Search results for: Arabic Fodio Nigeria security
4859 Corruption and Economic Performance in Nigeria: The Role of Forensic Accounting
Authors: Jamila Garba Audu, Peter Adamu
Abstract:
This study investigates the role of forensic accounting in the fight against corruption in Nigeria for better utilization of public funds and economic growth and development of the Country. We adopted a trend analysis to show the performance of the Nigerian economy as well as the quality of institutions which government economic and political activities in the country. It is an established fact that Nigeria has performed badly since the 1960s to date in terms of institutional quality and economic development despite large amount of money obtained from the export of crude oil. It was revealed also that the fight against corruption has not been very successful in recent times because experts in the field of forensic accounting have not been utilized. With the successes recorded in dealing with fraud and embezzlement using forensic accounting, it has become imperative for the EFCC to use forensic accountants in the fight against corruption in the country. Also, there is the need to introduce very seriously, the teaching of forensic accounting in Nigerian Universities to train experts.Keywords: corruption, economic performance, forensic accounting, Nigeria
Procedia PDF Downloads 3764858 Prospects and Challenges of Enforcing Accountability and Transperancy for Good Governance: An Analysis of Nigeria’s Situation
Authors: Mahmoud Datti Yola
Abstract:
There is wider agreement among the scholars of political science and public administration that transparency and accountability constituted one of the most crucial ingredients of good governance. In addition democratic government is expected to be accountable and responsive to the wishes and aspirations of the people. In Nigeria, after more than fifteen years to the handover of power to the civilian administration, the leaders has not been at their best, as people’ expectations for nation building, socio-economic progress and better opportunities has been dashed by high level corruption, rising insecurity, absence of the rule of law and lack of transparency and accountability. The objective of this paper is to examine the prospects and challenges of transparency and accountability in Nigeria’s democratic governance. The study utilizes secondary data for this purpose. The study is of the view that the enormous task of dealing with the issue of corruption, insecurity and promotion of ethics and accountability in Nigeria lies not only in effective oversight of the executive by the legislative bodies, respect for the rule of law and an independent judiciary, but also in the ability of the citizens, civil society organizations and other associations to hold elected and appointed officials accountable.Keywords: good governance, transperancy, accountability, Nigeria
Procedia PDF Downloads 6074857 Patterns of Sustainable Financial Incentives Utilisation among Fashion Design Entrepreneurs in Nigeria
Authors: O. B. Urhibo, D. Imhonopi, T. George
Abstract:
The global rate of decline in entrepreneurial activities, and the prevalence in Africa, especially Nigeria, is more worrisome. In recent times, these problems, such as the lack of accessibility and utilization of financial incentives needed to promote entrepreneurial activities, have led to a decrease in entrepreneurial activities. The causes of the decline have been evaluated from a different perspective and have further confirmed the relevance and need for the sustainability of the Fashion industry. With the increasing rate of unemployment and poverty in Nigeria and the literature gap in the social context, this study investigated the patterns of sustainable financial incentives utilisation among fashion design entrepreneurs in Nigeria through a qualitative approach. The Eastern part of Nigeria was considered in this study because of the high rate of market activity for textile and clothing firms. Specifically, Delta state was considered in this study. A purposive sampling technique was used to select key informants consisting of twelve (12) executives of the associations (i.e., Fashion Designer & Exhibitors Association, Delta Fashion Designers, and Fashion Designers Association of Nigeria for the interview sessions. Four themes emanate from the thematic analysis -lack of sufficient collateral, difficulties and duration of loan application processes, unacceptable business proposal/plan, and the absence of audited financial accounts were found to be the patterns of sustainable financial incentives utilisation among fashion design entrepreneurs in Nigeria. The promotion of sustainable patterns and supports has been suggested to reduce the challenges of sustainable financial incentives utilisation among fashion design entrepreneurs.Keywords: entrepreneurship, fashion design, financial incentives, patterns, sustainability, utilisation
Procedia PDF Downloads 754856 A Tutorial on Network Security: Attacks and Controls
Authors: Belbahi Ahlam
Abstract:
With the phenomenal growth in the Internet, network security has become an integral part of computer and information security. In order to come up with measures that make networks more secure, it is important to learn about the vulnerabilities that could exist in a computer network and then have an understanding of the typical attacks that have been carried out in such networks. The first half of this paper will expose the readers to the classical network attacks that have exploited the typical vulnerabilities of computer networks in the past and solutions that have been adopted since then to prevent or reduce the chances of some of these attacks. The second half of the paper will expose the readers to the different network security controls including the network architecture, protocols, standards and software/ hardware tools that have been adopted in modern day computer networks.Keywords: network security, attacks and controls, computer and information, solutions
Procedia PDF Downloads 4544855 Integration of Edible Insects into the Animal Husbandry Curriculum in Senior Secondary Schools in Nigeria: Teachers’ Perception
Authors: Ali Christian Chinedu, Asogwa Vincent Chidindu, Ejiofor Toochukwu Eleazar, Okadi Ashagwu Ojang
Abstract:
The increasing rate of Boko Haram insurgency, farmer-herder clashes, and kidnapping in Nigeria has resulted in food shortages and high cost of protein sources like beef and fish. This challenge could be curbed with the production of edible insects, which contain several nutritional benefits like calories, protein, fat, vitamins, and minerals, depending on their species, metamorphic stage, and diet. Unfortunately, the benefits and competencies in producing, preserving, and marketing edible insects are still unknown to the public, including prospective farmers in Nigeria. Hence, this study determined teachers’ perception of integrating edible insects into the Animal Husbandry Curriculum in Senior Secondary Schools in Nigeria to equip the future generation with the relevant competencies for alternative sustainable protein supply. The study was carried out in Enugu State, Nigeria. The participants for the study comprised 162 agricultural science teachers. A questionnaire titled: Edible Insects Integration in Animal Husbandry Curriculum Questionnaire (EIIAHCQ) was used to collect data using a descriptive survey research design. We conducted data collection with the help of six research assistants. The study identified 11 objectives, 11 contents, 10 teaching methods, and 9 evaluation methods that could be integrated into the existing curriculum of animal husbandry in Nigeria. Among others, the Ministry of Education should integrate the finding of this study into the curriculum of Animal Husbandry in Nigeria to enhance the protein supply and curb food insecurity now and in the future.Keywords: animal husbandry curriculum, edible insects, entomophagy, integration, secondary school, Nigeria
Procedia PDF Downloads 924854 Dividends Smoothing in an Era of Unclaimed Dividends: A Panel Data Analysis in Nigeria
Authors: Apedzan Emmanuel Kighir
Abstract:
This research investigates dividends smoothing among non-financial companies trading on the Nigerian Stock Exchange in an era of unclaimed dividends from 2004 to 2013. There has been a raging controversy among Regulatory Authorities, Company Executives, Registrars of Companies, Shareholders and the general public regarding the increasing incidence of unclaimed dividends in Nigeria. The objective of this study is to find out if corporate earnings management through dividends smoothing is implicated in unclaimed dividends among Nigerian non-financial firms. The research used panel data and employed Generalized Method of Moment as method of analysis. The research finds evidence of dividends-smoothing in this era of unclaimed dividends in Nigeria. The research concludes that dividends-smoothing is a trigger and red flag for unclaimed dividends, an output of earnings management. If earnings management and hence unclaimed dividends in Nigeria is allowed to continue, it will lead to great consequences to the investors and corporate policy of government. It is believed that the research will assist investors and government in making informed decisions regarding dividends policy in Nigeria.Keywords: dividends smoothing, non financial companies, Nigerian stock exchange, unclaimed dividends, corporate earnings management
Procedia PDF Downloads 2804853 Analysis of Threats in Interoperability of Medical Devices
Authors: M. Sandhya, R. M. Madhumitha, Sharmila Sankar
Abstract:
Interoperable medical devices (IMDs) face threats due to the increased attack surface accessible by interoperability and the corresponding infrastructure. Initiating networking and coordination functionalities primarily modify medical systems' security properties. Understanding the threats is a vital first step in ultimately crafting security solutions for such systems. The key to this problem is coming up with some common types of threats or attacks with those of security and privacy, and providing this information as a roadmap. This paper analyses the security issues in interoperability of devices and presents the main types of threats that have to be considered to build a secured system.Keywords: interoperability, threats, attacks, medical devices
Procedia PDF Downloads 3334852 Securing Healthcare IoT Devices and Enabling SIEM Integration: Addressing
Authors: Mubarak Saadu Nabunkari, Abdullahi Abdu Ibrahim, Muhammad Ilyas
Abstract:
This study looks at how Internet of Things (IoT) devices are used in healthcare to monitor and treat patients better. However, using these devices in healthcare comes with security problems. The research explores using Security Information and Event Management (SIEM) systems with healthcare IoT devices to solve these security challenges. Reviewing existing literature shows the current state of IoT security and emphasizes the need for better protection. The main worry is that healthcare IoT devices can be easily hacked, putting patient data and device functionality at risk. To address this, the research suggests a detailed security framework designed for these devices. This framework, based on literature and best practices, includes important security measures like authentication, data encryption, access controls, and anomaly detection. Adding SIEM systems to this framework helps detect threats in real time and respond quickly to incidents, making healthcare IoT devices more secure. The study highlights the importance of this integration and offers guidance for implementing healthcare IoT securely, efficiently, and effectively.Keywords: cyber security, threat intelligence, forensics, heath care
Procedia PDF Downloads 664851 Assessing the Effects of Community Informatics on Livelihoods Sustainability in Nigeria: a Model for Rural Communities
Authors: Adebayo J. Julius, Oluremi N. Iluyomade
Abstract:
Livelihood in Nigeria is a paradox of poverty amidst plenty. The Country is endowed with a good climate for agriculture, naturally growing fruit trees and vegetables, and undomesticated water resources. In spite of all its endowment, Nigeria continues to live in poverty year in year out. This thus raises a very important question as to how can there be so much poverty in Nigeria with all its natural endowments. This study focused comparative analysis of the utilization of community informatics for sustainable livelihoods through agriculture. The idea projected in this study is that small strategic changes in the modus operandi of social informatics can have a significant impact on sustainability of livelihoods. This paper carefully explored the theories of community informatics and its efficacies in dealing with sustainability issues. This study identified, described and evaluates the roles of community informatics in some sectors of the economy, different analytical tools to benchmark the influence of social informatics in agriculture against what is obtainable in agricultural sectors of the economy were used. It further employed comparative analysis to build a case model for sustainable livelihood in agriculture through community informatics.Keywords: informatics , model, rural community, livelihoods sustainability, Nigeria
Procedia PDF Downloads 1514850 English and the Question of National Language in Nigeria
Authors: Foyewa R. A.
Abstract:
This paper examined the role of English language and the quest for a national language in Nigeria. Various hindrances to the choice of a national language in Nigeria were observed. These include: The dominant role of English language, political instability and multilingual nature of the country. The writer suggested that ’’the three big’’ that is, Hausa, Igbo and Yoruba should be selected as the national languages. It was also suggested that a credit pass in a student’s mother tongue and one of “the three big” (Hausa, Igbo and Yoruba) should constitute the prerequisite for admission into Nigerian higher institutions.Keywords: English, roles of English, national language, Nigerian languages, Hausa, Igbo, Yoruba
Procedia PDF Downloads 7894849 Security Design of Root of Trust Based on RISC-V
Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li
Abstract:
Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.Keywords: root of trust, secure boot, memory protection, hardware security
Procedia PDF Downloads 2154848 Delineation of Oil – Polluted Sites in Ibeno LGA, Nigeria, Using Geophysical Techniques
Authors: Ime R. Udotong, Justina I. R. Udotong, Ofonime U. M. John
Abstract:
Ibeno, Nigeria hosts the operational base of Mobil Producing Nigeria Unlimited (MPNU), a subsidiary of ExxonMobil and the current highest oil and condensate producer in Nigeria. Besides MPNU, other oil companies operate onshore, on the continental shelf and deep offshore of the Atlantic Ocean in Ibeno, Nigeria. This study was designed to delineate oil polluted sites in Ibeno, Nigeria using geophysical methods of electrical resistivity (ER) and ground penetrating radar (GPR). Results obtained revealed that there have been hydrocarbon contaminations of this environment by past crude oil spills as observed from high resistivity values and GPR profiles which clearly show the distribution, thickness and lateral extent of hydrocarbon contamination as represented on the radargram reflector tones. Contaminations were of varying degrees, ranging from slight to high, indicating levels of substantial attenuation of crude oil contamination over time. Moreover, the display of relatively lower resistivities of locations outside the impacted areas compared to resistivity values within the impacted areas and the 3-D Cartesian images of oil contaminant plume depicted by red, light brown and magenta for high, low and very low oil impacted areas, respectively confirmed significant recent pollution of the study area with crude oil.Keywords: electrical resistivity, geophysical investigations, ground penetrating radar, oil-polluted sites
Procedia PDF Downloads 4184847 Child Labour Issue: Practice of Enforecement of Right of the Child in Nigeria
Authors: Gift Salawa, Perkins Erhijakpor, Henry Ukwu
Abstract:
This study will explore child labour issues in Nigeria because it is capable of affecting the physical and general well-being of children who perform hazardous work. This feat will be achieved through qualitative research methodology. Data collection shall be elicited by oral interviews and documental content analysis to delve on the application of the Convention on the Rights of the Child (CRC), International Labour Organization ILO and Geneva Convention relating to child labour practices in Nigeria. This will include the relevance of present domestic laws relating to child labour as implemented in Nigeria, together with factors that contribute to the practice of child labour in the country. The oral interview data analysis will be performed by breaking the interview data into significant statements and themes. This shall be done by comparing and determining the commonalities that are prevalent in the participants’ views regarding child labour menace in Nigeria. Presumably, findings from this study shall unveil that a poor educational policy, a widespread poverty level which is mostly prevalent amongst families in the rural areas of the country, a lack of employment for adults, have led to the ineffectiveness of the local child labour laws in Nigeria. These has in turn culminated into a somewhat non-implementation of the international laws of the CRC, ILO and Geneva Declaration on child labour to which the Nigerian government is a signatory. Based on the finding, this study will calls on the government of Nigeria to extend its free educational policy from the elementary, secondary to tertiary educations. The government also has to ensure that offenders of children’s rights should face a severe punishment.Keywords: child labour, educational policy, human right, protection right
Procedia PDF Downloads 2974846 The Audio-Visual and Syntactic Priming Effect on Specific Language Impairment and Gender in Modern Standard Arabic
Authors: Mohammad Al-Dawoody
Abstract:
This study aims at exploring if priming is affected by gender in Modern Standard Arabic and if it is restricted solely to subjects with no specific language impairment (SLI). The sample in this study consists of 74 subjects, between the ages of 11;1 and 11;10, distributed into (a) 2 SLI experimental groups of 38 subjects divided into two gender groups of 18 females and 20 males and (b) 2 non-SLI control groups of 36 subjects divided into two gender groups of 17 females and 19 males. Employing a mixed research design, the researcher conducted this study within the framework of the relevance theory (RT) whose main assumption is that human beings are endowed with a biological ability to magnify the relevance of the incoming stimuli. Each of the four groups was given two different priming stimuli: audio-visual priming (T1) and syntactic priming (T2). The results showed that the priming effect was sheer distinct among SLI participants especially when retrieving typical responses (TR) in T1 and T2 with slight superiority of males over females. The results also revealed that non-SLI females showed stronger original response (OR) priming in T1 than males and that non-SLI males in T2 excelled in OR priming than females. Furthermore, the results suggested that the audio-visual priming has a stronger effect on SLI females than non-SLI females and that syntactic priming seems to have the same effect on the two groups (non-SLI and SLI females). The conclusion is that the priming effect varies according to gender and is not confined merely to non-SLI subjects.Keywords: specific language impairment, relevance theory, audio-visual priming, syntactic priming, modern standard Arabic
Procedia PDF Downloads 1744845 Object Recognition Approach Based on Generalized Hough Transform and Color Distribution Serving in Generating Arabic Sentences
Authors: Nada Farhani, Naim Terbeh, Mounir Zrigui
Abstract:
The recognition of the objects contained in images has always presented a challenge in the field of research because of several difficulties that the researcher can envisage because of the variability of shape, position, contrast of objects, etc. In this paper, we will be interested in the recognition of objects. The classical Hough Transform (HT) presented a tool for detecting straight line segments in images. The technique of HT has been generalized (GHT) for the detection of arbitrary forms. With GHT, the forms sought are not necessarily defined analytically but rather by a particular silhouette. For more precision, we proposed to combine the results from the GHT with the results from a calculation of similarity between the histograms and the spatiograms of the images. The main purpose of our work is to use the concepts from recognition to generate sentences in Arabic that summarize the content of the image.Keywords: recognition of shape, generalized hough transformation, histogram, spatiogram, learning
Procedia PDF Downloads 1584844 Food Security of Migrants in a Regional Area of Australia: A Qualitative Study
Authors: Joanne Sin Wei Yeoh, Quynh Lê, Rosa McManamey
Abstract:
Food security indicates the ability of individuals, households and communities to acquire food that is healthy, sustainable, affordable, appropriate and accessible. Despite Australia’s current ability to produce enough food to feed a population larger than its current population, there has been substantial evidence over the last decades to demonstrate many Australians struggle to feed themselves, including those from a cultural and linguistically diverse (CALD) background. The study aimed to investigate migrants’ perceptions and experiences on food security in Tasmania. Semi-structured interviews were conducted with 33 migrants residing in North, South and North West Tasmania, who were recruited through purposive sampling. Thematic analysis was employed to analyse the interview data. Four main themes were identified from the interview data: (1) Understanding of food security; (2) Experiences with the food security in Tasmania; (3) Factors that influence migrants’ food security in Tasmania; and (4) Acculturation strategies. Various sub-themes have emerged under each of these four major themes. Though the findings indicate participants are satisfied with their current food security in Tasmania, they still encounter some challenges in food availability, accessibility, and affordability in Tasmania. Factors that influence migrants’ food security were educational background, language barrier, socioeconomic status, geographical isolation, and cultural background. By using different acculturation strategies, migrants managed to adapt to the new food culture. In addition, social and cultural capitals were also treated as vital roles in improving migrants’ food security. The findings indicate migrants residing in Tasmania face different challenges on food security. They use different strategies for food security while acculturating into a new environment. The findings may provide useful information for migrants in Australia and various private organisations or relevant government departments that address food security for migrants.Keywords: experiences, food security, migrants, perceptions
Procedia PDF Downloads 4244843 Can Empowering Women Farmers Reduce Household Food Insecurity? Evidence from Malawi
Authors: Christopher Manyamba
Abstract:
Women in Malawi produce perform between 50-70 percent of all agricultural tasks and yet the majority remain food insecure. The aim of his paper is to build on existing mixed evidence that indicates that empowering women in agriculture is conducive to improving food security. The WEAI is used to provide evidence on the relationship between women’s empowerment in agriculture and household food security. A multinomial logistic regression is applied to the Women Empowerment in Agriculture Index (WEAI) components and the Household Hunger Scale. The overall results show that the WEAI can be used to determine household food insecurity; however it has to be contextually adapted. Assets ownership, credit, group membership and leisure time are positively associated with food security. Contrary to other literature, empowerment in having control and decisions on income indicate negative association with household food security. These results could potentially better inform public, private and civil society stakeholders’ dialogues in creating the most effective and sustainable interventions to help women attain long-term food security.Keywords: food security, gender, empowerment, agriculture index, framework for African food security, household hunger scale
Procedia PDF Downloads 3684842 A Study on Automotive Attack Database and Data Flow Diagram for Concretization of HEAVENS: A Car Security Model
Authors: Se-Han Lee, Kwang-Woo Go, Gwang-Hyun Ahn, Hee-Sung Park, Cheol-Kyu Han, Jun-Bo Shim, Geun-Chul Kang, Hyun-Jung Lee
Abstract:
In recent years, with the advent of smart cars and the expansion of the market, the announcement of 'Adventures in Automotive Networks and Control Units' at the DEFCON21 conference in 2013 revealed that cars are not safe from hacking. As a result, the HEAVENS model considering not only the functional safety of the vehicle but also the security has been suggested. However, the HEAVENS model only presents a simple process, and there are no detailed procedures and activities for each process, making it difficult to apply it to the actual vehicle security vulnerability check. In this paper, we propose an automated attack database that systematically summarizes attack vectors, attack types, and vulnerable vehicle models to prepare for various car hacking attacks, and data flow diagrams that can detect various vulnerabilities and suggest a way to materialize the HEAVENS model.Keywords: automotive security, HEAVENS, car hacking, security model, information security
Procedia PDF Downloads 3624841 Strategies for Medium Sized Construction Firms to Survive the Current Economic Conditions That Is Compounded by the Most Recent COVID-19 Pandemic in Nigeria
Authors: Aloysius Colman Chukwuemeka Ezeabasili, Chibuike Patrick Ezeabasili
Abstract:
Medium Sized Construction Companies in Nigeria are those employing 50-250 workers that are mostly involved in roads, Commercial and domestic building Construction, among others. These companies are in the majority and contribute immensely to infrastructural development in Nigeria. Despite the last eight years of economic downturn and the past years of COVID-19 pandemic, signs of these Companies recovering from the economic recession and pandemic seem bright. Nigeria has recorded 213,000 confirmed cases 3968 deaths from COVID-19 as at now. These medium sized companies are currently trying to explore various opportunities to grow their businesses to achieve competitive advantages over others by studying and improving on their bidding efficiency, Strategies for selecting businesses, bidding markup Strategies, and cash flow. These strategies were studied through the recruitment of construction experts and professionals. Many of them have acquired new technologies that have impacted positively on their strategies. The impact of these technologies like the BIM, e-tendering, conditions of contract, and claim management strategies are advantages to them and has given them good advantages over their peers. Monte Carlo solution, Swot analysis, and average bid methods have also clearly added advantages to bidding practices. New and existing strategies are Scrutinized, and training of young Nigerians in advanced countries to acquire knowledge in best practices have elevated some of these companies. The Covid-19 has not been very harsh to Nigeria, and the country is surely not as devastated as the advanced countries. Nigeria has therefore been able to cope with the combination of the downturn and the pandemic.Keywords: medium sized construction companies, competitive advantage, new bidding technologies, Nigeria
Procedia PDF Downloads 1354840 Smartphones: Tools for Enhancing Teaching in Nigeria’s Higher Institutions
Authors: Ma'amun Muhammed
Abstract:
The ability of smartphones in enhancing communication, providing access to business and serving as a pool for information retrieval has a far reaching and potentially beneficial impacts on enhancing teaching in higher institutions in the developing countries like Nigeria. Nigeria as one of the fast growing economies in Africa, whose citizens patronize smartphones can utilize this opportunity by inculcating the culture of using smartphones not only for communication, business transaction, banking etc. but also for enhancing teaching in the higher institutions. Smartphones have become part and parcel of our lives, particularly among young people. The primary objective of this paper is to ascertain the use of smartphones in enhancing teaching in Nigeria’s higher institutions, to achieve this, content analysis was used thoroughly. This paper examines the opportunities offered by smartphones to the students of higher institutions of learning, the challenges being faced by lecturers of these institutions in classrooms. Lastly, it offers solution on how some of these critical challenges will be overcame, so as to utilize the technology of these devices.Keywords: communication, information retrieval, mobile phone, smartphones teaching
Procedia PDF Downloads 4234839 Physical Activity Interventions and Maternal Health Outcomes in Nigeria: A Meta-Analysis of Randomized Controlled Trials
Authors: Jamilu Lawal Ajiya
Abstract:
Background: Physical activity is essential for improving maternal health outcomes, particularly in low- and middle-income countries like Nigeria. Objective: The aim is to evaluate the effectiveness of physical activity interventions on maternal health outcomes among Nigerian pregnant women. Methods: Systematic review and meta-analysis of randomized controlled trials (RCTs) conducted in Nigeria, published in English, and focusing on physical activity and maternal health outcomes. Results: Ten RCTs (N=1,200) were included. Physical activity interventions significantly reduced the risk of gestational diabetes, hypertension and preterm birth. Also, the study found that brisk walking and aerobic exercise were more effective than yoga. Conclusion: Physical activity interventions improve maternal health outcomes among Nigerian pregnant women. Policy changes and public health programs should prioritize physical activity promotion during pregnancy. This study informs healthcare providers, policymakers, and researchers on the effectiveness of physical activity interventions in improving maternal health outcomes in Nigeria.Keywords: physical activity, maternal health, Nigeria, randomized controlled trials
Procedia PDF Downloads 234838 Avoidance and Selectivity in the Acquisition of Arabic as a Second/Foreign Language
Authors: Abeer Heider
Abstract:
This paper explores and classifies the different kinds of avoidances that students commonly make in the acquisition of Arabic as a second/foreign language, and suggests specific strategies to help students lessen their avoidance trends in hopes of streamlining the learning process. Students most commonly use avoidance strategies in grammar, and word choice. These different types of strategies have different implications and naturally require different approaches. Thus the question remains as to the most effective way to help students improve their Arabic, and how teachers can efficiently utilize these techniques. It is hoped that this research will contribute to understand the role of avoidance in the field of the second language acquisition in general, and as a type of input. Yet some researchers also note that similarity between L1 and L2 may be problematic as well since the learner may doubt that such similarity indeed exists and consequently avoid the identical constructions or elements (Jordens, 1977; Kellermann, 1977, 1978, 1986). In an effort to resolve this issue, a case study is being conducted. The present case study attempts to provide a broader analysis of what is acquired than is usually the case, analyzing the learners ‘accomplishments in terms of three –part framework of the components of communicative competence suggested by Michele Canale: grammatical competence, sociolinguistic competence and discourse competence. The subjects of this study are 15 students’ 22th year who came to study Arabic at Qatar University of Cairo. The 15 students are in the advanced level. They were complete intermediate level in Arabic when they arrive in Qatar for the first time. The study used discourse analytic method to examine how the first language affects students’ production and output in the second language, and how and when students use avoidance methods in their learning. The study will be conducted through Fall 2015 through analyzing audio recordings that are recorded throughout the entire semester. The recordings will be around 30 clips. The students are using supplementary listening and speaking materials. The group will be tested at the end of the term to assess any measurable difference between the techniques. Questionnaires will be administered to teachers and students before and after the semester to assess any change in attitude toward avoidance and selectivity methods. Responses to these questionnaires are analyzed and discussed to assess the relative merits of the aforementioned strategies to avoidance and selectivity to further support on. Implications and recommendations for teacher training are proposed.Keywords: the second language acquisition, learning languages, selectivity, avoidance
Procedia PDF Downloads 2774837 VANETs: Security Challenges and Future Directions
Authors: Jared Oluoch
Abstract:
Connected vehicles are equipped with wireless sensors that aid in Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I) communication. These vehicles will in the near future provide road safety, improve transport efficiency, and reduce traffic congestion. One of the challenges for connected vehicles is how to ensure that information sent across the network is secure. If security of the network is not guaranteed, several attacks can occur, thereby compromising the robustness, reliability, and efficiency of the network. This paper discusses existing security mechanisms and unique properties of connected vehicles. The methodology employed in this work is exploratory. The paper reviews existing security solutions for connected vehicles. More concretely, it discusses various cryptographic mechanisms available, and suggests areas of improvement. The study proposes a combination of symmetric key encryption and public key cryptography to improve security. The study further proposes message aggregation as a technique to overcome message redundancy. This paper offers a comprehensive overview of connected vehicles technology, its applications, its security mechanisms, open challenges, and potential areas of future research.Keywords: VANET, connected vehicles, 802.11p, WAVE, DSRC, trust, security, cryptography
Procedia PDF Downloads 3124836 Towards a Security Model against Denial of Service Attacks for SIP Traffic
Authors: Arellano Karina, Diego Avila-Pesántez, Leticia Vaca-Cárdenas, Alberto Arellano, Carmen Mantilla
Abstract:
Nowadays, security threats in Voice over IP (VoIP) systems are an essential and latent concern for people in charge of security in a corporate network, because, every day, new Denial-of-Service (DoS) attacks are developed. These affect the business continuity of an organization, regarding confidentiality, availability, and integrity of services, causing frequent losses of both information and money. The purpose of this study is to establish the necessary measures to mitigate DoS threats, which affect the availability of VoIP systems, based on the Session Initiation Protocol (SIP). A Security Model called MS-DoS-SIP is proposed, which is based on two approaches. The first one analyzes the recommendations of international security standards. The second approach takes into account weaknesses and threats. The implementation of this model in a VoIP simulated system allowed to minimize the present vulnerabilities in 92% and increase the availability time of the VoIP service into an organization.Keywords: Denial-of-Service SIP attacks, MS-DoS-SIP, security model, VoIP-SIP vulnerabilities
Procedia PDF Downloads 2034835 A Neural Approach for the Offline Recognition of the Arabic Handwritten Words of the Algerian Departments
Authors: Salim Ouchtati, Jean Sequeira, Mouldi Bedda
Abstract:
In this work we present an off line system for the recognition of the Arabic handwritten words of the Algerian departments. The study is based mainly on the evaluation of neural network performances, trained with the gradient back propagation algorithm. The used parameters to form the input vector of the neural network are extracted on the binary images of the handwritten word by several methods: the parameters of distribution, the moments centered of the different projections and the Barr features. It should be noted that these methods are applied on segments gotten after the division of the binary image of the word in six segments. The classification is achieved by a multi layers perceptron. Detailed experiments are carried and satisfactory recognition results are reported.Keywords: handwritten word recognition, neural networks, image processing, pattern recognition, features extraction
Procedia PDF Downloads 5134834 A Biometric Template Security Approach to Fingerprints Based on Polynomial Transformations
Authors: Ramon Santana
Abstract:
The use of biometric identifiers in the field of information security, access control to resources, authentication in ATMs and banking among others, are of great concern because of the safety of biometric data. In the general architecture of a biometric system have been detected eight vulnerabilities, six of them allow obtaining minutiae template in plain text. The main consequence of obtaining minutia templates is the loss of biometric identifier for life. To mitigate these vulnerabilities several models to protect minutiae templates have been proposed. Several vulnerabilities in the cryptographic security of these models allow to obtain biometric data in plain text. In order to increase the cryptographic security and ease of reversibility, a minutiae templates protection model is proposed. The model aims to make the cryptographic protection and facilitate the reversibility of data using two levels of security. The first level of security is the data transformation level. In this level generates invariant data to rotation and translation, further transformation is irreversible. The second level of security is the evaluation level, where the encryption key is generated and data is evaluated using a defined evaluation function. The model is aimed at mitigating known vulnerabilities of the proposed models, basing its security on the impossibility of the polynomial reconstruction.Keywords: fingerprint, template protection, bio-cryptography, minutiae protection
Procedia PDF Downloads 1704833 Boko Haram Insurrection and Religious Revolt in Nigeria: An Impact Assessment-{2009-2015}
Authors: Edwin Dankano
Abstract:
Evident by incessant and sporadic attacks on Nigerians poise a serious threat to the unity of Nigeria, and secondly, the single biggest security nightmare to confront Nigeria since after amalgamation of the Southern and Northern protectorates by the British colonialist in 1914 is “Boko Haram” a terrorist organization also known as “Jama’atul Ahli Sunnah Lidda’wati wal Jihad”, or “people committed to the propagation of the Prophet’s teachings and jihad”. The sect also upholds an ideology translated as “Western Education is forbidden”, or rejection of Western civilization and institutions. By some estimates, more than 5,500 people were killed in Boko Haram attacks in 2014, and Boko Haram attacks have already claimed hundreds of lives and territories {caliphates}in early 2015. In total, the group may have killed more than 10,000 people since its emergence in the early 2000s. More than 1 million Nigerians have been displaced internally by the violence, and Nigerian refugee figures in neighboring countries continue to rise. This paper is predicated on secondary sources of data and anchored on the Huntington’s theory of clash of civilization. As such, the paper argued that the rise of Boko Haram with its violent disposition against Western values is a counter response to Western civilization that is fast eclipsing other civilizations. The paper posits that the Boko Haram insurrection going by its teachings, and destruction of churches is a validation of the propagation of the sect as a religious revolt which has resulted in dire humanitarian situation in Adamawa, Borno, Yobe, Bauchi, and Gombe states all in north eastern Nigeria as evident in human casualties, human right abuses, population displacement, refugee debacle, livelihood crisis, and public insecurity. The paper submits that the Nigerian state should muster the needed political will in terms of a viable anti-terrorism measures and build strong legitimate institutions that can adequately curb the menace of corruption that has engulfed the military hierarchy, respond proactively to the challenge of terrorism in Nigeria and should embrace a strategic paradigm shift from anti-terrorism to counter-terrorism as a strategy for containing the crisis that today threatens the secular status of Nigeria.Keywords: Boko Haram, civilization, fundamentalism, Islam, religion revolt, terror
Procedia PDF Downloads 3984832 Instructional Resources Development in Open and Distance Learning: Prospects and Challenges of Media Integration in Nigeria
Authors: Felix E. Gbenoba, Opeyemi Dahunsi
Abstract:
Self-instructional materials are at the heart of instructional delivery in Open and Distance Learning (ODL). The success of any ODL institution depends on the availability of instructional materials in quality and quantity. An ODL study material is expected to fully play the teacher plays in the face-to-face learning environment. In Nigeria, efforts to deliver ODL learning materials have been peculiarly challenging. Although researchers are unrelenting in hewing out ways to make ODL delivery in Africa generally and Nigeria in particular, meet the learners’ needs and acceptable global practices, the prospects of integrating instructional media into distance learning courses are largely unexplored. In the present study, we critically examine the prospects of integration of instructional media into ODL courses for pedagogic and other benefits it portends for delivery via the distance learning mode. Although efforts to integrate media in ODL have been recorded before now, the reality has not matched the expectation so far in Nigeria. This does not mean that the existing instructional materials have not produced any significant positive results in improving the overall learning (and teaching) experience in its institutions; it implies that increased integration as suggested here will further improve the experience as well as bring up the new challenges. Obstacles and problems of instructional materials and media development that could have affected the open educational resource initiatives are well established. The first aspect of this paper recalls the revolutionary strides that ODL brought to delivery of education in Nigeria particularly. The other aspect is on what instructional media are, their role, prospects and challenges for ODL in Nigeria; these are examined vis a vis the challenges of development, production and distribution of print instructional materials as the major format of instructional delivery at Nigeria’s only single mode ODL institution, NOUN. In the third aspect, we justify the need and benefits of integrating instructional media into the courses and make recommendations.Keywords: instructional delivery, instructional media, ODL, media integration, Nigeria, self-instructional materials
Procedia PDF Downloads 3874831 Analysis of Municipal Solid Waste Management in Nigeria
Authors: Anisa Gumel
Abstract:
This study examines the present condition of solid waste management in Nigeria. The author explores the challenges and opportunities affecting municipal solid waste management in "Nigeria" and determines the most profound challenges by analysing the interdependence and interrelationship among identified variables. In this study, multiple stakeholders, including 15 waste management professionals interviewed online, were utilised to identify the difficulties and opportunities affecting municipal solid waste in Nigeria. The interviews were transcribed and coded using NVivo to produce pertinent variables. An online survey of Nigerian internet and social media users was done to validate statements made by experts on the identified variable. In addition, a panel of five experts participated in a focus group discussion to discover the most influential factors that influence municipal solid waste management in Nigeria by analysing the interrelationships as well as the driving and reliant power of variables. The results show significant factors affecting municipal solid waste in Nigeria, including inadequate funding, lack of knowledge, and absence of legislation, as well as behavioural, financial, technological, and legal concerns grouped into five categories. Some claims stated by experts in the interview are supported by the survey data, while others are not. In addition, the focus group reveals patterns, correlations, and driving forces between variables that have been analysed. This study will provide decision-makers with a roadmap for resolving important waste management concerns in Nigeria and managing scarce resources effectively. It will also help non-governmental organisations combat malaria in Nigeria and other underdeveloped nations. In addition, the work contributes to the literature for future scholars to consult.Keywords: municipal solid waste, stakeholders, public, experts
Procedia PDF Downloads 794830 Human Development as an Integral Part of Human Security within the Responsibility to Rebuild
Authors: Themistoklis Tzimas
Abstract:
The proposed paper focuses on a triangular relationship, between human security, human development and responsibility to rebuild. This relationship constitutes the innovative contribution to the debate about human security. Human security constitutes a generic and legally binding notion, which orientates from an integrated approach the UN Charter principles and of the collective security system. Such an approach brings at the forefront of international law and of international relations not only states but non- state actors as well. Several doctrines attempt to implement the fore-mentioned approach among which the Responsibility to Protect- hereinafter R2P- doctrine and its aspect of Responsibility to Rebuild- hereinafter R2R. In this sense, R2P in general and R2R are supposed to be guided by human security imperatives. Human security because of its human- centered approach encompasses as an integral part of it, human development. Human development constitutes part of the backbone of human security, since it deals with the social and economic root- causes of the threats, which human security attempts to confront. In this sense, doctrines which orientate from human security, such as R2P and its R2R aspect should also take into account human development imperatives, in order to improve their efficiency. On the contrary though, R2R is more often linked with market- orientated policies, which are often imposed under transitional authorities, regardless of local needs. The implementation of such policies can be identified as a cause for striking failures in the framework of R2R. In addition it is a misinterpretation of the essence of human security and subsequently of R2P as well. The findings of the article, on the basis of the fore-mentioned argument is that a change must take place from a market- orientated misinterpretation of R2R to an approach attempting to implement human development doctrines, since the latter lie at the heart of human security and can be proven more effective in dealing with the root- causes of conflicts. Methodologically, the article begins with an examination of human security and of its binding nature on the basis of its orientation from the UN Charter. It also examines its significance in the framework of the collective security system. Then, follows the analysis of why and how human development constitutes an integral part of human security. At the next part it is proven that R2P in general and R2R more specifically constitute or should constitute an attempt to implement human security doctrines within the collective security system. Having built this triangular relationship it is argued that human development is proven to be the most suitable notion, so that the spirit of human security and the scopes of R2P are successfully implemented.Keywords: human security, un charter, responsibility to protect, responsibility to rebuild, human development
Procedia PDF Downloads 279