Search results for: Arabic Fodio Nigeria security
4350 Power System Cyber Security Risk in the Era of Digital Transformation
Authors: Rafat Rob, Khaled Alotaibi, Dana Nour, Abdullah Albadrani, Abdulmohsen Mulhim
Abstract:
Power systems digitization solutions provides a comprehensive smart, cohesive, interconnected network, extensive connectivity between digital assets, physical power plants, and resources to form digital economies. However, digitization has exposed the classical air gapped power plants to the rapid spread of cyber threats and attacks in the process delaying and forcing many organizations to rethink their cyber security policies and standards before they can augment their operation the new advanced digital devices. Cyber Security requirements for power systems (and industry control systems therein) demand a new approach, unique methodology, and design process that is completely different to Cyber Security measures designed for the IT systems. In practice, Cyber Security strategy, as applied to power systems, tends to be closely aligned to those measures applied for IT system purposes. The differentiator for Cyber Security in terms of power systems are the physical assets and applications used, alongside the ever-growing rate of expansion within the industry controls sector (in comparison to the relatively saturated growth observed for corporate IT systems). These factors increase the magnitude of the cyber security risk within such systems. The introduction of smart devices and sensors along the grid initiate vulnerable entry points to the systems. Every installed Smart Meter is a target; the way these devices communicate with each other may instigate a Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack. Attacking one sensor or meter has the potential to propagate itself throughout the power grid reaching the IT network, where it may manifest itself as a malware infiltration.Keywords: supply chain, cybersecurity, maturity model, risk, smart grid
Procedia PDF Downloads 1144349 Identity (Mis)Representation and Ideological Struggles in Discourses on Boko Haram in Nigeria
Authors: Temitope Ogungbemi
Abstract:
Jama'atu Ahlis Sunna Lidda'awati wal-Jihad (also called Boko Haram) in the North-East of Nigeria has facilitated ideological binarity in discourses on the crisis. Since its proliferation, media representation of the crisis has facilitated identity contamination and ideological struggle through which other critical issues, such as religious intolerance, ethnic diversity and other forms of class conflict in the Nigerian state, are brought to public notice. Though Boko Haram insurgency is ideological laden, the manifestation of the inherent ideologies requires extensive scholarly attention in order deconstruct the veiled ideologies. Therefore, the thrust of this study is to critically investigate identity (mis)representation as a basis for ideological mapping in discourses on Boko Haram in Nigeria, adopting critical discourse analytical tools supported with insights from systemic functional linguistics and critical discourse analysis. The data for this study consist of articles on Boko Haram in Nigerian newspapers published in English. The data selection is purposive and aimed at responding to challenges that are inherent in Nigeria's multifaithism and multiculturalism, and their effects on the construction of narratives on Boko Haram. The study reveals that identity manipulation is a constructive device for ideological mapping, realised through labeling, agency activation, and transitivity. Identity representation in discourses on Boko Haram depicted four dichotomous binarities using exclusion, generalisation, contrasting and attribution.Keywords: identity representation, ideology, Boko Haram, newspapers
Procedia PDF Downloads 3404348 Assessment of the Growth Enhancement Support Scheme in Adamawa State, Nigeria
Authors: Oto J. Okwu, Ornan Henry, Victor A. Otene
Abstract:
The agricultural sector contributes a great deal to the sustenance of Nigeria’s food security and economy, with an attendant impact on rural development. In spite of the relatively high number of farmers in the country, self-sufficiency in food production is still a challenge. Farmers are faced with myriad problems which hinder their production efficiency, one of which is their access to agricultural inputs required for optimum production. To meet the challenges faced by farmers, the government at the federal level has come up with many agricultural policies, one of which is the Agricultural Transformation Agenda (ATA). The Growth Enhancement Support Scheme (GESS) is one of the critical components of ATA, which is aimed at ensuring the effective distribution of agricultural inputs delivered directly to farmers, and at a regulated cost. After about 8 years of launching this policy, it will be necessary to carry out an assessment of GESS and determine the impact it has made on rural farmers with respect to their access to farm inputs. This study was carried out to assess the Growth Enhancement Support Scheme (GESS) in Adamawa State, Nigeria. Crop farmers who registered under the GESS in Adamawa State, Nigeria, formed the population for the study. Primary data for the study were obtained through a survey, and the use of a structured questionnaire. A sample size of 167 respondents was selected using multi-stage, purposive, and random sampling techniques. The validity and reliability of the research instrument (questionnaire) were obtained through pilot testing and test-retest method, respectively. The objectives of the study were to determine the difference in the level of access to agricultural inputs before and after GESS, determine the difference in cost of agricultural inputs before and after GESS, and to determine the challenges faced by rural farmers in accessing agricultural inputs through GESS. Both descriptive and inferential statistics were used in analyzing the collected data. Specifically, Mann-Whitney, student t-test, and factor analysis were used to test the stated hypotheses. Research findings revealed there was a significant difference in the level of access to farm inputs after the introduction of GESS (Z=14.216). Also, there was a significant difference in the cost of agro-inputs after the introduction of GESS (Pr |T| > |t|= 0.0000). The challenges faced by respondents in accessing agro-inputs through GESS were administrative and technical in nature. Based on the findings of the research, it was recommended that efforts be made by the government to sustain the GESS, as it has significantly improved the level of farmers’ access to agricultural inputs and has reduced the cost of agro-inputs, while administrative challenges faced by the respondents in accessing inputs be addressed by the government, and extension agents assist the farmers to overcome the technical challenges they face in accessing inputs.Keywords: agricultural policy, agro-inputs, assessment, growth enhancement support scheme, rural farmers
Procedia PDF Downloads 1104347 Electoral Reforms and Voting Participation of Persons with Disabilities in 2019 General Elections in Nigeria
Authors: Afeez Kolawole Shittu
Abstract:
Democracy as practiced across the globe is sustained with the increase participation of all eligible voters irrespective of class, race, colour, and disabilities. However, there is a perception within the contemporary African society that people with disability (PWDs) belongs to charity and welfare. This is exacerbated with little understanding among African counties including Nigeria that persons with disability have fundamental rights inevitably rooted in the constitution. This significant viewpoint has continued to militate against the social inclusion of persons with disabilities in various aspects of societal lives including their political participation It is instructive to note that the political right of PWDs has been protected by various international conventions. Article 29 of the United Nations Convention on the Rights and Dignities for Persons with Disability (CRPD) guaranteed the participation of persons with disability in the political process. Domesticating and ratification of this right has been a challenge for many African countries including Nigeria. Against the backdrop, the Independent National Electoral Commission (INEC), the body saddled with the responsibility of conducting elections in Nigeria provided forum for the participation of persons with disability in election through implementations of electoral act. Section 56 (1) and (2) of the 2010 Electoral Act (as amended) provide for voting participation of persons with disability. This study examines the implementation of the electoral act and how it impacts the voting participation of persons with disability vis-à-vis other challenges affecting the participation of PWDs in electoral process in Nigeria’s 2019 general election. This paper draws on mixed method in sourcing relevant information from the respondents. Interview will be conducted among INEC officials, Civil Society Organisations, Joint National Association of Persons with Disability (JONAPWD). Questionnaire and Focus Group Discussion will be held among different forms of PWDs. The data will be analysed using appropriate descriptive statistics and inferential statistics, as well as thematic content analysis. The study will enlighten understanding on the awareness of the political rights of PWDs as well as improving their electoral participation for sustainable democracy in Nigeria, Africa’s most populous country.Keywords: electoral reforms, voting participation, persons with disabilities
Procedia PDF Downloads 2364346 Countering Terrorism and Defending Human Right after 9/11: The European Perspective
Authors: Anita Blagojević
Abstract:
It is well known that the terrorist attacks on the New York City and Washington, D.C. prompted unprecedented international action to enhance international cooperation in the prevention and suppression of terrorism. In the months (and years) after September 11, the world community focused on two main efforts: first, on efforts to bring those responsible for terrorist attacks to justice, and second, on efforts to prevent future terrorist attacks. In that sense, many governments took advantage of these efforts to strengthen their national security. In that process, however, human rights and civil liberties of certain groups of people were alleged. As a consequence, part of the price paid for protecting national security against terrorist attacks was the threat of infringement on people's fundamental rights and freedoms. The aim of this paper is to analyze the role of the European Union and the Council of Europe in finding the answer to the one of the main security dilemma for the present era: how to find the balance between the protection of national security and guarantee of the people's rights and fundamental freedoms?Keywords: terrorism, antiterrorism, European Union, Council of Europe, human rights
Procedia PDF Downloads 3784345 Effect of Access to Finance on Innovation and Productivity of SMEs in Nigeria: Evidence from the World Bank Enterprise Survey
Authors: Abidemi C. Adegboye, Samuel Iweriebor
Abstract:
The primary link between financial institutions and economic performance is the provision of resources by these institutions to businesses in order to drive enterprise expansion, sustainability, and development. In this study, the role of access to finance in driving innovations and productivity in Nigerian SMEs is investigated using the World Bank Enterprise Survey (ES) dataset. Innovation is defined based on the ES analysis using five compositions including product, method, organisational, use of foreign-licensed technology, and spending on R&D. The study considers finance in terms of source in meeting investment needs and in terms of access. Moreover, finance access is categorized as external and internal to a firm with each having different implications. The research methodology adopted a survey analysis based on the 2014 World Bank Enterprise Survey of 19 states in Nigeria. The survey comprised over 10,000 manufacturing and services firms, both at the small scale and medium scale levels. The logit estimation technique is used to estimate the relationships in the study. The results from the empirical analysis show that in general, access to finance drives SME innovation in Nigeria. In particular, ease of accessing bank loans and credit is shown to be the strongest positive force in driving all types of innovation among SMEs in Nigeria. In the same vein, the type of finance source for investment matters in terms of how it affects innovation: it is shown that both internal and external sources improve investment in product, process, and organisational innovation, but only external financing has effect on R&D spending and use of foreign licensed technology. Overall spending on R&D is only driven by access to external finance by the SMEs. For productivity, the results show that while structure of financing investment improves productivity, increased access to finance may actually lead to productivity decline among SMEs in Nigeria. There is a need for the financial system to evolve structures to increase fund availability to SMEs in Nigeria, especially for the purpose of innovation investment.Keywords: access to finance, financing investment, innovation, productivity, SMEs
Procedia PDF Downloads 3584344 The Efficacy of Psycho-Education in Improving the Emotional Well-Being of Visually Impaired Adolescents in Nigeria
Authors: Janet Tolulope Olaseni
Abstract:
Emotional well-being in adolescents is an important psychological factor that can enhance positive living, but if it is not well groomed, it can have adverse impacts on their development. Therefore, the present study examined the efficacy of psycho-education on the emotional well-being of adolescents who are visually impaired in Nigeria. A total of twenty-eight (28) participants, which comprisednineteen (19) males and nine (9) females (M=15.82, SD=2.23) from a Nigerian School for the Blind, participated in the quasi-experimental study. Randomized clinical trial designwas used to assigned the participants into three (Complete Psycho-education, Incomplete Psycho-education, and No Psycho-education) groups. Standardized scales were used to gather data from the respondents. The formulated hypotheses were tested using Dependent T-Test and Analysis of Co-Variance. The results showed that there was a significant effect of Psycho-education on the emotional well-being of the Visually Impaired Adolescents. Those who received complete Psycho-educationhad the highest level of emotional well-being compared to those in the other groups. In order to enhance the emotional well-being of the Visually Impaired Adolescents, the study recommended that complete Psycho-education programme should be incorporated into the school activities of the Visually Impaired Adolescents.Keywords: emotional well-being, psycho-education, visually impaired adolescents, Nigeria
Procedia PDF Downloads 1064343 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks
Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar
Abstract:
Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.Keywords: mobile operating system, security, privacy, Malware
Procedia PDF Downloads 884342 Moderating Effects of Family Ownership on the Relationship between Corporate Governance Mechanisms and Financial Performance of Publicly Listed Companies in Nigeria
Authors: Ndagi Salihu
Abstract:
Corporate governance mechanisms are the control measures for ensuring that all the interests groups are equally represented and management are working towards wealth creation in the interest of all. Therefore, there are many empirical studies during the last three decades on corporate governance and firm performance. However, little is known about the effects of family ownership on the relationship between corporate governance and firm performance, especially in the developing economy like Nigeria. This limit our understanding of the unique governance dynamics of family ownership with regards firm performance. This study examined the impact of family ownership on the relationship between governance mechanisms and financial performance of publicly listed companies in Nigeria. The study adopted quantitative research methodology using correlational ex-post factor design and secondary data from annual reports and accounts of a sample of 23 listed companies for a period of 5 years (2014-2018). The explanatory variables are the board size, board composition, board financial expertise, and board audit committee attributes. Financial performance is proxy by Return on Assets (ROA) and Return on Equity (ROE). Multiple panel regression technique of data analysis was employed in the analysis, and the study found that family ownership has a significant positive effect on the relationships between corporate governance mechanisms and financial performance of publicly listed firms in Nigeria. This finding is the same for both the ROA and ROE. However, the findings indicate that board size, board financial expertise, and board audit committee attributes have a significant positive impact on the ROA and ROE of the sample firms after the moderation. Moreover, board composition has significant positive effect on financial performance of the sample listed firms in terms of ROA and ROE. The study concludes that the use of family ownership in the control of firms in Nigeria could improve performance by reducing the opportunistic actions managers as well as agency problems. The study recommends that publicly listed companies in Nigeria should allow significant family ownership of equities and participation in management.Keywords: profitability, board characteristics, agency theory, stakeholders
Procedia PDF Downloads 1404341 Women in Higher Education in Nigeria: A Panacea for Developmental Growth
Authors: Lucy Adesomon Okukpon, Margaret Omolara Akerele
Abstract:
Higher Education in Nigeria is sought after by women, they believe that the economic power and growth lies in the attainment and pursuit of higher Education. No nation in the world can boast of developmental growth when the women are not fully empowered educationally. The attainment of higher education spurs women to contribute meaningfully towards the growth and development of the Nigerian workforce. Recent innovations and trends reveal that over fifty per cent of Nigerian women have attained higher education within and outside the country. Women in Nigeria have expressed their growing concern of what becomes of the remaining 50 per cent who are unable to attain basic education. This concern has brought about the issue of funding which is a practical challenge towards the attainment of education for these vulnerable women. Another challenging factor is that most women often seek the permission of their husbands, brothers, fathers and uncles to enable them attain educational pursuit, especially when the institution is miles away from their place of abode. The solution to this problems from research findings reveal that the umbrella body which co-ordinates education for women in Nigeria (The National Council of Women Societies, NCWS) have taken it upon itself to provide educational learning centres in all the states of the Federation including Abuja the Nations capital city. This is to stem the ugly trend and enable women gain access to educational facilities provided for their growth and development. This positive stride has brought succour to women who hitherto have no hope of attaining any form of education. Moreover, awareness creation concerning higher education is translated into different Nigerian languages so that the women at the grassroots can benefit immensely and contribute towards the growth and development of the Nation. Their educational progress attest to the fact that Nigerian Women are happy for the educational opportunities provided and have vowed to attain greater heights particularly where higher education is concerned.Keywords: developmental growth, educational attainment, higher education, women in higher education, Nigeria
Procedia PDF Downloads 4984340 Proposal of a Model Supporting Decision-Making Based on Multi-Objective Optimization Analysis on Information Security Risk Treatment
Authors: Ritsuko Kawasaki (Aiba), Takeshi Hiromatsu
Abstract:
Management is required to understand all information security risks within an organization, and to make decisions on which information security risks should be treated in what level by allocating how much amount of cost. However, such decision-making is not usually easy, because various measures for risk treatment must be selected with the suitable application levels. In addition, some measures may have objectives conflicting with each other. It also makes the selection difficult. Moreover, risks generally have trends and it also should be considered in risk treatment. Therefore, this paper provides the extension of the model proposed in the previous study. The original model supports the selection of measures by applying a combination of weighted average method and goal programming method for multi-objective analysis to find an optimal solution. The extended model includes the notion of weights to the risks, and the larger weight means the priority of the risk.Keywords: information security risk treatment, selection of risk measures, risk acceptance, multi-objective optimization
Procedia PDF Downloads 4614339 Labor Welfare and Social Security
Authors: Shoaib Alvi
Abstract:
Mahatma Gandhi was said “Man becomes great exactly in the degree in which he works for the welfare of his fellow-men”. Labor welfare is an important fact of Industrial relations. With the growth of industrialization, mechanization and computerization, labor welfare measures have got the fillip. The author believes that Labor welfare includes provisions of various facilities and amenities in and around the work place for the better life of the workers. Labor welfare is, thus, one of the major determinants of industrial relations. It comprises all human efforts the work place for the better life of the worker. The social and economic aspects of the life of the workers have the direct influence on the social and economic development of the nation. Author thinks that there could be multiple objectives in having, labor welfare programme the concern for improving the lot of the workers, a philosophy of humanitarianism or internal social responsibility, a feeling of concern, and caring by providing some of life's basic amenities, besides the basic pay packet. Such caring is supposed to build a sense of loyalty on the part of the employee towards the organization. The author thinks that Social security is the security that the State furnishes against the risks which an individual of small means cannot today, stand up to by himself even in private combination with his fellows. Social security is one of the pillars on which the structure of a welfare state rests, and it constitutes the hardcore of social policy in most countries. It is through social security measures that the state attempts to maintain every citizen at a certain prescribed level below which no one is allowed to fall. According to author, social assistance is a method according to which benefits are given to the needy persons, fulfilling the prescribed conditions, by the government out of its own resources. Author has analyzed and studied the relationship between the labor welfare social security and also studied various international conventions on provisions of social security by International Authorities like United Nations, International Labor Organization, and European Union etc. Author has also studied and analyzed concept of labor welfare and social security schemes of many countries around the globe ex:- Social security in Australia, Social security in Switzerland, Social Security (United States), Mexican Social Security Institute, Welfare in Germany, Social security schemes of India for labor welfare in both organized sector and unorganized sector. In this Research paper, Author has done the study on the Conceptual framework of the Labour Welfare. According to author, labors are highly perishable, which need constant welfare measures for their upgradation and performance in this field. At last author has studied role of trade unions and labor welfare unions and other institutions working for labor welfare, in this research paper author has also identified problems these Unions and labor welfare bodies’ face and tried to find out solutions for the problems and also analyzed various steps taken by the government of various countries around the globe.Keywords: labor welfare, internal social responsibility, social security, international conventions
Procedia PDF Downloads 5764338 Hydrogeochemical Characteristics of the Different Aquiferous Layers in Oban Basement Complex Area (SE Nigeria)
Authors: Azubuike Ekwere
Abstract:
The shallow and deep aquiferous horizons of the fractured and weathered crystalline basement Oban Massif of south-eastern Nigeria were studied during the dry and wet seasons. The criteria were ascertaining hydrochemistry relative to seasonal and spatial variations across the study area. Results indicate that concentrations of major cations and anions exhibit the order of abundance; Ca>Na>Mg>K and HCO3>SO4>Cl respectively, with minor variations across sampling seasons. Major elements Ca, Mg, Na and K were higher for the shallow aquifers than the deep aquifers across seasons. The major anions Cl, SO4, HCO3, and NO3 were higher for the deep aquifers compared to the shallow ones. Two water types were identified for both aquifer types: Ca-Mg-HCO3 and Ca-Na-Cl-SO4. Most of the parameters considered were within the international limits for drinking, domestic and irrigation purposes. Assessment by use of sodium absorption ratio (SAR), percent sodium (%Na) and the wilcox diagram reveals that the waters are suitable for irrigation purposes.Keywords: shallow aquifer, deep aquifer, seasonal variation, hydrochemistry, Oban massif, Nigeria
Procedia PDF Downloads 6624337 Adaptive Auth - Adaptive Authentication Based on User Attributes for Web Application
Authors: Senthuran Manoharan, Rathesan Sivagananalingam
Abstract:
One of the main issues in system security is Authentication. Authentication can be defined as the process of recognizing the user's identity and it is the most important step in the access control process to safeguard data/resources from being accessed by unauthorized users. The static method of authentication cannot ensure the genuineness of the user. Due to this reason, more innovative authentication mechanisms came into play. At first two factor authentication was introduced and later, multi-factor authentication was introduced to enhance the security of the system. It also had some issues and later, adaptive authentication was introduced. In this research paper, the design of an adaptive authentication engine was put forward. The user risk profile was calculated based on the user parameters and then the user was challenged with a suitable authentication method.Keywords: authentication, adaptive authentication, machine learning, security
Procedia PDF Downloads 2494336 Incorporating Circular Economy into Passive Design Strategies in Tropical Nigeria
Authors: Noah G. Akhimien, Eshrar Latif
Abstract:
The natural environment is in need for an urgent rescue due to dilapidation and recession of resources. Passive design strategies have proven to be one of the effective ways to reduce CO2 emissions and to improve building performance. On the other hand, there is a huge drop in material availability due to poor recycling culture. Consequently, building waste pose environmental hazard due to unrecycled building materials from construction and deconstruction. Buildings are seen to be material banks for a circular economy, therefore incorporating circular economy into passive housing will not only safe guide the climate but also improve resource efficiency. The study focuses on incorporating a circular economy in passive design strategies for an affordable energy and resource efficient residential building in Nigeria. Carbon dioxide (CO2) concentration is still on the increase as buildings are responsible for a significant amount of this emission globally. Therefore, prompt measures need to be taken to combat the effect of global warming and associated threats. Nigeria is rapidly growing in human population, resources on the other hand have receded greatly, and there is an abrupt need for recycling even in the built environment. It is necessary that Nigeria responds to these challenges effectively and efficiently considering building resource and energy. Passive design strategies were assessed using simulations to obtain qualitative and quantitative data which were inferred to case studies as it relates to the Nigeria climate. Building materials were analysed using the ReSOLVE model in order to explore possible recycling phase. This provided relevant information and strategies to illustrate the possibility of circular economy in passive buildings. The study offers an alternative approach, as it is the general principle for the reworking of an economy on ecological lines in passive housing and by closing material loops in circular economy.Keywords: building, circular, efficiency, environment, sustainability
Procedia PDF Downloads 2534335 Climate Change and Migration from Ngala and Kala-Balge LGAs, North-Eastern Borno State, Nigeria
Authors: Adam Modu Abbas
Abstract:
Nigeria, due to its location, size and population is very vulnerable to the impact of climate change. Little effort is however made to address most of the problems, despite the fact that sufficient understanding is made on the impact of climate change and problems emanating from it are also always being propagated. Migration, one of the resultant effects of climate change is however given less attention. This paper focuses on the climate change impact and one of resulting effects, migration and its associated problems. Purposive sampling technique was adopted in sampling 250 respondents who were mainly family members of out-migrants from Ngala and Kala-Balge LGAs of North-eastern Borno State, Nigeria. Available literatures were consulted for the types of climate change impacts. The results revealed that, climate change leads to climatic variation over the space with numerous effects on the environment such as intermittent droughts, desertification/deforestation, low water table and establishment of dams across the courses of the main sources of water supply to the Lake Chad. Many people in the study area either migrated to Cameroon’s Darrak, Lake Doi and Mayo Mbund, Lagos, Nigeria, leaving some members of their families at home. More than half of respondents indicated that the heads of the households migrated as a result of poor harvest due to diminishing or fluctuating rains/drought and/or drying of river Surbewel. It is recommended that; inter-basin water transfers should be embarked upon.Keywords: climate, change, migration, dam, intermittent
Procedia PDF Downloads 4434334 Contents for the Maintenance and Troubleshooting of Anti-lock Braking System for Automobile Craftsmen in Nigeria
Authors: Arah Abubakar Saidu, Audu Rufai, Abdulkadir Mohammed, Ibrahim Yakubu Umar, Idris Abubakar Mohammed
Abstract:
The study determined the contents for the maintenance and troubleshooting of an anti-lock braking system for automobile craftsmen in Nigeria. Two research questions were raised and answered and two null hypotheses were formulated and tested at a .05 level of significance. The study adopted a descriptive survey research design. The study was conducted in Federal Capital Territory (FCT), Abuja, Kaduna, Kano, Lagos and Plateau States, Nigeria. The targeted population for the study was 99 consisting of all 43 non-teaching Subject Matter Experts (SMEs). The study utilized the whole population of the study. The instruments used for data collection were Anti-lock Braking System Maintenance and Troubleshooting Contents Questionnaire (ABSMTQ). Mean was used to analyze data that answered research questions and Z-test was used in testing the null hypotheses. Findings revealed, among others, that 81 items as content for the maintenance of ABS and 61 items as content for troubleshooting ABS for automobile craftsmen in Nigeria. Based on the findings of the study, the recommended, among others, that the National Board for Technical Education should include the contents for the maintenance and troubleshooting ABS in Motor Vehicle Mechanic Works curriculum used for training automobile craftsmen through the process of curriculum review in order to equip them with the competencies in troubleshooting and maintenance of ABS.Keywords: anti-lock braking system, maintenance, troubleshooting, automobile craftsmen
Procedia PDF Downloads 894333 Integration Multi-Layer Security Modeling with Fuzzy Logic in Service-Oriented Architectures
Authors: Zeinab Ranjbar
Abstract:
Service-oriented architecture in the world today, it is proposed to exchange information and services of interest to those such as IT managers, business managers, designers and system builders scene. The basic architecture of the software used to provide service to all users.the worries of all people (managers, business managers, designers, and system builders scene) effectiveness of this model, how reliable it is in security transactions.To increase the reliability of multi-layer fuzzy logic Architectures used.Keywords: SOA, service oriented architecture, fuzzy logic, multi layer, SOA security
Procedia PDF Downloads 3864332 Relationship between Electricity Consumption and Economic Growth: Evidence from Nigeria (1971-2012)
Authors: N. E Okoligwe, Okezie A. Ihugba
Abstract:
Few scholars disagrees that electricity consumption is an important supporting factor for economy growth. However, the relationship between electricity consumption and economy growth has different manifestation in different countries according to previous studies. This paper examines the causal relationship between electricity consumption and economic growth for Nigeria. In an attempt to do this, the paper tests the validity of the modernization or depending hypothesis by employing various econometric tools such as Augmented Dickey Fuller (ADF) and Johansen Co-integration test, the Error Correction Mechanism (ECM) and Granger Causality test on time series data from 1971-2012. The Granger causality is found not to run from electricity consumption to real GDP and from GDP to electricity consumption during the year of study. The null hypothesis is accepted at the 5 per cent level of significance where the probability value (0.2251 and 0.8251) is greater than five per cent level of significance because both of them are probably determined by some other factors like; increase in urban population, unemployment rate and the number of Nigerians that benefit from the increase in GDP and increase in electricity demand is not determined by the increase in GDP (income) over the period of study because electricity demand has always been greater than consumption. Consequently; the policy makers in Nigeria should place priority in early stages of reconstruction on building capacity additions and infrastructure development of the electric power sector as this would force the sustainable economic growth in Nigeria.Keywords: economic growth, electricity consumption, error correction mechanism, granger causality test
Procedia PDF Downloads 3094331 Cooperative Jamming for Implantable Medical Device Security
Authors: Kim Lytle, Tim Talty, Alan Michaels, Jeff Reed
Abstract:
Implantable medical devices (IMDs) are medically necessary devices embedded in the human body that monitor chronic disorders or automatically deliver therapies. Most IMDs have wireless capabilities that allow them to share data with an offboard programming device to help medical providers monitor the patient’s health while giving the patient more insight into their condition. However, serious security concerns have arisen as researchers demonstrated these devices could be hacked to obtain sensitive information or harm the patient. Cooperative jamming can be used to prevent privileged information leaks by maintaining an adequate signal-to-noise ratio at the intended receiver while minimizing signal power elsewhere. This paper uses ray tracing to demonstrate how a low number of friendly nodes abiding by Bluetooth Low Energy (BLE) transmission regulations can enhance IMD communication security in an office environment, which in turn may inform how companies and individuals can protect their proprietary and personal information.Keywords: implantable biomedical devices, communication system security, array signal processing, ray tracing
Procedia PDF Downloads 1144330 Physicochemical Analysis of Ground Water of Selected Areas of Oji River in Enugu State, Nigeria
Authors: C. Akpagu Francis, V. Nnamani Emmanuel
Abstract:
Drinking and use of polluted water from ponds, rivers, lakes, etc. for other domestic activities especially by the larger population in the rural areas has been a major source of health problems to man. A study was carried out in two different ponds in Oji River, Enugu State of Nigeria to determine the extent of total dissolved solid (TDS), metals (lead, cadmium, iron, zinc, manganese, calcium), biochemical oxygen demand (BOD). Samples of water were collected from two different ponds at a distance of 510, and 15 metres from the point of entry into the ponds to fetch water. From the results obtained, TDS (751.6Mg/l), turbidity (24ftu), conductivity (1193µs/cm), cadmium (0.008Mg/l) and lead (0.03mg/t) in pond A (PA) were found to have exceeded the WHO standard. Also in pond B (PB) the results shows that TDS (760.30Mg/l), turbidity (26ftu), conductivity (1195µs/cm), cadmium (0.008mg/l) and lead (0.03Mg/l) were also found to have exceeded the WHO standard which makes the two ponds. Water very unsafe for drinking and use in other domestic activities.Keywords: physicochemical, groundwater, Oji River, Nigeria
Procedia PDF Downloads 4614329 US-ASEAN Counter Terrorism Cooperation: Maintaining International Security and Avoiding Muslim Stereotypes
Authors: Jordan Daud, Satriya Wibawa, Wahyu Wardhana
Abstract:
The US Global War on Terror has had effect on Southeast Asia as Second Front of Global War on Terror. Since 2001, ASEAN had adopted legal framework to counter the terrorist threat through numerous approach which accommodate various counterterrorism policy of the ten member states. ASEAN have also enhanced multilateral cooperation with US and its allies in Asia Pacific region in addressing terrorist threat, terrorist funding, cyber terrorism and other forms of terrorism. This cooperation is essential to maintain international security and stability and also assure economic development. This work focuses on the US-ASEAN counterterrorism cooperation due to they identified terrorism as a mutual enemy that posed to human security, infrastructure security, and national security. Having in mind that international terrorism usually connected with Muslim community, this paper will also elaborate the concept of Jihad and Islam revivalism in politics to avoid negative image of Islam and Muslim. This paper argues that as region with large Muslim community, Southeast Asia still need to tighten counter terrorism cooperation and also lessening Muslim stereotypes with terrorism through educating public understanding and inter-faith and intra-faith dialogue to create a better world.Keywords: ASEAN, U.S., counter terrorism, Muslim stereotypes
Procedia PDF Downloads 2464328 Rural Tourism Entrepreneurship as Strategy for Economic Development in Nigeria
Authors: Salami Ayobami Taofeek, Ajayi Adeola
Abstract:
Rural tourism entrepreurship is a tourist industry which revolutionizes businesses and prompting economic development across the globe. It encompasses huge range activities, natural or man-made attractions, amenities and facilities, transportation, marketing and information systems. It is also an important export for 83% of the developing countries and the main export for one third of them. In 2000, developing countries recorded 142.6 million international arrivals an increase of 95% compared to the figures of 1990. However, only developing countries with effective natural and man-made tourism supporting and enhancing infrastructure have been able to develop their tourism sector and seize the attendance advantages. Rural areas of Nigeria possess some distinctive peculiarities which can be transformed into attractive tourist centers. In spite of all these, rural tourism areas are still faced with myriad problems which include poor finance inadequate awareness and education, lack of progress in developing the rural of progress in developing the rural tourism potentials inadequate legislation, insecurity, entrepreneurial inertness, over-dependent on oil among others. This paper focuses on the impact and challenges of rural tourism entrepreneurship as strategy for economic development in Nigeria. It reviews literature rural tourism, tourism entrepreneurship potentials and classifications of Nigerians tourism potential’s destinations. The paper concludes that Nigeria Government should encourage rural based tourism entrepreneurship development by addressing the challenges facing rural tourism entrepreneurship in the country.Keywords: entrepreneurship, economic development, rural tourism, tourism destinations tourism potentials
Procedia PDF Downloads 4314327 Stack Overflow Detection and Prevention on Operating Systems Using Machine Learning and Control-Flow Enforcement Technology
Authors: Cao Jiayu, Lan Ximing, Huang Jingjia, Burra Venkata Durga Kumar
Abstract:
The first virus to attack personal computers was born in early 1986, called C-Brain, written by a pair of Pakistani brothers. In those days, people still used dos systems, manipulating computers with the most basic command lines. In the 21st century today, computer performance has grown geometrically. But computer viruses are also evolving and escalating. We never stop fighting against security problems. Stack overflow is one of the most common security vulnerabilities in operating systems. It may result in serious security issues for an operating system if a program in it has a vulnerability with administrator privileges. Certain viruses change the value of specific memory through a stack overflow, allowing computers to run harmful programs. This study developed a mechanism to detect and respond to time whenever a stack overflow occurs. We demonstrate the effectiveness of standard machine learning algorithms and control flow enforcement techniques in predicting computer OS security using generating suspicious vulnerability functions (SVFS) and associated suspect areas (SAS). The method can minimize the possibility of stack overflow attacks occurring.Keywords: operating system, security, stack overflow, buffer overflow, machine learning, control-flow enforcement technology
Procedia PDF Downloads 1154326 Management Strategies for Risk Events in Construction Industries during Economic Situation and COVID-19 Pandemic in Nigeria
Authors: Ezeabasili Chibuike Patrick
Abstract:
The complex situation of construction industries in Nigeria and the risk of failures involved includes cost overrun, time overrun, Corruption, Government influence, Subcontractor challenges, Political influence and Instability, Cultural differences, Human resources deficiencies, cash flow Challenges, foreign exchange issues, inadequate design, Safety, low productivity, late payment, Quality control issues, project management issues, Environmental issues, Force majeure Competition amongst others has made the industry prone to risk and failures. Good project management remains effective in improving decision-making, which minimizes these risk events. This study was done to address these project risks and good decision-making to avert them. A mixed-method approach to research was used to do this study. Data collected by questionnaires and interviews on thirty-two (32) construction professionals was used in analyses to aid the knowledge and management of risks that were identified. The study revealed that there is no good risk management expertise in Nigeria. Also, that the economic/political situation and the recent COVID-19 pandemic has added to the risk and poor management strategies. The contingency theory and cost has therefore surfaced to be the most strategic management method used to reduce these risk issues and they seem to be very effective.Keywords: strategies, risk management, contingency theory, Nigeria
Procedia PDF Downloads 1304325 Data Security in Cloud Storage
Authors: Amir Rashid
Abstract:
Today is the world of innovation and Cloud Computing is becoming a day to day technology with every passing day offering remarkable services and features on the go with rapid elasticity. This platform took business computing into an innovative dimension where clients interact and operate through service provider web portals. Initially, the trust relationship between client and service provider remained a big question but with the invention of several cryptographic paradigms, it is becoming common in everyday business. This research work proposes a solution for building a cloud storage service with respect to Data Security addressing public cloud infrastructure where the trust relationship matters a lot between client and service provider. For the great satisfaction of client regarding high-end Data Security, this research paper propose a layer of cryptographic primitives combining several architectures in order to achieve the goal. A survey has been conducted to determine the benefits for such an architecture would provide to both clients/service providers and recent developments in cryptography specifically by cloud storage.Keywords: data security in cloud computing, cloud storage architecture, cryptographic developments, token key
Procedia PDF Downloads 2944324 British Aristocratic Irony on Screen: Subtitling Shifts in Downton Abbey
Authors: Nahed Almutairi
Abstract:
The subtitling process for period dramas implies a set of linguistic challenges. Audio-visual (AV) texts in this genre weave a rich tapestry of verbal irony blended with humor. The famous TV series Downtown Abbey contains such irony as one of the British aristocracy's linguistic markers. This study aims to examine subtitling strategies utilized in rendering such verbal irony. To counteract the negative postulated by Berman with the positive shifts, a qualitative analysis is conducted to examine the impact of the presence and absence of negative deforming tendencies in the Arabic subtitles of the first season of the British drama. This research is significant because it contributes to the discipline of translation studies, specifically the realm of AV translation. It seeks to provide a set of guidelines for optimal subtitling strategies that maintain the stylistic peculiarities of a social class that don’t exist in the target culture while also considering the practical aspects of translating subtitles. The findings indicate that negative shifts in the use of ironic expressions distort not only the stylistic elements of British aristocracy's utterances but also result in a loss of the intended meaning. This implies that what Berman’s model identifies as negative is also perceived as negative linguistic shifts in the Arabic subtitles of the British aristocracy’s verbal irony.Keywords: Downton Abbey, deforming tendencies, berman, subtitling shifts, verbal irony
Procedia PDF Downloads 824323 Biometric Identification with Latitude and Longitude Fingerprint Verification for Attendance
Authors: Muhammad Fezan Afzal, Imran Khan, Salma Imtiaz
Abstract:
The need for human verification and identification requires from centuries for authentication. Since it is being used in big institutes like financial, government and crime departments, a continued struggle is important to make this system more efficient to prevent security breaches. Therefore, multiple devices are used to authenticate the biometric for each individual. A large number of devices are required to cover a large number of users. As the number of devices increases, cost will automatically increase. Furthermore, it is time-consuming for biometrics due to the devices being insufficient and are not available at every door. In this paper, we propose the framework and algorithm where the mobile of each individual can also perform the biometric authentication of attendance and security. Every mobile has a biometric authentication system that is used in different mobile applications for security purposes. Therefore, each individual can use the biometric system mobile without moving from one place to another. Moreover, by using the biometrics mobile, the cost of biometric systems can be removed that are mostly deployed in different organizations for the attendance of students, employees and for other security purposes.Keywords: fingerprint, fingerprint authentication, mobile verification, mobile biometric verification, mobile fingerprint sensor
Procedia PDF Downloads 694322 Glimpses into the History of Makkah in the Light of Archaeological Finds
Authors: Heba Aboul-Enein
Abstract:
The blessed Mecca (Makkah) has been attacked as a city without a pre-Islamic history. Many claims have been posited denying the historicity of this holy city, and mythicizing Arabic historical records. Hence, the current paper attempted to shed light on this controversial history of Makkah. To achieve the intended objective, the study recoursed to archaeological, historical, and linguistic evidence, to prove that the holy city existed since the dawn of human history. The data under study include the results of recent excavations; archaeological surveys in Saudi Arabia, academic works of archaeologists, newspaper reports of the latest archaeological discoveries, and the findings of Saudi explorers. In addition, the study examined ancient and contemporary references; western accounts of Makkah, the bible, Jewish, Christian, Islamic, and Arabic references, in an effort to reconcile these texts with the archeological findings. The paper also reviewed the latest results of aerial archeology of the region. The study proved based on archaeological finds, and contrary to fallacious claims, that Makkah is an ancient city that existed and was inhabited by humans in varied historical eras.Keywords: aerial archaeology, archaeological finds in the Makkan region, archaeological surveys, Western, Jewish and Islamic accounts of Makkah
Procedia PDF Downloads 4754321 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme
Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey
Abstract:
In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID
Procedia PDF Downloads 299