Search results for: food security index
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8852

Search results for: food security index

8612 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 517
8611 Developing Cyber Security Asset Mangement Framework for UK Rail

Authors: Shruti Kohli

Abstract:

The sophistication and pervasiveness of cyber-attacks are constantly growing, driven partly by technological progress, profitable applications in organized crime and state-sponsored innovation. The modernization of rail control systems has resulted in an increasing reliance on digital technology and increased the potential for security breaches and cyber-attacks. This research track showcases the need for developing a secure reusable scalable framework for enhancing cyber security of rail assets. A cyber security framework has been proposed that is being developed to detect the tell-tale signs of cyber-attacks against industrial assets.

Keywords: cyber security, rail asset, security threat, cyber ontology

Procedia PDF Downloads 404
8610 Contribution of Home Gardens to Rural Household Income in Raymond Mhlaba Local Municipality, Eastern Cape Province, South Africa

Authors: K. Alaka, A. Obi

Abstract:

Home garden has proved to be significant to rural inhabitants by providing a wide range of useful products such as fruits, vegetables and medicine. There is need for quantitative information on its benefits and contributions to rural household. The main objective of this study is to investigate contributions of home garden to income of rural households in Raymond Mhlaba Local Municipality, formerly Nkonkobe Local Municipality of Eastern Cape Province South Africa. The stratified random sampling method was applied in order to choose a sample of 160 households.The study was conducted among 80 households engaging in home gardens and 80 non- participating households in the study area. Data analysis employed descriptive statistics with the use of frequency table and one way sample T test to show actual contributions. The overall model shows that social grant has the highest contribution to total household income for both categories while income generated from home garden has the second largest share to total household income, this shows that the majority of rural households in the study area rely on social grant as their source of income. However, since most households are net food buyers, it is essential to have policies that are formulated with an understanding that household food security is not only a function of the food that farming households produce for their own consumption but more so a function of total household income. The results produced sufficient evidence that home gardens contribute significantly to income of rural household.

Keywords: food security, home gardening, household, income

Procedia PDF Downloads 196
8609 Enhancing the Network Security with Gray Code

Authors: Thomas Adi Purnomo Sidhi

Abstract:

Nowadays, network is an essential need in almost every part of human daily activities. People now can seamlessly connect to others through the Internet. With advanced technology, our personal data now can be more easily accessed. One of many components we are concerned for delivering the best network is a security issue. This paper is proposing a method that provides more options for security. This research aims to improve network security by focusing on the physical layer which is the first layer of the OSI model. The layer consists of the basic networking hardware transmission technologies of a network. With the use of observation method, the research produces a schematic design for enhancing the network security through the gray code converter.

Keywords: network, network security, grey code, physical layer

Procedia PDF Downloads 470
8608 The Threshold Values of Soil Water Index for Landslides on Country Road No.89

Authors: Ji-Yuan Lin, Yu-Ming Liou, Yi-Ting Chen, Chen-Syuan Lin

Abstract:

Soil water index obtained by tank model is now commonly used in soil and sand disaster alarm system in Japan. Comparing with the rainfall trigging index in Taiwan, the tank model is easy to predict the slope water content on large-scale landslide. Therefore, this study aims to estimate the threshold value of large-scale landslide using the soil water index Sixteen typhoons and heavy rainfall events, were selected to establish the, to relationship between landslide event and soil water index. Finally, the proposed threshold values for landslides on country road No.89 are suggested in this study. The study results show that 95% landslide cases occurred in soil water index more than 125mm, and 30% of the more serious slope failure occurred in the soil water index is greater than 250mm. Beside, this study speculates when soil water index more than 250mm and the difference value between second tank and third tank less than -25mm, it leads to large-scale landslide more probably.

Keywords: soil water index, tank model, landslide, threshold values

Procedia PDF Downloads 355
8607 The Food Industry in Nigeria: Development and Quality Assurance

Authors: Agi Sunday, Agih Ukuru Agih

Abstract:

In Nigeria, the food processing sector is dominated by small and medium enterprises, as well as multinational food companies. Quality standards are usually related to improving the safety of food products suitable for consumption in accordance to specifications by food regulatory bodies. These standards are essential elements for local and international businesses which contribute to economic progress through industrial development and trade. This review takes a critical look on the Nigerian food industry development in terms of quality standards that are necessary to be given consideration in the production of food and also ways of improving food production in Nigeria through the use of Total Quality Management (TQM) technique and the use of computerized systems to produce high quality and high value products while at the same time reducing production time and cost.

Keywords: food industry, quality assurance, Nigeria, TQM, computerized systems

Procedia PDF Downloads 422
8606 Human Security as a Tool of Protecting International Human Rights Law

Authors: Arenca Trashani

Abstract:

20 years after its first entrance in a General Assembly of the United Nation’s Resolution, human security has became a very important tool in a global debate affecting directly the whole main rules and regulations in international law and more closely in international human rights law. This paper will cover a very important issue of today at how the human security has its impact to the development of international human rights law, not as far as a challenge as it is seen up now but a tool of moving toward development and globalization. In order to analyze the impact of human security to the global agenda, we need to look to the main pillars of the international legal order which are affected by the human security in itself and its application in the policy making for this international legal order global and regional ones. This paper will focus, also, on human security, as a new and very important tool of measuring development, stability and the level of democratic consolidation and the respect for human rights especially in developing countries such as Albania. The states are no longer capable to monopolize the use of human security just within their boundaries and separated from the other principles of a functioning democracy. In this context, human security would be best guaranteed under the respect of the rule of law and democratization. During the last two decades the concept security has broadly developed, from a state-centric to a more human-centric approach: from state security to respect for human rights, to economic security, to environmental security as well. Last but not least we would see that human rights could be affected by human security not just at their promotion but also at their enforcement and mainly at the international institutions, which are entitled to promote and to protect human rights.

Keywords: human security, international human rights law, development, Albania, international law

Procedia PDF Downloads 721
8605 Drivers of Deforestation in the Colombian Amazon: An Empirical Causal Loop Diagram of Food Security and Land-Use Change

Authors: Jesica López, Deniz Koca, Asaf Tzachor

Abstract:

In 2016 the historic peace accord between the Colombian government and the Revolutionary Armed Forces of Colombia (FARC) had no strong mechanism for managing changes to land use and the environment. Since the end of a 60-year conflict in Colombia, large areas of forest in the Amazon region have been rapidly converted to agricultural uses, most recently by cattle ranching. This suggests that the peace agreement presents a threat to the conservation of the country's rainforest. We analyze the effects of cattle ranching as a driver and accelerator of deforestation from a systemic perspective, focusing on two key leverage points the legal and illegal activities involved in the cattle ranching practices. We map and understand the inherent dynamic complexity of deforestation, including factors such as land policy instruments, national strategy to tackle deforestation, land use nexus with Amazonian food systems, and loss of biodiversity. Our results show that deforestation inside Colombian Protected Areas (PAs) in the Amazon region and the surrounding buffer areas has accelerated with the onset of peace. By using a systems analysis approach, we contextualized the competition of land between cattle ranching and the need to protect tropical forests and their biodiversity loss. We elaborate on future recommendations for land use management decisions making suggest the inclusion of an Amazonian food system, interconnecting and visualizing the synergies between sustainable development goals, climate action (SDG 13) and life on land (SDG 15).

Keywords: tropical rainforest, deforestation, sustainable land use, food security, Colombian Amazon

Procedia PDF Downloads 65
8604 The Law of Treaties and National Security of Islamic Republic of Iran

Authors: S. M. Tavakoli Sani, M. Sabbet Moghadam, Y. Khorram Farhadi, Iraj Rezayi Nejad

Abstract:

The concept of national security in Iran is a permanently effective factor in acceptance or rejection of many international obligations. These obligations had been defined according to the type of legislation of Iran in many aspects. Therefore, there are several treaties at international level which requires Iran’s security to come in contact with obligations in these treaties in a way that an obstacle to join to them and their passage in parliament. This issue is a typical category which every country pays attention to be accepted in treaties or to include their national security in that treaties and also they can see the related treaties from this perspective, but this issue that 'what is the concept of Iran’s national security', and 'To what extent it is changed in recent years, especially after Islamic Revolution' are important issues that can be criticized. Thus, this study is trying to assess singed treaties from the perspective of Iran’s national security according of the true meaning of treaty and to investigate how the international treaties may be in conflict with Iran’s national security.

Keywords: treaties, national security, Iran, Islamic Revolution

Procedia PDF Downloads 439
8603 Resilient Regions for Purpose of Crisis Management

Authors: Jana Gebhartova, Tomas Duda, Ivan Benes

Abstract:

World is characterized by constantly emerging new links, increasing complexity and speed of processes in the society. The globalized world needs (except political and financial mechanisms and institutions) functional supply chains. Transport and supply chains can be interrupted in case of natural disasters, conflicts and civil disorders, sudden demand shocks, export/import restrictions, terrorism. Long-term interruption of crucial services for human existence can results in breakdown of the whole society. If global supply chains can be interrupted, the ability to survive a crisis situation depends on local self-sufficiency, it means ensuring water, food and energy. In the world of 21st century, new way of thinking (based on the concept of resilience) is needed. Planning for self-sufficiency and resilience must be part of the agenda of local governments. The paper presents first results of research project VF20112015518 “Security of population – crisis management” that deals with issue of critical infrastructure, ensuring regional self-sufficiency in crisis situations and issues related to population protection and water, energy and food security. The project is being solved within Security Research of Ministry of the Interior of the Czech Republic in 2011-2015.

Keywords: crisis management, resilience, indicators of self-sufficiency, continuity of supplies

Procedia PDF Downloads 351
8602 Designing of Household Dishes to Help Food Waste Prevention Strategies

Authors: Ching-Hsu Huang, Shang-Huan Wu

Abstract:

In recent years, environmental awareness has increased, environmental issues caused by meat-eating have been extended to promote reducing food surplus and waste advocates. We lose more than 3 million tons of food on average on a daily basis. Private households represent the largest food-waste faction. The main purpose of this study is to design and develop household dishes by using edible food surplus. The questionnaires were conducted to find the majority of food surplus from households, including carrot peel, pumpkin, fish skin, and soy dregs—this study designed and developed the household dishes by using the leftovers. We briefly discuss the contributions of the dishes. Mapping the household dishes deepens the promotion of household food waste prevention strategies. This study also linked the results with a set of policy, education, and restaurant business options

Keywords: food waste, food surplus, household dishes design, food waste prevention strategies

Procedia PDF Downloads 144
8601 The Implementation of Information Security Audits in Public Sector: Perspective from Indonesia

Authors: Nur Imroatun Sholihat, Gresika Bunga Sylvana

Abstract:

Currently, cyber attack became an incredibly serious problem due to its increasing trend all over the world. Therefore, information security becomes prominent for every organization including public sector organization. In Indonesia, unfortunately, Ministry of Finance (MoF) is the only public sector organization that has already formally established procedure to assess its information security adequacy by performing information security audits (November 2017). We assess the implementation of information security audits in the MoF using qualitative data obtained by interviewing IT auditors and by analysis of related documents. For this reason, information security audit practice in the MoF could become the acceptable benchmark for all other public sector organizations in Indonesia. This study is important because, to the best of the author’s knowledge, our research into information security audits practice in Indonesia’s public sector have not been found yet. Results showed that information security audits performed mostly by doing pentest (penetration testing) to MoF’s critical applications.

Keywords: information security audit, information technology, Ministry of Finance of Indonesia, public sector organization

Procedia PDF Downloads 197
8600 Software Quality Assurance in Network Security using Cryptographic Techniques

Authors: Sidra Shabbir, Ayesha Manzoor, Mehreen Sirshar

Abstract:

The use of the network communication has imposed serious threats to the security of assets over the network. Network security is getting more prone to active and passive attacks which may result in serious consequences to data integrity, confidentiality and availability. Various cryptographic techniques have been proposed in the past few years to combat with the concerned problem by ensuring quality but in order to have a fully secured network; a framework of new cryptosystem was needed. This paper discusses certain cryptographic techniques which have shown far better improvement in the network security with enhanced quality assurance. The scope of this research paper is to cover the security pitfalls in the current systems and their possible solutions based on the new cryptosystems. The development of new cryptosystem framework has paved a new way to the widespread network communications with enhanced quality in network security.

Keywords: cryptography, network security, encryption, decryption, integrity, confidentiality, security algorithms, elliptic curve cryptography

Procedia PDF Downloads 702
8599 A Novel Spectral Index for Automatic Shadow Detection in Urban Mapping Based on WorldView-2 Satellite Imagery

Authors: Kaveh Shahi, Helmi Z. M. Shafri, Ebrahim Taherzadeh

Abstract:

In remote sensing, shadow causes problems in many applications such as change detection and classification. It is caused by objects which are elevated, thus can directly affect the accuracy of information. For these reasons, it is very important to detect shadows particularly in urban high spatial resolution imagery which created a significant problem. This paper focuses on automatic shadow detection based on a new spectral index for multispectral imagery known as Shadow Detection Index (SDI). The new spectral index was tested on different areas of World-View 2 images and the results demonstrated that the new spectral index has a massive potential to extract shadows effectively and automatically.

Keywords: spectral index, shadow detection, remote sensing images, World-View 2

Procedia PDF Downloads 498
8598 Security Features for Remote Healthcare System: A Feasibility Study

Authors: Tamil Chelvi Vadivelu, Nurazean Maarop, Rasimah Che Yusoff, Farhana Aini Saludin

Abstract:

Implementing a remote healthcare system needs to consider many security features. Therefore, before any deployment of the remote healthcare system, a feasibility study from the security perspective is crucial. Remote healthcare system using WBAN technology has been used in other countries for medical purposes but in Malaysia, such projects are still not yet implemented. This study was conducted qualitatively. The interview results involving five healthcare practitioners are further elaborated. The study has addressed four important security features in order to incorporate remote healthcare system using WBAN in Malaysian government hospitals.

Keywords: remote healthcare, IT security, security features, wireless sensor application

Procedia PDF Downloads 272
8597 Food Safety and Quality Assurance and Skills Development among Farmers in Georgia

Authors: Kakha Nadiardze, Nana Phirosmanashvili

Abstract:

The goal of this paper is to present the problems of lack of information among farmers in food safety. Global food supply chains are becoming more and more diverse, making traceability systems much harder to implement across different food markets. In this abstract, we will present our work for analyzing the key developments in Georgian food market from regulatory controls to administrative procedures to traceability technologies. Food safety and quality assurance are most problematic issues in Georgia as food trade networks become more and more complex, food businesses are under more and more pressure to ensure that their products are safe and authentic. The theme follow-up principles from farm to table must be top-of-mind for all food manufacturers, farmers and retailers. Following the E. coli breakout last year, as well as more recent cases of food mislabeling, developments in food traceability systems is essential to food businesses if they are to present a credible brand image. Alongside this are the ever-developing technologies in food traceability networks, technologies that manufacturers and retailers need to be aware of if they are to keep up with food safety regulations and avoid recall. How to examine best practice in food management is the main question in order to protect company brand through safe and authenticated food. We are working with our farmers to work with our food safety experts and technology developers throughout the food supply chain. We provide time by time food analyses on heavy metals, pesticide residues and different pollutants. We are disseminating information among farmers how the latest food safety regulations will impact the methods to use to identify risks within their products.

Keywords: food safety, GMO, LMO, E. coli, quality

Procedia PDF Downloads 476
8596 Application of Drones in Agriculture

Authors: Reza Taherlouei Safa, Mohammad Aboonajmi

Abstract:

Agriculture plays an essential role in providing food for the world's population. It also offers numerous benefits to countries, including non-food products, transportation, and environmental balance. Precision agriculture, which employs advanced tools to monitor variability and manage inputs, can help achieve these benefits. The increasing demand for food security puts pressure on decision-makers to ensure sufficient food production worldwide. To support sustainable agriculture, unmanned aerial vehicles (UAVs) can be utilized to manage farms and increase yields. This paper aims to provide an understanding of UAV usage and its applications in agriculture. The objective is to review the various applications of UAVs in agriculture. Based on a comprehensive review of existing research, it was found that different sensors provide varying analyses for agriculture applications. Therefore, the purpose of the project must be determined before using UAV technology for better data quality and analysis. In conclusion, identifying a suitable sensor and UAV is crucial to gather accurate data and precise analysis when using UAVs in agriculture.

Keywords: drone, precision agriculture, farmer income, UAV

Procedia PDF Downloads 41
8595 Investigating Trophic Relationships in Moroccan Marine Ecosystems: A Study of the Mediterranean and Atlantic Using Ecopath

Authors: Salma Aboussalam, Karima Khalil, Khalid Elkalay

Abstract:

An Ecopath model was employed to investigate the trophic structure, function, and current state of the Moroccan Mediterranean Sea ecosystem. The model incorporated 31 functional groups, including 21 fish species, 7 invertebrates, 2 primary producers, and a detritus group. The trophic interactions among these groups were analyzed, revealing an average trophic transfer efficiency of 23%. The results indicated that the ecosystem produced more energy than it consumed, with high respiration and consumption rates. Indicators of stability and development were low for the Finn cycle index (13.97), system omnivory index (0.18), and average Finn path length (3.09), indicating a disturbed ecosystem with a linear trophic structure. Keystone species were identified through the use of the keystone index and mixed trophic impact analysis, with demersal invertebrates, zooplankton, and cephalopods found to have a significant impact on other groups.

Keywords: Ecopath, food web, trophic flux, Moroccan Mediterranean Sea

Procedia PDF Downloads 56
8594 Analysis, Evaluation and Optimization of Food Management: Minimization of Food Losses and Food Wastage along the Food Value Chain

Authors: G. Hafner

Abstract:

A method developed at the University of Stuttgart will be presented: ‘Analysis, Evaluation and Optimization of Food Management’. A major focus is represented by quantification of food losses and food waste as well as their classification and evaluation regarding a system optimization through waste prevention. For quantification and accounting of food, food losses and food waste along the food chain, a clear definition of core terms is required at the beginning. This includes their methodological classification and demarcation within sectors of the food value chain. The food chain is divided into agriculture, industry and crafts, trade and consumption (at home and out of home). For adjustment of core terms, the authors have cooperated with relevant stakeholders in Germany for achieving the goal of holistic and agreed definitions for the whole food chain. This includes modeling of sub systems within the food value chain, definition of terms, differentiation between food losses and food wastage as well as methodological approaches. ‘Food Losses’ and ‘Food Wastes’ are assigned to individual sectors of the food chain including a description of the respective methods. The method for analyzing, evaluation and optimization of food management systems consist of the following parts: Part I: Terms and Definitions. Part II: System Modeling. Part III: Procedure for Data Collection and Accounting Part. IV: Methodological Approaches for Classification and Evaluation of Results. Part V: Evaluation Parameters and Benchmarks. Part VI: Measures for Optimization. Part VII: Monitoring of Success The method will be demonstrated at the example of an invesigation of food losses and food wastage in the Federal State of Bavaria including an extrapolation of respective results to quantify food wastage in Germany.

Keywords: food losses, food waste, resource management, waste management, system analysis, waste minimization, resource efficiency

Procedia PDF Downloads 366
8593 Modelling and Simulation of Bioethanol Production from Food Waste Using CHEMCAD Software

Authors: Kgomotso Matobole, Noluzuko Monakali, Hilary Rutto, Tumisang Seodigeng

Abstract:

On a global scale, there is an alarming generation of food waste. Food waste is generated across the food supply chain. Worldwide urbanization, as well as global economic growth, have contributed to this amount of food waste the environment is receiving. Food waste normally ends on illegal dumping sites when not properly disposed, or disposed to landfills. This results in environmental pollution due to inadequate waste management practices. Food waste is rich in organic matter and highly biodegradable; hence, it can be utilized for the production of bioethanol, a type of biofuel. In so doing, alternative energy will be created, and the volumes of food waste will be reduced in the process. This results in food waste being seen as a precious commodity in energy generation instead of a pollutant. The main aim of the project was to simulate a biorefinery, using a software called CHEMCAD 7.12. The resulting purity of the ethanol from the simulation was 98.9%, with the feed ratio of 1: 2 for food waste and water. This was achieved by integrating necessary unit operations and optimisation of their operating conditions.

Keywords: fermentation, bioethanol, food waste, hydrolysis, simulation, modelling

Procedia PDF Downloads 307
8592 IT System in the Food Supply Chain Safety, Application in SMEs Sector

Authors: Mohsen Shirani, Micaela Demichela

Abstract:

Food supply chain is one of the most complex supply chain networks due to its perishable nature and customer oriented products, and food safety is the major concern for this industry. IT system could help to minimize the production and consumption of unsafe food by controlling and monitoring the entire system. However, there have been many issues in adoption of IT system in this industry specifically within SMEs sector. With this regard, this study presents a novel approach to use IT and tractability systems in the food supply chain, using application of RFID and central database.

Keywords: food supply chain, IT system, safety, SME

Procedia PDF Downloads 441
8591 User Survey on Food and Drinks in Japanese Public Libraries

Authors: Marika Kawamoto, Keita Tsuji

Abstract:

Several decades ago, food and drinks were disallowed in most Japanese libraries. However, as discussions of “Library as a Place” have increased in recent years, the number of public and university libraries that have relaxed their policies to allow food and drinks have been increasing. This study focused on the opinions of library users on allowing food and drinks in public libraries and conducted a questionnaire survey among users of nine Japanese libraries. The results indicated that many users favored allowing food and drinks in libraries. Furthermore, it was found that users tend to frequently visit and stay longer in libraries where food and drinks are allowed.

Keywords: food and drinks, Japanese libraries, opinions of users, public libraries

Procedia PDF Downloads 269
8590 A Survey of Attacks and Security Requirements in Wireless Sensor Networks

Authors: Vishnu Pratap Singh Kirar

Abstract:

Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.

Keywords: wireless sensor network (WSN), wireless network attacks, wireless network security, security requirements

Procedia PDF Downloads 453
8589 Association of Dietary Intake with the Nutrition Knowledge, Food Label Use, and Food Preferences of Adults in San Jose del Monte City, Bulacan, Philippines

Authors: Barby Jennette A. Florano

Abstract:

Dietary intake has been associated with the health and wellbeing of adults, and lifestyle related diseases. The aim of this study was to investigate whether nutrition knowledge, food label use, and food preference are associated with the dietary intake in a sample of San Jose Del Monte City, Bulacan (SJDM) adults. A sample of 148 adults, with a mean age of 20 years, completed a validated questionnaire related to their demographic, dietary intake, nutrition knowledge, food label use and food preference. Data were analyzed using Pearson correlation and there was no association between dietary intake and nutrition knowledge. However, there were positive relationships between dietary intake and food label use (r=0.1276, p<0.10), and dietary intake and food preference (r=0.1070, p<0.10). SJDM adults who use food label and have extensive food preference had better diet quality. This finding magnifies the role of nutrition education as a potential tool in health campaigns to promote healthy eating patterns and reading food labels among students and adults. Results of this study can give information for the design of future nutrition education intervention studies to assess the efficacy of nutrition knowledge and food label use among a similar sample population.

Keywords: dietary intake, nutrition knowledge, food preference, food label use

Procedia PDF Downloads 54
8588 Design and Realization of Computer Network Security Perception Control System

Authors: El Miloudi Djelloul

Abstract:

Based on analysis on applications by perception control technology in computer network security status and security protection measures, from the angles of network physical environment and network software system environmental security, this paper provides network security system perception control solution using Internet of Things (IOT), telecom and other perception technologies. Security Perception Control System is in the computer network environment, utilizing Radio Frequency Identification (RFID) of IOT and telecom integration technology to carry out integration design for systems. In the network physical security environment, RFID temperature, humidity, gas and perception technologies are used to do surveillance on environmental data, dynamic perception technology is used for network system security environment, user-defined security parameters, security log are used for quick data analysis, extends control on I/O interface, by development of API and AT command, Computer Network Security Perception Control based on Internet and GSM/GPRS is achieved, which enables users to carry out interactive perception and control for network security environment by WEB, E-MAIL as well as PDA, mobile phone short message and Internet. In the system testing, through middle ware server, security information data perception in real time with deviation of 3-5% was achieved; it proves the feasibility of Computer Network Security Perception Control System.

Keywords: computer network, perception control system security strategy, Radio Frequency Identification (RFID)

Procedia PDF Downloads 412
8587 Human Security Providers in Fragile State under Asymmetric War Conditions

Authors: Luna Shamieh

Abstract:

Various players are part of the game in an asymmetric war, all making efforts to provide human security to their own adherents. Although a fragile state is not able to provide sufficient and comprehensive services, it still provides special services and security to the elite; the insurgents as well provide services and security to their associates. The humanitarian organisations, on the other hand, provide some fundamental elements of human security, but only in the regions, they are able to access when possible (if possible). The counterinsurgents (security forces of the state and intervention forces) operate within a narrow band defined by the vision of the responsibility to protect and the perspective of the resolution of the conflict through combat; hence, the possibility to provide human security is shaken at this end. This article examines how each player provides human security from the perspective of freedom from want in order to secure basic and strategic needs, freedom from fear through providing protection against all kinds of violence, and the freedom to live in dignity. It identifies a vicious cycle caused by the intervention of the different players causing a centrifugal force that may lead to disintegration of the nation under war.

Keywords: asymmetric war, counterinsurgency, fragile state, human security, insurgency

Procedia PDF Downloads 308
8586 Antmicrobial Packaging, a Step Towards Safe Food: A Review

Authors: Hafiz A. Sakandar, M. Afzaal, U. Khan, M. N. Akhtar

Abstract:

Food is the primary concern of living organisms, provision of diet for maintenance of good physical and mental health is a basic right of an individual and the outcome of factors related to diet on health has been matter of apprehension since ancient times. Healthy and fresh food always demanded by the consumers. Modern research has find out many alternatives of traditional packaging. Now the consumer knows that good packaging system is that which protects the food from the contaminants and increases shelf life of food product. While in Pakistan about 40% of fruits and vegetables lost due to spoilage caused by poor handling, transportation, and poor packaging interaction with other environmental conditions. So it is crucial for developing countries like Pakistan to pay attention to these exacerbating situations for economy losses by considering food packaging an ultimate solution to the problem.

Keywords: packaging, food safety, antimicrobial, food losses

Procedia PDF Downloads 518
8585 Child Feeding Practices of Mothers (Childbearing) and Exploration of Their Household Food Insecurity in a Coastal Region of Bangladesh

Authors: Md Abdullah Al Mamun

Abstract:

Background: The current situation of Ensuring WHO recommended feeding practices for infant and young children which is becoming a challenge nowadays in many developing countries, especially in areas where household food security is at risk. Because many households of the developing countries often encounter severe food insecurity hence provision of adequate child nutrition is threatened. Aim: The study aimed to assess the child feeding practices of 0-24 months childbearing mothers and explore their household food insecurity in a coastal region of Bangladesh. Methods: This study was conducted in Suborno Char (one of the coastal suburbs in Noakhali District in Bangladesh) from October 2019 to April 2020. A total of 400 mothers were selected with their children of 0-24 months following a cross sectional study sampling procedure of the population. Data were collected through a standard questionnaire and analyzed using statistical tests in SPSS version 20.0.0. Results: The frequency of exclusive breastfeeding, timely initiation of complementary feeding, and giving foods from four food groups to the children were 53.5%, 75.5%, and 22.2%, respectively. Mother's level of education showed a strong association with the child feeding practices of the mothers. Mothers of severely food insecure households showed lower odds in exclusive breastfeeding practice (COR 0.233 at 95% CI 0.083, 0.655; and AOR 0.478 at 95% CI 0.133, 1.713) than mothers of food secured households. Similar results have also been found in case of timely initiation of complementary feeding and minimum dietary diversity of the children.

Keywords: household food insecurity, exclusive breastfeeding, complementary feeding, maternal education, mothers age, household income

Procedia PDF Downloads 128
8584 Review of Cyber Security in Oil and Gas Industry with Cloud Computing Perspective: Taxonomy, Issues and Future Direction

Authors: Irfan Mohiuddin, Ahmad Al Mogren

Abstract:

In recent years, cloud computing has earned substantial attention in the Oil and Gas Industry and provides services in all the phases of the industry lifecycle. Oil and gas supply infrastructure, in particular, is more vulnerable to accidental, natural and intentional threats because of its widespread distribution. Numerous surveys have been conducted on cloud security and privacy. However, to the best of our knowledge, hardly any survey is carried out that reviews cyber security in all phases with a cloud computing perspective. Moreover, a distinctive classification is performed for all the cloud-based cyber security measures based on the cloud component in use. The classification approach will enable researchers to identify the required technique used to enhance the security in specific cloud components. Also, the limitation of each component will allow the researchers to design optimal algorithms. Lastly, future directions are given to point out the imminent challenges that can pave the way for researchers to further enhance the resilience to cyber security threats in the oil and gas industry.

Keywords: cyber security, cloud computing, safety and security, oil and gas industry, security threats, oil and gas pipelines

Procedia PDF Downloads 115
8583 Blockchain Security in MANETs

Authors: Nada Mouchfiq, Ahmed Habbani, Chaimae Benjbara

Abstract:

The security aspect of the IoT occupies a place of great importance especially after the evolution that has known this field lastly because it must take into account the transformations and the new applications .Blockchain is a new technology dedicated to the data sharing. However, this does not work the same way in the different systems with different operating principles. This article will discuss network security using the Blockchain to facilitate the sending of messages and information, enabling the use of new processes and enabling autonomous coordination of devices. To do this, we will discuss proposed solutions to ensure a high level of security in these networks in the work of other researchers. Finally, our article will propose a method of security more adapted to our needs as a team working in the ad hoc networks, this method is based on the principle of the Blockchain and that we named ”MPR Blockchain”.

Keywords: Ad hocs networks, blockchain, MPR, security

Procedia PDF Downloads 147