Search results for: household food security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 6704

Search results for: household food security

4574 Detecting and Secluding Route Modifiers by Neural Network Approach in Wireless Sensor Networks

Authors: C. N. Vanitha, M. Usha

Abstract:

In a real world scenario, the viability of the sensor networks has been proved by standardizing the technologies. Wireless sensor networks are vulnerable to both electronic and physical security breaches because of their deployment in remote, distributed, and inaccessible locations. The compromised sensor nodes send malicious data to the base station, and thus, the total network effectiveness will possibly be compromised. To detect and seclude the Route modifiers, a neural network based Pattern Learning predictor (PLP) is presented. This algorithm senses data at any node on present and previous patterns obtained from the en-route nodes. The eminence of any node is upgraded by their predicted and reported patterns. This paper propounds a solution not only to detect the route modifiers, but also to seclude the malevolent nodes from the network. The simulation result proves the effective performance of the network by the presented methodology in terms of energy level, routing and various network conditions.

Keywords: neural networks, pattern learning, security, wireless sensor networks

Procedia PDF Downloads 408
4573 Development of a Computer Based, Nutrition and Fitness Programme and Its Effect on Nutritional Status and Fitness of Obese Adults

Authors: Richa Soni, Vibha Bhatnagar, N. K. Jain

Abstract:

This study was conducted to develop a computer mediated programme for weight management and physical fitness and examining its efficacy in reducing weight and improving physical fitness in obese adults. A user friendly, computer based programme was developed to provide a simple, quick, easy and user-friendly method of assessing energy balance at individual level. The programme had four main sections viz. personal Profile, know about your weight, fitness and food exchange list. The computer programme was developed to provide facilities of creating individual profile, tracking meal and physical activities, suggesting nutritional and exercise requirements, planning calorie specific menus, keeping food diaries and revising the diet and exercise plans if needed. The programme was also providing information on obesity, underweight, physical fitness. An exhaustive food exchange list was also given in the programme to assist user to make right food choice decisions. The developed programme was evaluated by a panel of 15 experts comprising endocrinologists, nutritionists and diet counselors. Suggestions given by the experts were paned down and the entire programme was modified in light of suggestions given by the panel members and was reevaluated by the same panel of experts. For assessing the impact of the programme 22 obese subjects were selected purposively and randomly assigned to intervention group (n=12) and no information control group. (n=10). The programme group was asked to strictly follow the programme for one month. Significant reduction in the intake of energy, fat and carbohydrates was observed while intake of fruits, green leafy vegetables was increased. The programme was also found to be effective in reducing body weight, body fat percent and body fat mass whereas total body water and physical fitness scores improved significantly. There was no significant alteration observed in any parameters in the control group.

Keywords: body composition, body weight, computer programme, physical fitness

Procedia PDF Downloads 290
4572 Distribution of Antioxidants between Sour Cherry Juice and Pomace

Authors: Sonja Djilas, Gordana Ćetković, Jasna Čanadanović-Brunet, Vesna Tumbas Šaponjac, Slađana Stajčić, Jelena Vulić, Milica Vinčić

Abstract:

In recent years, interest in food rich in bioactive compounds, such as polyphenols, increased the advantages of the functional food products. Bioactive components help to maintain health and prevention of diseases such as cancer, cardiovascular and many other degenerative diseases. Recent research has shown that the fruit pomace, a byproduct generated from the production of juice, can be a potential source of valuable bioactive compounds. The use of fruit industrial waste in the processing of functional foods represents an important new step for the food industry. Sour cherries have considerable nutritional, medicinal, dietetic and technological value. According to the production volume of cherries, Serbia ranks seventh in the world, with a share of 7% of the total production. The use of sour cherry pomace has so far been limited to animal feed, even though it can be potentially a good source of polyphenols. For this study, local variety of sour cherry cv. ‘Feketićka’ was chosen for its more intensive taste and deeper red color, indicating high anthocyanin content. The contents of total polyphenols, flavonoids and anthocyanins, as well as radical scavenging activity on DPPH radicals and reducing power of sour cherry juice and pomace were compared using spectrophotometrical assays. According to the results obtained, 66.91% of total polyphenols, 46.77% of flavonoids, 46.77% of total anthocyanins and 47.88% of anthocyanin monomers from sour cherry fruits have been transferred to juice. On the other hand, 29.85% of total polyphenols, 33.09% of flavonoids, 53.23% of total anthocyanins and 52.12% of anthocyanin monomers remained in pomace. Regarding radical scavenging activity, 65.51% of Trolox equivalents from sour cherries were exported to juice, while 34.49% was left in pomace. However, reducing power of sour cherry juice was much stronger than pomace (91.28% and 8.72% of Trolox equivalents from sour cherry fruits, respectively). Based on our results it can be concluded that sour cherry pomace is still a rich source of natural antioxidants, especially anthocyanins with coloring capacity, therefore it can be used for dietary supplements development and food fortification.

Keywords: antioxidants, polyphenols, pomace, sour cherry

Procedia PDF Downloads 328
4571 Treadmill Negotiation: The Stagnation of the Israeli – Palestinian Peace Process

Authors: Itai Kohavi, Wojciech Nowiak

Abstract:

This article explores the stagnation of the Israeli -Palestinian peace negotiation process, and the reasons behind the failure of more than 12 international initiatives to resolve the conflict. Twenty-seven top members of the Israeli national security elite (INSE) were interviewed, including heads of the negotiation teams, the National Security Council, the Mossad, and other intelligence and planning arms. The interviewees provided their insights on the Israeli challenges in reaching a sustainable and stable peace agreement and in dealing with the international pressure on Israel to negotiate a peace agreement while preventing anti-Israeli UN decisions and sanctions. The findings revealed a decision tree, with red herring deception strategies implemented to postpone the negotiation process and to delay major decisions during the negotiation process. Beyond the possible applications for the Israeli – Palestinian conflict, the findings shed more light on the phenomenon of rational deception of allies in a negotiation process, a subject less frequently researched as compared with deception of rivals.

Keywords: deception, Israeli-Palestinian conflict, negotiation, red herring, terrorist state, treadmill negotiation

Procedia PDF Downloads 307
4570 Essential Elements and Trace Metals on a Continuously Cultivated and Fertilised Field

Authors: Pholosho M. Kgopa, Phatu W. Mashela

Abstract:

Due to high incidents of marginal land in Limpopo Province, South Africa, and increasing demand for arable land, small-holder farmers tend to continuously cultivate the same fields and at the same time, applying fertilisers to improve yields for meeting local food security. These practices might have an impact on the distribution of trace and essential elements. Therefore, the objective of this investigation was to assess the distribution of essential elements and trace metals in a continuously cultivated and fertilised field, at the University of Limpopo Experimental Farm. Three fields, 3 ha each were identified as continuously cultivated (CC), moderately cultivated (MC) and virgin fields (VF). Each field was divided into 12 equal grids of 50 m × 50 m for sampling. A soil profile was opened in each grid, where soil samples were collected from 0-20; 20-40 and 40-60; 60-80 and 80-100 cm depths for analysis. Samples were analysed for soil texture, pH, electrical conductivity, organic matter content, selected essential elements (Ca, P and Mg), Na and trace elements (Cu, Fe, Ni, and Zn). Results suggested that most of the variables were vertically different, with high concentrations of the test elements except for magnesium. Soil pH in depth 0-20 cm was high (6.44) in CC when compared to that in VF (5.29), but lower than that of MC (7.84). There were no distinctive vertical trends of the variables, except for Mg, Na, and K which displayed a declining trend at 40-60 cm depth when compared to the 0-20 cm depth. Concentrations of Fe, Cu, Zn, and Ni were generally low which might be due to their indirect relationship with soil pH. Continuous cultivation and fertilisation altered soil chemical properties; which could explain the unproductivity of such fields.

Keywords: over-cultivation, soil chemical properties, vertical distribution, spatial distribution

Procedia PDF Downloads 197
4569 Development of Loop-Mediated Isothermal Amplification for Detection of Garlic in Food

Authors: Ting-Ying Su, Meng-Shiou Lee, Shyang-Chwen Sheu

Abstract:

Garlic is used commonly as a seasoning around the world. But some people suffer from allergy to garlic. Garlic may also cause burning of mouth, stomach, and throat. In some Buddhist traditions, consuming garlic is not allowed. The objective of this study is to develop a LAMP based method for detection of garlic in food. We designed specific primers targeted on ITS1-5.8S rRNA-ITS2 sequence of garlic DNA. The LAMP assay was performed using a set of four different primers F3, B3, FIP and BIP at 60˚C in less than 60 mins. Results showed that the primer was not cross-reactive to other commonly used spice including Chinese leek, Chinese onion, green onion, onion, pepper, basil, parsley, pepper and ginger. As low as 2% of garlic DNA could be detected. Garlic still could be detected by developed LAMP after boiled at 100˚C for 80 minutes and autoclaved at 121˚C for 60 minutes. Commercial products labeled with garlic ingredient could be identified by the developed method.

Keywords: garlic, loop-mediated isothermal amplification, processing, DNA

Procedia PDF Downloads 306
4568 Exploring the Factors Affecting the Presence of Farmers’ Markets in Rural British Columbia

Authors: Amirmohsen Behjat, Aleck Ostry, Christina Miewald, Bernie Pauly

Abstract:

Farmers’ Markets have become one of the important healthy food suppliers in both rural communities and urban settings. Farmers’ markets are evolving and their number has rapidly increased in the past decade. Despite this drastic increase, the distribution of the farmers’ markets is not even across different areas. The main goal of this study is to explore the socioeconomic, geographic, and demographic variables which affect the establishment of farmers’ market in rural communities in British Columbia (BC). Thus, the data on available farmers’ markets in rural areas were collected from BC Association of Farmers’ Markets and spatially joined to BC map at Dissemination Area (DA) level using ArcGIS software to link the farmers’ market to the respective communities that they serve. Then, in order to investigate this issue and understand which rural communities farmer’ markets tend to operate, a binary logistic regression analysis was performed with the availability of farmer’ markets at DA-level as dependent variable and Deprivation Index (DI), Metro Influence Zone (MIZ) and population as independent variables. The results indicated that DI and MIZ variables are not statistically significant whereas the population is the only which had a significant contribution in predicting the availability of farmers’ markets in rural BC. Moreover, this study found that farmers’ markets usually do not operate in rural food deserts where other healthy food providers such as supermarkets and grocery stores are non-existent. In conclusion, the presence of farmers markets is not associated with socioeconomic and geographic characteristics of rural communities in BC, but farmers’ markets tend to operate in more populated rural communities in BC.

Keywords: farmers’ markets, socioeconomic and demographic variables, metro influence zone, logistic regression, ArcGIS

Procedia PDF Downloads 192
4567 Requirement Engineering for Intrusion Detection Systems in Wireless Sensor Networks

Authors: Afnan Al-Romi, Iman Al-Momani

Abstract:

The urge of applying the Software Engineering (SE) processes is both of vital importance and a key feature in critical, complex large-scale systems, for example, safety systems, security service systems, and network systems. Inevitably, associated with this are risks, such as system vulnerabilities and security threats. The probability of those risks increases in unsecured environments, such as wireless networks in general and in Wireless Sensor Networks (WSNs) in particular. WSN is a self-organizing network of sensor nodes connected by wireless links. WSNs consist of hundreds to thousands of low-power, low-cost, multi-function sensor nodes that are small in size and communicate over short-ranges. The distribution of sensor nodes in an open environment that could be unattended in addition to the resource constraints in terms of processing, storage and power, make such networks in stringent limitations such as lifetime (i.e. period of operation) and security. The importance of WSN applications that could be found in many militaries and civilian aspects has drawn the attention of many researchers to consider its security. To address this important issue and overcome one of the main challenges of WSNs, security solution systems have been developed by researchers. Those solutions are software-based network Intrusion Detection Systems (IDSs). However, it has been witnessed, that those developed IDSs are neither secure enough nor accurate to detect all malicious behaviours of attacks. Thus, the problem is the lack of coverage of all malicious behaviours in proposed IDSs, leading to unpleasant results, such as delays in the detection process, low detection accuracy, or even worse, leading to detection failure, as illustrated in the previous studies. Also, another problem is energy consumption in WSNs caused by IDS. So, in other words, not all requirements are implemented then traced. Moreover, neither all requirements are identified nor satisfied, as for some requirements have been compromised. The drawbacks in the current IDS are due to not following structured software development processes by researches and developers when developing IDS. Consequently, they resulted in inadequate requirement management, process, validation, and verification of requirements quality. Unfortunately, WSN and SE research communities have been mostly impermeable to each other. Integrating SE and WSNs is a real subject that will be expanded as technology evolves and spreads in industrial applications. Therefore, this paper will study the importance of Requirement Engineering when developing IDSs. Also, it will study a set of existed IDSs and illustrate the absence of Requirement Engineering and its effect. Then conclusions are drawn in regard of applying requirement engineering to systems to deliver the required functionalities, with respect to operational constraints, within an acceptable level of performance, accuracy and reliability.

Keywords: software engineering, requirement engineering, Intrusion Detection System, IDS, Wireless Sensor Networks, WSN

Procedia PDF Downloads 327
4566 Border Security: Implementing the “Memory Effect” Theory in Irregular Migration

Authors: Iliuta Cumpanasu, Veronica Oana Cumpanasu

Abstract:

This paper focuses on studying the conjunction between the new emerged theory of “Memory Effect” in Irregular Migration and Related Criminality and the notion of securitization, and its impact on border management, bringing about a scientific advancement in the field by identifying the patterns corresponding to the linkage of the two concepts, for the first time, and developing a theoretical explanation, with respect to the effects of the non-military threats on border security. Over recent years, irregular migration has experienced a significant increase worldwide. The U.N.'s refugee agency reports that the number of displaced people is at its highest ever - surpassing even post-World War II numbers when the world was struggling to come to terms with the most devastating event in history. This is also the fresh reality within the core studied coordinate, the Balkan Route of Irregular Migration, which starts from Asia and Africa and continues to Turkey, Greece, North Macedonia or Bulgaria, Serbia, and ends in Romania, where thousands of migrants find themselves in an irregular situation concerning their entry to the European Union, with its important consequences concerning the related criminality. The data from the past six years was collected by making use of semi-structured interviews with experts in the field of migration and desk research within some organisations involved in border security, pursuing the gathering of genuine insights from the aforementioned field, which was constantly addressed the existing literature and subsequently subjected to the mixed methods of analysis, including the use of the Vector Auto-Regression estimates model. Thereafter, the analysis of the data followed the processes and outcomes in Grounded Theory, and a new Substantive Theory emerged, explaining how the phenomena of irregular migration and cross-border criminality are the decisive impetus for implementing the concept of securitization in border management by using the proposed pattern. The findings of the study are therefore able to capture an area that has not yet benefitted from a comprehensive approach in the scientific community, such as the seasonality, stationarity, dynamics, predictions, or the pull and push factors in Irregular Migration, also highlighting how the recent ‘Pandemic’ interfered with border security. Therefore, the research uses an inductive revelatory theoretical approach which aims at offering a new theory in order to explain a phenomenon, triggering a practically handy contribution for the scientific community, research institutes or Academia and also usefulness to organizational practitioners in the field, among which UN, IOM, UNHCR, Frontex, Interpol, Europol, or national agencies specialized in border security. The scientific outcomes of this study were validated on June 30, 2021, when the author defended his dissertation for the European Joint Master’s in Strategic Border Management, a two years prestigious program supported by the European Commission and Frontex Agency and a Consortium of six European Universities and is currently one of the research objectives of his pending PhD research at the West University Timisoara.

Keywords: migration, border, security, memory effect

Procedia PDF Downloads 95
4565 The Relationship of Weight Regain with Biochemical and Psychological Factors in Non Postmenopausal Women

Authors: Farzad Shidfar, Najmeh Rostami, Ziaodin Mazhari, Fatemeh Hosseini Baharanchi

Abstract:

Background and Aim: The rate of failure to maintain a reduced weight has been increased. By definition, people who regain about one-third to two-thirds of their lost weight after one year from the end of the dietary treatment and return all the lost weight after 5 years it is called weight regain. This study was performed to find the causes of weight regain and its relationship with biochemical and psychological factors. Materials and Methods: This cross-sectional study was performed by reviewing the files of people who followed the dietary treatment in 1397-1398.seventy-three persons was in the weight regain group, and seventy-three people were in the weight maintenance group. Psychological factors such as depression, anxiety, quality of life, physical activity, and dietary frequency were assessed through a questionnaire, and biochemical factors such as serum insulin and fasting blood sugar were measured. The mean basal energy in the weight regain group was significantly higher than the weight maintenance group (p = 0.004). There was no significant difference between the two groups in terms of food intake and inflammatory index of food. There was no significant difference between the two groups in terms of food intake and inflammatory index of food. Mean serum insulin concentration (p = 0.023), mean fasting blood sugar (p = 0.04) and insulin resistance (p = 0.013) in the weight regain group were higher than the weight maintenance group. The weight maintenance group showed higher insulin sensitivity than the weight regain group (p = 0.005). There was no significant difference between the two groups in terms of psychological indicators. Conclusion: The only body mass index after one year from the end of the treatment period, insulin sensitivity, serum insulin concentration, fasting blood sugar, insulin resistance, selenium intake, and basal energy expenditure Specific and significant with weight regain. However, the significance of insulin resistance, basal energy expenditure, and body mass index after one year from the end of the treatment period was higher than other variables in the weight regain group.

Keywords: body weight maintenance, weight regain, insulin resistance, insulin sensitivity

Procedia PDF Downloads 120
4564 Estimation of Maize Yield by Using a Process-Based Model and Remote Sensing Data in the Northeast China Plain

Authors: Jia Zhang, Fengmei Yao, Yanjing Tan

Abstract:

The accurate estimation of crop yield is of great importance for the food security. In this study, a process-based mechanism model was modified to estimate yield of C4 crop by modifying the carbon metabolic pathway in the photosynthesis sub-module of the RS-P-YEC (Remote-Sensing-Photosynthesis-Yield estimation for Crops) model. The yield was calculated by multiplying net primary productivity (NPP) and the harvest index (HI) derived from the ratio of grain to stalk yield. The modified RS-P-YEC model was used to simulate maize yield in the Northeast China Plain during the period 2002-2011. The statistical data of maize yield from study area was used to validate the simulated results at county-level. The results showed that the Pearson correlation coefficient (R) was 0.827 (P < 0.01) between the simulated yield and the statistical data, and the root mean square error (RMSE) was 712 kg/ha with a relative error (RE) of 9.3%. From 2002-2011, the yield of maize planting zone in the Northeast China Plain was increasing with smaller coefficient of variation (CV). The spatial pattern of simulated maize yield was consistent with the actual distribution in the Northeast China Plain, with an increasing trend from the northeast to the southwest. Hence the results demonstrated that the modified process-based model coupled with remote sensing data was suitable for yield prediction of maize in the Northeast China Plain at the spatial scale.

Keywords: process-based model, C4 crop, maize yield, remote sensing, Northeast China Plain

Procedia PDF Downloads 382
4563 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 256
4562 Detection of Nutrients Using Honeybee-Mimic Bioelectronic Tongue Systems

Authors: Soo Ho Lim, Minju Lee, Dong In Kim, Gi Youn Han, Seunghun Hong, Hyung Wook Kwon

Abstract:

We report a floating electrode-based bioelectronic tongue mimicking honeybee taste systems for the detection and discrimination of various nutrients. Here, carbon nanotube field effect transistors with floating electrodes (CNT-FET) were hybridized with nanovesicles containing honeybee nutrient receptors, gustatory receptors of Apis mellifera. This strategy enables us to detect nutrient substance with a high sensitivity and selectivity. It could also be utilized for the detection of nutrients in liquid food. This floating electrode-based bioelectronic tongue mimicking insect taste systems can be a simple, but highly effective strategy in many different basic research areas about sensory systems. Moreover, our research provides opportunities to develop various applications such as food screening, and it also can provide valuable insights on insect taste systems.

Keywords: taste system, CNT-FET, insect gustatory receptor, biolelectronic tongue

Procedia PDF Downloads 221
4561 Analytical Study of Applying the Account Aggregation Approach in E-Banking Services

Authors: A. Al Drees, A. Alahmari, R. Almuwayshir

Abstract:

The advanced information technology is becoming an important factor in the development of financial services industry, especially the banking industry. It has introduced new ways of delivering banking to the customer, such as Internet Banking. Banks began to look at electronic banking (e-banking) as a means to replace some of their traditional branch functions using the Internet as a new distribution channel. Some consumers have at least more than one account, and across banks, and access these accounts using e-banking services. To look at the current net worth position, customers have to login to each of their accounts and get the details and work on consolidation. This not only takes ample time but it is a repetitive activity at a specified frequency. To address this point, an account aggregation concept is added as a solution. E-banking account aggregation, as one of the e-banking types, appeared to build a stronger relationship with customers. Account Aggregation Service generally refers to a service that allows customers to manage their bank accounts maintained in different institutions through a common Internet banking operating a platform, with a high concern to security and privacy. This paper presents an overview of an e-banking account aggregation approach as a new service in the e-banking field.

Keywords: e-banking, account aggregation, security, enterprise development

Procedia PDF Downloads 339
4560 Changing from Crude (Rudimentary) to Modern Method of Cassava Processing in the Ngwo Village of Njikwa Sub Division of North West Region of Cameroon

Authors: Loveline Ambo Angwah

Abstract:

The processing of cassava from tubers or roots into food using crude and rudimentary method (hand peeling, grating, frying and to sun drying) is a very cumbersome and difficult process. The crude methods are time consuming and labour intensive. While on the other hand, modern processing method, that is using machines to perform the various processes as washing, peeling, grinding, oven drying, fermentation and frying is easier, less time consuming, and less labour intensive. Rudimentarily, cassava roots are processed into numerous products and utilized in various ways according to local customs and preferences. For the people of Ngwo village, cassava is transformed locally into flour or powder form called ‘cumcum’. It is also sucked into water to give a kind of food call ‘water fufu’ and fried to give ‘garri’. The leaves are consumed as vegetables. Added to these, its relative high yields; ability to stay underground after maturity for long periods give cassava considerable advantage as a commodity that is being used by poor rural folks in the community, to fight poverty. It plays a major role in efforts to alleviate the food crisis because of its efficient production of food energy, year-round availability, tolerance to extreme stress conditions, and suitability to present farming and food systems in Africa. Improvement of cassava processing and utilization techniques would greatly increase labor efficiency, incomes, and living standards of cassava farmers and the rural poor, as well as enhance the-shelf life of products, facilitate their transportation, increase marketing opportunities, and help improve human and livestock nutrition. This paper presents a general overview of crude ways in cassava processing and utilization methods now used by subsistence and small-scale farmers in Ngwo village of the North West region in Cameroon, and examine the opportunities of improving processing technologies. Cassava needs processing because the roots cannot be stored for long because they rot within 3-4 days of harvest. They are bulky with about 70% moisture content, and therefore transportation of the tubers to markets is difficult and expensive. The roots and leaves contain varying amounts of cyanide which is toxic to humans and animals, while the raw cassava roots and uncooked leaves are not palatable. Therefore, cassava must be processed into various forms in order to increase the shelf life of the products, facilitate transportation and marketing, reduce cyanide content and improve palatability.

Keywords: cassava roots, crude ways, food system, poverty

Procedia PDF Downloads 170
4559 Assessment of the Growth Enhancement Support Scheme in Adamawa State, Nigeria

Authors: Oto J. Okwu, Ornan Henry, Victor A. Otene

Abstract:

The agricultural sector contributes a great deal to the sustenance of Nigeria’s food security and economy, with an attendant impact on rural development. In spite of the relatively high number of farmers in the country, self-sufficiency in food production is still a challenge. Farmers are faced with myriad problems which hinder their production efficiency, one of which is their access to agricultural inputs required for optimum production. To meet the challenges faced by farmers, the government at the federal level has come up with many agricultural policies, one of which is the Agricultural Transformation Agenda (ATA). The Growth Enhancement Support Scheme (GESS) is one of the critical components of ATA, which is aimed at ensuring the effective distribution of agricultural inputs delivered directly to farmers, and at a regulated cost. After about 8 years of launching this policy, it will be necessary to carry out an assessment of GESS and determine the impact it has made on rural farmers with respect to their access to farm inputs. This study was carried out to assess the Growth Enhancement Support Scheme (GESS) in Adamawa State, Nigeria. Crop farmers who registered under the GESS in Adamawa State, Nigeria, formed the population for the study. Primary data for the study were obtained through a survey, and the use of a structured questionnaire. A sample size of 167 respondents was selected using multi-stage, purposive, and random sampling techniques. The validity and reliability of the research instrument (questionnaire) were obtained through pilot testing and test-retest method, respectively. The objectives of the study were to determine the difference in the level of access to agricultural inputs before and after GESS, determine the difference in cost of agricultural inputs before and after GESS, and to determine the challenges faced by rural farmers in accessing agricultural inputs through GESS. Both descriptive and inferential statistics were used in analyzing the collected data. Specifically, Mann-Whitney, student t-test, and factor analysis were used to test the stated hypotheses. Research findings revealed there was a significant difference in the level of access to farm inputs after the introduction of GESS (Z=14.216). Also, there was a significant difference in the cost of agro-inputs after the introduction of GESS (Pr |T| > |t|= 0.0000). The challenges faced by respondents in accessing agro-inputs through GESS were administrative and technical in nature. Based on the findings of the research, it was recommended that efforts be made by the government to sustain the GESS, as it has significantly improved the level of farmers’ access to agricultural inputs and has reduced the cost of agro-inputs, while administrative challenges faced by the respondents in accessing inputs be addressed by the government, and extension agents assist the farmers to overcome the technical challenges they face in accessing inputs.

Keywords: agricultural policy, agro-inputs, assessment, growth enhancement support scheme, rural farmers

Procedia PDF Downloads 113
4558 Flood Risk Assessment in the Niger River Basin in Support of the Conception of a Flood Risk Management Plan: Case Study of the District of Malanville, Benin

Authors: Freddy Houndekindo

Abstract:

A study was carried out to evaluate the flood risk in the district of Malanville located along the Niger River. The knowledge produce by this study is useful in the implementation of adaptation and/or mitigation measures to alleviate the impact of the flooding on the populations, the economy and the environment. Over the course of the study, the lack of data in the area of interest has been one of the main challenges encountered. Therefore, in the analysis of the flood hazard different sources of remotely sensed data were used. Moreover, the flood hazard was analysed by applying a 1D hydraulic model: HEC-RAS. After setting up the model for the study area, the different flood scenarios considered were simulated and mapped using ArcGIS and the HEC-GEORAS extension. The result of the simulation gave information about the inundated areas and the water depths at each location. From the analysis of the flood hazard, it was found that between 47% and 50% of the total area of the district of Malanville would be flooded in the different flood scenarios considered, and the water depth varies between 1 and 7 m. The townships of Malanville most at risk of flooding are Momkassa and Galiel, located in a high-risk and very high-risk zone, respectively. Furthermore, the assessment of the flood risk showed that the most vulnerable sector to the inundations is the agricultural sector. Indeed, the cultivated floodplains were the most affected areas by the floodwater in every flood scenarios. Knowing that a high proportion of the population of the district relies on their farmlands in these floodplains for their livelihood, the floods pose a challenge not only to the food security in the area but also to its development.

Keywords: flood risk management, Niger, remote sensing, vulnerability

Procedia PDF Downloads 158
4557 Environmental Protection and Natural Resources Management, and Organic Farming in Nepal

Authors: Megha Raj Regmi

Abstract:

Nepalese topography has the largest variations in altitude in the world, ranging from 60 metre to 8848 metre above the mean sea level, Nepal is endowed with second position in water resources in the world, and is comprised of more than 6,000 rivers and rivulets, however, it faces serious water crunch and water pollution : deterioration of ecosystem. Due to climate change reasons, in all the places of Nepal ground water table has been substantially depleted and with its impact many people are suffering seriously to fetch water for daily use. This research work basically deals with twenty-two biogas toilets constructed in peri-urban areas of Nepal in two research centres for organic agriculture. The work has used appropriate technology and studied their performances in the context of Nepal, based on the regular monitoring. The work found that the biogas energy producing toilet have a clear advantage in the gas recovery for domestic purpose and a sustainable mitigation measure for climate change and organic farming. This paper describes the climate change issues of Nepal; similarly it deals with the potential threats of climate change to water supply, agriculture, food security, temperature increase, and adaptation measures. This paper also deals in depth analysis of the different types of successful biogas energy production technology, organic farming, sustainable sanitation and health aspects from the twenty two biogas energy units constructed in different altitudes of Nepal.

Keywords: environmental protection, biomass energy, climate change, organic farming

Procedia PDF Downloads 17
4556 Accelerating Mobile Innovation, Adoption, and Translational Science within a Large Research Enterprise and Healthcare System

Authors: Stephen Wheat

Abstract:

Institutional mobile application governance and distribution processes are essential to mobile app innovation. The absence of effective processes poses a significant barrier to the development and adoption of mobile apps for use within a research enterprise and also impedes the translational science of applying research apps in clinical and engineering settings. To accelerate mobile app innovation and adoption, Emory University and Emory Healthcare implemented a three-pronged strategy including. I) Mobile app review and distribution policies and processes. II) Mobile app management infrastructure and mobile app foundation components. III) A strategic sourcing strategy based on preferred mobile app development firms. The results have been an increase from five to 56 mobile apps in the pipeline over three years; increased engagement from technology transfer, legal counsel, compliance, and information security; articulation of a coordinated mobile app strategy; and allocation of more institutional resources toward specific mobile technology and mobile application goals.

Keywords: mobile app management, governance, distribution, information security

Procedia PDF Downloads 305
4555 Climate Change and Land Grabbing

Authors: Akachi Odoemene

Abstract:

Climate change and land grabbing are tightly interconnected in ways that are both diverse and complex. They have impacted each other in significant ways too. Both phenomena are not only a political reality, but have diverse dire implications, especially for food and livelihood security of vulnerable populations in developing economies. The critical nexus and interactions of climate change and land grabbing remain one of the challenges of sustainable development in modern times. The nuanced understanding of the nexus, importance and implications of climate change and land grabbing are the primary focus of this chapter. It begins with conceptual clarifications, particularly arguing that the absence of some important principles of engagement underline and define a land grab. It also analyses and notes a good number of contemporary land deals as 'one-sided', in which wealthy entities connive with local elites to exploit and disposes rural poor populations. The paper not only examines both global and local factors that drive land grabbing and, in some cases, their connections with the incidence of climate change, but also explores their crucial links with such sector as agriculture. It is argued and exhibited in the paper why certain societies are susceptible to the incidence of climate change and land grabbing, while the overall consequences of these phenomena on the affected societies are further interrogated. The paper concludes that the lack of political will by global political leaders to effectively combat and resolve critical issues associated with both climate change and land grabbing remains a daunting challenge. It notes that these phenomena – climate change and land grabbing – if not abated, will certainly become another set of global tragic episodes to be regretted in the future.

Keywords: climate change, land grabbing, global governance, developing economies

Procedia PDF Downloads 294
4554 Aquatic Sediment and Honey of Apis mellifera as Bioindicators of Pesticide Residues

Authors: Luana Guerra, Silvio C. Sampaio, Vladimir Pavan Margarido, Ralpho R. Reis

Abstract:

Brazil is the world's largest consumer of pesticides. The excessive use of these compounds has negative impacts on animal and human life, the environment, and food security. Bees, crucial for pollination, are exposed to pesticides during the collection of nectar and pollen, posing risks to their health and the food chain, including honey contamination. Aquatic sediments are also affected, impacting water quality and the microbiota. Therefore, the analysis of aquatic sediments and bee honey is essential to identify environmental contamination and monitor ecosystems. The aim of this study was to use samples of honey from honeybees (Apis mellifera) and aquatic sediment as bioindicators of environmental contamination by pesticides and their relationship with agricultural use in the surrounding areas. The sample collections of sediment and honey were carried out in two stages. The first stage was conducted in the Bituruna municipality region in the second half of the year 2022, and the second stage took place in the regions of Laranjeiras do Sul, Quedas do Iguaçu, and Nova Laranjeiras in the first half of the year 2023. In total, 10 collection points were selected, with 5 points in the first stage and 5 points in the second stage, where one sediment sample and one honey sample were collected for each point, totaling 20 samples. The honey and sediment samples were analyzed at the Laboratory of the Paraná Institute of Technology, with ten samples of honey and ten samples of sediment. The selected extraction method was QuEChERS, and the analysis of the components present in the sample was performed using liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS). The pesticides Azoxystrobin, Epoxiconazole, Boscalid, Carbendazim, Haloxifope, Fomesafen, Fipronil, Chlorantraniliprole, Imidacloprid, and Bifenthrin were detected in the sediment samples from the study area in Laranjeiras do Sul, Paraná, with Carbendazim being the compound with the highest concentration (0.47 mg/kg). The honey samples obtained from the apiaries showed satisfactory results, as they did not show any detection or quantification of the analyzed pesticides, except for Point 9, which had the fungicide tebuconazole but with a concentration Keywords: contamination, water research, agrochemicals, beekeeping activity

Procedia PDF Downloads 42
4553 Food Safety in Wine: Removal of Ochratoxin a in Contaminated White Wine Using Commercial Fining Agents

Authors: Antònio Inês, Davide Silva, Filipa Carvalho, Luís Filipe-Riberiro, Fernando M. Nunes, Luís Abrunhosa, Fernanda Cosme

Abstract:

The presence of mycotoxins in foodstuff is a matter of concern for food safety. Mycotoxins are toxic secondary metabolites produced by certain molds, being ochratoxin A (OTA) one of the most relevant. Wines can also be contaminated with these toxicants. Several authors have demonstrated the presence of mycotoxins in wine, especially ochratoxin A. Its chemical structure is a dihydro-isocoumarin connected at the 7-carboxy group to a molecule of L-β-phenylalanine via an amide bond. As these toxicants can never be completely removed from the food chain, many countries have defined levels in food in order to attend health concerns. OTA contamination of wines might be a risk to consumer health, thus requiring treatments to achieve acceptable standards for human consumption. The maximum acceptable level of OTA in wines is 2.0 μg/kg according to the Commission regulation No. 1881/2006. Therefore, the aim of this work was to reduce OTA to safer levels using different fining agents, as well as their impact on white wine physicochemical characteristics. To evaluate their efficiency, 11 commercial fining agents (mineral, synthetic, animal and vegetable proteins) were used to get new approaches on OTA removal from white wine. Trials (including a control without addition of a fining agent) were performed in white wine artificially supplemented with OTA (10 µg/L). OTA analyses were performed after wine fining. Wine was centrifuged at 4000 rpm for 10 min and 1 mL of the supernatant was collected and added of an equal volume of acetonitrile/methanol/acetic acid (78:20:2 v/v/v). Also, the solid fractions obtained after fining, were centrifuged (4000 rpm, 15 min), the resulting supernatant discarded, and the pellet extracted with 1 mL of the above solution and 1 mL of H2O. OTA analysis was performed by HPLC with fluorescence detection. The most effective fining agent in removing OTA (80%) from white wine was a commercial formulation that contains gelatin, bentonite and activated carbon. Removals between 10-30% were obtained with potassium caseinate, yeast cell walls and pea protein. With bentonites, carboxymethylcellulose, polyvinylpolypyrrolidone and chitosan no considerable OTA removal was verified. Following, the effectiveness of seven commercial activated carbons was also evaluated and compared with the commercial formulation that contains gelatin, bentonite and activated carbon. The different activated carbons were applied at the concentration recommended by the manufacturer in order to evaluate their efficiency in reducing OTA levels. Trial and OTA analysis were performed as explained previously. The results showed that in white wine all activated carbons except one reduced 100% of OTA. The commercial formulation that contains gelatin, bentonite and activated carbon reduced only 73% of OTA concentration. These results may provide useful information for winemakers, namely for the selection of the most appropriate oenological product for OTA removal, reducing wine toxicity and simultaneously enhancing food safety and wine quality.

Keywords: wine, ota removal, food safety, fining

Procedia PDF Downloads 545
4552 An Evaluation of People’s Susceptibility to Phishing Attacks in Nepal and Effectiveness of the Applied Countermeasures

Authors: Sunil Chaudhary, Rajendra Bahadur Thapa, Eleni Berki, Marko Helenius

Abstract:

The increasing number of Internet and mobile phone users, and essentially those, who use these electronic media to perform online transactions makes Nepal lucrative for phishing attacks. It is one of the reasons behind escalating phishing attacks in the country. Therefore, in this paper we examine various phishing attempts and real scenarios in Nepal to determine the seriousness of the problem. We also want to find out how prepared are the Internet and mobile phone users and how well-equipped are the private sector and government authorities responsible to handle cybercrime in the country. We considered five areas of research study, i.e., legal measures, technical and procedural measures, organizational structure, capacity building and international cooperation. These constitute important factors in cyber security and are recommended by the Global Cyber security Agenda (GCA). On the basis of our findings, we provide essential suggestions to make anti-phishing measures more appropriate to Nepalese State and society.

Keywords: internet banking, mobile banking, e-commerce, phishing, anti-phishing, Nepal

Procedia PDF Downloads 492
4551 Intrusion Detection Based on Graph Oriented Big Data Analytics

Authors: Ahlem Abid, Farah Jemili

Abstract:

Intrusion detection has been the subject of numerous studies in industry and academia, but cyber security analysts always want greater precision and global threat analysis to secure their systems in cyberspace. To improve intrusion detection system, the visualisation of the security events in form of graphs and diagrams is important to improve the accuracy of alerts. In this paper, we propose an approach of an IDS based on cloud computing, big data technique and using a machine learning graph algorithm which can detect in real time different attacks as early as possible. We use the MAWILab intrusion detection dataset . We choose Microsoft Azure as a unified cloud environment to load our dataset on. We implement the k2 algorithm which is a graphical machine learning algorithm to classify attacks. Our system showed a good performance due to the graphical machine learning algorithm and spark structured streaming engine.

Keywords: Apache Spark Streaming, Graph, Intrusion detection, k2 algorithm, Machine Learning, MAWILab, Microsoft Azure Cloud

Procedia PDF Downloads 152
4550 Factors Affecting Citizens’ Behavioural Intention to Use E-voter Registration and Verification System Towards the Electoral Process in Nigeria

Authors: Aishatu Shuaibu

Abstract:

It is expected that electronic voter registration and verification in Nigeria will enhance the integrity of elections, which is vital for democratic development; it is also expected to enhance efficiency, transparency, and security. However, the reasons for citizens' intentions with respect to behavioral use of such platforms have not been studied in the literature much. This paper, therefore, intends to look into significant characteristics affecting the acceptance and use of e-voter technology among Nigerian residents. Data will be collected using a structured questionnaire from several local government areas (LGAs) around Nigeria to evaluate the influence of demographic characteristics, technology usability, security perceptions, and governmental education on the intention to implement e-voter systems. The results will offer vital insights into the barriers and drivers of voter technology acceptance, aiding in policy suggestions to enhance voter registration and verification processes within Nigeria's electoral framework. This study is designed to aid electoral stakeholders in devising successful strategies for encouraging the broad deployment of e-voter systems in Nigeria.

Keywords: e-governance, e-voting, e-democracy, INEC, Nigeria

Procedia PDF Downloads 29
4549 Digital Literacy Skills for Geologist in Public Sector

Authors: Angsumalin Puntho

Abstract:

Disruptive technology has had a great influence on our everyday lives and the existence of an organization. Geologists in the public sector need to keep up with digital technology and be able to work and collaborate in a more effective manner. The result from SWOT and 7S McKinsey analyses suggest that there are inadequate IT personnel, no individual digital literacy development plan, and a misunderstanding of management policies. The Office of Civil Service Commission develops digital literacy skills that civil servants and government officers should possess in order to work effectively; it consists of nine dimensions, including computer skills, internet skills, cyber security awareness, word processing, spreadsheets, presentation programs, online collaboration, graphics editors and cyber security practices; and six steps of digital literacy development including self-assessment, individual development plan, self-learning, certified test, learning reflection, and practices. Geologists can use digital literacy as a learning tool to develop themselves for better career opportunities.

Keywords: disruptive technology, digital technology, digital literacy, computer skills

Procedia PDF Downloads 121
4548 In vitro Antioxidant, Anticancer Properties and Probiotic Characteristics of Selected Lactic Acid Bacteria Strains

Authors: M. G. Shehata, S. A. El Sohaimy, Marwa M. Abu-Serie, Nourhan M. Abd El-Aziz

Abstract:

Probiotic strains can potentially be used as bio-preservatives and functional food supplement. Eight lactic acid bacteria strains (LAB) Lactobacillus brevis NRRL B-4527; Streptococcus thermophilus BLM 58; Pediococcusacidilactici ATCC 8042; Lactobacillus rhamnosus CCUG 1452; Lactobacillus curvatus ATCC 51436; Lactococcuslactis sub sp. lactisDSM 20481; Lactobacillus plantarum DMSZ 20079 and Lactobacillus plantarumTF103 were selected to screen the antioxidant, anticancer potential and probiotic properties. LAB strains exhibited good probiotic, antioxidant properties and showed antagonistic activity against food-borne pathogenic (Bacillus subtilis DB 100 host; Candida albicans ATCCMYA-2876; Clostridium botulinum ATCC 3584; Escherichia coli BA 12296; Klebsiellapneumoniae ATCC12296; Salmonella senftenberg ATCC 8400 and Staphylococcus aureus NCTC 10788). Further, in vitro probiotic properties of eight strains displayed excellent acid tolerance, bile tolerance, simulated gastrointestinal juice tolerance, in vitro adhesion ability for HT-29 cell line. The antioxidant effect of intracellular and cell-free extract of lactic acid bacteria strains was evaluated by various antioxidant assays, namely, resistance to hydrogen peroxide, DPPH radical scavenging, ABTS radical scavenging, and hydroxyl radical scavenging (HRS). The results showed that intracellular and cell-free supernatant of S. Thermophilus BLM 58, L. lactissubsp.lactis DSM 20481, P. acidilactici ATCC 8042, L. brevis NRRL B-4527 strains possess excellent antioxidant capacity. The intracellular of S. Thermophilus BLM 58 and P. acidilactici ATCC 8042 also showed excellent anticancer activity against Caco-2, MCF-7, HepG-2, and PC-3. Antioxidative property of selected lactic acid bacteria strains would be useful in the functional food manufacturing industry. They could beneficially affect the consumer by providing dietary source of antioxidants.

Keywords: anticancer activity, antioxidant activity, functional food, lactic acid bacteria, probiotic

Procedia PDF Downloads 226
4547 Exploring the Effects of Cuisine Experience, Emotions, Place Attachment on Heritage Tourists’ Revisit Behavioral Intentions: The Case Study of Lu-Kang

Authors: An-Na Li, Ying-Yu Chen, Yu-Lung Lin

Abstract:

Food tourism is one of the growing industries in the tourism industry today. The Destination Marketing Organizations (DMOs) are aware of the importance of gastronomy to stimulate local and regional economic development. From the heritage and cultural aspects, gastronomy is becoming a more important part of the cultural heritage of the region. Heritage destinations provide culinary heritage, which fits the current interest in traditional food, and cuisine is a part of a general desire for authentic experience. However, few studies have empirically examined antecedents of food tourists’ behavioral intentions. This study examined the effects of cuisine experience; emotions, place attachment and tourists’ revisit behavioral intentions. A total of 408 individuals responded to the on-site survey in the historic town of Lu-Kang in Taiwan. The results indicated that tourists’ cuisine experience include place flavor, media recommendation, local learning, life transfer and interpersonal share. In addition, cuisine experience had significant impacts on emotions and place attachment, emotions had significant effects on place attachment, furthermore, which in turn place attachment had significant effects on tourists’ revisit behavioral intentions. The findings suggested that the cuisine experience is a multi-dimensions construct. On the other hands, the good quality of cuisine experience could evoke tourists’ positive emotions and it could play a significant role in promoting tourist revisit intentions or word of mouth. Implications for theory and practice are discussed.

Keywords: culinary tourism, cuisine experiences, emotions, revisit intentions

Procedia PDF Downloads 254
4546 Use of Cassava Flour in Cakes Processing

Authors: S. S. Silva, S. M. A. Souza, C. F. P. Oliveira

Abstract:

Brazil's agriculture is a major economic base in the country; in addition, family farming is directly responsible for the production of most agricultural products in Brazil, such as cassava. The number of studies on the use of cassava and its derivatives in the food industry has been increased, which is the basis of this study. Sought to develop a food that take advantage the products from farmers, adding value to these products and to study its effects as a replacement for wheat flour. For such elaborated a gluten-free cake – aiming to meet the needs of the celiac public – containing cassava flour, cane sugar, honey, egg, soya oil, coconut desiccated, baking powder and water. For evaluation of their characteristics technological, physicochemical and texture characterizations were done. Cake showed similar characteristics of cake made with wheat flour and growth and aeration of the dough. In sum up, marketing the product is viable, in that it has a typical overall appearance of cake made of wheat flour, meet the needs of celiac people and value the family farming.

Keywords: baking, cake, cassava flour, celiac disease

Procedia PDF Downloads 431
4545 Bactericidal Efficacy of Quaternary Ammonium Compound on Carriers with Food Additive Grade Calcium Hydroxide against Salmonella Infantis and Escherichia coli

Authors: M. Shahin Alam, Satoru Takahashi, Mariko Itoh, Miyuki Komura, Mayuko Suzuki, Natthanan Sangsriratanakul, Kazuaki Takehara

Abstract:

Cleaning and disinfection are key components of routine biosecurity in livestock farming and food processing industry. The usage of suitable disinfectants and their proper concentration are important factors for a successful biosecurity program. Disinfectants have optimum bactericidal and virucidal efficacies at temperatures above 20°C, but very few studies on application and effectiveness of disinfectants at low temperatures have been done. In the present study, the bactericidal efficacies of food additive grade calcium hydroxide (FdCa(OH)), quaternary ammonium compound (QAC) and their mixture, were investigated under different conditions, including time, organic materials (fetal bovine serum: FBS) and temperature, either in suspension or in carrier test. Salmonella Infantis and Escherichia coli, which are the most prevalent gram negative bacteria in commercial poultry housing and food processing industry, were used in this study. Initially, we evaluated these disinfectants at two different temperatures (4°C and room temperature (RT) (25°C ± 2°C)) and 7 contact times (0, 5 and 30 sec, 1, 3, 20 and 30 min), with suspension tests either in the presence or absence of 5% FBS. Secondly, we investigated the bactericidal efficacies of these disinfectants by carrier tests (rubber, stainless steel and plastic) at same temperatures and 4 contact times (30 sec, 1, 3, and 5 min). Then, we compared the bactericidal efficacies of each disinfectant within their mixtures, as follows. When QAC was diluted with redistilled water (dW2) at 1: 500 (QACx500) to obtain the final concentration of didecyl-dimethylammonium chloride (DDAC) of 200 ppm, it could inactivate Salmonella Infantis within 5 sec at RT either with or without 5% FBS in suspension test; however, at 4°C it required 30 min in presence of 5% FBS. FdCa(OH)2 solution alone could inactivate bacteria within 1 min both at RT and 4°C even with 5% FBS. While FdCa(OH)2 powder was added at final concentration 0.2% to QACx500 (Mix500), the mixture could inactivate bacteria within 30 sec and 5 sec, respectively, with or without 5% FBS at 4°C. The findings from the suspension test indicated that low temperature inhibited the bactericidal efficacy of QAC, whereas Mix500 was effective, regardless of short contact time and low temperature, even with 5% FBS. In the carrier test, single disinfectant required bit more time to inactivate bacteria on rubber and plastic surfaces than on stainless steel. However, Mix500 could inactivate S. Infantis on rubber, stainless steel and plastic surfaces within 30 sec and 1 min, respectively, at RT and 4°C; but, for E. coli, it required only 30 sec at both temperatures. So, synergistic effects were observed on different carriers at both temperatures. For a successful enhancement of biosecurity during winter, the disinfectants should be selected that could have short contact times with optimum efficacy against the target pathogen. The present study findings help farmers to make proper strategies for application of disinfectants in their livestock farming and food processing industry.

Keywords: carrier, food additive grade calcium hydroxide (FdCa(OH)₂), quaternary ammonium compound, synergistic effects

Procedia PDF Downloads 295