This document defines hacking and different types of hackers. It discusses the history of hacking from the 1960s to present day. It outlines various types of hacking like website, network, and password hacking. It describes black hat, white hat, and grey hat hackers. Famous hackers from history are mentioned. The document discusses advantages and disadvantages of hacking, why hackers hack, and what to do if hacked. It concludes with tips to keep passwords protected and avoid phishing to prevent being hacked.
This document discusses various sperm preparation techniques used prior to assisted reproductive technologies. It begins by explaining the reasons for processing sperm samples, such as removing components that could prevent pregnancy and selecting morphologically normal, motile sperm free of debris. Several migration-based techniques are described, including swim-up, density gradient centrifugation, and magnetic activated cell sorting. Glass wool filtration and zeta potential techniques are also covered. The document discusses preparation of epididymal and testicular sperm samples. It concludes by outlining methods for preparing sperm from retrograde ejaculation samples.
The embryo transfer technique is the final and most crucial step of the IVF cycle. It requires close collaboration between the clinician and embryologist. While around 80% of embryos typically reach the transfer stage, the pregnancy rate remains low due to factors such as poor embryo quality and technique. The success of embryo transfer depends on proper preparation, including evaluating the cervico-uterine axis, clearing mucus from the cervix, and using ultrasound guidance. The embryo must be placed in the optimal location of the uterine cavity to maximize implantation chances. Attention to factors such as catheter type, duration of embryo loading, and prevention of uterine contractions can significantly improve clinical pregnancy outcomes.
This PowerPoint presentation provides an overview of ethical hacking. It discusses the different types of hackers, including white hat, black hat, and gray hat hackers. It also explains what ethical hacking is, why we need it, and the methodology used, which includes reconnaissance, scanning, enumeration, gaining access, maintaining access, and covering tracks. The presentation also outlines some common hacking tools, historical cases of hacking, and skills required of an ethical hacker.
This document summarizes information about the Zika virus. It describes how Zika is transmitted by Aedes mosquitoes, causes a mild fever in most cases but can also result in Guillain-Barre syndrome and birth defects. Recent large outbreaks have occurred in French Polynesia, Brazil and the Americas. There is no vaccine and diagnosis involves virus detection or antibody testing. Protection from mosquito bites is recommended.
MACS is a sperm separation technique used in A.R.T. It allows separation of good quality sperm from apoptotic sperm (Sperm programmed to die) which may be one of the causes for failure of IVF
https://www.novaivifertility.com/primary-offering/andrology
This document discusses Japanese encephalitis (JE) in India. It begins by introducing JE virus as an arbovirus that can infect humans and other animals. It then discusses the different genotypes of JE virus present in India, including the dominant genotype III and emerging genotype I. The document reviews the epidemiology of JE in India, including its transmission cycle between mosquito vectors, amplifying hosts like pigs and birds, and human cases typically occurring in summer months. It also analyzes the increasing incidence of JE cases in northern India like Uttar Pradesh. Overall, the document provides an overview of JE virus and the status of its transmission and genotypes circulating in India.
This document defines hacking and different types of hackers. It discusses the history of hacking from the 1960s to present day. It outlines various types of hacking like website, network, and password hacking. It describes black hat, white hat, and grey hat hackers. Famous hackers from history are mentioned. The document discusses advantages and disadvantages of hacking, why hackers hack, and what to do if hacked. It concludes with tips to keep passwords protected and avoid phishing to prevent being hacked.
This document discusses various sperm preparation techniques used prior to assisted reproductive technologies. It begins by explaining the reasons for processing sperm samples, such as removing components that could prevent pregnancy and selecting morphologically normal, motile sperm free of debris. Several migration-based techniques are described, including swim-up, density gradient centrifugation, and magnetic activated cell sorting. Glass wool filtration and zeta potential techniques are also covered. The document discusses preparation of epididymal and testicular sperm samples. It concludes by outlining methods for preparing sperm from retrograde ejaculation samples.
The embryo transfer technique is the final and most crucial step of the IVF cycle. It requires close collaboration between the clinician and embryologist. While around 80% of embryos typically reach the transfer stage, the pregnancy rate remains low due to factors such as poor embryo quality and technique. The success of embryo transfer depends on proper preparation, including evaluating the cervico-uterine axis, clearing mucus from the cervix, and using ultrasound guidance. The embryo must be placed in the optimal location of the uterine cavity to maximize implantation chances. Attention to factors such as catheter type, duration of embryo loading, and prevention of uterine contractions can significantly improve clinical pregnancy outcomes.
This PowerPoint presentation provides an overview of ethical hacking. It discusses the different types of hackers, including white hat, black hat, and gray hat hackers. It also explains what ethical hacking is, why we need it, and the methodology used, which includes reconnaissance, scanning, enumeration, gaining access, maintaining access, and covering tracks. The presentation also outlines some common hacking tools, historical cases of hacking, and skills required of an ethical hacker.
This document summarizes information about the Zika virus. It describes how Zika is transmitted by Aedes mosquitoes, causes a mild fever in most cases but can also result in Guillain-Barre syndrome and birth defects. Recent large outbreaks have occurred in French Polynesia, Brazil and the Americas. There is no vaccine and diagnosis involves virus detection or antibody testing. Protection from mosquito bites is recommended.
MACS is a sperm separation technique used in A.R.T. It allows separation of good quality sperm from apoptotic sperm (Sperm programmed to die) which may be one of the causes for failure of IVF
https://www.novaivifertility.com/primary-offering/andrology
This document discusses Japanese encephalitis (JE) in India. It begins by introducing JE virus as an arbovirus that can infect humans and other animals. It then discusses the different genotypes of JE virus present in India, including the dominant genotype III and emerging genotype I. The document reviews the epidemiology of JE in India, including its transmission cycle between mosquito vectors, amplifying hosts like pigs and birds, and human cases typically occurring in summer months. It also analyzes the increasing incidence of JE cases in northern India like Uttar Pradesh. Overall, the document provides an overview of JE virus and the status of its transmission and genotypes circulating in India.
This document discusses various topics related to internet security including protocols like IPSec and SSL. It provides details on IPSec, how it provides security at the network layer and creates authenticated and confidential IP packets. It also describes SSL, how it provides security at the transport layer and addresses privacy, integrity and authentication issues. The document discusses internet security threats like malware, phishing etc. It covers SSL in more detail including how it establishes encrypted links between servers and clients and allows secure transmission of sensitive data. It also discusses proxy servers and how they can be used to implement access control and bypass restrictions.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
This document discusses various assisted reproductive techniques (ART) used to treat infertility. It begins by defining ART and infertility. It then describes techniques like artificial insemination (IUI, ICI), in vitro fertilization (IVF), intracytoplasmic sperm injection (ICSI), gamete intrafallopian transfer (GIFT), zygote intrafallopian transfer (ZIFT), and surrogacy. For each technique, it provides details on the procedure, indications for use, and success rates. It concludes by discussing some risks associated with IVF and ICSI, like prematurity, low birth weight, and possible genetic or epigenetic abnormalities in offspring.
This document discusses various topics related to intruders and network security. It covers intrusion techniques like password guessing and capture. It also discusses approaches to intrusion detection such as statistical anomaly detection, rule-based detection, and audit record analysis. Finally, it discusses password management strategies like education, computer-generated passwords, and proactive password checking.
This document discusses embryo transfer as the final step of assisted reproductive technology where embryos are placed in the female uterus. It describes factors that affect embryo transfer success including implantation capacity, endometrial receptivity, and technique. The document outlines techniques for embryo transfer including assisted hatching, embryo glue, catheter type and loading, ultrasound guidance, and ensuring no blood or mucus blockage. Successful embryo transfer requires a gentle, non-traumatic procedure performed with attention to numerous technical details.
This document provides an overview of quantum cryptography. It introduces key concepts like the Heisenberg uncertainty principle, photon polarization, and the need for quantum cryptography due to potential threats from quantum computers. The document describes how quantum key distribution works using protocols like BB84 to generate and test secure encryption keys between two parties by detecting any eavesdropping. It notes that working prototypes have been implemented over fiber optic cables and open air.
Cybercrime refers to criminal acts that involve computers and networks. There are two categories of cybercrime - crimes that directly target computers, like viruses and denial of service attacks, and crimes that use computers/networks to enable other crimes, such as fraud, identity theft, and phishing scams. Experts define cybercrimes as offenses committed using technologies like the internet or mobile phones to intentionally harm victims. Governments are increasingly concerned with cyber terrorism and cyber warfare between nations.
Embryo freezing involves preserving embryos at sub-zero temperatures, usually before implantation. There are two main methods - controlled rate freezing and vitrification. Controlled rate freezing involves slow cooling and seeding to prevent ice crystal formation, while vitrification solidifies the solution without any ice crystals using high concentrations of cryoprotectants. Both aim to minimize damage to embryos from freezing and thawing. Cryopreservation allows storage of surplus embryos and avoids multiple pregnancies from single retrievals. It also enables disease screening before transfer.
Cyber crime involves illegal activities related to computers and computer networks, including unauthorized access, hacking, viruses, phishing scams, and identity theft. Early computer crimes were often committed by individuals, but as technology advanced, malicious programmers began writing viruses and worms. Cyber law addresses the legal issues surrounding internet usage and access. One case study describes the arrest of two individuals in India who hacked eBay's website to steal credit card information from hundreds of customers and make fraudulent purchases. They were convicted and sentenced to eight months in jail along with fines.
Egg freezing, also known as oocyte cryopreservation, is a great advancement in technology allowing women to preserve their fertility and their eggs. These eggs, once removed from the body are frozen using special techniques and can be used to make babies by the process of IVF when the woman desires.
This document summarizes key aspects of human oogenesis and oocyte quality assessment. It describes the process of oogenesis, including formation of follicles in the ovaries and maturation of oocytes. It also discusses morphological features used to assess oocyte quality, such as the cumulus-oocyte complex, nuclear maturity, size and shape, the zona pellucida, polar body morphology, and perivitelline space. While some studies found correlations between certain morphological features and development outcomes, others found no significant correlations. Overall assessment of oocyte quality relies on evaluating multiple morphological characteristics.
This document discusses different types of migration including permanent versus temporary migration and internal versus external migration. It defines key migration terms and identifies push and pull factors that influence international migration. Some impacts of international migration on source and receiving areas are outlined, such as population changes, brain drain, and economic and social effects. Specific examples from Jamaica are provided to illustrate reasons for temporary international migration for work.
This document discusses life tables and their importance. It provides a brief history of life tables, noting their development by John Graunt and Edmund Halley. Life tables are useful for estimating survival rates, mortality rates, and other vital statistics. They allow calculation of life expectancy and comparison of mortality between populations. The document then describes how to construct a life table and provides examples of their use in clinical medicine using the Kaplan-Meier method.
This document provides biographical and professional details about Prof. Narendra Malhotra. It lists his current and past positions including Professor at University of Sarajevo School of Science & Technology and various roles in medical associations. It also outlines his areas of specialization in obstetrics and gynecology as well as lists his publications, awards, and presentations. He is currently based in Agra, India and is director of several fertility clinics.
This document provides a historical perspective on in vitro fertilization (IVF) from the 1800s to the 1990s. Some key events include the first attempts at IVF in the late 1800s, advances in hormone research and embryo culture in the early 1900s, and the first successful IVF pregnancy and birth in 1978 by Dr. Robert Edwards and Dr. Patrick Steptoe. The 1980s saw improvements in fertility drugs, ultrasound technology, and the development of techniques like ICSI and cryopreservation. By the 1990s, IVF had become an established treatment for infertility.
This document discusses assisted embryo hatching, a technique used in IVF to improve embryo implantation rates. It involves weakening or piercing the zona pellucida, the outer shell of an embryo, prior to embryo transfer to facilitate the hatching process. There are three main techniques - mechanical, chemical, and laser assisted hatching. Laser assisted hatching uses a precise laser beam to create a small opening in the zona pellucida and is considered the best technique as it is quick, precise, and chemical-free. Assisted hatching may help improve outcomes for patients with certain risk factors like advanced maternal age or previous implantation failures.
The document discusses the Data Encryption Standard (DES) cipher. It was the most widely used symmetric cipher but has been replaced by the Advanced Encryption Standard (AES). DES encrypts data in 64-bit blocks using a 56-bit key. It operates by applying an initial permutation to the plaintext block, dividing it into halves, and performing 16 rounds of substitution and permutation using 48-bit subkeys generated from the main key. Each round includes expanding, XORing with the subkey, and applying S-boxes and permutations to provide diffusion and confusion.
The document summarizes the history and process of in vitro fertilization (IVF). It discusses how IVF was developed as a treatment for infertility and involves fertilizing an egg outside of the body. The summary includes:
- The key stages of an IVF cycle including ovarian stimulation, egg retrieval, fertilization in vitro, embryo transfer, and indications for IVF such as tubal disease or male factor infertility.
- Milestones in the history of IVF including the first successful case in 1978 and development of techniques like ICSI.
- Risks and side effects of ovarian stimulation and factors considered for embryo transfer like number based on patient age and prior attempts.
Developing national policy and technical regulation for aflatoxin control in ...Francois Stepman
12 December 2018. Ghana inaugurated the National Steering Committee for Aflatoxin Control. Rose Omari (PhD.)
Science and Technology Policy Research Institute
Council for Scientific and Industrial Research
Accra, Ghana
This document discusses various topics related to internet security including protocols like IPSec and SSL. It provides details on IPSec, how it provides security at the network layer and creates authenticated and confidential IP packets. It also describes SSL, how it provides security at the transport layer and addresses privacy, integrity and authentication issues. The document discusses internet security threats like malware, phishing etc. It covers SSL in more detail including how it establishes encrypted links between servers and clients and allows secure transmission of sensitive data. It also discusses proxy servers and how they can be used to implement access control and bypass restrictions.
Internet and computers have changed working, communication, meeting and business requirements and conditions all over globe. Due to this high profile technology, everyone can share any activity that was unexpected and unimaginable few decades back. It was the imagination of people that they will live their lives in this manner and do their business quickly and imagination and dream has come true with the introduction of internet only. Modern society is now associated with internet and related technologies, over a quarter of the world's population is wired into the net and this number is growing every day
This document discusses various assisted reproductive techniques (ART) used to treat infertility. It begins by defining ART and infertility. It then describes techniques like artificial insemination (IUI, ICI), in vitro fertilization (IVF), intracytoplasmic sperm injection (ICSI), gamete intrafallopian transfer (GIFT), zygote intrafallopian transfer (ZIFT), and surrogacy. For each technique, it provides details on the procedure, indications for use, and success rates. It concludes by discussing some risks associated with IVF and ICSI, like prematurity, low birth weight, and possible genetic or epigenetic abnormalities in offspring.
This document discusses various topics related to intruders and network security. It covers intrusion techniques like password guessing and capture. It also discusses approaches to intrusion detection such as statistical anomaly detection, rule-based detection, and audit record analysis. Finally, it discusses password management strategies like education, computer-generated passwords, and proactive password checking.
This document discusses embryo transfer as the final step of assisted reproductive technology where embryos are placed in the female uterus. It describes factors that affect embryo transfer success including implantation capacity, endometrial receptivity, and technique. The document outlines techniques for embryo transfer including assisted hatching, embryo glue, catheter type and loading, ultrasound guidance, and ensuring no blood or mucus blockage. Successful embryo transfer requires a gentle, non-traumatic procedure performed with attention to numerous technical details.
This document provides an overview of quantum cryptography. It introduces key concepts like the Heisenberg uncertainty principle, photon polarization, and the need for quantum cryptography due to potential threats from quantum computers. The document describes how quantum key distribution works using protocols like BB84 to generate and test secure encryption keys between two parties by detecting any eavesdropping. It notes that working prototypes have been implemented over fiber optic cables and open air.
Cybercrime refers to criminal acts that involve computers and networks. There are two categories of cybercrime - crimes that directly target computers, like viruses and denial of service attacks, and crimes that use computers/networks to enable other crimes, such as fraud, identity theft, and phishing scams. Experts define cybercrimes as offenses committed using technologies like the internet or mobile phones to intentionally harm victims. Governments are increasingly concerned with cyber terrorism and cyber warfare between nations.
Embryo freezing involves preserving embryos at sub-zero temperatures, usually before implantation. There are two main methods - controlled rate freezing and vitrification. Controlled rate freezing involves slow cooling and seeding to prevent ice crystal formation, while vitrification solidifies the solution without any ice crystals using high concentrations of cryoprotectants. Both aim to minimize damage to embryos from freezing and thawing. Cryopreservation allows storage of surplus embryos and avoids multiple pregnancies from single retrievals. It also enables disease screening before transfer.
Cyber crime involves illegal activities related to computers and computer networks, including unauthorized access, hacking, viruses, phishing scams, and identity theft. Early computer crimes were often committed by individuals, but as technology advanced, malicious programmers began writing viruses and worms. Cyber law addresses the legal issues surrounding internet usage and access. One case study describes the arrest of two individuals in India who hacked eBay's website to steal credit card information from hundreds of customers and make fraudulent purchases. They were convicted and sentenced to eight months in jail along with fines.
Egg freezing, also known as oocyte cryopreservation, is a great advancement in technology allowing women to preserve their fertility and their eggs. These eggs, once removed from the body are frozen using special techniques and can be used to make babies by the process of IVF when the woman desires.
This document summarizes key aspects of human oogenesis and oocyte quality assessment. It describes the process of oogenesis, including formation of follicles in the ovaries and maturation of oocytes. It also discusses morphological features used to assess oocyte quality, such as the cumulus-oocyte complex, nuclear maturity, size and shape, the zona pellucida, polar body morphology, and perivitelline space. While some studies found correlations between certain morphological features and development outcomes, others found no significant correlations. Overall assessment of oocyte quality relies on evaluating multiple morphological characteristics.
This document discusses different types of migration including permanent versus temporary migration and internal versus external migration. It defines key migration terms and identifies push and pull factors that influence international migration. Some impacts of international migration on source and receiving areas are outlined, such as population changes, brain drain, and economic and social effects. Specific examples from Jamaica are provided to illustrate reasons for temporary international migration for work.
This document discusses life tables and their importance. It provides a brief history of life tables, noting their development by John Graunt and Edmund Halley. Life tables are useful for estimating survival rates, mortality rates, and other vital statistics. They allow calculation of life expectancy and comparison of mortality between populations. The document then describes how to construct a life table and provides examples of their use in clinical medicine using the Kaplan-Meier method.
This document provides biographical and professional details about Prof. Narendra Malhotra. It lists his current and past positions including Professor at University of Sarajevo School of Science & Technology and various roles in medical associations. It also outlines his areas of specialization in obstetrics and gynecology as well as lists his publications, awards, and presentations. He is currently based in Agra, India and is director of several fertility clinics.
This document provides a historical perspective on in vitro fertilization (IVF) from the 1800s to the 1990s. Some key events include the first attempts at IVF in the late 1800s, advances in hormone research and embryo culture in the early 1900s, and the first successful IVF pregnancy and birth in 1978 by Dr. Robert Edwards and Dr. Patrick Steptoe. The 1980s saw improvements in fertility drugs, ultrasound technology, and the development of techniques like ICSI and cryopreservation. By the 1990s, IVF had become an established treatment for infertility.
This document discusses assisted embryo hatching, a technique used in IVF to improve embryo implantation rates. It involves weakening or piercing the zona pellucida, the outer shell of an embryo, prior to embryo transfer to facilitate the hatching process. There are three main techniques - mechanical, chemical, and laser assisted hatching. Laser assisted hatching uses a precise laser beam to create a small opening in the zona pellucida and is considered the best technique as it is quick, precise, and chemical-free. Assisted hatching may help improve outcomes for patients with certain risk factors like advanced maternal age or previous implantation failures.
The document discusses the Data Encryption Standard (DES) cipher. It was the most widely used symmetric cipher but has been replaced by the Advanced Encryption Standard (AES). DES encrypts data in 64-bit blocks using a 56-bit key. It operates by applying an initial permutation to the plaintext block, dividing it into halves, and performing 16 rounds of substitution and permutation using 48-bit subkeys generated from the main key. Each round includes expanding, XORing with the subkey, and applying S-boxes and permutations to provide diffusion and confusion.
The document summarizes the history and process of in vitro fertilization (IVF). It discusses how IVF was developed as a treatment for infertility and involves fertilizing an egg outside of the body. The summary includes:
- The key stages of an IVF cycle including ovarian stimulation, egg retrieval, fertilization in vitro, embryo transfer, and indications for IVF such as tubal disease or male factor infertility.
- Milestones in the history of IVF including the first successful case in 1978 and development of techniques like ICSI.
- Risks and side effects of ovarian stimulation and factors considered for embryo transfer like number based on patient age and prior attempts.
Developing national policy and technical regulation for aflatoxin control in ...Francois Stepman
12 December 2018. Ghana inaugurated the National Steering Committee for Aflatoxin Control. Rose Omari (PhD.)
Science and Technology Policy Research Institute
Council for Scientific and Industrial Research
Accra, Ghana
Food safety and quality management regulatory systems in afghanistan 2016Naim Khalid
Food Safety and Quality Regulatory System Review. This article is a review of the current status of the food regulatory system in Afghanistan (But now the country has its food law).
The future of food safety in Africa: Research perspectiveILRI
Keynote presentation by Delia Grace, Silvia Alonso, Kebede Amenu, Elizabeth Cook, Michel Dione, Theo Knight-Jones, Johanna Lindahl, Florence Mutua, Hung Nguyen-Viet, Kristina Roesel and Lian Thomas at the virtual Food Safety Conference for Africa, 10–11 November 2021.
Using ecosystem services and biodiversity to enhance pollination services in ...ExternalEvents
The presentation by Dr. Muo Kasina (Kenya Agriculture and Livestock Research Organization - KALRO) and Dr. Dino Martins (Mpala Research Centre) explains the role of pollinators in the context of agricultural production, looks at its relevance (including in economic terms) for Kenyan farmers, and highlights best practices for managing pollinators on farm and at the landscape level. The presentation builds on a Technical Guidance Document on “Mainstreaming ecosystem services and biodiversity in agricultural production and management in East Africa”, published by FAO in 2016, and was given at a national training workshops for stakeholders involved in the revision of the Kenya NBSAP that was held at ICRAF in Nairobi, 25-26 May 2016. More information on the event are available at: www.fao.org/africa/news/detail-news/en/c/417489/
The activities were carried out under the EU-funded project “Capacity building related to Multilateral Environmental Agreements (MEAs) in Africa, Caribbean and Pacific (ACP) countries – Phase 2” (ACP/MEAs2).
Sandy Thomas presents the food safety policy briefGlo_PAN
Presentation of the global Panel's policy brief ‘Assuring Safe Food Systems: Policy Options for a Healthier Food Supply’. The brief reviews food safety issues that are critical to poor and vulnerable populations in low- and middle-income countries, with a particular focus on their impact on healthy diets.
Food security and food safety
Food Security exists when all people, at all times, have physical and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active (productive) and healthy life (World Food Summit, 1996. In: FAO 2006. Policy Brief).
Food safety: microbial contaminants and chemical toxicants below tolerance levels (Kramer, 1990. Southern J. Agric. Economics, 33-40).
Factors that affect food safety
Presence of microorganisms (bacteria, yeast, fungi, viruses) (Christensen, 1973, Seed Sci. Technol. 1: 547-562)
Presence of physical materials
Toxin production (Miller et al., 1995, J. Stored Prod. Res. 31: 1-16; Shephard, 2008, Chem. Soc. Rev. 37: 2468-2477) among others by fungi
Aspergillus spp, Fusarium spp and Penicillium spp (Pitt, 2000, Med. Mycol. 38: 17-22
Post Harvest Management Technologies for Reducing Aflatoxin Contamination in ...Francois Stepman
Dr. Loveness K. Nyanga
Senior Lecturer and Researcher, University of Zimbabwe
PhD, Wageningen University, The Netherlands
MSC and BSc, University of Zimbabwe
Management of Aflatoxin in Africa: working group on aflatoxin, Brussels 25/01/2016
Postharvest management technologies for reducing aflatoxin contamination in m...Francois Stepman
Loveness K. Nyanga (University of Zimbabwe/Action contre la faim)
Roundtable of aflatoxin experts on
“Building a multi-stakeholder approach to mitigate aflatoxin contamination of food and feed”
Brussels, Monday 25th January 2016
International Conference on Infrastructure Needs For a Food Control System: Roadmap For Regional Harmonization” - organised by International Life Sciences Institute - India Chapter, 9 & 10 December, 2014 in Hotel Royal Plaza, New Delhi.
The document summarizes the status of agricultural biotechnology in the Philippines. It discusses the country's policies supporting biotechnology, biosafety regulations, capacity building initiatives, adoption of GM maize, economic impacts, and new joint department circular regulation. GM maize has been widely adopted, with over 650,000 hectares planted in 2016 bringing economic benefits to farmers through increased yields and reduced costs. Ongoing challenges include further capacity building, implementing new public participation requirements, and engaging stakeholders in national policy discussions.
The document discusses India's Reproductive and Child Health (RCH) programme. It was launched in 1997 to ensure safe motherhood, family planning services, and child survival. The key components are family planning, safe motherhood, client-centered healthcare, and prevention of reproductive tract infections.
RCH Phase II began in 2005 with a focus on reducing maternal and child mortality through essential obstetric care, emergency obstetric care at First Referral Units, and strengthening the referral system. New initiatives under RCH Phase II include training doctors in emergency obstetric procedures, establishing blood banks, and the Janani Suraksha Yojana cash incentive program for institutional deliveries.
The child health strategy aims
Presentation by Kebede Amenu, Coen van Wagenberg, Claudia Ganser, James Noah Ssemanda, Arie Havelaar, Kristine Roesel, Biruk Alemu Gemeda, Lina Mego, Donya Madjdian, Theo Knight-Jones at a stakeholder update workshop on Ethiopia food safety research projects, Addis Ababa, Ethiopia, 20 May 2021.
Presented at Michigan State University's WorldTAP International Short Course in Food Safety on July 31, 2009. (http://foodsafetyknowledgenetwork.org/worldtap/foodsafety09)
The Role of Mycotoxin Contamination on Nutrition: The Aflatoxin Story
Amare Ayalew, Program Manager, Partnership for Aflatoxin Control in Africa (PACA), Ethiopia
Antimicrobial Resistance: A One Health Challenge for Joint ActionSIANI
Presented by Juan Lubroth at the seminar "Antimicrobial resistance; linkages between humans, livestock and water in peri-urban areas" at the World Water Week, 29th August 2016.
Antimicrobial Resistance A One Health Challenge for Joint Action Ekaterina Bessonova
1. Antimicrobial resistance is a major global public health threat that requires a One Health approach and joint action across human, animal, and environmental sectors.
2. Key international organizations like FAO, OIE, and WHO have been collaborating for over 20 years to address antimicrobial resistance through activities like establishing guidelines, supporting country capacity building, and developing global and national action plans.
3. National action plans should focus on improving awareness and surveillance systems, optimizing antimicrobial use, and conducting research to address knowledge gaps, with a goal of ensuring sustainable and coordinated responses to antimicrobial resistance as a shared challenge.
Antimicrobial Resistance A One Health Challenge for Joint Action SIANI
1. Antimicrobial resistance is a major global public health threat that requires joint action across human, animal, and environmental sectors (One Health approach).
2. Key international organizations like FAO, OIE, and WHO have been collaborating since 1997 to address antimicrobial resistance and have developed guidance and capacity building resources to support national plans.
3. FAO has developed a Action Plan on Antimicrobial Resistance that focuses on improving awareness, surveillance systems, governance around antimicrobial use, and promoting good practices in food and agriculture sectors.
Similar to Overview and Implementation of Aflatoxin Policy in Kenya (20)
These set of slides were presented at the BEP Seminar "Targeting in Development Projects: Approaches, challenges, and lessons learned" held last Oct. 2, 2023 in Cairo, Egypt
Caitlin Welsh
POLICY SEMINAR
Food System Repercussions of the Russia-Ukraine War
2023 Borlaug Dialogue Breakout session
Co-organized by IFPRI and CGIAR
OCT 26, 2023 - 1:10 TO 2:10PM EDT
Joseph Glauber
POLICY SEMINAR
Food System Repercussions of the Russia-Ukraine War
2023 Borlaug Dialogue Breakout session
Co-organized by IFPRI and CGIAR
OCT 26, 2023 - 1:10 TO 2:10PM EDT
Antonina Broyaka
POLICY SEMINAR
Food System Repercussions of the Russia-Ukraine War
2023 Borlaug Dialogue Breakout session
Co-organized by IFPRI and CGIAR
OCT 26, 2023 - 1:10 TO 2:10PM EDT
Bofana, Jose. 2023. Mapping cropland extent over a complex landscape: An assessment of the best approaches across the Zambezi River basin. PowerPoint presentation given during the Project Inception Workshop, VIP Grand Hotel, Maputo, Mozambique, April 20, 2023
Mananze, Sosdito. 2023. Examples of remote sensing application in agriculture monitoring. PowerPoint presentation given during the Project Inception Workshop, VIP Grand Hotel, Maputo, Mozambique, April 20, 2023
This document discusses using satellite data and crop modeling to forecast crop yields in Mozambique. It summarizes previous studies conducted in the US, Argentina, and Brazil to test a remote sensing crop growth and simulation model (RS-CGSM) for predicting corn and soybean yields. For Mozambique, additional data is needed on crop cultivars, management practices, planting and harvest seasons. It also describes using earth observation data and machine learning models to forecast crop yields and conditions across many countries as part of the GEOGLAM program, though this is currently only implemented in South Africa for Africa. Finally, it mentions a production efficiency model for estimating yield from satellite estimates of gross primary production.
International Food Policy Research Institute (IFPRI). 2023. Statistics from Space: Next-Generation Agricultural Production Information for Enhanced Monitoring of Food Security in Mozambique. PowerPoint presentation given during the Project Kickoff Meeting (virtual), January 12, 2023
International Food Policy Research Institute (IFPRI). 2023. Statistics from Space: Next-Generation Agricultural Production Information for Enhanced Monitoring of Food Security in Mozambique. Component 1. Stakeholder engagement for impacts. PowerPoint presentation given during the Project Inception Workshop, VIP Grand Hotel, Maputo, Mozambique, April 20, 2023
Centro de Estudos de Políticas e Programas Agroalimentares (CEPPAG). 2023. Statistics from Space: Next-Generation Agricultural Production Information for Enhanced Monitoring of Food Security in Mozambique. Component 3. Digital collection of groundtruthing data. PowerPoint presentation given during the Project Inception Workshop, VIP Grand Hotel, Maputo, Mozambique, April 20, 2023
ITC/University of Twente. 2023. Statistics from Space: Next-Generation Agricultural Production Information for Enhanced Monitoring of Food Security in Mozambique. Component 2. Enhanced area sampling frames. PowerPoint presentation given during the Project Inception Workshop, VIP Grand Hotel, Maputo, Mozambique, April 20, 2023
Christina Justice
IFPRI-AMIS SEMINAR SERIES
A Look at Global Rice Markets: Export Restrictions, El Niño, and Price Controls
Co-organized by IFPRI and Agricultural Market Information System (AMIS)
OCT 18, 2023 - 9:00 TO 10:30AM EDT
Rice is the most consumed cereal in Senegal, accounting for 34% of total cereal consumption. Per capita consumption is 80-90kg annually, though there is an urban-rural divide. While domestic production has doubled between 2010-2021, it still only meets 40% of demand. As a result, Senegal imports around 1 million tons annually, mainly from India and Thailand. Several public policies aim to incentivize domestic production and stabilize prices, though rice remains highly exposed to international price shocks due to its importance in consumption and reliance on imports.
Abdullah Mamun and Joseph Glauber
IFPRI-AMIS SEMINAR SERIES
A Look at Global Rice Markets: Export Restrictions, El Niño, and Price Controls
Co-organized by IFPRI and Agricultural Market Information System (AMIS)
OCT 18, 2023 - 9:00 TO 10:30AM EDT
Shirley Mustafa
IFPRI-AMIS SEMINAR SERIES
A Look at Global Rice Markets: Export Restrictions, El Niño, and Price Controls
Co-organized by IFPRI and Agricultural Market Information System (AMIS)
OCT 18, 2023 - 9:00 TO 10:30AM EDT
Joseph Glauber
IFPRI-AMIS SEMINAR SERIES
A Look at Global Rice Markets: Export Restrictions, El Niño, and Price Controls
Co-organized by IFPRI and Agricultural Market Information System (AMIS)
OCT 18, 2023 - 9:00 TO 10:30AM EDT
This document provides an overview of the Political Economy and Policy Analysis (PEPA) Sourcebook virtual book launch. It summarizes the purpose and features of the PEPA Sourcebook, which is a guide for generating evidence to inform national food, land, and water policies and strategies. The Sourcebook includes frameworks, analytical tools, case studies, and step-by-step guidance for conducting political economy and policy analysis. It aims to address the current fragmentation in approaches and lack of external validity by integrating different frameworks and methods into a single resource. The launch event highlighted example frameworks and case studies from the Sourcebook that focus on various policy domains like food and nutrition, land, and climate and ecology.
- Rice exports from Myanmar have exceeded 2 million tons per year since 2019-2020, except for 2020-2021 during the peak of the pandemic. Exports through seaports now account for around 80% of total exports.
- Domestic rice prices in Myanmar have closely tracked Thai export prices, suggesting strong linkages between domestic and international markets.
- Simulations of a 10% decrease in rice productivity and a 0.4 million ton increase in exports in 2022-2023 resulted in a 33% increase in domestic prices, a 5% fall in production, and a 10% drop in consumption, with poor households suffering the largest declines in rice consumption of 12-13%.
Bedru Balana, Research Fellow, IFPRI, presented these slides at the AAAE2023 Conference, Durban, South Africa, 18-21 September 2023. The authors acknowledged the contributions of CGIAR Initiative on National Policies and Strategies, Google, the International Rescue Committee, IFPRI, and USAID.
Sara McHattie
IFPRI-AMIS SEMINAR SERIES
Facilitating Anticipatory Action with Improved Early Warning Guidance
Co-organized by IFPRI and Agricultural Market Information System (AMIS)
SEP 26, 2023 - 9:00 TO 10:30AM EDT
More from International Food Policy Research Institute (IFPRI) (20)
AHMR is an interdisciplinary peer-reviewed online journal created to encourage and facilitate the study of all aspects (socio-economic, political, legislative and developmental) of Human Mobility in Africa. Through the publication of original research, policy discussions and evidence research papers AHMR provides a comprehensive forum devoted exclusively to the analysis of contemporaneous trends, migration patterns and some of the most important migration-related issues.
Food safety, prepare for the unexpected - So what can be done in order to be ready to address food safety, food Consumers, food producers and manufacturers, food transporters, food businesses, food retailers can ...
Jennifer Schaus and Associates hosts a complimentary webinar series on The FAR in 2024. Join the webinars on Wednesdays and Fridays at noon, eastern.
Recordings are on YouTube and the company website.
https://www.youtube.com/@jenniferschaus/videos
United Nations World Oceans Day 2024; June 8th " Awaken new dephts".Christina Parmionova
The program will expand our perspectives and appreciation for our blue planet, build new foundations for our relationship to the ocean, and ignite a wave of action toward necessary change.
RFP for Reno's Community Assistance CenterThis Is Reno
Property appraisals completed in May for downtown Reno’s Community Assistance and Triage Centers (CAC) reveal that repairing the buildings to bring them back into service would cost an estimated $10.1 million—nearly four times the amount previously reported by city staff.
Indira awas yojana housing scheme renamed as PMAYnarinav14
Indira Awas Yojana (IAY) played a significant role in addressing rural housing needs in India. It emerged as a comprehensive program for affordable housing solutions in rural areas, predating the government’s broader focus on mass housing initiatives.
Overview and Implementation of Aflatoxin Policy in Kenya
1. Catalyzing the use of aflatoxin control
technologies in Kenya and Ghana:
Research findings and opportunities for action
Overview and Implementation
of Aflatoxin Policy in Kenya
Robert KILONZO
Deputy Director, Public Health
Ministry of Health
KENYA
2. Directorate of Public Health
Food Safety Division
MANDATE
1. Food Safety Policy, Law
2. Guidelines, standards
operating procedures,
and protocols
3. Implementation
4. Capacity building
5. IHR core capacity on
food safety and quality
6. Technical backstopping
during food safety
events
3. 1. Has the Overarching
mandate on food safety
2. The Health Act, 2017
3. Human safety – food
safety
4. The Food, Drugs and
Chemical Substances
Act, CAP 254
5. The Public Health Act,
CAP 242
1. Ministry of Health – Food Safety and Quality
4. Overview of Aflatoxin Contamination in
Kenya
• Aflatoxins are contaminants in food, presence
above national level render the food UNSAFE
• Role in food safety:
– The regulator
– The Food Business Operator (FBO) A shared responsibility
– The Consumer
• The overall responsibility on food safety rests with
the FBO
5. Since 2004 ……
• Before the 2004, there were cases of aflatoxicosis
• In 2004, a total of 125 deaths occurred, due to
consumption of aflatoxin contaminated maize
• Evidence of decline of fatalities. What does this
mean?
• There is increase in amounts of maize declared
unsafe for human consumption.
– A total of 155,475 bags @ 90Kg of maize valued at
KES 465 million were mopped up mainly in upper
nad lower parts of eastern region and in Bura
irrigation scheme in 2014
6. Geographical spread of media reports on aflatoxins across the country between 1960 – to date
7.
8. Aflatoxin Policy in Kenya
• Approach is 3 tiered:
1) Good Agricultural Practices
• Aflatoxin contamination is both pre- and post –
harvest, and therefore practices at farm level
must be good enough to prevent contamination
• Good practices in planting, harvesting, storage,
transportation
• Use of bio-control technology
9. 2. Good Manufacturing Practices
• FBOs have the overall responsibility on food
safety
• Each FBO to have documented and
implement good practices
3. Hazard Analysis Critical Control Point
• It is built on sound GAPs and GMPs
• Measures to be risk-based – the probability of
the hazard to cause adverse effects
• Establish CCPs and CLs
10. • Permissible national total aflatoxin
contamination levels for grains and finished
products is 10ppb
• But for peanut butter is 15ppb
• Aflatoxin M1 in dairy products is 500ppt
11. Implementation of Aflatoxin Control
Measures
• National Government
– Regulatory agencies: Ministry of Health (Food
Safety Division), Kenya Dairy Board, Kenya Bureau
of Standards, Veterinary Services, Livestock
Production, Kenya Agricultural and Livestock
Research Organization (KALRO)
• County Governments
– The public health departments
12. Challenges in Aflatoxin Control
• Coordination of the various regulatory
agencies
– Despite the coordination provided by the National
Food Safety Coordinating Committee, challenges
are inevitable
• A surveillance programmes will need funds