26,704 research outputs found

    Critical control points along the organic food supply chain

    Get PDF
    Within the framework of “Organic HACCP” a systematic analysis was carried out among selected certified organic food production chains (wheat bread, cabbage, tomatoes, apples, wine, eggs, milk) to investigate current procedures of production management and quality assurance related to the chains. Relevant critical control points (CCPs) were accordingly assessed for the single management steps of production, wholesale, processing, transport and retail. Therefore, a questionnaire was set up by experts knowledgeable in the areas of seven quality and safety criteria such as microbial toxins and abiotic contaminants, nutrient content and food additives, pathogens, freshness and taste, natural plant toxicants, fraud, social and ethical aspects. Questions were formulated with regard to the areas of consumer concerns. A database was established to carry out the analysis of collected data representing several regions typical for the selected commodity and to overview the management steps and their critical control points. The database contains information on i) the background of the CCPs, ii) the quantitative risk related to other chains in the analysis or, if relevant, compared with data from other studies, iii) how and why the step is controlled in the chain or suggestions of means for improved control and, iv) discussions in relation to the differences between the chains. Possibilities which may alleviate the problem at a later stage, if relevant, are also included. The lecture will highlight examples of critical control points along organic food chains

    TIMCC: On Data Freshness in Privacy-Preserving Incentive Mechanism Design for Continuous Crowdsensing Using Reverse Auction

    Get PDF
    © 2013 IEEE. As an emerging paradigm that leverages the wisdom and efforts of the crowd, mobile crowdsensing has shown its great potential to collect distributed data. The crowd may incur such costs and risks as energy consumption, memory consumption, and privacy leakage when performing various tasks, so they may not be willing to participate in crowdsensing tasks unless they are well-paid. Hence, a proper privacy-preserving incentive mechanism is of great significance to motivate users to join, which has attracted a lot of research efforts. Most of the existing works regard tasks as one-shot tasks, which may not work very well for the type of tasks that requires continuous monitoring, e.g., WIFI signal sensing, where the WiFi signal may vary over time, and users are required to contribute continuous efforts. The incentive mechanism for continuous crowdsensing has yet to be investigated, where the corresponding tasks need continuous efforts of users, and the freshness of the sensed data is very important. In this paper, we design TIMCC, a privacy-preserving incentive mechanism for continuous crowdsensing. In contrast to most existing studies that treat tasks as one-shot tasks, we consider the tasks that require users to contribute continuous efforts, where the freshness of data is a key factor impacting the value of data, which further determines the rewards. We introduce a metric named age of data that is defined as the amount of time elapsed since the generation of the data to capture the freshness of data. We adopt the reverse auction framework to model the connection between the platform and the users. We prove that the proposed mechanism satisfies individual rationality, computational efficiency, and truthfulness. Simulation results further validate our theoretical analysis and the effectiveness of the proposed mechanism

    A Study of IEEE 802.15.4 Security Framework for Wireless Body Area Network

    Full text link
    A Wireless Body Area Network (WBAN) is a collection of low-power and lightweight wireless sensor nodes that are used to monitor the human body functions and the surrounding environment. It supports a number of innovative and interesting applications, including ubiquitous healthcare and Consumer Electronics (CE) applications. Since WBAN nodes are used to collect sensitive (life-critical) information and may operate in hostile environments, they require strict security mechanisms to prevent malicious interaction with the system. In this paper, we first highlight major security requirements and Denial of Service (DoS) attacks in WBAN at Physical, Medium Access Control (MAC), Network, and Transport layers. Then we discuss the IEEE 802.15.4 security framework and identify the security vulnerabilities and major attacks in the context of WBAN. Different types of attacks on the Contention Access Period (CAP) and Contention Free Period (CFP) parts of the superframe are analyzed and discussed. It is observed that a smart attacker can successfully corrupt an increasing number of GTS slots in the CFP period and can considerably affect the Quality of Service (QoS) in WBAN (since most of the data is carried in CFP period). As we increase the number of smart attackers the corrupted GTS slots are eventually increased, which prevents the legitimate nodes to utilize the bandwidth efficiently. This means that the direct adaptation of IEEE 802.15.4 security framework for WBAN is not totally secure for certain WBAN applications. New solutions are required to integrate high level security in WBAN.Comment: 14 pages, 7 figures, 2 table

    A three-year study on the freshness of Web search engine databases

    Get PDF
    This paper deals with one aspect of the index quality of search engines: index freshness. The purpose is to analyse the update strategies of the major Web search engines Google, Yahoo, and MSN/Live.com. We conducted a test of the updates of 40 daily updated pages and 30 irregularly updated pages, respectively. We used data from a time span of six weeks in the years 2005, 2006, and 2007. We found that the best search engine in terms of up-to-dateness changes over the years and that none of the engines has an ideal solution for index freshness. Frequency distributions for the pages’ ages are skewed, which means that search engines do differentiate between often- and seldom-updated pages. This is confirmed by the difference between the average ages of daily updated pages and our control group of pages. Indexing patterns are often irregular, and there seems to be no clear policy regarding when to revisit Web pages. A major problem identified in our research is the delay in making crawled pages available for searching, which differs from one engine to another

    How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET

    Get PDF
    Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these protocols is mostly lacking. In this paper, we are concerned with this problem, how to specify and how to prove the correctness of a secure routing protocol. We provide a definition of what a protocol is expected to achieve independently of its functionality, as well as communication and adversary models. This way, we enable formal reasoning on the correctness of secure routing protocols. We demonstrate this by analyzing two protocols from the literature

    Consumer attitudes and preference exploration towards fresh-cut salads using best–worst scaling and latent class analysis

    Get PDF
    This research explored the preferences and buying habits of a sample of 620 consumers of fresh-cut, ready-to-eat salads. A best–worst scaling approach was used to measure the level of preference stated by individuals regarding 12 attributes for quality (intrinsic, extrinsic and credence) of fresh-cut salads. The experiment was carried out through direct interviews at several large-scale retail outlets in the Turin metropolitan area (north-west of Italy). Out of the total number of questioned consumers, 35% said they did not consume fresh-cut salads. On the contrary, the rest of the involved sample expressed the highest degree of preference towards the freshness/appearance attribute, followed by the expiration date and the brand. On the contrary, attributes such as price, organic certification and food safety did not emerge as discriminating factors in consumer choices. Additionally, five clusters of consumers were identified, whose preferences are related both to purchasing styles and socio-demographic variables. In conclusion, this research has highlighted the positive attitude of consumers towards quality products backed by a brand, providing ideas for companies to improve within this sector and implement strategies to answer the needs of a new segment of consumers, by determining market opportunities that aim to strengthen local brands
    • …
    corecore