Search results for: Arabic Fodio Nigeria security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5388

Search results for: Arabic Fodio Nigeria security

3588 Ethnic and National Determinants in the Process of Building Peace in Afghanistan After the Withdrawal of Western Forces in 2021

Authors: Małgorzata Cichy

Abstract:

Afghanistan is a source of conflicts that affect security on a global scale. The role of ethnic and national determinants in the peacebuilding process in this country remains an extremely important factor in this respect. Research methods include literature and data analysis (scientific literature, documents of governmental and non-governmental organizations, statistical data and media reports), institutional and legal analysis, as well as decision-making method. The main objective of the research is a comprehensive answer to the question of how ethnic and national factors affect the process of building peace in Afghanistan after 2021 and what impact it has on international security.

Keywords: Afghanistan, pashtuns, peace, taliban

Procedia PDF Downloads 96
3587 Impact of Internal Control on Fraud Detection and Prevention: A Survey of Selected Organisations in Nigeria

Authors: Amos Olusola Akinola

Abstract:

The aim of this study is to evaluate the internal control system on fraud prevention in Nigerian business organizations. A survey research was undertaken in five organizations from the banking and manufacturing sectors in Nigeria using the simple random sampling technique and primary data was obtained with the aid structured questionnaire drawn on five likert’s scale. Four Hypotheses were formulated and tested using the T-test Statistics, Correlation and Regression Analysis at 95% confidence interval. It was discovered that internal control has a significant positive relationship with fraud prevention and that a weak internal control system permits fraudulent activities among staff. Based on the findings, it was recommended that organizations should continually and methodically review and evaluate the components of its internal control system whether activities are working as planned or not and that every organization should have pre-determined guidelines for conducting its operations and ensures compliance with these set guidelines while proactive steps should be taken to establish the independence of the internal audit by making the audit reportable to the governing council of an organization and not the chief executive officer.

Keywords: internal control, internal system, internal audit, fraud prevention, fraud detection

Procedia PDF Downloads 385
3586 Evaluation of the Efficacy and Tolerance of Gabapentin in the Treatment of Neuropathic Pain

Authors: A. Ibovi Mouondayi, S. Zaher, R. Assadi, K. Erraoui, S. Sboul, J. Daoudim, S. Bousselham, K. Nassar, S. Janani

Abstract:

INTRODUCTION: Neuropathic pain (NP) caused by damage to the somatosensory nervous system has a significant impact on quality of life and is associated with a high economic burden on the individual and society. The treatment of neuropathic pain consists of the use of a wide range of therapeutic agents, including gabapentin, which is used in the treatment of neuropathic pain. OBJECTIF: The objective of this study was to evaluate the efficacy and tolerance of gabapentin in the treatment of neuropathic pain. MATERIAL AND METHOD: This is a monocentric, cross-sectional, descriptive, retrospective study conducted in our department over a period of 19 months from October 2020 to April 2022. The missing parameters were collected during phone calls of the patients concerned. The diagnostic tool adopted was the DN4 questionnaire in the dialectal Arabic version. The impact of NP was assessed by the visual analog scale (VAS) on pain, sleep, and function. The impact of PN on mood was assessed by the "Hospital anxiety, and depression scale HAD" score in the validated Arabic version. The exclusion criteria were patients followed up for depression and other psychiatric pathologies. RESULTS: A total of 67 patients' data were collected. The average age was 64 years (+/- 15 years), with extremes ranging from 26 years to 94 years. 58 women and 9 men with an M/F sex ratio of 0.15. Cervical radiculopathy was found in 21% of this population, and lumbosacral radiculopathy in 61%. Gabapentin was introduced in doses ranging from 300 to 1800 mg per day with an average dose of 864 mg (+/- 346) per day for an average duration of 12.6 months. Before treatment, 93% of patients had a non-restorative sleep quality (VAS>3). 54% of patients had a pain VAS greater than 5. The function was normal in only 9% of patients. The mean anxiety score was 3.25 (standard deviation: 2.70), and the mean HAD depression score was 3.79 (standard deviation: 1.79). After treatment, all patients had improved the quality of their sleep (p<0.0001). A significant difference was noted in pain VAS, function, as well as anxiety and depression, and HAD score. Gabapentin was stopped for side effects (dizziness and drowsiness) and/or unsatisfactory response. CONCLUSION: Our data demonstrate a favorable effect of gabapentin on the management of neuropathic pain with a significant difference before and after treatment on the quality of life of patients associated with an acceptable tolerance profile.

Keywords: neuropathic pain, chronic pain, treatment, gabapentin

Procedia PDF Downloads 95
3585 Disruptive Innovation in Low-Income Countries: The Role of the Sharing Economy in Shaping the People Transportation Market in Nigeria

Authors: D. Tappi

Abstract:

In the past decades, the idea of innovation moved from being considered the result of development to being seen as its means. Innovation and its diffusion are indeed keys to the development and economic catch-up of a country. However, the process of diffusing existing innovation in low income countries has demonstrated dependent on inadequate infrastructures and institutions. The paper examines the role of disruptive innovation in bridging the technology gap between high- and low-income countries, overcoming the lack in infrastructures and institutions. In particular, the focus of this paper goes to the role of disruptive innovation in people transportation in Nigeria. Uber, Taxify, and Smartcab are covering a small and interesting market that was underserved, between the high-end private driver markets, the personal car owners and the low-priced traditional cab and the Keke (tricycle). Indeed the small Nigerian middle class and international community have found in the sharing people transportation market a safe, reasonably priced means of transportation in Nigerian big cities. This study uses mainly qualitative data collection methods in the form of semi-structured interviews with major players and users and quantitative data analysis in the form of a survey among users in order to assess the role of these new transportation modes in shaping the market and even creating a new niche. This paper shows how the new sharing economy in people transportation is creating new solutions to old problems as well as creating new challenges for both the existing market players and institutions. By doing so, the paper shows how disruptive innovations applied to low income countries, not only can overcome the lacking infrastructure problem but could also help bridge the technology gap between those and high income countries. This contribution proves that it is indeed exactly because the market presents these obstacles that disruptive innovations can succeed in countries such as Nigeria.

Keywords: development, disruptive innovation, sharing economy, technology gap

Procedia PDF Downloads 120
3584 The Political Economy of Human Trafficking and Human Insecurity in Asia: The Case of Japan, Thailand and India

Authors: Mohammed Bashir Uddin

Abstract:

Human trafficking remains as a persistent problem in many parts of the world. It is considered by many countries as an issue of a threat to national security. Border enforcement to prevent trafficking has been the main incentive, which eventually causes human insecurity for vulnerable people, especially for women. This research argues that focus needs to be placed on the political economy of trafficking, hence on the supply and demand sides of trafficking from a broader socio-economic perspective. Trafficking is a global phenomenon with its contemporary origins in the international capitalist market system. This research investigates particularly the supply-demand nexus on the backdrop of globalization and its impact on human security. It argues that the nexus varies across the countries, particularly the demand side. While prostitution has been the sole focus of the demand side in all countries in Asia, the paper argues that organ trade, bonded labor, cheap and exploitable labor through false recruitment (male trafficking) and adoption are some of the rising demands that explore new trends of trafficking, which could be better explained through international political economy (IPE). Following a qualitative research method, the paper argues that although demands vary in destination countries, they are the byproducts of IPE which have different socio-economic impacts both on trafficked individuals and the states.

Keywords: globalization, human security, human trafficking, political economy

Procedia PDF Downloads 471
3583 Psychological Factors Influencing Adolescent Career Choices in Southern Nigeria

Authors: Iniye Irene Wodi, Ibebietei Temple Offor

Abstract:

Adolescence is a transition period from childhood to adulthood and one of the challenges of this period to the adolescent is the choice of a career. Choosing a career can be influenced by various factors some of which could be psychological. The study, therefore, investigated the psychological factors that influence adolescents’ choice of career in the southern part of Nigeria. Adolescents from selected secondary schools were drawn for the study using multi-stage sampling techniques. Motivating factors for adolescent career choice questionnaire (MFACC) was used for the study. The instrument was validated by experts in test and measurement. A reliability coefficient of 0.79 was obtained for the instrument using Pearson Product moment after a test-retest. The findings revealed that students’ occupational needs, interest, self-concept and societal values motivated adolescents career choices. Based on these findings, recommendations were made chief among which was the need for society to place more emphasis on acceptable and beneficial values as this would influence career decisions adolescents make. They also influence the occupational needs and interests of the adolescents.

Keywords: adolescence, career choice, psychological factors, societal values

Procedia PDF Downloads 255
3582 The Association between Food Security Status and Depression in Two Iranian Ethnic Groups Living in Northwest of Iran

Authors: A. Rezazadeh, N. Omidvar, H. Eini-Zinab

Abstract:

Food insecurity (FI) influences may result in poor physical and mental health outcomes. Minor ethnic group may experience higher level of FI, and this situation may be related with higher depression prevalence. The aim of this study was to determine the association of depression with food security status in major (Azeri) and minor (Kurdish) ethnicity living in Urmia, West Azerbaijan, north of Iran. In this cross-sectional study, 723 participants (427 women and 296 men) aged 20–64 years old, from two ethnic groups (445 Azeri and 278 Kurdish), were selected through a multi stage cluster systematic sampling. Depression rate was assessed by “Beck” short form questionnaire (validated in Iranians) through interviews. Household FI status (HFIS) was measured using adapted HFI access scale through face-to-face interviews at homes. Multinomial logistic regression was used to estimate odds ratios (OR) of depression across HFIS. Higher percent of Kurds had moderate and severe depression in comparison with Azeri group (73 [17.3%] vs. 86 [27.9%]). There were not any significant differences between the two ethnicities in mild depression. Also, of all the subjects, moderate-to-sever FI was more prevalent in Kurds (28.5%), compared to Azeri group (17.3%) [P < 0.01]. Kurdish ethnic group living in food security or mild FI households had lower chance to have symptom of severe depression in comparison to those with sever FI (OR=0.097; 95% CI: 0.02-0.47). However, there was no significant association between depression and HFI in Azeri group. Findings revealed that the severity of HFI was related with severity depression in minor studied ethnic groups. However, in Azeri ethnicity as a major group, other confounders may have influence on the relation with depression and FI, that were not studied in the present study.

Keywords: depression, ethnicity, food security status, Iran

Procedia PDF Downloads 210
3581 Effect of Land Use on Soil Organic Carbon Stock and Aggregate Dynamics of Degraded Ultisol in Nsukka, Southeastern Nigeria

Authors: Chukwuebuka Vincent Azuka, Chidimma Peace Odoh

Abstract:

Changes in agricultural practices and land use influence the storage and release of soil organic carbon and soil structural dynamics. To investigate this in Nsukka, southeastern Nigeria, soil samples were collected at 0-10 cm, 10-20 cm and 20-30 cm from three locations; Ovoko (OV), Obukpa (OB) and University of Nigeria, Nsukka (UNN) and three land use types; cultivated land (CL), forest land (FL) and grassland (GL)). Data were subjected to analysis of variance (ANOVA) using SPSS. Also, correlations between organic carbon stock, structural stability indices and other soil properties were established. The result showed that Ksat was significantly (p < 0.05) influenced by location with mean values of 68 cmhr⁻¹,121.63 cmhr⁻¹, 8.42 cmhr⁻¹ in OV, OB and UNN respectively. The MWD and aggregate stability (AS) were significantly (p < 0.05) influenced by land use and depth. The mean values of MWD are 0.85 (CL), 1.35 (FL) and 1.45 (GL), and 1.66 at 0-10 cm, 1.08 at 10-20 cm and 0.88 mm at 20-30 cm. The mean values of AS are; 27.66% (CL), 46.39% (FL) and 49.81% (GL), and 53.96% at 0-10cm, 40.22% at 10-20cm and 29.57% at 20-30cm. Clay flocculation (CFI) and dispersion indices (CDI) differed significantly (p < 0.05) among the land use. Soil pH differed significantly (p < 0.05) across the land use and locations with mean values ranging from 3.90-6.14. Soil organic carbon (SOC) significantly (p < 0.05) differed across locations and depths. SOC decreases as depth increases depth with mean values of 15.6 gkg⁻¹, 10.1 gkg⁻¹, and 8.6 gkg⁻¹ at 0-10 cm, 10-20 cm, and 20-30 cm respectively. SOC in the three land use was 8.8 g kg-1, 15.2 gkg⁻¹ and 10.4 gkg⁻¹ at CL, FL, and GL respectively. The highest aggregate-associated carbon was recorded in 0.5 mm across the land use and depth except in cultivated land and at 20-30 cm which recorded their highest SOC at 1mm. SOC stock, total nitrogen (TN) and CEC were significantly (p < 0.05) different across the locations with highest values of 23.43 t/ha, 0.07g/kg and 14.27 Cmol/kg respectively recorded in UNN. SOC stock was significantly (p < 0.05) influenced by depth as follows; 0-10>10-20>20-30 cm. TN was low with mean values ranging from 0.03-0.07 across the locations, land use and depths. The mean values of CEC ranged from 9.96-14.27 Cmol kg⁻¹ across the locations and land use. SOC stock showed correlation with silt, coarse sand, N and CEC (r = 0.40*, -0.39*, -0.65** and 0.64** respectively. AS showed correlation with BD, Ksat, pH in water and KCl, and SOC (r = -0.42*, 0.54**, -0.44*, -0.45* and 0.49** respectively. Thus, land use and location play a significant role in sustainable management of soil resources.

Keywords: agricultural practices, structural dynamics, sequestration, soil resources, management

Procedia PDF Downloads 146
3580 Aspectual Verbs in Modern Standard Arabic

Authors: Yasir Alotaibi

Abstract:

The aim of this paper is to discuss the syntactic analysis of aspectual or phasal verbs in Modern Standard Arabic (MSA). Aspectual or phasal verbs refer to a class of verbs that require a verbal complement and denote the inception, duration, termination ...etc. of a state or event. This paper will discuss two groups of aspectual verbs in MSA. The first group includes verbs such as ̆gacala, tafiqa, ?akhatha, ?ansha?a, sharaca and bada?a and these verbs are used to denote the inception of an event. The second group includes verbs such as ?awshaka, kaada and karaba and the meaning of these verbs is equivalent to be near/almost . The following examples illustrate the use of the verb bada?a ‘begin’ which is from the first group: a. saalim-un bada?a yuthaakiru. Salem-NOM begin.PFV.3SGM study.IPFV.3SGM ‘Salem began to study’ b.*saalim-un bada?a ?an yuthaakiru. Salem-NOM begin.PFV.3SGM COMP study.IPFV.3SGM ‘Salem began to study’ The example in (1a) is grammatical because the aspectual verb is used with a verbal complement that is not introduced by a complementizer. In contrast, example (1b) is not grammatical because the verbal complement is introduced by the complementizer ?an ‘that’. In contrast, the following examples illustrate the use of the verb kaada ‘be almost’ which is from the second group. However, the two examples are grammatical and this means that the verbal complement of this verb can be without (as in example (2a)) or with ( as in example (2b)) a complementizer. (2) a. saalim-un kaada yuthaakiru. Salem-NOM be.almost.PFV.3SGM study.IPFV.3SGM ‘Salem was almost to study’ b. saalim-un kaada ?an yuthaakiru. Salem-NOM be.almost.PFV.3SGM COMP study.IPFV.3SGM ‘Salem was almost to study’ The salient properties of this class of verbs are that they require a verbal complement, there is no a complementizer that can introduce the complement with the first group while it is possible with the second and the aspectual verb and the embedded verb share and agree with the same subject. To the best of knowledge, aspectual verbs in MSA are discussed in traditional grammar only and have not been studied in modern syntactic theories. This paper will consider the analysis of aspectual verbs in MSA within the Lexical Functional Grammar (LFG) framework. It will use some evidence such as modifier or negation to find out whether these verbs have PRED values and head their f-structures or they form complex predicates with their complements. If aspectual verbs show the properties of heads, then the paper will explore what kind of heads they are. In particular, they should be raising or control verbs. The paper will use some tests such as agreement, selectional restrictions...etc. to find out what kind of verbs they are.

Keywords: aspectual verbs, biclausal, monoclausal, raising

Procedia PDF Downloads 55
3579 Traditional Mechanisms of Conflict Resolution in Africa: A Pathway to Sustainable Peace in Nigeria

Authors: Ejovi Eghwubare Augustine

Abstract:

This study delved into the traditional mechanisms of conflict resolution in Africa, a pathway to sustainable peace in Nigeria. It deployed the quantitative and qualitative methods of data collection and content analysis. The work adopted the Peace Process theory propounded by John Darby and Roger Macunity. It ascertained that disputes or disagreements are unarguably and necessarily an inevitable part of human existence, flowing directly from communication, interaction, and relationships which can occur at individual and national levels, even at international levels in view of the current trend of globalization. The alternative Dispute Resolution (ADR) mechanism is a basket of procedures outside the traditional process of litigation or strict determination of legal rights. It may also be elucidated as a range of procedures that serve as generally involve the intercession and assistance of a neutral and impartial third party. The traditional mechanisms of conflict resolution in Africa are alien to the Western world; this paper is of utmost importance to the Western world and also enriched their pool of literature. Nigeria is a country that is dominated by various ethnic groups anchored on diverse cultures, customs, and traditions. It is, therefore, not surprising to see conflicts arise, and despite the various attempts at resolving these conflicts through litigation, they still remained unabated. The paper investigated the lessons learned from Traditional Mechanisms of Conflict resolution; it also interrogated its impact and the way forward. In light of the lessons that were learned and the impact of the traditional mechanisms of conflict resolution, suggestions on how to attain a sustainable, peaceful society were proffered. In conclusion, the study crystallized reforms on the alternative dispute resolution introduced through the traditional mechanism, which includes, amongst others, that constitutional recognition should be given to traditional institutions of conflict resolution to enable quick dispensation of matters.

Keywords: traditional, conflict, peace, resolution

Procedia PDF Downloads 72
3578 The Role of Businesses in Peacebuilding in Nigeria: A Stakeholder Approach

Authors: Jamila Mohammed Makarfi, Yontem Sonmez

Abstract:

Developing countries like Nigeria have recently been affected by conflicts characterized by violence, high levels of risk and insecurity, resulting in loss of lives, livelihoods, displacement of communities, degradation of health, educational and social infrastructure as well as economic underdevelopment. The Nigerian government’s response to most of these conflicts has mainly been reactionary in the form of military deployments, as against precautionary to prevent or address the root causes of the conflicts. Several studies have shown that at various points of a conflict, conflict regions can benefit from the resources and expertise available outside the government, mainly from the private sector through mechanisms such as corporate social responsibility (CSR) by businesses. The main aim of this study is to examine the role of businesses in peacebuilding in Northern Nigeria through CSR in the last decade. The expected contributions from this will answer research questions, such as the key business motivations to engage in peacebuilding, as well as the degree of influence exerted from various stakeholder groups on the business decision to engage. The methodology of the study adopts a multiple case study of over 120 businesses of various sizes, ranging from small, medium and large-scale. A mixed method enabled the collection of quantitative and qualitative primary data to augment the secondary data. The results indicated that the most important business motivations to engage in peacebuilding were the negative effects of the conflict on economic stability, as well as stakeholder-driven motives. On the other hand, out of the 12 identified stakeholders, micro-, small- and medium-scale enterprises (MSMEs) considered the chief executive officer’s interest to be the most important factor, while large companies rated the government and community pressure as the highest. Overall, the foreign stakeholders scored low on the influence chart for all business types.

Keywords: conflict, corporate social responsibility, peacebuilding, stakeholder

Procedia PDF Downloads 221
3577 Double Layer Security Authentication Model for Automatic Dependent Surveillance-Broadcast

Authors: Buse T. Aydin, Enver Ozdemir

Abstract:

An automatic dependent surveillance-broadcast (ADS-B) system has serious security problems. In this study, a double layer authentication scheme between the aircraft and ground station, aircraft to aircraft, ground station to ATC tower is designed to prevent any unauthorized aircrafts from introducing themselves as friends. This method can be used as a solution to the problem of authentication. The method is a combination of classical cryptographic methods and new generation physical layers. The first layer has employed the embedded key of the aircraft. The embedded key is assumed to installed during the construction of the utility. The other layer is a physical attribute (flight path, distance, etc.) between the aircraft and the ATC tower. We create a mathematical model so that two layers’ information is employed and an aircraft is authenticated as a friend or unknown according to the accuracy of the results of the model. The results of the aircraft are compared with the results of the ATC tower and if the values found by the aircraft and ATC tower match within a certain error margin, we mark the aircraft as friend. As a result, the ADS-B messages coming from this authenticated friendly aircraft will be processed. In this method, even if the embedded key is captured by the unknown aircraft, without the information of the second layer, the unknown aircraft can easily be determined. Overall, in this work, we present a reliable system by adding physical layer in the authentication process.

Keywords: ADS-B, authentication, communication with physical layer security, cryptography, identification friend or foe

Procedia PDF Downloads 179
3576 Sustainable Use of Agricultural Waste to Enhance Food Security and Conserve the Environment

Authors: M. M. Tawfik, Ezzat M. Abd El Lateef, B. B. Mekki, Amany A. Bahr, Magda H. Mohamed, Gehan S. Bakhoom

Abstract:

The rapid increase in the world’s population coupled by decrease the arable land per capita has resulted into an increased demand for food which has in turn led to the production of large amounts of agricultural wastes, both at the farmer, municipality and city levels. Agricultural wastes can be a valuable resource for improving food security. Unfortunately, agricultural wastes are likely to cause pollution to the environment or even harm to human health. This calls for increased public awareness on the benefits and potential hazards of agricultural wastes, especially in developing countries. Agricultural wastes (residual stalks, straw, leaves, roots, husks, shells etcetera) and animal waste (manures) are widely available, renewable and virtually free, hence they can be an important resource. They can be converted into heat, steam, charcoal, methanol, ethanol, bio diesel as well as raw materials (animal feed, composting, energy and biogas construction etcetera). agricultural wastes are likely to cause pollution to the environment or even harm to human health, if it is not used in a sustainable manner. Organic wastes could be considered an important source of biofertilizer for enhancing food security in the small holder farming communities that would not afford use of expensive inorganic fertilizers. Moreover, these organic wastes contain high levels of nitrogen, phosphorus, potassium, and organic matter important for improving nutrient status of soils in urban agriculture. Organic compost leading to improved crop yields and its nutritional values as compared with inorganic fertilization. This paper briefly reviews how agricultural wastes can be used to enhance food security and conserve the environment.

Keywords: agricultural waste, organic compost, environment, valuable resources

Procedia PDF Downloads 520
3575 Corporate Governance and Firms` Performance: Evidence from Quoted Firms on the Nigerian Stock Exchange

Authors: Ogunwole Cecilia Oluwakemi, Wahid Damilola Olanipekun, Omoyele Olufemi Samuel, Timothy Ayomitunde Aderemi

Abstract:

The issues relating to corporate governance in both locally and internationally managed firms cannot be overemphasized because the lack of efficient corporate governance could orchestrate serious problems in any organization. Against this backdrop, this study examines the nexus between corporate governance and performance of firms from 2012 to 2020, using the case study of the Nigerian stock exchange. Consequently, data was collected from forty (40) listed firms on the Nigerian Stock Exchange. The study employed a fixed effect technique of estimation to address the objective of the study. It was discovered from the study that the influence of corporate governance components such as gender diversity, board independence and managerial ownership led to a significant positive impact on the performance of the firms under the investigation. In view of the above finding, this study makes the following recommendations for the policymakers in Nigeria that anytime the goal of the policymakers is the improvement of performance of the listed firms in the Nigerian stock exchange, board independence and a balance in the inclusion of male and female among the board of directors should be encouraged in these firms.

Keywords: corporate, governance, firms, performance, Nigeria, stock, exchange

Procedia PDF Downloads 176
3574 Performance Analysis of Traffic Classification with Machine Learning

Authors: Htay Htay Yi, Zin May Aye

Abstract:

Network security is role of the ICT environment because malicious users are continually growing that realm of education, business, and then related with ICT. The network security contravention is typically described and examined centrally based on a security event management system. The firewalls, Intrusion Detection System (IDS), and Intrusion Prevention System are becoming essential to monitor or prevent of potential violations, incidents attack, and imminent threats. In this system, the firewall rules are set only for where the system policies are needed. Dataset deployed in this system are derived from the testbed environment. The traffic as in DoS and PortScan traffics are applied in the testbed with firewall and IDS implementation. The network traffics are classified as normal or attacks in the existing testbed environment based on six machine learning classification methods applied in the system. It is required to be tested to get datasets and applied for DoS and PortScan. The dataset is based on CICIDS2017 and some features have been added. This system tested 26 features from the applied dataset. The system is to reduce false positive rates and to improve accuracy in the implemented testbed design. The system also proves good performance by selecting important features and comparing existing a dataset by machine learning classifiers.

Keywords: false negative rate, intrusion detection system, machine learning methods, performance

Procedia PDF Downloads 118
3573 An Analysis of Innovative Cloud Model as Bridging the Gap between Physical and Virtualized Business Environments: The Customer Perspective

Authors: Asim Majeed, Rehan Bhana, Mak Sharma, Rebecca Goode, Nizam Bolia, Mike Lloyd-Williams

Abstract:

This study aims to investigate and explore the underlying causes of security concerns of customers emerged when WHSmith transformed its physical system to virtualized business model through NetSuite. NetSuite is essentially fully integrated software which helps transforming the physical system to virtualized business model. Modern organisations are moving away from traditional business models to cloud based models and consequently it is expected to have a better, secure and innovative environment for customers. The vital issue of the modern age race is the security when transforming virtualized through cloud based models and designers of interactive systems often misunderstand privacy and even often ignore it, thus causing concerns for users. The content analysis approach is being used to collect the qualitative data from 120 online bloggers including TRUSTPILOT. The results and finding provide useful new insights into the nature and form of security concerns of online users after they have used the WHSmith services offered online through their website. Findings have theoretical as well as practical implications for the successful adoption of cloud computing Business-to-Business model and similar systems.

Keywords: innovation, virtualization, cloud computing, organizational flexibility

Procedia PDF Downloads 384
3572 Power Line Communication Integrated in a Wireless Power Transfer System: Feasibility of Surveillance Movement

Authors: M. Hemnath, S. Kannan, R. Kiran, K. Thanigaivelu

Abstract:

This paper is based on exploring the possible opportunities and applications using Power Line Communication (PLC) for security and surveillance operations. Various research works are done for introducing PLC into onboard vehicle communication and networking (CAN, LIN etc.) and various international standards have been developed. Wireless power transfer (WPT) is also an emerging technology which is studied and tested for recharging purposes. In this work we present a system which embeds the detection and the response into one which eliminates the need for dedicated network for data transmission. Also we check the feasibility for integrating wireless power transfer system into this proposed security system for transmission of power to detection unit wirelessly from the response unit.

Keywords: power line communication, wireless power transfer, surveillance

Procedia PDF Downloads 535
3571 Livelihood and Willingness to Accept Reducing Emission from Deforestation and Degradation by Local People in the Southwestern Nigeria

Authors: Adebayo John Julius, Emmanuel Imoagene

Abstract:

Mitigating global warming through reducing emission from deforestation and degradation (REDD) has been given increasing attentions in government-to-government negotiations while discussions among decision-makers have been going on, it is important to learn about the perception of local people in relation to REDD because the implementation will affect their lives. A survey was conducted using questionnaires to examine the livelihood and forest dependency of the local people in the vicinity of Onigambari and Ido area. Respondents’ income from forest activities and forest resources are collected. Participation in tourism related activities among the household members was also investigated to measure the potential of this “eco-friendly” income generation activity in the local communities. There was a general indication of reducing slash-and-burn activities with distance from the park and involvement in tourism-related job. Most of the local people were willing to accept compensation as alternative for slash-and-burn activities. The compensation preferred is in various form of development and different level of forest and environmental activities

Keywords: livelihood, emission, deforestation, degradation, local people, southwest Nigeria

Procedia PDF Downloads 144
3570 Comparative Analysis of Integrated and Non-Integrated Fish Farming in Ogun State, Nigeria

Authors: B. G. Abiona

Abstract:

This study compared profitability analysis of integrated and non-integrated fish farming in Ogun State, Nigeria. Primary data were collected using interview guide. Random sampling techniques was used to select 133 non-integrated fish farmers (NIFF) and 216 integrated fish farmers (IFF) (n = 349) from the study area. Data were analyzed using Chi-square, T-test and Pearson Product moment correlation. Results showed that 92.5% of NIFF was male compared to IFF (90.7%). Also, 96.8% of IFF and 79.7% of NIFF were married. The mean ages of sampled farmers were 44 years (NIFF) and 46 years (IFF) while the mean fish farming experiences were 4 years (NIFF) and 5 years (IFF). Also, the average net profit per year of integrated fish farmers was ₦162,550 compared to NIFF (₦61,638). The chi-square analyses showed that knowledge of fish farming had significant relationship with respondents sex (χ2 = 9.44, df = 2, p < 0.05), age (r = 0.20, p< 0.05) and farming experience (r = p = 0.05). Significant differences exist between integrated and non-integrated fish farming, considering their knowledge of fish farming (t = 21.5, χ = 43.01, p < 0.05). The study concluded that IFF are more profitable compared to NIFF. It was recommended that private investors and NGOs should sponsor short training and courses which will enhance efficiency of fish farming to boost productivity among fish farmers.

Keywords: profitability analysis, farms, integration

Procedia PDF Downloads 336
3569 Digital Twin for Retail Store Security

Authors: Rishi Agarwal

Abstract:

Digital twins are emerging as a strong technology used to imitate and monitor physical objects digitally in real time across sectors. It is not only dealing with the digital space, but it is also actuating responses in the physical space in response to the digital space processing like storage, modeling, learning, simulation, and prediction. This paper explores the application of digital twins for enhancing physical security in retail stores. The retail sector still relies on outdated physical security practices like manual monitoring and metal detectors, which are insufficient for modern needs. There is a lack of real-time data and system integration, leading to ineffective emergency response and preventative measures. As retail automation increases, new digital frameworks must control safety without human intervention. To address this, the paper proposes implementing an intelligent digital twin framework. This collects diverse data streams from in-store sensors, surveillance, external sources, and customer devices and then Advanced analytics and simulations enable real-time monitoring, incident prediction, automated emergency procedures, and stakeholder coordination. Overall, the digital twin improves physical security through automation, adaptability, and comprehensive data sharing. The paper also analyzes the pros and cons of implementation of this technology through an Emerging Technology Analysis Canvas that analyzes different aspects of this technology through both narrow and wide lenses to help decision makers in their decision of implementing this technology. On a broader scale, this showcases the value of digital twins in transforming legacy systems across sectors and how data sharing can create a safer world for both retail store customers and owners.

Keywords: digital twin, retail store safety, digital twin in retail, digital twin for physical safety

Procedia PDF Downloads 72
3568 Land Use Changes and Impact around Maladumba Lake and Forest Reserve, Nigeria

Authors: M. B. Abdullahi, S. M. Gumel

Abstract:

This study was carried out to analyze and describe biodiversity changes in representative communities around Maladumba Lake and Forest Reserve (MLFR), Bauchi, Nigeria. Primary and secondary data were collected through formal and informal interviews of key informants and survey of local communities and government records. There has been a change in biodiversity; some of the cropping systems have become nonexistent whereas others have developed. The main aspect of the changes has been the decline of species diversity due to degradation and over utilization. The changes have also been positive through the introduction and intensification of cropping system. Options have been open for people to manipulate the cropping systems in order to efficiently use the limited resources. Farmers have opted not only to intensify agricultural practices but also to deliberately restore some of the lost species. Reduction in the number of animals per household, adoption of new techniques of land management, changes in the type of crops cultivated and intensive use of the available resources are some of the indicators describing farmers’ efforts to cope with the changes. Sustainability of the farming system and biodiversity has been enhanced through peoples’ efforts that include planting trees and use of fertilizers.

Keywords: cropping systems, historical trends, household, land management, sustainability

Procedia PDF Downloads 395
3567 The Effects of Green Logistics Management Practices on Sustainability Performance in Nigeria

Authors: Ozoemelam Ikechukwu Lazarus, Nizamuddin B. Zainuddi, Abdul Kafi

Abstract:

Numerous studies have been carried out on Green Logistics Management Practices (GLMPs) across the globe. The study on the practices and performance of green chain practices in Africa in particular has not gained enough scholarly attention. Again, the majority of supply chain sustainability research being conducted focus on environmental sustainability. Logistics has been a major cause of supply chain resource waste and environmental damage. Many sectors of the economy that engage in logistical operations significantly rely on vehicles, which emit pollutants into the environment. Due to urbanization and industrialization, the logistical operations of manufacturing companies represent a serious hazard to the society and human life, making the sector one of the fastest expanding in the world today. Logistics companies are faced with numerous difficulties when attempting to implement logistics practices along their supply chains. In Nigeria, manufacturing companies aspire to implement reverse logistics in response to stakeholders’ requirements to reduce negative environmental consequences. However, implementing this is impeded by a criteria framework, and necessitates the careful analysis of how such criteria interact with each other in the presence of uncertainty. This study integrates most of the green logistics management practices (GLMPs) into the Nigerian firms to improve generalizability, and credibility. It examines the effect of Green Logistics Management Practices on environmental performance, social performance, market performance, and financial performance in the logistics industries. It seeks to identify the critical success factors in order to develop a model that incorporates different factors from the perspectives of the technology, organization, human and environment to inform the adoption and use of technologies for logistics supply chain social sustainability in Nigeria. It uses exploratory research approach to collect and analyse the data.

Keywords: logistics, management, sustainability, environment, operations

Procedia PDF Downloads 82
3566 Inadequate Requirements Engineering Process: A Key Factor for Poor Software Development in Developing Nations: A Case Study

Authors: K. Adu Michael, K. Alese Boniface

Abstract:

Developing a reliable and sustainable software products is today a big challenge among up–coming software developers in Nigeria. The inability to develop a comprehensive problem statement needed to execute proper requirements engineering process is missing. The need to describe the ‘what’ of a system in one document, written in a natural language is a major step in the overall process of Software Engineering. Requirements Engineering is a process use to discover, analyze and validate system requirements. This process is needed in reducing software errors at the early stage of the development of software. The importance of each of the steps in Requirements Engineering is clearly explained in the context of using detailed problem statement from client/customer to get an overview of an existing system along with expectations from the new system. This paper elicits inadequate Requirements Engineering principle as the major cause of poor software development in developing nations using a case study of final year computer science students of a tertiary-education institution in Nigeria.

Keywords: client/customer, problem statement, requirements engineering, software developers

Procedia PDF Downloads 407
3565 Understanding Human Trafficking in Benin City: Implications for Social Work Intervention

Authors: Tracy B. E. Omorogiuwa

Abstract:

Human trafficking also known as modern-day slavery can be seen as an effort by some privileged and criminally minded persons to take advantage of vulnerable individuals for their economic gains. Some factors; poverty, unemployment, poor educational opportunities, ignorance and traditional attitudes are attributed as causes and psychological, sexual, moral and health problems as impacts of human trafficking. This study examines the phenomenon of human trafficking in Benin City, one of the cities in Nigeria, situated as a source of trafficked persons for exploitation in Europe and African countries. Even though the Nigerian government and Non-governmental organizations have made considerable efforts in the past to reduce the incidence of human trafficking, the result has been an adjustment in the personality of the trafficked persons rather than professional measures to combat the issue. Hence, the study adopts the focused group discussions as a method for data collection; to sort the opinions of community members towards the understanding of the phenomenon. In addition, this paper provides social work implications to address the issue of human trafficking in the Benin City, Nigeria.

Keywords: human trafficking, trafficking in persons, modern-day slavery, social work implication

Procedia PDF Downloads 184
3564 Lightweight and Seamless Distributed Scheme for the Smart Home

Authors: Muhammad Mehran Arshad Khan, Chengliang Wang, Zou Minhui, Danyal Badar Soomro

Abstract:

Security of the smart home in terms of behavior activity pattern recognition is a totally dissimilar and unique issue as compared to the security issues of other scenarios. Sensor devices (low capacity and high capacity) interact and negotiate each other by detecting the daily behavior activity of individuals to execute common tasks. Once a device (e.g., surveillance camera, smart phone and light detection sensor etc.) is compromised, an adversary can then get access to a specific device and can damage daily behavior activity by altering the data and commands. In this scenario, a group of common instruction processes may get involved to generate deadlock. Therefore, an effective suitable security solution is required for smart home architecture. This paper proposes seamless distributed Scheme which fortifies low computational wireless devices for secure communication. Proposed scheme is based on lightweight key-session process to upheld cryptic-link for trajectory by recognizing of individual’s behavior activities pattern. Every device and service provider unit (low capacity sensors (LCS) and high capacity sensors (HCS)) uses an authentication token and originates a secure trajectory connection in network. Analysis of experiments is revealed that proposed scheme strengthens the devices against device seizure attack by recognizing daily behavior activities, minimum utilization memory space of LCS and avoids network from deadlock. Additionally, the results of a comparison with other schemes indicate that scheme manages efficiency in term of computation and communication.

Keywords: authentication, key-session, security, wireless sensors

Procedia PDF Downloads 318
3563 Nuclear Terrorism Decision Making: A Comparative Study of South Asian Nuclear Weapons States

Authors: Muhammad Jawad Hashmi

Abstract:

The idea of nuclear terrorism is as old as nuclear weapons but the global concerns of likelihood of nuclear terrorism are uncertain. Post 9/11 trends manifest that terrorists are believers of massive causalities. Innovation in terrorist’s tactics, sophisticated weaponry, vulnerability, theft and smuggling of nuclear/radiological material, connections between terrorists, black market and rough regimes are signaling seriousness of upcoming challenges as well as global trends of “terror-transnationalism.” Furthermore, the International-Atomic-Energy-Agency’s database recorded 2734 incidents regarding misuse, unauthorized possession, trafficking of nuclear material etc. Since, this data also includes incidents from south Asia, so, there is every possibility to claim that such illicit activities may increase in future, mainly due to expansion of nuclear industry in South Asia. Moreover, due to such mishaps the region is vulnerable to threats of nuclear terrorism. This is also a reason that the region is in limelight along with issues such as rapidly growing nuclear arsenals, nuclear safety and security, terrorism and political instability. With this backdrop, this study is aimed to investigate the prevailing threats and challenges in South Asia vis a vis nuclear safety and security. A comparative analysis of the overall capabilities would be done to identify the areas of cooperation to eliminate the probability of nuclear/radiological terrorism in the region.

Keywords: nuclear terrorism, safety, security, South Asia, india, Pakistan

Procedia PDF Downloads 356
3562 Arabic Quran Search Tool Based on Ontology

Authors: Mohammad Alqahtani, Eric Atwell

Abstract:

This paper reviews and classifies most of the important types of search techniques that have been applied on the holy Quran. Then, it addresses the limitations in these techniques. Additionally, this paper surveys most existing Quranic ontologies and what are their deficiencies. Finally, it explains a new search tool called: A semantic search tool for Al Quran based on Qur’anic ontologies. This tool will overcome all limitations in the existing Quranic search applications.

Keywords: holy Quran, natural language processing (NLP), semantic search, information retrieval (IR), ontology

Procedia PDF Downloads 572
3561 Aflatoxin Contamination of Abattoir Wastes in Ogun State, Nigeria

Authors: A. F. Gbadebo, O. O. Atanda, M. C. Adetunji

Abstract:

The study investigated the level of aflatoxin contamination of abattoir wastes in Ogun State, Nigeria, due to continued complaints of poor hygiene of abattoir centers in the states as a result of improper disposal of abattoir wastes. Wastes from the three senatorial districts of the state were evaluated for their levels of aflatoxin contamination. The moisture content, total plate count, fungal counts, percentage frequency of fungal occurrence as well as the level of aflatoxin contamination of the abattoir wastes were determined by standard methods. The moisture content of the wastes ranged between 79.10-87.46 %, total plate count from 1.37-3.27×10³cfu/ml, and fungal counts from 2.73-3.30×10²cfu/ml. Four fungal species: Aspergillus niger, Aspergillus flavus, Aspergillus ochraceus, and Penicillium citrinum were isolated from the wastes, with Aspergillus flavus having the highest percentage frequency of occurrence of 29.76%. The aflatoxin content of the samples was found to range between 3.20-4.80 µg/kg. These findings showed that abattoir wastes from Ogun State are contaminated with aflatoxins and pose a health risk to humans and animals.

Keywords: abattoir wastes, aflatoxin, microbial load, Ogun state

Procedia PDF Downloads 137
3560 4P-Model of Information Terrorism

Authors: Nataliya Venelinova

Abstract:

The paper proposes a new interdisciplinary model of reconsidering the role of mass communication effects by coverage of terrorism. The idea of 4P model is based on the synergy, created by the information strategy of threat, predominantly used by terrorist groups, the effects of mediating the symbolic action of the terrorist attacks or the taking of responsibility of any attacks, and the reshaped public perception for security after the attacks being mass communicated. The paper defines the mass communication cycle of terrorism, which leads not only to re-agenda setting of the societies, but also spirally amplifying the effect of propagating fears by over-informing on terrorism attacks. This finally results in the outlining of the so called 4P-model of information terrorism: mass propaganda, panic, paranoia and pandemic.

Keywords: information terrorism, mass communication cycle, public perception, security

Procedia PDF Downloads 173
3559 To Design a Full Stack Online Educational Website Using HTML, CSS and Java Script

Authors: Yash Goyal, Manish Korde, Juned Siddiqui

Abstract:

Today online education has gained more popularity so that people can easily complete their curriculum on their own time. Virtual learning has been widely used by many educators, especially in higher education institutions due to its benefits to students and faculty. A good knowledge of teaching theory and instructional design systems is required to experience meaningful learning. However, most educational websites are not designed to adapt to all screen sizes. Making the website accessible on all screen sizes is our main objective, so we have created a website that is readily accessible across all screen sizes and accepts all types of payment methods. And we see generally educational websites interface is simple and unexciting. So, we have made a user interface attractive and user friendly. It is not enough for a website to be user-friendly, but also to be familiar to admins and to reduce the workload of the admin as well. We visited so many popular websites under development that they all had issues like responsiveness, simple interface, security measures, payment methods, etc. To overcome this limitation, we have created a website which has taken care of security issues that is why we have created only one admin id and it can be control from that only. And if the user has successfully done the payment, then the admin can send him a username and password through mail individually so there will no fraud in the payment of the course.

Keywords: responsive, accessible, attractive, interface, objective, security.

Procedia PDF Downloads 102