Search results for: Arabic Fodio Nigeria security
4033 Perception of Rural Dwellers on the Nutritional and Social Values of Mushroom in Oyo State, Nigeria
Authors: S. O. Odebode, O. E. Adelakun
Abstract:
The study assessed the perception of rural dwellers on the nutritional and social values of mushroom in Oyo state, Nigeria. One hundred and forty respondents were sampled and interviewed. Results showed that majority (84.9%) had below secondary education and 81.4 % were married, with fairly large (71.4%) household size (5–8). Also, 52.1% had favourable perception toward the nutritional values and 57.1% toward the social values of mushrooms in the study area. There was significant relationship between sex (X² = 4.673), educational level (X² = 11.969) and perception on the values of mushroom. The knowledge level of respondents on mushroom utilization and production is low in the study area. Farmers’ research field should be established to educate rural dwellers on mushroom farm practices and utilization.Keywords: mushroom, nutritional value, rural dwellers, social value
Procedia PDF Downloads 3204032 Teaching Reading in English: The Neglect of Phonics in Nigeria
Authors: Abdulkabir Abdullahi
Abstract:
Nigeria has not yet welcomed phonics into its primary schools. In government-owned primary schools teachers are functionally ignorant of the stories of the reading wars amongst international scholars. There are few or no Nigerian-authored phonics textbooks, and there has been no government-owned phonics curriculum either. There are few or no academic journal articles on phonics in the country and there is, in fact, a certain danger of confusion between phonics and phonetics among Nigerian publishers, authors, writers and academics as if Nigerian teachers of English and the educational policy makers of the country were unaware of reading failures/problems amongst Nigerian children, or had never heard of phonics or read of the stories of the reading wars or the annual phonics test in the United Kingdom, the United States of America and other parts of the world. It is on this note that this article reviews and examines, in the style of a qualitative inquiry, the body of arguments on phonics, and explores the effectiveness of phonics teaching, particularly, in a second-language learning contexts. While the merit of the paper is, perhaps, situated in its supreme effort to draw global attention to reading failures/problems in Nigeria and the ways the situation may affect English language learning, international academic relations and the educational future of the country, it leaves any quantitative verification of its claims to interested quantitative researchers in the world.Keywords: graphemes, phonics, reading, reading wars, reading theories, phonemic awareness
Procedia PDF Downloads 2334031 Religion: A Tool for Conflict Resolution and Peace in Nigerian Society
Authors: V. U. Onyemauwa
Abstract:
Conflicts have always been part of human societies. So long as there is interaction amongst individuals or societies, there are bound to be conflicts as a result of the fact that interests among individuals and societies vary. The issue of conflict has become one of the regular headlines in the daily news of the Nigerian and global media today. Nigerian polity has suffered from one conflict or another, ranging from religious, civil, political, cultural, regional and ethnic violence. It has been found out that, the most disturbing part of these acts of conflicts in Nigeria and around the globe is that most of them have traced their roots to religion. Even some perpetrators of these acts of conflicts most of the time justify their actions with religion, thereby wrongly making religion an object of conflict and violence. In this regard, the study seeks to project religion as a potent tool for conflict resolution because it has a way of permeating through the hearts of men. It has a special responsibility of identifying conflicts and proffer solutions. It also has to provide theological reasoning as to why and how these conflicts come about and how they can possibly be solved. Religious actors are known to contribute to the processes of structural reform necessary for the restoration of productive social relations and political stability after a period of conflict and human rights abuses. The study examines the modalities for projecting religious conflict management strategies in Nigeria using an analysis of relevant documents as well as Black’s Social Control Theory and Thomas-Kilmann’s Model of Conflict Management as its theoretical frameworks. It recommends for a religiously-based means of conflict resolution in Nigeria. Religious individuals and faith-based organisations, as carriers of religious ideas are implore to play active roles in conflict resolution and peace-building in Nigeria by creating conducive environment for peaceful talks, mediation and reconciliation. This will enhance social cohesion, provides solid foundation for peace, progress and development in the society.Keywords: conflict, peace, religion, resolution
Procedia PDF Downloads 3994030 Efficacy of Teachers' Cluster Meetings on Teachers' Lesson Note Preparation and Teaching Performance in Oyo State, Nigeria
Authors: Olusola Joseph Adesina, Sunmaila Oyetunji Raimi, Olufemi Akinloye Bolaji, Abiodun Ezekiel Adesina
Abstract:
The quality of education and the standard of a nation cannot rise above the quality of the teacher (NPE, 2004). Efforts at improving the falling standard of education in the country call for the need-based assessment of the primary tier of education in Nigeria. It was revealed that the teachers’ standard of performance and pupils’ achievement was below average. Teachers’ cluster meeting intervention was therefore recommended as a step towards enhancing the teachers’ professional competency, efficient and effective proactive and interactive lesson presentation. The study thus determined the impact of the intervention on teachers’ professional performance (lesson note preparation and teaching performance) in Oyo State, Nigeria. The main and interaction effects of the gender of the teachers as moderator variable were also determined. Three null hypotheses guided the study. Pre-test, posttest control group quazi experimental design was adopted for the study. Three hundred intact classes from three hundred different schools were randomly selected into treatment and control groups. Two response instruments-Classroom Lesson Note Preparation Checklist (CLNPC; r = 0.89) Cluster Lesson Observation Checklist (CLOC; r = 0.86) were used for data collection. Mean, Standard deviation and Analysis of Covariance (ANCOVA) were used to analyse the collected data. The results showed that the teachers’ cluster meeting have significant impact on teachers’ lesson note preparation (F(1,295) = 31.607; p < 0.05; η2 = .097) and teaching performance (F(1,295) = 20.849; p < 0.05; η2 = .066) in the core subjects of primary schools in Oyo State, Nigeria. The study therefore recommended among others that teachers’ cluster meeting should be sustained for teachers’ professional development in the State.Keywords: teachers’ cluster meeting, teacher lesson note preparation, teaching performance, teachers’ gender, primary schools in Oyo state
Procedia PDF Downloads 3454029 The Relationship Between Multiculturalism, Religion and Ethnic Relations in Nigeria
Authors: Ahmed Usman, Kaduna State University
Abstract:
This paper explores the intricate relationship between multiculturalism, religion, and ethnic relations, aiming to understand how these elements interact within diverse societies. Multiculturalism, as a societal framework, advocates for the coexistence of diverse cultures, encouraging respect and recognition of different cultural identities. Religion often plays a significant role in shaping cultural identity and influencing values, behaviors, and social norms. Ethnic relations, the dynamics between different ethnic groups, are deeply affected by both multicultural policies and religious practices. The researchers investigate how multicultural policies can either foster harmonious ethnic relations or exacerbate tensions, depending on their implementation and societal reception. It also delves into the role of religion in either bridging or widening ethnic divides. Few studies have focused on the phenomenon. This study highlights the conditions under which multiculturalism and religious diversity contribute to social cohesion through qualitative research methodology in Nigeria. The study findings underscore the importance of inclusive policies, interfaith dialogue, and education in promoting positive ethnic relations in multicultural settings. This research contributes to the broader understanding of how multiculturalism and religion intersect to influence ethnic dynamics, offering insights for policymakers and community leaders aiming to cultivate harmonious, inclusive societies.Keywords: multiculturalism, religion, ethnic relations, Nigeria
Procedia PDF Downloads 314028 A Smart Visitors’ Notification System with Automatic Secure Door Lock Using Mobile Communication Technology
Authors: Rabail Shafique Satti, Sidra Ejaz, Madiha Arshad, Marwa Khalid, Sadia Majeed
Abstract:
The paper presents the development of an automated security system to automate the entry of visitors, providing more flexibility of managing their record and securing homes or workplaces. Face recognition is part of this system to authenticate the visitors. A cost effective and SMS based door security module has been developed and integrated with the GSM network and made part of this system to allow communication between system and owner. This system functions in real time as when the visitor’s arrived it will detect and recognizes his face and on the result of face recognition process it will open the door for authorized visitors or notifies and allows the owner’s to take further action in case of unauthorized visitor. The proposed system is developed and it is successfully ensuring security, managing records and operating gate without physical interaction of owner.Keywords: SMS, e-mail, GSM modem, authenticate, face recognition, authorized
Procedia PDF Downloads 7894027 Understanding the Effect of Fall Armyworm and Integrated Pest Management Practices on the Farm Productivity and Food Security in Malawi
Authors: Innocent Pangapanga, Eric Mungatana
Abstract:
Fall armyworm (FAW) (Spodoptera frugiperda), an invasive lepidopteran pest, has caused substantial yield loss since its first detection in September 2016, thereby threatening the farm productivity food security and poverty reduction initiatives in Malawi. Several stakeholders, including households, have adopted chemical pesticides to control FAW without accounting for its costs on welfare, health and the environment. Thus, this study has used panel data endogenous switching regression model to investigate the impact of FAW and the integrated pest management (IPM) –related practices on-farm productivity and food security. The study finds that FAW substantively reduces farm productivity by seven (7) percent and influences the adoption of IPM –related practices, namely, intercropping, mulching, and agroforestry, by 6 percent, ceteris paribus. Interestingly, multiple adoptions of the IPM -related practices noticeably increase farm productivity by 21 percent. After accounting for potential endogeneity through the endogenous switching regression model, the IPM practices further demonstrate tenfold more improvement on food security, implying the role of the IPM –related practices in containing the effect of FAW at the household level.Keywords: hunger, invasive fall army worms, integrated pest management practices, farm productivity, endogenous switching regression
Procedia PDF Downloads 1384026 The Challenges of Security Sector Governance in West African Democracies-The Ecowas Response Mechanism
Authors: Adamu Buba
Abstract:
As West Africa gradually recovers from the cost of more than a decade of civil conflicts in Liberia, Sierra Leone and Côte d’Ivoire, ECOWAS has continued to place prominence on peace consolidation and the prevention of conflict in the West African Sub-Region. Of particular interest is the recent political uprising in Mali and in this regard, ECOWAS has been repositioning their existing machineries to manage this dispensation more effectively by improving their early warning and mediation capabilities. This paper firstly seeks among other things to provide a conceptual understanding of what security sector governance is, and also highlight the overview of ECOWAS and to closely examine the benchmark for assessing progress in the promotion of democracy and political governance within the sub-region as well as conflict prevention techniques. The views and analysis expressed in this paper is based on secondary method of data collection alone and do not in any way represent the views of the institutions or their representatives involved in this assignment in one way or the other.Keywords: challenges, security, governance, ecowas, response
Procedia PDF Downloads 2564025 Internet-Based Architecture for Machine-to-Machine Communication of a Public Security Network
Authors: Ogwueleka Francisca Nonyelum, Jiya Muhammad
Abstract:
Poor communication between the victims of the burglaries, road and fire accidents and the agencies, and lack of quick emergency response by the agencies is solved through Machine-to-Machine (M2M) communication. A distress caller is expected to make a call through a network to the respective agency for emergency response but due to some challenges, this often becomes arduous and futile. This research puts forth an Internet-based architecture for Machine-to-Machine (M2M) communication to enhance information dissemination in National Public Security Communication System (NPSCS) network. M2M enables the flow of data between machines and machines and ultimately machines and people with information flowing from a machine over a network, and then through a gateway to a system where it is reviewed and acted on. The research findings showed that Internet-based architecture for M2M communication is most suitable for deployment of a public security network which will allow machines to use Internet to talk to each other.Keywords: machine-to-machine (M2M), internet-based architecture, network, gateway
Procedia PDF Downloads 4844024 Housing Delivery in Nigeria’s Urban Areas: The Plight of the Poor in Owerri, Capital of Imo State, Nigeria
Authors: Joachim Onyike
Abstract:
The Federal Government of Nigeria in 2012 came up with a new National Housing Policy; one of its major objectives was to make housing affordable to the poor. Six years down the line, this study was carried out to find out whether the poor have fared better under the new housing policy. Owerri, the capital of Imo State, was adopted as a case study to mirror the situation nationwide. The study population was made up of low-income civil servants, i.e., grade levels 1–6 in the Imo State Civil Service. The study looked at household size, household income, rental levels, house prices, costs of major building materials, land values, land tenure, the interest rate on mortgages, inflation rate, and the status of government interventions, owing to their obvious effect on housing affordability by the low-income earners. The study made use of physical observations, questionnaires, and interviews as well as library studies to elicit relevant information. Housing affordability by the subject population did not improve. It rather dropped. The study came to the conclusion that in spite of the new National Housing Policy, housing affordability by the low-income earners has not improved. The policy as it affects the poor has not been duly implemented by both Federal and State Governments.Keywords: house prices, housing affordability, housing policy, land values, low-income earners
Procedia PDF Downloads 2004023 Mathematics Teachers’ Background Characteristics as a Correlate of Secondary School Students’ Achievement in Mathematics in Gombe State, Nigeria
Authors: Ali Adamu
Abstract:
Teachers’ background characteristics as a correlate of students’ achievement in Mathematics were studied in Gombe State. Pearson Product Moment Correlation Coefficient was used for the analysis. Five Hundred and Twelve (512) students and 20 teachers from 12 schools in Gombe State of Nigeria were used for the study. Students’ Achievement Tests and Mathematics Teachers’ backgrounds were instruments for the study. The findings indicated that teachers’ qualifications, experience of the teacher, and teachers’ personalities had a positive correlation with students’ achievement. Recommendations are made, which include allowing the teachers to go for training as well as the government should ensure recruiting teachers that have experience in the teaching job.Keywords: achievement-test, teachers’ personality, teaching mathematics, teacher-background
Procedia PDF Downloads 1044022 Effective Corporate Image Management as a Strategy for Enhancing Profitability
Authors: Shola Haruna Adeosun, Ajoke F. Adebiyi
Abstract:
Business organizations in Nigeria have failed to realize the role of a good corporate image policy in business dealings. This is probably because they do not understand the concept of corporate image and the necessary tools for promoting it. Corporate image goes beyond attractive products or rendering quality services, advertising and paying good salary. It pervades every aspect of business concern, from the least worker’s personality to the dealings within the organization and with the large society. In the face of the societal dynamics, especially in the business world, brought by technology, companies are faced with stiff competition that maintaining a competitive edge requires aggressive strategies. One of such strategies in effective corporate image management is promotion. This study investigates the strategies that could be deployed in order to build and promote the effective corporate image, as well as enhance profit margins of an organization, using Phinomar Nigeria Limited, Ngwo as case study. The study reveals that Phinomar Nigeria Limited has a laid down corporate image policy but not effectively managed; and that, strategies deployed to promote corporate image are limited; while responses to Phinomar products are fairly high. It, therefore, suggests profitable products but requires periodical improvement in the employee's welfare and work environment; as well as, the need to increase the scope of Phinomar’s social responsibility.Keywords: corporate image, effective, enhancing, management, profitability, strategy
Procedia PDF Downloads 3144021 Caregivers Roles, Care Home Management, Funding and Administration in Challenged Communities: Focus in North Eastern Nigeria
Authors: Chukwuka Justus Iwegbu
Abstract:
Background: A major concern facing the world is providing senior citizens, individuals with disabilities, and other vulnerable groups with high-quality care. This issue is more serious in Nigeria's North Eastern area, where the burden of disease and disability is heavy, and access to care is constrained. This study aims to fill this gap by exploring the roles, challenges and support needs of caregivers, care home management, funding and administration in challenged communities in North Eastern Nigeria. The study will also provide a comprehensive understanding of the current situation and identify opportunities for improving the quality of care and support for caregivers and care recipients in these communities. Methods: A mixed-methods design, including both quantitative and qualitative data collection methods, will be used, and it will be guided by the stress process model of caregiving. The qualitative stage approach will comprise a survey, In-depth interviews, observations, and focus group discussion and the quantitative analysis will be used in order to comprehend the variations between caregiver's roles and care home management. A review of relevant documents, such as care home policies and funding reports, would be used to gather quantitative data on the administrative and financial aspects of care. The data collected will be analyzed using both descriptive statistics and thematic analysis. A sample size of around 200-300 participants, including caregivers, care recipients, care home managers and administrators, policymakers and health care providers, would be recruited. Findings: The study revealed that caregivers in challenged communities in North Eastern Nigeria face significant challenges, including lack of training and support, limited access to funding and resources, and high levels of burnout. Care home management and administration were also found to be inadequate, with a lack of clear policies and procedures and limited oversight and accountability. Conclusion: There is a need for increased investment in training and support for caregivers, as well as a need for improved care home management and administration in challenged communities in North Eastern Nigeria. It also highlights the importance of involving community members in decision-making and planning processes related to care homes and services. The study would contribute to the existing body of knowledge by providing a detailed understanding of the challenges faced by caregivers, care home managers and administrators.Keywords: caregivers, care home management, funding, administration, challenge communities, North Eastern Nigeria
Procedia PDF Downloads 1074020 Challenges in E-Government: Conceptual Views and Solutions
Authors: Rasim Alguliev, Farhad Yusifov
Abstract:
Considering the international experience, conceptual and architectural principles of forming of electron government are researched and some suggestions were made. The assessment of monitoring of forming processes of electron government, intellectual analysis of web-resources, provision of information security, electron democracy problems were researched, conceptual approaches were suggested. By taking into consideration main principles of electron government theory, important research directions were specified.Keywords: electron government, public administration, information security, web-analytics, social networks, data mining
Procedia PDF Downloads 4744019 A Security Cloud Storage Scheme Based Accountable Key-Policy Attribute-Based Encryption without Key Escrow
Authors: Ming Lun Wang, Yan Wang, Ning Ruo Sun
Abstract:
With the development of cloud computing, more and more users start to utilize the cloud storage service. However, there exist some issues: 1) cloud server steals the shared data, 2) sharers collude with the cloud server to steal the shared data, 3) cloud server tampers the shared data, 4) sharers and key generation center (KGC) conspire to steal the shared data. In this paper, we use advanced encryption standard (AES), hash algorithms, and accountable key-policy attribute-based encryption without key escrow (WOKE-AKP-ABE) to build a security cloud storage scheme. Moreover, the data are encrypted to protect the privacy. We use hash algorithms to prevent the cloud server from tampering the data uploaded to the cloud. Analysis results show that this scheme can resist conspired attacks.Keywords: cloud storage security, sharing storage, attributes, Hash algorithm
Procedia PDF Downloads 3904018 Innovative Power Engineering in a Selected Rural Commune
Authors: Pawel Sowa, Joachim Bargiel
Abstract:
This paper presents modern solutions of distributed generation in rural communities aiming at the improvement of energy and environmental security, as well as power supply reliability to important customers (e.g. health care, sensitive consumer required continuity). Distributed sources are mainly gas and biogas cogeneration units, as well as wind and photovoltaic sources. Some examples of their applications in a selected Silesian community are given.Keywords: energy security, mini energy centres , power engineering, power supply reliability
Procedia PDF Downloads 3004017 Federalism, Dual Sovereignty, and the Supreme Court of Nigeria
Authors: Edoba Bright Omoregie
Abstract:
Nigeria became a federation in 1954 six years before it gained independence away from British colonial rule. The country has remained a federation since then despite the challenging circumstances of military rule and civil strife which have tasked its federal credentials. Since 1961, when it first decided a federalism dispute, cases over vertical and horizontal powers have inundated the country’s Supreme Court. In its current practice of federalism after democratic rule was resumed in 1999, the country has witnessed a spell of intergovernmental disputes over a good number of federalism issues. Such conflicts have eventually found their way to the Supreme Court for resolution, not as a final appellate court (which it is in other non-federal matters) but as a court of first and final instance following the constitutional provision granting the court such power. However, in April 2014 one of such disputes was denied hearing by the court when it declined original jurisdiction to determine the matter. The suit was instituted by one state of the federation against the federal government and the other 35 states challenging the collection of value added tax (a consumption tax)on certain goods and services within the state. The paper appraises the rationale of the court’s decision and reason that its decision to decline jurisdiction is the result of an avoidable misunderstanding of the dual sovereignty instituted by the federal system of Nigeria as well as a misconception of the role which the court is constitutionally assigned to play in resolving intergovernmental schisms in the federal system.Keywords: dual sovereignty, federalism, intergovernmental conflict, Supreme Court
Procedia PDF Downloads 5554016 Experience of Intimate Partner Violence and Mental Health Status of Women of Reproductive Age Group in a Rural Community in Southwest Nigeria
Authors: Ayodeji Adebayo, Tolulope Soyannwo, Oluwakemi A. Sigbeku
Abstract:
Intimate Partner Violence (IPV) is a significant public health problem with adverse health consequences. There is increasing evidence of association of IPV with mental health problems. Understanding the association between IPV and mental health status of women of reproductive aged group in the rural communities in Nigeria can provide information to improve maternal health status. Therefore, this study was conducted to examine the relationship between experience of IPV and mental health status of women of reproductive aged group in a rural community in Southwest Nigeria. A community based cross-sectional survey was conducted using a cluster sampling technique to select 283 non-pregnant women of reproductive age group (15-49 years Mental health was assessed based on respondents’ experience of any symptoms of depression, anxiety and/or low self-esteem. IPV was assessed over a period of 12 months and the forms of IPV assessed were emotional, physical and sexual. An interviewer administered questionnaire was used to collect information on experience of IPV, reproductive history and factors influencing mental health. Data was analyzed using descriptive statistics, Chi-square and multivariate logistic regression at 5% level of significance. The mean age of respondents was 26.1± 7.8 with 57.1% aged 15-24years. More than half (58.0%) were married. Overall, 60.7% of respondents had mental health problems while 84.8% experienced all categories of violence. The pattern of IPV includes physical violence (10.7%), emotional violence (82.7%) and sexual violence (20.8%). Women who experienced sexual violence by a partner are most likely to suffer from all mental issues. Also, gynaecological morbidities are associated with increasing risk of mental health problems. The research demonstrates an urgent need for mental health policies to recognize the relationship between intimate partner violence, gynaecological morbidities and mental health problems in women in Nigeria.Keywords: intimate partner violence, mental health, reproductive age group, women
Procedia PDF Downloads 3334015 Secure Mobile E-Business Applications
Authors: Hala A. Alrumaih
Abstract:
It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy. One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly. Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.Keywords: e-business, mobile applications, risk mitigations, security assurance
Procedia PDF Downloads 2954014 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)
Authors: Reham Al-Zahrani, Noura Aleisa
Abstract:
The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols
Procedia PDF Downloads 654013 Information Needs of Cassava Processors on Small-Scale Cassava Processing in Oyo State, Nigeria
Authors: Rafiat Bolanle Fasasi-Hammed
Abstract:
Cassava is an important food crop in rural households of Nigeria. It has a high potential for product diversification, because it can be processed into various products forms for human consumption and can be made into chips for farm animals, and also starch and starch derivatives. However, cassava roots are highly perishable and contain potentially toxic cyanogenic glycosides which necessitate its processing. Therefore, this study was carried out to assess information needs of cassava processors on food safety practices in Oyo State, Nigeria. Simple random sampling technique was used in the selection of 110 respondents for this study. Descriptive statistics and chi-square were used to analyze the data collected. Results of this study showed that the mean age of the respondents was 39.4 years, majority (78.7%) of the respondents was married, 51.9% had secondary education; 45.8% of the respondents have spent more than 12 years in cassava processing. The mean income realized was ₦26,347.50/month from cassava processing. Information on cassava processing got to the respondents through friends, family and relations (73.6%) and fellow cassava processors (58.6%). Serious constraints identified were ineffective extension agents (93.9%), food safety regulatory agencies (88.1%) and inadequate processing and storage facilities (67.8%). Chi-square results showed that significant relationship existed between socio-economic characteristics of the respondents (χ2 = 29.80, df = 2,), knowledge level (χ2 = 9.26, df = 4), constraints (χ2 = 13.11, df = 2) and information needs at p < 0.05 level of significance. The study recommends that there should be regular training on improved cassava processing methods for the cassava processors in the study area.Keywords: information, needs, cassava, Oyo State, processing
Procedia PDF Downloads 3024012 Destination Nollywood: A Newspaper Analysis of the Connections between Film and Tourism in Nigeria, 2012-2022
Authors: E. S. Martens, E. E. Onwuliri
Abstract:
Over the past three decades, Nigeria’s film industry has become a global powerhouse, releasing hundreds of films annually and even monthly. Nollywood, a portmanteau of Nigeria and Hollywood as well as Bollywood that was coined by New York Times journalist Norimitsu Onishi in 2002, came to mark the plenitude of filmmaking happening in Lagos from the early 1990s onwards. Following the success of the 1992 straight-to-VHS film Living in Bondage, the Nigerian film industry experienced a popular home video boom that gained a huge following in Nigeria, across Africa, and among the global African diaspora. In fact, with an estimated worth of $6.4 billion as of 2021, Nollywood is nowadays considered the world’s second-largest film industry and even the largest in terms of output and popularity. Producing about 2,500 films annually and reaching an estimated audience of over 200 million people worldwide, Nollywood has not only seemingly surpassed Hollywood but also Bollywood with regard to production and consumption size. Due to its commercial success and cultural impact from the early 2010s, Nollywood has often been heralded as a potential driver of Africa’s tourism industry. In its 2012 Global Trends Report, the World Travel Market forecasted an increase in GDP in Africa due to tourism in Nollywood filming locations. Additionally, it was expected that the rising popularity of Nollywood would significantly contribute to growth in the leisure sector, drawing both film enthusiasts and business travelers intrigued by the expanding significance of the Nigerian film industry. Still, despite much talk about the potential impact of Nollywood on Nigerian tourism in the past 10 years or so, relatively little is known about Nollywood’s association with film tourism and the existing connections between Nigeria’s film and tourism industries more generally. Already well over a decade ago, it was observed that there is still a lack of research examining the extent to which film tourism related to Nollywood in Africa has been generated – and to date, this is still largely the case. This paper, then, seeks to discuss the reported connections between Nollywood and tourism and to review the efforts and opportunities related to Nollywood film tourism as suggested in Nigeria’s public domain. Based on a content analysis of over 50 newspaper articles and other online available materials, such as websites, blogs and forums, this paper explores the practices and discourses surrounding Nollywood connections with tourism in Nigeria and across Africa over the past ten years. The analysis shows that, despite these high expectations, film tourism related to Nollywood has remained limited. Despite growing government attention and support to Nollywood and its potential for tourism, most state initiatives in this direction have not (yet) materialize – and it very much remains to be seen to what extent ‘Destination Nollywood’ is really able to come to fruition as long as the structural issues underlying the development of Nigerian film (and) tourism are not sufficiently addressed.Keywords: film tourism, Nigerian cinema, Nollywood, tourist destination
Procedia PDF Downloads 494011 Evaluation of Food Safety and Security Practices in Midday Meal Programmes in Rural Areas of Beed District
Authors: Nuzhat Sultana M. B.
Abstract:
Children are high-risk population in terms of food born illnesses. Food safety and security are the most important aspect of the success of midday meal programmes. Improper holding temperatures, cross-contamination and poor personal hygiene of food handlers are the main causes for the prevalence of pathogenic microbes in the food servicing areas. Two hundred and fifty preschool children in the age of 3 to 6 years from urban and rural anganwadies (pre school center) of Beed district were selected. Nutritional status of preschool children were assessed by anthropometrical and clinical measurement. The study assessed the food safety and security with the help of personal hygiene and other safety measures maintained by the food personnel working for midday meal programme, supplying mid meals to children in govt. anganwadies (pre school center). The hygiene level, sanitary condition and microbial quality of food and water, pathological health examination of food handlers were assessed with the help of checklist. A questionnaire was designed to evaluate knowledge, attitude, and practices of food handlers. Results of the study show that the nutritional and health status of rural and urban preschool children was very poor. Many of the food handlers were not aware of general knowledge and hygiene practices to be followed during food preparation areas. An intervention programme of education and importing training at workplaces has shown a positive impact on the outcome of safety and security practices and safe, hygienic practices of food handlers at workplace.Keywords: food, health, preschool children, safety, security
Procedia PDF Downloads 2034010 Solar Energy: The Alternative Electric Power Resource in Tropical Nigeria
Authors: Okorowo Cyril Agochi
Abstract:
More than ever human activity relating to uncontrolled greenhouse gas (GHG) and its effects on the earth is gaining greater attention in the global academic and policy discussions. Activities of man has greatly influenced climate change over the years as a result of consistent increase in the use of fossil fuel energy. Scientists and researchers globally are making significant and devoted efforts towards the development and implementation of renewable energy technologies that are harmless to the environment. One of such energy is solar energy with its source from the sun. There are currently two primary ways of harvesting this energy from the sun: through photovoltaic (PV) panels and through thermal collectors. This work discuses solar energy the abundant renewable energy in the tropical Nigeria, processes of harvesting and recommends same as an alternative means of electric power generation in a time the demand for power supersedes supply.Keywords: electric, power, renewable energy, solar energy, sun, tropical
Procedia PDF Downloads 5444009 National Security Threat and Fear of Rising Islamic Extremism in Bangladesh due to Influx of Rohingya Refugees
Authors: Afsana Afsar Tuly
Abstract:
The Rohingyas are a group of minority Muslimsin Myanmar who witnessed series of persecution, violence, and torture from Burmese military since 1948. In 2017, around 700,000 Rohingyas fled to the neighboring country Bangladesh and took shelter as refugees after facing clashes with Myanmar security forces. The number increased to 1.8 million in 2020, creating one of the largest refugee crises of recent times. This research focuses on the vulnerability and poverty faced by Rohingyas in refugee camps and how thelack of long-term solution and silence from international communitycan pose national security threat and increasing Islamic extremism in Bangladesh. Islamic religious and terrorist groups have used the Rohingyas position as stateless people to influence them into speaking against the secular government of Bangladesh. There has been increasing crime rates and formation of different rebel groups in refugee camps, causing clashes with Bangladeshi police and authority. Human trafficking, illegal drug dealings, prostitution, and other illicit activities have continuously gone up in the southeastern part of Bangladesh. Some economic, social, and environmental factors are studied and analyzed to show the change in Bangladesh between 2017 and 2020.Keywords: national security threat, islamic extremism, rohingya refugees, refugee studies, Bangladesh, myanmar
Procedia PDF Downloads 1464008 Cryptography Based Authentication Methods
Authors: Mohammad A. Alia, Abdelfatah Aref Tamimi, Omaima N. A. Al-Allaf
Abstract:
This paper reviews a comparison study on the most common used authentication methods. Some of these methods are actually based on cryptography. In this study, we show the main cryptographic services. Also, this study presents a specific discussion about authentication service, since the authentication service is classified into several categorizes according to their methods. However, this study gives more about the real life example for each of the authentication methods. It talks about the simplest authentication methods as well about the available biometric authentication methods such as voice, iris, fingerprint, and face authentication.Keywords: information security, cryptography, system access control, authentication, network security
Procedia PDF Downloads 4714007 The Hydro-Geology and Drinking Water Quality of Ikogosi Warm Spring in South West Nigeria
Authors: Ikudayisi Akinola, Adeyemo Folasade, Adeyemo Josiah
Abstract:
This study focuses on the hydro-geology and chemistry of Ikogosi Warm Spring in South West Nigeria. Ikogosi warm spring is a global tourist attraction because it has both warm and cold spring sources. Water samples from the cold spring, warm spring and the meeting point were collected, analyzed and the result shows close similarity in temperature, hydrogen iron concentration (pH), alkalinity, hardness, Calcium, Magnesium, Sodium, Iron, total dissolved solid and heavy metals. The measured parameters in the water samples are within World Health Organisation standards for fresh water. The study of the geology of the warm spring reveals that the study area is underlain by a group of slightly migmatised to non-migmatised paraschists and meta-igneous rocks. The concentration levels of selected heavy metals, (Copper, Cadmium, Zinc, Arsenic and Cromium) were determined in the water (ppm) samples. Chromium had the highest concentration value of 1.52ppm (an average of 49.67%) and Cadmium had the lowest concentration with value of 0.15ppm (an average of 4.89%). Comparison of these results showed that, their mean levels are within the standard values obtained in Nigeria. It can be concluded that both warm and spring water are safe for drinking.Keywords: cold spring, Ikogosi, melting point, warm spring, water samples
Procedia PDF Downloads 5464006 Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment
Authors: Emmanuel Ogala
Abstract:
Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented.Keywords: performance evaluation, fingerprint, auto-pin, password-based, security systems, cloud computing environment
Procedia PDF Downloads 1404005 Improving Security Features of Traditional Automated Teller Machines-Based Banking Services via Fingerprint Biometrics Scheme
Authors: Anthony I. Otuonye, Juliet N. Odii, Perpetual N. Ibe
Abstract:
The obvious challenges faced by most commercial bank customers while using the services of ATMs (Automated Teller Machines) across developing countries have triggered the need for an improved system with better security features. Current ATM systems are password-based, and research has proved the vulnerabilities of these systems to heinous attacks and manipulations. We have discovered by research that the security of current ATM-assisted banking services in most developing countries of the world is easily broken and maneuvered by fraudsters, majorly because it is quite difficult for these systems to identify an impostor with privileged access as against the authentic bank account owner. Again, PIN (Personal Identification Number) code passwords are easily guessed, just to mention a few of such obvious limitations of traditional ATM operations. In this research work also, we have developed a system of fingerprint biometrics with PIN code Authentication that seeks to improve the security features of traditional ATM installations as well as other Banking Services. The aim is to ensure better security at all ATM installations and raise the confidence of bank customers. It is hoped that our system will overcome most of the challenges of the current password-based ATM operation if properly applied. The researchers made use of the OOADM (Object-Oriented Analysis and Design Methodology), a software development methodology that assures proper system design using modern design diagrams. Implementation and coding were carried out using Visual Studio 2010 together with other software tools. Results obtained show a working system that provides two levels of security at the client’s side using a fingerprint biometric scheme combined with the existing 4-digit PIN code to guarantee the confidence of bank customers across developing countries.Keywords: fingerprint biometrics, banking operations, verification, ATMs, PIN code
Procedia PDF Downloads 444004 Environmental Strategies Towards Sustainable Development in Nigeria
Authors: Sirajoddeen Al-Ameen
Abstract:
Researchers seek to introduce development leading to technologies that address environmental problems and learn how to interact with stakeholders, managers, and policymakers for appropriate actions. One of the greatest strategies that African countries need to consider in realizing sustainable development is effective, efficient, credible, and lasting environmental sustainability and ensuring that future generations have access to natural resources to live in a better way. Therefore the coordinated set of participatory and continuously improving processes of analysis, capacity, planning, and investment seeks to integrate the social and environmental objectives of society, and this is not given priority in Nigeria. Environmental sustainability is a field where people can understand the natural environment and public works for sustainable development. Sustainable development requires shifts from ordinary ways of doing things to modern ways of executing activities ranging from low to high productivity, the creation and adoption of new strategies, new skills, and knowledge. It ensures a developed world with a secure and healthy environment for all; human beings, animals, and plants alike. This paper is to carry out a review of various literature sources to ascertain the potential strategy of environment and sustainable development reform using the content analysis method to discuss the environmental strategies towards sustainable development in Nigeria. The objective of this paper is to enable Nigerians to understand and have an orientation on how to manage environmental resources and avoid environmental impact on the ecosystem, and also to find sustainable solutions for environmental issues without compromising economic development.Keywords: development, environment, strategies, sustainable
Procedia PDF Downloads 107