32,634 research outputs found
Food System and Food Security Study for the City of Cape Town
Food insecurity is a critical, but poorly understood, challenge for the health and development of Capetonians.
Food insecurity is often imagined as hunger, but it is far broader than that. Households are considered food secure when they have âphysical and economic access to sufficient and nutritious food that meets their dietary needs and food preferences for an active and healthy lifeâ (WHO/FAO 1996). Health is not merely the absence of disease, but also encompasses good nutrition and healthy lifestyles. Individuals in a food insecure household and/or community are at greater risk due to diets of poor nutritional value, which lowers immunity against diseases. In children, food insecurity is known to stunt growth and development and this places the child in a disadvantaged position from early on in life. Any improvement in the nutritional profile of an individual is beneficial and as the family and community become more food secure, the greater the benefit. It further reduces the demand on health services.
In the Cape Town context, food insecurity manifests not just as hunger, but as long term consumption of a limited variety of foods, reduction in meal sizes and choices to eat calorie dense, nutritionally poor foods in an effort to get enough food to get by. Associated with this food insecurity are chronic malnutrition and micronutrient deficiency, particularly among young children, and an increase in obesity, diabetes and other diet related illnesses.
Food insecurity is therefore not about food not being available, it is about households not having the economic or physical resources to access enough of the right kind of food. The latest study of food insecurity in Cape Town found that 75 percent of households in sampled low-income areas were food insecure, with 58 percent falling into the severely food insecurity category.
Food insecurity is caused by household scale characteristics, such as income poverty, but also by wider structural issues, such as the local food retail environment and the price and availability of healthy relative to less healthy foods.
The City of Cape Town therefore commissioned a study based on the following understanding of the food security challenge facing the City.
âFood security or the lack thereof is the outcome of complex and multi-dimensional factors comprising a food system. Therefore, food insecurity is the result of failures or inefficiencies in one or more dimensions of the food system. This necessitates a holistic analysis of the food system that than can provide insights into the various components of the system, especially in our context as a developing world city.â
The call for a food system study sees the City of Cape Town taking the lead nationally, being the first metropolitan area to seek to engage in the food system in a holistic manner and attempting to understand what role the city needs to play in the food system.
The City must work towards a food system that is reliable, sustainable and transparent. Such a system will generate household food security that is less dependent on welfarist responses to the challenge.
In this context, reliability is taken to mean stable and consistent prices, the nutritional quality of available and accessible food, and food safety. Sustainability means that the food system does not degrade the environmental, economic and social environment. Finally, transparency refers to the legibility of the system and its control by the state and citizens
Tree Parity Machine Rekeying Architectures
The necessity to secure the communication between hardware components in
embedded systems becomes increasingly important with regard to the secrecy of
data and particularly its commercial use. We suggest a low-cost (i.e. small
logic-area) solution for flexible security levels and short key lifetimes. The
basis is an approach for symmetric key exchange using the synchronisation of
Tree Parity Machines. Fast successive key generation enables a key exchange
within a few milliseconds, given realistic communication channels with a
limited bandwidth. For demonstration we evaluate characteristics of a
standard-cell ASIC design realisation as IP-core in 0.18-micrometer
CMOS-technology
Recommended from our members
Memory-Based High-Level Synthesis Optimizations Security Exploration on the Power Side-Channel
High-level synthesis (HLS) allows hardware designers to think algorithmically and not worry about low-level, cycle-by-cycle details. This provides the ability to quickly explore the architectural design space and tradeoffs between resource utilization and performance. Unfortunately, security evaluation is not a standard part of the HLS design flow. In this article, we aim to understand the effects of memory-based HLS optimizations on power side-channel leakage. We use Xilinx Vivado HLS to develop different cryptographic cores, implement them on a Spartan-6 FPGA, and collect power traces. We evaluate the designs with respect to resource utilization, performance, and information leakage through power consumption. We have two important observations and contributions. First, the choice of resource optimization directive results in different levels of side-channel vulnerabilities. Second, the partitioning optimization directive can greatly compromise the hardware cryptographic system through power side-channel leakage due to the deployment of memory control logic. We describe an evaluation procedure for power side-channel leakage and use it to make best-effort recommendations about how to design more secure architectures in the cryptographic domain
Irrigation practices, state intervention and farmerâs life: Worlds in drought-prone Tigray
Irrigation practicesWater usersDamsIrrigation canalsIrrigation managementWater allocation
AES-CBC Software Execution Optimization
With the proliferation of high-speed wireless networking, the necessity for
efficient, robust and secure encryption modes is ever increasing. But,
cryptography is primarily a computationally intensive process. This paper
investigates the performance and efficiency of IEEE 802.11i approved Advanced
Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher
Block Chaining (CBC) mode. Simulations are used to analyse the speed, resource
consumption and robustness of AES-CBC to investigate its viability for image
encryption usage on common low power devices. The detailed results presented in
this paper provide a basis for performance estimation of AES cryptosystems
implemented on wireless devices. The use of optimized AES-CBC software
implementation gives a superior encryption speed performance by 12 - 30%, but
at the cost of twice more memory for code size.Comment: 8 pages, IEEE 200
Restructuring the English Working Class for Global Competitiveness
This paper considers the latest developments in an ongoing attempt to restructure the English working class. It divides this project into two distinct phases. The first is associated with destructive policies to undermine the political, social and institutional structures of the working class embedded in the post- War social democratic and compromise. The paper then goes on to show how New Labour initially sought to rebuild the working class in the image of global competitiveness, at the outset of the second phase to restructure the English working class. The paper argues that the present moment in policy development represents a watershed in this second-phase. The aim now is to contain and overcome some of the contradictions thrown up by New Labourâs early policies and to raise the raise the workforce in terms of its position in the Global Division of Labour. To do so, there is a need to move up those sections of the working class currently working in, and competing for, low-value and low paid âentry-levelâ work, in order to create space for largely inactive elements of the latent workforce to move into. The project is pre-figured by a wholesale acceptance of the politics of global competitiveness. The discussion is undertaken via an analysis of three key sets of policy documents associated with the Harker Review of Child Poverty, the Leitch Review of Skills and the Freud Review of Welfare
A Cognitive Framework to Secure Smart Cities
The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure such physical systems. This manuscript studies the complex interweaving of sensor networks and physical systems and suggests a foundational innovation in the field. In sharp contrast with the existing IDS and IPS solutions, in this paper, a preventive and proactive method is employed to stay ahead of attacks by constantly monitoring network data patterns and identifying threats that are imminent. Here, by capitalizing on the significant progress in processing power (e.g. petascale computing) and storage capacity of computer systems, we propose a deep learning approach to predict and identify various security breaches that are about to occur. The learning process takes place by collecting a large number of files of different types and running tests on them to classify them as benign or malicious. The prediction model obtained as such can then be used to identify attacks. Our project articulates a new framework for interactions between physical systems and sensor networks, where malicious packets are repeatedly learned over time while the system continually operates with respect to imperfect security mechanisms
- âŠ