Optimizing Human Diet Problem Using Linear Programming Approach: A Case Study

Authors: P. Priyanka, S. Shruthi, N. Guruprasad

Abstract:

Health is a common theme in most cultures. In fact all communities have their concepts of health, as part of their culture. Health continues to be a neglected entity. Planning of Human diet should be done very careful by selecting the food items or groups of food items also the composition involved. Low price and good taste of foods are regarded as two major factors for optimal human nutrition. Linear programming techniques have been extensively used for human diet formulation for quiet good number of years. Through the process, we mainly apply “The Simplex Method” which is a very useful statistical tool based on the theorem of Elementary Row Operation from Linear Algebra and also incorporate some other necessary rules set by the Simplex Method to help solve the problem. The study done by us is an attempt to develop a programming model for optimal planning and best use of nutrient ingredients.

Keywords: diet formulation, linear programming, nutrient ingredients, optimization, simplex method

Procedia PDF Downloads 566
4575 Security Report Profiling for Mobile Banking Applications in Indonesia Based on OWASP Mobile Top 10-2016

Authors: Bambang Novianto, Rizal Aditya Herdianto, Raphael Bianco Huwae, Afifah, Alfonso Brolin Sihite, Rudi Lumanto

Abstract:

The mobile banking application is a type of mobile application that is growing rapidly. This is caused by the ease of service and time savings in making transactions. On the other hand, this certainly provides a challenge in security issues. The use of mobile banking can not be separated from cyberattacks that may occur which can result the theft of sensitive information or financial loss. The financial loss and the theft of sensitive information is the most avoided thing because besides harming the user, it can also cause a loss of customer trust in a bank. Cyberattacks that are often carried out against mobile applications are phishing, hacking, theft, misuse of data, etc. Cyberattack can occur when a vulnerability is successfully exploited. OWASP mobile Top 10 has recorded as many as 10 vulnerabilities that are most commonly found in mobile applications. In the others, android permissions also have the potential to cause vulnerabilities. Therefore, an overview of the profile of the mobile banking application becomes an urgency that needs to be known. So that it is expected to be a consideration of the parties involved for improving security. In this study, an experiment has been conducted to capture the profile of the mobile banking applications in Indonesia based on android permission and OWASP mobile top 10 2016. The results show that there are six basic vulnerabilities based on OWASP Mobile Top 10 that are most commonly found in mobile banking applications in Indonesia, i.e. M1:Improper Platform Usage, M2:Insecure Data Storage, M3:Insecure Communication, M5:Insufficient Cryptography, M7:Client Code Quality, and M9:Reverse Engineering. The most permitted android permissions are the internet, status network access, and telephone read status.

Keywords: mobile banking application, OWASP mobile top 10 2016, android permission, sensitive information, financial loss

Procedia PDF Downloads 145