Search results for: Arabic Fodio Nigeria security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5379

Search results for: Arabic Fodio Nigeria security

4149 Rethinking Entrepreneurship Education as a Remedy for Graduates Unemployment in Nigeria

Authors: Chinwe Susan Oguejiofor, Daniel Osamwonyi Iyioha

Abstract:

Over the last two decades, Nigeria has witnessed an upsurge in graduate unemployment occasioned by the lack of industries and proliferation of tertiary institutions churning out thousands of graduates every year to compete for the few available job space. The astronomical rise in the unemployment rate amongst Nigerian graduates however, is principally assumed to be the defective curricula of the universities and other tertiary institutions whose focus is on training for white-collar jobs. Although graduate unemployment has become a global scourge, its adverse economic impact is believed to be more in developing economies like Nigeria with a huge young population within the working age who cannot seem to find gainful employment to make out a respectable livelihood. Thus, higher institutions especially Universities found itself under pressure and intense competition to produce graduates who can think outside the box and create jobs; hence there was the need to focus on instilling hands-on practical job skills into their students that will make them job creators rather than job seekers on graduation. In the same vein stakeholders in education have continued to lend their voices to the philosophy that the undergraduate curricula should be completely overhauled to accomodate the development of hand-on practical skills and innovative capacity relevant to creating solutions to societal problems. In a bid to correct this anomaly, the Federal Government of Nigeria in conjunction with the Ministry of Commerce, Industry and Investment inaugurated a programme tagged “University Entrepreneurship Development Programme” (UNEDEP) whose objective was basically to promote self-employment among the youth right from the institutions of higher learning. But the question is whether the objectives of the programme have actually been achieved. Despite the inclusion in Nigerian educational curriculum close to two decades now,, one wonder if the essence has been aborted. Thus, the paper focused on the concept of entrepreneurship education, objectives of entrepreneurship education, Graduates unemployment, rethinking entrepreneurship education programme in tertiary institution for employment generation , role of entrepreneurship in job creation, challenges of entrepreneurship education in tertiary institution in Nigeria, conclusion and recommendations were drawn accordingly.

Keywords: rethinking, entrepreneurship education, remedy, unemployment, job creation

Procedia PDF Downloads 79
4148 Stakeholders Views on Why Childhood Obesity is Rising in Lagos, Nigeria

Authors: A. A. Adedini, B. A. Aina, P. U. Ogbo

Abstract:

Child obesity is on the rise globally. According to the World Health Organization, the number of obese children would increase to 70 million by 2025 if no intervention is made. An increase in the prevalence of overweight and obesity amongst school children in Lagos State, Nigeria has been established but specific factors promoting its prevalence are unknown. This aim of this study is to identify the commonly expressed factor(s) responsible for the rise in prevalence of child overweight and obesity in Lagos, Nigeria. Five focus group discussions were conducted with different groups of stake-holders involved in child care, namely: parents, teachers and health workers. Participants were recruited using a purposive sampling method; a validated question guide was employed for the discussion sessions. The discussions were recorded, collated, analysed using Grounded theory to extract themes. Six themes emerged from the discussions as follows: Civilization and lifestyle imbalance resulting from busy work schedules of young mothers leading to adoption of westernized culture promoting preference for processed and fast food meals; insecurity and congestion of the state which discourages out-door activities; ignorance of the populace on the prevalence of child obesity in the state; inadequate educative and enlightenment programmes in schools and by the Nigerian government; myths on child care and body physique and societal perceptions of the children born into affluent homes. Some of the factors responsible for the rise in the prevalence of child obesity in Lagos, Nigeria have been identified. Preventive strategies to control the prevalence of obesity in children residing in Lagos state is considered for further studies.

Keywords: Childhood Obesity, factors, lagos state, stakeholders

Procedia PDF Downloads 376
4147 Client Hacked Server

Authors: Bagul Abhijeet

Abstract:

Background: Client-Server model is the backbone of today’s internet communication. In which normal user can not have control over particular website or server? By using the same processing model one can have unauthorized access to particular server. In this paper, we discussed about application scenario of hacking for simple website or server consist of unauthorized way to access the server database. This application emerges to autonomously take direct access of simple website or server and retrieve all essential information maintain by administrator. In this system, IP address of server given as input to retrieve user-id and password of server. This leads to breaking administrative security of server and acquires the control of server database. Whereas virus helps to escape from server security by crashing the whole server. Objective: To control malicious attack and preventing all government website, and also find out illegal work to do hackers activity. Results: After implementing different hacking as well as non-hacking techniques, this system hacks simple web sites with normal security credentials. It provides access to server database and allow attacker to perform database operations from client machine. Above Figure shows the experimental result of this application upon different servers and provides satisfactory results as required. Conclusion: In this paper, we have presented a to view to hack the server which include some hacking as well as non-hacking methods. These algorithms and methods provide efficient way to hack server database. By breaking the network security allow to introduce new and better security framework. The terms “Hacking” not only consider for its illegal activities but also it should be use for strengthen our global network.

Keywords: Hacking, Vulnerabilities, Dummy request, Virus, Server monitoring

Procedia PDF Downloads 252
4146 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 406
4145 A Decision-Support Tool for Humanitarian Distribution Planners in the Face of Congestion at Security Checkpoints: A Real-World Case Study

Authors: Mohanad Rezeq, Tarik Aouam, Frederik Gailly

Abstract:

In times of armed conflicts, various security checkpoints are placed by authorities to control the flow of merchandise into and within areas of conflict. The flow of humanitarian trucks that is added to the regular flow of commercial trucks, together with the complex security procedures, creates congestion and long waiting times at the security checkpoints. This causes distribution costs to increase and shortages of relief aid to the affected people to occur. Our research proposes a decision-support tool to assist planners and policymakers in building efficient plans for the distribution of relief aid, taking into account congestion at security checkpoints. The proposed tool is built around a multi-item humanitarian distribution planning model based on multi-phase design science methodology that has as its objective to minimize distribution and back ordering costs subject to capacity constraints that reflect congestion effects using nonlinear clearing functions. Using the 2014 Gaza War as a case study, we illustrate the application of the proposed tool, model the underlying relief-aid humanitarian supply chain, estimate clearing functions at different security checkpoints, and conduct computational experiments. The decision support tool generated a shipment plan that was compared to two benchmarks in terms of total distribution cost, average lead time and work in progress (WIP) at security checkpoints, and average inventory and backorders at distribution centers. The first benchmark is the shipment plan generated by the fixed capacity model, and the second is the actual shipment plan implemented by the planners during the armed conflict. According to our findings, modeling and optimizing supply chain flows reduce total distribution costs, average truck wait times at security checkpoints, and average backorders when compared to the executed plan and the fixed-capacity model. Finally, scenario analysis concludes that increasing capacity at security checkpoints can lower total operations costs by reducing the average lead time.

Keywords: humanitarian distribution planning, relief-aid distribution, congestion, clearing functions

Procedia PDF Downloads 82
4144 Saudi Arabia Border Security Informatics: Challenges of a Harsh Environment

Authors: Syed Ahsan, Saleh Alshomrani, Ishtiaq Rasool, Ali Hassan

Abstract:

In this oral presentation, we will provide an overview of the technical and semantic architecture of a desert border security and critical infrastructure protection security system. Modern border security systems are designed to reduce the dependability and intrusion of human operators. To achieve this, different types of sensors are use along with video surveillance technologies. Application of these technologies in a harsh desert environment of Saudi Arabia poses unique challenges. Environmental and geographical factors including high temperatures, desert storms, temperature variations and remoteness adversely affect the reliability of surveillance systems. To successfully implement a reliable, effective system in a harsh desert environment, the following must be achieved: i) Selection of technology including sensors, video cameras, and communication infrastructure that suit desert environments. ii) Reduced power consumption and efficient usage of equipment to increase the battery life of the equipment. iii) A reliable and robust communication network with efficient usage of bandwidth. Also, to reduce the expert bottleneck, an ontology-based intelligent information systems needs to be developed. Domain knowledge unique and peculiar to Saudi Arabia needs to be formalized to develop an expert system that can detect abnormal activities and any intrusion.

Keywords: border security, sensors, abnormal activity detection, ontologies

Procedia PDF Downloads 481
4143 Representation of Phonemic Changes in Arabic Dialect of Yemen: Speech Disorder and Consonant Substitution

Authors: Sadeq Al Yaari, Muhammad Alkhunayn, Adham Al Yaari, Montaha Al Yaari, Ayman Al Yaari, Aayah Al Yaari, Sajedah Al Yaari, Fatehi Eissa

Abstract:

Introduction: Like many dialects, the Arabic dialect of Yemen (ADY) exhibited utterance phonemic distinction- vowel deletion, lengthening, and insertion- that were investigated using speakers from different dialectal backgrounds, with particular focus on the difference typically developing and achieving speakers and those suffering linguistic problems make. Phonological variations were found to be inevitable, suggesting further investigation of consonants to see to what extent they are prone to such phonemic changes. This study investigates the patterns of consonant substitution in ADY by examining if there is a clear-cut line between normal and pathological consonants to decide which of these consonants is substituted more. Methods: A total of hundred and twenty nine Yemeni male participants (age= 6-13) were enrolled in this study. Participants were preassigned into two groups (Articulation disorders (AD) group= 42 and typically developing and achieving group (TD) = 70), each of which consists of five sub-groups in decided sociolinguistic classification. In a 45 minute-session, 180 pictures of commonly used verbs (4 pics/m.) were presented to participants who were asked to impulsively describe these verbs before their production was psychoneurolinguistically and statistically analyzed. Results: There was a pattern of consonant substitution in some dialects that participants from both groups have in common: Voiceless consonants (/t/, /ṣ/,/s/, /ḥ, /k/, /ʃ/, /f//, and /k/) in northern and eastern dialects; voiced consonants (/q/, /gh/, /Ʒ/, /g/,/ḍ/, /b/, and /d/) in southern, eastern, western and central dialects; and voiceless and voiced consonants(/t/, /f/, /Ø/, /ṣ/, /s/, /q/, /gh/, /Ʒ/, /g/,/ḍ/, and /b/) in southern dialect. Voiceless consonants (/t/, /ṣ/,/s/, /ḥ, /k/, /ʃ/, /f//, /Ø/and /k/) found to be substituted more by ADY speakers of both AD and TD groups followed by voiced consonants (/q/, /gh/, /Ʒ/, /g/,/ḍ/,/d/ /b/, and /ð/), nasals (/m/, /n/), mute (/h/), semi-vowels (/w/ and /j/) and laterals (/l/ and /r/). Unexpectedly, a short vowel (/æ/) and two long vowels (/u: and /a:/) were found to substitute consonants in ADY both by AD and TD participants. Conclusions: AD and TD participants of ADY substitute consonants in their dialectal speech. Consonant substitution processes cover not only consonants but extend to include monophthongs. The finding that speakers of ADY substitute consonants in multisyllabic words is probably due to the fact that the sociolinguistic factor plays a pivotal role in the problematic substitution of consonants in ADY speakers. Larger longitudinal studies are necessary to further investigate the effect of sociolinguistic background on phonological variations, notably sound change in the speech of Yemeni TD speakers compared to those with linguistic impairments.

Keywords: consonant substitution, Arabic dialect of Yemen, phonetics, phonology, syllables, articulation disorders

Procedia PDF Downloads 44
4142 CyberSecurity Malaysia: Towards Becoming a National Certification Body for Information Security Management Systems Internal Auditors

Authors: M. S. Razana, Z. W. Shafiuddin

Abstract:

Internal auditing is one of the most important activities for organizations that implement information security management systems (ISMS). The purpose of internal audits is to ensure the ISMS implementation is in accordance to the ISO/IEC 27001 standard and the organization’s own requirements for its ISMS. Competent internal auditors are the main element that contributes to the effectiveness of internal auditing activities. To realize this need, CyberSecurity Malaysia is now in the process of becoming a certification body that certifies ISMS internal auditors. The certification scheme will assess the competence of internal auditors in generic knowledge and skills in management systems, and also in ISMS-specific knowledge and skills. The certification assessment is based on the ISO/IEC 19011 Guidelines for auditing management systems, ISO/IEC 27007 Guidelines for information security management systems auditing and ISO/IEC 27001 Information security management systems requirements. The certification scheme complies with the ISO/IEC 17024 General requirements for bodies operating certification systems of persons. Candidates who pass the exam will be certified as an ISMS Internal Auditor, whose competency will be evaluated every three years.

Keywords: ISMS internal audit, ISMS internal auditor, ISO/IEC 17024, competence, certification

Procedia PDF Downloads 235
4141 Households’ Willingness to Pay for Environmental and General Health Safety during the Advent of Ebola Virus Diseases in Nigeria

Authors: Shittu Bisi Agnes

Abstract:

Studies on households’ willingness to pay for environmental and general health safety in the advent of Ebola virus Diseases in Nigeria was carried out. This is aimed at revealing the means by which the virus was eventually eradicated in Nigeria as widely claimed in the media. This study therefore attempted to determine the environmental and general health condition in the State Of Osun, how socio-economic characteristics of the people affected willingness to pay. And also provide platform for the reduction of environmental and general health problems. Data were collected with the aid of well-structured questionnaire and administer 150 randomly selected people of study area, and oral interview was also utilized. Data collected were analyzed using both descriptive tools and inferential statistics vis-a-viz regression analysis. Findings showed 92.5% of respondents was aware of ebola virus diseases outbreak in Nigeria, 8.5% was unaware of any disease outbreak. And 65.7% of respondents was strongly willing to pay for environmental and general health safety 27.1% was fairly willing, 5.7% was indifferent and 1.7% was unwilling to pay. 5% rated the level of environmental and general health condition in the area has been good, 53.6% rated theirs has been fair, 33.6% as been poor. The average willingness to pay per household per month were #500.00, #250.00, #150.00 and #100.00 respectively for the four categories. It was recommended that policy instruments to increase peoples' income will accelerate eradication of environmental and general health problems, environmental health education in form of talk shop, workshop, lectures and seminars could be organized at the political ward levels, churches, mosque, and at schools. Environmental and general health safety related information could be disseminated through mass media, market women, and functional unions.

Keywords: ebola virus diseases (EVD), socio-economic, safety, pay, Osun

Procedia PDF Downloads 412
4140 Forced Migration and Access to Maternal Healthcare in Internally Displaced Persons Camps in North-Central Nigeria

Authors: Faith O. Olanrewaju

Abstract:

Internal displacement and the vulnerability of women are two critical aspects of forced migration that have dominated both global and local discourses. Statistics show that in November 2021, there were over 2.1 million internally displaced persons (IDPs) in Nigeria. Literature also states that displaced women and girls are more vulnerable than displaced men. They are susceptible to adversative experiences, including various forms of sexual violence and rape. As a result, the displaced women and girls are faced with psychological and physical traumas, including HIV/AIDS as well as unexpected or poorly spaced pregnancies. In addition, the poor condition of living of internally displaced women in IDP camps affects their reproductive health, pregnancy outcomes, and maternal mortality levels. Incontrovertibly, internally displaced women constitute an imperative contributor to the ills of Nigeria's maternal health status, which is the second worse globally and the worst in Africa. World Health Organisation statistics showed that approximately 536,000 girls and women die from pregnancy-related causes globally, and Nigeria accounts for 14% of the global maternal deaths. Undeniably, this supports the claims that maternal mortality remains a challenge in Nigeria and can be exacerbated by internal displacement crises. Therefore, maternal mortality remains a critical impediment to the actualisation of the 3.1 SDG target. Owing to this, concerns arise about the quality of the policy in Nigeria’s health sector. More specifically, this study is concerned with the maternal health care services displaced women receive in IDP camps in the three states affected by internal displacement in north-central Nigeria, an understudied area. The novelty of the study also lies in its comparative investigation of maternal healthcare service delivery in three different camp structures (faith-based, government, and informal IDP camps), a pattern that is absent in literature. Therefore, this study will investigate how the camp structures affect access to maternal health services in the study areas; analyse the successes and challenges in the delivery of maternal health care services to displaced women in the various camps; and recommendation and strategies for reducing maternal healthcare disparities/gaps across IDP camps in Nigeria (should they exist). It will adopt a mixed-method approach and multi-stage sampling technique. A total of 1,152 copies of the study questionnaire will be distributed to displaced pregnant and nursing mothers (PNM); nine focus group discussions will also be held with the displaced PNM; in-depth interviews will be conducted with humanitarian actors, policymakers, and health professionals. The quantitative and qualitative data will be analysed using Statistical Package for Social Science (SPSS) 21.0 and thematic analysis, respectively. The findings of the study will be used to develop a model of care that will address the fragmentations in Nigeria's healthcare system. The findings will also inform the development of best policies and practices in the maternal health of displaced women.

Keywords: forced displacement, internally displaced women, maternal healthcare, maternal mortality

Procedia PDF Downloads 172
4139 SAFECARE: Integrated Cyber-Physical Security Solution for Healthcare Critical Infrastructure

Authors: Francesco Lubrano, Fabrizio Bertone, Federico Stirano

Abstract:

Modern societies strongly depend on Critical Infrastructures (CI). Hospitals, power supplies, water supplies, telecommunications are just few examples of CIs that provide vital functions to societies. CIs like hospitals are very complex environments, characterized by a huge number of cyber and physical systems that are becoming increasingly integrated. Ensuring a high level of security within such critical infrastructure requires a deep knowledge of vulnerabilities, threats, and potential attacks that may occur, as well as defence and prevention or mitigation strategies. The possibility to remotely monitor and control almost everything is pushing the adoption of network-connected devices. This implicitly introduces new threats and potential vulnerabilities, posing a risk, especially to those devices connected to the Internet. Modern medical devices used in hospitals are not an exception and are more and more being connected to enhance their functionalities and easing the management. Moreover, hospitals are environments with high flows of people, that are difficult to monitor and can somehow easily have access to the same places used by the staff, potentially creating damages. It is therefore clear that physical and cyber threats should be considered, analysed, and treated together as cyber-physical threats. This means that an integrated approach is required. SAFECARE, an integrated cyber-physical security solution, tries to respond to the presented issues within healthcare infrastructures. The challenge is to bring together the most advanced technologies from the physical and cyber security spheres, to achieve a global optimum for systemic security and for the management of combined cyber and physical threats and incidents and their interconnections. Moreover, potential impacts and cascading effects are evaluated through impact propagation models that rely on modular ontologies and a rule-based engine. Indeed, SAFECARE architecture foresees i) a macroblock related to cyber security field, where innovative tools are deployed to monitor network traffic, systems and medical devices; ii) a physical security macroblock, where video management systems are coupled with access control management, building management systems and innovative AI algorithms to detect behavior anomalies; iii) an integration system that collects all the incoming incidents, simulating their potential cascading effects, providing alerts and updated information regarding assets availability.

Keywords: cyber security, defence strategies, impact propagation, integrated security, physical security

Procedia PDF Downloads 165
4138 Gender Influence in Yoruba Festivals: A Case Study of Agbaasin Festival in Isanlu-Isin, Kwara State, Nigeria

Authors: Alice Abiodun Atolagbe, Samson Abiodun Atolagbe

Abstract:

All over the world and in the history of mankind, festivals have evolved to celebrate one thing or the other. The Yoruba people are no exemptions and they have several festivals which they celebrate at different times, for different reasons and in different communities. Because mankind is mainly of male and female, most of the festivals involve the two sexes, though different roles are usually assigned. In this paper, the writers examine the influence of gender in Yoruba festival using ‘Agbaasin’ festival in Isanlu-Isin, Kwara State of Nigeria as a case study. A research was conducted by visiting the priests, worshipers, and shrine of ‘Agbaasin’ during which interviews were conducted, documented, and analyzed. It was, thereafter, discovered that men dominated the process of celebrating the ‘Agbaasin’ festival even to the extent of cooking by themselves. The paper recommends that women should be more involved in political and communal activities, government should encourage and sponsor researches on gender issues and that, authors of books and writers of plays should create some fora to encourage women empowerment among the Yoruba people. It is hoped that this paper would contribute to the pool of literature available on gender issues among the Yoruba people of Nigeria.

Keywords: gender, Yoruba, festival, Agbaasin, Isanlu-Isin, Kwara State

Procedia PDF Downloads 322
4137 Religious Diversity, Tolerance, and Understanding: Strategies to Restore Peace in Nigeria

Authors: Mary Emilia Aboekwe

Abstract:

Nigeria is a country with different ethnic groups and diverse religious affiliations. Owing to these differences, there continue to arise at various points and times conflicts. Lives and unquantifiable amounts of property have been lost as a result. It is the aim of this paper to show that despite these diverse religious affiliations, there can be unity and peace. The paper using a phenomenological approach, argues that religion is fundamentally oriented towards peace. Hence, one who is truly religious is to be disposed towards peaceful coexistence. This paper advocates tolerance, respect, appreciation, love, willingness to cooperate, accepting other persons with all they have in common but their differences as well. In other words, there is need for dialogue between the religions, involving inter-religious conference and possible inter-religious prayer services.

Keywords: dialogue, diversity, tolerance, understanding.

Procedia PDF Downloads 112
4136 E-Marketing Strategies and Destination Branding for the Tourism Industry in Nigeria

Authors: Abdullahi Marshal Idris, Murtala Mohammed Alamai, Adama Jummai Idris, Bello Mohammed Gwagwada

Abstract:

The technological revolution of the 1990s have brought about many new opportunities and challenges for the tourism and hospitality industries mostly in Nigeria and with tourism having global industry information as its life-blood and technology becoming fundamental to the ability of the industry to operate effectively and competitively. The whole system of information technologies is being rapidly diffused throughout the tourism industry and no player will escape information technologies impacts. The paper gives an insight into the importance of destination branding and the application of information technologies and the use of Internet in tourism and hospitality industries in Nigeria giving strategic frameworks, providing analysis of the Internet and its impact on these sectors. It also aims to show how technological innovations and information system can be beneficial for destinations companies like game reserves national parks, and other resorts by using the literature of existing efforts in global industry players as well as documented evidences where recommendations for destinations and companies is made to seek to foster the development of this connection by investing considerable resources in marketing activities on social networks and by reinforcing the trust of users, because credibility and reliability are still critical in this area.

Keywords: branding, marketing, technology, tourism product

Procedia PDF Downloads 446
4135 National Directorate of Employment Training and Agricultural-Small and Medium Enterprises Performance in Nigeria

Authors: Festus M. Epetimehin

Abstract:

This study was conducted to identify the effect of National Directorate of Employment (NDE) training on the profit of Agricultural-Small and Medium Enterprises (SMEs) and to evaluate the factors that influenced farmers' participation in NDE training, as well as the type and frequency of training farmers and other agro-allied entrepreneurs in Nigeria. Using a multi-stage sampling procedure, a total of 384 respondents were sampled, including 192 beneficiaries and 192 non-beneficiaries in Oyo and Lagos States, respectively. Data were analysed using Binary Logit regression and Propensity Score Matching techniques. According to the binary logit analysis, respondents’ gender, availability to extension services, and the location of respondent’s operation were determinant factors influencing NDE training enrolment. All identified factors are related to the probability of respondents’ involvement in a positive way. Propensity score matching revealed that Agricultural-SMEs who participated in the NDE program boosted their profit by N341,072.18. The positive outcome of the effect implies that NDE training enhances Agri-SME performance in Nigeria. The study concluded that greater funding should be provided for the NDE for performance-enhancing training of the Agri-SMEs.

Keywords: PSM, binary logit model, Agri-SME

Procedia PDF Downloads 97
4134 Awareness and Perception of Food Safety, Nutrition and Food Security among Omani Women

Authors: Abeer Al Kalbani

Abstract:

Oman is a sub-tropical country with limited water resources, harsh weather and limited soil fertility, constraining food production. Therefore, it largely depends on international markets to assure supply of food. In the light of these circumstances, food security in Oman is defined as the ability of the country to grant the staple food needs of people (e.g. rice, wheat, lentil, sugar, dates, dairy products, fish and plant or vegetable oils). It also involves exporting local goods with high production rates to exchange them with required food products. This concept of food security includes the availability of food through production and/or importing, stability of the market prices during all circumstances, and the ability of people to meet their needs within their income capabilities. As a result, most of the food security work is focused on availability and access dimensions of the issue. Not much research is focused on the utilization aspect of food security in Oman. Although women play a vital role in food security, there is limited research on women’s role in food security neither in Oman nor in neighboring Gulf countries. Women play an important role not only by carrying the responsibility of feeding their families but also by setting the consumption model for the household. Therefore, the research aims to contribute to the work done on food security in Oman and similar regions of the world by studying the role women play at the utilization level. Methods used in this research include Qualitative unstructured interviews, focus groups, survey questionnaire and an experimental study. Based on the FAO definition of food security, it consists of availability, access, utilization and sustainability. Results from a pilot study conducted for this research on two groups of women in Oman; urban and rural women, showed that women in Oman are responsible for achieving these four pillars at the household level. Moreover, awareness of women increased as their educational level increased. Urban women showed more awareness and openness to adopt healthier and proper food related choices than rural women. Urban women seem also more open than rural women to new ideas and concepts and ways to healthier food. However, both urban and rural women claim that no training and educational programs are available for them and awareness of food security in general remains relatively low in both groups. In the light of these findings, this research attempts to further investigate the social beliefs, practices and attitudes women adopt in relation to food purchase, storage, preparation and consumption as considered as important parts of the food system. It also seeks to examine the effect of educational training programs and media on the level of women awareness on the issue.

Keywords: food security, household food security, utilization, role of women

Procedia PDF Downloads 405
4133 Effect of Climate Change on Nutritional Status of Women in Nigeria

Authors: Onu Theresa Chinyere

Abstract:

The study evaluates the perceived effect of climate change on nutritional status of women in Nigeria. Five research questions and two hypotheses were formulated to guide the study. The study adopted a survey and experimental study research design. One thousand two hundred and fifty one (1,250) respondents were selected from different State in Nigeria using multistage sampling technique. The instruments used to collect data were questionnaire and personal interview on socio economic characteristics of respondents, while Anthropometric data (height and weight) were also used. The data was analyzed using t-test statistic, decided at 50% level of significance. The study found that most states in Nigeria experience high winds, warmer and frequent hot days and night over most land areas, droughts and tides during climate change events. The respondent unanimously agree that climate change causes reduction in food yields, decline in food availability/supply, negatively affecting soil quality, carbon fertilization, decreases flexibilities in technology choices to strengthen food production. The Anthropometric analysis shows that out of 1250 women sampled, 560 (44.8%) maintain normal weight, while 405 (32.40%) women were found to be underweight, since their body mass index is less that 18.5. There were few cases of obesity among the surveyed women since only 80 out of 1250 which represent 6.4% of the women were obese. Bases on the findings, the following recommendations were made-local fertilizer should be encouraged to boost foods yield especially during climate change: women should imbibe the culture of preservation or reservoir that will help in mitigating the effects of climate on food intake and nutritional status, especially during the crisis period, among others.

Keywords: climate change, nutrition anthropometric analysis, obesity culture, environment and women among others

Procedia PDF Downloads 426
4132 Emerging Cyber Threats and Cognitive Vulnerabilities: Cyberterrorism

Authors: Oludare Isaac Abiodun, Esther Omolara Abiodun

Abstract:

The purpose of this paper is to demonstrate that cyberterrorism is existing and poses a threat to computer security and national security. Nowadays, people have become excitedly dependent upon computers, phones, the Internet, and the Internet of things systems to share information, communicate, conduct a search, etc. However, these network systems are at risk from a different source that is known and unknown. These network systems risk being caused by some malicious individuals, groups, organizations, or governments, they take advantage of vulnerabilities in the computer system to hawk sensitive information from people, organizations, or governments. In doing so, they are engaging themselves in computer threats, crime, and terrorism, thereby making the use of computers insecure for others. The threat of cyberterrorism is of various forms and ranges from one country to another country. These threats include disrupting communications and information, stealing data, destroying data, leaking, and breaching data, interfering with messages and networks, and in some cases, demanding financial rewards for stolen data. Hence, this study identifies many ways that cyberterrorists utilize the Internet as a tool to advance their malicious mission, which negatively affects computer security and safety. One could identify causes for disparate anomaly behaviors and the theoretical, ideological, and current forms of the likelihood of cyberterrorism. Therefore, for a countermeasure, this paper proposes the use of previous and current computer security models as found in the literature to help in countering cyberterrorism

Keywords: cyberterrorism, computer security, information, internet, terrorism, threat, digital forensic solution

Procedia PDF Downloads 96
4131 Effects of Internet Addiction on Students’ Academic Performance among Some Tertiary Institutions in Oyo State, Nigeria

Authors: Mujidat Lola Olugbode

Abstract:

This study investigates the effects of internet addiction on academic performance among students in some tertiary institutions in Oyo State, Nigeria. A descriptive survey research design was adopted for the study. Two research questions and two hypotheses were answered and tested. The population of the study comprised of all students in five tertiary institutions in Oyo State, Nigeria. Simple random sampling technique was used to select 2550 participants (respondents) from the institutions used for the study, this constituted the sample for the study. The instruments used for data collection was a self-constructed questionnaire on Internet Addiction and Students Academic Performance (IAASAP). The reliability coefficient of the instrument was 0.77. Data collected were analyzed using frequency and percentages, Pearson Product Moment Correlation coefficient (PPMCC) and t-test analysis. The results showed that the students in tertiary institutions in Oyo State were occasionally addicted to internet use. The study also revealed a positive correlation between internet addiction and academic performance. The findings also showed that there was significant difference in the internet addiction between male and female Students. Based on the above findings, the researchers recommended among others that government, educators, parents, counselors, teachers should help redirect the internet use toward academics to ensure greater academic performance.

Keywords: internet, addiction, internet addiction, academic performance, tertiary institution, students

Procedia PDF Downloads 64
4130 Hydrocarbon New Business Opportunities in the Bida Basin of Central Nigeria: Prospect and Challenges

Authors: N. G. Obaje, S. I. Ibrahim, N. Dadi-Mamud, M. K. Musa, I. Yusuf

Abstract:

An integrated study combining geological prospectivity mapping and geophysical aeromagnetic interpretation was carried out to determine hydrocarbon new business opportunities that may exist in the Bida Basin of Central Nigeria. Geological mapping was used to delineate the geological boundaries between the formations which is a significant initial criterion in evaluating hydrocarbon prospectivity. Processed and interpreted geophysical aeromagnetic data over the basin juxtaposed against the geological map has led to ranking of the prospectivity as less prospective, prospective and more prospective. The prospective and more prospective areas constitute new hydrocarbon business opportunities in the basin. The more prospective areas are at Pattishabakolo near Bida and at Kandi near Gulu. Prospective areas cover Badegi, Lemu, Duba, Kutigi, Auna, Mashegu and Mokwa. Geochemical data show that hydrocarbon source rocks exist within the Enagi and Patti formations in the northern and southern sections respectively. The geophysical aeromagnetic data indicates depths of more than 2,000m (> 2 Km) within the identified prospective areas. New business opportunities as used here refer to open acreages in Nigeria’s sedimentary basins that have not been licensed out by the government (Department of Petroleum Resources) to any operator but with significant potentials for commercial hydrocarbon accumulation.

Keywords: hydrocarbon, aeromagnetic, business opportunity, Bida Basin

Procedia PDF Downloads 271
4129 An Entropy Based Novel Algorithm for Internal Attack Detection in Wireless Sensor Network

Authors: Muhammad R. Ahmed, Mohammed Aseeri

Abstract:

Wireless Sensor Network (WSN) consists of low-cost and multi functional resources constrain nodes that communicate at short distances through wireless links. It is open media and underpinned by an application driven technology for information gathering and processing. It can be used for many different applications range from military implementation in the battlefield, environmental monitoring, health sector as well as emergency response of surveillance. With its nature and application scenario, security of WSN had drawn a great attention. It is known to be valuable to variety of attacks for the construction of nodes and distributed network infrastructure. In order to ensure its functionality especially in malicious environments, security mechanisms are essential. Malicious or internal attacker has gained prominence and poses the most challenging attacks to WSN. Many works have been done to secure WSN from internal attacks but most of it relay on either training data set or predefined threshold. Without a fixed security infrastructure a WSN needs to find the internal attacks is a challenge. In this paper we present an internal attack detection method based on maximum entropy model. The final experimental works showed that the proposed algorithm does work well at the designed level.

Keywords: internal attack, wireless sensor network, network security, entropy

Procedia PDF Downloads 455
4128 Development of Geo-computational Model for Analysis of Lassa Fever Dynamics and Lassa Fever Outbreak Prediction

Authors: Adekunle Taiwo Adenike, I. K. Ogundoyin

Abstract:

Lassa fever is a neglected tropical virus that has become a significant public health issue in Nigeria, with the country having the greatest burden in Africa. This paper presents a Geo-Computational Model for Analysis and Prediction of Lassa Fever Dynamics and Outbreaks in Nigeria. The model investigates the dynamics of the virus with respect to environmental factors and human populations. It confirms the role of the rodent host in virus transmission and identifies how climate and human population are affected. The proposed methodology is carried out on a Linux operating system using the OSGeoLive virtual machine for geographical computing, which serves as a base for spatial ecology computing. The model design uses Unified Modeling Language (UML), and the performance evaluation uses machine learning algorithms such as random forest, fuzzy logic, and neural networks. The study aims to contribute to the control of Lassa fever, which is achievable through the combined efforts of public health professionals and geocomputational and machine learning tools. The research findings will potentially be more readily accepted and utilized by decision-makers for the attainment of Lassa fever elimination.

Keywords: geo-computational model, lassa fever dynamics, lassa fever, outbreak prediction, nigeria

Procedia PDF Downloads 94
4127 Sustainable Food Systems and the Importance of Food Safety in Ensuring Sustainability

Authors: Özlem Turan, Şule Turhan

Abstract:

About 1 billion people in the world are suffering from hunger. Approximately 1.3 billion tons of produced food is wasted each year as well. While the waste of industrialized countries is 670 million tons per year, the waste per year in developing countries is estimated as 630 million tons. When evaluated in this respect, the importance of sustainability and food security can be seen clearly. Food safety is defined as taking the necessary measures and eliminating all risk arising from food. The goal of sustainable food security is, protection of consumer health, development of safe food and beverages trade nationally and internationally and to ensure reliable fair trade schemes. In this study, this study will focus on sustainable food systems and food security, by examining the food wastage and losses from environmental and economic point of views and the precautions that need to be taken will be discussed.

Keywords: food, food safety, food systems, sustainability

Procedia PDF Downloads 386
4126 Survey of the Literacy by Radio Project as an Innovation in Literacy Promotion in Nigeria

Authors: Stella Chioma Nwizu

Abstract:

The National Commission for Adult and Non Formal Education (NMEC) in Nigeria is charged with the reduction of illiteracy rate through the development, monitoring, and supervision of literacy programmes in Nigeria. In spite of various efforts by NMEC to reduce illiteracy, literature still shows that the illiteracy rate is still high. According to NMEC/UNICEF, about 60 million Nigerians are non-literate, and nearly two thirds of them are women. This situation forced the government to search for innovative and better approaches to literacy promotion and delivery. The literacy by radio project was adopted as an innovative intervention to literacy delivery in Nigeria because the radio is the cheapest and most easily affordable medium for non-literates. The project aimed at widening access to literacy programmes for the non-literate marginalized and disadvantaged groups in Nigeria by taking literacy programmes to their door steps. The literacy by radio has worked perfectly well in non-literacy reduction in Cuba. This innovative intervention of literacy by radio is anchored on the diffusion of innovation theory by Rogers. The literacy by radio has been going on for fifteen years and the efficacy and contributions of this innovation need to be investigated. Thus, the purpose of this research is to review the contributions of the literacy by radio in Nigeria. The researcher adopted the survey research design for the study. The population for the study consisted of 2,706 participants and 47 facilitators of the literacy by radio programme in the 10 pilot states in Nigeria. A sample of four states made up of 302 participants and eight facilitators were used for the study. Information was collected through Focus Group Discussion (FGD), interviews and content analysis of official documents. The data were analysed qualitatively to review the contributions of literacy by radio project and determine the efficacy of this innovative approach in facilitating literacy in Nigeria. Results from the field experience showed, among others, that more non-literates have better access to literacy programmes through this innovative approach. The pilot project was 88% successful; not less than 2,110 adults were made literate through the literacy by radio project in 2017. However, lack of enthusiasm and commitment on the part of the technical committee and facilitators due to non-payment of honorarium, poor signals from radio stations, interruption of lectures with adverts, low community involvement in decision making in the project are challenges to the success rate of the project. The researcher acknowledges the need to customize all materials and broadcasts in all the dialects of the participants and the inclusion of more civil rights, environmental protection and agricultural skills into the project. The study recommends among others, improved and timely funding of the project by the Federal Government to enable NMEC to fulfill her obligations towards the greater success of the programme, setting up of independent radio stations for airing the programmes and proper monitoring and evaluation of the project by NMEC and State Agencies for greater effectiveness. In an era of the knowledge-driven economy, no one should be allowed to get saddled with the weight of illiteracy.

Keywords: innovative approach, literacy, project, radio, survey

Procedia PDF Downloads 66
4125 Money Laundering and Financing of Terrorism

Authors: Covadonga Mallada Fernández

Abstract:

Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense. In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.

Keywords: control of financial flows, money laundering, terrorism, financing of terrorism

Procedia PDF Downloads 454
4124 A Review on Building Information Modelling in Nigeria and Its Potentials

Authors: Mansur Hamma-Adama, Tahar Kouider

Abstract:

Construction Industry has been evolving since the development of Building Information Modelling (BIM). This technological process is unstoppable; it is out to the market with remarkable case studies of solving the long industry’s history of fragmentation. This industry has been changing over time; United States has recorded the most significant development in construction digitalization, Australia, United Kingdom and some other developed nations are also amongst promoters of BIM process and its development. Recently, a developing country like China and Malaysia are keying into the industry’s digital shift, while very little move is seen in South Africa whose development is considered higher and perhaps leader in the digital transition amongst the African countries. To authors’ best knowledge, Nigerian construction industry has never engaged in BIM discussions hence has no attention at national level. Consequently, Nigeria has no “Noteworthy BIM publications.” Decision makers and key stakeholders need to be informed on the current trend of the industry’s development (BIM in specific) and the opportunities of adopting this digitalization trend in relation to the identified challenges. BIM concept can be traced mostly in Architectural practices than engineering practices in Nigeria. A superficial BIM practice is found to be at organisational level only and operating a model based - “BIM stage 1.” Research to adopting this innovation has received very little attention. This piece of work is literature review based, aimed at exploring BIM in Nigeria and its prospects. The exploration reveals limitations in the literature availability as to extensive research in the development of BIM in the country. Numerous challenges were noticed including building collapse, inefficiencies, cost overrun and late project delivery. BIM has potentials to overcome the above challenges and even beyond. Low level of BIM adoption with reasonable level of awareness is noticed. However, lack of policy and guideline as well as serious lack of experts in the field are amongst the major barriers to BIM adoption. The industry needs to embrace BIM to possibly compete with its global counterpart.

Keywords: adoption, BIM, CAD, construction industry, Nigeria, opportunities

Procedia PDF Downloads 154
4123 Comparison of Security Challenges and Issues of Mobile Computing and Internet of Things

Authors: Aabiah Nayeem, Fariha Shafiq, Mustabshra Aftab, Rabia Saman Pirzada, Samia Ghazala

Abstract:

In this modern era of technology, the concept of Internet of Things is very popular in every domain. It is a widely distributed system of things in which the data collected from sensory devices is transmitted, analyzed locally/collectively then broadcasted to network where action can be taken remotely via mobile/web apps. Today’s mobile computing is also gaining importance as the services are provided during mobility. Through mobile computing, data are transmitted via computer without physically connected to a fixed point. The challenge is to provide services with high speed and security. Also, the data gathered from the mobiles must be processed in a secured way. Mobile computing is strongly influenced by internet of things. In this paper, we have discussed security issues and challenges of internet of things and mobile computing and we have compared both of them on the basis of similarities and dissimilarities.

Keywords: embedded computing, internet of things, mobile computing, wireless technologies

Procedia PDF Downloads 316
4122 Covid-19: Preparedness, Response, and Use of Video Technology in Managing Infection Rate at Lagos University Teaching Hospital, Lagos-Nigeria

Authors: Afolakemi Helen Olaleye, Ogunjobi A. O

Abstract:

Since coronavirus disease 2019 (COVID-19) was first reported in Nigeria, the virus has spread to virtually all sub-Saharan Africa (SSA) countries. In Nigeria, government agencies came together to create a goal-driven taskforce in improving our response against the virus. As COVID-19 international spread has been curtailed, community spread became rampant locally, leading to many health authorities raising concerns over the scarcity of medical consumables and supplies. Here at Lagos university teaching Hospital (LUTH), we present data analysis of COVID-19 infections offered at our Hospital (LUTH) and the surrounding communities. In addition, the adopted innovative solution to control the spread of infection, methods used in filling shortages of consumables, personal protective equipment (PPE), and use of mobile video technology in patient’s consultation. The management style and strategy adopted has led to a decline in infection rates in our community and among our front line staff. The current COVID -19 crisis has created an opportunity to test and demonstrate our pandemic response and control of infectious disease along with the revealed unknown potential in our community.

Keywords: COVID-19, preparedness, response, Lagos university teaching hospital

Procedia PDF Downloads 145
4121 A Study on Abnormal Behavior Detection in BYOD Environment

Authors: Dongwan Kang, Joohyung Oh, Chaetae Im

Abstract:

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors such as information leaks which use the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection and discusses applications of this method in BYOD environment.

Keywords: BYOD, security, anomaly behavior detection, security equipment, communication technologies

Procedia PDF Downloads 324
4120 The Effect of Self and Peer Assessment Activities in Second Language Writing: A Washback Effect Study on the Writing Growth during the Revision Phase in the Writing Process: Learners’ Perspective

Authors: Musbah Abdussayed

Abstract:

The washback effect refers to the influence of assessment on teaching and learning, and this washback effect can either be positive or negative. This study implemented, sequentially, self-assessment (SA) and peer assessment (PA) and examined the washback effect of self and peer assessment (SPA) activities on the writing growth during the revision phase in the writing process. Twenty advanced Arabic as a second language learners from a private school in the USA participated in the study. The participants composed and then revised a short Arabic story as a part of a midterm grade. Qualitative data was collected, analyzed, and synthesized from ten interviews with the learners and from the twenty learners’ post-reflective journals. The findings indicate positive washback effects on the learners’ writing growth. The PA activity enhanced descriptions and meaning, promoted creativity, and improved textual coherence, whereas the SA activity led to detecting editing issues. Furthermore, both SPA activities had washback effects in common, including helping the learners meet the writing genre conventions and developing metacognitive awareness. However, the findings also demonstrate negative washback effects on the learners’ attitudes during the revision phase in the writing process, including bias toward self-evaluation during the SA activity and reluctance to rate peers’ writing performance during the PA activity. The findings suggest that self-and peer assessment activities are essential teaching and learning tools that can be utilized sequentially to help learners tackle multiple writing areas during the revision phase in the writing process.

Keywords: self assessment, peer assessment, washback effect, second language writing, writing process

Procedia PDF Downloads 68