834 resultados para security outsourcing
Resumo:
The artisanal fish preservation methods in Uganda are characterized by extreme operating conditions. Consequently, vital nutritional components diminish in value and quantity which renders fish consumer nutritionally insecure. To establish the magnitude of nutritional loss, duplicate samples of Mukene Rastrineobola argentea were collected from Kiyindi landing site on L. Victoria and Moone landing site on L. Kyoga. Each set of duplicate samples was divided into five portions and kept on ice. For each preservation method a portion was processed into respective products at Food Bioscience and Agri-Business Laboratories aside from the control (fresh) sample. Both preserved and control samples were analysed for nutrient loss at Department of Chemistry, Makerere University using AOAC methods. The composition of fatty acids was determined by methanolysis gas chromatography and Mass spectrophotometry of the resultant methyl esters. The results indicate that nutrients of all preserved samples did not vary significantly from the control except for some fatty acids. The Eicosapentaenoic acid (EPA) in fresh samples declined from 6.72% to 1.08% in deep-fried samples constituting 83.93% nutrient loss. The sum ratio w3:w6 as well as EPA: DHA (Docosahexaenoic) ratio in fried samples also varied significantly (p<0.5) lower than 0.668 and 0.20 for the average of either preservation methods and experts recommended ratio respectively. Further research has been recommended to ascertain the causative factor, since Mukene frying is being promoted in the Great lakes region as alternative method to sun-drying. In conclusion, regular consumers of fried Mukene do not benefit much from the nutritional and health attributes of Omega 3 and 6.
Resumo:
The brochure is to contribute to the overall goal of stimulating the adaptation of pro-poor agri-food systems innovations to improve food security and sustainable natural resource management among rural poor farmers. The paper seeks to identify and exploit opportunities for expanding market access for minor crops and NRM products. The minor crops studied included cow pea, sorghum, groundnut, sweet potato and yam.
Resumo:
The fisheries sector in Cambodia contributes 8%–12% to national GDP and 25% - 30% to agricultural GDP, with an estimated 4.5 million people involved in fishing and associated trades. Fish and other aquatic animals are important food sources, contributing an estimated national average of 60% - 70% of total animal protein intake. Of the 2013 total fish production, 550,000 metric tons were harvested from freshwater habitats, of which rice field fisheries and small-scale family fisheries contributed approximately 20%. The productivity and value of rice field fisheries to households in rural Cambodia has been highlighted in a number of previous studies. The Fisheries Administration of the Ministry of Agriculture, Forestry and Fisheries plans to increase productivity from rice field fisheries and aquaculture at an annual rate of 15% to maintain supply for a growing population. This report draws mainly on the baseline and monitoring data from the Rice Field Fisheries Enhancement Project (RFFEP) during its implementation between 2012 and 2014. Reference is also made to the Fish on Farms project to highlight the relative contribution of fish from small-scale aquaculture compared to wild-caught fish.
Resumo:
The phases of the outsourcing process and the actions required are discussed. The most difficult and the most important phase of o a successful outsourcing process is to know what activities to outsource. The criteria for suppliers selection must be developed and should cover the reasons why the activity is being outsourced, the expected benefits and potential dangers. Contract negotiation is a very important phase of the outsourcing contract in which rules of the outsourcing are set. The transfer of activity phase corresponds to the reassignment of control of the outsourced activity from the outsourcer to the contractor.
Resumo:
Purpose - The purpose of this paper is to develop a framework of total acquisition cost of overseas outsourcing/sourcing in manufacturing industry. This framework contains categorized cost items that may occur during the overseas outsourcing/sourcing process. The framework was tested by a case study to establish both its feasibility and usability. Design/methodology/approach - First, interviews were carried out with practitioners who have the experience of overseas outsourcing/sourcing in order to obtain inputs from industry. The framework was then built up based on combined inputs from literature and from practitioners. Finally, the framework was tested by a case study in a multinational high-tech manufacturer to establish both its feasibility and usability. Findings - A practical barrier for implementing this framework is shortage of information. The predictability of the cost items in the framework varies. How to deal with the trade off between accuracy and applicability is a problem needed to be solved in the future research. Originality/value - There are always limitations to the generalizations that can be made from just one case. However, despite these limitations, this case study is believed to have shown the general requirement of modeling the uncertainty and dealing with the dilemma between accuracy and applicability in practice. © Emerald Group Publishing Limited.
Resumo:
Radio Frequency Identification (RFID) technology allows automatic data capture from tagged objects moving in a supply chain. This data can be very useful if it is used to answer traceability queries, however it is distributed across many different repositories, owned by different companies. © 2012 IEEE.
Resumo:
We analyse the finite-size security of the efficient Bennett-Brassard 1984 protocol implemented with decoy states and apply the results to a gigahertz-clocked quantum key distribution system. Despite the enhanced security level, the obtained secure key rates are the highest reported so far at all fibre distances.
Resumo:
We report the operation of a gigahertz clocked quantum key distribution system featuring high composable and quantifiable security while maintaining more than 1 Mbit/s secure key rate over a 50 km quantum channel. © OSA 2013.
Resumo:
This paper discusses various techniques that may be used to combat counterfeiting in the pharmaceutical supply chain. These include the use of electronic pedigrees (to ensure the integrity of the supply chain), together with mass-serialization (to provide for a unique lifecycle history of each individual package) and authentication of the product (to check for any discrepancies in the various attributes of the product and its packaging are as intended for that individual package). Management of the pedigree process and product authentication is discussed in some detail, together with various other learnings from the Drug Security Network, including identification of some remaining vulnerabilities and suggestions for tightening these loopholes. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
Counterfeit trade developed into a severe problem for many industries. While established security features such as holograms, micro printings or chemical markers do not seem to efficiently avert trade in illicit imitation products, RFID technology, with its potential to automate product authentications, may become a powerful tool to enhance brand and product protection. The following contribution contains an overview on the implication of product counterfeiting on affected companies, provides a starting point for a structured requirements definition for RFID-based anti-counterfeiting systems, and outlines several principal solution approaches that are discussed in greater detail in the subsequent chapters. © 2008 Springer-Verlag Berlin Heidelberg.
Resumo:
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Resumo:
Password authentication has been adopted as one of the most commonly used solutions in network environment to protect resources from unauthorized access. Recently, Lee–Kim–Yoo [S.W. Lee, H.S. Kim, K.Y. Yoo, Improvement of Chien et al.'s remote user authentication scheme using smart cards, Computer Standards & Interfaces 27 (2) (2005) 181–183] and Lee-Chiu [N.Y. Lee, Y.C. Chiu, Improved remote authentication scheme with smart card, Computer Standards & Interfaces 27 (2) (2005) 177–180] respectively proposed a smart card based password authentication scheme. We show that these two schemes are both subject to forgery attacks provided that the information stored in the smart card is disclosed by the adversary. We also propose an improved scheme with formal security proof.