Search results for: Arabic Fodio Nigeria security
4320 Emergence of Fluoroquinolone Resistance in Pigs, Nigeria
Authors: Igbakura I. Luga, Alex A. Adikwu
Abstract:
A comparison of resistance to quinolones was carried out on isolates of Shiga toxin-producing Escherichia coliO157:H7 from cattle and mecA and nuc genes harbouring Staphylococcus aureus from pigs. The isolates were separately tested in the first and current decades of the 21st century. The objective was to demonstrate the dissemination of resistance to this frontline class of antibiotic by bacteria from food animals and bring to the limelight the spread of antibiotic resistance in Nigeria. A total of 10 isolates of the E. coli O157:H7 and 9 of mecA and nuc genes harbouring S. aureus were obtained following isolation, biochemical testing, and serological identification using the Remel Wellcolex E. coli O157:H7 test. Shiga toxin-production screening in the E. coli O157:H7 using the verotoxin E. coli reverse passive latex agglutination (VTEC-RPLA) test; and molecular identification of the mecA and nuc genes in S. aureus. Detection of the mecA and nuc genes were carried out using the protocol by the Danish Technical University (DTU) using the following primers mecA-1:5'-GGGATCATAGCGTCATTATTC-3', mecA-2: 5'-AACGATTGTGACACGATAGCC-3', nuc-1: 5'-TCAGCAAATGCATCACAAACAG-3', nuc-2: 5'-CGTAAATGCACTTGCTTCAGG-3' for the mecA and nuc genes, respectively. The nuc genes confirm the S. aureus isolates and the mecA genes as being methicillin-resistant and so pathogenic to man. The fluoroquinolones used in the antibiotic resistance testing were norfloxacin (10 µg) and ciprofloxacin (5 µg) in the E. coli O157:H7 isolates and ciprofloxacin (5 µg) in the S. aureus isolates. Susceptibility was tested using the disk diffusion method on Muller-Hinton agar. Fluoroquinolone resistance was not detected from isolates of E. coli O157:H7 from cattle. However, 44% (4/9) of the S. aureus were resistant to ciprofloxacin. Resistance of up to 44% in isolates of mecA and nuc genes harbouring S. aureus is a compelling evidence for the rapid spread of antibiotic resistance from bacteria in food animals from Nigeria. Ciprofloxacin is the drug of choice for the treatment of Typhoid fever, therefore widespread resistance to it in pathogenic bacteria is of great public health significance. The study concludes that antibiotic resistance in bacteria from food animals is on the increase in Nigeria. The National Food and Drug Administration and Control (NAFDAC) agency in Nigeria should implement the World Health Organization (WHO) global action plan on antimicrobial resistance. A good starting point can be coordinating the WHO, Office of International Epizootics (OIE), Food and Agricultural Organization (FAO) tripartite draft antimicrobial resistance monitoring and evaluation (M&E) framework in Nigeria.Keywords: Fluoroquinolone, Nigeria, resistance, Staphylococcus aureus
Procedia PDF Downloads 4584319 Nigerian Central Bank Governor’s Autonomy: Disregard of Procedure for Removal Vis-A-Vis the Rule of Law
Authors: Adeola Ayodele Oluwabiyi
Abstract:
The study undertook an in depth examination of the relevant sections of the Nigerian Constitution and the Central Bank of Nigeria (CBN) Act as it relates to the appointment and removal of the CBN Governor; It analysed the Constitutional issues that arose from the removal of the immediate past Governor of the CBN; and made recommendations as appropriate. The study relied on primary and secondary sources of information. The primary sources included the Constitution of the Federal Republic of Nigeria, Statutes, Conventions and Judicial decisions, while the secondary sources included Books, Journals Articles, Newspapers and Internet Materials. The study revealed that the removal of the CBN Governor was not in accordance with the Nigerian Constitution and the CBN Act that Guarantee such. It also revealed some of the arguments in support of the removal. The study concluded that the removal of the immediate past Governor of CBN was an outright disregard for the rule of law. The study concluded that if Government treat the laws in question with levity and contempt the confidence of the citizens in such government will be seriously eroded and the effect of that will be the beginning of anarchy in replacement of the rule of law. It could also have serious economic implications on the economy of any nation.Keywords: central bank, governor, laws, Nigeria
Procedia PDF Downloads 3964318 Balancing Act: Political Dynamics of Economic and Climatological Security in the Politics of the Middle East
Authors: Zahra Bakhtiari
Abstract:
Middle East countries confront a multitude of main environmental challenges which are inevitable. The unstable economic and political structure which dominates numerous middle East countries makes it difficult to react effectively to unfavorable climate change impacts. This study applies a qualitative methodology and relies on secondary literature aimed to investigate how countries in the Middle East are balancing economic security and climatic security in terms of budgeting, infrastructure investment, political engagement (domestically through discourses or internationally in terms of participation in international organizations or bargaining, etc.) There has been provided an outline of innovative measures in both economic and environmental fields that are in progress in the Middle East countries and what capacity they have for economic development and environmental adaptation, as well as what has already been performed. The primary outcome is that countries that rely more on infrastructure investment such as negative emissions technologies (NET) through green social capital enterprises and political engagement, especially nationally determined contributions (NDCs) commitments and United Nations Framework Convention on Climate Change (UNFCCC), experience more economic and climatological security balance in the Middle East. Since implementing these measures is not the same in all countries in the region, we see different levels of balance between climate security and economic security. The overall suggestion is that the collaboration of both the bottom-up and top-down approaches helps create strategic environmental strategies which are in line with the economic circumstances of each country and creates the desired balance.Keywords: climate change, economic growth, sustainability, the Middle East, green economy, renewable energy
Procedia PDF Downloads 814317 Exploring Entrepreneurship Intension Aptitude along Gender Lines among Business Decision Students in Nigeria
Authors: Paul O. Udofot, Emem B. Inyang
Abstract:
The study investigated the variability in aptitude amidst interactive effects of several social and environmental factors that could influence individual tendencies to engage in entrepreneurship in Nigeria. Consequently, the study targeted a population having similar backgrounds in type and level of higher education that are tailored toward enterprise management and development in the Niger Delta region of Nigeria. A two-stage sampling procedure was used to select 67 respondents. Primarily, the study assessed the salient pattern of entrepreneurship aptitude of respondents, and estimated and analyzed the index against their personal characteristics. Male respondents belonged to two extremes of aptitude index ranges (poor and high). Though female respondents did not exhibit a poor entrepreneurship aptitude index, the incidence percentage of the high index range of entrepreneurship aptitude among male trainees was more than the combined incidence percentage of their female counterparts. Respondents’ backgrounds outside gender presented a serious influence on entrepreneurship uptake likelihood if all situations were normal.Keywords: aptitude, entrepreneurship, entrepreneurial orientation, gender divide, intention, trainee
Procedia PDF Downloads 2874316 Security Analysis of SIMSec Protocol
Authors: Kerem Ok, Cem Cevikbas, Vedat Coskun, Mohammed Alsadi, Busra Ozdenizci
Abstract:
Un-keyed SIM cards do not contain the required security infrastructure to provide end-to-end encryption with Service Providers. Hence, new, emerging, or smart services those require end-to-end encryption between SIM card and a Service Provider is impossible. SIMSec key exchange protocol creates symmetric keys between SIM card and Service Provider. After a successful protocol execution, SIM card and Service Provider creates the symmetric keys and can perform end-to-end data encryption when required. In this paper, our aim is to analyze the SIMSec protocol’s security. According to the results, SIM card and Service Provider can generate keys securely using SIMSec protocol.Keywords: End-to-end encryption, key exchange, SIM card, smart card
Procedia PDF Downloads 2844315 Disability Discrimination in Nigeria Employment Market: A Case Study of Nigeria Airspace Management Agency
Authors: Okupe Temitope Oluwaseun
Abstract:
Purpose: The paper determines the existing position of attitudes to disability in a Nigerian organisation. It further assessed the progress that has been made in relation to employment matters as an indication of the Nigerian employment market. Design/methodology/approach: The paper discusses an investigative study which adopted survey research-based approach involving a Nigerian Management Agency. Findings: The paper finds that, although there have been some steps forward, not much has been done with regard to disability equality in the Nigerian employment market. Lack of education, lack of implementing and enforcing the law, inadequate awareness process and international culture have contributed to the current situation. International culture, in particular, is one of the major attributes to lack of disability equality. For example, in the rural areas, the majority of people believe that disability is a form of witchcraft. This paper argues that these traditions, attitudes, and beliefs make it difficult for an organisation to recruit people with disability. Practical Implications: This paper provides a deeper understanding of how organisations can address attitudes to disability within the workplace in Nigeria. The research findings give a fresher perspective on some of the issues associated with disability in this country. This increased understanding has potential to improve the education and training of staff in this area. Originality/value: A paper which human resources managers in Nigerian organisation and the rest of the world can reflect upon in order to assess their own organisation attitudes to the employment of staff with a disability.Keywords: disability, international culture, Nigeria, attitudes
Procedia PDF Downloads 2574314 e-Learning Security: A Distributed Incident Response Generator
Authors: Bel G Raggad
Abstract:
An e-Learning setting is a distributed computing environment where information resources can be connected to any public network. Public networks are very unsecure which can compromise the reliability of an e-Learning environment. This study is only concerned with the intrusion detection aspect of e-Learning security and how incident responses are planned. The literature reported great advances in intrusion detection system (ids) but neglected to study an important ids weakness: suspected events are detected but an intrusion is not determined because it is not defined in ids databases. We propose an incident response generator (DIRG) that produces incident responses when the working ids system suspects an event that does not correspond to a known intrusion. Data involved in intrusion detection when ample uncertainty is present is often not suitable to formal statistical models including Bayesian. We instead adopt Dempster and Shafer theory to process intrusion data for the unknown event. The DIRG engine transforms data into a belief structure using incident scenarios deduced by the security administrator. Belief values associated with various incident scenarios are then derived and evaluated to choose the most appropriate scenario for which an automatic incident response is generated. This article provides a numerical example demonstrating the working of the DIRG system.Keywords: decision support system, distributed computing, e-Learning security, incident response, intrusion detection, security risk, statefull inspection
Procedia PDF Downloads 4374313 The Interrelationship Between Urban Forest ,Forest Policy And Degraded Lands In Nigeria
Authors: Pius Akindele Adeniyi
Abstract:
The World's tropical forests are disappearing at an alarming rate of more than 200,000 ha per year as a result of deforestation due mainly to population pressures, economic growth, poor management and inappropriate policy. A forest policy determines the role of the sector in a nation's economy and it is formulated in accordance with the objectives of the national economic development. Urban forestry as a concept is relatively new in Nigeria when compared to European and American countries. It consists of growing of trees, shrubs and grass along streets, in parks, and around public or private buildings whose management rests in the hands of the public and private owners. Major urban centers in Nigeria are devoid of efficiently planned tree-planting programs. Hence, various factors militating against environmental improvements, such as climate and other agents of degradation, are highlighted for the necessary attention. The paper discusses the need for forest policy formulation and the objectives of forest policy. Elements of forest policy are also discussed and in particular, those peculiar to urbanization and degraded lands are Forest policy and land-use and policy implementation together with some problem issues in forest policy are discussed while recommendations are given on formulation of a forest policy.Keywords: urban, forest, policy, environment, interaction, degraded
Procedia PDF Downloads 924312 Effect of Cloud Computing on Enterprises
Authors: Amir Rashid
Abstract:
Today is the world of innovations where everyone is looking for a change. Organizations are now looking toward virtualization in order to minimize their computing cost. Cloud Computing has also introduced itself by the means of reducing computing cost. It offers different approach to make computing better by improving utilization and reducing infrastructure and administrative costs. Cloud Computing is basically the amalgamation of Utility Computing and SaaS (Software as a Service). Cloud Computing is quite new to organizations as it is still at its deploying stage. Due to this reason, organizations are not confident whether to adopt it or not. This thesis investigates the problem for organization concerning the security and cost issues. Benefits and drawbacks are being highlighted which organizations can have or suffer in order to adopt Cloud Computing. In Conclusion, Cloud Computing is a better option available for small and medium organizations with a comparison to large companies both in terms of data security and cost.Keywords: cloud computing, security, cost, elasticity, PaaS, IaaS, SaaS
Procedia PDF Downloads 3404311 An Assessment of the Extent and Impact of Motor Insurance Fraud Claims in Nigeria
Authors: Olatokunbo Shoyemi, Mario Brito, Ian Dawson
Abstract:
In recent times, the Nigerian motor insurers have experienced high volume of motor insurance claim pay-outs and insignificant contribution to the net premium income of the Nigerian insurance market, which has been a major concern for the shareholders/stakeholders. It has been argued that there are many factors that have brought about these concerns. However, anecdotal evidence (ongoing debates among industry practitioners) suggests prevalence of fraud due to poor practices in motor insurance business in Nigeria. This study is therefore aimed to carry out an assessment of fraud in motor insurance claims as perceived by experts in the Nigerian insurance market. This study adopted a descriptive research design, and the analysis was built on a survey among insurance experts in Nigeria using a designed questionnaire. A purposive and snowball sampling were used to select our sample (N = 120) - representing a selection of all professionally qualified insurance experts in Nigeria insurance industry. The study found that Nigerian insurance experts (i) largely agree that there is a problematic level of fraud in the Nigerian motor insurance industry; (ii) perceive soft fraud to be about 3 times more common than hard fraud in the Nigerian motor insurance industry, and (iii) strongly agree there are problematic impacts from fraud on the solvency of the Nigerian motor insurers. This paper has provided an empirical understanding of the existence, extent, and impact of fraud risks within the Nigerian insurance market based on expert knowledge and insights rather than, as has often been the case, a reliance on individual anecdotes.Keywords: claims, net premium income, motor insurance, soft fraud, hard fraud
Procedia PDF Downloads 1084310 Secure Content Centric Network
Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris
Abstract:
Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer
Procedia PDF Downloads 6444309 A Multi-Site Knowledge Attitude and Practice Survey of Ebola Virus Disease (EVD) in Nigeria
Authors: Ilyasu G., Ogoina D., Otu AA, Muhammed FD, Ebenso B., Otokpa D., Rotifa S., Tuduo-Wisdom O., Habib AG
Abstract:
Background: The 2014 Ebola Virus Disease (EVD) outbreak was characterized by fear, misconceptions and irrational behaviors. We conducted a knowledge attitude and practice survey of EVD in Nigeria to inform the institution of effective control measures. Methods: Between July 30th and September 30th 2014, a cross-sectional study on knowledge, attitude and practice (KAP) of Ebola Virus Disease (EVD) was undertaken among adults of the general population and healthcare workers (HCW) in three states of Nigeria, including Kano, Cross River and Bayelsa states. Demographic information and data on KAP were obtained using a self-administered standardized questionnaire. The percentage KAP scores were categorized as good and poor. Independent predictors of good knowledge of EVD were ascertained using a binary logistic regression model. Results: Out of 1035 study participants with a median age of 32 years, 648 (62.6%) were males, 846 (81.7%) had tertiary education and 441 (42.6%) were HCW. There were 218, 239 and 578 respondents from Bayelsa, Cross Rivers, and Kano states, respectively. The overall median percentage KAP scores and interquartile ranges (IQR) were 79.46% (15.07%), 95.0% (33.33%), and 49.95% (37.50%), respectively. Out of the 1035 respondents, 470 (45.4%), 544(52.56%), and 252 (24.35%) had good KAP of EVD defined using 80%, 90%, and 70% score cut-offs, respectively. Independent predictors of good knowledge of EVD were a HCW (Odds Ratio-OR-2.89, 95% Confidence interval-CI of 1.41-5.90), reporting ‘moderate to high fear of EVD’ (OR-2.15, 95% CI-1.47-3.13) and ‘willingness to modify habit’ (OR-1.68, 95% CI-1.23-2.30). Conclusion: Our results reveal suboptimal EVD-related knowledge, attitude and practice among adults in Nigeria. To effectively control future outbreaks of EVD in Nigeria, there is a need to institute public sensitization programs that improve understanding of EVD and address EVD-related myths and misconceptions, especially among the general population.Keywords: Ebola, health care worker, knowledge, attitude
Procedia PDF Downloads 2844308 Bitplanes Gray-Level Image Encryption Approach Using Arnold Transform
Authors: Ali Abdrhman M. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression-salt- peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 4364307 Conceptualizing the Cyber Insecurity Risk in the Ethics of Automated Warfare
Authors: Otto Kakhidze, Hoda Alkhzaimi, Adam Ramey, Nasir Memon
Abstract:
This paper provides an alternative, cyber security based a conceptual framework for the ethics of automated warfare. The large body of work produced on fully or partially autonomous warfare systems tends to overlook malicious security factors as in the possibility of technical attacks on these systems when it comes to the moral and legal decision-making. The argument provides a risk-oriented justification to why technical malicious risks cannot be dismissed in legal, ethical and policy considerations when warfare models are being implemented and deployed. The assumptions of the paper are supported by providing a broader model that contains the perspective of technological vulnerabilities through the lenses of the Game Theory, Just War Theory as well as standard and non-standard defense ethics. The paper argues that a conventional risk-benefit analysis without considering ethical factors is insufficient for making legal and policy decisions on automated warfare. This approach will provide the substructure for security and defense experts as well as legal scholars, ethicists and decision theorists to work towards common justificatory grounds that will accommodate the technical security concerns that have been overlooked in the current legal and policy models.Keywords: automated warfare, ethics of automation, inherent hijacking, security vulnerabilities, risk, uncertainty
Procedia PDF Downloads 3574306 Determinants of Smallholder Farmers' Intention to Adopt Jatropha as Raw Material for Biodiesel Production: A Proposed Model for Nigeria
Authors: Abdulsalam Mas’ud
Abstract:
Though Nigerian Biofuel Policy and Incentive was introduced in 2007, however, little if any is known about the impact of such policy for biodiesel development in Nigeria. It can be argued that lack of raw materials is one of the important factors that hinder the proper implementation of the policy. In line with this argument, this study aims to explore the determinants of smallholder farmers’ intention to adopt Jatropha as raw materials for biodiesel development in northern Nigeria, with Jigawa State as area of study. The determinants proposed for investigation covers personal factors, physical factors, institutional factors, economic factors, risk and uncertainty factors as well as social factors. The validation of the proposed model will have the implication of guiding policymakers towards enhancement of farmers’ participation in the Jatropha project for biodiesel raw materials production. The eventual byproducts of the proposed model validation and implementation will be employment generation, poverty reduction, combating dessert encroachment, economic diversification to renewable energy sources and electricity generation.Keywords: adoption, biodiesel, factors, jatropha
Procedia PDF Downloads 3094305 Possible Risks for Online Orders in the Furniture Industry - Customer and Entrepreneur Perspective
Authors: Justyna Żywiołek, Marek Matulewski
Abstract:
Data, is information processed by enterprises for primary and secondary purposes as processes. Thanks to processing, the sales process takes place; in the case of the surveyed companies, sales take place online. However, this indirect form of contact with the customer causes many problems for both customers and furniture manufacturers. The article presents solutions that would solve problems related to the analysis of data and information in the order fulfillment process sent to post-warranty service. The article also presents an analysis of threats to the security of this information, both for customers and the enterprise.Keywords: ordering furniture online, information security, furniture industry, enterprise security, risk analysis
Procedia PDF Downloads 484304 Contributing Factors to Building Failures and Defects in the Nigerian Construction Industry
Authors: Ndibarafinia Tobin
Abstract:
Building defect and failure are common phenomena in the Nigerian construction industry. The activities of the inexperienced labor force in the Nigerian construction industry have tarnished the image of practicing construction professionals in recent past. Defects and collapse can cause unnecessary expenditure, delays, loss of lives, property and left many people injured. They are also generating controversies among parties involved. Also, if this situation is left unanswered and untreated, it will lead to more serious problems in the future upcoming construction projects in Nigeria. Quite a number of factors are responsible for collapse of high-rise, reinforced concrete buildings in Nigeria. Government, professional bodies and stakeholders are asking countless questions as to who should be responsible and how solutions could be proffered. Therefore this study is aimed to identify the contributing factors to high-rise buildings defects and failures in Nigeria, which frequently occur in construction project in order to minimize time and cost and also the roles of professionals and other participants play in the industry in terms of the use of building materials, placement and curing of concrete, modification in the use of a building, collapse of building induced by fire and other causes. The data is collected from questionnaire from various players in construction industry in Nigeria. This study is succeeds in identifying the causes of building failure and also suggesting possible measures to be taken by government and other regulatory bodies in the building industry to avert this and also improve the effectiveness of managing appraisal process of failures and defects in the future.Keywords: building defects, building failures, Nigerian construction industry, professionals
Procedia PDF Downloads 2974303 Spacial Poetic Text throughout Samih al-Qasim's Poetry
Authors: Saleem Abu Jaber, Khaled Igbaria
Abstract:
For readers, space/place is one of the most significant references to reveal deep significances and indications in modern Arabic poetic texts. Generally, when poets evoke places and/or spaces, they do not mean to refer readers to detailed geographic or physical spaces, but to the symbolic significances and dimensions that those spaces have and through which poets encourage spacial awareness in their readers. Recently, as a result, there has been a great deal of interest in research addressing spacial poetic texts and dimensions in modern Arabic poetry in general and in Palestinian poetry in particular. Samih al-Qasim is one of the most recent prominent Palestinian revolutionary poets. Al-Qasim has published six series of poems that are well known in the Arab world. Although several researchers have studied al-Qasim's poetry, to our knowledge, yet no one has studied the aspect of spacial poetic text in his poetry. Therefore, this paper seeks to fill a gap in the scholarship that has not been addressed up to now. This article aims, not only to demonstrate the presence of spacial poetic text and dimensions throughout al-Qasim's poetry, but also to investigate the purpose for which the poet uses spacial poetic text. Our theory is that the poet, consciously and significantly, uses spacial poetic texts to magnify the Palestinian identity of the Palestinian readers. Methodologically, we applied a descriptive analytic method, referencing al-Qasim's poetry, addressing spacial poetic texts practically but not theoretically or statistically.Keywords: spatial poetic text, Samih al-Qasim, space and identity, Palestinian poetry
Procedia PDF Downloads 3134302 Comparative Study of the Earth Land Surface Temperature Signatures over Ota, South-West Nigeria
Authors: Moses E. Emetere, M. L. Akinyemi
Abstract:
Agricultural activities in the South–West Nigeria are mitigated by the global increase in temperature. The unpredictive surface temperature of the area had increased health challenges amongst other social influence. The satellite data of surface temperatures were compared with the ground station Davis weather station. The differential heating of the lower atmosphere were represented mathematically. A numerical predictive model was propounded to forecast future surface temperature.Keywords: numerical predictive model, surface temperature, satellite date, ground data
Procedia PDF Downloads 4744301 The Impacts of Social Media and Digital Environment on the Contemporary Arabic Literature: A Case Study about the Works of Ahlam Mosteghanemi
Authors: Zohreh Ghorbani Madavani, Masoumeh Mikaeili
Abstract:
Social media, as one of the main tools in today’s world, imposes deep impacts on human life, particularly in various cultural and literary areas. By providing platforms for direct communication between writers and audiences, these spaces have made great changes in the styles of literary works, writing, and publishing. The impacts of digital communication are very visible not only in the content of literary works but also in narrative structures, writing styles, and interaction of writers with audiences. Applying an analytical-descriptive approach, the present study investigates the impacts of internet communications and social media on the literary works of the Arab world and describes some instances of such impacts on the works of one of the most reputed contemporary Arab novelists, Ahlam Mosteghanemi. In this study, we specifically emphasize on changes of themes, narrative techniques and writing styles of Mosteghanemi and investigate how she leverages digital environment facilities and potentials in creating works suited to her audiences’ needs and expectations. This study indicates that social media has significantly helped the democratization of authorship and diversity in contemporary Arabic literature and has enabled writers to have more direct and interactive relationship.Keywords: social media, digital impacts, narrative changes, writing style, contemporary literature, Ahlam Mosteghanemi
Procedia PDF Downloads 184300 Civilian and Military Responses to Domestic Security Threats: A Cross-Case Analysis of Belgium, France, and the United Kingdom
Authors: John Hardy
Abstract:
The domestic security environment in Europe has changed dramatically in recent years. Since January 2015, a significant number of domestic security threats that emerged in Europe were located in Belgium, France and the United Kingdom. While some threats were detected in the planning phase, many also resulted in terrorist attacks. Authorities in all three countries instituted special or emergency measures to provide additional security to their populations. Each country combined an additional policing presence with a specific military operation to contribute to a comprehensive security response to domestic threats. This study presents a cross-case analysis of three countries’ civilian and military responses to domestic security threats in Europe. Each case study features a unique approach to combining civilian and military capabilities in similar domestic security operations during the same time period and threat environment. The research design focuses on five variables relevant to the relationship between civilian and military roles in each security response. These are the distinction between policing and military roles, the legal framework for the domestic deployment of military forces, prior experience in civil-military coordination, the institutional framework for threat assessments, and the level of public support for the domestic use of military forces. These variables examine the influence of domestic social, political, and legal factors on the design of combined civil-military operations in response to domestic security threats. Each case study focuses on a specific operation: Operation Vigilant Guard in Belgium, Operation Sentinel in France, and Operation Temperer in the United Kingdom. The results demonstrate that the level of distinction between policing and military roles and the existence of a clear and robust legal framework for the domestic use force by military personnel significantly influence the design and implementation of civilian and military roles in domestic security operations. The findings of this study indicate that Belgium, France and the United Kingdom experienced different design and implementation challenges for their domestic security operations. Belgium and France initially had less-developed legal frameworks for deploying the military in domestic security operations than the United Kingdom. This was offset by public support for enacting emergency measures and the strength of existing civil-military coordination mechanisms. The United Kingdom had a well-developed legal framework for integrating civilian and military capabilities in domestic security operations. However, its experiences in Ireland also made the government more sensitive to public perceptions regarding the domestic deployment of military forces.Keywords: counter-terrorism, democracy, homeland security, intelligence, militarization, policing
Procedia PDF Downloads 1424299 Agricultural Solid Wastes Generation in Nigeria and Their Recycling Potentials into Building Materials
Authors: Usman Aliyu Jalam, Shuaibu Alolo Sumaila, Sa’adiya Iliyasu Muhammed
Abstract:
Modern building industry lays much emphasis on sophisticated materials that have high embodied energy with intrinsic distinctiveness for damaging the environment. But today, advances in solid waste management have resulted in alternative building materials as partial or complete replacement of the conventional materials like cement, aggregate etc particularly for low cost housing. Investigations carried out revealed that an estimated 18.0 million tonnes of agricultural solid wastes are being generated in Nigeria annually. This constitutes a problem not only to the natural environment but also to the built environment more particularly with the way the wastes are being dispose of. The paper has discussed the present status on the generation and utilisation of agricultural solid wastes, their recycling potentials and environmental implications. It further discovered that although considerable quantity of these wastes were found to have the potentials of being recycled as building materials, the availability of the appropriate technology remains a big challenge in the country. Moreover, majority of the wastes type have gained popularity as fuel. As such, the economic and environmental benefits of recycling the wastes and the use of the wastes as fuel need further investigation.Keywords: agricultural waste, building, environment, materials, Nigeria
Procedia PDF Downloads 4004298 Pharmaceutical Equivalence of Some Injectable Gentamicin Generics Used in Veterinary Practice in Nigeria
Authors: F. A. Gberindyer, M. O.Abatan, A. B. Saba
Abstract:
Background: Gentamicin is an aminoglycoside antibiotic used in the treatment of infections caused by Gram-negative aerobic bacteria organisms in human and animals. In Nigeria, there are arrays of multisource generic versions of injectable gentamicin sulphate in the drug markets. There is a high prevalence of counterfeit and substandard drugs in the third world countries with consequent effect on their therapeutic efficacy and safety. Aim: The aim of this study was to investigate pharmaceutical equivalence of some of these generics used in veterinary practice in Nigeria. Methodology: About 20 generics of injectable gentamicin sulphate were sampled randomly across Nigeria but 15 were analyzed for identity and potency. Identity test was done using Fourier transform infra red spectroscopy and the spectral for each product compared with that of the USP reference standard for similarity. Microbiological assay using agar diffusion method with E. coli as a test organism on nutrient agar was employed and the respective diameters of bacterial inhibition zones obtained after 24 hour incubation at 37°C. The percent potency for each product was thereafter calculated and compared with the official specification. Result And Discussion: None of the generics is produced in any African country. About 75 % of the products are imported from China whereas 60 % of the veterinary generics are manufactured in Holland. Absorption spectra for the reference and test samples were similar. Percent potencies of all test products were within the official specification of 95-115 %. Nigeria relies solely on imported injectable gentamicin sulphate products. All sampled generic versions passed both identity and potency tests. Clinicians should ensure that drugs are used rationally since the converse could be contributing to the therapeutic failures reported for most of these generics. Bioequivalence study is recommended to ascertain their interchangeability when parenteral extra venous routes are indicated.Keywords: generics, gentamicin, identity, multisource, potency
Procedia PDF Downloads 4284297 The Potentials of Online Learning and the Challenges towards Its Adoption in Nigeria's Higher Institutions of Learning
Authors: Kuliya Muhammed
Abstract:
This paper examines the potentials of online learning and the challenges to its adoption in Nigeria’s higher institutions of learning. The research would assist in tackling the challenges of online learning adoption and enlighten institutions on the numerous benefits of online learning in Nigeria. The researcher used survey method for the study and questionnaires were used to obtain the needed data from 230 respondents cut across 20 higher institutions in the country. The findings revealed that online learning has the prospect to boost access to learning tools, assist students’ to learn from the comfort of their offices or homes, reduce the cost of learning, and enable individuals to gain self-knowledge. The major challenges in the adoption of e-learning are poor Information and Communication Technology infrastructures, poor internet connectivity where available, lack of Information and Communication Technology background, problem of power supply, lack of commitment by institutions, poor maintenance of Information and Communication Technology tools, inadequate facilities, lack of government funding and fraud. Recommendations were also made at the end of the research work.Keywords: electronic, ICT, institution, internet, learning, technology
Procedia PDF Downloads 3884296 Examining the Relevance of Electoral Commission in Fostering Democratic Governance in Nigeria
Authors: Ahmed Usman
Abstract:
This paper attempts to examine the relevance of an Electoral Commission in the democratic process of governance in Nigeria. However, democratic system and governance present a clear indication of responsive and responsible governments. The idea of a government being responsive and responsible is based on the premise of conventional principles of democracy such as freedom of political, economic and social rights of and individual. More so, upholding of the Rule of Law based on the ground of constitutionalism is a clear manifestation of the democratic governance. The burdens of ascertaining theses democratic ethos rely solely on the constituted election management body known as Independent National Electoral Commission (INEC) for the case of Nigeria. This body is however, saddled with the responsibility of organizing and conducting periodic regular credible election known as free and fair election. The body also, is expected to be neutral, and independent to ensure fair treatment to all. It is on the basis of this fair treatment that credible leaders emerged. To this end, the paper examines the powers, functions and features of Independent National Electoral Commission. More so, the concepts of election and democracy have been operationalized. It is obvious that electoral process in Nigeria is marred with series of problems of which the paper identified and solutions were proffered towards credible, free and fair elections for sustainable democratic governance. In order to succinctly discuss and analyze the issues at stake, Structural Functional Analysis theory is adopted as a theoretical frame work for the paper.Keywords: election, electoral commission, democracy, governance
Procedia PDF Downloads 2094295 Secret Security Smart Lock Using Artificial Intelligence Hybrid Algorithm
Authors: Vahid Bayrami Rad
Abstract:
Ever since humans developed a collective way of life to the development of urbanization, the concern of security has always been considered one of the most important challenges of life. To protect property, locks have always been a practical tool. With the advancement of technology, the form of locks has changed from mechanical to electric. One of the most widely used fields of using artificial intelligence is its application in the technology of surveillance security systems. Currently, the technologies used in smart anti-theft door handles are one of the most potential fields for using artificial intelligence. Artificial intelligence has the possibility to learn, calculate, interpret and process by analyzing data with the help of algorithms and mathematical models and make smart decisions. We will use Arduino board to process data.Keywords: arduino board, artificial intelligence, image processing, solenoid lock
Procedia PDF Downloads 694294 Securing Web Servers by the Intrusion Detection System (IDS)
Authors: Yousef Farhaoui
Abstract:
An IDS is a tool which is used to improve the level of security. We present in this paper different architectures of IDS. We will also discuss measures that define the effectiveness of IDS and the very recent works of standardization and homogenization of IDS. At the end, we propose a new model of IDS called BiIDS (IDS Based on the two principles of detection) for securing web servers and applications by the Intrusion Detection System (IDS).Keywords: intrusion detection, architectures, characteristic, tools, security, web server
Procedia PDF Downloads 4184293 Influence of Different Ripening Agents on the Shelf-Life and Microbial Load of Organic and Inorganic Musaceae, during the Ripening Process, and the Health Implication for Food Security
Authors: Wisdom Robert Duruji
Abstract:
Local farmers and fruit processors in developing countries of West Africa use different ripening agents to accelerate the ripening process of plantain and banana. This study reports on the influence of different ripening agents on the shelf-life and microbial load of organic and inorganic plantain (Musa paradisiaca) and banana (Musa sapientum) during ripening process and the health implication for food security in Nigeria. The experiment consisted of four treatments, namely: Calcium carbide, Irvingia gabonensis fruits, Newbouldia laevis leaves and a control, where no ripening agent was applied to the fingers of plantain and banana. The unripe and ripened plantain and banana were subjected to microbial analysis by isolating their micro flora (Bacteria, Yeast and Mould) using pour plate method. Microbes present in the samples were enumerated, characterized and classified to genera and species. The result indicated that the microbial load of inorganic plantain from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 12.11 cfu/g for ripened; and the microbial load of organic plantain from Obafemi Awolowo University Teaching and Research Farm (OAUTRF) increased from 6.00 for unripe to 11.60 cfu/g for ripened. Also, the microbial load of inorganic banana from (Urban day) open market in Ile-Ife increased from 8.00 for unripe to 11.50 cfu/g for ripened; while the microbial load of organic banana from OAUTRF increased from 6.50 for unripe to 9.40 cfu/g for ripened. The microbial effects of the ripening agents increased from 10.00 for control to 16.00 cfu/g for treated (ripened) organic and inorganic plantain; while that of organic and inorganic banana increased from 7.50 for control to 14.50 cfu/g for ripened. Visual observation for the presence of fungal colonies and deterioration rates were monitored till seven days after the plantain and banana fingers have fully ripened. Inorganic plantain and banana from (Urban day) open market in Ile-Ife are more contaminated than organic plantain and banana fingers from OAUTRF. The ripening accelerators reduced the shelf life, increased senescence, and microbial load of plantain and banana. This study concluded that organic Agriculture is better and microbial friendlier than inorganic farming.Keywords: organic agriculture, food security, Musaceae, calcium carbide, Irvingia gabonensis, Newbouldia laevis
Procedia PDF Downloads 5844292 Sustainable Accommodation Design: Improving Residential Property Shortage for Low-Income People in Nigeria
Authors: Paulinus W. Ihuah, Iyenemi Ibimina Kakulu, Victor A. Akujuru
Abstract:
The development of the residential property is very expensive in Nigeria, especially as it is observed in Port Harcourt, although it is also investment costly in the other cities of Nigeria. The costly development nature incidentally reasons to the high deficits in residential property availability and affordability for the low-income people. Therefore, the main purpose of this paper is to provide sustainable accommodation design, which should improve residential property expensiveness and shortages for the low-income people. This is achieved through investigation of the tangible requirements and needs of the end-user of the property (low-income people), which thereafter would enhance sustainable and affordable residential property accommodation design for the end-users. Both the quantitative and qualitative instruments of data collection were utilised. The quantitative instrument via questionnaires was designed to examine the real needs and r requirement of the low-income people. However, the qualitative instrument via structured interview was espoused for the gathering of professionals’ opinions on the three predicted sustainable accommodation design alternatives. The analysis employed content analysis parameters, which offered a sustainable accommodation design and designed alternatives minimises costs and environmental impacts whereas exploiting the social satisfaction in residential accommodation developments. The finding underscores that sustainable accommodation design and development is practicable in Nigeria, so that cost of residential accommodation provided through this system is cheap to the low-income people. Further, erection of multi-storey residential accommodation units such as bedsit structure by utilising the concrete frame structure and building the internal and external walls with hollow concrete blocks within areas 60-130 square meters is encouraged. This paper philosophy indicates that by using sustainable accommodation design practices in Nigeria, improvements in the costs and shortages of residential accommodation can be attained for low-income people. However, policies support the government cannot be overemphasised for proper implementation of the suggested scheme.Keywords: sustainable accommodation, housing design, residential property, low-income people
Procedia PDF Downloads 2704291 Bitplanes Image Encryption/Decryption Using Edge Map (SSPCE Method) and Arnold Transform
Authors: Ali A. Ukasha
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. The single step parallel contour extraction (SSPCE) method is used to create the edge map as a key image from the different Gray level/Binary image. Performing the X-OR operation between the key image and each bit plane of the original image for image pixel values change purpose. The Arnold transform used to changes the locations of image pixels as image scrambling process. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Gary level image and completely reconstructed without any distortion. Also shown that the analyzed algorithm have extremely large security against some attacks like salt & pepper and JPEG compression. Its proof that the Gray level image can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression, salt and peppers attacks, bitplanes decomposition, Arnold transform, lossless image encryption
Procedia PDF Downloads 497