Search results for: Arabic Fodio Nigeria security
3771 Cooperative Agents to Prevent and Mitigate Distributed Denial of Service Attacks of Internet of Things Devices in Transportation Systems
Authors: Borhan Marzougui
Abstract:
Road and Transport Authority (RTA) is moving ahead with the implementation of the leader’s vision in exploring all avenues that may bring better security and safety services to the community. Smart transport means using smart technologies such as IoT (Internet of Things). This technology continues to affirm its important role in the context of Information and Transportation Systems. In fact, IoT is a network of Internet-connected objects able to collect and exchange different data using embedded sensors. With the growth of IoT, Distributed Denial of Service (DDoS) attacks is also growing exponentially. DDoS attacks are the major and a real threat to various transportation services. Currently, the defense mechanisms are mainly passive in nature, and there is a need to develop a smart technique to handle them. In fact, new IoT devices are being used into a botnet for DDoS attackers to accumulate for attacker purposes. The aim of this paper is to provide a relevant understanding of dangerous types of DDoS attack related to IoT and to provide valuable guidance for the future IoT security method. Our methodology is based on development of the distributed algorithm. This algorithm manipulates dedicated intelligent and cooperative agents to prevent and to mitigate DDOS attacks. The proposed technique ensure a preventive action when a malicious packets start to be distributed through the connected node (Network of IoT devices). In addition, the devices such as camera and radio frequency identification (RFID) are connected within the secured network, and the data generated by it are analyzed in real time by intelligent and cooperative agents. The proposed security system is based on a multi-agent system. The obtained result has shown a significant reduction of a number of infected devices and enhanced the capabilities of different security dispositives.Keywords: IoT, DDoS, attacks, botnet, security, agents
Procedia PDF Downloads 1443770 The Economic Burden of Breast Cancer on Women in Nigeria: Implication for Socio-Economic Development
Authors: Tolulope Allo, Mofoluwake P. Ajayi, Adenike E. Idowu, Emmanuel O. Amoo, Fadeke Esther Olu-Owolabi
Abstract:
Breast cancer which was more prevalent in Europe and America in the past is gradually being mirrored across the world today with greater economic burden on low and middle income countries (LMCs). Breast cancer is the most common cancer among women globally and current studies have shown that a woman dies with the diagnosis of breast cancer every thirteen minutes. The economic cost of breast cancer is overwhelming particularly for developing economies. While it causes billion of dollar in losses of national income, it pushes millions of people below poverty line. This study examined the economic burden of breast cancer on Nigerian women, its impacts on their standard of living and its effects on Nigeria’s socio economic development. The study adopts a qualitative research approach using the in-depth interview technique to elicit valuable information from respondents with cancer experience from the Southern part of Nigeria. Respondents constituted women in their reproductive age (15-49 years) that have experienced and survived cancer and also those that are currently receiving treatment. Excerpts from the interviews revealed that the cost of treatment is one of the major factors contributing to the late presentation of breast cancer incidences among women as many of them could not afford to pay for their own treatment. The study also revealed that many women prefer to explore other options such as herbal treatments and spiritual consultations which is less expensive and affordable. The study therefore concludes that breast cancer diagnosis and treatment should be subsidized by the government in order to facilitate easy access and affordability thereby promoting early detection and reducing the economic burden of treatment on women.Keywords: breast cancer, development, economic burden, women
Procedia PDF Downloads 3603769 Glycemic Control in Rice Consumption among Households with Diabetes Patients: The Role of Food Security
Authors: Chandanee Wasana Kalansooriya
Abstract:
Dietary behaviour is a crucial factor affecting diabetes control. With increasing rates of diabetes prevalence in Asian countries, examining their dietary patterns, which are largely based on rice, is timely required. It has been identified that higher consumption of some rice varieties is associated with increased risk of type 2 diabetes. Although diabetes patients are advised to consume healthier rice varieties, which contains low glycemic, several conditions, one of which food insecurity, make them difficult to preserve those healthy dietary guidelines. Hence this study tries to investigate how food security affects on making right decisions of rice consumption within diabetes affected households using a sample from Sri Lanka, a country which rice considered as the staple food and records the highest diabetes prevalence rate in South Asia. The study uses data from the Household Income and Expenditure Survey 2016, a nationally representative sample conducted by the Department of Census and Statistics, Sri Lanka. The survey used a two-stage stratified sampling method to cover different sectors and districts of the country and collected micro-data on demographics, health, income and expenditures of different categories. The study uses data from 2547 households which consist of one or more diabetes patients, based on the self-recorded health status. The Household Dietary Diversity Score (HDDS), which constructed based on twelve food groups, is used to measure the level of food security. Rice is categorized into three groups according to their Glycemic Index (GI), high GI, medium GI and low GI, and the likelihood and impact made by food security on each rice consumption categories are estimated using a Two-part Model. The shares of each rice categories out of total rice consumption is considered as the dependent variable to exclude the endogeneity issue between rice consumption and the HDDS. The results indicate that the consumption of medium GI rice is likely to increase with the increasing household food security, but low GI varieties are not. Households in rural and estate sectors are less likely and Tamil ethnic group is more likely to consume low GI rice varieties. Further, an increase in food security significantly decreases the consumption share of low GI rice, while it increases the share of medium GI varieties. The consumption share of low GI rice is largely affected by the ethnic variability. The effects of food security on the likelihood of consuming high GI rice varieties and changing its shares are statistically insignificant. Accordingly, the study concludes that a higher level of food security does not ensure diabetes patients are consuming healthy rice varieties or reducing consumption of unhealthy varieties. Hence policy attention must be directed towards educating people for making healthy dietary choices. Further, the study provides a room for further studies as it reveals considerable ethnic and sectorial differences in making healthy dietary decisions.Keywords: diabetes, food security, glycemic index, rice consumption
Procedia PDF Downloads 1023768 The Use of Information and Communication Technologies in Electoral Procedures: Comments on Electronic Voting Security
Authors: Magdalena Musiał-Karg
Abstract:
The expansion of telecommunication and progress of electronic media constitute important elements of our times. The recent worldwide convergence of information and communication technologies (ICT) and dynamic development of the mass media is leading to noticeable changes in the functioning of contemporary states and societies. Currently, modern technologies play more and more important roles and filter down to almost every field of contemporary human life. It results in the growth of online interactions that can be observed by the inconceivable increase in the number of people with home PCs and Internet access. The proof of it is undoubtedly the emergence and use of concepts such as e-society, e-banking, e-services, e-government, e-government, e-participation and e-democracy. The newly coined word e-democracy evidences that modern technologies have also been widely used in politics. Without any doubt in most countries all actors of political market (politicians, political parties, servants in political/public sector, media) use modern forms of communication with the society. Most of these modern technologies progress the processes of getting and sending information to the citizens, communication with the electorate, and also – which seems to be the biggest advantage – electoral procedures. Thanks to implementation of ICT the interaction between politicians and electorate are improved. The main goal of this text is to analyze electronic voting (e-voting) as one of the important forms of electronic democracy in terms of security aspects. The author of this paper aimed at answering the questions of security of electronic voting as an additional form of participation in elections and referenda.Keywords: electronic democracy, electronic voting, security of e-voting, information and communication technology (ICT)
Procedia PDF Downloads 2423767 Providing Security to Private Cloud Using Advanced Encryption Standard Algorithm
Authors: Annapureddy Srikant Reddy, Atthanti Mahendra, Samala Chinni Krishna, N. Neelima
Abstract:
In our present world, we are generating a lot of data and we, need a specific device to store all these data. Generally, we store data in pen drives, hard drives, etc. Sometimes we may loss the data due to the corruption of devices. To overcome all these issues, we implemented a cloud space for storing the data, and it provides more security to the data. We can access the data with just using the internet from anywhere in the world. We implemented all these with the java using Net beans IDE. Once user uploads the data, he does not have any rights to change the data. Users uploaded files are stored in the cloud with the file name as system time and the directory will be created with some random words. Cloud accepts the data only if the size of the file is less than 2MB.Keywords: cloud space, AES, FTP, NetBeans IDE
Procedia PDF Downloads 2063766 Board Chairman, Share Ownership and Financial Reporting Quality of Microfinance Banks in Nigeria: Impact of Regulatory Changes
Authors: Muhammad Umar Kibiya
Abstract:
The study aims to examine whether regulatory changes have an impact on the financial reporting quality of Microfinance Banks in Nigeria. The research employed a panel data analysis technique, using data from 2018 to 2022. The sample includes 72 microfinance banks, using regression analyses to examine the relationship between variables. The findings indicate that Board Chairmanship has a positive and significant effect on financial reporting quality. It also reveals that share ownership has a negative and significant impact on financial reporting quality. The results suggest that regulatory changes have a positive and significant influence on financial reporting quality. Thus, findings have important implications for microfinance banks in Nigeria. It suggests that having a strong and competent board chairperson can enhance financial reporting quality, leading to more transparent and reliable information for stakeholders. Furthermore, the study highlights the importance of regulatory changes in improving financial reporting practices in the microfinance banking sector. The study contributes to the extant literature by providing empirical evidence on the relationship between board chairmanship, share ownership, financial reporting quality, and regulatory changes in microfinance banks. It further supports the concept that governance mechanisms and regulatory reforms play a crucial role in ensuring transparency and accountability within the microfinance banking sector. It recommends that microfinance banks should appoint experienced and qualified individuals as board chairpersons to enhance financial reporting quality. Furthermore, policymakers and regulatory authorities should continue to implement and enforce regulations that promote transparent financial reporting practices in microfinance banks.Keywords: board chairman, share ownership, financial reporting quality, microfinance, regulatory changes
Procedia PDF Downloads 673765 An Assessment of the Trend and Pattern of Vital Registration System in Shiroro Local Government Area of Niger State, Nigeria
Authors: Aliyu Bello Mohammed
Abstract:
Vital registration or registration of vital events is one of the three major sources of demographic data in Nigeria. The other two are the population census and sample survey. The former is judged to be an indispensable source of demographic data because, it provide information on vital statistics and population trends between two census periods. Various literacy works however depict the vital registration in Nigeria as incapable of providing accurate data for the country. The study has both theoretical and practical significances. The trends and pattern of vital registration has not received adequate research interest in Sub-Saharan Africa in general and Nigeria in particular. This has created a gap in understanding the extent and consequence of the scourge in Africa sub-region. Practically, the study also captures the policy interventions of government and Non-Governmental Organizations (NGOs) that would help enlighten the public on the importance of vital registration in Nigeria. Furthermore, feasible policy strategies that will enhance trends and pattern vital registration in the society would emanate from the study. The study adopted a cross sectional survey design and applied multi stage sampling techniques to sample 230 respondents from the general public in the study area. The first stage involved the splitting of the local government into wards. The second stage involves selecting streets, while the third stage was the households. In all, 6 wards were sampled for the study. The study utilized both primary and secondary sources of data. The primary sources of data used were the questionnaire, focus group discussion (FGD) and in-depth interview (IDI) guides while the secondary sources of data were journals and books, newspapers and magazines. Twelve FGD sessions with 96 study participants and five IDI sessions with the heads of vital registration facilities were conducted. The quantitative data were analyzed using Statistical Package for Social Sciences (SPSS). Descriptive statistics like tables, frequencies and percentages were employed in presenting and interpreting the data. Information from the qualitative data was transcribed and ordered in themes to ensure that outstanding points of the responses are noted. The following conclusions were drawn from the study: the available vital registration facilities are not adequate and were not evenly distributed in the study area; lack of awareness and knowledge of the existence and the importance of vital registration by majority of the people in the local government; distance to vital registration centres from their residents; most births in the area were not registered, and even among the few births that were registered, majority of them were registered after the limited period for registration. And the study reveals that socio-economic index, educational level and distance of facilities to residents are determinants of access to vital registration facility. The study concludes by discussing the need for a reliable and accurate vital registration system if Nigeria’s vision of becoming one of the top 20 economies in the world in 2020 would be realized.Keywords: trends, patterns, vital, registration and assessment
Procedia PDF Downloads 2543764 Utilization of Learning Resources in Enhancing the Teaching of Science and Technology Courses in Post Primary Institutions in Nigeria
Authors: Isah Mohammed Patizhiko
Abstract:
This paper aimed at discussing the important role learning resources play in enhancing the teaching and learning of science and technology courses in post primary institution in Nigeria. The paper highlighted the importance learning resources contributed to the effective understanding of the learners. The use of learning resources in the teaching of these courses will encourage teachers to be more exploratory and the learners to have more understanding. In this paper, different range of learning resources particularly common learning resources (learning resources not design primarily for education purposes) to enrich their teaching. The paper also highlighted how ordinary resource can be turned into an educational resource. Recommendations were proffered in the sourcing of learning resources ie from the market, library, institutions, museums, and dump refuse and concluded that good demonstration on the use of resources will engage the learner’s interest and will develop higher level of conceptual understanding in the learning area.Keywords: enhance, learning, resources, science and technology, teaching
Procedia PDF Downloads 4003763 The State and Poverty Reduction Strategy in Nigeria: An Assessement
Authors: Musa Ogah Ari
Abstract:
Poverty has engaged the attention of the global community. Both the rich and poor countries are concerned about its prevalence and impacts. This phenomenon is more pervasive among developing countries with the greater challenges manifesting among African countries. In Nigeria people live with very low income, and so decent three-square meals, clothes, shelter and other basic necessities are very difficult to come by for most of the population. Qualitative health facilities are seriously lacking to over 160 million population in the state. Equally lacking are educational and social infrastructures that can be available to the people at affordable rates. Roads linking the interior parts of the state are generally in deplorable conditions, particularly in the rainy season. Safe drinking water is hard to come by as the state is not properly placed and equipped to function in full capacity to serve the interest of the people. The challenges of poverty is definitely enormous for both the national and state governments consequently, debilitating scourge of poverty. As the ruling elites in Nigeria claim to reduce the rising profile of poverty through series of policies and programmes, food production, promotion and funding of co-operatives for agriculture, improvement of infrastructures at the rural areas to guaranteeing employment through skill acquisition, assistance of rural women to break away from poverty and the provision of small scale credit facilities to poor members of the public were abysmally low. It is observed that the poverty alleviation programmes and policies failed because they were by nature, character and implementation pro-elites and anti-masses. None of the programmes or policies engaged the rural poor either in terms of formulation or implementation.Keywords: the state, poverty, government policies, strategies, social amenities, corruption
Procedia PDF Downloads 3563762 Aristotle’s Notion of Prudence as Panacea to the Leadership Crisis in Nigeria
Authors: Wogu Ikedinachi Ayodele Power, Agbude Godwyns, Eniayekon Eugenia, Nchekwube Excellence-Oluye, Abasilim Ugochukwu David
Abstract:
Contemporary ethicists and writers on leadership, in their quest to address the problem of leadership crisis in Nigeria, have identified the absence of practical prudence -which manifests in variables such as corruption, ethnicity and greed- as one of the major factors which breeds leadership crises. These variables are further fuelled by the lack of a consistent theory of leadership among scholars that could guide the pertinent actions of political leaders, hence the rising cases of leadership crises in the country. The theoretical framework that guides this study emanates from Aristotle’s notion of prudence as contained in the Nicomachean Ethics, which states that prudence is a central moral resource for political leaders. The method of conceptual analysis shall be used to clarify the concepts of virtue, prudence and leadership. The traditional method of critical analysis and the reconstructive method of ideas in philosophy are used to conceptually and contextually analyze all relevant texts and archival materials in the subject areas of this study. The study identifies a high degree of ideological bias and logical inconsistencies inherent in the theories of leadership proposed by the realist and the moralist schools of thought. The conflicting ideologies regarding what political leadership should be among scholars of leadership is identified as one of the major factors militating against ascertaining a practicable theory of leadership, which has the capacity to guide the pertinent actions of political leaders all over the world. This paper therefore identifies the absence of practical prudence, ‘wisdom’, as the major factor associated with leadership crises in Nigeria. We therefore argue that only prudent leaders will have the capacity to identify salient aspects of political situations which leaders have obligations to consider before making political decisions. Seven frameworks were prescribed from Aristotle’s Notion of prudence to strengthen this position, they include: Disciplined reason and openness to experience; Foresight and attention to the long term, among others. We submit that leadership devoid of crisis can be attained through the application of the virtue of prudence. Where this theory is adopted, it should eliminate further leadership crises in Nigeria.Keywords: Aristotle, leadership crisis, political leadership, prudence
Procedia PDF Downloads 3823761 Diversifying from Petroleum Products to Arable Farming as Source of Revenue Generation in Nigeria: A Case Study of Ondo West Local Government
Authors: A. S. Akinbani
Abstract:
Overdependence on petroleum is causing set back in Nigeria economy. Field survey was carried out to assess the profitability and production of selected arable crops in six selected towns and villages of Ondo southwestern. Data were collected from 240 arable crop farmers with the aid of both primary and secondary data. Data were collected with the use of oral interview and structured questionnaires. Data collected were analyzed using both descriptive and inferential statistics. Forty farmers were randomly selected to give a total number of 240 respondents. 84 farmers interviewed had no formal education, 72 had primary education, 50 farmers attained secondary education while 38 attained beyond secondary education. The majority of the farmers hold less than 10 acres of land. The data collected from the field showed that 192 farmers practiced mixed cropping which includes mixtures of yam, cowpea, cocoyam, vegetable, cassava and maize while only 48 farmers practiced monocropping. Among the sampled farmers, 93% agreed that arable production is profitable while 7% disagreed. The findings show that managerial practices that conserve the soil fertility and reduce labor cost such as planting of leguminous crops and herbicide application instead of using hand held hoe for weeding should be encouraged. All the respondents agreed that yam, cowpea, cocoyam, sweet potato, rice, maize and vegetable production will solve the problem of hunger and increase standard of living compared with petroleum product that Nigeria relied on as means of livelihood.Keywords: farmers, arable crop, cocoyam, respondents, maize
Procedia PDF Downloads 2523760 The Legal Framework for Solid Waste Disposal and Management in Kwara State, Nigeria
Authors: Alabi Odunayo Mayowa, Ajayi Oluwasola Felix
Abstract:
Solid waste such as “garbage” “trash” “refuse” “slug” and “rubbish” is disposed off or is required to be disposed off in accordance with national law. The study relies on primary and secondary sources of information. The primary sources include the Constitution, statutes and subsidiary legislation. The secondary sources of information include books, journals, conference proceedings, newspapers, magazines and internet materials. The information obtained from these sources is subjected to content and contextual analysis. The study examines the Kwara State Environmental Protection Agency Law, 1992 and other laws on waste disposal and management in Kwara State, Nigeria. The study also examines the regulations and the agency i.e. the Kwara State Environmental Protection Agency created by the law with a view to determine the inadequacies in the law.Keywords: solid waste, waste disposal, waste management, domestic waste
Procedia PDF Downloads 4793759 Litho-Structural Variations and Gold Mineralization around Wonaka Schist Belt, North West Nigeria
Authors: Umar Sambo Umar, Ahmad Isah Haruna, Abubakar Sadik Maigari, Muhammad Bello Abubakar
Abstract:
Schist belts in Nigeria occur prominently west of longitude 80 E and sporadic to the east, they are upper Proterozioc low-medium grade deformed metasediments and metavolcanics that were intruded by Pan-African granitoids. The Wonaka schist belt, though reportedly distinctive in composition and metamorphism, is the least understood; the host for primary gold were not defined, structures which may control primary enrichment have not been delineated. The aim of this work is to determine the relationship between litho-structures and the gold around Wonaka schist belt through geological field mapping, petrographic studies and structural data analysis via ArcGis 10.2, Surfer 11.0 and Stereopro 2.0. The results show that the major rock types are mica schist and migmatites, muscovites detected during microstructural analysis suggests low-grade metamorphism in the metapelites. The shear zones identified were trending North Northeast – South Southwest (NNE-SSW), fractures trend mostly Northeast-Southwest (NE-SW) perpendicular to planes of gneissic foliations, these conform to the late Pan-African deformational episode. Pegmatite lodes, net self-cross cutting quartz veins as well as the quartz stringers hosted by both migmatites and schist are delineated as targets for primary gold mineralization, while major confluences of the streams serve as zones for secondary (placer) gold targets since the streams are dendritic and intermittent.Keywords: gold mineralization, Nigeria, migmatites, Wonaka schist belt
Procedia PDF Downloads 1973758 Color Image Compression/Encryption/Contour Extraction using 3L-DWT and SSPCE Method
Authors: Ali A. Ukasha, Majdi F. Elbireki, Mohammad F. Abdullah
Abstract:
Data security needed in data transmission, storage, and communication to ensure the security. This paper is divided into two parts. This work interests with the color image which is decomposed into red, green and blue channels. The blue and green channels are compressed using 3-levels discrete wavelet transform. The Arnold transform uses to changes the locations of red image channel pixels as image scrambling process. Then all these channels are encrypted separately using the key image that has same original size and are generating using private keys and modulo operations. Performing the X-OR and modulo operations between the encrypted channels images for image pixel values change purpose. The extracted contours from color images recovery can be obtained with accepted level of distortion using single step parallel contour extraction (SSPCE) method. Experiments have demonstrated that proposed algorithm can fully encrypt 2D Color images and completely reconstructed without any distortion. Also shown that the analyzed algorithm has extremely large security against some attacks like salt and pepper and Jpeg compression. Its proof that the color images can be protected with a higher security level. The presented method has easy hardware implementation and suitable for multimedia protection in real time applications such as wireless networks and mobile phone services.Keywords: SSPCE method, image compression and salt and peppers attacks, bitplanes decomposition, Arnold transform, color image, wavelet transform, lossless image encryption
Procedia PDF Downloads 5193757 Effects of Education on Farmers’ Productivity Outputs in Rural Nigeria
Authors: Thomas Ogilegwu Orohu
Abstract:
This paper highlights the effect of education on farmers’ productivity in rural Nigeria which includes potential to obtain paid employment or generate income through self-help employment using skills learnt in school. The paper emphasizes that education help farmers’ in agro-processing units in production to reduce post harvest wastage. It highlights the benefits of schooling for farmers’ productivity, particularly in terms of efficiency gains and increased farm productivity. As technological innovation spread more widely within the country, the importance of formal education in farm production ought to become more apparent. Education help farmers to improve attitudes, beliefs and habits that may lead to greater willingness to accept risk, adopts innovation, save investment and generally to embrace productive practices. Finally factors affecting farmers’ education and appropriate recommendation were given with the hope that if resolutely implemented would bring the attainment of desired farm education to farmers to improve farm productivity outputs.Keywords: benefit, education, effect, productivity
Procedia PDF Downloads 3203756 Ontology for Cross-Site-Scripting (XSS) Attack in Cybersecurity
Authors: Jean Rosemond Dora, Karol Nemoga
Abstract:
In this work, we tackle a frequent problem that frequently occurs in the cybersecurity field which is the exploitation of websites by XSS attacks, which are nowadays considered a complicated attack. These types of attacks aim to execute malicious scripts in a web browser of the client by including code in a legitimate web page. A serious matter is when a website accepts the “user-input” option. Attackers can exploit the web application (if vulnerable), and then steal sensitive data (session cookies, passwords, credit cards, etc.) from the server and/or from the client. However, the difficulty of the exploitation varies from website to website. Our focus is on the usage of ontology in cybersecurity against XSS attacks, on the importance of the ontology, and its core meaning for cybersecurity. We explain how a vulnerable website can be exploited, and how different JavaScript payloads can be used to detect vulnerabilities. We also enumerate some tools to use for an efficient analysis. We present detailed reasoning on what can be done to improve the security of a website in order to resist attacks, and we provide supportive examples. Then, we apply an ontology model against XSS attacks to strengthen the protection of a web application. However, we note that the existence of ontology does not improve the security itself, but it has to be properly used and should require a maximum of security layers to be taken into account.Keywords: cybersecurity, web application vulnerabilities, cyber threats, ontology model
Procedia PDF Downloads 1723755 Advances in the Studies on Evaluation of Diversity and Habitat Preferences of Amphibians of Nigeria
Authors: Md Mizanur Rahman, Lotanna Micah Nneji, Adeola C. Adeniyi, Edem Archibong Eniang, Abiodun B. Onadeko, Felista Kasyoka Kilunda, Babatunde E. Adedeji, Ifeanyi C. Nneji, Adiaha A. A. Ugwumba, Jie-Qiong Jin, Min-Sheng Peng, Caroline Olory, Nsikan Eninekit, Jing Che
Abstract:
Nigeria contains a number of forest habitats that believed to host highly rich amphibian diversity. However, a dearth of herpetological studies has restricted information on the amphibian diversity in Nigeria. To cover the gap of knowledge, this study focused field surveys on relatively less studied forests–Afi Forest Reserve and Ikpan forest ecosystem. The goal of this study is to make a checklist and to investigate the habitat preferences of amphibians in these two forests. The study areas were surveyed between August 2018 and July 2019 following visual and acoustic methods. Individuals were identified using the morphological and molecular (16S ribosomal RNA) approach. Literature searches were conducted to document additional species that were not encountered during the current field surveys. Using the observational records and arrays of diversity indices, the patterns of species richness and abundance across habitat types were evaluated. Voucher specimens and tissue samples were deposited in the museums of the Department of Zoology, University of Ibadan Nigeria, and the remainder at the Kunming Institute of Zoology (KIZ), Chinese Academy of Sciences, Kunming, China. The result of this study revealed the presence of 30 and 31 amphibian species from the Afi Forest Reserve and the Ikpan Forest Ecosystem, respectively. There were two unidentified species from AFR and one from IFE. In total, 324 individuals of amphibian species were observed from the two study areas. Forest and swamps showed high species diversity and richness than the agricultural field and savannah. Savannah and agricultural fields had the highest similarity in the species composition. Given the increased human disturbances and consequent threats to these forests, this study offers recommendations for the initiation of conservation plans immediately.Keywords: biodiversity, conservation, cryptic species, ecology, integrated taxonomy, species inventory
Procedia PDF Downloads 1683754 Data-Driven Strategies for Enhancing Food Security in Vulnerable Regions: A Multi-Dimensional Analysis of Crop Yield Predictions, Supply Chain Optimization, and Food Distribution Networks
Authors: Sulemana Ibrahim
Abstract:
Food security remains a paramount global challenge, with vulnerable regions grappling with issues of hunger and malnutrition. This study embarks on a comprehensive exploration of data-driven strategies aimed at ameliorating food security in such regions. Our research employs a multifaceted approach, integrating data analytics to predict crop yields, optimizing supply chains, and enhancing food distribution networks. The study unfolds as a multi-dimensional analysis, commencing with the development of robust machine learning models harnessing remote sensing data, historical crop yield records, and meteorological data to foresee crop yields. These predictive models, underpinned by convolutional and recurrent neural networks, furnish critical insights into anticipated harvests, empowering proactive measures to confront food insecurity. Subsequently, the research scrutinizes supply chain optimization to address food security challenges, capitalizing on linear programming and network optimization techniques. These strategies intend to mitigate loss and wastage while streamlining the distribution of agricultural produce from field to fork. In conjunction, the study investigates food distribution networks with a particular focus on network efficiency, accessibility, and equitable food resource allocation. Network analysis tools, complemented by data-driven simulation methodologies, unveil opportunities for augmenting the efficacy of these critical lifelines. This study also considers the ethical implications and privacy concerns associated with the extensive use of data in the realm of food security. The proposed methodology outlines guidelines for responsible data acquisition, storage, and usage. The ultimate aspiration of this research is to forge a nexus between data science and food security policy, bestowing actionable insights to mitigate the ordeal of food insecurity. The holistic approach converging data-driven crop yield forecasts, optimized supply chains, and improved distribution networks aspire to revitalize food security in the most vulnerable regions, elevating the quality of life for millions worldwide.Keywords: data-driven strategies, crop yield prediction, supply chain optimization, food distribution networks
Procedia PDF Downloads 633753 Government Size and Economic Growth: Testing the Non-Linear Hypothesis for Nigeria
Authors: R. Santos Alimi
Abstract:
Using time-series techniques, this study empirically tested the validity of existing theory which stipulates there is a nonlinear relationship between government size and economic growth; such that government spending is growth-enhancing at low levels but growth-retarding at high levels, with the optimal size occurring somewhere in between. This study employed three estimation equations. First, for the size of government, two measures are considered as follows: (i) share of total expenditures to gross domestic product, (ii) share of recurrent expenditures to gross domestic product. Second, the study adopted real GDP (without government expenditure component), as a variant measure of economic growth other than the real total GDP, in estimating the optimal level of government expenditure. The study is based on annual Nigeria country-level data for the period 1970 to 2012. Estimation results show that the inverted U-shaped curve exists for the two measures of government size and the estimated optimum shares are 19.81% and 10.98%, respectively. Finally, with the adoption of real GDP (without government expenditure component), the optimum government size was found to be 12.58% of GDP. Our analysis shows that the actual share of government spending on average (2000 - 2012) is about 13.4%.This study adds to the literature confirming that the optimal government size exists not only for developed economies but also for developing economy like Nigeria. Thus, a public intervention threshold level that fosters economic growth is a reality; beyond this point economic growth should be left in the hands of the private sector. This finding has a significant implication for the appraisal of government spending and budgetary policy design.Keywords: public expenditure, economic growth, optimum level, fully modified OLS
Procedia PDF Downloads 4223752 Understanding the Basics of Information Security: An Act of Defense
Authors: Sharon Q. Yang, Robert J. Congleton
Abstract:
Information security is a broad concept that covers any issues and concerns about the proper access and use of information on the Internet, including measures and procedures to protect intellectual property and private data from illegal access and online theft; the act of hacking; and any defensive technologies that contest such cybercrimes. As more research and commercial activities are conducted online, cybercrimes have increased significantly, putting sensitive information at risk. Information security has become critically important for organizations and private citizens alike. Hackers scan for network vulnerabilities on the Internet and steal data whenever they can. Cybercrimes disrupt our daily life, cause financial losses, and instigate fear in the public. Since the start of the pandemic, most data related cybercrimes targets have been either financial or health information from companies and organizations. Libraries also should have a high interest in understanding and adopting information security methods to protect their patron data and copyrighted materials. But according to information security professionals, higher education and cultural organizations, including their libraries, are the least prepared entities for cyberattacks. One recent example is that of Steven’s Institute of Technology in New Jersey in the US, which had its network hacked in 2020, with the hackers demanding a ransom. As a result, the network of the college was down for two months, causing serious financial loss. There are other cases where libraries, colleges, and universities have been targeted for data breaches. In order to build an effective defense, we need to understand the most common types of cybercrimes, including phishing, whaling, social engineering, distributed denial of service (DDoS) attacks, malware and ransomware, and hacker profiles. Our research will focus on each hacking technique and related defense measures; and the social background and reasons/purpose of hacker and hacking. Our research shows that hacking techniques will continue to evolve as new applications, housing information, and data on the Internet continue to be developed. Some cybercrimes can be stopped with effective measures, while others present challenges. It is vital that people understand what they face and the consequences when not prepared.Keywords: cybercrimes, hacking technologies, higher education, information security, libraries
Procedia PDF Downloads 1353751 Informal Governance as Response to Institutional Paralysis
Authors: Stefanie Kasparek
Abstract:
The United Nations Security Council (UNSC) is probably the most recognized international security organization. It is also profoundly misunderstood and undervalued in its effort to promote peace and security. With the rising involvement of non-state actors and the way states fight wars, international governance has become increasingly complex. However, the formal UNSC agenda has long remained static, reflecting states' unwillingness to entertain more conflicts. Nevertheless, resolutions remain the scholarly measure of states' interests and policies, neglecting the significant share of issues the Council entertains informally. This project builds on a rational institutionalism framework. It provides a systematic analysis of how and under what conditions states use informal governance instead of, or in combination with, formal rules at the agenda-setting stage of the policy process. Data for this project comes from elite interviews and a newly created dataset on governance choices. The results show that counter existing arguments, weaker states successfully circumvent formal institutional roadblocks and use informal governance mechanisms to pursue vital interests, thereby countering institutional restrictions and power asymmetries present informal governance settings.Keywords: agenda-setting, decision-making, international governance, UNSC
Procedia PDF Downloads 2003750 Jordanian Health Care Providers' Attitudes toward Overweigth and Obese Women during Childbirth
Authors: Salwa Obeisat
Abstract:
Obesity had become a global issue and a major public health concern, because of its impact on the public health. Obstetric and midwifery evidences reported that maternal obesity an important issue, because of its associated complications like obstructed labors, infections, and hemorrhage. People who are obese are often stigmatized and blamed for their weight. Health care providers are not immune to obesity-related prejudice, and the literature features several examples of their negative attitudes towards obese patients. In Jordan, few studies were conducted to investigate obesity prevalence rate and its associated factors. The purposes of this study were to assess the health care providers' attitudes toward overweight and obese women during the childbirth in the North of Jordan and to investigate the relationships between health care providers' socio-demographic characteristics and their attitudes. A descriptive, cross-sectional design was utilized. A convenient sample was consisted of 95 midwives, 30 nurses and 62 obstetricians, who were working in the labor rooms. A self-administered questionnaire consisted of three sections: demographical data, Arabic version of Fat Phobia Scale (FPS), and Arabic version of Nurses' Attitudes toward Obesity and Obese Patients Scale (NATOOPS). Results: The study findings revealed that the majority of Jordanian health care providers held negative attitudes toward overweight and obese women during childbirth. Midwives held less negative attitudes than did obstetricians and nurses. The majority of participants were perceived the overweight and obese pregnant women during childbirth as overate people, shapeless, slow and unattractive. Age, specialty, education and years of experience were found to be associated with health care providers’ attitudes. The Conclusion: Health care providers negative attitudes toward overweight and obese pregnant women are a cause for concern. Therefore, maternal obesity was needed to be more adequately addressed in basic education courses, and in the continuing professional education classes of practicing health care providers.Keywords: attitudes, obesity, prevalence rate, nurses, midwives, obstetrician, childbirth
Procedia PDF Downloads 3303749 Integrating Music on Construction Sites: Key Benefits and Cautions: A Literature Perspective
Authors: Oluwatayomi Daniel Fadumo, Chinyere Celestina Esimone
Abstract:
The construction industry, as a massive human capital-related sector, requires an always motivated workforce. The inability to maintain this state has been found to hamper productivity which ultimately leads to poor project delivery, infrastructural development decline, and low morale among citizens. The need to develop an approach to keep this set of people inspired before, during, and after work becomes a necessity; this paper aims to evaluate the key benefits and cautions in integrating music on construction sites in Nigeria to improve effective project delivery. In attaining this, the study identified the advantages of music on construction sites, evaluated the key considerations in introducing music on construction sites, and recommended measures for the effective integration of music on construction sites in Nigeria. The study is a descriptive research through the use of secondary data gleaned from relevant literature, journals, and research sites. The study concluded that different forms of music genres can be implemented ranging from Pop music, rock, metal, and classical music. Introducing music has the advantage of industrial branding, improving workers` morale, setting the pace for working, helping in information retention, and improving mental health and happiness. The key consideration, however, is to provide the right volume and music that doesn’t pose health and safety challenges. The study finally recommended that for effective integration of music on construction sites in Nigeria, policies should be drafted regulating its use, specific radio customized for the site be introduced and that research-based music, proven to have previously helped, should be given to a group of workers.Keywords: music, construction sites, workers, construction industry, construction management practice
Procedia PDF Downloads 553748 Massive Deployments of Insurgent Intelligence by Violent Non-state Actors (VNSAs) in the 21st Century and Threats to Global Security
Authors: Temitope Francis Abiodun
Abstract:
The practice of intelligence is not limited to the machinery of a nation state alone, yet not much research or analysis has been directed towards the spy-crafts and tradecrafts engaged in by violent non-state actors (VNSAs) in the international community. The rise of 'private sector intelligence' in more recent years has only just begun to be interrogated by practitioners and academics. However, the use of intelligence by insurgents and other groups assembled to achieve varied forms of politico-military outcomes has often been overlooked. This paper examined the factors and conditions that gave rise to an increase in violent non-state actors (VNSAs), strategies aiding their deployment of insurgent intelligence, and as well the implications of their activities on global security. The failed state theory was adopted, while a descriptive research design served as the framework for the study. Data were collected from primary and secondary sources. The paper, however, revealed there were massive deployments of insurgent intelligence by violent non-state actors in contrast to a faulty pre-conception that insurgents were not as highly trained in deployment of intelligence as state actors, having assumed that the VNSAs lacked the sophistication to produce intelligence. However, the strategic objectives of insurgents (VNSAs) were revealed to depend on well-organized information gathering operations that feed into the tactical executions of their insurgency. The paper recommends, therefore, there is a need for adequate training on the part of security personnel in the states to be alive to their responsibilities; and there is also a need to ensure adequate border control and management to checkmate the influx of the various violent or deadly movements across global frontiers.Keywords: terrorism, non-violent state actors, private sector intelligence, security
Procedia PDF Downloads 1383747 Patients Reactions to Medical Errors in Hospitals: The Need for Social Workers in Nigeria
Authors: Emmanuel Temitope Adaranijo
Abstract:
Medical error is on the increase in many nations and like many developing nations, Nigeria is not excluded and more importantly, Lafia, Nasarawa state, where the study was carried. The study was undertaken to explore Patients' knowledge and their reactions to medical errors in hospitals in Lafia Local Government Area; therefore, five objectives were formulated to guide the study. The survey research design was employed and triangulation of quantitative and qualitative instruments was used to collect data. The total population for the study was 330,712 and the sample size was 400; however, only 343 patients and three doctors responded to the quantitative and qualitative study, respectively. Frequency distribution, simple percentage, and r test were used to analyze the data obtained from respondents. The findings revealed that medical errors are prevalent in hospitals in Lafia and the patients are neither aware nor willing to report such occurrence. The study recommends that social workers, hospital management, and governments should take up their roles in reducing the occurrence of medical errors.Keywords: health, hospital, medical errors, social work
Procedia PDF Downloads 1303746 Suitability of Satellite-Based Data for Groundwater Modelling in Southwest Nigeria
Authors: O. O. Aiyelokun, O. A. Agbede
Abstract:
Numerical modelling of groundwater flow can be susceptible to calibration errors due to lack of adequate ground-based hydro-metrological stations in river basins. Groundwater resources management in Southwest Nigeria is currently challenged by overexploitation, lack of planning and monitoring, urbanization and climate change; hence to adopt models as decision support tools for sustainable management of groundwater; they must be adequately calibrated. Since river basins in Southwest Nigeria are characterized by missing data, and lack of adequate ground-based hydro-meteorological stations; the need for adopting satellite-based data for constructing distributed models is crucial. This study seeks to evaluate the suitability of satellite-based data as substitute for ground-based, for computing boundary conditions; by determining if ground and satellite based meteorological data fit well in Ogun and Oshun River basins. The Climate Forecast System Reanalysis (CFSR) global meteorological dataset was firstly obtained in daily form and converted to monthly form for the period of 432 months (January 1979 to June, 2014). Afterwards, ground-based meteorological data for Ikeja (1981-2010), Abeokuta (1983-2010), and Oshogbo (1981-2010) were compared with CFSR data using Goodness of Fit (GOF) statistics. The study revealed that based on mean absolute error (MEA), coefficient of correlation, (r) and coefficient of determination (R²); all meteorological variables except wind speed fit well. It was further revealed that maximum and minimum temperature, relative humidity and rainfall had high range of index of agreement (d) and ratio of standard deviation (rSD), implying that CFSR dataset could be used to compute boundary conditions such as groundwater recharge and potential evapotranspiration. The study concluded that satellite-based data such as the CFSR should be used as input when constructing groundwater flow models in river basins in Southwest Nigeria, where majority of the river basins are partially gaged and characterized with long missing hydro-metrological data.Keywords: boundary condition, goodness of fit, groundwater, satellite-based data
Procedia PDF Downloads 1303745 Mobile Cloud Computing: How to Improve
Authors: Abdullah Aljumah, Tariq Ahamad
Abstract:
The simplest possible human-computer interaction is mobile cloud computing as it emerges and makes the use of all modern-day human-oriented technology. The main aim of this idea is the QoS (quality of service) by using user-friendly and reliable software over the global network in order to make it economical by reducing cost, reliable, and increase the main storage. Since we studied and went through almost all the existing related work in this area and we came up with some challenges that will rise or might be rising for some basic areas in mobile cloud computing and mostly stogie and security area. In this research article, we suggest some recommendation for mobile cloud computing and for its security that will help in building more powerful tools to handle all this pressure.Keywords: Cloud Computing, MCC, SAAS, computer interaction
Procedia PDF Downloads 3833744 The Saudi Arabia 2030 Strategy: Translation Reception and Translator Readiness
Authors: Budur Alsulami
Abstract:
One of the aims of the recently implemented Saudi Arabia Vision 2030 strategy is focused on strengthening education, entertainment, and tourism to attract international visitors to the country. To promote and increase the tourism sector, tourism translation can serve the tourism industry by translating various materials that promote the country’s tourism such as brochures, catalogues, and websites. In order to achieve the goal of enhancing tourism in Saudi Arabia, promotional texts related to tourism and Saudi culture will need to be translated into English and addressed to non-Arabic-speaking potential tourists. This research aims to measure student readiness to be professional translators who can introduce and promote Saudi Arabia to non-Arabic-speaking tourists. The study will also evaluate students' abilities to promote and convey Saudi culture to non-Arabic tourists by translating tourism texts. Translating tourism materials demands considerable effort and specific translation skills to capture tourists' interest and encourage visits. Numerous scholars have explored challenges in translating tourism promotional materials, focusing on translation methods, cultural issues, course design, and necessary knowledge for tourism translation. Based on these insights, experts recommend that translators prioritize audience expectations, cultural appropriateness, and linguistic conventions while revising course syllabi to include practical skills. This research aims to assess students' readiness to become professional translators aligned with Vision 2030 tourism goals. To accomplish this, in the first stage of the project, twenty students from two Saudi Arabian Universities who have completed at least two years of Translation Studies were invited to translate two tourism texts of 300 words each. These tourism texts contain information about famous tourist sights and traditional food in Saudi Arabia and contained cultural terms and heritage information. The students then completed a questionnaire about the challenges of the text and the process of their translation, and then participated in a semi-structured interview. In the second stage of the project, the students’ translations will be evaluated by a qualified National Accreditation Authority of Translators and Interpreters (NAATI) examiner applying the NAATI rubrics. Finally, these translations will be read and assessed by fifteen to twenty native and near-native readers of English, who will evaluate the quality of the translations based on their understanding and perception of these texts. Results analysed to date suggest that a number of student translators faced challenges such as choosing a suitable translation method, omitting some key terms or words during the translation process, and managing their time, all of which may indicate a lack of practice in translating texts of this nature and lack of awareness regarding translation strategies most suitable for the genre.Keywords: Saudi Arabia Vision 2030, translation, tourism, reader reception, culture, heritage, translator training/competencies
Procedia PDF Downloads 123743 Social Media Diffusion And Implications For Opinion Leadership In Northcentral Nigeria
Authors: Chuks Odiegwu-Enwerem
Abstract:
The classical notion of opinion leadership presupposes that the media is at the center of an effective and successful opinion leadership. Under this idea, an opinion leader is an active media user who consumes, understands, digests and interprets the messages for the understanding and acceptance/adoption by lower-end media users – whose access and understanding of media content are supposedly low. Because of their unique access to and presumed understanding of media functions and their content, opinion leaders are typically esteemed by those who look forward to and accept their opinions. Lazarsfeld and Katz’s two-step flow of communication theory is the basis of opinion leadership – propelled by limited access to the media. With the emergence and spread of social media and its unlimited access by all and sundry, however, the study interrogates the relevance and application of opinion leaders and, by implication, the two-step flow communication theory in Nigeria’s Northcentral region. It seeks to determine whether opinion leaders still exist in the picture and if they still exert considerable influence, especially in matters of political conversations and decision-making among the citizens of this area. It further explores whether the diffusion of social media is a reality and how the ‘low-end’ media users react to the new-found freedom of access to media, and how they are using it to inform their decisions on important matters as well as examines if they are still glued to their opinion leaders. This study explores the empirical dimensions of the two-step flow hypothesis in relation to the activities of social media to determine if a change has occurred and in what direction, using mixed methos of Survey and in-depth interviews. Our understanding and belief in some theoretical assumptions may be enhanced or challenged by the study outcome.Keywords: Opinion Leadership, Active Media User, Two-Step-Flow, Social media, Northcentral Nigeria
Procedia PDF Downloads 733742 Power Quality Issues: Power Supply Interruptions as Key Constraint to Development in Ekiti State, Nigeria
Authors: Oluwatosin S. Adeoye
Abstract:
The power quality issues in the world today are critical to the development of different nations. Prosperity of each nation depends on availability of constant power supply. Constant power supply is a major challenge in Africa particularly in Nigeria where the generated power is than thirty percent of the required power. The metrics of power quality are voltage dip, flickers, spikes, harmonics and interruptions. The level of interruptions in Ekiti State was examined through the investigation of the causes of power interruptions in the State. The method used was the collection of data from the Distribution Company, assessment through simple programming as a command for plotting the graphs through the use of MATLAB 2015 depicting the behavioural pattern of the interruption for a period of six months in 2016. The result shows that the interrelationship between the interruptions and development. Recommendations were suggested with the objective of solving the problems being set up by interruptions in the State and these include installation of reactors, automatic voltage regulators and effective tap changing system on the lines, busses and transformer substation respectively.Keywords: development, frequency, interruption, power, quality
Procedia PDF Downloads 163