Search results for: Arabic Fodio Nigeria security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5387

Search results for: Arabic Fodio Nigeria security

3647 On the Resilience of Operational Technology Devices in Penetration Tests

Authors: Marko Schuba, Florian Kessels, Niklas Reitz

Abstract:

Operational technology (OT) controls physical processes in critical infrastructures and economically important industries. With the convergence of OT with classical information technology (IT), rising cybercrime worldwide and the increasingly difficult geopolitical situation, the risks of OT infrastructures being attacked are growing. Classical penetration testing, in which testers take on the role of an attacker, has so far found little acceptance in the OT sector - the risk that a penetration test could do more harm than good seems too great. This paper examines the resilience of various OT systems using typical penetration test tools. It is shown that such a test certainly involves risks, but is also feasible in OT if a cautious approach is taken. Therefore, OT penetration testing should be considered as a tool to improve the cyber security of critical infrastructures.

Keywords: penetration testing, OT, ICS, OT security

Procedia PDF Downloads 20
3646 Ethical Perspectives on Implementation of Computer Aided Design Curriculum in Architecture in Nigeria: A Case Study of Chukwuemeka Odumegwu Ojukwu University, Uli

Authors: Kelechi Ezeji

Abstract:

The use of Computer Aided Design (CAD) technologies has become pervasive in the Architecture, Engineering and Construction (AEC) industry. This has led to its inclusion as an important part of the training module in the curriculum for Architecture Schools in Nigeria. This paper examines the ethical questions that arise in the implementation of Computer Aided Design (CAD) Content of the curriculum for Architectural education. Using existing literature, it begins this scrutiny from the propriety of inclusion of CAD into the education of the architect and the obligations of the different stakeholders in the implementation process. It also examines the questions raised by the negative use of computing technologies as well as perceived negative influence of the use of CAD on design creativity. Survey methodology was employed to gather data from the Department of Architecture, Chukwuemeka Odumegwu Ojukwu University Uli, which has been used as a case study on how the issues raised are being addressed. The paper draws conclusions on what will make for successful ethical implementation.

Keywords: computer aided design, curriculum, education, ethics

Procedia PDF Downloads 413
3645 Cryptosystems in Asymmetric Cryptography for Securing Data on Cloud at Various Critical Levels

Authors: Sartaj Singh, Amar Singh, Ashok Sharma, Sandeep Kaur

Abstract:

With upcoming threats in a digital world, we need to work continuously in the area of security in all aspects, from hardware to software as well as data modelling. The rise in social media activities and hunger for data by various entities leads to cybercrime and more attack on the privacy and security of persons. Cryptography has always been employed to avoid access to important data by using many processes. Symmetric key and asymmetric key cryptography have been used for keeping data secrets at rest as well in transmission mode. Various cryptosystems have evolved from time to time to make the data more secure. In this research article, we are studying various cryptosystems in asymmetric cryptography and their application with usefulness, and much emphasis is given to Elliptic curve cryptography involving algebraic mathematics.

Keywords: cryptography, symmetric key cryptography, asymmetric key cryptography

Procedia PDF Downloads 124
3644 The Linguistic Fingerprint in Western and Arab Judicial Applications

Authors: Asem Bani Amer

Abstract:

This study handles the linguistic fingerprint in judicial applications described in a law technicality that is recent and developing. It can be adopted to discover criminals by identifying their way of speaking and their special linguistic expressions. This is achieved by understanding the expression "linguistic fingerprint," its concept, and its extended domain, then revealing some of the linguistic fingerprint tools in Western judicial applications and deducing a technical imagination for a linguistic fingerprint in the Arabic language, which is needy for such judicial applications regarding this field, through dictionaries, language rhythm, and language structure.

Keywords: linguistic fingerprint, judicial, application, dictionary, picture, rhythm, structure

Procedia PDF Downloads 81
3643 Investors' Ratio Analysis and the Profitability of Listed Firms: Evidence from Nigeria

Authors: Abisola Akinola, Akinsulere Femi

Abstract:

The stock market has continually been a source of economic development in most developing countries. This study examined the relationship between investors’ ratio analysis and profitability of quoted companies in Nigeria using secondary data obtained from the annual reports of forty-two (42) companies. The study employed the multiple regression technique to analyze the relationship between investors’ ratio analysis (measured by dividend per share and earning per share) and profitability (measured by the return on equity). The results from the analysis show that investors’ ratio analysis, when measured by earnings per share, have a positive and significant impact on profitability. However, the study noted that investors’ ratio analysis, when measured by dividend per share, tend to have a positive impact on profitability but it is statistically insignificant. By implication, investors and other stakeholders that are interested in investing in stocks can predict the earning capacity of listed firms in the stock market.

Keywords: dividend per share, earnings per share, profitability, return on equity

Procedia PDF Downloads 137
3642 Governance Question and the Participatory Policy Making: Making the Process Functional in Nigeria

Authors: Albert T. Akume, P. D. Dahida

Abstract:

This paper examines the effect of various epochs of governments on policy making in Nigeria. The character of governance and public policy making of both epochs was exclusive, non-participatory and self-centric. As a consequence the interests of citizenry were not represented, neither protected nor sought to meet fairly the needs of all groups. The introduction of the post-1999 democratic government demand that the hitherto skewed pattern of policy making cease to be a character of governance. Hence, the need for citizen participation in the policy making process. The question then is what mode is most appropriate to engender public participation so as to make the policy making process functional? Given the prevailing social, economic and political dilemmas the utilization of the direct mode of citizen participation to affect policy outcome is doubtful if not unattainable. It is due to these predicament that this paper uses the documentary research design argues for the utilization of the indirect mode of citizen participation in the policy making process so as to affect public policy outcome appropriately and with less cost, acrimony and delays.

Keywords: governance, public policy, participation, representation, civil society

Procedia PDF Downloads 374
3641 Private Universities and Socio-Economic Development of Host Communities: The Case of Fountain University, Nigeria

Authors: Ganiyu Rasaq Omokeji

Abstract:

The growing recognition of the pivotal role of universities in promoting socio-economic development has led to a focus upon the expansion of the sector around the world. As the economy and society become more ‘knowledge intensive’, the role of universities in development is more onerous than just teaching, research, and service. It is to help create the open society upon which the progress of ideas depends on. Driven to fulfill this role, universities are likely to become even more important in building regional networks of their host communities. Currently, there are about 129 universities in Nigeria, with a total number of 37 federal, 36 state, and 56 privately owned universities. Fountain University is among the private universities in Nigeria located in Osogbo, Osun State. The university is committed to the total development of men and women in an enabling environment, through appropriate teaching, research, and service to humanity, influenced by Islamic ethics and culture. The university focuses on educational development and growth that are relevant to the nation’s manpower needs and global competitiveness through a gradual but steady process. This paper examines the role of Private University in the socio-economic development of host community using Fountain University as a case study. The research methodology design for this paper has a total of 200 respondents. The research instrument of data collection was a questionnaire and in-depth interview (IDI). The finding reveals that Fountain University plays an important role in socio-economic and cultural development through their Islamic culture. The paper recommend that universities must bridge the gaps between creative individual with innovative ideas and the application of technology for economic progress and social betterment of their host communities. University also must serve as a bridge that carries the traffic of social and economic development.

Keywords: private university, socio-economic development, host communities, role of universities and community development

Procedia PDF Downloads 283
3640 Cyber Security and Risk Assessment of the e-Banking Services

Authors: Aisha F. Bushager

Abstract:

Today we are more exposed than ever to cyber threats and attacks at personal, community, organizational, national, and international levels. More aspects of our lives are operating on computer networks simply because we are living in the fifth domain, which is called the Cyberspace. One of the most sensitive areas that are vulnerable to cyber threats and attacks is the Electronic Banking (e-Banking) area, where the banking sector is providing online banking services to its clients. To be able to obtain the clients trust and encourage them to practice e-Banking, also, to maintain the services provided by the banks and ensure safety, cyber security and risks control should be given a high priority in the e-banking area. The aim of the study is to carry out risk assessment on the e-banking services and determine the cyber threats, cyber attacks, and vulnerabilities that are facing the e-banking area specifically in the Kingdom of Bahrain. To collect relevant data, structured interviews were taken place with e-banking experts in different banks. Then, collected data where used as in input to the risk management framework provided by the National Institute of Standards and Technology (NIST), which was the model used in the study to assess the risks associated with e-banking services. The findings of the study showed that the cyber threats are commonly human errors, technical software or hardware failure, and hackers, on the other hand, the most common attacks facing the e-banking sector were phishing, malware attacks, and denial-of-service. The risks associated with the e-banking services were around the moderate level, however, more controls and countermeasures must be applied to maintain the moderate level of risks. The results of the study will help banks discover their vulnerabilities and maintain their online services, in addition, it will enhance the cyber security and contribute to the management and control of risks that are facing the e-banking sector.

Keywords: cyber security, e-banking, risk assessment, threats identification

Procedia PDF Downloads 350
3639 Effects of Group Cognitive Restructuring and Rational Emotive Behavioral Therapy on Psychological Distress of Awaiting-Trial Inmates in Correctional Centers in North-West, Nigeria

Authors: Muhammad Shafi’U Adamu

Abstract:

This study examined the effects of two groups of Cognitive Behavioral Therapies (CBT) which, includes Cognitive Restructuring (CB) and Rational Emotive Behavioral Therapy (REBT), on the Psychological Distress of awaiting-trial Inmates in Correctional Centers in North-West Nigeria. The study had four specific objectives, four research questions, and four null hypotheses. The study used a quasi-experimental design that involved pre-test and post-test. The population comprised of all 7,962 awaiting-trial inmates in correctional centers in North-west Nigeria. 131 awaiting trial inmates from three intact Correctional Centers were randomly selected using the census technique. The respondents were sampled and randomly put into 3 groups (CR, REBT and Control). Kessler Psychological Distress Scale (K10) was adapted for data collection in the study. The instrument was validated by experts and subjected to a pilot study using Cronbach's Alpha with a reliability coefficient of 0.772. Each group received treatment for 8 consecutive weeks (60 minutes/week). Data collected from the field were subjected to descriptive statistics of mean, standard deviation and mean difference to answer the research questions. Inferential statistics of ANOVA and independent sample t-test were used to test the null hypotheses at P≤ 0.05 level of significance. Results in the study revealed that there was no significant difference among the pre-treatment mean scores of experimental and control groups. Statistical evidence also showed a significant difference among the mean scores of the three groups, and thus, results of the Post Hoc multiple-comparison test indicated the posttreatment reduction of psychological distress in the awaiting-trial inmates. Documented output also showed a significant difference between the post-treatment psychologically distressed mean scores of male and female awaiting-trial inmates, but there was no difference in those exposed to REBT. The research recommends that a standardized structured CBT counseling technique treatment should be designed for correctional centers across Nigeria, and CBT counseling techniques could be used in the treatment of PD in both correctional and clinical settings.

Keywords: awaiting-trial inmates, cognitive restructuring, correctional centers, rational emotive behavioral therapy

Procedia PDF Downloads 76
3638 Macroeconomic Policy Coordination and Economic Growth Uncertainty in Nigeria

Authors: Ephraim Ugwu, Christopher Ehinomen

Abstract:

Despite efforts by the Nigerian government to harmonize the macroeconomic policy implementations by establishing various committees to resolve disputes between the fiscal and monetary authorities, it is still evident that the federal government had continued its expansionary policy by increasing spending, thus creating huge budget deficit. This study evaluates the effect of macroeconomic policy coordination on economic growth uncertainty in Nigeria from 1980 to 2020. Employing the Auto regressive distributed lag (ARDL) bound testing procedures, the empirical results shows that the error correction term, ECM(-1), indicates a negative sign and is significant statistically with the t-statistic value of (-5.612882 ). Therefore, the gap between long run equilibrium value and the actual value of the dependent variable is corrected with speed of adjustment equal to 77% yearly. The long run coefficient results showed that the estimated coefficients of the intercept term indicates that other things remains the same (ceteris paribus), the economics growth uncertainty will continue reduce by 7.32%. The coefficient of the fiscal policy variable, PUBEXP, indicates a positive sign and significant statistically. This implies that as the government expenditure increases by 1%, economic growth uncertainty will increase by 1.67%. The coefficient of monetary policy variable MS also indicates a positive sign and insignificant statistically. The coefficients of merchandise trade variable, TRADE and exchange rate EXR show negative signs and significant statistically. This indicate that as the country’s merchandise trade and the rate of exchange increases by 1%, the economic growth uncertainty reduces by 0.38% and 0.06%, respectively. This study, therefore, advocate for proper coordination of monetary, fiscal and exchange rate policies in order to actualize the goal of achieving a stable economic growth.

Keywords: macroeconomic, policy coordination, growth uncertainty, ARDL, Nigeria

Procedia PDF Downloads 130
3637 Optimizing University Administration in a Globalized World: Leveraging AI and ICT for Enhanced Governance and Sustainability in Higher Education

Authors: Ikechukwu Ogeze Ukeje, Chinyere Ori Elom, Chukwudum Collins Umoke

Abstract:

This study explores the challenges in the integration of Artificial Intelligence (AI) and Information and Communication Technology (ICT) practices in enhancing governance and sustainable solution modeling in higher education, focusing on Alex Ekwueme Federal University Ndufu-Alike (AE-FUNAI), Nigeria. In the context of a developing country like Nigeria, leveraging AI and ICT tools presents a unique opportunity to improve teaching, learning, administrative processes, and governance. The research aims to evaluate how AI and ICT technologies can contribute to sustainable educational practices, enhance decision-making processes, and improve engagement among key stakeholders: students, lecturers, and administrative staff. Students are involved to provide insights into their interactions with AI and ICT tools, particularly in learning and participation in governance. Lecturers’ perspectives will offer a view into how these technologies influence teaching, research, and curriculum development. Administrative staff will provide a crucial understanding of how AI and ICT tools can streamline operations, support data-driven governance, and enhance institutional efficiency. This study will use a mixed-method approach to collect both qualitative and quantitative data. The finding of this study is geared towards shaping the future of education in Nigeria and beyond by developing an Inclusive AI-governance Integration Framework (I-AIGiF) for enhanced performance in the system. Examining the roles of these stakeholder groups, this research could guide the development of policies for more effective AI and ICT integration, leading to sustainable educational innovation and governance.

Keywords: university administration, AI, higher education governance, education sustainability, ICT challenges

Procedia PDF Downloads 22
3636 The Potential Threat of Cyberterrorism to the National Security: Theoretical Framework

Authors: Abdulrahman S. Alqahtani

Abstract:

The revolution of computing and networks could revolutionise terrorism in the same way that it has brought about changes in other aspects of life. The modern technological era has faced countries with a new set of security challenges. There are many states and potential adversaries who have the potential and capacity in cyberspace, which makes them able to carry out cyber-attacks in the future. Some of them are currently conducting surveillance, gathering and analysis of technical information, and mapping of networks and nodes and infrastructure of opponents, which may be exploited in future conflicts. This poster presents the results of the quantitative study (survey) to test the validity of the proposed theoretical framework for the cyber terrorist threats. This theoretical framework will help to in-depth understand these new digital terrorist threats. It may also be a practical guide for managers and technicians in critical infrastructure, to understand and assess the threats they face. It might also be the foundation for building a national strategy to counter cyberterrorism. In the beginning, it provides basic information about the data. To purify the data, reliability and exploratory factor analysis, as well as confirmatory factor analysis (CFA) were performed. Then, Structural Equation Modelling (SEM) was utilised to test the final model of the theory and to assess the overall goodness-of-fit between the proposed model and the collected data set.

Keywords: cyberterrorism, critical infrastructure, , national security, theoretical framework, terrorism

Procedia PDF Downloads 406
3635 Security Issues on Smart Grid and Blockchain-Based Secure Smart Energy Management Systems

Authors: Surah Aldakhl, Dafer Alali, Mohamed Zohdy

Abstract:

The next generation of electricity grid infrastructure, known as the "smart grid," integrates smart ICT (information and communication technology) into existing grids in order to alleviate the drawbacks of existing one-way grid systems. Future power systems' efficiency and dependability are anticipated to significantly increase thanks to the Smart Grid, especially given the desire for renewable energy sources. The security of the Smart Grid's cyber infrastructure is a growing concern, though, as a result of the interconnection of significant power plants through communication networks. Since cyber-attacks can destroy energy data, beginning with personal information leaking from grid members, they can result in serious incidents like huge outages and the destruction of power network infrastructure. We shall thus propose a secure smart energy management system based on the Blockchain as a remedy for this problem. The power transmission and distribution system may undergo a transformation as a result of the inclusion of optical fiber sensors and blockchain technology in smart grids. While optical fiber sensors allow real-time monitoring and management of electrical energy flow, Blockchain offers a secure platform to safeguard the smart grid against cyberattacks and unauthorized access. Additionally, this integration makes it possible to see how energy is produced, distributed, and used in real time, increasing transparency. This strategy has advantages in terms of improved security, efficiency, dependability, and flexibility in energy management. An in-depth analysis of the advantages and drawbacks of combining blockchain technology with optical fiber is provided in this paper.

Keywords: smart grids, blockchain, fiber optic sensor, security

Procedia PDF Downloads 120
3634 Application of Directed Acyclic Graphs for Threat Identification Based on Ontologies

Authors: Arun Prabhakar

Abstract:

Threat modeling is an important activity carried out in the initial stages of the development lifecycle that helps in building proactive security measures in the product. Though there are many techniques and tools available today, one of the common challenges with the traditional methods is the lack of a systematic approach in identifying security threats. The proposed solution describes an organized model by defining ontologies that help in building patterns to enumerate threats. The concepts of graph theory are applied to build the pattern for discovering threats for any given scenario. This graph-based solution also brings in other benefits, making it a customizable and scalable model.

Keywords: directed acyclic graph, ontology, patterns, threat identification, threat modeling

Procedia PDF Downloads 139
3633 An Analysis of Organoleptic Qualities of a Three-Course Menu from Moringa Leaves in Mubi, Adamawa State Nigeria

Authors: Rukaiya Suleiman Umar, Annah Kwadu Medugu

Abstract:

Moringa oleifera is mainly used as herbal medicine in most homes in Northern Nigeria. The plant is easy to grow and thrives very well regardless the type of soil. Use of moringa leaves in food production can yield attractive varieties on menu. This paper evaluates the acceptability of dishes produced with fresh moringa leaves with a view to promoting it in popular restaurants. A three course menu consisting of cream of moringa soup as the starter, mixed meat moringa sauce with semovita as the main dish and moringa roll as sweet was produced and served to a 60-member taste panel made of three groups of 20 each. Respondents were asked to rate the organoleptic qualities of the samples on a 10-point bipolar scale ranging from 1 (Dislike extremely) – 10 (Like extremely). Data collected were treated to one sample t-test and One Way ANOVA. Results show that the panelists extremely like the moringa products. It is recommended that Moringa oleifera should be incorporated into meals which is more readily acceptable than medicine.

Keywords: Moringa oleifera, food production, menu planning, healthy living

Procedia PDF Downloads 282
3632 Bioprospecting for Indigenous Ruderal Plants with Potentials for Phytoremediation of Soil Heavy Metals in the Southern Guinea Savanna of North Western Nigeria

Authors: Sunday Paul Bako, Augustine Uwanekwu Ezealor, Yahuza Tanimu

Abstract:

In a study to evaluate the response of indigenous ruderal plants to the metal deposition regime imposed by anthropogenic modification in the Southern Guinea Savanna of north Western Nigeria during the dry and wet seasons, herbaceous plants and samples of soils were collected in three 5m by 5m quadrats laid around the environs of the Kaduna Refinery and Petrochemical Company and the banks of River Kaduna. Heavy metal concentration (Cd, Ni, Cr, Cu, Fe, Mn and Zn) in soil and plant samples was determined using Energy Dispersive X-ray Fluorescence. Concentrations of heavy metals in soils were generally observed to be higher during the wet season in both locations although the differences were not statistically significant (P > 0.05). Concentrations of Cd, Zn, Cr, Cu and Ni in all the plants observed were found to be below levels described as phytotoxic to plants. However, above ‘normal’ concentrations of Cr was observed in most of the plant species sampled. The concentrations of Cr, Cu, Ni and Zn in soils around the KRPC and RKB were found to be above the acceptable limits. Although no hyper accumulator plant species was encountered in this study, twenty (20) plant species were identified to have high bioconcentration (BCF > 1.0) of Cd and Cu, which indicated tolerance of these plants to excessive or phytotoxic concentrations of these metals. In addition, they generally produce high above ground biomass, due to rapid vegetative growth. These are likely species for phytoextraction. Elevated concentration of metals in both soil and plant materials may cause a decrease in biodiversity due to direct toxicity. There are also risks to humans and other animals due to bioaccumulation across the food chain. There are further possibilities of further evaluating and genetically improving metal tolerance traits in some of these plant species in relation to their potential use in phytoremediation programmes in metal polluted sites.

Keywords: bioprospecting, phytoremediation, heavy metals, Nigeria

Procedia PDF Downloads 284
3631 Knowledge and Practice of Family Planning among Rural Women in Ogun State, South West Nigeria

Authors: Tope Olubodun

Abstract:

Background: Family planning practices help individuals and couples avoid unwanted pregnancies, regulate intervals between pregnancies, and determine the number of children in the family. Family planning is an effective intervention for promoting maternal health, but its acceptability and utilization are impeded by many factors in Southwest Nigeria. Aim: This study was conducted to assess women’s knowledge and practice of family planning in two rural communities in Ogun State, Southwest Nigeria, and to determine factors associated with the utilization of family planning among these women. Methods: This was a cross-sectional study conducted among 561 women of reproductive age selected by multistage sampling. The data collection was done using interviewer-administered questionnaires. Data obtained were analyzed using IBM SPSS Statistics version 20. Frequencies were generated, and chi-square test was used to explore associations. The level of significance was set at 0.05. Result: The majority of the respondents were aware of family planning 410 (73.1%). The method most commonly known was male condom 348 (62.0%), then pills 276 (49.2%) and injectables 231(41.3%). The commonest sources of information on family planning were health workers 158 (26.8%), outreaches 162 (27.5%) and TV/radio 136 (23.1%). Respondents that had used family planning, however, only constituted forty–five percent. The methods commonly used were injectables 104 (39.2%) and pills 85 (32.1%). Reasons for choosing not to use family planning include the desire for more children 78 (26.3%), because spouse does not support family planning 56 (18.9%), fear of unbearable side effects 44 (14.9%), and poor knowledge of the methods of family planning as well as where the services can be obtained 39 (13.2%). There is a statistically significant association between age, ethnicity, education, occupation, average monthly income, and use of family planning. Conclusion: Campaigns that promote male involvement in family planning, use of family planning for child spacing, and dispelling of fears is recommended to improve the practice of family planning among such a group of women.

Keywords: family planning, rural, knowledge, practice

Procedia PDF Downloads 151
3630 Value Chain Network: A Social Network Analysis of the Value Chain Actors of Recycled Polymer Products in Lagos Metropolis, Nigeria

Authors: Olamide Shittu, Olayinka Akanle

Abstract:

Value Chain Analysis is a common method of examining the stages involved in the production of a product, mostly agricultural produce, from the input to the consumption stage including the actors involved in each stage. However, the Functional Institutional Analysis is the most common method in literature employed to analyze the value chain of products. Apart from studying the relatively neglected phenomenon of recycled polymer products in Lagos Metropolis, this paper adopted the use of social network analysis to attempt a grounded theory of the nature of social network that exists among the value chain actors of the subject matter. The study adopted a grounded theory approach by conducting in-depth interviews, administering questionnaires and conducting observations among the identified value chain actors of recycled polymer products in Lagos Metropolis, Nigeria. The thematic analysis of the collected data gave the researchers the needed background to formulate a truly representative network of the social relationships among the value chain actors of recycled polymer products in Lagos Metropolis. The paper introduced concepts such as Transient and Perennial Social Ties to explain the observed social relations among the actors. Some actors have more social capital than others as a result of the structural holes that exist in their triad network. Households and resource recoverers are at disadvantaged position in the network as they have high constraints in their relationships with other actors. The study attempted to provide a new perspective in the study of the environmental value chain by analyzing the network of actors to bring about policy action points and improve recycling in Nigeria. Government and social entrepreneurs can exploit the structural holes that exist in the network for the socio-economic and sustainable development of the state.

Keywords: recycled polymer products, social network analysis, social ties, value chain analysis

Procedia PDF Downloads 410
3629 Exchange Rate Variation and Balance of Payments: The Nigerian Experience (1970-2012)

Authors: Vitus Onyebuchim Onyemailu, Olive Obianuju Okalibe

Abstract:

The study tried to examine relationship between exchange rate variations on the balance of payments in Nigeria from 1970 to 2012. Using time series on econometric measures such as Granger causality and ordinary least square (OLS), the study found that exchange rate movements especially the depreciation of naira has not contributed significantly on the balance of payments under the year of the study. The granger result conform the Marshall-Lerner short and long run prepositions that exchange rate devaluation enhances balance of payments. On disaggregation exchange rate granger causes current and capital account balances give the Nigeria data from 1970 to 2012. Overall in the long run OLS regression analysis, exchange rate on semi log functional form, exchange rate variation did not record significant effect on balance of payment equation. This height was also maintained in the current or trade balance which does not match the Marshall-Lerner. The capital account balance in reverse reported a significant impact of exchange rate variability on the capital account balance. Finally, on exchange rate determination equation, where many fundamentals were considered including lagged of exchange rate. Thus, the lagged of exchange rate recorded a positive and significant influence on the present exchange rate. This means that players in the financial markets usually out plays authority’s policy’s stances through their speculative tendencies. The work therefore, recommend that effort should be made by the authorities to providing enabling environment for production of goods and services to triumph in order to take advantages of steady devaluation of its currency. This is done by providing infrastructure, provision of science and technology. Thus, when this is done Nigeria would be able to have competitive power against the rest of the world.

Keywords: exchange rate variation, balance of payments, current account, capital account, Marshall-Lerner hypothesis

Procedia PDF Downloads 398
3628 Assessment of Risk Factors in Residential Areas of Bosso in Minna, Nigeria

Authors: Junaid Asimiyu Mohammed, Olakunle Docas Tosin

Abstract:

The housing environment in many developing countries is fraught with risks that have potential negative impacts on the lives of the residents. The study examined the risk factors in residential areas of two neighborhoods in Bosso Local Government Areas of Minna in Nigeria with a view to determining the level of their potential impacts. A sample of 378 households was drawn from the estimated population of 22,751 household heads. The questionnaire and direct observation were used as instruments for data collection. The data collected were analyzed using the Relative Importance Index (RII) rule to determine the level of the potential impact of the risk factors while ArcGIS was used for mapping the spatial distribution of the risks. The study established that the housing environment of Angwan Biri and El-Waziri areas of Bosso is poor and vulnerable as 26% of the houses were not habitable and 57% were only fairly habitable. The risks of epidemics, building collapse and rainstorms were evident in the area as 53% of the houses had poor ventilation; 20% of residents had no access to toilets; 47% practiced open waste dumping; 46% of the houses had cracked walls while 52% of the roofs were weak and sagging. The results of the analysis of the potential impact of the risk factors indicate a RII score of 0.528 for building collapse, 0.758 for rainstorms and 0.830 for epidemics, indicating a moderate to very high level of potential impacts. The mean RII score of 0.639 shows a significant potential impact of the risk factors. The study recommends the implementation of sanitation measures, provision of basic urban facilities and neighborhood revitalization through housing infrastructure retrofitting as measures to mitigate the risks of disasters and improve the living conditions of the residents of the study area.

Keywords: assessment, risk, residential, Nigeria

Procedia PDF Downloads 58
3627 Leveraging Li-Fi to Enhance Security and Performance of Medical Devices

Authors: Trevor Kroeger, Hayden Williams, Edward Holzinger, David Coleman, Brian Haberman

Abstract:

The network connectivity of medical devices is increasing at a rapid rate. Many medical devices, such as vital sign monitors, share information via wireless or wired connections. However, these connectivity options suffer from a variety of well-known limitations. Wireless connectivity, especially in the unlicensed radio frequency bands, can be disrupted. Such disruption could be due to benign reasons, such as a crowded spectrum, or to malicious intent. While wired connections are less susceptible to interference, they inhibit the mobility of the medical devices, which could be critical in a variety of scenarios. This work explores the application of Light Fidelity (Li-Fi) communication to enhance the security, performance, and mobility of medical devices in connected healthcare scenarios. A simple bridge for connected devices serves as an avenue to connect traditional medical devices to the Li-Fi network. This bridge was utilized to conduct bandwidth tests on a small Li-Fi network installed into a Mock-ICU setting with a backend enterprise network similar to that of a hospital. Mobile and stationary tests were conducted to replicate various different situations that might occur within a hospital setting. Results show that in room Li-Fi connectivity provides reasonable bandwidth and latency within a hospital like setting.

Keywords: hospital, light fidelity, Li-Fi, medical devices, security

Procedia PDF Downloads 102
3626 A Study on User Authentication Method Using Haptic Actuator and Security Evaluation

Authors: Yo Han Choi, Hee Suk Seo, Seung Hwan Ju, Sung Hyu Han

Abstract:

As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat.

Keywords: actuator, user authentication, security evaluation, haptic actuator

Procedia PDF Downloads 346
3625 World on the Edge: Migration and Cross Border Crimes in West Africa

Authors: Adeyemi Kamil Hamzah

Abstract:

The contiguity of nations in international system suggests that world is a composite of socio-economic unit with people exploring and exploiting the potentials in the world via migrations. Thus, cross border migration has made positive contributions to social and economic development of individuals and nations by increasing the household incomes of the host countries. However, the cross border migrations in West Africa are becoming part of a dynamic and unstable world migration system. This is due to the nature and consequences of trans-border crimes in West Africa, with both short and long term effects on the socio-economic viability of developing countries like West African States. The paper identified that migration influenced cross-border crimes as well as the high spate of insurgencies in the sub-region. Furthermore, the consequential effect of a global village has imbalanced population flows, making some countries host and parasites to others. Also, stern and deft cross-border rules and regulations, as well as territorial security and protections, ameliorate cross border crimes and migration in West African sub-regions. Therefore, the study concluded that cross border migration is the linchpin of all kinds of criminal activities which affect the security of states in the sub-region.

Keywords: cross-border migration, border crimes, security, West Africa, development, globalisation

Procedia PDF Downloads 227
3624 Secrecy Analysis in Downlink Cellular Networks in the Presence of D2D Pairs and Hardware Impairment

Authors: Mahdi Rahimi, Mohammad Mahdi Mojahedian, Mohammad Reza Aref

Abstract:

In this paper, a cellular communication scenario with a transmitter and an authorized user is considered to analyze its secrecy in the face of eavesdroppers and the interferences propagated unintentionally through the communication network. It is also assumed that some D2D pairs and eavesdroppers are randomly located in the cell. Assuming hardware impairment, perfect connection probability is analytically calculated, and upper bound is provided for the secrecy outage probability. In addition, a method based on random activation of D2Ds is proposed to improve network security. Finally, the analytical results are verified by simulations.

Keywords: physical layer security, stochastic geometry, device-to-device, hardware impairment

Procedia PDF Downloads 183
3623 Food for Health: Understanding the Importance of Food Safety in the Context of Food Security

Authors: Carmen J. Savelli, Romy Conzade

Abstract:

Background: Access to sufficient amounts of safe and nutritious food is a basic human necessity, required to sustain life and promote good health. Food safety and food security are therefore inextricably linked, yet the importance of food safety in this relationship is often overlooked. Methodologies: A literature review and desk study were conducted to examine existing frameworks for discussing food security, especially from an international perspective, to determine the entry points for enhancing considerations for food safety in national and international policies. Major Findings: Food security is commonly understood as the state when all people at all times have physical, social and economic access to sufficient, safe and nutritious food to meet their dietary needs and food preferences for an active and healthy life. Conceptually, food security is built upon four pillars including food availability, access, utilization and stability. Within this framework, the safety of food is often wrongly assumed as a given. However, in places where food supplies are insufficient, coping mechanisms for food insecurity are primarily focused on access to food without considerations for ensuring safety. Under such conditions, hygiene and nutrition are often ignored as people shift to less nutritious diets and consume more potentially unsafe foods, in which chemical, microbiological, zoonotic and other hazards can pose serious, acute and chronic health risks. While food supplies might be safe and nutritious, if consumed in quantities insufficient to support normal growth, health and activity, the result is hunger and famine. Recent estimates indicate that at least 842 million people, or roughly one in eight, still suffer from chronic hunger. Even if people eat enough food that is safe, they will become malnourished if the food does not provide the proper amounts of micronutrients and/or macronutrients to meet daily nutritional requirements, resulting in under- or over-nutrition. Two billion people suffer from one or more micronutrient deficiencies and over half a billion adults are obese. Access to sufficient amounts of nutritious food is not enough. If food is unsafe, whether arising from poor quality supplies or inadequate treatment and preparation, it increases the risk of foodborne infections such as diarrhoea. 70% of diarrhoea episodes occurring annually in children under five are due to biologically contaminated food. Conclusions: An integrated approach is needed where food safety and nutrition are systematically introduced into mainstream food system policies and interventions worldwide in order to achieve health and development goals. A new framework, “Food for Health” is proposed to guide policy development and requires all three aspects of food security to be addressed in balance: sufficiency, nutrition and safety.

Keywords: food safety, food security, nutrition, policy

Procedia PDF Downloads 422
3622 Isolation and Identification of Sarcocystis suihominis in a Slaughtered Domestic Pig (Sus scrofa) in Benue State, Nigeria

Authors: H. I. Obadiah, S. N. Wieser, E. A. Omudu, B. O. Atu, O. Byanet, L. Schnittger, M. Florin-Christensen

Abstract:

Sarcocystis sp. are Apicomplexan protozoan parasites with a life cycle that involves a predator and a prey as final and intermediate hosts, respectively. In tissues of the intermediate hosts, the parasites produce sarcocysts that vary in size and morphology according to the species. When a suitable predator ingests sarcocyst-containing meat, the parasites are released in the intestine and undergo sexual reproduction producing infective sporocysts, which are excreted with the feces into the environment. The cycle is closed when a prey ingests sporocyst-contaminated water or pasture; the parasites gain access to the circulation, and eventually invade tissues and reproduce asexually yielding sarcocysts. Pig farming is a common practice in Nigeria as well as in many countries around the world. In addition to its importance as protein source, pork is also a source of several pathogens relevant to humans. In the case of Sarcocystis, three species have been described both in domestic and wild pigs, namely, S. miescheriana, S. porcifelis and S. suihominis. Humans can act both as final and aberrant intermediate hosts of S. suihominis, after ingesting undercooked sarcocyst-infested pork. Infections are usually asymptomatic but can be associated with inappetence, nausea, vomiting and diarrhea, or with muscle pain, fever, eosinophilia and bronchospasm, in humans acting as final or intermediate hosts, respectively. Moreover, excretion of infective forms with human feces leads to further dissemination of the infection. In this study, macroscopic sarcocysts of white color, oval shape and a size range of approximately 3-5 mm were observed in the skeletal muscle of a slaughtered pig in an abattoir in Makurdi, Benue State, Nigeria, destined to human consumption. Sarcocysts were excised and washed in distilled water, and genomic DNA was extracted using a commercial kit. The near-complete length of the 18S rRNA gene was analyzed after PCR amplification of two overlapping fragments, each of which were submitted to direct sequencing. In addition, the mitochondrial cytochrome oxidase (cox-1) gene was PCR-amplified and directly sequenced. Two phylogenetic trees containing the obtained sequences along with available relevant 18S rRNA and cox-1 sequences were constructed by neighbor joining after alignment, using the corresponding sequences of Toxoplasma gondii as outgroup. The results showed in both cases that the analyzed sequences grouped with S. suihominis with high bootstrap value, confirming the identity of this macroscopic sarcocyst-forming parasite as S. suihominis. To the best of our knowledge, these results represent the first demonstration of this parasite in pigs of Nigeria and the largest sarcocysts described so far for S. suihominis. The close proximity between pigs and humans in pig farms, and the frequent poor sanitary conditions in human dwellings strongly suggest that the parasite undergoes the sexual stages of its life cycle in humans as final hosts. These findings provide an important reference for the examination and control of Sarcocystis species in pigs of Nigeria.

Keywords: nigeria, pork, sarcocystis suihominis, zoonotic parasite

Procedia PDF Downloads 88
3621 Spectral Re-Evaluation of the Magnetic Basement Depth over Yola Arm of Upper Benue Trough Nigeria Using Aeromagnetic Data

Authors: Emberga Terhemb Opara Alexander, Selemo Alexader, Onyekwuru Samuel

Abstract:

The aeromagnetic data have been used to re-evaluate parts of the Upper Benue Trough Nigeria using spectral analysis technique in order to appraise the mineral accumulation potential of the area. The regional field was separated with a first order polynomial using polyfit program. The residual data was subdivided into 24 spectral blocks using OASIS MONTAJ software program. Two prominent magnetic depth source layers were identified. The deeper source depth values obtained ranges from 1.56km to 2.92km with an average depth of 2.37km as the magnetic basement depth while for the shallower sources, the depth values ranges from -1.17km to 0.98km with an average depth of 0.55km. The shallow depth source is attributed to the volcanic rocks that intruded the sedimentary formation and this could possibly be responsible for the mineralization found in parts of the study area.

Keywords: spectral analysis, Upper Benue Trough, magnetic basement depth, aeromagnetic

Procedia PDF Downloads 452
3620 Environmental Education Programmes in Oil Producing Indigenous Communities in Ogoniland, Nigeria

Authors: Lele Dominic Dummene

Abstract:

Economic development and environmental development have been a long-lasting debate between capitalist and environmentalist. It is also seen as a debate between modernisation, globalisation at one end, and environmental justice at the other end. Our society today is moving rapidly towards development and increased industrial revolutions, and globalisation. Indigenous communities in Ogoniland are also experiencing such development due to multinationals’ exploration of crude oil in the communities. The oil exploration activities have caused environmental, socio-economic, health, and political problems in indigenous communities in Ogoniland. These issues require depth understanding from all sectors (public, government, and corporate sectors) to address them. Hence, this paper presents the types of environmental education programs used in indigenous communities in Ogoniland to address environmental issues and other problems caused by oil exploration in Ogoniland, Nigeria. These environmental education programs contributes to environmental policy creation, development of environmental curriculum, and pragmatic actions towards mitigating environmental degradation and related environmental socio-economic and political issues in indigenous communities.

Keywords: environmental education, indigenous communities, environmental problems, ogoniland

Procedia PDF Downloads 146
3619 The Effect of Artificial Intelligence on International Law, Legal Security and Privacy Issues

Authors: Akram Waheb Nasef Alzordoky

Abstract:

The wars and armed conflicts have frequently ended in violations of global humanitarian law and regularly devote the maximum severe global crimes, which include war crimes, crimes towards humanity, aggression and genocide. But, simplest inside the XX century, the guideline changed into an articulated idea of establishing a frame of worldwide criminal justice so that you can prosecute those crimes and their perpetrators. The first steps on this subject were made with the aid of setting up the worldwide army tribunals for warfare crimes at Nuremberg and Tokyo, and the formation of ad hoc tribunals for the former Yugoslavia and Rwanda. Ultimately, the global criminal courtroom was established in Rome in 1998 with the aim of justice and that allows you to give satisfaction to the sufferers of crimes and their families. The aim of the paper was to provide an ancient and comparative analysis of the establishments of worldwide criminal justice primarily based on which those establishments de lege lata fulfilled the goals of individual criminal responsibility and justice. Moreover, the authors endorse de lege ferenda that the everlasting global crook Tribunal, in addition to the potential case, additionally takes over the current ICTY and ICTR cases.

Keywords: social networks privacy issues, social networks security issues, social networks privacy precautions measures, social networks security precautions measures

Procedia PDF Downloads 23
3618 Production, Utilization and Marketing of Non-Timber Forest Products (NTFPs) in Ikwuano Local Government Area of Abia State, Nigeria

Authors: Nneka M. Chidieber-Mark, Roseline D. Ejike

Abstract:

Non-Timber Forest Products (NTFPs) have been described as all biological materials, other than timber extracted from natural and managed forests for human subsistence and economic activities. This study focused on the production, utilization and marketing of Non-Timber Forest Products (NTFPs) in Ikwuano Local Government Area of Abia State, Nigeria. A multistage sampling technique was adopted in the selection of respondents for the study. Data were from primary sources only. Data collected were analysed using descriptive statistical tools as well as Net Income Analysis. Results show that a vast number of plant based and animal based NTFPs exist in the study area. They are harvested and used for multiple purposes. NTFPs are a source of income for the indigenes that depend on it for their livelihood. Unsustainable production and harvesting as well as poor marketing information was among the constraints impeding the growth and development of NTFPs sub-sector in the study area.

Keywords: non-timber forest products, production, utilization, marketing

Procedia PDF Downloads 450