Search results for: Arabic Fodio Nigeria security
4063 Effective Use of Educational Technology for Teaching in Nigerian Colleges of Education
Authors: Edo O. Ekanem, Eme S. Ndeh, Ubong M. Nkok
Abstract:
The role of educational technology in teaching is of great importance because of its systematic way of conceptualizing the execution and evaluation of Educational process. This study therefore examines the use of Educational Technology for teaching in Colleges of Education in south south geo-political zone of Nigeria. Four specific purposes, four research questions and four null hypotheses guided the study. The study adopted descriptive research design of the survey type. A sample of 295 lecturers from six colleges of education was selected using stratified and simple random sampling techniques. The data for this study were collected through a self-designed questionnaire and was analyzed using frequency counts, percentage scores and t-test statistics. The hypotheses for the study were tested at 0.05 significance. Findings from the study reveal that Educational Technology facilities such as Internet, electronic notice boards and projectors were not adequately used for teaching in the Colleges. It was also found that most lecturers use more of visual media than electronic/digital media in the classrooms. Moreover, the study shows that lecturers’ use of educational technology is influenced by their highest academic qualification while their level of awareness about the value of technology in education is not gender based. Lecturers’ lack of competence, inadequate Educational Technology facilities and Power are among the factors that inhibit the adequate use of the facilities. Based on the findings, recommendations were made on how to ensure effective use of Educational Technology for teaching in the Colleges in Nigeria.Keywords: colleges of education, educational technology, teaching, Nigeria
Procedia PDF Downloads 4294062 Analysis of Farmer's Involvement in Public and Private Extension Services in Southwestern Nigeria
Authors: S. O. Ayansina, R. A. Oyeyinka, K. K. Bolarinwa
Abstract:
There is an increasing demand for a functional extension delivery services in Nigeria with a view to meet up with the food and fiber needs of the ever growing population of human and animal respectively. This study was designed to examine farmers’ involvement in public and private extension services in southwestern Nigeria, specifically to explore the farmers’ participation in the two types of organizations involved. It also evaluates the performances of personnel in the organizations. A multi-stage random sampling technique was used to select 30 respondents from each of the three selected organizations in Ogun, Osun and Oyo states in Southwestern Nigeria. Data was collected with interview schedule and analyzed both at descriptive and inferential levels. Kruskal Wallis one-way Analysis of variance was used to test the differences between the participation of beneficiaries who are farmers under the public and private extension services and the level of benefit accrued to them from the various extension organizations involved in the study. Results revealed that private extension organizations were performing better and were more preferred by the beneficiaries. Results of the tested hypotheses as shown by Kruskal Wallis test of difference (x2 = 0.709) S no significant difference between farmers’ participation in the extension services of public and private organizations but however showed significant difference (X2 =12.074) in the benefits achieved by respondents in the two organizations. These include: increased quantity of crop produced, farm income, skill acquisition, and improved education in private extension organizations. Based on this result, it could be inferred that beneficiaries generally preferred private extension organizations because of their effectiveness and vibrancy in programme administration. Public extension is therefore recommended for general overhauling and possibly privatization in order to cater for teeming population of farmers demanding for efficient and functional extension services to better their lots in production, processing and marketing of agricultural produce.Keywords: public and private involvement, extension services, farmers' participation
Procedia PDF Downloads 4044061 Availability, Accessibility and Utilization of Information and Communication Technology in Teaching and Learning Islamic Studies in Colleges of Education, North-Eastern, Nigeria
Authors: Bello Ali
Abstract:
The use of Information and Communication Technology (ICT) in tertiary institutions by lecturers and students has become a necessity for the enhancement of quality teaching and learning. This study examined availability, accessibility and utilization of ICT in Teaching-Learning Islamic Studies in Colleges of Education, North-East, Nigeria. The study adopted multi-stage sampling technique, in which, five out of the eleven Colleges of Education (both Federal and State owned) were purposively selected for the study. Primary data was drawn from the respondents by the use of questionnaire, interviews and observations. The results of the study, generally, indicate that the availability and accessibility to ICT facilities in Colleges of Education in North-East, Nigeria, especially in teaching/learning delivery of Islamic studies were relatively inadequate and rare to lecturers and students. The study further reveals that the respondents’ level of utilization of ICT is low and only few computer packages and internet services were involved in the ICT utilization, which is yet to reach the real expected situation of the globalization and advancement in the application of ICT if compared to other parts of the world, as far as the teaching and learning of Islamic studies is concerned. Observations and conclusion were drawn from the findings and finally, recommendations on how to improve on ICT availability, accessibility and utilization in teaching/ learning were suggested.Keywords: accessibility, availability, college of education, ICT, Islamic studies, learning, North-East, teaching, utilization
Procedia PDF Downloads 3644060 A Proposal to Tackle Security Challenges of Distributed Systems in the Healthcare Sector
Authors: Ang Chia Hong, Julian Khoo Xubin, Burra Venkata Durga Kumar
Abstract:
Distributed systems offer many benefits to the healthcare industry. From big data analysis to business intelligence, the increased computational power and efficiency from distributed systems serve as an invaluable resource in the healthcare sector to utilize. However, as the usage of these distributed systems increases, many issues arise. The main focus of this paper will be on security issues. Many security issues stem from distributed systems in the healthcare industry, particularly information security. The data of people is especially sensitive in the healthcare industry. If important information gets leaked (Eg. IC, credit card number, address, etc.), a person’s identity, financial status, and safety might get compromised. This results in the responsible organization losing a lot of money in compensating these people and even more resources expended trying to fix the fault. Therefore, a framework for a blockchain-based healthcare data management system for healthcare was proposed. In this framework, the usage of a blockchain network is explored to store the encryption key of the patient’s data. As for the actual data, it is encrypted and its encrypted data, called ciphertext, is stored in a cloud storage platform. Furthermore, there are some issues that have to be emphasized and tackled for future improvements, such as a multi-user scheme that could be proposed, authentication issues that have to be tackled or migrating the backend processes into the blockchain network. Due to the nature of blockchain technology, the data will be tamper-proof, and its read-only function can only be accessed by authorized users such as doctors and nurses. This guarantees the confidentiality and immutability of the patient’s data.Keywords: distributed, healthcare, efficiency, security, blockchain, confidentiality and immutability
Procedia PDF Downloads 1844059 Asymmetries in Monetary Policy Response: The Role of Uncertainty in the Case of Nigeria
Authors: Elias Udeaja, Elijah Udoh
Abstract:
Exploring an extended SVAR model (SVAR-X), we use the case of Nigeria to hypothesize for the role of uncertainty as the underlying source of asymmetries in the response of monetary policy to output and inflation. Deciphered the empirical finding is the potential of monetary policy exhibiting greater sensitive to shocks due to output growth than they do to shocks due to inflation in recession periods, while the reverse appears to be the case for a contractionary monetary policy. We also find the asymmetric preference in the response of monetary policy to changes in output and inflation as relatively more pronounced when we control for uncertainty as the underlying source of asymmetries.Keywords: asymmetry response, developing economies, monetary policy shocks, uncertainty
Procedia PDF Downloads 1444058 Soil Properties and Yam Performance as Influenced by Poultry Manure and Tillage on an Alfisol in Southwestern Nigeria
Authors: E. O. Adeleye
Abstract:
Field experiments were conducted to investigate the effect of soil tillage techniques and poultry manure application on the soil properties and yam (Dioscorea rotundata) performance in Ondo, southwestern Nigeria for two farming seasons. Five soil tillage techniques, namely ploughing (P), ploughing plus harrowing (PH), manual ridging (MR), manual heaping (MH) and zero-tillage (ZT) each combined with and without poultry manure at the rate of 10 tha-1 were investigated. Data were obtained on soil properties, nutrient uptake, growth and yield of yam. Soil moisture content, bulk density, total porosity and post harvest soil chemical characteristics were significantly (p>0.05) influenced by soil tillage-manure treatments. Addition of poultry manure to the tillage techniques in the study increased soil total porosity, soil moisture content and reduced soil bulk density. Poultry manure improved soil organic matter, total nitrogen, available phosphorous, exchangeable Ca, k, leaf nutrients content of yam, yam growth and tuber yield relative to tillage techniques plots without poultry manure application. It is concluded that the possible deleterious effect of tillage on soil properties, growth and yield of yam on an alfisol in southwestern Nigeria can be reduced by combining tillage with poultry manure.Keywords: poultry manure, tillage, soil chemical properties, yield
Procedia PDF Downloads 4464057 Levels of Microcystin in the Coastal Waters of Nigeria
Authors: Medina Kadiri
Abstract:
Blue-green otherwise called cyanobacteria, produce an array of biotoxins grouped into five categories notably hapatotoxins, neurotoxins, cytotoxins, dermatotoxins, and irritant toxins. Microcystins which are examples of hepatotoxins produced by blue-green algae Microcystins comprise the most common group of the cyanobacterial toxins. Blue-green algae flourish in aquatic environments, whether marine, brackish or freshwater, producing blooms in different forms such as microscopic, mats, or unsightly odoriferous scums. Microcystins biotoxins cause a plethora of animal and human hazards such as liver damage/cirrhosis and cancer, kidney damage, dermatitis, tinnitus, gastroenteritis, sore throat, nausea, myalgia, neurological problems, respiratory irritation and death. Water samples were collected from coastal regions of Nigeria in March 2014, June 2014, October 2014 and January 2015 and analyzed with Enzyme Linked Immunosorbent Assay (ELISA) kits. Microcystin biotoxin was recorded in all sites both during dry and wet seasons. The range of microcystins found was 0.000041-There was a seasonal trend of increasing microcystin concentrations from March till Octobers and a decrease thereafter. Generally in the oceanic waters, microcystin levels were highest at Cross Rivers in March and January, Barbeach in June and Lekki in October. In the adjoining riverine ecosystems, on the other hand, the highest concentrations of microcystin were observed at Akwa Ibom in March, June and October and in Bayelsa in January. Continuous monitoring and screening of coastal water bodies is suggested to minimize the health risks of cyanobacterial biotoxins to coastal communities of Nigeria.Keywords: biotoxins, harmful algae, marine, microcystin, Nigeria
Procedia PDF Downloads 2844056 English Loanwords in Nigerian Languages: Sociolinguistic Survey
Authors: Surajo Ladan
Abstract:
English has been in existence in Nigeria since colonial period. The advent of English in Nigeria has caused a lot of linguistic changes in Nigerian languages especially among the educated elites and to some extent, even the ordinary people were not spared from this phenomenon. This scenario has generated a linguistic situation which culminated into the creation of Nigerian Pidgin that are conglomeration of English and other Nigerian languages. English has infiltrated the Nigerian languages to a point that a typical Nigerian can hardly talk without code-switching or using one English word or the other. The existence of English loanwords in Nigerian languages has taken another dimension in this scientific and technological age. Most of scientific and technological inventions are products of English language which are virtually adopted into the languages with phonological, morphological, and sometimes semantic variations. This paper is of the view that there should be a re-think and agitation from Nigerians to protect their languages from the linguistic genocide of English which are invariably facing extinction.Keywords: linguistic change, loanword, phenomenon, pidgin
Procedia PDF Downloads 8654055 Use of Galileo Advanced Features in Maritime Domain
Authors: Olivier Chaigneau, Damianos Oikonomidis, Marie-Cecile Delmas
Abstract:
GAMBAS (Galileo Advanced features for the Maritime domain: Breakthrough Applications for Safety and security) is a project funded by the European Space Program Agency (EUSPA) aiming at identifying the search-and-rescue and ship security alert system needs for maritime users (including operators and fishing stakeholders) and developing operational concepts to answer these needs. The general objective of the GAMBAS project is to support the deployment of Galileo exclusive features in the maritime domain in order to improve safety and security at sea, detection of illegal activities and associated surveillance means, resilience to natural and human-induced emergency situations, and develop, integrate, demonstrate, standardize and disseminate these new associated capabilities. The project aims to demonstrate: improvement of the SAR (Search And Rescue) and SSAS (Ship Security Alert System) detection and response to maritime distress through the integration of new features into the beacon for SSAS in terms of cost optimization, user-friendly aspects, integration of Galileo and OS NMA (Open Service Navigation Message Authentication) reception for improved authenticated localization performance and reliability, and at sea triggering capabilities, optimization of the responsiveness of RCCs (Rescue Co-ordination Centre) towards the distress situations affecting vessels, the adaptation of the MCCs (Mission Control Center) and MEOLUT (Medium Earth Orbit Local User Terminal) to the data distribution of SSAS alerts.Keywords: Galileo new advanced features, maritime, safety, security
Procedia PDF Downloads 934054 Cultural Variation in Book-sharing Between U.S. and Nigerian Parents and Their Children
Authors: Mercy Vivian Sulaiman, Pablo Chavajay
Abstract:
This study examined parents ways of supporting and facilitating their first-grade children in a book-activity in Nigeria and the United States. Seventy-five parent-child dyads (38 from Nigeria and 37 from the U.S.) were video recorded constructing narratives around a wordless picture book. Analyses focused on identifying parents’ means of facilitating children’s involvement as well as parents and children's reliance on questions and statements during the shared activity. Nigerian parents assumed a sole narrator approach, guiding the narratives and providing most of the information to their children through referential questions and referential and behavioral statements. Unlike the Nigerian parents, US parents engaged in a shared narrator approach, encouraging and building more on their children's contributions, asking more inferential and yes/no questions, and making more inferential and yes/no statements. Nigerian and US children’s extent and types of questions and statements made during their involvement in the activities varied and their contributions resembled those of their parents in their respective cultural groups. These findings highlight significant cultural variations and similarities in book-sharing practices between parents and children, underscoring the role of parental approaches to children's narrative construction and their impact on their learning.Keywords: book-sharing, cultural differences, parent-child interactions, narrative contributions, Nigeria, united states
Procedia PDF Downloads 254053 “Japan’s New Security Outlook: Implications for the US-Japan Alliance”
Authors: Agustin Maciel-Padilla
Abstract:
This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years.Keywords: us-japan alliance, japan security, great power competition, interoperability
Procedia PDF Downloads 654052 Women Entrepreneurial Skills in Maize Processing and Value Addition in Ogun State, Nigeria
Authors: Wasiu Oyeleke Oyediran
Abstract:
Maize is a common staple food for human consumption and livestock feeds. It provides employment and means of livelihood for women in both rural areas and urban centres in Nigeria. However, the entrepreneurial skills of women engaged in its processing and value addition has not been fully enhanced. This study was therefore carried out to investigate rural women entrepreneurial skills in maize processing and value addition in Ogun State, Nigeria. Snow ball sampling technique was used in the selection of 70 respondents for this study. Data were analyzed with descriptive statistics and chi-square. Results revealed that majority (50.0%) of the respondents were 31 - 40 years of age and 60% of the respondents had spent 6 – 10 years in maize processing. The respondents have great entrepreneurial skills in popcorn (85.7%), corn cake (80.0%), corn balls (64.3%) and kokoro (52.9%) making. The majority of the respondents accessed information and entrepreneurial skills through fellow processors (88.6%) and friends and neighbours (62.9%). Major constraints to maize processing and value addition were scarcity of raw materials during off season periods (95.7%), ineffective preservation methods (88.6%), lack of modern processing equipment (82.9%), and high cost of processing machines (72.9%). Result of chi-square showed that there is significant association between personal characteristics of the respondents and entrepreneurial skills of the women at p < 0.05. It is hereby recommended that subsidized processing equipment should be made available to the maize processors in the study area by the government and NGOs.Keywords: women, entreprenuerial skills, maize prcessing, value addition
Procedia PDF Downloads 2204051 Determinants and Repercussions of International Migration in and Through Libya: Afield Study
Authors: Ihab S. Jweida
Abstract:
Libya is witnessing major shifts in international migration flows resulting frompolitical, economic, social, security and environmental reasons as a result of what it iswitnessing from the elements of a fragile state due to government division, politicalconflicts, security chaos and the spread of terrorist organizations, since the popularuprising in February 2011, which threatens economic, social and security stability andthen The political stability of the Mediterranean basin countries. Therefore, this studycame as a scientific research aimed at analyzing the role of political economy inexplaining international migration with application to the case of Libya during theperiod from 2011-2021. To achieve this objective, the researcher relied on the descriptive approach basedon qualitative and quantitative analysis to analyze studies, reports, and internationalmigration policies in Libya, and conducted an exploratory study based on a personalinterview questionnaire for (670) migrants present in the distribution areas in Libyaand (65) Libyan migrants,Keywords: international, migration, Libya, case
Procedia PDF Downloads 624050 Citation Analysis on the Articles published in Bayero Journal of Pure and Applied Sciences (BAJOPAS), from 2008-2020: An International Journal in Bayero University, Kano, Nigeria
Authors: G. A. Babalola, Yusuf Muhammad
Abstract:
An analysis was carried out on 19,759 citations appended to the References Section of 881 research articles published in Bayero Journal of Pure and Applied Sciences. It was found that journals publications were the most cited source of information among pure and applied sciences scientists with 12,090 (61.2%). The study also revealed that researchers in the field of pure and applied sciences used very current and up to date information sources in writing theirs articles with 10,091 (51.1%) citations and an average mean 11.1 per article in the journal.Keywords: citation analysis, BAJOPAS, journal article, Bayero University Kano, Nigeria
Procedia PDF Downloads 1654049 Evaluating an Educational Intervention to Reduce Pesticide Exposure Among Farmers in Nigeria
Authors: Gift Udoh, Diane S. Rohlman, Benjamin Sindt
Abstract:
BACKGROUND: There is concern regarding the widespread use of pesticides and impacts on public health. Farmers in Nigeria frequently apply pesticides, including organophosphate pesticides which are known neurotoxicants. They receive little guidance on how much to apply or information about safe handling practices. Pesticide poisoning is one of the major hazards that farmers face in Nigeria. Farmers continue to use highly neurotoxic pesticides for agricultural activities. Because farmers receive little or no information on safe handling and how much to apply, they continue to develop severe and mild illnesses caused by high exposures to pesticides. The project aimed to reduce pesticide exposure among rural farmers in Nigeria by identifying hazards associated with pesticide use and developing and pilot testing training to reduce exposures to pesticides utilizing the hierarchy of controls system. METHODS: Information on pesticide knowledge, behaviors, barriers to safety, and prevention methods was collected from farmers in Nigeria through workplace observations, questionnaires, and interviews. Pre and post-surveys were used to measure farmer’s knowledge before and after the delivery of pesticide safety training. Training topics included the benefits and risks of using pesticides, routes of exposure and health effects, pesticide label activity, use and selection of PPE, ways to prevent exposure and information on local resources. The training was evaluated among farmers and changes in knowledge, attitudes and behaviors were collected prior to and following the training. RESULTS: The training was administered to 60 farmers, a mean age of 35, with a range of farming experience (<1 year to > 50 years). There was an overall increase in knowledge after the training. In addition, farmers perceived a greater immediate risk from exposure to pesticides and their perception of their personal risk increased. For example, farmers believed that pesticide risk is greater to children than to adults, recognized that just because a pesticide is put on the market doesn’t mean it is safe, and they were more confident that they could get advice about handling pesticides. Also, there was greater awareness about behaviors that can increase their exposure (mixing pesticides with bare hands, eating food in the field, not washing hands before eating after applying pesticides, walking in fields recently sprayed, splashing pesticides on their clothes, pesticide storage). CONCLUSION: These results build on existing evidence from a 2022 article highlighting the need for pesticide safety training in Nigeria which suggested that pesticide safety educational programs should focus on community-based, grassroots-style, and involve a family-oriented approach. Educating farmers on agricultural safety while letting them share their experiences with their peers is an effective way of creating awareness on the dangers associated with handling pesticides. Also, for rural communities, especially in Nigeria, pesticide safety pieces of training may not be able to reach some locations, so intentional scouting of rural farming communities and delivering pesticide safety training will improve knowledge of pesticide hazards. There is a need for pesticide information centers to be situated in rural farming communities or agro supply stores, which gives rural farmers information.Keywords: pesticide exposure, pesticide safety, nigeria, rural farming, pesticide education
Procedia PDF Downloads 1784048 The Effects of Irregular Immigration Originating from Syria on Turkey's Security Issues
Authors: Muzaffer Topgul, Hasan Atac
Abstract:
After the September 11 attacks, fight against terrorism has risen to higher levels in security concepts of the countries. The following reactions of some nation states have led to the formation of unstable areas in different parts of the World. Especially, in Iraq and Syria, the influences of radical groups have risen with the weakening of the central governments. Turkey (with the geographical proximity to the current crisis) has become a stop on the movement of people who were displaced because of terrorism. In the process, the policies of the Syrian regime resulted in a civil war which is still going on since 2011, and remain as an unresolved crisis. With the extension of the problem, changes occurred in foreign policies of the World Powers; moreover, the ongoing effects of the riots, conflicts of interests of foreign powers, conflicts in the region because of the activities of radical groups increased instability within the country. This case continues to affect the security of Turkey, particularly illegal immigration. It has exceeded the number of two million Syrians who took refuge in Turkey due to the civil war, while continuing uncertainty about the legal status of asylum seekers, besides the security problems of asylum-seekers themselves, there are problems in education, health and communication (language) as well. In this study, we will evaluate the term of immigration through the eyes of national and international law, place the disorganized and illegal immigration in security sphere, and define the elements/components of irregular migration within the changing security concept. Ultimately, this article will assess the effects of the Syrian refuges to Turkey’s short-term, mid-term, and long-term security in the light of the national and international data flows and solutions will be presented to the ongoing problem. While explaining the security problems the data and the donnees obtained from the nation and international corporations will be examined thorough the human security dimensions such as living conditions of the immigrants, the ratio of the genders, especially birth rate occasions, the education circumstances of the immigrant children, the effects of the illegal passing on the public order. In addition, the demographic change caused by the immigrants will be analyzed, the changing economical conditions where the immigrants mostly accumulate, and their participation in public life will be worked on and the economical obstacles sourcing due to irregular immigration will be clarified. By the entire datum gathered from the educational, cultural, social, economic, demographical extents, the regional factors affecting the migration and the role of irregular migration in Turkey’s future security will be revealed by implication to current knowledge sources.Keywords: displaced people, human security, irregular migration, refugees
Procedia PDF Downloads 3084047 Entrepreneurship in Nigeria-Funding and Financing Strategies
Authors: Yusuf Abdullahi
Abstract:
The contribution of entrepreneurship in the economic development cannot be over-emphasized neither it should be underestimated for any reason as this is already a known fact that it plays an important role as a change agent and as a prime mover of economy. In developed or underdeveloped economy, the essence of entrepreneurship is highly significant as this exist in both private as well as public sectors of any economy. The roles of entrepreneurship are worldly acclaimed but yet as laudable as these roles there can be no significant success by any entrepreneur except with availability of finance. Nonetheless, mere availability of finance also cannot guarantee the success of an enterprise but there must be in place appropriate financial strategies for the funding/investment needs of an enterprise. Thus, little has been said when it comes to strategies needed to access various sources of finance. This paper, therefore, establishes appropriate strategies to obtain funds sources of finance by both small and as well as medium enterprises.Keywords: entrepreneurship, Nigeria, financial strategies, economic development
Procedia PDF Downloads 4824046 Accountability Issues in Nigeria
Authors: Victoria Adikpe
Abstract:
The ills of the Nigerian public sector have been identified at various fora to include lack of financial accountability and poor reporting of government performance. With the enthronement of democracy, citizens’ expectations from the government are drifting from the mere provision of public services to efficiency and accountability. One of the major challenges to achieving accountability in Nigeria is the capability of the cash basis of accounting to meet the reporting requirements of policies and programmes of the government. This paper discussed the growing trend in the debate about the adoption of private sector financial management processes in the public sector as part of the public sector reform programmes. The paper does not claim the ultimate superiority of accrual over cash accounting but shows how it will help to further strengthen the quality of government accounting and reporting.Keywords: cash accounting, accrual accounting, accountability, reporting
Procedia PDF Downloads 3454045 Security of Database Using Chaotic Systems
Authors: Eman W. Boghdady, A. R. Shehata, M. A. Azem
Abstract:
Database (DB) security demands permitting authorized users and prohibiting non-authorized users and intruders actions on the DB and the objects inside it. Organizations that are running successfully demand the confidentiality of their DBs. They do not allow the unauthorized access to their data/information. They also demand the assurance that their data is protected against any malicious or accidental modification. DB protection and confidentiality are the security concerns. There are four types of controls to obtain the DB protection, those include: access control, information flow control, inference control, and cryptographic. The cryptographic control is considered as the backbone for DB security, it secures the DB by encryption during storage and communications. Current cryptographic techniques are classified into two types: traditional classical cryptography using standard algorithms (DES, AES, IDEA, etc.) and chaos cryptography using continuous (Chau, Rossler, Lorenz, etc.) or discreet (Logistics, Henon, etc.) algorithms. The important characteristics of chaos are its extreme sensitivity to initial conditions of the system. In this paper, DB-security systems based on chaotic algorithms are described. The Pseudo Random Numbers Generators (PRNGs) from the different chaotic algorithms are implemented using Matlab and their statistical properties are evaluated using NIST and other statistical test-suits. Then, these algorithms are used to secure conventional DB (plaintext), where the statistical properties of the ciphertext are also tested. To increase the complexity of the PRNGs and to let pass all the NIST statistical tests, we propose two hybrid PRNGs: one based on two chaotic Logistic maps and another based on two chaotic Henon maps, where each chaotic algorithm is running side-by-side and starting from random independent initial conditions and parameters (encryption keys). The resulted hybrid PRNGs passed the NIST statistical test suit.Keywords: algorithms and data structure, DB security, encryption, chaotic algorithms, Matlab, NIST
Procedia PDF Downloads 2654044 Ultrasound-Assisted Extraction of Bioactive Compounds from Cocoa Shell and Their Encapsulation in Gum Arabic and Maltodextrin: A Technology to Produce Functional Food Ingredients
Authors: Saeid Jafari, Khursheed Ahmad Sheikh, Randy W. Worobo, Kitipong Assatarakul
Abstract:
In this study, the extraction of cocoa shell powder (CSP) was optimized, and the optimized extracts were spray-dried for encapsulation purposes. Temperature (45-65 ◦C), extraction time (30–60 min), and ethanol concentration (60–100%) were the extraction parameters. The response surface methodology analysis revealed that the model was significant (p ≤ 0.05) in interactions between all variables (total phenolic compound, total flavonoid content, and antioxidant activity as measured by 2,2-Diphenyl-1-picrylhydrazyl (DPPH) and ferric reducing antioxidant power (FRAP assays), with a lack of fit test for the model being insignificant (p > 0.05). Temperature (55 ◦C), time (45 min), and ethanol concentration (60%) were found to be the optimal extraction conditions. For spray-drying encapsulation, some quality metrics (e.g., water solubility, water activity) were insignificant (p > 0.05). The microcapsules were found to be spherical in shape using a scanning electron microscope. Thermogravimetric and differential thermogravimetric measurements of the microcapsules revealed nearly identical results. The gum arabic + maltodextrin microcapsule (GMM) showed potential antibacterial (zone of inhibition: 11.50 mm; lower minimum inhibitory concentration: 1.50 mg/mL) and antioxidant (DPPH: 1063 mM trolox/100g dry wt.) activities (p ≤ 0.05). In conclusion, the microcapsules in this study, particularly GMM, are promising antioxidant and antibacterial agents to be fortified as functional food ingredients for the production of nutraceutical foods with health-promoting properties.Keywords: functional foods, coco shell powder, antioxidant activity, encapsulation, extraction
Procedia PDF Downloads 574043 Disciplinary Problems among Adeyemi College of Education Students in the Ondo State of Nigeria
Authors: Akinyemi Olufunminiyi Akinbobola
Abstract:
This paper analytically discusses the disciplinary problems among Adeyemi College of Education Students in the Ondo State of Nigeria. The paper posits that the causes and types of disciplinary problems experienced by the students are determinacy of disciplinary measures to be taken. The study used a questionnaire titled: Disciplinary Problem Questionnaire (DPQ) to collect data. Five hundred (500) students were randomly sampled in the five schools in the college. The results showed that drug addiction, school curriculum, cultism, peer group influence, overcrowded classroom, political, social, and economic among others are disciplinary problems experienced in the study area. The study made recommendations on how to improve the situation.Keywords: challenges in higher institutions, disciplinary problems, social vices, students’ indiscipline
Procedia PDF Downloads 3954042 Comparative Effects of Homoplastic and Synthetic Pituitary Extracts on Induced Breeding of Heterobranchus longifilis (Valenciennes, 1840) in Indoor Hatchery Tanks in Owerri South East Nigeria
Authors: I. R. Keke, C. S. Nwigwe, O. S. Nwanjo, A. S. Egeruoh
Abstract:
An experiment was carried out at Urban Farm and Fisheries Nigeria Ltd, Owerri Imo State South East Nigeria between February and June 2014 to induce Brood stock of Heterobranchus longifilis (mean wt 1.3kg) in concrete tanks (1.0 x 2.0 x 1.5m) in dimension using a synthetic hormone (Ovaprim) and pituitary extract from Heterobranchus longifilis. Brood stock males were selected as pituitary donors and their weights matched those of females to be injected at 1ml/kg body weight of Fish. Ovaprim, was injected at 0.5ml/kg body weight of female fish. A latency period of 12 hours was allowed after injection of the Brood stock females before stripping the egg and incubation at 23 °C. While incubating the eggs, samples were drawn and the rate of fertilization was determined. Hatching occurred within 33 hours and hatchability rate (%) was determined by counting the active hatchings. The result showed that Ovaprim injected Brood stock eggs fertilized up to 80% while the pituitary from the Heterobranchus longifilis had low fertilization and hatching success 20%. Ovaprim is imported and costly, so more effort is required to enhance the procedures for homoplastic hypophysation.Keywords: heterobranchus longifilis, ovaprim, hypophysation, latency period, pituitary
Procedia PDF Downloads 2164041 Language Rights and the Challenge of National Integration: The Nigerian Experience
Authors: Odewumi Olatunde, Adegun Sunday
Abstract:
Linguistic diversity is seen to complicate attempts to build a stable and cohesive political community. Hence, the challenge of integration is enormous in a multi-ethno-lingual country like Nigeria. In the same vein, justification for minority language rights claims in relation to broader political theories of justice, freedom and democracy cannot be ignored. It is in the light of the fore-going that this paper explores Nigeria’s experiments at language policy and planning(LPP) and the long drawn agitations for self-determination and linguistic freedom by the minority ethnic groups in the polity which has been exacerbated by the National Policy on Education language provisions. The paper succinctly reviews Nigeria’s LPP efforts and its attendant theater of conflicts; explores international attempts at evolving normative principles of freedom and equality for language policy and finally evaluates the position of the Nigerian LPP in the light of evolving international conventions. On this premise, it is concluded that giving a conscientious and honest implementation of the Nigerian language provisions as assessed from their face validity, the nation’s efforts could be exonerated from running afoul of any known civilized values and best practices. It is, therefore, recommended that an effectual and consistent commitment to implementation driven by a renewed political will is what is required for the nation to succeed in this direction.Keywords: integration, rights, challenge, conventions, policy
Procedia PDF Downloads 4144040 An Exploration of Cyberspace Security, Strategy for a New Era
Authors: Laxmi R. Kasaraneni
Abstract:
The Internet connects all the networks, including the nation’s critical infrastructure that are used extensively by not only a nation’s government and military to protect sensitive information and execute missions, but also the primary infrastructure that provides services that enable modern conveniences such as education, potable water, electricity, natural gas, and financial transactions. It has become the central nervous system for the government, the citizens, and the industries. When it is attacked, the effects can ripple far and wide impacts not only to citizens’ well-being but nation’s economy, civil infrastructure, and national security. As such, these critical services may be targeted by malicious hackers during cyber warfare, it is imperative to not only protect them and mitigate any immediate or potential threats, but to also understand the current or potential impacts beyond the IT networks or the organization. The Nation’s IT infrastructure which is now vital for communication, commerce, and control of our physical infrastructure, is highly vulnerable to attack. While existing technologies can address some vulnerabilities, fundamentally new architectures and technologies are needed to address the larger structural insecurities of an infrastructure developed in a more trusting time when mass cyber attacks were not foreseen. This research is intended to improve the core functions of the Internet and critical-sector information systems by providing a clear path to create a safe, secure, and resilient cyber environment that help stakeholders at all levels of government, and the private sector work together to develop the cybersecurity capabilities that are key to our economy, national security, and public health and safety. This research paper also emphasizes the present and future cyber security threats, the capabilities and goals of cyber attackers, a strategic concept and steps to implement cybersecurity for maximum effectiveness, enabling technologies, some strategic assumptions and critical challenges, and the future of cyberspace.Keywords: critical challenges, critical infrastructure, cyber security, enabling technologies, national security
Procedia PDF Downloads 2954039 Urban Security and Social Sustainability in Cities of Developing Countries
Authors: Taimaz Larimian, Negin Sadeghi
Abstract:
Very little is known about the impacts of urban security on the level of social sustainability within the cities of developing countries. Urban security is still struggling to find its position in the social sustainability agenda, despite the significant role of safety and security on different aspects of peoples’ lives. This paper argues that urban safety and security should be better integrated within the social sustainability framework. With this aim, this study investigates the hypothesized relationship between social sustainability and Crime Prevention through Environmental Design (CPTED) approach at the neighborhood scale. This study proposes a model of key influential dimensions of CPTED analyzed into localized factors and sub-factors. These factors are then prioritized using pairwise comparison logic and fuzzy group Analytic Hierarchy Process (AHP) method in order to determine the relative importance of each factor on achieving social sustainability. The proposed model then investigates social sustainability in six case study neighborhoods of Isfahan city based on residents’ perceptions of safety within their neighborhood. Mixed method of data collection is used by using a self-administered questionnaire to explore the residents’ perceptions of social sustainability in their area of residency followed by an on-site observation to measure the CPTED construct. In all, 150 respondents from selected neighborhoods were involved in this research. The model indicates that CPTED approach has a significant direct influence on increasing social sustainability in neighborhood scale. According to the findings, among different dimensions of CPTED, ‘activity support’ and ‘image/ management’ have the most influence on people’s feeling of safety within studied areas. This model represents a useful designing tool in achieving urban safety and security during the development of more socially sustainable and user-friendly urban areas.Keywords: crime prevention through environmental design (CPTED), developing countries, fuzzy analytic hierarchy process (FAHP), social sustainability
Procedia PDF Downloads 3064038 Secure Intelligent Information Management by Using a Framework of Virtual Phones-On Cloud Computation
Authors: Mohammad Hadi Khorashadi Zadeh
Abstract:
Many new applications and internet services have been emerged since the innovation of mobile networks and devices. However, these applications have problems of security, management, and performance in business environments. Cloud systems provide information transfer, management facilities, and security for virtual environments. Therefore, an innovative internet service and a business model are proposed in the present study for creating a secure and consolidated environment for managing the mobile information of organizations based on cloud virtual phones (CVP) infrastructures. Using this method, users can run Android and web applications in the cloud which enhance performance by connecting to other CVP users and increases privacy. It is possible to combine the CVP with distributed protocols and central control which mimics the behavior of human societies. This mix helps in dealing with sensitive data in mobile devices and facilitates data management with less application overhead.Keywords: BYOD, mobile cloud computing, mobile security, information management
Procedia PDF Downloads 3174037 Assessment of Heart Rate, Blood Pressure and Percentage Oxygen Saturation in Young Habitual Shisha Smokers in Kano, Nigeria
Authors: B. I. Waziri, M. A. Yahaya
Abstract:
Background: Practice of shisha smoking involves the use of a multi-stemmed instrument to smoke tobacco or non-tobacco herbal mixture where the smoke is designed to pass through water or other liquid before reaching the smoker. The presence of tobacco content and the use of charcoal when burning the ingredients in this popular practice necessitate for investigation of many physiological parameters of habitual shisha smokers in our environment. Methods: 103 young shisha smokers, regular in the practice for more than three years living in Nasarawa, Kano state, Nigeria, were recruited for the study. The controls were 100 university students (nonsmokers) match for age (18 - 30 years), sex and BMI (20 - 24) with the smokers. Participants with known history of cigarette smoking, cardiovascular or respiratory diseases were excluded. Ethical approval was obtained from the Ministry of Health, Kano Nigeria. Hear rate, blood pressure and percentage oxygen saturation (SPO₂) were measured using stethoscope, sphygmomanometer and pulse oximeter respectively. Data were analyzed using IBM SPSS version 20 and mean values of the measured parameters were compared between the smokers and controls using independent sample t-test. P-values < 0.05 were considered significant. Results: The mean Heart rate was found to be significantly higher (p = 0.01) in the shisha smokers (91.32 ± 0.84) compared to controls (79.19 ± 1.18). Systolic and diastolic blood pressure was also higher (p = 0.00) in the shisha smokers (128.75 ± 1.11 and 85.85 ± 0.78 respectively) compared to controls with the systolic and diastolic pressure of 116.64 ± 0.82 and 80.39 ± 0.83 respectively. SPO₂ was significantly lower (p = 0.00) in the shisha smokers (91.98% ± 0.42%) compared to the controls (97.98 ± 0.18). Conclusion: Habitual Shisha Smoking caused a significant increase in Heart rate, both systolic and diastolic blood pressure and a significant decrease in SPO2 among youth in Kano State, Nigeria.Keywords: blood pressure, heart rate, shisha, youth
Procedia PDF Downloads 1474036 Mechanism for Network Security via Routing Protocols Estimated with Network Simulator 2 (NS-2)
Authors: Rashid Mahmood, Muhammad Sufyan, Nasir Ahmed
Abstract:
The MANETs have lessened transportation and decentralized network. There are numerous basis of routing protocols. We derived the MANETs protocol into three major categories like Reactive, Proactive and hybrid. In these protocols, we discussed only some protocols like Distance Sequenced Distance Vector (DSDV), Ad hoc on Demand Distance Vector (AODV) and Dynamic Source Routing (DSR). The AODV and DSR are both reactive type of protocols. On the other hand, DSDV is proactive type protocol here. We compare these routing protocols for network security estimated by network simulator (NS-2). In this dissertation some parameters discussed such as simulation time, packet size, number of node, packet delivery fraction, push time and speed etc. We will construct all these parameters on routing protocols under suitable conditions for network security measures.Keywords: DSDV, AODV, DSR NS-2, PDF, push time
Procedia PDF Downloads 4334035 Impact of Terrorism as an Asymmetrical Threat on the State's Conventional Security Forces
Authors: Igor Pejic
Abstract:
The main focus of this research will be on analyzing correlative links between terrorism as an asymmetrical threat and the consequences it leaves on conventional security forces. The methodology behind the research will include qualitative research methods focusing on comparative analysis of books, scientific papers, documents and other sources, in order to deduce, explore and formulate the results of the research. With the coming of the 21st century and the rising multi-polar, new world threats quickly emerged. The realistic approach in international relations deems that relations among nations are in a constant state of anarchy since there are no definitive rules and the distribution of power varies widely. International relations are further characterized by egoistic and self-orientated human nature, anarchy or absence of a higher government, security and lack of morality. The asymmetry of power is also reflected on countries' security capabilities and its abilities to project power. With the coming of the new millennia and the rising multi-polar world order, the asymmetry of power can be also added as an important trait of the global society which consequently brought new threats. Among various others, terrorism is probably the most well-known, well-based and well-spread asymmetric threat. In today's global political arena, terrorism is used by state and non-state actors to fulfill their political agendas. Terrorism is used as an all-inclusive tool for regime change, subversion or a revolution. Although the nature of terrorist groups is somewhat inconsistent, terrorism as a security and social phenomenon has a one constant which is reflected in its political dimension. The state's security apparatus, which was embodied in the form of conventional armed forces, is now becoming fragile, unable to tackle new threats and to a certain extent outdated. Conventional security forces were designed to defend or engage an exterior threat which is more or less symmetric and visible. On the other hand, terrorism as an asymmetrical threat is a part of hybrid, special or asymmetric warfare in which specialized units, institutions or facilities represent the primary pillars of security. In today's global society, terrorism is probably the most acute problem which can paralyze entire countries and their political systems. This problem, however, cannot be engaged on an open field of battle, but rather it requires a different approach in which conventional armed forces cannot be used traditionally and their role must be adjusted. The research will try to shed light on the phenomena of modern day terrorism and to prove its correlation with the state conventional armed forces. States are obliged to adjust their security apparatus to the new realism of global society and terrorism as an asymmetrical threat which is a side-product of the unbalanced world.Keywords: asymmetrical warfare, conventional forces, security, terrorism
Procedia PDF Downloads 2624034 An Investigation into Root Causes of Sabotage and Vandalism of Pipes: A Major Environmental Effluence in Niger Delta, Nigeria
Authors: Oshienemen Albert
Abstract:
Human’s activities could be pointed as the root cause of almost all environmental damages/ disasters as we contribute to the activities that are currently damaging the ozone layers (global warming), unusual environmental changes and extreme weather conditions (climate change) in recent times. Nigeria just as every other disaster-prone nation is faced with different types of disasters and environmental calamities, starting from terrorist displacement disasters, flood, drought and oil spill hazards. Oil spillage as an environmental disaster has great consequences not just on the environment but on human health, economy and the entire populace that might be involved, which deem necessary to look into the root causes of the incidents and how it can be curtailed. The different incidents of oil spillages and other oil production consequent on the environment is alarming in the Nigerian context and cannot be overemphasized without a critical investigation and synthesis. This paper investigates the root causes of environmental pollution induced by oil spill hazards from petroleum activities within Niger Delta communities of effects and detailed the potential solutions to reduce the causal factors and reoccurrence of the incidents. This study adopts a desk-based approach, interviews with key members of communities which consist of chiefs, youth leaders, and key women within the high environmental damaged communities. Also, Interviews were conducted with environmental expertise representatives from the oil and gas sectors and representatives from oil spill-related agency. Data were analyzed using thematic techniques. The study shows different influencing factors of sabotage and vandalism of oil facilities as such; marginalization, deprivation of resources utility and resource derivation principles were identified as major contributors to vandalism and sabotage act. The study proposed potential strategies to curtail the root causes of sabotage and vandalism as the major causes of environmental devastations in Nigeria.Keywords: environment, oil spill hazards, Niger delta, Nigeria
Procedia PDF Downloads 191