Search results for: Arabic Fodio Nigeria security
4003 Public Debt and Fiscal Stability in Nigeria
Authors: Abdulkarim Yusuf
Abstract:
Motivation: The Nigerian economy has seen significant macroeconomic instability, fuelled mostly by an overreliance on fluctuating oil revenues. The rising disparity between tax receipts and government spending in Nigeria necessitates government borrowing to fund the anticipated pace of economic growth. Rising public debt and fiscal sustainability are limiting the government's ability to invest in key infrastructure that promotes private investment and growth in Nigeria. Objective: This paper fills an empirical research vacuum by examining the impact of public debt on fiscal sustainability in Nigeria, given the significance of fiscal stability in decreasing poverty and the constraints that an unsustainable debt burden imposes on it. Data and method: Annual time series data covering the period 1980 to 2022 exposed to conventional and structural breaks stationarity tests and the Autoregressive Distributed Lag estimation approach were adopted for this study. Results: The results reveal that domestic debt stock, debt service payment, foreign reserve stock, exchange rate, and private investment all had a major adverse effect on fiscal stability in the long and short run, corroborating the debt overhang and crowding-out hypothesis. External debt stock, prime lending rate, and degree of trade openness, which boosted fiscal stability in the long run, had a major detrimental effect on fiscal stability in the short run, whereas foreign direct investment inflows had an important beneficial impact on fiscal stability in both the long and short run. Implications: The results indicate that fiscal measures that inspire domestic resource mobilization, sustainable debt management techniques, and dependence on external debt to boost deficit financing will improve fiscal stability and drive growth.Keywords: ARDL co-integration, debt overhang, debt servicing, fiscal stability, public debt
Procedia PDF Downloads 584002 On the Use of Machine Learning for Tamper Detection
Authors: Basel Halak, Christian Hall, Syed Abdul Father, Nelson Chow Wai Kit, Ruwaydah Widaad Raymode
Abstract:
The attack surface on computing devices is becoming very sophisticated, driven by the sheer increase of interconnected devices, reaching 50B in 2025, which makes it easier for adversaries to have direct access and perform well-known physical attacks. The impact of increased security vulnerability of electronic systems is exacerbated for devices that are part of the critical infrastructure or those used in military applications, where the likelihood of being targeted is very high. This continuously evolving landscape of security threats calls for a new generation of defense methods that are equally effective and adaptive. This paper proposes an intelligent defense mechanism to protect from physical tampering, it consists of a tamper detection system enhanced with machine learning capabilities, which allows it to recognize normal operating conditions, classify known physical attacks and identify new types of malicious behaviors. A prototype of the proposed system has been implemented, and its functionality has been successfully verified for two types of normal operating conditions and further four forms of physical attacks. In addition, a systematic threat modeling analysis and security validation was carried out, which indicated the proposed solution provides better protection against including information leakage, loss of data, and disruption of operation.Keywords: anti-tamper, hardware, machine learning, physical security, embedded devices, ioT
Procedia PDF Downloads 1534001 Governance, Risk Management, and Compliance Factors Influencing the Adoption of Cloud Computing in Australia
Authors: Tim Nedyalkov
Abstract:
A business decision to move to the cloud brings fundamental changes in how an organization develops and delivers its Information Technology solutions. The accelerated pace of digital transformation across businesses and government agencies increases the reliance on cloud-based services. They are collecting, managing, and retaining large amounts of data in cloud environments makes information security and data privacy protection essential. It becomes even more important to understand what key factors drive successful cloud adoption following the commencement of the Privacy Amendment Notifiable Data Breaches (NDB) Act 2017 in Australia as the regulatory changes impact many organizations and industries. This quantitative correlational research investigated the governance, risk management, and compliance factors contributing to cloud security success. The factors influence the adoption of cloud computing within an organizational context after the commencement of the NDB scheme. The results and findings demonstrated that corporate information security policies, data storage location, management understanding of data governance responsibilities, and regular compliance assessments are the factors influencing cloud computing adoption. The research has implications for organizations, future researchers, practitioners, policymakers, and cloud computing providers to meet the rapidly changing regulatory and compliance requirements.Keywords: cloud compliance, cloud security, data governance, privacy protection
Procedia PDF Downloads 1164000 Intrusion Detection in Cloud Computing Using Machine Learning
Authors: Faiza Babur Khan, Sohail Asghar
Abstract:
With an emergence of distributed environment, cloud computing is proving to be the most stimulating computing paradigm shift in computer technology, resulting in spectacular expansion in IT industry. Many companies have augmented their technical infrastructure by adopting cloud resource sharing architecture. Cloud computing has opened doors to unlimited opportunities from application to platform availability, expandable storage and provision of computing environment. However, from a security viewpoint, an added risk level is introduced from clouds, weakening the protection mechanisms, and hardening the availability of privacy, data security and on demand service. Issues of trust, confidentiality, and integrity are elevated due to multitenant resource sharing architecture of cloud. Trust or reliability of cloud refers to its capability of providing the needed services precisely and unfailingly. Confidentiality is the ability of the architecture to ensure authorization of the relevant party to access its private data. It also guarantees integrity to protect the data from being fabricated by an unauthorized user. So in order to assure provision of secured cloud, a roadmap or model is obligatory to analyze a security problem, design mitigation strategies, and evaluate solutions. The aim of the paper is twofold; first to enlighten the factors which make cloud security critical along with alleviation strategies and secondly to propose an intrusion detection model that identifies the attackers in a preventive way using machine learning Random Forest classifier with an accuracy of 99.8%. This model uses less number of features. A comparison with other classifiers is also presented.Keywords: cloud security, threats, machine learning, random forest, classification
Procedia PDF Downloads 3203999 Conception and Misconceptions About Mental Health in Gwafan Community of Jos North Nigeria
Authors: Tabitha D. Hussein, Arigu M. Sunday
Abstract:
This paper is an attempt to gauge the conception and misconception of mental health in the Gwafan community, Jos North Plateau State, Nigeria (West Africa), to ascertain which side of the scale the pendulum swings. Mental health education and awareness are necessary for healthy community development. However, in a society such as ours in Nigeria (Africa) that is not knowledge-based, it is easy for people to embrace hearsay, speculations, superstition, and the supernatural. The objectives of this paper are two folds: first, to examine the level of awareness of the people on mental health, or the lack of it; second, to ascertain their access to mental health services and good practices. The methodology adopted is qualitative research, and the instrument used is T-test related. The findings include, first, the fact that a larger population has misconceptions about Mental Health. Second, this misconception is a result of a lack of basic knowledge of Mental Health. Based on the aforementioned, the paper recommends that there is a need for more Mental Health Education among the populace and access to Mental Health services and practices (Preventative and Curative). The paper concludes that in a society that is not knowledgebase, every attempt should be made to shift people’s mindset from superstitious knowledge to evidence-based knowledge, which can empower them to make informed decisions not only on mental Health but on associative Health issues that can aid their wellbeing, livelihood and sustainable development as a whole.Keywords: conceptions, misconceptions, mental health, knowledge, superstition, service delivery
Procedia PDF Downloads 493998 Terrorism and Sustainable Tourism Development
Authors: P. Okoro Ugo Chigozie, P. A. Igbojekwe, E. N. Ukabuilu
Abstract:
Tourism and terrorism experiences are best viewed as dynamic, complex systems with extreme diverse consequences on any nation’s economy. Tourism is one of the biggest industries in the world and one of the economical sectors which grows rapidly; tourism has positive impact on the nation’s economy. Terrorism is the method or the theory behind the method whereby an organized group or party seeks to achieve its avowed aims chiefly through the systematic use of violence; the consequences of terrorism on tourist destinations are inescapable and can be profound. Especially, it threatens the attractiveness of a tourist destination and strips the competitiveness of that destination. Destination’s vulnerability to politically motivated violence not only retracts tourists, but threatens sustainable tourism development. This paper examines the activities of the Jamaata Ahlis Sunna Liddaawati -an Islamic sect popularly known as Boko Haram – and its impact on sustainable tourism development in the Nigeria state. Possible triggers of this insurgency and potentially evolving measure against its influence on sustainable tourism including, strong image management of the tourism industry, feasible tourist safety policy, viable anti-terrorism measures, proactive respond to the challenge of terrorism, reinforcement of the legitimate frameworks and irrevocable penalty against menace of corruption; are discussed in this paper, as limiting the effects of insurgency on the attractiveness of Nigeria as safe tourists destination.Keywords: Nigeria, terrorism, sustainable tourism development, corruption and competitiveness
Procedia PDF Downloads 6213997 Developing Future New Roles for Traditional Birth Attendants in Nigeria
Authors: Hauwau Mohammed
Abstract:
Research purpose: the integration of Traditional Birth Attendants (TBAs) has long been initiated into healthcare systems. This has been to help improve maternal mortality, particularly in developing countries. Nigeria is seen as one of the countries with a high maternal death rate due to common pregnancy complications and low resources. Communities with challenges of universal coverage of skilled workers rely on TBAs for pregnancy-related services, including delivery. The Sokoto State government has conducted several training programs on a significant number of TBAs to enable a formal integration of relationships with skilled healthcare for women in rural regions. This study aims to explore a standard method and develop an assessment framework for improving TBAs training programs in Sokoto State. Research Design, Methodology & Methods : Using a qualitative design, an interpretive phenomenology approach will be applied to explore the lived-experiences of 28 TBAs, who have undergone a form of training while also examining the strategies used to develop those programs through 8 policymakers and/or program trainers. For the collection stage, a focus group discussion and a face-to-face interview will be conducted, where the latter is for TBAs and the former for policymakers and training officials. Analysis: Data will be analyse through IPA format while using Nvivo to code and catalog personal experiential generated patterns. Secondary review: a scoping review of secondary data from Nigeria was used to map the knowledge gap and the extent of available data. The thematic analytic findings suggested that there are various approaches used to incorporate TBAs into the healthcare system, which include interventional programs targeted at specific health issues. In addition, incentives were used to encourage TBAs to facilitate the frequent use of skilled care for women.Keywords: traditional birth attendants, Nigeria, training, program
Procedia PDF Downloads 833996 Effect of Garlic Powder Extract on Fungi Isolated from Diseased Irish Potato in Bokkos, Plateau State Nigeria
Authors: Musa Filibus Gugu
Abstract:
An investigation was carried out on the effect of garlic powder extract on fungi associated with Irish potato rot in Bokkos, Plateau State, Nigeria. Diseased Irish potatoes were randomly collected from three markets in the study location and fungal species isolated. Isolated fungal species were Fusarium culmorum, Fusarium oxysporum, and Pytophthora infestans. Frequency of occurrence for Fusarium culmorum, Fusarium oxysporum, and Pytophthora infestans was 10%, 34%, and 56%, respectively, using sabauraud dextrose agar, after incubation for 4-7 days. Treatment of Pytophthora infestans with garlic powder extract at concentrations of 0.5g/ml, 0.4g/ml, 0.3gml, 0.2g/ml and 0.1g/ml showed 100%, 92%, 68%, 32% and 10% inhibition zones, respectively. Fusarium culmorum showed 100%, 90%, 40%, 9% and 0% inhibition zones when treated with garlic powder extract at concentrations of 0.5g/ml, 0.4g/ml, 0.3gml, 0.2g/ml and 0.1g/ml, respectively. Garlic powder extract concentrations of 0.5g/ml, 0.4g/ml, 0.3gml, 0.2g/ml and 0.1g/ml showed 100%, 98%, 55%, 30%, 0% inhibition zones, respectively on Fusarium oxysporum. Hence, Restriction of the radial growth of the fungal colonies suggests a good antifungal effect of garlic extract. This can be integrated into the treatment of fungal diseases of Irish potato in Bokkos, Nigeria, as this will help to reduce the indiscriminate use of fungicides, especially in an environment with a struggling economy.Keywords: fungal rot, garlic extract, inhibition zone, Irish potato
Procedia PDF Downloads 1443995 Rewashing for Gold: Optimizing Mine Plan for Effective Closure
Authors: O. D. Eniowo
Abstract:
“Rewashing” as it is commonly called, involves the process of scooping out and washing chunks of mud from a closed alluvial gold mine site with the purpose of extracting any leftover gold deposits in the site. It is usually carried out by illegal miners who infiltrate closed mine sites with the goal of scavenging for any leftover gold deposits. Expectedly, the practice gives little or no regard for environmental protection. This paper examines the process of “rewashing” in a mining community in Nigeria. It then discusses the looming danger it portends for health, safety, and the environment. The study draws lessons from these occurrences to examine and discuss fit-for-purpose mine closure plans that could be adopted by gold mines in Nigeria and other sub-Saharan African countries.Keywords: mine planning, mine closure, illegal mining, artisanal mining, environmental sustainability
Procedia PDF Downloads 303994 Utilizing Radio as a Resource Alternative for Disseminating Information to University Students in Ibadan, Nigeria: A Study of Lead City FM and Diamond FM Radio Stations
Authors: Olufemi Sunday Onabajo
Abstract:
Radio according to communication scholars is a veritable instrument of mass education. However, its full potentials in boosting higher education have not been realized because of the commercial nature of radio stations in Nigeria. The licensing of campus radio for disseminating information on university curricular is aimed at reinforcing information shared during face to face teaching. This study anchored on Agenda Setting and Technology determinism theories seeks to find out the extent to which university students in Lead City University and University of Ibadan, Nigeria have keyed-in to the philosophy of their campus radio – Lead City FM and Diamond FM in making information dissemination in their domiciled universities less cumbersome. The study employs both qualitative and quantitative methods though the use of depth interview for ten (10) academic staff and five (5) radio personnel of both radio stations; and a questionnaire addressed to 200 students of both institutions using the systematic random sampling technique. The data collected was analyzed using simple percentage and chi-square one tail test, and it was discovered that students of both universities and their radio personnel are yet to realize the potentials of campus radio as a resource alternative to effective learning, and recommends the coming together of all stakeholders to articulate the way forward.Keywords: disseminating information, effective learning, resource alternative, utilizing radio
Procedia PDF Downloads 2983993 Conflicts and Epidemiology of HIV/AIDS: Gender Dimension in Rain Forest Zone of Nigeria
Authors: K. K. Bolarinwa, A. F. O. Ayinde, B. B. Abiona, O. Oyekunle
Abstract:
Conflict and HIV/AIDS infection have had a profound impact on the Sub-Saharan African societies, individually and collectively. Nigeria has been experiencing several violent conflicts in many communities across the geographical spread of the country. These conflicts which often lead to loss of lives, properties and loss of livelihoods are mainly felt by women in terms of increased responsibility towards affected family members with attendant decrease in livelihood options. Despite these, conflict issues have not really received enough focal attention by Nigerian academics. It is against this backdrop that this study was undertaken to describe the respondents, the most prevalent conflict repercussions and most prevalent STDs, in conflict areas. Data were collected using interview schedule to elicit a response from 122 respondents in Southwest Nigeria, through a multi-stage sampling technique involving stratification of respondents into violent conflict areas (VCA) and non-violent conflict areas (NVCA). The data collected were analysed using descriptive statistics and correlation analysis. Results revealed that majority (86.5% and 70.5 %) of the respondents were in the age bracket of 10-39 years in both the VCA and NVCA respectively; 35.5% and 40.2% of the respondents were literate in VCA and NVCA, respectively while 76.5% and 55.8% of the respondents were in the lower income groups in VCA and NVCA, respectively. HIV/AIDS and gonorrhoea were the more predominant (75.2% and 55.6% respectively) STDs in the VCA as against 33.2% and 38.3% respectively in the NVCA. Further, significant (p<0.05) correlation existed between conflict incidence and spread of HIV/AIDS, rape and torture, maltreatment of women as well as sexual harassment; in both VCA and NVCA among others. The study concluded that conflict situations in the study area aggravated incidence of HIV/AIDS and made the women more vulnerable to inhuman treatments such as rape, torture and harassment with attendant reduction in sources of livelihoods. The study recommended among others that sensitisation on control and preventive measures of HIV/AID and other sexually transmitted diseases should be included in programme designed to mitigate against conflicts in the study areas.Keywords: conflict, gender dimension, HIV/AIDS epidemiology, Nigeria
Procedia PDF Downloads 2583992 A Review of the Nutritional, Health and Medicinal Benefits of Selected Endangered Food Spice Crops in South Eastern Nigeria
Authors: Poly-Mbah C. P., Offor J. I., Onyeneke E. N., Poly-Mbah J. C.
Abstract:
Many food spice crops are being endangered into extinction in Nigeria because of climate change as well as deforestation occasioned by population pressure and urbanization and also due to neglect of research and agronomic attention. This review was aimed at identifying the nutritional and health benefits of these endangered aromatic food spice crops. The findings of this review will help to popularize their cultivation and increase research efforts made in the agronomy of these food spice species. Nine aromatic food spice crop species identified to be facing the danger of extinction include: Guinea pepper ( Piper guineensis), Utazi ( Gongronema latifolium), Hoary or Thai lemon basil ( Ocimum africanum), Mint basil ( Ocimum gratissimum), Whole country onions( Afrostyrax lepidophyllus), Jansa ( Cussonia bateri), Negro pepper ( Xylopia aethiopica), Ataiko or Orima (Afromomium Danielle), Aidan (Tetrapleura tetraptera). Findings from this review revealed that these species are capable of improving the nutrition and health of the rural dwellers but yet, are minimally cultivated. This paper also reviewed research made in the agronomy of these identified threatened food spice crops in the semi-urban Southeastern Nigeria environment and discovered that there is little research attention on them. The availability of these food spice crop species was discovered to come from collections made from nearby bushes and forests. This paper therefore recommends that agronomic packages such as pre-planting, planting and post-planting requirements be investigated and recommended in order to initiate and increase the cultivation of the selected endangered food spice crops as well as their productivity.Keywords: review, endangered, food spice crops, South Eastern Nigeria
Procedia PDF Downloads 833991 Blockchain’s Feasibility in Military Data Networks
Authors: Brenden M. Shutt, Lubjana Beshaj, Paul L. Goethals, Ambrose Kam
Abstract:
Communication security is of particular interest to military data networks. A relatively novel approach to network security is blockchain, a cryptographically secured distribution ledger with a decentralized consensus mechanism for data transaction processing. Recent advances in blockchain technology have proposed new techniques for both data validation and trust management, as well as different frameworks for managing dataflow. The purpose of this work is to test the feasibility of different blockchain architectures as applied to military command and control networks. Various architectures are tested through discrete-event simulation and the feasibility is determined based upon a blockchain design’s ability to maintain long-term stable performance at industry standards of throughput, network latency, and security. This work proposes a consortium blockchain architecture with a computationally inexpensive consensus mechanism, one that leverages a Proof-of-Identity (PoI) concept and a reputation management mechanism.Keywords: blockchain, consensus mechanism, discrete-event simulation, fog computing
Procedia PDF Downloads 1383990 The New Approach to Airport Emergency Plans
Authors: Jakub Kraus, Vladimír Plos, Peter Vittek
Abstract:
This article deals with a new approach to the airport emergency plans, which are the basic documents and manuals for dealing with events with impact on safety or security. The article describes the identified parts in which the current airport emergency plans do not fulfill their role and which should therefore be considered in the creation of corrective measures. All these issues have been identified at airports in the Czech Republic and confirmed at airports in neighboring countries.Keywords: airport emergency plan, aviation safety, aviation security, comprehensive management system
Procedia PDF Downloads 5113989 How Manufacturing Firm Manages Information Security: Need Pull and Technology Push Perspective
Authors: Geuna Kim, Sanghyun Kim
Abstract:
This study investigates various factors that may influence the ISM process, including the organization’s internal needs and external pressure, and examines the role of regulatory pressure in ISM development and performance. The 105 sets of data collected in a survey were tested against the research model using SEM. The results indicate that NP and TP had positive effects on the ISM process, except for perceived benefits. Regulatory pressure had a positive effect on the relationship between ISM awareness and ISM development and performance.Keywords: information security management, need pull, technology push, regulatory pressure
Procedia PDF Downloads 2983988 The Effect of Mamanet Cachibol League on Psychosomatic Symptoms, Eating Habits, and Social Support among Arab Women: A Mixed Methods Study
Authors: Karin Eines, Riki Tesler
Abstract:
Introduction: The Mamanet Cachibol League (MCL) is a community-based model developed in Israel to promote physical activity (PA) and amateur team sports among women. team sports are not just groups in the context of specific sport activity but also incorporated into a person’s sense of self and become influencing factor on sport-related behavior among the players. While in the non-Arabic sector, sport venues are available for the local authority population, the Arabic sector authorities face limited access sport facilities, with 168 sport venues and authorities with no venues at all. Within the Arab community, women participation in sports has traditionally been limited and, even more so for participation in team sports. Aims: The purpose of the study was to explore attributes of women MCL activity via: (1) assess differences between participants in the MCL and non-participants among Arab women regarding well-being level; (2) to examine among MCL participants the relationship between health maintenance characteristics and the likelihood of participating in the MCL; and (3) Use qualitative approach to shed light over the question why Arabic women participate in MCL and continue their engagement in PA. Methods: An explanatory sequential mixed-method design was employed to gain a deeper understanding of the advantages and motivations among women participating in community-based team sports. A cross-sectional survey was conducted among Israeli Arab women aged 25–59. Demographic characteristics, well-being (SRH and psychosomatic symptoms), eating habits, and social support were analyzed using two-way analyses of covariance and multiple regression models with a sequential entry of the variables. Quantitative results were further explored in qualitative in-depth interviews among 30 of the MCL participants, which shed light on additional reasons for participation in PA. Results: MCL participants reported better self-reported health (p < 0.001) and lower rates of psychosomatic symptoms (p < 0.001) compared to non-participants. Participation in MCL was also related to higher levels of well-being and healthy eating habits. Women who participated also experienced a profound sense of belonging, leading to enhanced social interactions and positivity in their personal and professional lives. They were dedicated to the group and felt empowered by the reciprocal commitment. The group promoted equality, making the women feel valued and respected, resulting in community admiration. Their involvement positively impacted their families, justifying their time commitment.Keywords: wellbeing, obesity, community based sports, healthy eating habits, arab women
Procedia PDF Downloads 753987 Enhancing Entrepreneurial Skills, Vocational, and Technical Education in Nigeria Schools: The Challenges and Way Forward
Authors: Stella Chioma Nwizu, Emmanuel Nwangwu
Abstract:
Entrepreneurship, Vocational, and Technical education is an education that prepares one for effective adaptation to the world of work. It equally makes individuals self-reliant, self-sufficient and contributes to the development of society. It is, therefore, imperative that this type of education should be a priority in the development of any nation and should be given the utmost political support because of its importance and increasing demand on a global scale. This paper qualitatively explores three research questions on the policy status of Entrepreneurial, Vocational, and Technical Education (EVTE) in Nigeria, challenges hindering the enhancement of Entrepreneurial skills, Vocational and Technical Education in Nigeria, and strategies for the way forward. The major sources of data are secondary, interview and observation. Findings revealed the need to revise the policy of ETVE to meet the needs of the changing world of work. Challenges identified include corruption, inadequate funding, inadequate equipment, unqualified TVET Teachers/Instructors, poor documentation, policy implementation, poor conditions of service, and poor supervision of TVET programmes. Finally, the study identified policy revision, improvement in budgetary allocation, collaboration, sensitization, Public-Private Partnership, and training and retraining of instructors as the way forward toward the amelioration of the issues raised.Keywords: entrepreneurship, entrepreneurial skills, vocational and technical education, technical and vocational education and training, VTE policy
Procedia PDF Downloads 703986 Street Begging and Its Psychosocial Social Effects in Ibadan Metropolis, Oyo State, Nigeria
Authors: Temitope M. Ojo, Titilayo A. Benson
Abstract:
This study investigated street begging and its psychosocial effect in Ibadan Metropolis, Oyo State, Nigeria. In carrying out this study, four research questions were used. The instrument used for data collection was a face-to-face and self-developed questionnaire. The results revealed there is high awareness level on the causes of street begging among the respondents, who also mentioned several factors contributing to street begging. However, respondents disagreed that lack of education is a factor contributing to street begging in Nigeria. The psycho-social effects of street begging, as identified by the respondents, are development of inferiority complex, lack of social interaction, loss of self-respect and dignity, increased mindset of poverty and loss of self-confident. Solution to street begging as identified by the respondents also includes provision of rehabilitation centers, provision of food for students in Islamic schools and monthly survival allowance. Specific policies and other legislative frameworks are needed in terms of age, sex, disability, and family-related issues, to effectively address the begging problem. Therefore, it is recommended that policy planners must adopt multi-faceted, multi-targeted, and multi-tiered approaches if they are to have any impact on the lives of street beggars in all four categories. In this regard, both preventative and responsive interventions are needed instead of rehabilitative solutions for each category of street beggars.Keywords: beggars, begging, psycho-social effect, respondents, street begging
Procedia PDF Downloads 1853985 Characterization, Classification and Fertility Capability Classification of Three Rice Zones of Ebonyi State, Southeastern Nigeria
Authors: Sunday Nathaniel Obasi, Chiamak Chinasa Obasi
Abstract:
Soil characterization and classification provide the basic information necessary to create a functional evaluation and soil classification schemes. Fertility capability classification (FCC) on the other hand is a technical system that groups the soils according to kinds of problems they present for management of soil physical and chemical properties. This research was carried out in Ebonyi state, southeastern Nigeria, which is an agrarian state and a leading rice producing part of southeastern Nigeria. In order to maximize the soil and enhance the productivity of rice in Ebonyi soils, soil classification, and fertility classification information need to be supplied. The state was grouped into three locations according to their agricultural zones namely; Ebonyi north, Ebonyi central and Ebonyi south representing Abakaliki, Ikwo and Ivo locations respectively. Major rice growing areas of the soils were located and two profile pits were sunk in each of the studied zones from which soils were characterized, classified and fertility capability classification (FCC) developed. Soil classification was done using United State Department of Agriculture (USDA) Soil Taxonomy and correlated with World Reference Base for soil resources. Results obtained classified Abakaliki 1 and Abakaliki 2 as Typic Fluvaquents (Ochric Fluvisols). Ikwo 1 was classified as Vertic Eutrudepts (Eutric Vertisols) while Ikwo 2 was classified as Typic Eutrudepts (Eutric Cambisols). Ivo 1 and Ivo 2 were both classified as Aquic Eutrudepts (Gleyic Leptosols). Fertility capability classification (FCC) revealed that all studied soils had mostly loamy topsoils and subsoils except Ikwo 1 with clayey topsoil. Limitations encountered in the studied soils include; dryness (d), low ECEC (e), low nutrient capital reserve (k) and water logging/ anaerobic condition (gley). Thus, FCC classifications were Ldek for Abakaliki 1 and 2, Ckv for Ikwo 1, LCk for Ikwo 2 while Ivo 1 and 2 were Legk and Lgk respectively.Keywords: soil classification, soil fertility, limitations, modifiers, Southeastern Nigeria
Procedia PDF Downloads 1293984 Changing the Dynamics of the Regional Water Security in the Mekong River Basin: An Explorative Study Understanding the Cooperation and Conflict from Critical Hydropolitical Perspective
Authors: Richard Grünwald, Wenling Wang, Yan Feng
Abstract:
The presented paper explores the changing dynamics of regional water security in the Mekong River Basin and examines the contemporary water-related challenges from a critical hydropolitical perspective. By drawing on the Lancang-Mekong Cooperation and Conflict Database (LMCCD) recording more than 3000 water-related events within the basin in the last 30 years, we identified several trends changing the dynamics of the regional water security in the Mekong River Basin. Firstly, there is growing politicization of water that is no longer interpreted as abundant. While some scientists blame the rapid basin development, particularly in upstream countries, other researchers consider climate change and cumulative environmental impacts of various water projects as the main culprit for changing the water flow. Secondly, there is an increasing securitization of large-scale hydropower dams with questionable outcomes. Despite hydropower dams raise many controversies, many riparian states push the development at all cost. Such water security dilemma can be especially traced to Laos and Cambodia, which highly invest in the hydropower sector even at the expense of the local environment and good relations with neighbouring countries situated lower on the river. Thirdly, there is a lack of accountable transboundary water governance that will effectively face a looming water crisis. To date, most of the existing cooperation mechanisms are undermined by the geopolitical interests of foreign donors and increasing mistrust to scientific approaches dealing with water insecurity. Our findings are beneficial for the policy-makers and other water experts who want to grasp the broader hydropolitical context in the Mekong River Basin and better understand the new water security threats, including misinterpretation of the hydrological data and legitimization of the pro-development narratives.Keywords: critical hydropolitics, mekong river, politicization of science, water governance, water security
Procedia PDF Downloads 2143983 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality
Authors: Georgi Bebrov, Rozalina Dimova
Abstract:
In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality
Procedia PDF Downloads 1843982 An Intrusion Detection Systems Based on K-Means, K-Medoids and Support Vector Clustering Using Ensemble
Authors: A. Mohammadpour, Ebrahim Najafi Kajabad, Ghazale Ipakchi
Abstract:
Presently, computer networks’ security rise in importance and many studies have also been conducted in this field. By the penetration of the internet networks in different fields, many things need to be done to provide a secure industrial and non-industrial network. Fire walls, appropriate Intrusion Detection Systems (IDS), encryption protocols for information sending and receiving, and use of authentication certificated are among things, which should be considered for system security. The aim of the present study is to use the outcome of several algorithms, which cause decline in IDS errors, in the way that improves system security and prevents additional overload to the system. Finally, regarding the obtained result we can also detect the amount and percentage of more sub attacks. By running the proposed system, which is based on the use of multi-algorithmic outcome and comparing that by the proposed single algorithmic methods, we observed a 78.64% result in attack detection that is improved by 3.14% than the proposed algorithms.Keywords: intrusion detection systems, clustering, k-means, k-medoids, SV clustering, ensemble
Procedia PDF Downloads 2213981 Security Issues in Long Term Evolution-Based Vehicle-To-Everything Communication Networks
Authors: Mujahid Muhammad, Paul Kearney, Adel Aneiba
Abstract:
The ability for vehicles to communicate with other vehicles (V2V), the physical (V2I) and network (V2N) infrastructures, pedestrians (V2P), etc. – collectively known as V2X (Vehicle to Everything) – will enable a broad and growing set of applications and services within the intelligent transport domain for improving road safety, alleviate traffic congestion and support autonomous driving. The telecommunication research and industry communities and standardization bodies (notably 3GPP) has finally approved in Release 14, cellular communications connectivity to support V2X communication (known as LTE – V2X). LTE – V2X system will combine simultaneous connectivity across existing LTE network infrastructures via LTE-Uu interface and direct device-to-device (D2D) communications. In order for V2X services to function effectively, a robust security mechanism is needed to ensure legal and safe interaction among authenticated V2X entities in the LTE-based V2X architecture. The characteristics of vehicular networks, and the nature of most V2X applications, which involve human safety makes it significant to protect V2X messages from attacks that can result in catastrophically wrong decisions/actions include ones affecting road safety. Attack vectors include impersonation attacks, modification, masquerading, replay, MiM attacks, and Sybil attacks. In this paper, we focus our attention on LTE-based V2X security and access control mechanisms. The current LTE-A security framework provides its own access authentication scheme, the AKA protocol for mutual authentication and other essential cryptographic operations between UEs and the network. V2N systems can leverage this protocol to achieve mutual authentication between vehicles and the mobile core network. However, this protocol experiences technical challenges, such as high signaling overhead, lack of synchronization, handover delay and potential control plane signaling overloads, as well as privacy preservation issues, which cannot satisfy the adequate security requirements for majority of LTE-based V2X services. This paper examines these challenges and points to possible ways by which they can be addressed. One possible solution, is the implementation of the distributed peer-to-peer LTE security mechanism based on the Bitcoin/Namecoin framework, to allow for security operations with minimal overhead cost, which is desirable for V2X services. The proposed architecture can ensure fast, secure and robust V2X services under LTE network while meeting V2X security requirements.Keywords: authentication, long term evolution, security, vehicle-to-everything
Procedia PDF Downloads 1673980 Socioeconomic Status and Use of Web-Based Information Resources by Public Polytechnic Students in Southwestern Nigeria
Authors: John Adeboye Oyeboade, Pius Olatunji Olaojo, Kuburay Folashade Yusuf, John Oluwaseye Adebayo
Abstract:
Web-based Information Resources (WBIR) are increasingly becoming essential tools for students to accomplish academic tasks. Preliminary observation revealed that many polytechnic libraries in Southwestern Nigeria do not subscribe or renew subscriptions to WBIR academic databases, and students use free-based electronic resources. Hence, this study was carried out to investigate socioeconomic status and use of WBIR by public polytechnic students in Southwestern Nigeria. Six public polytechnics out of the 16 offerings of Higher National Diploma (HND) programs were selected by stratified random sampling to reflect federal and state polytechnics. A proportionate size sampling technique was used to select 1,463 HND students. The instruments used were Socioeconomic status (SeS) (α=0.81) and WBIR used for Academic Tasks (α=0.98) scales. Data were analyzed using descriptive statistics and Pearson’s product-moment correlation at a 0.05 level of significance. Students’ SeS ( =79.10) was moderate. Online reference sources ( =3.97), Web 2.0 ( =3.50), and social media ( =3.00) were regularly used WBIR. WBIR use ( =53.34) was moderate. The students used WBIR for project writing ( =3.46) and class assignments ( =3.42). The Students’ SeS (r=0.59) had significant relationships with WBIR use. Socioeconomic status directly influenced the use of WBIR for academic tasks. Management of polytechnics should provide WBIR subscriptions for students’ use in the polytechnic e-libraries.Keywords: public polytechnic students, polytechnic libraries, socioeconomic status, Web-based information resources
Procedia PDF Downloads 753979 Signs and Symbols of a Modern Sufi Ceremony in Istanbul
Authors: Antonio De Lisa
Abstract:
The aim of this contribution is to describe a Sufi ceremony personally observed and recorded in Istanbul. It is part of research on the semiotics of religion that has been going on for some time. Over the centuries, Sufism has produced remarkable literature, elaborated mainly in the context of Arabic literature and Persian literature, but has also found expression in many other languages (Turkish, Indian, Malayo-Indonesian, etc.). Among the genres cultivated are: devotional books (prayers, meditation, spiritual exercises, etc.); the hagiographic texts, containing the biographies and sentences of the best-known Sufis; the texts that illustrate the abodes or stations of the spiritual path; finally, the theoretical treatises on various topics, often of an apologetic nature. Another typical expression of Sufism is in the literature in verse, which includes first-rate poets of both Arabic (Ibn al-Farid, Ibn 'Arabi) and Persian (Farid al-Din al-Attar, Rumi, Hafez, Gohar Shahi) expression. To observe an authentic Sufi ceremony, we contacted the Silivrikapı Mevlana Cultural Center in Istanbul. The ceremony we will talk about is a characteristic of the brotherhood called Mevleviyye (Mawlawiyya), so called from Mawlānā ('our lord', in Turkish: Mevlānā) Jalāl al-Dīn Muḥammad Rūmī (13th century) better known as the brotherhood of the Whirling Dervishes, founded in Konya. The characteristic of the order is to pray about one's love for Allah with music and dance in a ritual that has the name of Semà. The dance is a swirling movement in a group, representing a mystical journey of the spiritual ascent of man through the mind and love for the 'perfect'. Turning towards the truth, the follower of the group ascends towards love, passing beyond the World and Nothingness. After asceticism, he returns to the common world to communicate his own experience.Keywords: semiotics of religion, sufi, rumi, islamic philosophy
Procedia PDF Downloads 923978 A Comparative Analysis of the Application and Use of Information and Communication Technologies (ICTS) in Selected Manufacturing Industries for Development in Nigeria
Authors: Kolawole Taiwo Olabode
Abstract:
This is a comparative study of ICTs adoption and use in selected manufacturing industries in for development. This study was carried out 2004 and was repeated 2013 (nine years after) using the same selected manufacturing industries to assess the level, improvement and extent ICT facilities used in these companies. The theory of modernization was explored to explain some developmental issues in this study. The same semi-structured questionnaire and IDI were used to elicit data on the subject matter. About 24.9% of the total workers (1,247) were sampled for this study using quota sampling technique. SPSS was used to analysis the quantitative data. The qualitative data was used to buttress the quantitative data. Findings indicated that Seven-Up Bottling Company and Frigoglass Glass Industry still remained Intensive ICT Users while only Niger Match Nigeria Limited still remained Non-Intensive ICT User while unfortunately, Askar Paint Nigeria Limited has gone liquidated. It is also important to discover that only the Intensive ICT users improved on relevant ICT facilities. The existing problems of ICT adoption and used in these companies remained the same in Niger Match Limited. The study concluded that for a society to be developed, management and government at all levels must do all things necessary to ensure that all existing organisations must be ICT compliance for workers and organisational performance and to enhance nation’s development in order to compete with other companies for global standard or recognition.Keywords: ICT, intensive ICT-users, entrepreneurial, manufacturing industries, industries and development
Procedia PDF Downloads 3023977 Basic Education Curriculum in South- South Nigeria: Challenges and Opportunities of Quality Contents in the Second Language Learning
Authors: Catherine Alex Agbor
Abstract:
The modern Nigerian society is dynamic, divided in zones based on economic, political and educational resources often shared across the zones. The Six Geopolitical Zones in Nigeria is a major division in modern Nigeria, created during the regime of president Ibrahim Badamasi Babangida. They are North Central, North East, North West, South East, South South and South West. However, the zone used in this study is known as former South-Eastern State of Akwa-Ibom State and Cross-River State; former Rivers State of Bayelsa State and Rivers State; and former Mid-Western Region, Nigeria of Delta State and Edo State. Many reforms have taken place overtime, particularly in the education sector. Education is constantly presenting new ideas and innovative approaches which act to facilitate the rapid exchange of knowledge and provide quality basic education for learners. The Federal Government of Nigeria in accordance with its National Council on Education directed the Nigerian Educational Research and Development Council to restructure its basic education curriculum with the hope to enable the nation meet national and global developmental goals. One of the goals of the 9-year Basic Education Programme is developing in the entire citizenry a strong consciousness for education and a strong commitment to its vigorous promotion. Another is ensuring the acquisition of appropriate levels of literacy, numeracy, manipulative, communicative and life-skills as well as the ethical, moral and civic values for laying a solid foundation for lifelong learning. Therefore, this article at the introductory stage is aimed to describe some key issues in Nigeria’s experience in the basic education curriculum. In this study, particular attention is paid to this very recent educational policy of the Nigerian government known as Universal Basic Education, its challenges and what can be done to make the policy achieve its desired objectives. It progresses to analyze modern requirements for second language teaching; and presents the challenges of second language teaching in Nigeria. Finally, it reports a study which investigated special efforts for appropriate achievement of quality education in language classroom in the south-south zone of Nigeria. One fundamental research question was posed on what educational practices can contribute to current understanding of the structure of language curriculum. More explicitly, the study was designed to analyze the extent to which quality content contributes to current understanding of the structure of school curriculum in the zone. Otherwise stated, it investigated how student-centred educational practices impact on their learning of French language. One hundred and eighty (180) participants (teachers) were purposefully sampled for the study. Qualitative technique was used to elicit information from participants. The qualitative method used was Focus Group Discussion (FGD). Participants were divided into six groups comprising of 30 teachers from each zone. Group discussions were based mainly on curriculum contents and practices. Information from participants revealed that the curriculum content, among others is inadequate and should be re-examined. Recommendations were proffered as a panacea to concrete implementation of the basic education in Nigeria.Keywords: basic education, quality contents, second language, south-south states
Procedia PDF Downloads 2413976 Cyber Supply Chain Resilient: Enhancing Security through Leadership to Protect National Security
Authors: Katie Wood
Abstract:
Cyber criminals are constantly on the lookout for new opportunities to exploit organisation and cause destruction. This could lead to significant cause of economic loss for organisations in the form of destruction in finances, reputation and even the overall survival of the organization. Additionally, this leads to serious consequences on national security. The threat of possible cyber attacks places further pressure on organisations to ensure they are secure, at a time where international scale cyber attacks have occurred in a range of sectors. Stakeholders are wanting confidence that their data is protected. This is only achievable if a business fosters a resilient supply chain strategy which is implemented throughout its supply chain by having a strong cyber leadership culture. This paper will discuss the essential role and need for organisations to adopt a cyber leadership culture and direction to learn about own internal processes to ensure mitigating systemic vulnerability of its supply chains. This paper outlines that to protect national security there is an urgent need for cyber awareness culture change. This is required in all organisations, regardless of their sector or size, to implementation throughout the whole supplier chain to support and protect economic prosperity to make the UK more resilient to cyber-attacks. Through businesses understanding the supply chain and risk management cycle of their own operates has to be the starting point to ensure effective cyber migration strategies.Keywords: cyber leadership, cyber migration strategies, resilient supply chain strategy, cybersecurity
Procedia PDF Downloads 2423975 Reading Literature between Aesthetic Values and Ideology
Authors: Ahmed Hassan Sabra
Abstract:
Context: The research explores the impact of ideology on the aesthetic reading of literary texts. It aims to investigate how ideology affects the way in which readers interpret and appreciate literature. The study focuses on a selection of Arabic novels that have been subject to significant controversy among critics, with some praising their aesthetic value and others denouncing it. By analyzing this controversy, the research seeks to demonstrate the extent to which ideology influences aesthetic judgments in literary readings. Research Aim: The aim of this study is to examine the influence of ideology on the aesthetic reading of literary texts. It seeks to understand how the ideological perspective of readers shapes their interpretation and evaluation of literature. Methodology: The research adopts an aesthetic approach as the primary methodology for investigating the relationship between literary reading and ideological reception. By employing this approach, the study aims to uncover the intricate connections between aesthetics and ideology in the process of interpreting and appreciating literature. Findings: The research reveals that ideology cannot be separated from the aesthetic experience of reading literary texts. It argues that the ideological perspective of the reader significantly impacts their aesthetic judgments and interpretations. The differing viewpoints among critics regarding the aesthetic value of the selected Arabic novels highlight the influence of ideology on readers' assessments of artistic merit. Theoretical Importance: The study contributes to the understanding of the complex interplay between aesthetics and ideology in the realm of literary interpretation. It reinforces the notion that aesthetic judgments are not solely based on the intrinsic qualities of the text but are also shaped by the ideological framework of the reader. Data Collection: The research collects data by examining critical responses to a number of Arabic novels that have generated controversy. These responses include both positive and negative evaluations of the novels' aesthetic value. The research also considers the ideological positions and perspectives of the critics. Analysis Procedures: The collected data is analyzed using an aesthetic lens, taking into account the ideological viewpoints expressed in the critical responses. The analysis explores how these ideological perspectives influence the aesthetic judgments made by the critics. Questions Addressed: The research addresses the question of how ideology impacts the aesthetic reading of literary texts. It investigates the extent to which ideology shapes readers' interpretations and evaluations of literature, particularly in the case of controversial novels. Conclusion: The study concludes that ideology plays a significant role in the aesthetic reading of literary texts. It demonstrates that readers' ideological perspectives influence their interpretation and evaluation of a text's aesthetic value. The research highlights the interconnectedness of aesthetics and ideology in the process of literary reception, emphasizing the importance of considering the ideological framework of readers when analyzing the aesthetic qualities of literature.Keywords: novel, aesthetic, ideology, reading
Procedia PDF Downloads 733974 Promotional Mix as a Determinant of Consumer Buying Decision in the Food and Beverages Industry: A Case Study of Nigeria Bottling Company Plc., Asejire Ibadan
Authors: Adedeji S. Adegoke, Olakunle N. Popoola
Abstract:
Promotion is indispensible and inestimable property of marketing through which different organizations persuade their prospective customers. The idea of passing information about a product to the consumer at outside the world is known as promotional activities. A study was determined whether there was relationship between promotional mix and consumer buying decision, that is may be customers were influenced by promotion. It was investigated to determine whether promotion can be used to influence competitors’ activities in the market and also research was conducted to determine if there was any problem encountered by Nigeria bottling company plc, in promoting its beverages products. The various forms of promotional mix available for an organization were examined and recommended the appropriate promotional mix that company can adopt to boost the company sales. The research design was depended on the primary and secondary data. The primary data were information collected from the subjects using methods of data collection, that is through the use of questionnaire, interview, direct observation, etc. The secondary data consist of information that already exists having been collected for another purpose by some researchers. These include internal and external sources. The questionnaire was designed and administered to the staff of production and marketing department of Nigeria bottling company plc., which served as the population of this study, out of which sample was drawn randomly from the population, using sample random technique. It was deduced that 90% of the respondents opined that advertising influenced competition in the market and that there was a good sale after they started advert while 10% of them were not sure. At advertising level, 85% of the respondents chose 81-100% as the increase in the percentage recorded in their sales level, while 10% of them agreed that increase in the percentage recorded in their sales was within 61-80% and 5% of them chose 45-60% as the percentage increase in their sales record. Due to unstable economic condition of the Nigeria, many business organizations adopted the promotional strategies. Apart from advertising, it was discovered through research that sales promotion served as an incentive to consumers of Nigeria bottling company plc at a time offer gifts and prizes to consumers which drastically increased their level of sales. Since advertising and sales promotion increased the level of sales, more money should be allocated for this purpose to maintain market share and thereby increase profit.Keywords: consumer, marketing, organization, promotional mix
Procedia PDF Downloads 162