3,889 research outputs found

    Buy local, pollute less: What drives households to join a community supported farm?

    Get PDF
    This paper examines which factors determine the participation of households in long term contracting with local farmers. Are households motivated by reducing the environmental impacts of their food consumption? A discrete-choice model of community supported agriculture (CSA) participation is applied to a sample of 264 French households. The findings suggest that difficult-to-measure attributes, notably environmental considerations play a major role in explaining CSA participation.community supported agriculture; food supply; transaction cost economics

    Intelligent Packaging Systems: Sensors and Nanosensors to Monitor Food Quality and Safety

    Get PDF
    IndexaciĂłn: Web of Science y Scopus.The application of nanotechnology in different areas of food packaging is an emerging field that will grow rapidly in the coming years. Advances in food safety have yielded promising results leading to the development of intelligent packaging (IP). By these containers, it is possible to monitor and provide information of the condition of food, packaging, or the environment. This article describes the role of the different concepts of intelligent packaging. It is possible that this new technology could reach enhancing food safety, improving pathogen detection time, and controlling the quality of food and packaging throughout the supply chain.https://www.hindawi.com/journals/js/2016/4046061/cta

    The Meeting of Acquaintances: A Cost-efficient Authentication Scheme for Light-weight Objects with Transient Trust Level and Plurality Approach

    Full text link
    Wireless sensor networks consist of a large number of distributed sensor nodes so that potential risks are becoming more and more unpredictable. The new entrants pose the potential risks when they move into the secure zone. To build a door wall that provides safe and secured for the system, many recent research works applied the initial authentication process. However, the majority of the previous articles only focused on the Central Authority (CA) since this leads to an increase in the computation cost and energy consumption for the specific cases on the Internet of Things (IoT). Hence, in this article, we will lessen the importance of these third parties through proposing an enhanced authentication mechanism that includes key management and evaluation based on the past interactions to assist the objects joining a secured area without any nearby CA. We refer to a mobility dataset from CRAWDAD collected at the University Politehnica of Bucharest and rebuild into a new random dataset larger than the old one. The new one is an input for a simulated authenticating algorithm to observe the communication cost and resource usage of devices. Our proposal helps the authenticating flexible, being strict with unknown devices into the secured zone. The threshold of maximum friends can modify based on the optimization of the symmetric-key algorithm to diminish communication costs (our experimental results compare to previous schemes less than 2000 bits) and raise flexibility in resource-constrained environments.Comment: 27 page
    • …
    corecore