Search results for: Arabic Fodio Nigeria security
4709 Corpus-Based Neural Machine Translation: Empirical Study Multilingual Corpus for Machine Translation of Opaque Idioms - Cloud AutoML Platform
Authors: Khadija Refouh
Abstract:
Culture bound-expressions have been a bottleneck for Natural Language Processing (NLP) and comprehension, especially in the case of machine translation (MT). In the last decade, the field of machine translation has greatly advanced. Neural machine translation NMT has recently achieved considerable development in the quality of translation that outperformed previous traditional translation systems in many language pairs. Neural machine translation NMT is an Artificial Intelligence AI and deep neural networks applied to language processing. Despite this development, there remain some serious challenges that face neural machine translation NMT when translating culture bounded-expressions, especially for low resources language pairs such as Arabic-English and Arabic-French, which is not the case with well-established language pairs such as English-French. Machine translation of opaque idioms from English into French are likely to be more accurate than translating them from English into Arabic. For example, Google Translate Application translated the sentence “What a bad weather! It runs cats and dogs.” to “يا له من طقس سيء! تمطر القطط والكلاب” into the target language Arabic which is an inaccurate literal translation. The translation of the same sentence into the target language French was “Quel mauvais temps! Il pleut des cordes.” where Google Translate Application used the accurate French corresponding idioms. This paper aims to perform NMT experiments towards better translation of opaque idioms using high quality clean multilingual corpus. This Corpus will be collected analytically from human generated idiom translation. AutoML translation, a Google Neural Machine Translation Platform, is used as a custom translation model to improve the translation of opaque idioms. The automatic evaluation of the custom model will be compared to the Google NMT using Bilingual Evaluation Understudy Score BLEU. BLEU is an algorithm for evaluating the quality of text which has been machine-translated from one natural language to another. Human evaluation is integrated to test the reliability of the Blue Score. The researcher will examine syntactical, lexical, and semantic features using Halliday's functional theory.Keywords: multilingual corpora, natural language processing (NLP), neural machine translation (NMT), opaque idioms
Procedia PDF Downloads 1494708 E-Service and the Nigerian Banking Sector: A Review of ATM Architecture and Operations
Authors: Bashir Aliyu Yauri, Rufai Aliyu Yauri
Abstract:
With the introduction of cash-less society policy by the Central Bank of Nigeria, the concept of e-banking services has experienced a significant improvement over the years. Today quite a number of people are embracing e-banking activities especially ATM, thereby moving away from the conventional banking system. This paper presents a review of the underlying Architectural Layout of Intra-Bank and Inter-Bank ATM connectivity in Nigeria. The paper further investigates and discusses factors affecting the Intra-Bank and Inter-Bank ATM connectivity in Nigeria. And as well possible solutions to these factors affecting ATM Connectivity and Operations are proposed.Keywords: architectural layout, automated teller machine, e-services, postilion
Procedia PDF Downloads 6334707 Analysis of Practical Guidelines for Mobile Device Security in Indonesia Based on NIST SP 1800-4
Authors: Mardiyansyah Mardiyansyah, Hendrik Maulana, Eka Kurnia Sari, Imam Baehaki, Mohammad Agus Prihandono
Abstract:
Mobile device has become a key feature in Indonesian society and the economy, including government and private sector. Enterprises and government agencies already have a concern about mobile device security. However, small and medium enterprises (SME) do not have that sense yet, especially the new startups company. Indonesia has several laws, regulations, and standards for managing security in mobile devices. Currently, Indonesian information security policies have not been harmonized, each government organization and large enterprise has its own rules and policies. It leads to a conflict of interest among government agencies. This will certainly cause ineffectiveness in the implementation of policies. Therefore, an analysis of various government policies, regulations, and standards related to information security, especially on mobile devices, is carried out. This analysis is conducted to map the existing regulatory policies and standards into practical guidelines regarding NIST's information security to show the effectiveness of NIST SP 1800-4 towards existing policies. This work focused on the mapping of the NIST SP 1800-4 framework towards existing regulations, standards, and guidelines in Indonesia. The research approach is literature study to identify existing regulations, standards, and guidelines then the regulation mapped into the NIST SP 1800-4 framework and analyzed whether the framework could be applied to the organization in Indonesia. Finally, the finding and recommendations by documenting the security characteristics can be concluded. Based on the research finding, some of the regulations, standards, and guidelines in Indonesia are relevant to the elements in the NIST SP 1800-4 framework. From mapping analysis, the strength and weakness of mobile device security in Indonesia can be reported. It also can be concluded that the application of NIST SP 1800-4 can improve the effectiveness of mobile device security policies in Indonesia.Keywords: mobile security, mobile security framework, NIST SP 1800-4, regulations
Procedia PDF Downloads 1524706 Impact of Interest and Foreign Exchange Rates Liberalization on Investment Decision in Nigeria
Authors: Kemi Olalekan Oduntan
Abstract:
This paper was carried out in order to empirical, and descriptively analysis how interest rate and foreign exchange rate liberalization influence investment decision in Nigeria. The study spanned through the period of 1985 – 2014, secondary data were restricted to relevant variables such as investment (Proxy by Gross Fixed Capital Formation) saving rate, interest rate and foreign exchange rate. Theories and empirical literature from various scholars were reviews in the paper. Ordinary Least Square regression method was used for the analysis of data collection. The result of the regression was critically interpreted and discussed. It was discovered for empirical finding that tax investment decision in Nigeria is highly at sensitive rate. Hence, all the alternative hypotheses were accepted while the respective null hypotheses were rejected as a result of interest rate and foreign exchange has significant effect on investment in Nigeria. Therefore, impact of interest rate and foreign exchange rate on the state of investment in the economy cannot be over emphasized.Keywords: interest rate, foreign exchange liberalization, investment decision, economic growth
Procedia PDF Downloads 3644705 Efficient and Timely Mutual Authentication Scheme for RFID Systems
Authors: Hesham A. El Zouka, Mustafa M. Hosni ka
Abstract:
The Radio Frequency Identification (RFID) technology has a diverse base of applications, but it is also prone to security threats. There are different types of security attacks that limit the range of the RFID applications. For example, deploying the RFID networks in insecure environments could make the RFID system vulnerable to many types of attacks such as spoofing attack, location traceability attack, physical attack and many more. Therefore, security is often an important requirement for RFID systems. In this paper, RFID mutual authentication protocol is implemented based on mobile agent technology and timestamp, which are used to provide strong authentication and integrity assurances to both the RFID readers and their corresponding RFID tags. The integration of mobile agent technology and timestamp provides promising results towards achieving this goal and towards reducing the security threats in RFID systems.Keywords: RFID, security, authentication protocols, privacy, agent-based architecture, time-stamp, digital signature
Procedia PDF Downloads 2694704 Beyond the Jingoism of “Infodemic” in the Use of Language: Prospects for a Better Nigeria
Authors: Anacletus Ogbunkwu
Abstract:
It is very disheartening that fake news or inaccurate information spread like wide fire and even with greater speed than fact based news/information. The peak of this anomaly is manifest in information management on the Corona virus pandemic, political/leadership based information, ethnic bigotry, unwarranted panics, false alarms, religious fanaticism, and business moguls in their advertorials, comedies, etc. This ugly situation has left Nigeria and her citizens with emotional trauma, unguided agitations, incessant tribal wars, lost of life and property, widened disunity among Nigerian ethnic and religious groups, amplified insecurity, aided election violence, etc. Unfortunately, among the major driving factors to this misinformation and conspiracy are the official/government and private news agencies, gossip, comedians, and social media handles such as; facebook, twitter, whatsapp, instagram, and online news agencies, etc. Thus this paper examines the impact of misinformation here referred to as infodemic. Also, it studies the epistemic effect of misinformation on the citizens of Nigeria in order to find ways of abating this anomaly for a better society. The methods of exposition and hermeneutics will be used in order to gain in-depth study of the details of infodemic in Nigeria and to offer philosophical analysis/interpretation of data as gathered, respectively. This paper concludes that misinformation or fake news has a perilous effect of epistemic mistrust to Nigeria and her citizens; hence infodemic is a cog in the wheel of National progress.Keywords: nigeria, infodemic, language, media, news, progress
Procedia PDF Downloads 1184703 Security as the Key Factor in Contemporary Tourism: Specificities Identified from the Analysis of Responders' Attitudes
Authors: Petar Kurecic, Josipa Penic
Abstract:
The paper represents a product of mentor-graduate student cooperation, developed at the graduate study of Business Economics, major Tourism. The analysis was made through the anonymous questionnaire filled by the respondents from Croatia. Following the latest threatening events and having in mind those yet to come, it can be concluded that no country can benefit from the tourism industry if at the same time does not develop its security system as an integral part of the standard tourist offer. Analyzing the trends in contemporary tourism, the safety and security issues became the decisive factors for the choice of a certain destination. Consequently, countries must not perceive security systems and measures as an unnecessary expense but as an essential element in organizing their tourist services. All hotels and respectable tourist agencies should have a crisis management, with detailed, thoroughly elaborated procedures for emergency situations. Tourists should be timely informed about the potential dangers and risks and the measures taken to prevent them, as well as on procedures for emergency situations. Additionally, it would be good to have mobile applications that would enable tourists to make direct emergency calls with instructions on behavior in crisis situations. It is also essential to implement and put into effect sophisticated security measures such as using surveillance cameras, controlling access to buildings, information exchange with colleagues and neighbors, reporting the suspicious occurrences to the security services, and training staff for crisis management. The security issue is definitely one of the crucial factors in the development of tourism in a certain country.Keywords: security, security measures in tourism, tourism, tourist destinations
Procedia PDF Downloads 2814702 Cloud Data Security Using Map/Reduce Implementation of Secret Sharing Schemes
Authors: Sara Ibn El Ahrache, Tajje-eddine Rachidi, Hassan Badir, Abderrahmane Sbihi
Abstract:
Recently, there has been increasing confidence for a favorable usage of big data drawn out from the huge amount of information deposited in a cloud computing system. Data kept on such systems can be retrieved through the network at the user’s convenience. However, the data that users send include private information, and therefore, information leakage from these data is now a major social problem. The usage of secret sharing schemes for cloud computing have lately been approved to be relevant in which users deal out their data to several servers. Notably, in a (k,n) threshold scheme, data security is assured if and only if all through the whole life of the secret the opponent cannot compromise more than k of the n servers. In fact, a number of secret sharing algorithms have been suggested to deal with these security issues. In this paper, we present a Mapreduce implementation of Shamir’s secret sharing scheme to increase its performance and to achieve optimal security for cloud data. Different tests were run and through it has been demonstrated the contributions of the proposed approach. These contributions are quite considerable in terms of both security and performance.Keywords: cloud computing, data security, Mapreduce, Shamir's secret sharing
Procedia PDF Downloads 3064701 Language Education Policy in Arab Schools in Israel
Authors: Fatin Mansour Daas
Abstract:
Language education responds to and is reflective of emerging social and political trends. Language policies and practices are shaped by political, economic, social and cultural considerations. Following this, Israeli language education policy as implemented in Arab schools in Israel is influenced by the particular political and social situation of Arab-Palestinian citizens of Israel. This national group remained in their homeland following the war in 1948 between Israel and its Arab neighbors and became Israeli citizens following the establishment of the State of Israel. This study examines language policy in Arab schools in Israel from 1948 until the present time in light of the unique experience of the Palestinian Arab homeland minority in Israel with a particular focus on questions of politics and identity. The establishment of the State of Israel triggered far-reaching political, social and educational transformations within Arab Palestinian society in Israel, including in the area of language and language studies. Since 1948, the linguistic repertoire of Palestinian Arabs in Israel has become more complex and diverse, while the place and status of different languages have changed. Following the establishment of the State of Israel, only Hebrew and Arabic were retained as the official languages, and Israeli policy reflected this in schools as well: with the advent of the Jewish state, Hebrew language education among Palestinians in Israel has increased. Similarly, in Arab Palestinian schools in Israel, English is taught as a third language, Hebrew as a second language, and Arabic as a first language – even though it has become less important to native Arabic speakers. This research focuses on language studies and language policy in the Arab school system in Israel from 1948 onwards. It will analyze the relative focus of language education between the different languages, the rationale of various language education policies, and the pedagogic approach used to teach each language and student achievements vis-à-vis language skills. This study seeks to understand the extent to which Arab schools in Israel are multi-lingual by examining successes, challenges and difficulties in acquiring the respective languages. This qualitative study will analyze five different components of language education policy: (1) curriculum, (2) learning materials; (3) assessment; (4) interviews and (5) archives. Firstly, it consists of an analysis examining language education curricula, learning materials and assessments used in Arab schools in Israel from 1948-2018 including a selection of language textbooks for the compulsory years of study and the final matriculation (Bagrut) examinations. The findings will also be based on archival material which traces the evolution of language education policy in Arabic schools in Israel from the years 1948-2018. This archival research, furthermore, will reveal power relations and general decision-making in the field of the Arabic education system in Israel. The research will also include interviews with Ministry of Education staff who provide instructional oversight in the instruction of the three languages in the Arabic education system in Israel. These interviews will shed light on the goals of language education as understood by those who are in charge of implementing policy.Keywords: language education policy, languages, multilingualism, language education, educational policy, identity, Palestinian-Arabs, Arabs in Israel, educational school system
Procedia PDF Downloads 914700 The Representation of Women in Iraq: Gender Wage Gap and the Position of Women within Iraqi Society
Authors: Hanaa Sameen Ameen Bajilan
Abstract:
Human rights should be protected and promoted without regard to race, ethnicity, religion, political philosophy, or sexual orientation, following our firm convictions. Thus, any infringement of these rights or disdain for; any use of violence against women undermines the principles and human values of equality and endangers the entire society, including its potential to live in peace and to make growth and development. This paper represents the condition of the new Iraqi women regarding issues such as the gender wage gap, education, health, and violence against women. The study aims to determine the impact of traditions and customs on the legal position of Iraqi women. First, it seeks to assess the effects of culture as a historical agency on the legal status of Iraqi women. Second, the influence of cultural developments in the later part of the twentieth century on Iraqi women's legal standing, and third, the importance of cultural variety as a progressive cultural component in women's legal position. Finally, the study highlights the representation of women in Iraq: Gender wage Gap, Women's liberation between culture and law, and the role of women within Iraqi society based on an Iraqi novel named (Orange Light) in Arabic: برتقالو ضو. in her book, the Iraqi writer Nadia Al-Abru succeeds in portraying the post-war society's devotion to the sexual, emotional and mental marginalization of women in terms of the value of attendance. Since the study of Iraqi women's literature in Arabic-English translation is a new avenue of research that contributes to all three areas, this investigation aims to establish critical lines of engagement between contemporary Iraqi women's literature in English translation and feminist translation conceptual frameworks, and this is accomplished by first focusing on why analyzing Iraqi women writers' novels in Arabic-English translation is a timeline of inquiry that contributes to existing and emerging knowledge fields concerning Iraqi women writers' contemporary critical contexts and scholarship on Arab women's literature in Arabic-English translation.Keywords: women in İraq, equality, violence, gender wage gap, Nadia Al-Abru, (orange light), women's liberation, İraqi women's literature,
Procedia PDF Downloads 914699 Theology of Science and Technology as a Tool for Peace Education
Authors: Jonas Chikelue Ogbuefi
Abstract:
Science and Technology have a major impact on societal peace, it offers support to teaching and learning, cuts costs, and offers solutions to the current agitations and militancy in Nigeria today. Christianity, for instance, did not only change and form the western world in the past 2022 but still has a substantial role to play in society through liquid ecclesiology. This paper interrogated the impact of the theology of Science and Technology as a tool for peace sustainability through peace education in Nigeria. The method adopted is a historical and descriptive method of analysis. It was discovered that a larger number of Nigerian citizens lack almost all the basic things needed for the standard of living, such as Shelter, meaningful employment, and clothing, which is the root course of all agitations in Nigeria. Based on the above findings, the paper contends that the government alone cannot restore Peace in Nigeria. Hence the inability of the government to restore peace calls for all religious actors to be involved. The main thrust and recommendation of this paper are to challenge the religious actors to implement the Theology of Science and Technology as a tool for peace restoration and should network with both the government and the private sectors to make funds available to budding and existing entrepreneurs using Science and Technology as a tool for Peace and economic sustainability. This paper viewed the theology of Science and Technology as a tool for Peace and economic sustainability in Nigeria.Keywords: theology, science, technology, peace education
Procedia PDF Downloads 844698 Trends in Arabic Drama Series (Musalsalat) Production
Authors: Paradigm Shift
Abstract:
In an overwhelmingly import oriented content bazaar of Arabian TV industry, Musalsalat stand unique in their indigenousness and mass popularity, being rivalled only by movies and football. The Arabic term ‘Musalsalat’ stands for drama series with episodes of 30-45 minutes duration; the format being close to Latin American Telenovela concept-clear cut stories with definitive endings that permit narrative closures. Traditionally Musalsalat were either situational comedies or religiously inspired. Present-day productions have started addressing historical, creative and socially progressive issues targeting the young and well-travelled audiences. Though these soaps get prime ratings throughout the year, it is during Ramadan, that they become a raving success in securing viewership. That Musalsalat have become paramount Ramadan programming is evident by their dominance on the grid and attracting heavy ad-spend. The number of Musalsalats produced specifically for Ramadan reached over 100 last year with Ramadan TV advertising amounting to USD1, 947bn constituting 21% of the total regional TV Adspend of USD 9,189bn.Keywords: Musalsalat, drama, pan Arab, television
Procedia PDF Downloads 2824697 A Practice of Zero Trust Architecture in Financial Transactions
Authors: Liwen Wang, Yuting Chen, Tong Wu, Shaolei Hu
Abstract:
In order to enhance the security of critical financial infrastructure, this study carries out a transformation of the architecture of a financial trading terminal to a zero trust architecture (ZTA), constructs an active defense system for cybersecurity, improves the security level of trading services in the Internet environment, enhances the ability to prevent network attacks and unknown risks, and reduces the industry and security risks brought about by cybersecurity risks. This study introduces the SDP technology of ZTA, adapts and applies it to a financial trading terminal to achieve security optimization and fine-grained business grading control. The upgraded architecture of the trading terminal moves security protection forward to the user access layer, replaces VPN to optimize remote access, and significantly improves the security protection capability of Internet transactions. The study achieves 1. deep integration with the access control architecture of the transaction system; 2. no impact on the performance of terminals and gateways, and no perception of application system upgrades; 3. customized checklist and policy configuration; 4. introduction of industry-leading security technology such as single-packet authorization (SPA) and secondary authentication. This study carries out a successful application of ZTA in the field of financial trading and provides transformation ideas for other similar systems while improving the security level of financial transaction services in the Internet environment.Keywords: zero trust, trading terminal, architecture, network security, cybersecurity
Procedia PDF Downloads 1664696 Challenges of Effective Management in Tetiary Institutions in Nigeria
Authors: Simon Oga Egboja, Agi Sunday
Abstract:
The government of Nigeria have invested so much in our tertiary education but the desire qualitative goals and objectives are yet to be achieved because management at all level are not efficient and effective in implementing the desired educational policies and programmes due to some management challenges. This paper investigates some of the major challenges to effective management of tertiary institution in Nigeria some variable that are important to effective management includes political stability, adequate funding, establishment of information system, recruitment and appointment of qualified teachers and condition of service.Keywords: effective management includes political stability, adequate funding, establishment of information system, recruitment and appointment of qualified teachers
Procedia PDF Downloads 3054695 Neo-liberalism and Theoretical Explanation of Poverty in Africa: The Nigerian Perspective
Authors: Omotoyosi Bilikies Ilori, Adekunle Saheed Ajisebiyawo
Abstract:
After the Second World War, there was an emergence of a new stage of capitalist globalization with its Neo-liberal ideology. There were global economic and political restructurings that affected third-world countries like Nigeria. Neo-liberalism is the driving force of globalization, which is the latest manifestation of imperialism that engenders endemic poverty in Nigeria. Poverty is severe and widespread in Nigeria. Poverty entails a situation where a person lives on less than one dollar per day and has no access to basic necessities of life. Poverty is inhuman and a breach of human rights. The Nigerian government initiated some strategies in the past to help in poverty reduction. Neo-liberalism manifested in the Third World, such as Nigeria, through the privatization of public enterprises, trade liberalization, and the rollback of the state investments in providing important social services. These main ideas of Neo-liberalism produced poverty in Nigeria and also encouraged the abandonment of the social contract between the government and the people. There is thus a gap in the provision of social services and subsidies for the masses, all of which Neo-liberal ideological positions contradict. This paper is a qualitative study which draws data from secondary sources. The theoretical framework is anchored on the market theory of capitalist globalization and public choice theory. The objectives of this study are to (i) examine the impacts of Neo-liberalism on poverty in Nigeria as a typical example of a Third World country and (ii) find out the effects of Neo-liberalism on the provision of social services and subsidies and employment. The findings from this study revealed that (i) the adoption of the Neo-liberal ideology by the Nigerian government has led to increased poverty and poor provision of social services and employment in Nigeria; and (ii) there is an increase in foreign debts which compounds poverty situation in Nigeria. This study makes the following recommendations: (i) Government should adopt strategies that are pro-poor to eradicate poverty; (ii) The Trade Unions and the masses should develop strategies to challenge Neo-liberalism and reject Neo-liberal ideology.Keywords: neo-liberalism, poverty, employment, poverty reduction, structural adjustment programme
Procedia PDF Downloads 864694 Science Education in Nigeria: Issues and Challenges
Authors: Ogbeta I. Joseph, Habiba B. A. Awwalu, Otokiti Jimoh
Abstract:
This paper entitled science education in Nigeria issues and challenges highlighted the role of science education to the development of science and technology in Nigeria. Science embraces every attempt of human to explore and manage the natural world, the contribution of science education to the technological development of the nation, the role of science education in ICT development, the importance of mathematics in the development of science education, the paper also analyzed the challenges facing the development of science education to include corruption, insecurity, and political instability, the paper concluded by encouraging the government and other stakeholders in educational sector to pay more attention to the teaching and learning of science in our schools. Therefore recommended the development that emphasizes should be on the teaching and learning of science base subjects in the school.Keywords: education, science, technology and national development, challenges
Procedia PDF Downloads 5874693 Effects of Irregular Migration from Different Aspects of Security
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
In case of explaining the migration concept, although it is not a new phenomenon, it is easy to understand that communities have migrated for variety of reasons such as natural disasters, famine, wars, economic problems, and several theories have been put forth to define and find solution for migration within its changing nature. Examining of migration theories denotes that the circumstances under which they appear reflect political, social, and economic conditions of the age they appear. In this day and time, security is considered not only from military perspective but also from economic, political, sociological dimensions. Based on the changing security environment new impacts of migration has occurred; the migration is proceed to be conferred as a type of war, qualified as a transnational crime because of its outcomes and interpreted in a different dimension owing to its effects on the health and education areas. Social security dimension in the context of expanding concept of security; when dealing with the safety of people and social groups with the assumption that national unity and identity are threatened, it sees immigrants as a source of threat. The human security assesses the safety of individuals in terms of survival and quality of life. Changes in the standard of living under the influence of immigrants and possible terrorist acts can be seen as a threat source in this type of security. Economic security of the individuals and the regional changes at the micro level created by the immigrants are covered issues of economic security. Due to the factors such as terrorism and civil war, the increasing numbers of displaced people who have taken refugee status affect the countries, whether it is near or far to the crisis areas, in the new and different dimensions of security day by day. In this study, the term of immigration through the eyes of national and international law will be evaluated, the place of the irregular and illegal immigration in the changing security sphere will be revealed and the effects of the irregular migration to short-term, mid-term and long-term security issues will be assessed through human and social security aspects. In order to analyze the threats for the human security; the parameters such as living conditions of the immigrants, the ratio of the genders, birth rate occasions, the education circumstances of the immigrant children and the effects of the illegal passing on the public order will be evaluated. The outcomes of the problem areas for the human security and the demographic alteration resulting from the human flow of displaced people will be discussed thorough social security extent. The fizzling economic diversity, which has shown up by irregular migration, will be presented within the scope of economic dimension of security.Keywords: irregular migration, the changing dimensions of security, human security, social security
Procedia PDF Downloads 3354692 Security Analysis and Implementation of Achterbahn-128 for Images Encryption
Authors: Aissa Belmeguenai, Oulaya Berrak, Khaled Mansouri
Abstract:
In this work, efficiency implementation and security evaluation of the keystream generator of Achterbahn-128 for images encryption and decryption was introduced. The implementation for this simulated project is written with MATLAB.7.5. First of all, two different original images are used to validate the proposed design. The developed program is used to transform the original images data into digital image file. Finally, the proposed program is implemented to encrypt and decrypt images data. Several tests are done to prove the design performance, including visual tests and security evaluation.Keywords: Achterbahn-128, keystream generator, stream cipher, image encryption, security analysis
Procedia PDF Downloads 3144691 Eco-Friendly Polymeric Corrosion Inhibitor for Sour Oilfield Environment
Authors: Alireza Rahimi, Abdolreza Farhadian, Arash Tajik, Elaheh Sadeh, Avni Berisha, Esmaeil Akbari Nezhad
Abstract:
Although natural polymers have been shown to have some inhibitory properties on sour corrosion, they are not considered very effective green corrosion inhibitors. Accordingly, effective corrosion inhibitors should be developed based on natural resources to mitigate sour corrosion in the oil and gas industry. Here, Arabic gum was employed as an eco-friendly precursor for the synthesis of innovative polyurethanes designed as highly efficient corrosion inhibitors for sour oilfield solutions. A comprehensive assessment, combining experimental and computational analyses, was conducted to evaluate the inhibitory performance of the inhibitor. Electrochemical measurements demonstrated that a concentration of 200 mM of the inhibitor offered substantial protection to mild steel against sour corrosion, yielding inhibition efficiencies of 98% and 95% at 25 ºC and 60 ºC, respectively. Additionally, the presence of the inhibitor led to a smoother steel surface, indicating the adsorption of polyurethane molecules onto the metal surface. X-ray photoelectron spectroscopy results further validated the chemical adsorption of the inhibitor on mild steel surfaces. Scanning Kelvin probe microscopy revealed a shift in the potential distribution of the steel surface towards negative values, indicating inhibitor adsorption and corrosion process inhibition. Molecular dynamic simulation indicated high adsorption energy values for the inhibitor, suggesting its spontaneous adsorption onto the Fe (110) surface. These findings underscore the potential of Arabic gum as a viable resource for the development of polyurethanes under mild conditions, serving as effective corrosion inhibitors for sour solutions.Keywords: environmental effect, Arabic gum, corrosion inhibitor, sour corrosion, molecular dynamics simulation
Procedia PDF Downloads 624690 Investigating the Performance of Power Industry in a Developing Nation for Industrialization and Environmental Security
Authors: Abel Edeowede Abhulimen
Abstract:
Due to supply irregularity and frequent outages, the need for reliability in power supply has grown unsatisfactorily over time in developing nations, impeding industrialization and fueling insecurity. This article attempts to break down the Nigerian power issue into its numerous sub-sectors in order to pinpoint the industry's ailment and suggest a viable fix. Monthly average performance data were obtained for the various sub-sectors across the industry for eight consecutive quarters. Whereas the amount of energy generated was found to be insufficient to engender industrialization in a nation like Nigeria, the transmission infrastructure was inadequate for the amount of power needed to be wheeled. Additionally, the distribution sub-sector was plagued with problems such as revenue collection inefficiency, severe enough to impede the growth of the entire industry. The country's goal of attaining energy sufficiency and industrialization would significantly be closer to reality with a conscious effort to increase the base of power generation through aggressive investment in Combined Cycle Gas Turbines (CCGT), decentralization of the transmission infrastructure, and strict monitoring of the distribution sub-sector for improved accountability and system reliability.Keywords: performance, power industry, industrialization, security, energy
Procedia PDF Downloads 724689 A Balance Sheet on the Value of Aid Funding and Delivery: Ingo to NGO Pathways in Nigeria
Authors: Glory Okereke
Abstract:
Several research on the value of aid funding and delivery have emphasized the importance of partnership and accountability in implementing development projects between INGOs and NGOs. Despite challenges in accessing detailed information on their impact due to the extension of information they are willing to provide, this pathway has been seen as an alternative approach and more beneficial than aid funding and delivery through the state. This paper tends to analyze this relationship using liberal and international relations theories to understand the positive and negative aspects of INGO to NGO pathway as a better alternative to economic development. Looking through a broad spectrum of economic development, the paper focuses on Nigeria and analyzes existing empirical literature of INGOs with local NGOs with a comparative analysis of bilateral aid relations with the Nigerian government.Keywords: NGOS, development, Nigeria, liberal theories, aid
Procedia PDF Downloads 364688 Anti Corruption Conventions in Nigeria: Legal and Administrative Challenges
Authors: Mohammed Albakariyu Kabir
Abstract:
There is a trend in development discourse to understand and explain the level of corruption in Nigeria, its anti-corruption crusade and why it is failing, as well as its level of compliance with International standards of United Nations Convention against Corruption (UNCAC) & African Union Convention on Converting and Preventing Corruption) to which Nigeria is a signatory. This paper discusses the legal and Constitutional provisions relating to corrupt practices and safeguards in Nigeria, as well as the obstacles to the implementation of these Conventions.The paper highlights the challenges posed to the Anti-Corruption crusade by analysing the loopholes that exist both in administrative structure and in scope of the relevant laws. The paper argues that Nigerian Constitution did not make adequate provisions for the implementation of the conventions, hence a proposal which will ensure adequate provision for implementing the conventions to better the lives of Nigerians. The paper concludes that there is the need to build institutional parameters, adequate constitutional and structural safeguards, as well as to synergise strategies, collaborations and alliances to facilitate the timely domestication and implementation of the conventions.Keywords: anti-corruption, corruption, convention, domestication, poverty, state parties
Procedia PDF Downloads 4494687 Youth Involvement in Cybercrime in Nigeria: A Case Study of Ikeja Local Government Area
Authors: Niyi Adegoke, Saanumi Jimmy Omolou
Abstract:
The prevalence rate of youth involving in cybercrime is alarming, which calls for concern among the government, parents, NGO and religious bodies, hence this paper aims at examining youth involvement in cybercrime in Nigeria. Achievement motivation theory was used to explain the activities of cyber-criminals in Nigerian society. A descriptive survey method was adopted for the study. The sample for the study was one hundred and fifty (150) respondents randomly selected from the population of the study. A questionnaire was used to gather information and data from the respondents. Data collected through the questionnaire were analyzed using percentage tool for the respondents’ bio-data while chi-square was employed to test the hypotheses. Findings from the study have revealed that parental negligence, unemployment, peer influence, and quest for materialism were responsible for cyber-crimes in Nigeria. The study concludes with the following recommendations among which are: creating employment opportunities for the youths and ensure good governance and accountability among other things will go a long way to solve the problem of cybercrime in our society.Keywords: cybercrime, youth, Nigeria, unemployment, information communication technology
Procedia PDF Downloads 2284686 Investigating the Acquisition of English Emotion Terms by Moroccan EFL Learners
Authors: Khalid El Asri
Abstract:
Culture influences lexicalization of salient concepts in a society. Hence, languages often have different degrees of equivalence regarding lexical items of different fields. The present study focuses on the field of emotions in English and Moroccan Arabic. Findings of a comparative study that involved fifty English emotions revealed that Moroccan Arabic has equivalence of some English emotion terms, partial equivalence of some emotion terms, and no equivalence for some other terms. It is hypothesized then that emotion terms that have near equivalence in Moroccan Arabic will be easier to acquire for EFL learners, while partially equivalent terms will be difficult to acquire, and those that have no equivalence will be even more difficult to acquire. In order to test these hypotheses, the participants (104 advanced Moroccan EFL learners and 104 native speakers of English) were given two tests: the first is a receptive one in which the participants were asked to choose, among four emotion terms, the term that is appropriate to fill in the blanks for a given situation indicating certain kind of feelings. The second test is a productive one in which the participants were asked to give the emotion term that best described the feelings of the people in the situations given. The results showed that conceptually equivalent terms do not pose any problems for Moroccan EFL learners since they can link the concept to an already existing linguistic category; whereas the results concerning the acquisition of partially equivalent terms indicated that this type of emotion terms were difficult for Moroccan EFL learners to acquire, because they need to restructure the boundaries of the target linguistic categories by expanding them when the term includes other range of meanings that are not subsumed in the L1 term. Surprisingly however, the results concerning the case of non-equivalence revealed that Moroccan EFL learners could internalize the target L2 concepts that have no equivalence in their L1. Thus, it is the category of emotion terms that have partial equivalence in the learners’ L1 that pose problems for them.Keywords: acquisition, culture, emotion terms, lexical equivalence
Procedia PDF Downloads 2274685 Improving Security by Using Secure Servers Communicating via Internet with Standalone Secure Software
Authors: Carlos Gonzalez
Abstract:
This paper describes the use of the Internet as a feature to enhance the security of our software that is going to be distributed/sold to users potentially all over the world. By placing in a secure server some of the features of the secure software, we increase the security of such software. The communication between the protected software and the secure server is done by a double lock algorithm. This paper also includes an analysis of intruders and describes possible responses to detect threats.Keywords: internet, secure software, threats, cryptography process
Procedia PDF Downloads 3334684 Sri Lankan Contribution to Peace and Security in the World: Legal Perspective
Authors: Muthukuda Arachchige Dona Shiroma Jeeva Shirajanie Niriella
Abstract:
Suppressing terrorism and ensuring peace and security of the people is one of the topics which have gained serious attention of the world community. Commissions of terrorist activities, locally and internationally lead to an uncertainty of peace and security, violations of human rights of the people. Thereby it demands stringent security laws and strong criminal justice systems, both at domestic and international levels. This paper intends to evaluate security laws in Sri Lanka through the criminal justice perspective, including their efficacy in relation to combat terrorism. The paper further intends to discuss the importance of such laws in upholding the peace and security at both local and universal levels. The paper argues that the term ‘efficacy’ does not stand for, sending people to jail at large-scale, but the ability to combat terrorism crime without violating the rights of the innocent people. The qualitative research method is followed to conduct this research which contains an extensive examination of security laws available as counter-terrorism laws in Sri Lanka with the relevant international standards adopted by the UN treaties. Primary sources which are relevant to the research, including judicial pronouncements are also discussed in this regard. Secondary sources such as reports, research articles and textbooks on this topic and information available on the internet are also reviewed in this analysis.Keywords: terrorism, security laws, criminal justice system, Sri Lanka, international treaty law
Procedia PDF Downloads 3834683 Contemporary Mexican Shadow Politics: The War on Drugs and the Issue of Security
Authors: Lisdey Espinoza Pedraza
Abstract:
Organised crime in Mexico evolves faster that our capacity to understand and explain it. Organised gangs have become successful entrepreneurs in many ways ad they have somehow mimicked the working ways of the authorities and in many cases, they have successfully infiltrated the governmental spheres. This business model is only possible under a clear scheme of rampant impunity. Impunity, however, is not exclusive to the PRI. Nor the PRI, PAN, or PRD can claim the monopoly of corruption, but what is worse is that none can claim full honesty in their acts either. The current security crisis in Mexico shows a crisis in the Mexican political party system. Corruption today is not only a problem of dishonesty and the correct use of public resources. It is the principal threat to Mexican democracy, governance, and national security.Keywords: security, war on drugs, drug trafficking, Mexico, Latin America, United States
Procedia PDF Downloads 4174682 Contribution of Football Club Jerseys towards English Premier League Fans’ Loyalty in Nigeria
Authors: B. O. Diyaolu
Abstract:
The globalization of football especially among youth over the decade is uprising. Nigeria youth displaying football jerseys at every opportunity is an acceptance of football globalization. The Love for English Premier League (EPL) football jersey is very strong among Nigeria fans. Football club jerseys of the EPL are a common sports product among fans in Nigeria. This study investigates the contribution of football club jerseys towards EPL fans’ loyalty in Nigeria. Descriptive survey research design was used for the study. The population consists of EPL fans in Nigeria. Simple random sampling technique (fish bowl without replacement) was used to select two states from the six geo-political zones. Purposive sampling technique was used to pick eight viewing centres while accidental sampling technique was used to pick five vendor stands from each State. An average of 250 respondents was selected from each state. A total of 3,200 respondents participated in the research. Two research instruments were used. A self-developed structured questionnaire on Football Jersey Scale (FJS): The instrument consists of 10 items. Fans Loyalty Scale (FLS): The instrument was modified from the psychological commitment to team (PCT) scale, and consists of 20 items. The Cronbach’s Alpha reliability coefficient of 0.72 and 0.75 was obtained, respectively. The hypothesis was tested at 0.05 significant levels. Data were analysed using frequency, percentages count, pie chart and multiple regressions. The result showed that the b-value of football club jersey is 0.148 also the standard regression coefficient (Beta) is 0.089. The t = 4.759 is statistically significant at p = 0.000. This signified a relative contribution of football club jersey on EPL fans loyalty in Nigeria. Club jersey, which is the most outstanding identifier of every club, was found to significantly predict loyalty. The jersey on the body of the fan has become the site for a declaration of loyalty which becomes available for social interaction and negotiation. The Nigerian local league clubs in an attempt to keep Nigerian fans loyal must borrow a leaf from their European counterparts.Keywords: club Jerseys, English Premier League, football fans, Nigeria youth
Procedia PDF Downloads 2564681 Newspaper Framing of President Buhari’s Handling of Insecurity in Nigeria, January 2016 - December 2017
Authors: Onyekwere Okpara, Kingsley C. Izuogu
Abstract:
This paper examined newspaper framing of President Buhari's handling of insecurity in Nigeria between January 2016-December 2017. The objectives were to examine the tone and sources of news frames used in reporting President Buhari's handling of insecurity in Nigeria. This paper did a content analysis of three newspapers-Daily Sun, The Nation, and the Leadership. Using a systematic random sampling, the study sampled a total of 732 editions of the selected newspapers and found out that the newspapers used neutral tone and government frame. The study, therefore, recommended that newspapers should improve their investigative reporting efforts.Keywords: insecurity, newspapers, framing, media
Procedia PDF Downloads 944680 Alternative Futures for the Middle East
Authors: Dorsa Bakhshandehgeyazdi
Abstract:
This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group
Procedia PDF Downloads 294