Search results for: Moses Ikechukwu Benjamin
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 262

Search results for: Moses Ikechukwu Benjamin

232 Fermentable Bio-Ethanol Using Bakers and Palmwine Yeasts: Indices of Bioavailability of Carbohydrate and Sugar from Fungal Treated Rice Husk

Authors: Ezeonu, Chukwuma Stephen, Onwurah, Ikechukwu Noel Emmanuel

Abstract:

Pure strains of Aspergillus fumigatus (AF), aspergillus niger (AN), aspergillus oryzae (AO), trichophyton mentagrophyte (TM), trichophyton rubrum (TR) and Trichophyton soudanense (TS) were isolated from decomposing rice husk. Freshly processed rice husk in Mandle’s medium were heat pre-treated using an autoclave at 121oC for 20 minutes. The isolated fungi as monoculture and di-culture combinations were inoculated into each of the pre-treated rice husk with the exception of two controls. Seven days hydrolysis was followed by estimation of carbohydrate, reducing sugar and non-reducing sugar. Fungal treated rice husks were left to ferment for 7 days with introduction of both baker’s and palm wine yeast. The result obtained in the work gave the highest carbohydrate (20.53 ± 2.73 %) from rice husks treated with TS + TR di-culture. The highest soluble reducing sugar (2.66 ± 0.14 %) was obtained from rice husk treated with TM. The highest soluble nonreducing sugar (18.08 ± 2.61 %) was from AF. The introduction of yeasts from palm wine gave the highest bio-ethanol (12.82 ± 0.39 %) from AO. The highest bio-ethanol (6.60 ± 0.10 %) from baker's yeast fermentation was in AO + TS treated rice husk. There was increased availability of sugar and moderate yield of bio-ethanol, especially from palm wine yeast.

Keywords: fungi, rice husk, carbohydrate, reducing sugar, non-reducing sugar, ethanol, fermentation

Procedia PDF Downloads 440
231 A Correlational Study: Dark Triad and Self-Restraint among Criminology Students

Authors: Mary Heather Lee T. Walker, Audilon Benjamin Madamba, Mizheal Vstrechnny Vidal, Rogelio Angeles, John Rhey Banag, Lorraine Martin

Abstract:

Criminology students are the future police officers of the country that plays a major role in protecting the citizens. Their behavior must be thoroughly assessed before given a badge of responsibility. Therefore, it is important to highlight their Dark Triad that is composed of Machiavellianism, Narcissism, and Psychopathy which are considered to be controversial variables in the present while self-restraint is considered to be their way of controlling themselves especially in their line of work. The researchers used convenience and random sampling and found the respondents from a private school. Thus, the study’s aim is to determine whether there is a relationship among these variables. Machiavellianism and Psychopathy is linked to Self-Restraint except Narcissism. There are lots of factors that resulted into this.

Keywords: criminology, dark triad, self-restraint, students

Procedia PDF Downloads 292
230 Closest Possible Neighbor of a Different Class: Explaining a Model Using a Neighbor Migrating Generator

Authors: Hassan Eshkiki, Benjamin Mora

Abstract:

The Neighbor Migrating Generator is a simple and efficient approach to finding the closest potential neighbor(s) with a different label for a given instance and so without the need to calibrate any kernel settings at all. This allows determining and explaining the most important features that will influence an AI model. It can be used to either migrate a specific sample to the class decision boundary of the original model within a close neighborhood of that sample or identify global features that can help localising neighbor classes. The proposed technique works by minimizing a loss function that is divided into two components which are independently weighted according to three parameters α, β, and ω, α being self-adjusting. Results show that this approach is superior to past techniques when detecting the smallest changes in the feature space and may also point out issues in models like over-fitting.

Keywords: explainable AI, EX AI, feature importance, counterfactual explanations

Procedia PDF Downloads 190
229 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 379
228 Misleading Node Detection and Response Mechanism in Mobile Ad-Hoc Network

Authors: Earleen Jane Fuentes, Regeene Melarese Lim, Franklin Benjamin Tapia, Alexis Pantola

Abstract:

Mobile Ad-hoc Network (MANET) is an infrastructure-less network of mobile devices, also known as nodes. These nodes heavily rely on each other’s resources such as memory, computing power, and energy. Thus, some nodes may become selective in forwarding packets so as to conserve their resources. These nodes are called misleading nodes. Several reputation-based techniques (e.g. CORE, CONFIDANT, LARS, SORI, OCEAN) and acknowledgment-based techniques (e.g. TWOACK, S-TWOACK, EAACK) have been proposed to detect such nodes. These techniques do not appropriately punish misleading nodes. Hence, this paper addresses the limitations of these techniques using a system called MINDRA.

Keywords: acknowledgment-based techniques, mobile ad-hoc network, selfish nodes, reputation-based techniques

Procedia PDF Downloads 385
227 Poetry as Valuable Tool for Tackling Climate Change and Environmental Pollution

Authors: Benjamin Anabaraonye

Abstract:

Our environment is our entitlement, and it is our duty to guard it for the safety of our society. It is, therefore, in our best interest to explore the necessary tools required to tackle the issues of environmental pollution which are major causes of climate change. Poetry has been discovered through our study as a valuable tool for tackling climate change and environmental pollution. This study explores the science of poetry and how important it is for scientists and engineers to develop their creativity to obtain relevant skills needed to tackle these global challenges. Poetry has been discovered as a great tool for climate change education which in turn brings about climate change adaptation and mitigation. This paper is, therefore, a clarion and urgent call for us to rise to our responsibility for a sustainable future.

Keywords: climate change, education, environment, poetry

Procedia PDF Downloads 206
226 Evaluating 8D Reports Using Text-Mining

Authors: Benjamin Kuester, Bjoern Eilert, Malte Stonis, Ludger Overmeyer

Abstract:

Increasing quality requirements make reliable and effective quality management indispensable. This includes the complaint handling in which the 8D method is widely used. The 8D report as a written documentation of the 8D method is one of the key quality documents as it internally secures the quality standards and acts as a communication medium to the customer. In practice, however, the 8D report is mostly faulty and of poor quality. There is no quality control of 8D reports today. This paper describes the use of natural language processing for the automated evaluation of 8D reports. Based on semantic analysis and text-mining algorithms the presented system is able to uncover content and formal quality deficiencies and thus increases the quality of the complaint processing in the long term.

Keywords: 8D report, complaint management, evaluation system, text-mining

Procedia PDF Downloads 315
225 Effects of Dimensional Sizes of Mould on the Volumetric Shrinkage Strain of Lateric Soil

Authors: John E. Sani, Moses George

Abstract:

The paper presents the result of a laboratory study carried out on lateritic soil to determine the effects of dimensional size on the volumetric shrinkage strain (VSS) using three mould sizes i.e. split former mould, proctor mould and California bearing ratio (CBR) mould at three energy levels; British standard light (BSL), West African standard (WAS) and British standard heavy (BSH) respectively. Compactions were done at different molding water content of -2 % to +6 % optimum moisture content (OMC). At -2% to +2% molding water content for the split former mould the volumetric shrinkage strain met the requirement of not more than 4% while at +4% and +6% only the WAS and BSH met the requirement. The proctor mould and the CBR mould on the other hand gave a lower value of volumetric shrinkage strain in all compactive effort and the values are lower than the 4% safe VSS value.

Keywords: lateritic soil, volumetric shrinkage strain, molding water content, compactive effort

Procedia PDF Downloads 532
224 Model Estimation and Error Level for Okike’s Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba E. J. D.

Abstract:

The researcher has developed a new encryption technique known as Merged Irregular Transposition Cipher. In this cipher method of encryption, a message to be encrypted is split into parts and each part encrypted separately. Before the encrypted message is transmitted to the recipient(s), the positions of the split in the encrypted messages could be swapped to ensure more security. This work seeks to develop a model by considering the split number, S and the average number of characters per split, L as the message under consideration is split from 2 through 10. Again, after developing the model, the error level in the model would be determined.

Keywords: merged irregular transposition, error level, model estimation, message splitting

Procedia PDF Downloads 314
223 A Quantitative Study of Blackboard Utilisation at a University of Technology in South Africa

Authors: Lawrence Meda, Christopher Dumas, Moses Moyo, Zayd Waghid

Abstract:

As a result of some schools embracing technology to enhance students’ learning experiences in the digital era, the Faculty of Education at a University of Technology in South Africa has mandated lecturers to scale up their utilisation of technology in their teaching. Lecturers have been challenged to utilise the institution’s Learning Management System - Blackboard among other technologies - to adequately prepare trainee teachers to be able to teach competently in schools. The purpose of this study is to investigate the extent to which lecturers are utilising Blackboard to enhance their teaching. The study will be conducted using a quantitative approach, and its paradigmatic position will be positivist. The study will be done as a case study of the university’s Faculty of Education. Data will be extracted from all 100 lecturers’ Blackboard sites according to their respective modules, and it will be analysed using the four pillars of Blackboard as a conceptual framework. It is presumed that there is an imbalance on the lecturers’ utilisation of the four pillars of Blackboard as the majority use it as a content dumping site.

Keywords: blackboard, digital, education, technology

Procedia PDF Downloads 139
222 Development of Enhanced Data Encryption Standard

Authors: Benjamin Okike

Abstract:

There is a need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations, or government agencies is transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological ‘injuries’ to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimum. There is no doubt that so many encryption techniques have been proposed, and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose the enhanced data encryption standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, a new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed method.

Keywords: encryption, enhanced data encryption, encryption techniques, information security

Procedia PDF Downloads 150
221 A Security Study for Smart Metering Systems

Authors: Musaab Hasan, Farkhund Iqbal, Patrick C. K. Hung, Benjamin C. M. Fung, Laura Rafferty

Abstract:

In modern societies, the smart cities concept raised simultaneously with the projection towards adopting smart devices. A smart grid is an essential part of any smart city as both consumers and power utility companies benefit from the features provided by the power grid. In addition to advanced features presented by smart grids, there may also be a risk when the grids are exposed to malicious acts such as security attacks performed by terrorists. Considering advanced security measures in the design of smart meters could reduce these risks. This paper presents a security study for smart metering systems with a prototype implementation of the user interfaces for future works.

Keywords: security design, smart city, smart meter, smart grid, smart metering system

Procedia PDF Downloads 335
220 Reliability of Eyewitness Statements in Fire and Explosion Investigations

Authors: Jeff Colwell, Benjamin Knox

Abstract:

While fire and explosion incidents are often observed by eyewitnesses, the weight that fire investigators should place on those observations in their investigations is a complex issue. There is no doubt that eyewitness statements can be an important component to an investigation, particularly when other evidence is sparse, as is often the case when damage to the scene is severe. However, it is well known that eyewitness statements can be incorrect for a variety of reasons, including deception. In this paper, we reviewed factors that can have an effect on the complex processes associated with the perception, retention, and retrieval of an event. We then review the accuracy of eyewitness statements from unique criminal and civil incidents, including fire and explosion incidents, in which the accuracy of the statements could be independently evaluated. Finally, the motives for deceptive eyewitness statements are described, along with techniques that fire and explosion investigators can employ, to increase the accuracy of the eyewitness statements that they solicit.

Keywords: fire, explosion, eyewitness, reliability

Procedia PDF Downloads 381
219 Community Based Participatory Research in Opioid Use: Design of an Informatics Solution

Authors: Sue S. Feldman, Bradley Tipper, Benjamin Schooley

Abstract:

Nearly every community in the US has been impacted by opioid related addictions/deaths; it is a national problem that is threatening our social and economic welfare. Most believe that tackling this problem from a prevention perspective advances can be made toward breaking the chain of addiction. One mechanism, community based participatory research, involves the community in the prevention approach. This project combines that approach with a design science approach to develop an integrated solution. Findings suggested accountable care communities, transpersonal psychology, and social exchange theory as product kernel theories. Evaluation was conducted on a prototype.

Keywords: substance use and abuse recovery, community resource centers, accountable care communities, community based participatory research

Procedia PDF Downloads 152
218 Pattern in Splitting Sequence in Okike’s Merged Irregular Transposition Cipher for Encrypting Cyberspace Messages

Authors: Okike Benjamin, E. J. D. Garba

Abstract:

The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other position thereby making it very difficult to decrypt by any unauthorized user.

Keywords: information security, message splitting, pattern, sequence

Procedia PDF Downloads 286
217 Development of a Data Security Model Using Steganography

Authors: Terungwa Simon Yange, Agana Moses A.

Abstract:

This paper studied steganography and designed a simplistic approach to a steganographic tool for hiding information in image files with the view of addressing the security challenges with data by hiding data from unauthorized users to improve its security. The Structured Systems Analysis and Design Method (SSADM) was used in this work. The system was developed using Java Development Kit (JDK) 1.7.0_10 and MySQL Server as its backend. The system was tested with some hypothetical health records which proved the possibility of protecting data from unauthorized users by making it secret so that its existence cannot be easily recognized by fraudulent users. It further strengthens the confidentiality of patient records kept by medical practitioners in the health setting. In conclusion, this work was able to produce a user friendly steganography software that is very fast to install and easy to operate to ensure privacy and secrecy of sensitive data. It also produced an exact copy of the original image and the one carrying the secret message when compared with each.

Keywords: steganography, cryptography, encryption, decryption, secrecy

Procedia PDF Downloads 265
216 Predicting the Uniaxial Strength Distribution of Brittle Materials Based on a Uniaxial Test

Authors: Benjamin Sonnenreich

Abstract:

Brittle fracture failure probability is best described using a stochastic approach which is based on the 'weakest link concept' and the connection between a microstructure and macroscopic fracture scale. A general theoretical and experimental framework is presented to predict the uniaxial strength distribution according to independent uniaxial test data. The framework takes as input the applied stresses, the geometry, the materials, the defect distributions and the relevant random variables from uniaxial test results and gives as output an overall failure probability that can be used to improve the reliability of practical designs. Additionally, the method facilitates comparisons of strength data from several sources, uniaxial tests, and sample geometries.

Keywords: brittle fracture, strength distribution, uniaxial, weakest link concept

Procedia PDF Downloads 325
215 Determination of Complexity Level in Merged Irregular Transposition Cipher

Authors: Okike Benjamin, Garba Ejd

Abstract:

Today, it has been observed security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In order to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often easily decrypted by adversaries. The researcher has decided to develop an encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.

Keywords: transposition cipher, merged irregular cipher, encryption, complexity level

Procedia PDF Downloads 344
214 Energy Dynamics of Solar Thermionic Power Conversion with Emitter of Graphene

Authors: Olukunle C. Olawole, Dilip K. De, Moses Emetere, Omoje Maxwell

Abstract:

Graphene can stand very high temperature up to 4500 K in vacuum and has potential for application in thermionic energy converter. In this paper, we discuss the application of energy dynamics principles and the modified Richardson-Dushman Equation, to estimate the efficiency of solar power conversion to electrical power by a solar thermionic energy converter (STEC) containing emitter made of graphene. We present detailed simulation of power output for different solar insolation, diameter of parabolic concentrator, area of the graphene emitter (same as that of the collector), temperature of the collector, physical dimensions of the emitter-collector etc. After discussing possible methods of reduction or elimination of space charge problem using magnetic field and gate, we finally discuss relative advantages of using emitters made of graphene, carbon nanotube and metals respectively in a STEC.

Keywords: graphene, high temperature, modified Richardson-Dushman equation, solar thermionic energy converter

Procedia PDF Downloads 309
213 Enterpreneurial Orientation Dimensions for Sustainable Development in Construction Firms

Authors: Kudirat I. Zakariyyah, Iniobong B. John, Julius O. Faremi, David Adio-Moses

Abstract:

One of the key contributors to firms’ growth, performance, and sustainability is entrepreneurial orientation (EO). Most studies on EO, however, are in other industries than construction and, more often, exploratory. The purpose of this study is thus to create an awareness on entrepreneurial orientation and its dimensions in contracting firms. Considering the need for sustainability, the study thus examined contracting firms’ entrepreneurial orientation dimensions that are required in order to keep pace with the demands for sustainable development. This was done by giving out questionnaires to a sample of 116 respondents from a population of 166 construction firms in Lagos state. Data were collected through a survey and analysed using mean scores and analysis of variance (ANOVA). The result revealed the prevalence of the four dimensions of EO, though in moderate proportion. In addition, the study identified review of organisational structure as the top entrepreneurial orientation dimension needed for sustainable development. The study concludes that the firms should identify the existing orientation dimensions and its relevance with sustainability so as to be able to know the required review that will be appropriate in the industry. It is recommended that the firms need to do more on raising the level of prevalence of the various orientation dimensions in order to achieve the merits of the different constructs of sustainability.

Keywords: construction, culture, entrepreneurial-orientation, dimension, sustainability

Procedia PDF Downloads 154
212 Deployment of Matrix Transpose in Digital Image Encryption

Authors: Okike Benjamin, Garba E J. D.

Abstract:

Encryption is used to conceal information from prying eyes. Presently, information and data encryption are common due to the volume of data and information in transit across the globe on daily basis. Image encryption is yet to receive the attention of the researchers as deserved. In other words, video and multimedia documents are exposed to unauthorized accessors. The authors propose image encryption using matrix transpose. An algorithm that would allow image encryption is developed. In this proposed image encryption technique, the image to be encrypted is split into parts based on the image size. Each part is encrypted separately using matrix transpose. The actual encryption is on the picture elements (pixel) that make up the image. After encrypting each part of the image, the positions of the encrypted images are swapped before transmission of the image can take place. Swapping the positions of the images is carried out to make the encrypted image more robust for any cryptanalyst to decrypt.

Keywords: image encryption, matrices, pixel, matrix transpose

Procedia PDF Downloads 421
211 Assessment of Barriers to the Clinical Adoption of Cell-Based Therapeutics

Authors: David Pettitt, Benjamin Davies, Georg Holländer, David Brindley

Abstract:

Cellular based therapies, whose origins can be traced from the intertwined concepts of tissue engineering and regenerative medicine, have the potential to transform the current medical landscape and offer an approach to managing what were once considered untreatable diseases. However, despite a large increase in basic science activity in the cell therapy arena alongside a growing portfolio of cell therapy trials, the number of industry products available for widespread clinical use correlates poorly with such a magnitude of activity, with the number of cell-based therapeutics in mainstream use remaining comparatively low. This research serves to quantitatively assess the barriers to the clinical adoption of cell-based therapeutics through identification of unique barriers, specific challenges and opportunities facing the development and adoption of such therapies.

Keywords: cell therapy, clinical adoption, commercialization, translation

Procedia PDF Downloads 399
210 The Keys to Innovation: Defining and Evaluating Attributes that Measure Innovation Capabilities

Authors: Mohammad Samarah, Benjamin Stark, Jennifer Kindle, Langley Payton

Abstract:

Innovation is a key driver for companies, society, and economic growth. However, assessing and measuring innovation for individuals as well as organizations remains difficult. Our i5-Score presented in this study will help to overcome this difficulty and facilitate measuring the innovation potential. The score is based on a framework we call the 5Gs of innovation which defines specific innovation attributes. Those are 1) the drive for long-term goals 2) the audacity to generate new ideas, 3) the openness to share ideas with others, 4) the ability to grow, and 5) the ability to maintain high levels of optimism. To validate the i5-Score, we conducted a study at Florida Polytechnic University. The results show that the i5-Score is a good measure reflecting the innovative mindset of an individual or a group. Thus, the score can be utilized for evaluating, refining and enhancing innovation capabilities.

Keywords: Change Management, Innovation Attributes, Organizational Development, STEM and Venture Creation

Procedia PDF Downloads 168
209 Barriers towards Effective Participation in Physically Oriented Leisure Time Activities: A Case Study of Federal College of Education, Pankshin Plateau State, Nigeria

Authors: Mulak Moses Yokdi

Abstract:

Correct use of leisure time has suffered neglect in our society and the people ignorantly think that the trend does not matter. The researcher felt concerned about the issue and went on to find out why using FCE, Pankshin workers as a case study. Four hypotheses were used, considering such variables as leadership, traditional activities, stress due to work pressure and time constraint. The participants selected for the study were one hundred and ten members of FCE, Pankshin staff. A self-developed questionnaire was the instrument used. Chi-square (x2) was employed to test the hypotheses at P = 0.005; df = 3. The statistics of percentages was also used to describe the situation as implicated by the data. The results showed that all hypotheses were significant (P = 0.05). It was concluded that the four variables were impediments to effective participation in physically oriented leisure time activities among the FCE, Staff. Based on the findings, it was recommended that the FCE should get good leadership, create good awareness for people to understand why they should be effectively involved in physically oriented leisure time activities.

Keywords: barriers, effective participation, leisure time, physically oriented, work pressure, time constraint

Procedia PDF Downloads 367
208 Neural Network Approach to Classifying Truck Traffic

Authors: Ren Moses

Abstract:

The process of classifying vehicles on a highway is hereby viewed as a pattern recognition problem in which connectionist techniques such as artificial neural networks (ANN) can be used to assign vehicles to their correct classes and hence to establish optimum axle spacing thresholds. In the United States, vehicles are typically classified into 13 classes using a methodology commonly referred to as “Scheme F”. In this research, the ANN model was developed, trained, and applied to field data of vehicles. The data comprised of three vehicular features—axle spacing, number of axles per vehicle, and overall vehicle weight. The ANN reduced the classification error rate from 9.5 percent to 6.2 percent when compared to an existing classification algorithm that is not ANN-based and which uses two vehicular features for classification, that is, axle spacing and number of axles. The inclusion of overall vehicle weight as a third classification variable further reduced the error rate from 6.2 percent to only 3.0 percent. The promising results from the neural networks were used to set up new thresholds that reduce classification error rate.

Keywords: artificial neural networks, vehicle classification, traffic flow, traffic analysis, and highway opera-tions

Procedia PDF Downloads 309
207 Psychological Factors as Predictor of Sports Violence among Tertiary Institutions

Authors: Oluwasgun Moses Jolayemi

Abstract:

Violence has become a fairly often occurrence in sports (within our tertiary institutions), a development that is giving every society in the world sleepless night. School violence is part of youth violence, a broader salient public health problem. This study employing a questionnaire-based survey strategy aimed at investigates psychological factors as predictors of sports violence among Oyo state tertiary institution. A sample of Two hundred athletes and three tertiary institutions were selected through purposive sampling from the Oyo State tertiary institution. The estimated reliability co-efficient of the instrument was found to be 0.89 using cronbach Alpha technique. Data were analyzed at 0.05 level of significance using Statistical Package for the Social Sciences (SPSS) software, version 20.0. Five hypotheses were tested using Pearson Correlation. Result revealed that personality, anxiety, mental health has no significant influence on sports violence; mental stress has a significant influence on sports violence. Based on the findings, it was recommended that sport management should reduce work overload and that they should organized seminars and social activities to help athletes lose up.

Keywords: Ibadan, mental health, personality, psychology, violence

Procedia PDF Downloads 303
206 Evaluation of Sensor Pattern Noise Estimators for Source Camera Identification

Authors: Benjamin Anderson-Sackaney, Amr Abdel-Dayem

Abstract:

This paper presents a comprehensive survey of recent source camera identification (SCI) systems. Then, the performance of various sensor pattern noise (SPN) estimators was experimentally assessed, under common photo response non-uniformity (PRNU) frameworks. The experiments used 1350 natural and 900 flat-field images, captured by 18 individual cameras. 12 different experiments, grouped into three sets, were conducted. The results were analyzed using the receiver operator characteristic (ROC) curves. The experimental results demonstrated that combining the basic SPN estimator with a wavelet-based filtering scheme provides promising results. However, the phase SPN estimator fits better with both patch-based (BM3D) and anisotropic diffusion (AD) filtering schemes.

Keywords: sensor pattern noise, source camera identification, photo response non-uniformity, anisotropic diffusion, peak to correlation energy ratio

Procedia PDF Downloads 441
205 Proximate, Functional and Sensory Evaluation of Some Brands of Instant Noodles in Nigeria

Authors: Olakunle Moses Makanjuola, Adebola Ajayi

Abstract:

Noodles are made from unleavened dough, rolled flat and cut into shapes. The instant noodle market is growing fast in Asian countries and is gaining popularity in the western market. This project reports on the proximate functional and sensory evaluation of different brands of instant noodles in Nigeria. The comparisons were based on proximate functional and sensory evaluation of the product. The result obtained from the proximate analysis showed that sample QHR has the highest moisture content, sample BMG has the highest protein content, sample CPO has the highest fat content, sample. The obtained result from the functional properties showed that sample BMG (Dangote noodles) had the highest volume increase after cooking due to its high swelling capacity, high water absorption capacity and high hydration capacity. Sample sensory analysis of the noodles showed that all the samples are of significant difference (at P < 0.05) in terms of colour, texture, and aroma but there is no significant difference in terms of taste and overall acceptability. Sample QHR (Indomie noodles) is the most preferred by the panelists.

Keywords: proximate, functional, sensory evaluation, noodles

Procedia PDF Downloads 253
204 Management of Empty Containers by Consignees in the Hinterland

Authors: Benjamin Legros, Jan Fransoo, Oualid Jouini

Abstract:

This study aims to evaluate street-turn strategies for empty container repositioning in the hinterland. Containers arrive over time at the (importer) consignee, while the demand for containers arises from the (exporter) shipper. A match can be operated between an empty container from the consignee and the load from the shipper. Therefore, we model the system as a double-ended queue with non-zero matching time and a limited number of resources in order to optimize the reposition- ing decisions. We determine the performance measures when the consignee operates using a fixed withholding threshold policy. We show that the matching time mainly plays a role in the matching proportion, while under a certain duration, it only marginally impacts the consignee’s inventory policy and cost per container. Also, the withholding level is mainly determined by the shipper’s production rate.

Keywords: container, double-ended queue, inventory, Markov decision process, non-zero matching time, street-turn

Procedia PDF Downloads 141
203 Optimizing University Administration in a Globalized World: Leveraging AI and ICT for Enhanced Governance and Sustainability in Higher Education

Authors: Ikechukwu Ogeze Ukeje, Chinyere Ori Elom, Chukwudum Collins Umoke

Abstract:

This study explores the challenges in the integration of Artificial Intelligence (AI) and Information and Communication Technology (ICT) practices in enhancing governance and sustainable solution modeling in higher education, focusing on Alex Ekwueme Federal University Ndufu-Alike (AE-FUNAI), Nigeria. In the context of a developing country like Nigeria, leveraging AI and ICT tools presents a unique opportunity to improve teaching, learning, administrative processes, and governance. The research aims to evaluate how AI and ICT technologies can contribute to sustainable educational practices, enhance decision-making processes, and improve engagement among key stakeholders: students, lecturers, and administrative staff. Students are involved to provide insights into their interactions with AI and ICT tools, particularly in learning and participation in governance. Lecturers’ perspectives will offer a view into how these technologies influence teaching, research, and curriculum development. Administrative staff will provide a crucial understanding of how AI and ICT tools can streamline operations, support data-driven governance, and enhance institutional efficiency. This study will use a mixed-method approach to collect both qualitative and quantitative data. The finding of this study is geared towards shaping the future of education in Nigeria and beyond by developing an Inclusive AI-governance Integration Framework (I-AIGiF) for enhanced performance in the system. Examining the roles of these stakeholder groups, this research could guide the development of policies for more effective AI and ICT integration, leading to sustainable educational innovation and governance.

Keywords: university administration, AI, higher education governance, education sustainability, ICT challenges

Procedia PDF Downloads 18