32,634 research outputs found

    Food System and Food Security Study for the City of Cape Town

    Get PDF
    Food insecurity is a critical, but poorly understood, challenge for the health and development of Capetonians. Food insecurity is often imagined as hunger, but it is far broader than that. Households are considered food secure when they have “physical and economic access to sufficient and nutritious food that meets their dietary needs and food preferences for an active and healthy life” (WHO/FAO 1996). Health is not merely the absence of disease, but also encompasses good nutrition and healthy lifestyles. Individuals in a food insecure household and/or community are at greater risk due to diets of poor nutritional value, which lowers immunity against diseases. In children, food insecurity is known to stunt growth and development and this places the child in a disadvantaged position from early on in life. Any improvement in the nutritional profile of an individual is beneficial and as the family and community become more food secure, the greater the benefit. It further reduces the demand on health services. In the Cape Town context, food insecurity manifests not just as hunger, but as long term consumption of a limited variety of foods, reduction in meal sizes and choices to eat calorie dense, nutritionally poor foods in an effort to get enough food to get by. Associated with this food insecurity are chronic malnutrition and micronutrient deficiency, particularly among young children, and an increase in obesity, diabetes and other diet related illnesses. Food insecurity is therefore not about food not being available, it is about households not having the economic or physical resources to access enough of the right kind of food. The latest study of food insecurity in Cape Town found that 75 percent of households in sampled low-income areas were food insecure, with 58 percent falling into the severely food insecurity category. Food insecurity is caused by household scale characteristics, such as income poverty, but also by wider structural issues, such as the local food retail environment and the price and availability of healthy relative to less healthy foods. The City of Cape Town therefore commissioned a study based on the following understanding of the food security challenge facing the City. “Food security or the lack thereof is the outcome of complex and multi-dimensional factors comprising a food system. Therefore, food insecurity is the result of failures or inefficiencies in one or more dimensions of the food system. This necessitates a holistic analysis of the food system that than can provide insights into the various components of the system, especially in our context as a developing world city.” The call for a food system study sees the City of Cape Town taking the lead nationally, being the first metropolitan area to seek to engage in the food system in a holistic manner and attempting to understand what role the city needs to play in the food system. The City must work towards a food system that is reliable, sustainable and transparent. Such a system will generate household food security that is less dependent on welfarist responses to the challenge. In this context, reliability is taken to mean stable and consistent prices, the nutritional quality of available and accessible food, and food safety. Sustainability means that the food system does not degrade the environmental, economic and social environment. Finally, transparency refers to the legibility of the system and its control by the state and citizens

    Tree Parity Machine Rekeying Architectures

    Get PDF
    The necessity to secure the communication between hardware components in embedded systems becomes increasingly important with regard to the secrecy of data and particularly its commercial use. We suggest a low-cost (i.e. small logic-area) solution for flexible security levels and short key lifetimes. The basis is an approach for symmetric key exchange using the synchronisation of Tree Parity Machines. Fast successive key generation enables a key exchange within a few milliseconds, given realistic communication channels with a limited bandwidth. For demonstration we evaluate characteristics of a standard-cell ASIC design realisation as IP-core in 0.18-micrometer CMOS-technology

    Irrigation practices, state intervention and farmer’s life: Worlds in drought-prone Tigray

    Get PDF
    Irrigation practicesWater usersDamsIrrigation canalsIrrigation managementWater allocation

    AES-CBC Software Execution Optimization

    Full text link
    With the proliferation of high-speed wireless networking, the necessity for efficient, robust and secure encryption modes is ever increasing. But, cryptography is primarily a computationally intensive process. This paper investigates the performance and efficiency of IEEE 802.11i approved Advanced Encryption Standard (AES)-Rijndael ciphering/deciphering software in Cipher Block Chaining (CBC) mode. Simulations are used to analyse the speed, resource consumption and robustness of AES-CBC to investigate its viability for image encryption usage on common low power devices. The detailed results presented in this paper provide a basis for performance estimation of AES cryptosystems implemented on wireless devices. The use of optimized AES-CBC software implementation gives a superior encryption speed performance by 12 - 30%, but at the cost of twice more memory for code size.Comment: 8 pages, IEEE 200

    Restructuring the English Working Class for Global Competitiveness

    Get PDF
    This paper considers the latest developments in an ongoing attempt to restructure the English working class. It divides this project into two distinct phases. The first is associated with destructive policies to undermine the political, social and institutional structures of the working class embedded in the post- War social democratic and compromise. The paper then goes on to show how New Labour initially sought to rebuild the working class in the image of global competitiveness, at the outset of the second phase to restructure the English working class. The paper argues that the present moment in policy development represents a watershed in this second-phase. The aim now is to contain and overcome some of the contradictions thrown up by New Labour’s early policies and to raise the raise the workforce in terms of its position in the Global Division of Labour. To do so, there is a need to move up those sections of the working class currently working in, and competing for, low-value and low paid ‘entry-level’ work, in order to create space for largely inactive elements of the latent workforce to move into. The project is pre-figured by a wholesale acceptance of the politics of global competitiveness. The discussion is undertaken via an analysis of three key sets of policy documents associated with the Harker Review of Child Poverty, the Leitch Review of Skills and the Freud Review of Welfare

    A Cognitive Framework to Secure Smart Cities

    Get PDF
    The advancement in technology has transformed Cyber Physical Systems and their interface with IoT into a more sophisticated and challenging paradigm. As a result, vulnerabilities and potential attacks manifest themselves considerably more than before, forcing researchers to rethink the conventional strategies that are currently in place to secure such physical systems. This manuscript studies the complex interweaving of sensor networks and physical systems and suggests a foundational innovation in the field. In sharp contrast with the existing IDS and IPS solutions, in this paper, a preventive and proactive method is employed to stay ahead of attacks by constantly monitoring network data patterns and identifying threats that are imminent. Here, by capitalizing on the significant progress in processing power (e.g. petascale computing) and storage capacity of computer systems, we propose a deep learning approach to predict and identify various security breaches that are about to occur. The learning process takes place by collecting a large number of files of different types and running tests on them to classify them as benign or malicious. The prediction model obtained as such can then be used to identify attacks. Our project articulates a new framework for interactions between physical systems and sensor networks, where malicious packets are repeatedly learned over time while the system continually operates with respect to imperfect security mechanisms
    • 

    corecore