Search results for: state security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 9651

Search results for: state security

8091 Challenges Being Faced by Students of Arabic and Islamic Studies in Tetiary Institutions in Nigeria: Case Study of Some Selected Tetiary Instutions of Yobe State, Nigeria

Authors: Muhammad Alhaji Maidugu

Abstract:

The role played by Arabic and Islamic Studies in the history of Nigeria - particularly Northern part of the country - cannot be overemphasized. Before the British colonialism, Arabic language was the official language in some of the great empires in Nigeria such as the Kanem Borno Empire. Islam, on the other hand, is the state religion. Both the rulers and the ruled were deeply involved in the pursuit of Arabic and Islamic knowledge traveling as far as Egypt, Saudia Arabia for scholarship. Their homes are like a modern library where Islamic books are kept and used to teach the community the different fields of Arabic and Islamic Studies. Scholars of Arabic and Islamic Studies were highly regarded and well respected in the society as they were the decision makers, diplomats and advisers to the authorities. Unfortunately, the colonizers used their influence and force to replace this language with a foreign language. In fact, they tried to exterminate it. Arabic became less important in the country. Arabic and Islamic Students became less significant and anybody studying Arabic or Islamic Studies is looked down at with disdain, and the course is considered unprofessional. This paper aims at casting a glance in the position of Arabic and Islamic Studies in Yobe State, Nigeria and social, political, economical and moral challenges faced by the students at institutions of learning.

Keywords: challenges, students of Arabic and Islamic studies, tertiary, institutions, Yobe

Procedia PDF Downloads 353
8090 India’s Deterrence Program: Defense or Development

Authors: Aneri Mehta, Krunal Mehta

Abstract:

A doctrine, any doctrine, incorporates a set of beliefs or principles held by a body of persons. A national nuclear doctrine represents, therefore, the collective set of beliefs or principles held by the nation in regard to the utility of its nuclear weapons. India’s foreign policy has been profoundly affected by the nuclear explosions conducted in May 1998. The departure from the professed peaceful nuclear policies has had several implications for India’s defense and foreign policies. The explosions in Pokhran have aggravated tensions in south Asia by disrupting diplomatic initiatives with Pak and China. Diplomacy has been reduced to damage control. The object of India’s nuclear deterrence is to persuade an adversary that the costs to him of seeking a military solution to his political problems with India will far outweigh the benefits. The paper focuses on India’s guidelines governing nuclear policy, development of nuclear materials for effective deterrence as well as civil development purpose. The paper finds that security concerns and technological capabilities are important determinants of whether India develops a nuclear weapons programs, while security concerns, economic capabilities, and domestic politics help to explain the possession of nuclear weapons.

Keywords: foreign policy, nuclear deterrence, nuclear policy, development

Procedia PDF Downloads 517
8089 Problems and Prospects of Agricultural Biotechnology in Nigeria’s Developing Economy

Authors: Samson Abayomi Olasoju, Olufemi Adekunle, Titilope Edun, Johnson Owoseni

Abstract:

Science offers opportunities for revolutionizing human activities, enriched by input from scientific research and technology. Biotechnology is a major force for development in developing countries such as Nigeria. It is found to contribute to solving human problems like water and food insecurity that impede national development and threaten peace wherever it is applied. This review identified the problems of agricultural biotechnology in Nigeria. On the part of rural farmers, there is a lack of adequate knowledge or awareness of biotechnology despite the fact that they constitute the bulk of Nigerian farmers. On part of the government, the problems include: lack of adequate implementation of government policy on bio-safety and genetically modified products, inadequate funding of education as well as research and development of products related to biotechnology. Other problems include: inadequate infrastructures (including laboratory), poor funding and lack of national strategies needed for development and running of agricultural biotechnology. In spite of all the challenges associated with agricultural biotechnology, its prospects still remain great if Nigeria is to meet with the food needs of the country’s ever increasing population. The introduction of genetically engineered products will lead to the high productivity needed for commercialization and food security. Insect, virus and other related diseases resistant crops and livestock are another viable area of contribution of biotechnology to agricultural production. In conclusion, agricultural biotechnology will not only ensure food security, but, in addition, will ensure that the local farmers utilize appropriate technology needed for large production, leading to the prosperity of the farmers and national economic growth, provided government plays its role of adequate funding and good policy implementation.

Keywords: biosafety, biotechnology, food security, genetic engineering, genetic modification

Procedia PDF Downloads 167
8088 Dietary Diversification and Nutritional Education: A Strategy to Improve Child Food Security Status in the Rural Mozambique

Authors: Rodriguez Diego, Del Valle Martin, Hargreaves Matias, Riveros Jose Luis

Abstract:

Nutrient deficiencies due to a diet low in quantitative and qualitative terms, are prevalent throughout the developing world, especially in sub-Saharan Africa. Children and women of childbearing age are especially vulnerable. Limited availability, access and intake of animal foods at home and lack of knowledge about their value in the diet and the role they play in health, contribute to poor diet quality. Poor bioavailability of micronutrients in diets based on foods high in fiber and phytates, the low content of some micronutrients in these foods are further factors to consider. Goats are deeply embedded in almost every Sub-Saharan African rural culture, generally kept for their milk, meat, hair or leather. Goats have played an important role in African social life, especially in food security. Goat meat has good properties for human wellbeing, with a special role in lower income households. It has a high-quality protein (20 protein g/100 meat g) including all essential amino acids, good unsaturated/satured fatty acids relationship, and it is an important B-vitamin source with high micronutrients bioavailability. Mozambique has major food security problems, with poor food access and utilization, undiversified diets, chronic poverty and child malnutrition. Our objective was to design a nutritional intervention based on a dietary diversification, nutritional education, cultural beliefs and local resources, aimed to strengthen food security of children at Barrio Broma village (15°43'58.78"S; 32°46'7.27"E) in Chitima, Mozambique. Two surveys were conducted first of socio-productive local databases and then to 100 rural households about livelihoods, food diversity and anthropometric measurements in children under 5 years. Our results indicate that the main economic activity is goat production, based on a native breed with two deliveries per year in the absence of any management. Adult goats weighted 27.2±10.5 kg and raised a height of 63.5±3.8 cm. Data showed high levels of poverty, with a food diversity score of 2.3 (0-12 points), where only 30% of households consume protein and 13% iron, zinc, and B12 vitamin. The main constraints to food security were poor access to water and low income to buy food. Our dietary intervention was based on improving diet quality by increasing the access to dried goat meat, fresh vegetables, and legumes, and its utilization by a nutritional education program. This proposal was based on local culture and living conditions characterized by the absence of electricity power and drinkable water. The drying process proposed would secure the food maintenance under local conditions guaranteeing food safety for a longer period. Additionally, an ancient local drying technique was rescued and used. Moreover, this kind of dietary intervention would be the most efficient way to improve the infant nutrition by delivering macro and micronutrients on time to these vulnerable populations.

Keywords: child malnutrition, dietary diversification, food security, goat meat

Procedia PDF Downloads 298
8087 Burden of Communicable and Non-Communicable Disease in India: A Regional Analysis

Authors: Ajit Kumar Yadav, Priyanka Yadav, F. Ram

Abstract:

In present study is an effort to analyse the burden of diseases in the state. Disability Adjusted Life Years (DALY) is estimated non-communicable diseases. Multi-rounds (52nd, 60th and 71st round) of the National Sample Surveys (NSSO), conducted in 1995-96, 2004 and 2014 respectively, and Million Deaths Study (MDS) of 2001-03, 2006 and 2013-14 datasets are used. Descriptive and multivariate analyses are carried out to identify the determinants of different types of self-reported morbidity and DALY. The prevalence was higher for population aged 60 and above, among females, illiterates, and rich across the time period and for all the selected morbidities. The results were found to be significant at P<0.001. The estimation of DALY revealed that, the burden of communicable diseases was higher during infancy, noticeably among males than females in 2002. However, females aged 1-5 years were more vulnerable to report communicable diseases than the corresponding males. The age distribution of DALY indicates that individuals aged below 5 years and above 60 year were more susceptible to ill health. The growing incidence of non-communicable diseases especially among the older generations put additional burden on the health system in the state. The state has to grapple with the unsettled preventable infectious diseases in one hand and growing non-communicable in other hand.

Keywords: disease burden, non-communicable, communicable, India and region

Procedia PDF Downloads 245
8086 Mother-Child Attachment and Anxiety Symptoms in Middle Childhood: Differences in Levels of Attachment Security

Authors: Simran Sharda

Abstract:

There is increasing evidence that leads psychologists today to believe that the attachment formed between a mother and child plays a much more profound role in later-life outcomes than previously expected. Particularly, the fact that a link may exist between maternal attachment and the development in addition to the severity of social anxiety in middle childhood seems to be gaining ground. This research will examine and address a myriad of major issues related to the impact of mother-child attachment: behaviors of children with different levels of secure attachment, various aspects of anxiety in relation to attachment security as well as other styles of mother-child attachments, especially avoidant attachment and over-attachment. This analysis serves to compile previous literature on the subject and touch light upon a logical extension of the research. Moreover, researchers have identified links between attachment and the externalization of problem behaviors: these behaviors may later manifest as social anxiety as well as increased severity and likelihood of PTSD diagnosis (an anxiety disorder). Furthermore, secure attachment has been linked to increased health benefits, cognitive skills, emotive socialization, and developmental psychopathology.

Keywords: child development, anxiety, cognition, developmental psychopathology, mother-child relationships, maternal, cognitive development

Procedia PDF Downloads 154
8085 Indonesia’s Defense Diplomacy Strength Towards China’s Aggressive Maritime Policy

Authors: Pangihutan Panjaitan, Helda Risman, Devindra Oktaviano

Abstract:

This research is departed from the security issues generated from China’s unilateral claims in the South China Sea conflict. The diplomacy challenges come from Indonesia’s relations with China as well as with ASEAN-member countries involved in the conflict. It is estimated that the conflict in the South China Sea region will become an endless conflict. Comprehensively, Indonesia is implementing a gradual shift in diplomatic approach in creating positive and constructive ties among Indonesia, China, and ASEAN. In line with the rapid-changing world order, the conventional military approach becomes less significant in today’s modern inter-state interactions. This research is conducted in a qualitative literature review to explain how Indonesia’s recent soft diplomacy approach applied in the South China Sea conflict. This type of diplomacy theoretically assumed as one of the most preferred ways to establish mutual trust and confidence among conflicting parties. Maritime issues found its significance in contemporary foreign policy since the world’s most dynamic region has moved to the archipelagic Asia-Pacific. As mentioned by rationalists, every country, including Indonesia, has surely formulated its own prominent national interest, such as the defense aspect. Finally, this research will provide a deep analysis on Indonesia’s centrality in ASEAN as an effective way to ensure Indonesia’s strategic policy in the region well accommodated.

Keywords: soft diplomacy, south China sea, national defense, China

Procedia PDF Downloads 155
8084 Intestacy and Business Continuity among Entrepreneurs in Ondo State, Nigeria

Authors: Igbekoyi Olusola Esther, Olurankinse Felix

Abstract:

This paper examined the factors that militate against Will writing among entrepreneurs in Ondo State Nigeria and the effect of intestate death on business continuity after the exit of the entrepreneurs. The paper was written with a view to providing information on the reasons why intestate death is common among entrepreneurs in Ondo State and the effects on continuity of business after death of the initial owners. Data were obtained from primary source through the administration of questionnaires to entrepreneurs drawn from 50 registered manufacturing companies. These companies have been in existence for a minimum of 10 years with minimum staff strength of 20 workers each. These companies were selected using the purposive random sampling technique in order to capture firms that meet the requirements of this paper. Data obtained were analyzed using descriptive statistics, chi-square and regression analysis. The findings of the paper revealed that administration of Will, traditional beliefs, Will execution procedures, age and non- admissibility of Wills in court are the major factors that militates against Will writing among entrepreneurs in Ondo State. It was also discovered that chaos and instability in business, reduction in sales and productivity, poor succession planning, polygamous nature of marriages, difficulty in sourcing for funds and gender preference are joint predictors of business continuity in event intestate death which is evident in the result where R2 =.954;(F 6, 26)= 89.644; (P < 0.01). The individual beta co-efficient, t- statistics and significance of each variable revealed that gender preference (.735; 7.031; .000) and poor succession plan (.402; 2.840; .009) have significant positive effect on business continuity; while reduction in sales and productivity (-.059; -.335; .740) and difficulty in sourcing for funds (-.217; -1.367; .188) have negative effect; other variables also have positive relationship but they are not significant. It is therefore concluded that business continuity after the exit of the entrepreneur is highly dependent on the rebuilding of confidence on Wills administration in ondo state Nigeria, proper succession planning and elimination of gender preferences.

Keywords: intestacy, business continuity, entrepreneurs, will, succession planning

Procedia PDF Downloads 327
8083 A Method for False Alarm Recognition Based on Multi-Classification Support Vector Machine

Authors: Weiwei Cui, Dejian Lin, Leigang Zhang, Yao Wang, Zheng Sun, Lianfeng Li

Abstract:

Built-in test (BIT) is an important technology in testability field, and it is widely used in state monitoring and fault diagnosis. With the improvement of modern equipment performance and complexity, the scope of BIT becomes larger, and it leads to the emergence of false alarm problem. The false alarm makes the health assessment unstable, and it reduces the effectiveness of BIT. The conventional false alarm suppression methods such as repeated test and majority voting cannot meet the requirement for a complicated system, and the intelligence algorithms such as artificial neural networks (ANN) are widely studied and used. However, false alarm has a very low frequency and small sample, yet a method based on ANN requires a large size of training sample. To recognize the false alarm, we propose a method based on multi-classification support vector machine (SVM) in this paper. Firstly, we divide the state of a system into three states: healthy, false-alarm, and faulty. Then we use multi-classification with '1 vs 1' policy to train and recognize the state of a system. Finally, an example of fault injection system is taken to verify the effectiveness of the proposed method by comparing ANN. The result shows that the method is reasonable and effective.

Keywords: false alarm, fault diagnosis, SVM, k-means, BIT

Procedia PDF Downloads 153
8082 Public Wi-Fi Security Threat Evil Twin Attack Detection Based on Signal Variant and Hop Count

Authors: Said Abdul Ahad Ahadi, Elyas Baray, Nitin Rakesh, Sudeep Varshney

Abstract:

Wi-Fi is a widely used internet source that is used to provide internet access in many areas such as Stores, Cafes, University campuses, Restaurants and so on. This technology brought more facilities in communication and networking. On the other hand, due to the transmission of data over the air, which makes the network vulnerable, so it becomes prone to various threats such as Evil Twin and etc. The Evil Twin is a kind of adversary which impersonates a legitimate access point (LAP) as it can happen by spoofing the name (SSID) and MAC address (BSSID) of a legitimate access point (LAP). And this attack can cause many threats such as MITM, Service Interruption, Access point service blocking. Various Evil Twin Attack Detection Techniques are proposed, but they require additional hardware, or they require protocol modification. In this paper, we proposed a new technique based on Access Point’s two fingerprints, Received Signal Strength Indicator (RSSI) and Hop Count, that is hard to copy by an adversary. And we implemented the technique in a system called “ETDetector,” which can detect and prevent the attack.

Keywords: evil twin, LAP, SSID, Wi-Fi security, signal variation, ETAD, kali linux, scapy, python

Procedia PDF Downloads 140
8081 Risk Measurement and Management Strategies in Poultry Farm Enterprises in Imo State, Nigeria

Authors: Donatus Otuiheoma Ohajianya, Augusta Onyekachi Unamba

Abstract:

This study analyzed risk among poultry farm enterprises in Imo State of Nigeria. Specifically, it examined sources of risks, the major risks associated with poultry farm enterprise, and the risk-reducing strategies among the poultry farm enterprises in the study area. Primary data collected in 2015 with validated questionnaire from 120 proportionately and randomly selected poultry farm enterprises were used for the study. The data were analyzed with descriptive statistics and W-Statistic that was validated with Pearson Criterion (X2). The results showed that major risk sources affecting poultry farm enterprises were production, marketing, financial and political in that order. The results found a W-Statistic value of 0.789, which was verified by Pearson Criterion to obtain X2-Calculated value of 4.65 which is lower that X2-Critical value of 11.07 at 5% significant level. The risk-reducing strategies were found to be diversification, savings, co-operative marketing, borrowing, and insurance. It was recommended that government and donor agencies should make policies aimed at encouraging poultry farm enterprises adopt the highlighted risk-reducing strategies in risk management to improve their productivity and farm income.

Keywords: risk, measurement, management, poultry farm, Imo State

Procedia PDF Downloads 298
8080 Managing Gender Based Violence in Nigeria: A Legal Conundrum

Authors: Foluke Dada

Abstract:

The Prevalence of gender-based violence in Nigeria is of such concern and magnitude that the government has intervened by ratifying international instruments such as the convention on the elimination of all forms of discrimination against women, the declaration on the elimination of violence against women; the protocol to the African charter on human and people’s rights on the rights of women, etc. By promulgating domestic laws that sought to prevent the perpetration of Gender-based violence and also protect victims from future occurrences. Nigeria principally has two legal codes creating criminal offenses and punishments for breach of those offenses, the Criminal Code Law, applying to most states in Southern Nigeria and the Penal Code applying to states in Northern Nigeria. Individual State laws such as the Ekiti State and Lagos State Gender-Based Violence laws are also discussed. This paper addresses Gender-Based Violence in Nigeria and exposes the inadequacies in the laws and their application. The paper postulates that there is a need for more workable public policy that strengthens the social structure fortified by the law in order to engender the necessary changes and provide the opportunity for government to embark on grassroots-based advocacy that engage the victims and sensitize them of their rights and how they can enjoy some of the protections afforded by the laws.

Keywords: gender, violence, human rights, law and policy

Procedia PDF Downloads 609
8079 Correlation and Prediction of Biodiesel Density

Authors: Nieves M. C. Talavera-Prieto, Abel G. M. Ferreira, António T. G. Portugal, Rui J. Moreira, Jaime B. Santos

Abstract:

The knowledge of biodiesel density over large ranges of temperature and pressure is important for predicting the behavior of fuel injection and combustion systems in diesel engines, and for the optimization of such systems. In this study, cottonseed oil was transesterified into biodiesel and its density was measured at temperatures between 288 K and 358 K and pressures between 0.1 MPa and 30 MPa, with expanded uncertainty estimated as ±1.6 kg.m^-3. Experimental pressure-volume-temperature (pVT) cottonseed data was used along with literature data relative to other 18 biodiesels, in order to build a database used to test the correlation of density with temperarure and pressure using the Goharshadi–Morsali–Abbaspour equation of state (GMA EoS). To our knowledge, this is the first that density measurements are presented for cottonseed biodiesel under such high pressures, and the GMA EoS used to model biodiesel density. The new tested EoS allowed correlations within 0.2 kg•m-3 corresponding to average relative deviations within 0.02%. The built database was used to develop and test a new full predictive model derived from the observed linear relation between density and degree of unsaturation (DU), which depended from biodiesel FAMEs profile. The average density deviation of this method was only about 3 kg.m-3 within the temperature and pressure limits of application. These results represent appreciable improvements in the context of density prediction at high pressure when compared with other equations of state.

Keywords: biodiesel density, correlation, equation of state, prediction

Procedia PDF Downloads 609
8078 Conditions for Fault Recovery of Interconnected Asynchronous Sequential Machines with State Feedback

Authors: Jung–Min Yang

Abstract:

In this paper, fault recovery for parallel interconnected asynchronous sequential machines is studied. An adversarial input can infiltrate into one of two submachines comprising parallel composition of the considered asynchronous sequential machine, causing an unauthorized state transition. The control objective is to elucidate the condition for the existence of a corrective controller that makes the closed-loop system immune against any occurrence of adversarial inputs. In particular, an efficient existence condition is presented that does not need the complete modeling of the interconnected asynchronous sequential machine.

Keywords: asynchronous sequential machines, parallel composi-tion, corrective control, fault tolerance

Procedia PDF Downloads 227
8077 Improved 3D Structure Prediction of Beta-Barrel Membrane Proteins by Using Evolutionary Coupling Constraints, Reduced State Space and an Empirical Potential Function

Authors: Wei Tian, Jie Liang, Hammad Naveed

Abstract:

Beta-barrel membrane proteins are found in the outer membrane of gram-negative bacteria, mitochondria, and chloroplasts. They carry out diverse biological functions, including pore formation, membrane anchoring, enzyme activity, and bacterial virulence. In addition, beta-barrel membrane proteins increasingly serve as scaffolds for bacterial surface display and nanopore-based DNA sequencing. Due to difficulties in experimental structure determination, they are sparsely represented in the protein structure databank and computational methods can help to understand their biophysical principles. We have developed a novel computational method to predict the 3D structure of beta-barrel membrane proteins using evolutionary coupling (EC) constraints and a reduced state space. Combined with an empirical potential function, we can successfully predict strand register at > 80% accuracy for a set of 49 non-homologous proteins with known structures. This is a significant improvement from previous results using EC alone (44%) and using empirical potential function alone (73%). Our method is general and can be applied to genome-wide structural prediction.

Keywords: beta-barrel membrane proteins, structure prediction, evolutionary constraints, reduced state space

Procedia PDF Downloads 617
8076 Streamlining Cybersecurity Risk Assessment for Industrial Control and Automation Systems: Leveraging the National Institute of Standard and Technology’s Risk Management Framework (RMF) Using Model-Based System Engineering (MBSE)

Authors: Gampel Alexander, Mazzuchi Thomas, Sarkani Shahram

Abstract:

The cybersecurity landscape is constantly evolving, and organizations must adapt to the changing threat environment to protect their assets. The implementation of the NIST Risk Management Framework (RMF) has become critical in ensuring the security and safety of industrial control and automation systems. However, cybersecurity professionals are facing challenges in implementing RMF, leading to systems operating without authorization and being non-compliant with regulations. The current approach to RMF implementation based on business practices is limited and insufficient, leaving organizations vulnerable to cyberattacks resulting in the loss of personal consumer data and critical infrastructure details. To address these challenges, this research proposes a Model-Based Systems Engineering (MBSE) approach to implementing cybersecurity controls and assessing risk through the RMF process. The study emphasizes the need to shift to a modeling approach, which can streamline the RMF process and eliminate bloated structures that make it difficult to receive an Authorization-To-Operate (ATO). The study focuses on the practical application of MBSE in industrial control and automation systems to improve the security and safety of operations. It is concluded that MBSE can be used to solve the implementation challenges of the NIST RMF process and improve the security of industrial control and automation systems. The research suggests that MBSE provides a more effective and efficient method for implementing cybersecurity controls and assessing risk through the RMF process. The future work for this research involves exploring the broader applicability of MBSE in different industries and domains. The study suggests that the MBSE approach can be applied to other domains beyond industrial control and automation systems.

Keywords: authorization-to-operate (ATO), industrial control systems (ICS), model-based system’s engineering (MBSE), risk management framework (RMF)

Procedia PDF Downloads 88
8075 Poverty Alleviation and Agricultural Management Policies in Nasarawa State of Nigeria: Lessons from the Roots and Tuber Crops Expansion for Increased Food Production (1996-2011)

Authors: Yahaya Abdullahi Adadu, Canice Erunke Esidene

Abstract:

The problems of socio-economic development have been a major challenge bedeviling the Nigerian post-colonial state since her political independence from Britain in October I,1960. Critics have argued that the dilemma of Nigeria’s economic survival started since the early 1970s when the agricultural sector which supposedly was the economic mainstay has been literally substituted with the gains of the oil petro-dollars coming from the foreign exchange earnings. Agriculture therefore, which used to be a major player in terms of human and national upliftment in Nigeria have been given a back seat while oil and gas has taken over the front burner in virtually every aspect of Nigeria’s national life. This study is therefore an exposition of the efforts of the Nasarawa state government in reversing the dangerous trend in which the over reliance on oil wealth has caused to persons, individuals and groups in terms of the prevailing levels of poverty and other attendant vices therein. The study focuses on the management policies of the various regimes in the state since its inception in 1996, with particular reference to the regime types-military and civilian alike in propelling the needed policy change, which could transform the economy in line with international best practices. Particular emphasis will be paid to the BADA-KOSHI agricultural scheme whose interest was to recover the lost glory of rural agriculture through series of roots and tuber expansion, and particularly such crops as yam minissetts, cassava, sweet potatoes and coco-yam, respectively. The paper covers the period between 1996 -2011, a period considered to be critical in the agricultural revolution of the state. The study adopts a theoretical approach via secondary methods of analysis for the efficient explanations of the burning issues under consideration. The paper sums up with policy recommendations and conclusion.

Keywords: poverty, agriculture, Badakoshi, rural policy management

Procedia PDF Downloads 438
8074 The Conservatoire Crisis: An Exploration into the Lived Experiences of Conservatoire Graduates

Authors: Scott Caizley

Abstract:

Widening participation amongst state schooled and British and Minority Ethnic (BME) students in UK conservatoires throughout the past years has persisted to remain at an all time low despite major efforts to increase access for those from underrepresented backgrounds. In the academic year of 2017/18, two of the UK’s leading music conservatoires recruited less state school students than Oxbridge. Whilst conservatories face further public stigmatisation and heavy financial penalties for failing to meet government benchmarks; there appears to be a more costly outcome to this crisis. This of course, is the lack of sociocultural diversity, which is perpetuated both within the conservatoire sector and the classical music industry. This research investigates the lived experiences of former state-schooled students who attended a UK music conservatoire. Given the participant’s underrepresented status, the research seeks to answer whether or not the students are fitting in or standing out within the conservatoire environment. The research will explore the findings through a Bourdieusian contextual framework with hope of generating a wealth of new practises to the field of Higher Music Education. It is through illuminating the underrepresented voices within these elite spaces, which could aid future research and policy to help tackle the diversity dilemma and give classical music the social and cultural renewal it so desperately needs.

Keywords: classical music, lived experiences, higher music education, Bourdieusian

Procedia PDF Downloads 131
8073 Optimizing Irrigation Scheduling for Sustainable Agriculture: A Case Study of a Farm in Onitsha, Anambra State, Nigeria

Authors: Ejoh Nonso Francis

Abstract:

: Irrigation scheduling is a critical aspect of sustainable agriculture as it ensures optimal use of water resources, reduces water waste, and enhances crop yields. This paper presents a case study of a farm in Onitsha, Anambra State, Nigeria, where irrigation scheduling was optimized using a combination of soil moisture sensors and weather data. The study aimed to evaluate the effectiveness of this approach in improving water use efficiency and crop productivity. The results showed that the optimized irrigation scheduling approach led to a 30% reduction in water use while increasing crop yield by 20%. The study demonstrates the potential of technology-based irrigation scheduling to enhance sustainable agriculture in Nigeria and beyond.

Keywords: irrigation scheduling, sustainable agriculture, soil moisture sensors, weather data, water use efficiency, crop productivity, nigeria, onitsha, anambra state, technology-based irrigation scheduling, water resources, environmental degradation, crop water requirements, overwatering, water waste, farming systems, scalability

Procedia PDF Downloads 71
8072 Science behind Quantum Teleportation

Authors: Ananya G., B. Varshitha, Shwetha S., Kavitha S. N., Praveen Kumar Gupta

Abstract:

Teleportation is the ability to travel by just reappearing at some other spot. Though teleportation has never been achieved, quantum teleportation is possible. Quantum teleportation is a process of transferring the quantum state of a particle onto another particle, under the circumstance that one does not get to know any information about the state in the process of transformation. This paper presents a brief overview of quantum teleportation, discussing the topics like Entanglement, EPR Paradox, Bell's Theorem, Qubits, elements for a successful teleport, some examples of advanced teleportation systems (also covers few ongoing experiments), applications (that includes quantum cryptography), and the current hurdles for future scientists interested in this field. Finally, major advantages and limitations to the existing teleportation theory are discussed.

Keywords: teleportation, quantum teleportation, quantum entanglement, qubits, EPR paradox, bell states, quantum particles, spooky action at a distance

Procedia PDF Downloads 112
8071 An Experimental Study for Assessing Email Classification Attributes Using Feature Selection Methods

Authors: Issa Qabaja, Fadi Thabtah

Abstract:

Email phishing classification is one of the vital problems in the online security research domain that have attracted several scholars due to its impact on the users payments performed daily online. One aspect to reach a good performance by the detection algorithms in the email phishing problem is to identify the minimal set of features that significantly have an impact on raising the phishing detection rate. This paper investigate three known feature selection methods named Information Gain (IG), Chi-square and Correlation Features Set (CFS) on the email phishing problem to separate high influential features from low influential ones in phishing detection. We measure the degree of influentially by applying four data mining algorithms on a large set of features. We compare the accuracy of these algorithms on the complete features set before feature selection has been applied and after feature selection has been applied. After conducting experiments, the results show 12 common significant features have been chosen among the considered features by the feature selection methods. Further, the average detection accuracy derived by the data mining algorithms on the reduced 12-features set was very slight affected when compared with the one derived from the 47-features set.

Keywords: data mining, email classification, phishing, online security

Procedia PDF Downloads 427
8070 Application to Monitor the Citizens for Corona and Get Medical Aids or Assistance from Hospitals

Authors: Vathsala Kaluarachchi, Oshani Wimalarathna, Charith Vandebona, Gayani Chandrarathna, Lakmal Rupasinghe, Windhya Rankothge

Abstract:

It is the fundamental function of a monitoring system to allow users to collect and process data. A worldwide threat, the corona outbreak has wreaked havoc in Sri Lanka, and the situation has gotten out of hand. Since the epidemic, the Sri Lankan government has been unable to establish a systematic system for monitoring corona patients and providing emergency care in the event of an outbreak. Most patients have been held at home because of the high number of patients reported in the nation, but they do not yet have access to a functioning medical system. It has resulted in an increase in the number of patients who have been left untreated because of a lack of medical care. The absence of competent medical monitoring is the biggest cause of mortality for many people nowadays, according to our survey. As a result, a smartphone app for analyzing the patient's state and determining whether they should be hospitalized will be developed. Using the data supplied, we are aiming to send an alarm letter or SMS to the hospital once the system recognizes them. Since we know what those patients need and when they need it, we will put up a desktop program at the hospital to monitor their progress. Deep learning, image processing and application development, natural language processing, and blockchain management are some of the components of the research solution. The purpose of this research paper is to introduce a mechanism to connect hospitals and patients even when they are physically apart. Further data security and user-friendliness are enhanced through blockchain and NLP.

Keywords: blockchain, deep learning, NLP, monitoring system

Procedia PDF Downloads 130
8069 Gender Influence in Yoruba Festivals: A Case Study of Agbaasin Festival in Isanlu-Isin, Kwara State, Nigeria

Authors: Alice Abiodun Atolagbe, Samson Abiodun Atolagbe

Abstract:

All over the world and in the history of mankind, festivals have evolved to celebrate one thing or the other. The Yoruba people are no exemptions and they have several festivals which they celebrate at different times, for different reasons and in different communities. Because mankind is mainly of male and female, most of the festivals involve the two sexes, though different roles are usually assigned. In this paper, the writers examine the influence of gender in Yoruba festival using ‘Agbaasin’ festival in Isanlu-Isin, Kwara State of Nigeria as a case study. A research was conducted by visiting the priests, worshipers, and shrine of ‘Agbaasin’ during which interviews were conducted, documented, and analyzed. It was, thereafter, discovered that men dominated the process of celebrating the ‘Agbaasin’ festival even to the extent of cooking by themselves. The paper recommends that women should be more involved in political and communal activities, government should encourage and sponsor researches on gender issues and that, authors of books and writers of plays should create some fora to encourage women empowerment among the Yoruba people. It is hoped that this paper would contribute to the pool of literature available on gender issues among the Yoruba people of Nigeria.

Keywords: gender, Yoruba, festival, Agbaasin, Isanlu-Isin, Kwara State

Procedia PDF Downloads 316
8068 Prevalence and Pattern of Abnormalities Pap Smear Examination in Women Attending Fertility Clinic in Uniosun Teaching Hospitals, Osun State, Nigeria

Authors: Ayodeji Blessing Ajileye

Abstract:

Introduction: Infertility is described as failure to conceive after one year of unprotected sexual intercourse. One of the causes of female infertility is caused by cervical abnormalities which may be due to bacterial and parasitological infections, hormonal imbalances of Lentinizing hormone, follicular stimulating hormone, oestrogen hormone and progesterone hormone. Aim of the Study: This study aimed to determine the prevalence and pattern of abnormal cervical Pap smear in women with infertility attending fertility clinics at Uniosun Teaching Hospitals Osogbo, Osun State. Methods: This study was conducted at the fertility clinic of University of Osun Teaching Hospital, Osogbo, Osun State. The study population comprised of 50 infertile women and 50 fertile women who are attending the gynecology clinic of University of Osun Teaching Hospital, Osogbo, Osun State. Questionnaire was used to obtain relevant data. Cervical sample was collected using Ayre’s spatula, two smears were prepared and stained with Papanicolaous and H&E staining techniques. Results were analyzed using frequency table. Results: This study observed the prevalence of abnormal cervical smear among infertility women to be 16(30%), while only 03(6%) were observed among the control group (fertile women). Atypical squamous cells of undetermined significance have the highest abnormalities observed in this study with 30%, about 28% of the Pap smear results were negative for inflammation, while total inflammation observed was 72% among the infertility women. Conclusion: This study concluded that abnormal pap smears in this study is significantly more often in women with infertility as compared with fertile women.

Keywords: infertility, oestrogen hormone, pap smears, progesterone hormone

Procedia PDF Downloads 77
8067 Packet Fragmentation Caused by Encryption and Using It as a Security Method

Authors: Said Rabah Azzam, Andrew Graham

Abstract:

Fragmentation of packets caused by encryption applied on the network layer of the IOS model in Internet Protocol version 4 (IPv4) networks as well as the possibility of using fragmentation and Access Control Lists (ACLs) as a method of restricting network access to certain hosts or areas of a network.Using default settings, fragmentation is expected to occur and each fragment to be reassembled at the other end. If this does not occur then a high number of ICMP messages should be generated back towards the source host indicating that the packet is too large and that it needs to be made smaller. This result is also expected when the MTU is changed for certain links between devices.When using ACLs and packet fragments to restrict access to hosts or network segments it is possible that ACLs cannot be set up in this way. If ACLs cannot be setup to allow only fragments then it is a limitation of the hardware’s firmware holding back this particular method. If the ACL on the restricted switch can be set up in such a way to allow only fragments then a connection that forces packets to fragment should be allowed to pass through the ACL. This should then make a network connection to the destination machine allowing data to be sent to and from the destination machine. ICMP messages from the restricted access switch and host should also be blocked from being sent back across the link which will be shown in an SSH session into the switch.

Keywords: fragmentation, encryption, security, switch

Procedia PDF Downloads 330
8066 HcDD: The Hybrid Combination of Disk Drives in Active Storage Systems

Authors: Shu Yin, Zhiyang Ding, Jianzhong Huang, Xiaojun Ruan, Xiaomin Zhu, Xiao Qin

Abstract:

Since large-scale and data-intensive applications have been widely deployed, there is a growing demand for high-performance storage systems to support data-intensive applications. Compared with traditional storage systems, next-generation systems will embrace dedicated processor to reduce computational load of host machines and will have hybrid combinations of different storage devices. The advent of flash- memory-based solid state disk has become a critical role in revolutionizing the storage world. However, instead of simply replacing the traditional magnetic hard disk with the solid state disk, it is believed that finding a complementary approach to corporate both of them is more challenging and attractive. This paper explores an idea of active storage, an emerging new storage configuration, in terms of the architecture and design, the parallel processing capability, the cooperation of other machines in cluster computing environment, and a disk configuration, the hybrid combination of different types of disk drives. Experimental results indicate that the proposed HcDD achieves better I/O performance and longer storage system lifespan.

Keywords: arallel storage system, hybrid storage system, data inten- sive, solid state disks, reliability

Procedia PDF Downloads 441
8065 The Causes and Effects of Delinquent Behaviour among Students in Juvenile Home: A Case Study of Osun State

Authors: Baleeqs, O. Adegoke, Adeola, O. Aburime

Abstract:

Juvenile delinquency is fast becoming one of the largest problems facing many societies due to many different factors ranging from parental factors to bullying at schools all which had led to different theoretical notions by different scholars. Delinquency is an illegal or immoral behaviour, especially by the young person who behaves in a way that is illegal or that society does not approve of. The purpose of the study was to investigate causes and effects of delinquent behaviours among adolescent in juvenile home in Osun State. A descriptive survey research type was employed. The random sampling technique was used to select 100 adolescents in Juvenile home in Osun State. Questionnaires were developed and given to them. The data collected from this study were analyzed using frequency counts and percentage for the demographic data in section A, while the two research hypotheses postulated for this study were tested using t-test statistics at the significance level of 0.05. Findings revealed that the greatest school effects of delinquent behaviours among adolescent in juvenile home in Osun by respondents were their aggressive behaviours. Findings revealed that there was a significant difference in the causes and effects of delinquent behaviours among adolescent in juvenile home in Osun State. It was also revealed that there was no significant difference in the causes and effects of delinquent behaviours among secondary school students in Osun based on gender. These recommendations were made in order to address the findings of this study: More number of teachers should be appointed in the observation home so that it will be possible to provide teaching to the different age group of delinquents. Developing the infrastructure facilities of short stay homes and observation home is a top priority. Proper counseling session’s interval is highly essential for these juveniles.

Keywords: behaviour, delinquency, juvenile, random sampling, statistical techniques, survey

Procedia PDF Downloads 189
8064 Corruption, a Prelude to Problems of Governance in Pakistan

Authors: Umbreen Javaid

Abstract:

Pakistan’s experience with nascent, yet to be evolved democratic institutions inherited from the British Empire, has not been a pleasant one when evaluated in terms of good governance, development, and success of anti-corruption mechanisms. The country has remained entangled in a vicious circle of accumulating large budget deficits, dwindling economy, low foreign direct investment, political instability, and rising terrorism. It is thus not surprising that no account of the state aimed at analyzing the six-decade journey since her inception is replete with negative connotations like dysfunctional, failed, fragile or weak state. The limited pool of experience of handling democratic institutions and lack of political will be on the part of country’s political elite to transform the society on democratic footings have left Pakistan as a “limited access order” state. The widespread illiteracy becomes a double edge sword when a largely illiterate electorate elects representatives who mostly come from a semi-educated background with the limited understanding of democratic minutiae and little or no proclivity to resist monetary allures. The prevalence of culture of patronage with widespread poverty coupled with absence of a comprehensive system of investigating, prosecuting and adjudicating cases of corruption encourage the practice that has been eroding the state’s foundations since her inception owing to the unwillingness of the traditional elites who have been strongly resistant towards any attempts aimed at disseminating powers. An analytical study of the historical, political, cultural, economic and administrative hurdles that have been at work in impeding Pakistan’s transition to a democratic, accountable society would be instrumental in understanding the issue of widespread plague of corruption and state’s inefficiency to cope with it effectively. The issue of corruption in Pakistan becomes more important when seen in the context of her vulnerability to terrorism and religious extremism. In this regard, Pakistan needs to learn a lot from developed countries in order to evolve a comprehensive strategy for combating and preventing this pressing issue.

Keywords: Pakistan, corruption, anti-corruption, limited access order

Procedia PDF Downloads 300
8063 Risk Management and Security Practice in Customs Supply Chain: Application of Cross ABC Method to the Moroccan Customs

Authors: Lamia Hammadi, Abdellah Ait Ouhman, Aomar Ibourk

Abstract:

It is widely assumed that the case of Customs Supply Chain is classified as a complex system, due to not only the variety and large number of actors, but also their complex structural links, and the interactions between these actors, that’s why this system is subject to various types of Risks. The economic, political and social impacts of those risks are highly detrimental to countries, businesses and the public, for this reason, Risk management in the customs supply chain is becoming a crucial issue to ensure the sustainability, security and safety. The main characteristic of customs risk management approach is determining which goods and means of transport should be examined? To what extend? And where future compliance resources should be directed? The purposes of this article are, firstly to deal with the concept of customs supply chain, secondly present our risk management approach based on Cross Activity Based Costing (ABC) Method as an interactive tool to support decision making in customs risk management. Finally, analysis of case study of Moroccan customs to putting theory into practice and will thus draw together the various elements of a structured and efficient risk management approach.

Keywords: cross ABC method, customs supply chain, risk, risk management

Procedia PDF Downloads 374
8062 Tax Criminal Case Settlement Through Obligative Justice Approach to Increase the State Revenue

Authors: Pujiyono, Reda Manthovani, Deny Tri Ardianto, Rabani Halawa, Isharyanto

Abstract:

This research has background that the taxpayer (defendant) who has paid off the tax payable and the tax penalty payable after the tax case file has been transferred to the court, while the legality of stopping the prosecution of tax cases on the grounds that in the interest of state revenue is not regulated in the provisions of Law Number 8 of 1981 concerning The Criminal Procedure Code and Law Number 28 of 2007 concerning the Third Amendment to Law Number 6 of 1983 concerning General Provisions and Tax Procedures as amended several times, most recently by Law Number 16 of 2009 concerning Stipulation of Government Regulation in Lieu of Law Number 5 of 2008 concerning Fourth Amendment to Law Number 6 0f 1983 concerning General Provisions and Tax Procedures to become Law, even though at the investigation stage it regulates the mechanism for stopping the investigation for the sake of the interest of acceptance ne this is because before the case file is transferred to the court where at the request of the Minister of Finance of The Republic of Indonesia can stop the investigation in the interest of state revenue so that based on this phenomenon a legal vacuum is found. Therefore, a non-penal policy is needed from the public prosecutor to resolve tax crime cases without going through litigation in court through the penal mediation method using the Plea Bargaining System which adheres to the principles of restorative justice and obligative justice based on the ultimum remedium principle and the principle of opportunity in order to realize the principle of fast, simple and low cost justice (content principle). This research is a normative legal research, using a statutory approach, conceptual approach, and comparative law approach. Regulations that is used in many countries, include America, The Netherlands and Singapore. The results of this study indicate that there is a reformulation of the tax criminal justice system which regulates the mechanism, qualifications and authority to terminate the prosecution of tax cases in the interest of state revenues in order to achieve legal goals which are not only for legal certainty but more that, namely providing benefits and legal justice for people seeking justice.

Keywords: obligative justice, regulation, state reveneus, tax criminal

Procedia PDF Downloads 80