Search results for: Arabic Fodio Nigeria security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5369

Search results for: Arabic Fodio Nigeria security

5129 Mining in Nigeria and Development Effort of Metallurgical Technologies at National Metallurgical Development Center Jos, Plateau State-Nigeria

Authors: Linus O. Asuquo

Abstract:

Mining in Nigeria and development effort of metallurgical technologies at National Metallurgical Development Centre Jos has been addressed in this paper. The paper has looked at the history of mining in Nigeria, the impact of mining on social and industrial development, and the contribution of the mining sector to Nigeria’s Gross Domestic Product (GDP). The paper clearly stated that Nigeria’s mining sector only contributes 0.5% to the nation’s GDP unlike Botswana that the mining sector contributes 38% to the nation’s GDP. Nigeria Bureau of Statistics has it on record that Nigeria has about 44 solid minerals awaiting to be exploited. Clearly highlighted by this paper is the abundant potentials that exist in the mining sector for investment. The paper made an exposition on the extensive efforts made at National Metallurgical Development Center (NMDC) to develop metallurgical technologies in various areas of the metals sector; like mineral processing, foundry development, nonferrous metals extraction, materials testing, lime calcination, ANO (Trade name for powder lubricant) wire drawing lubricant, refractories and many others. The paper went ahead to draw a conclusion that there is a need to develop the mining sector in Nigeria and to give a sustainable support to the efforts currently made at NMDC to develop metallurgical technologies which are capable of transforming the metals sector in Nigeria, which will lead to industrialization. Finally the paper made some recommendations which traverse the topic for the best expectation.

Keywords: mining, minerals, technologies, value addition

Procedia PDF Downloads 102
5128 Developing a Systems Dynamics Model for Security Management

Authors: Kuan-Chou Chen

Abstract:

This paper will demonstrate a simulation model of an information security system by using the systems dynamic approach. The relationships in the system model are designed to be simple and functional and do not necessarily represent any particular information security environments. The purpose of the paper aims to develop a generic system dynamic information security system model with implications on information security research. The interrelated and interdependent relationships of five primary sectors in the system dynamic model will be presented in this paper. The integrated information security systems model will include (1) information security characteristics, (2) users, (3) technology, (4) business functions, and (5) policy and management. Environments, attacks, government and social culture will be defined as the external sector. The interactions within each of these sectors will be depicted by system loop map as well. The proposed system dynamic model will not only provide a conceptual framework for information security analysts and designers but also allow information security managers to remove the incongruity between the management of risk incidents and the management of knowledge and further support information security managers and decision makers the foundation for managerial actions and policy decisions.

Keywords: system thinking, information security systems, security management, simulation

Procedia PDF Downloads 429
5127 Urban Form of the Traditional Arabic City in the Light of Islamic Values

Authors: Akeel Noori Al-Mulla Hwaish

Abstract:

The environmental impact, economics, social and cultural factors, and the processes by which people define history and meaning had influenced the dynamic shape and character of the traditional Islamic Arabic city. Therefore, in regard to the period when Islam was at its peak (7th- 13th Centuries), Islamic city wasn’t the highly dynamited at the scale of buildings and city planning that demonstrates a distinguished city as an ‘Islamic’ as appeared after centuries when the function of the buildings and their particular arrangement and planning scheme in relation to one another that defined an Islamic city character. The architectural features of the urban fabric of the traditional Arabic Islamic city are a ‎reflection of the spiritual, social, and cultural characteristics of the people. It is a ‎combination of Islamic values ‘Din’ and life needs ‘Dunia’ as Prophet Muhammad built the first Mosque in ‎Madinah in the 1st year of his migration to it, then the Suq or market on 2nd of Hijrah, attached to ‎the mosque to signify the birth of a new Muslims community which considers both, ‎‎’Din’ and ‘Dunia’ and initiated nucleus for what which called after that as an ‘Islamic’ city. This research will discuss the main characteristics and components of the traditional Arab cities and demonstrate the impact of the Islamic values on shaping the planning layout and general built environment features of the early traditional Arab cities.

Keywords: urban, Islamic, Arabic, city

Procedia PDF Downloads 199
5126 Enterprise Security Architecture: Approaches and a Framework

Authors: Amir Mohtarami, Hadi Kandjani

Abstract:

The amount of business-critical information in enterprises is growing at an extraordinary rate, and the ability to catalog that information and properly protect it using traditional security mechanisms is not keeping pace. Alongside the Information Technology (IT), information security needs a holistic view in enterprise. In other words, a comprehensive architectural approach is required, focusing on the information itself, understanding what the data are, who owns it, and which business and regulatory policies should be applied to the information. Enterprise Architecture Frameworks provide useful tools to grasp different dimensions of IT in organizations. Usually this is done by the layered views on IT architecture, but not requisite security attention has been held in this frameworks. In this paper, after a brief look at the Enterprise Architecture (EA), we discuss the issue of security in the overall enterprise IT architecture. Due to the increasing importance of security, a rigorous EA program in an enterprise should be able to consider security architecture as an integral part of its processes and gives a visible roadmap and blueprint for this aim.

Keywords: enterprise architecture, architecture framework, security architecture, information systems

Procedia PDF Downloads 704
5125 The Theology of a Muslim Artist: Tawfiq al-Hakim

Authors: Abdul Rahman Chamseddine

Abstract:

Tawfiq al-Hakim remains one of the most prominent playwrights in his native in Egypt, and in the broader Arab world. His works, at the time of their release, drew international attention and acclaim. His first 1933 masterpiece Ahl al-Kahf (The People of the Cave) especially, garnered fame and recognition in both Europe and the Arab world. Borrowing its title from the Qur’anic Sura, al-Hakim’s play relays the untold story of the life of those 'three saints' after they wake up from their prolonged sleep. The playwright’s selection of topics upon which to base his works displays a deep appreciation of Arabic and Islamic heritage. Al-Hakim was clearly influenced by Islam, to such a degree that he wrote the biography of the Prophet Muhammad in 1936 very early in his career. Knowing that Al-Hakim was preceded by many poets and creative writers in writing the Prophet Muhammad’s biography. Notably like Al-Barudi, Ahmad Shawqi, Haykal, Al-‘Aqqad, and Taha Husayn who have had their own ways in expressing their views of the Prophet Muhammad. The attempt to understand the concern of all those renaissance men and others in the person of the Prophet would be indispensable in this study. This project will examine the reasons behind al-Hakim’s choice to draw upon these particular texts, embedded as they are in the context of Arabic and Islamic heritage, and how the use of traditional texts serves his contemporary goals. The project will also analyze the image of Islam in al-Hakim’s imagination. Elsewhere, he envisions letters or conversations between God and himself, which offers a window into understanding the powerful impact of the Divine on Tawfiq al-Hakim, one that informs his literature and merits further scholarly attention. His works occupying a major rank in Arabic literature, does not reveal Al-Hakim solely but the unquestioned assumptions operative in the life of his community, its mental make-up and its attitudes. Furthermore, studying the reception of works that touch on sensitive issues, like writing a letter to God, in Al-Hakim’s historical context would be of a great significance in the process of comprehending the mentality of the Muslim community at that time.

Keywords: Arabic language, Arabic literature, Arabic theology, modern Arabic literature

Procedia PDF Downloads 365
5124 Illicit Arms and the Emergence of Armed Groups in Nigeria

Authors: Halilu Babaji, Adamu Buba

Abstract:

Illicit arms and the emergence of armed groups have witnessed unprecedented situations of political uncertainties in Nigeria, and the twenty-first century globalisation has established the process that has benefited a good number of militia groups and thereby boosting both illicit arms movement and the thriving of terrorist groups, which are largely responsible for the longstanding threat to the national security and stability of the country. This has unleashed unforeseen consequences on the entire Sub-region, following an inflow of weapons and armed fighter which are motivated by weak governance, insecurity and poverty. The social, economic and political environments make it a fertile breeding ground for the penetration and development of terrorist groups in Sub-Saharan Africa.

Keywords: arms, emergence, insecurity, groups

Procedia PDF Downloads 263
5123 Security as Human Value: Issue of Human Rights in Indian Sub-Continental Operations

Authors: Pratyush Vatsala, Sanjay Ahuja

Abstract:

The national security and human rights are related terms as there is nothing like absolute security or absolute human right. If we are committed to security, human right is a problem and also a solution, and if we deliberate on human rights, security is a problem but also part of the solution. Ultimately, we have to maintain a balance between the two co-related terms. As more and more armed forces are being deployed by the government within the nation for maintaining peace and security, using force against its own citizen, the search for a judicious balance between intent and action needs to be emphasized. Notwithstanding that a nation state needs complete political independence; the search for security is a driving force behind unquestioned sovereignty. If security is a human value, it overlaps the value of freedom, order, and solidarity. Now, the question needs to be explored, to what extent human rights can be compromised in the name of security in Kashmir or Mizoram like places. The present study aims to explore the issue of maintaining a balance between the use of power and good governance as human rights, providing security as a human value. This paper has been prepared with an aim of strengthening the understanding of the complex and multifaceted relationship between human rights and security forces operating for conflict management and identifies some of the critical human rights issues raised in the context of security forces operations highlighting the relevant human rights principles and standards in which Security as human value be respected at all times and in particular in the context of security forces operations in India.

Keywords: Kashmir, Mizoram, security, value, human right

Procedia PDF Downloads 279
5122 ARABEX: Automated Dotted Arabic Expiration Date Extraction using Optimized Convolutional Autoencoder and Custom Convolutional Recurrent Neural Network

Authors: Hozaifa Zaki, Ghada Soliman

Abstract:

In this paper, we introduced an approach for Automated Dotted Arabic Expiration Date Extraction using Optimized Convolutional Autoencoder (ARABEX) with bidirectional LSTM. This approach is used for translating the Arabic dot-matrix expiration dates into their corresponding filled-in dates. A custom lightweight Convolutional Recurrent Neural Network (CRNN) model is then employed to extract the expiration dates. Due to the lack of available dataset images for the Arabic dot-matrix expiration date, we generated synthetic images by creating an Arabic dot-matrix True Type Font (TTF) matrix to address this limitation. Our model was trained on a realistic synthetic dataset of 3287 images, covering the period from 2019 to 2027, represented in the format of yyyy/mm/dd. We then trained our custom CRNN model using the generated synthetic images to assess the performance of our model (ARABEX) by extracting expiration dates from the translated images. Our proposed approach achieved an accuracy of 99.4% on the test dataset of 658 images, while also achieving a Structural Similarity Index (SSIM) of 0.46 for image translation on our dataset. The ARABEX approach demonstrates its ability to be applied to various downstream learning tasks, including image translation and reconstruction. Moreover, this pipeline (ARABEX+CRNN) can be seamlessly integrated into automated sorting systems to extract expiry dates and sort products accordingly during the manufacturing stage. By eliminating the need for manual entry of expiration dates, which can be time-consuming and inefficient for merchants, our approach offers significant results in terms of efficiency and accuracy for Arabic dot-matrix expiration date recognition.

Keywords: computer vision, deep learning, image processing, character recognition

Procedia PDF Downloads 82
5121 Explicitation as a Non-Professional Translation Universal: Evidence from the Translation of Promotional Material

Authors: Julieta Alos

Abstract:

Following the explicitation hypothesis, it has been proposed that explicitation is a translation universal, i.e., one of those features that characterize translated texts, and cannot be traced back to interference from a particular language. The explicitation hypothesis has been enthusiastically endorsed by some scholars, and firmly rejected by others. Focusing on the translation of promotional material from English into Arabic, specifically in the luxury goods market, the aims of this study are twofold: First, to contribute to the debate regarding the notion of explicitation in order to advance our understanding of what has become a contentious concept. Second, to add to the growing body of literature on non-professional translation by shedding light on this particular aspect of it. To this end, our study uses a combination of qualitative and quantitative methods to explore a corpus of brochures pertaining to the luxury industry, translated into Arabic at the local marketing agencies promoting the brands in question, by bilingual employees who have no translation training. Our data reveals a preference to avoid creative language choices in favor of more direct advertising messages, suggestive of a general tendency towards explicitation in non-professional translation, beyond what is dictated by the grammatical and stylistic constraints of Arabic. We argue, further, that this translation approach is at odds with the principles of luxury advertising, which emphasize implicitness and ambiguity, and view language as an extension of the creative process involved in the production of the luxury item.

Keywords: English-Arabic translation, explicitation, non-professional translation, promotional texts

Procedia PDF Downloads 375
5120 A Model for Teaching Arabic Grammar in Light of the Common European Framework of Reference for Languages

Authors: Erfan Abdeldaim Mohamed Ahmed Abdalla

Abstract:

The complexity of Arabic grammar poses challenges for learners, particularly in relation to its arrangement, classification, abundance, and bifurcation. The challenge at hand is a result of the contextual factors that gave rise to the grammatical rules in question, as well as the pedagogical approach employed at the time, which was tailored to the needs of learners during that particular historical period. Consequently, modern-day students encounter this same obstacle. This requires a thorough examination of the arrangement and categorization of Arabic grammatical rules based on particular criteria, as well as an assessment of their objectives. Additionally, it is necessary to identify the prevalent and renowned grammatical rules, as well as those that are infrequently encountered, obscure and disregarded. This paper presents a compilation of grammatical rules that require arrangement and categorization in accordance with the standards outlined in the Common European Framework of Reference for Languages (CEFR). In addition to facilitating comprehension of the curriculum, accommodating learners' requirements, and establishing the fundamental competencies for achieving proficiency in Arabic, it is imperative to ascertain the conventions that language learners necessitate in alignment with explicitly delineated benchmarks such as the CEFR criteria. The aim of this study is to reduce the quantity of grammatical rules that are typically presented to non-native Arabic speakers in Arabic textbooks. This reduction is expected to enhance the motivation of learners to continue their Arabic language acquisition and to approach the level of proficiency of native speakers. The primary obstacle faced by learners is the intricate nature of Arabic grammar, which poses a significant challenge in the realm of study. The proliferation and complexity of regulations evident in Arabic language textbooks designed for individuals who are not native speakers is noteworthy. The inadequate organisation and delivery of the material create the impression that the grammar is being imparted to a student with the intention of memorising "Alfiyyat-Ibn-Malik." Consequently, the sequence of grammatical rules instruction was altered, with rules originally intended for later instruction being presented first and those intended for earlier instruction being presented subsequently. Students often focus on learning grammatical rules that are not necessarily required while neglecting the rules that are commonly used in everyday speech and writing. Non-Arab students are taught Arabic grammar chapters that are infrequently utilised in Arabic literature and may be a topic of debate among grammarians. The aforementioned findings are derived from the statistical analysis and investigations conducted by the researcher, which will be disclosed in due course of the research. To instruct non-Arabic speakers on grammatical rules, it is imperative to discern the most prevalent grammatical frameworks in grammar manuals and linguistic literature (study sample). The present proposal suggests the allocation of grammatical structures across linguistic levels, taking into account the guidelines of the CEFR, as well as the grammatical structures that are necessary for non-Arabic-speaking learners to generate a modern, cohesive, and comprehensible language.

Keywords: grammar, Arabic, functional, framework, problems, standards, statistical, popularity, analysis

Procedia PDF Downloads 91
5119 The Research of Weights Identify of Harbin Ecological Security Evaluation Index Based on AHP

Authors: Rong Guo, Mengshi Huang, Yujing Bai

Abstract:

With the rapid development of urbanization, the urban population increases and urban sprawl appeared. And these issues led to a sharp deterioration of the ecological environment. So, the urban ecological security evaluation was imminent. The weights identify of index was a key step of the research of ecological security evaluation. The AHP was widely used in the extensive research of weights identify of ecological security index. The characteristics of authority and quantitative can fully reflect the views of relevant experts. On the basis of building the ecological security evaluation index of Harbin, the paper combed and used the basic principle of the AHP, and calculated the weights of Harbin ecological security evaluation index through the process of the expert opinions “summary-feedback-summary”. And lay a foundation of future study of Harbin ecological security index, and guide the quantitative evaluation of Harbin ecological security.

Keywords: AHP, ecological security, evaluation Index, weights identify, harbin

Procedia PDF Downloads 497
5118 Validation of the Arabic Version of the InterSePT Scale for Suicidal Thinking (ISST) among the Arab Population in Qatar

Authors: S. Hammoudeh, S. Ghuloum, A. Abdelhakam, A. AlMujalli, M. Opler, Y. Hani, A. Yehya, S. Mari, R. Elsherbiny, Z. Mahfoud, H. Al-Amin

Abstract:

Introduction: Suicidal ideation and attempts are very common in patients with schizophrenia and still contributes to the high mortality in this population. The InterSePT Scale for Suicidal Thinking (ISST) is a validated tool used to assess suicidal ideation in patients with schizophrenia. This research aims to validate the Arabic version of the ISST among the Arabs residing in Qatar. Methods: Patients diagnosed with schizophrenia were recruited from the department of Psychiatry, Rumailah Hospital, Doha, Qatar. Healthy controls were recruited from the primary health care centers in Doha, Qatar. The validation procedures including professional and expert translation, pilot survey and back translation of the ISST were implemented. Diagnosis of schizophrenia was confirmed using the validated Arabic version of Mini International Neuropsychiatric Interview (MINI 6, module K) for schizophrenia. The gold standard was the module B on suicidality from MINI 6 also. This module was administered by a rater who was blinded to the results of ISST. Results: Our sample (n=199) was composed of 98 patients diagnosed with schizophrenia (age 36.03 ± 9.88 years; M/F is 2/1) and 101 healthy participants (age 35.01 ± 8.23 years; M/F is 1/2). Among patients with schizophrenia: 26.5% were married, 17.3% had a college degree, 28.6% were employed, 9% had committed suicide once, and 4.4% had more than 4 suicide attempts. Among the control group: 77.2% were married, 57.4% had a college degree, and 99% were employed. The mean score on the ISST was 2.36 ± 3.97 vs. 0.47 ± 1.44 for the schizophrenia and control groups, respectively. The overall Cronbach’s alpha was 0.91. Conclusions: This is the first study in the Arab world to validate the ISST in an Arabic-based population. The psychometric properties indicate that the Arabic version of the ISST is a valid tool to assess the severity of suicidal ideation in Arabic speaking patients diagnosed with schizophrenia.

Keywords: mental health, Qatar, schizophrenia, suicide

Procedia PDF Downloads 562
5117 Executive Order as an Effective Tool in Combating Insecurities and Human Rights Violations: The Case of the Special Anti-Robbery Squad and Youths in Nigeria

Authors: Cita Ayeni

Abstract:

Following countless violations of Human Rights in Nigeria by the various arms and agencies of government; from the Military to the Federal Police and other law enforcement agencies, Nigeria has been riddled with several reports of acts by these agencies against the citizens, ranging from illegal arrest and imprisonment, torture, disappearing, and extrajudicial killings, just to mention a few. This paper, focuses on SARS (Special Anti-Robbery Squad), a division of the Nigeria Police Force, and its reported threats to the people’s security, particularly the Nigerian youths, with continuous violence, extortion, illegal arrest and imprisonment, terror, and extrajudicial activities resulting in maiming and in most cases death, thus infringing on the human rights of the people it’s sworn to protect. This research further analyses how the activities of SARS has over the years instigated fear on the average Nigerian youth, preventing the free participation in daily life, education, job, and individual development, in turn impeding the realization of their full potentials for growth and participation in collective national development. This research analyzes the executive order by the then Acting President (Vice-President) of Nigeria, directing the overhauling of SARS, and its implementation by the Federal Police Force in determining if it’s enough to prevent or put a stop to the continuous Human Rights abuse and threat to the security of the individual citizen. Concluding that although the order by the Acting President was given with an intent to halt the various violations by SARS, and the Inspector General of Police’s (IGP) subsequent action by releasing a statement following the order, the bureaucracy in Nigeria, with a history of incompetency and a return to 'business as usual' after a reduced public outcry, it’s most likely that there will not be adequate follow up put in place and these violations would be slowly 'swept under the rug' with SARS officials not held accountable. It is recommended therefore that the Federal Government through the NPF, following the reforms made, in collaboration with the mentioned Independent Human Rights and civil societies organizations should periodically produce unbiased and publicly accessible reports on the implementation of these reforms and progress made. This will go a long way in assuring the public of actual fulfillment of the restructuring, reduce fear by the youths and restore some public faith in the government.

Keywords: special anti-robbery squad, youths in Nigeria, overhaul, insecurities, human rights violations

Procedia PDF Downloads 302
5116 Gum Arabic-Coated Magnetic Nanoparticles for Methylene Blue Removal

Authors: Eman Alzahrani

Abstract:

Magnetic nanoparticles (MNPs) were fabricated using the chemical co-precipitation method followed by coating the surface of magnetic Fe3O4 nanoparticles with gum arabic (GA). The fabricated magnetic nanoparticles were characterised using transmission electron microscopy (TEM) which showed that the Fe3O4 nanoparticles and GA-MNPs nanoparticles had a mean diameter of 33 nm, and 38 nm, respectively. Scanning electron microscopy (SEM) images showed that the MNPs modified with GA had homogeneous structure and agglomerated. The energy dispersive X-ray spectroscopy (EDAX) spectrum showed strong peaks of Fe and O. X-ray diffraction patterns (XRD) indicated that the naked magnetic nanoparticles were pure Fe3O4 with a spinel structure and the covering of GA did not result in a phase change. The covering of GA on the magnetic nanoparticles was also studied by BET analysis, and Fourier transform infrared spectroscopy. Moreover, the present study reports a fast and simple method for removal and recovery of methylene blue dye (MB) from aqueous solutions by using the synthesised magnetic nanoparticles modified with gum arabic as adsorbent. The experimental results show that the adsorption process attains equilibrium within five minutes. The data fit the Langmuir isotherm equation and the maximum adsorption capacities were 8.77 mg mg-1 and 14.3 mg mg-1 for MNPs and GA-MNPs, respectively. The results indicated that the homemade magnetic nanoparticles were quite efficient for removing MB and will be a promising adsorbent for the removal of harmful dyes from waste-water.

Keywords: Fe3O4 magnetic nanoparticles, gum arabic, co-precipitation, adsorption dye, methylene blue, adsorption isotherm

Procedia PDF Downloads 431
5115 Anti-Language in Jordanian Spoken Arabic: A Sociolinguistic Perspective

Authors: Ahmad Mohammad Al-Harahsheh

Abstract:

Anti-language reflects anti-society; it is a restricted spoken code used among a group of interlocutors because of anti-society. This study aims to shed light on the sociolinguistic characteristics of anti-language used by prisoners in Jordan. The participants included were 15 male-Jordanian prisoners who have recently been released. The data were written, transliterated, and analyzed on the basis of sociolinguistics and discourse analysis. This study draws on sociolinguistic theory of language codes as the theoretical framework. The study concludes that anti-language is a male language and is used for secrecy, as the prisoners' tendency to protect themselves from the police; it is a verbal competition, contest and display. In addition, it is employed to express obnoxious ideas and acts by using more pleasant or blurred words and expressions. Also, the anti-language used by prisoners has six linguistic characteristics in JSA (Jordanian Spoken Arabic), such as relexicalization, neologism, rhyme formation, semantic change, derivation, and metaphorical expressions.

Keywords: anti-language, Jordanian Spoken Arabic, sociolinguistics, prisoners

Procedia PDF Downloads 366
5114 Economic Environment and Entrepreneurial Development in Lagos and Ogun States, Nigeria

Authors: Jayeola Olabisi, T. Olawale Oladunjoye, Ademola A. Adewumi

Abstract:

The study empirically examines the relationship that exists between the economic environment and entrepreneurial development in Nigeria. A structured questionnaire is administered on the study and data collected are analysed using Analysis of Variance and Regression. The following variables are indices of determination; Interest Rate (IR); Income Tax (IT). The results of the study show that there is a significant relationship between IR and ED in Nigeria (p < 0.5) with a positive correlation (r=0.526, r2=0.276). Also, there is a significant relationship between IT and ED in Nigeria (p < 0.05), with a positive association (r=0.546; r2=0.299). The study concludes that the emergence of the higher level of the stable economic environment is critical to entrepreneurial development in Nigeria. Therefore, government involvement in public private partnership for infrastructural development, enlargement of productive, judicious and transparent use of funds collected from income tax and affordable interest rate will galvanise the inward sourcing of raw materials that boost entrepreneurial development in Nigeria.

Keywords: interest rate, income tax, business environment and entrepreneurial development

Procedia PDF Downloads 361
5113 Impacts of Sociological Dynamics on Entomophagy Practice and Food Security in Nigeria

Authors: O. B. Oriolowo, O. J. John

Abstract:

Empirical findings have shown insects to be nutritious and good source of food for man. However, human food preferences are not only determined by nutritional values of food consumed but, more importantly, by sociology and economic pressure. This study examined the interrelation between science and sociology in sustaining the acceptance of entomophagy among college students to combat food insecurity. A twenty items five Likert scale, College Students Entomophagy Questionnaire (CSEQ), was used to elucidate information from the respondents. The reliability coefficient was obtained to be 0.91 using Spearman-Brown Prophecy formula. Three research questions and three hypotheses were raised. Also, quantitative nutritional analysis of few insects and some established conventional protein sources were undertaking in order to compare their nutritional status. The data collected were analyzed using descriptive statistics of percentages and inferential statistics of correlation and Analysis of Variance (ANOVA). The results obtained showed that entomophagy has cultural heritage among different tribes in Nigeria and is an acceptable practice; it cuts across every social stratum and is practiced among both major religions. Moreover, insects compared favourably in term of nutrient contents when compared with the conventional animal protein sources analyzed. However, there is a gradual decline in the practice of entomophagy among students, which may be attributed to the influence of western civilization. This study, therefore, recommended an intensification of research and enlightenment of people on the usefulness of entomophagy so as to preserve its cultural heritage as well as boost human food security.

Keywords: entomophagy, food security, malnutrition, poverty alleviation, sociology

Procedia PDF Downloads 120
5112 Placement of English Lexical Stress by Arabic-Speaking EFL Learners: How Computer-Generated Spectrographic Representations of Correct Pronunciations Can Provide a Visual Aid to Learners

Authors: Rami Al-Sadi

Abstract:

The assignment of lexical stress in English to its correct syllable is an enormous challenge to EFL learners, especially if their first language (L1) phonology is very different from English phonology. Arabic-speaking EFL learners not only stumble very frequently when it comes to placing the lexical stress in a given word, but they also seem to relegate the role of lexical stress as unimportant, mainly because in Arabic, unlike in English, lexical stress is not phonemic. This study aims at exploring the possible benefits of utilizing spectrographic representations of English words correctly pronounced, for the purpose of finding out how these spectrograms can provide a visual aid to the learners and help them rectify their stress placement errors as they see in real time spectrograms of the correct pronunciations juxtaposed on a computer screen with spectrograms of their own pronunciations for easy comparison. The study involved 120 students from the English Department at Prince Sattam bin Abdulaziz University in Saudi Arabia. 60 participants were taught the English lexical stress rules and also received spectrographic guidance on pronunciation; the other 60 received only verbal instruction on the stress rules and verbal feedback on their pronunciations. Statistical results showed that when the learners had the opportunity to ‘see’ their pronunciation mistakes, they were three times more likely to rectify their placement of lexical stress.

Keywords: Arabic-speaking EFL learners, lexical stress, pronunciation, spectrographic representation, stress placement

Procedia PDF Downloads 123
5111 Security Threats on Wireless Sensor Network Protocols

Authors: H. Gorine, M. Ramadan Elmezughi

Abstract:

In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.

Keywords: wireless sensor networks, network security, light weight encryption, threats

Procedia PDF Downloads 526
5110 Control and Control Systems of Administration in Nigeria

Authors: Inuwa Abdu Ibrahim

Abstract:

Public officials are required to posses certain values to adequately protect public interest, by being leaders that are servants of the people. The reality in Nigeria is that leaders rule as masters of the people rather than servants. The paper looked at control and control systems of administration in Nigeria, its resultant consequences and ways of achieving true control of administrators and administration. Secondary source of data was adopted for the research. It concludes that the keys to administrative efficiency and effectiveness through control are implementation of the already existing procedures and laws, as well as commitment on the part of public officials.

Keywords: Accountability, Fraud, Administration, Nigeria

Procedia PDF Downloads 367
5109 Embarrassment as a Trigger Factor of Code Switching From Arabic to English in Egypt: A Case Study in Sociolinguistic

Authors: Samar Mohamed Magdy Abdelrahim

Abstract:

This study is an attempt to investigate the phenomenon of code-switching that takes place between Arabic and English in social discourse among high, well-educated, and young people in Egypt. The study aims at digging deeper to extract the trigger factors of such occurrences, namely when people encounter embarrassing situations in their daily conversations. Nowadays, most young Egyptians tend to use English words in certain situations that might make them feel embarrassed. To disguise their feelings and soften the impact of these words in the context, they code-switch (CS) from Arabic into English. To obtain accurate results, the study utilized a quantitative analysis approach that combines personal observations and a questionnaire to examine the phenomenon appropriately. The questionnaire was designed to categorize different types of embarrassing topics to be evaluated by participants. These topics include certain parts of the human body, types of clothes, taboo words, and specific medical conditions. Many studies have examined the use of CS as a prestigious way of communicating and expressing solidarity between Arabic and English. Other studies have dealt with switches that take place in classrooms. However, not many studies have paid attention to this angle of CS, especially in Egypt. The results conclude that gender and the circumstances that surround the conversation are essential factors of CS since females tend to switch codes more than males in embarrassing situations. According to the study, CS serves the socio-pragmatic function in terms of helping young, well-educated bilinguals express themselves in a second language that would be distressing in the first.

Keywords: code-switching, embarrassment, Arabic, English

Procedia PDF Downloads 97
5108 Utilizing Entrepreneurship Education for National Development: Solving the Unemployment Problems in Nigeria

Authors: Kemi Olalekan Oduntan

Abstract:

This paper is of the view that entrepreneurship education (if well utilized) can solve the problems of unemployment and the clamor for paid employment in Nigeria. Nigeria educational system is bookish too more academically oriented thereby neglecting the entrepreneurial and vocational values to a greater extent. This paper examines the utilization of entrepreneurship education as a way out of the myriad of unemployment in Nigeria, with the need to refocus Nigeria educational system towards skills acquisition that prepares Nigerians for self-reliance, hence being an employer of labor, while sustainable development and economic diversification are also stressed. The paper further argues that entrepreneurship education will equip the students and Nigeria working class youth with the skills to be jobs creators and become an employer of labor which it will solve Nigeria’s problems such as poverty, overdependence on foreign goods, low economic growth and poor infrastructural development among others. We concludes and recommends that a new pedagogy that prepares students and working class youth with knowledge and practical skills to be entrepreneurial be instituted, promoted and made compulsory in all our tertiary institutions as a way of reducing the menace unemployment in Nigeria.

Keywords: entrepreneurship education, unemployment, national development, self-employment

Procedia PDF Downloads 420
5107 Predicting Mobile Payment System Adoption in Nigeria: An Empirical Analysis

Authors: Aminu Hamza

Abstract:

This study examines the factors that play vital role in the adoption of mobile payment system among consumers in Nigeria. Technology Acceptance Model (TAM) was used with two additional variables to form the conceptual model. The study was conducted in three Universities in Kano state, Nigeria. Convenience sampling method was used with a total valid 202 respondents which involved the students of Bayero University Kano (BUK), Northwest University, and Kano University of Science and Technology (KUST) Wudil, Kano, Nigeria. Results of the regression analysis revealed that Perceived ease of use (PEOU) and Perceived usefulness (PU) have significant and positive correlation with the behavioral intention to adopt mobile payment system. The findings of this study would be useful to the policy makers Central Bank of Nigeria (CBN), mobile network operators and providers of the services.

Keywords: mobile payment system, Nigeria, technology adoption, technology acceptance model

Procedia PDF Downloads 305
5106 Towards Security in Virtualization of SDN

Authors: Wanqing You, Kai Qian, Xi He, Ying Qian

Abstract:

In this paper, the potential security issues brought by the virtualization of a Software Defined Networks (SDN) would be analyzed. The virtualization of SDN is achieved by FlowVisor (FV). With FV, a physical network is divided into multiple isolated logical networks while the underlying resources are still shared by different slices (isolated logical networks). However, along with the benefits brought by network virtualization, it also presents some issues regarding security. By examining security issues existing in an OpenFlow network, which uses FlowVisor to slice it into multiple virtual networks, we hope we can get some significant results and also can get further discussions among the security of SDN virtualization.

Keywords: SDN, network, virtualization, security

Procedia PDF Downloads 428
5105 Pharyngealization Spread in Ibbi Dialect of Yemeni Arabic: An Acoustic Study

Authors: Fadhl Qutaish

Abstract:

This paper examines the pharyngealization spread in one of the Yemeni Arabic dialects, namely, Ibbi Arabic (IA). It investigates how pharyngealized sounds spread their acoustic features onto the neighboring vowels and change their default features. This feature has been investigated quietly well in MSA but still has to be deeply studied in the different dialect of Arabic which will bring about a clearer picture of the similarities and the differences among these dialects and help in mapping them based on the way this feature is utilized. Though the studies are numerous, no one of them has illustrated how far in the multi-syllabic word the spread can be and whether it takes a steady or gradient manner. This study tries to fill this gap and give a satisfactory explanation of the pharyngealization spread in Ibbi Dialect. This study is the first step towards a larger investigation of the different dialects of Yemeni Arabic in the future. The data recorded are represented in minimal pairs in which the trigger (pharyngealized or the non-pharyngealized sound) is in the initial or final position of monosyllabic and multisyllabic words. A group of 24 words were divided into four groups and repeated three times by three subjects which will yield 216 tokens that are tested and analyzed. The subjects are three male speakers aged between 28 and 31 with no history of neurological, speaking or hearing problems. All of them are bilingual speakers of Arabic and English and native speakers of Ibbi-Dialect. Recordings were done in a sound-proof room and praat software was used for the analysis and coding of the trajectories of F1 and F2 for the low vowel /a/ to see the effect of pharyngealization on the formant trajectory within the same syllable and in other syllables of the same word by comparing the F1 and F2 formants to the non-pharyngealized environment. The results show that pharyngealization spread is gradient (progressively and regressively). The spread is reflected in the gradual raising of F1 as we move closer towards the trigger and the gradual lowering of F2 as well. The results of the F1 mean values in tri-syllabic words when the trigger is word initially show that there is a raise of 37.9 HZ in the first syllable, 26.8HZ in the second syllable and 14.2HZ in the third syllable. F2 mean values undergo a lowering of 239 HZ in the first syllable, 211.7 HZ in the second syllable and 176.5 in the third syllable. This gradual decrease in the difference of F2 values in the non-pharyngealized and pharyngealized context illustrates that the spread is gradient. A similar result was found when the trigger is word-final which proves that the spread is gradient (progressively and regressively.

Keywords: pharyngealization, Yemeni Arabic, Ibbi dialect, pharyngealization spread

Procedia PDF Downloads 222
5104 A Systematic Literature Review on Security and Privacy Design Patterns

Authors: Ebtehal Aljedaani, Maha Aljohani

Abstract:

Privacy and security patterns are both important for developing software that protects users' data and privacy. Privacy patterns are designed to address common privacy problems, such as unauthorized data collection and disclosure. Security patterns are designed to protect software from attack and ensure reliability and trustworthiness. Using privacy and security patterns, software engineers can implement security and privacy by design principles, which means that security and privacy are considered throughout the software development process. These patterns are available to translate "security & privacy-by-design" into practical advice for software engineering. Previous research on privacy and security patterns has typically focused on one category of patterns at a time. This paper aims to bridge this gap by merging the two categories and identifying their similarities and differences. To do this, the authors conducted a systematic literature review of 25 research papers on privacy and security patterns. The papers were analysed based on the category of the pattern, the classification of the pattern, and the security requirements that the pattern addresses. This paper presents the results of a comprehensive review of privacy and security design patterns. The review is intended to help future IT designers understand the relationship between the two types of patterns and how to use them to design secure and privacy-preserving software. The paper provides a clear classification of privacy and security design patterns, along with examples of each type. The authors found that there is only one widely accepted classification of privacy design patterns, while there are several competing classifications of security design patterns. Three types of security design patterns were found to be the most commonly used.

Keywords: design patterns, security, privacy, classification of patterns, security patterns, privacy patterns

Procedia PDF Downloads 132
5103 Comparing Phonological Processes in Persian-Arabic Bilingual Children and Monolingual Children

Authors: Vafa Delphi, Maryam Delphi, Talieh Zarifian, Enayatolah Bakhshi

Abstract:

Background and Aim: Bilingualism is a common phenomenon in many countries of the world and May be consistent consonant errors in the speech of bilingual children. The aim of this study was to evaluate Phonological skills include occurrence proportion, frequency and type of phonological processes in Persian-Arabic speaking children in Ahvaz city, the center of Khuzestan. Method: This study is descriptive-analytical and cross-sectional. Twenty-eight children aged 36-48 months were divided into two groups Persian monolingual and Persian-Arabic bilingual: (14 participants in each group). Sampling was recruited randomly based on inclusion criteria from kindergartens of the Ahvaz city in Iran. The tool of this study was the Persian Phonological Test (PPT), a subtest of Persian Diagnostic Evaluation Articulation and Phonological test. In this test, Phonological processes were investigated in two groups: structure and substitution processes. Data was investigated using SPSS software and the U Mann-Whitney test. Results: The results showed that the proportion occurrence of substitution process was significantly different between two groups of monolingual and bilingual (P=0/001), But the type of phonological processes didn’t show a significant difference in both monolingual and bilingual children of the Persian-Arabic.The frequency of phonological processes is greater in bilingual children than monolingual children. Conclusion: The study showed that bilingualism has no effect on type of phonological processes, but this can be effective on the frequency of processes. Since the type of phonological processes in bilingual children is similar to monolingual children So we can conclude the Persian_arabic bilingual children's phonological system is similar to monolingual children.

Keywords: Persian-Arabic bilingual child, phonological processes, the proportion occurrence of syllable structure, the proportion occurrence of substitution

Procedia PDF Downloads 315
5102 A Holistic Approach to Institutional Cyber Security

Authors: Mehmet Kargaci

Abstract:

It is more important to access information than to get the correct information and to transform it to the knowledge in a proper way. Every person, organizations or governments who have the knowledge now become the target. Cyber security involves the range of measures to be taken from individual to the national level. The National institutions refer to academic, military and major public and private institutions, which are very important for the national security. Thus they need further cyber security measures. It appears that the traditional cyber security measures in the national level are alone not sufficient, while the individual measures remain in a restricted level. It is evaluated that the most appropriate method for preventing the cyber vulnerabilities rather than existing measures are to develop institutional measures. This study examines the cyber security measures to be taken, especially in the national institutions.

Keywords: cyber defence, information, critical infrastructure, security

Procedia PDF Downloads 537
5101 ALEF: An Enhanced Approach to Arabic-English Bilingual Translation

Authors: Abdul Muqsit Abbasi, Ibrahim Chhipa, Asad Anwer, Saad Farooq, Hassan Berry, Sonu Kumar, Sundar Ali, Muhammad Owais Mahmood, Areeb Ur Rehman, Bahram Baloch

Abstract:

Accurate translation between structurally diverse languages, such as Arabic and English, presents a critical challenge in natural language processing due to significant linguistic and cultural differences. This paper investigates the effectiveness of Facebook’s mBART model, fine-tuned specifically for sequence-tosequence (seq2seq) translation tasks between Arabic and English, and enhanced through advanced refinement techniques. Our approach leverages the Alef Dataset, a meticulously curated parallel corpus spanning various domains to capture the linguistic richness, nuances, and contextual accuracy essential for high-quality translation. We further refine the model’s output using advanced language models such as GPT-3.5 and GPT-4, which improve fluency, coherence, and correct grammatical errors in translated texts. The fine-tuned model demonstrates substantial improvements, achieving a BLEU score of 38.97, METEOR score of 58.11, and TER score of 56.33, surpassing widely used systems such as Google Translate. These results underscore the potential of mBART, combined with refinement strategies, to bridge the translation gap between Arabic and English, providing a reliable, context-aware machine translation solution that is robust across diverse linguistic contexts.

Keywords: natural language processing, machine translation, fine-tuning, Arabic-English translation, transformer models, seq2seq translation, translation evaluation metrics, cross-linguistic communication

Procedia PDF Downloads 7
5100 Developing a Viral Artifact to Improve Employees’ Security Behavior

Authors: Stefan Bauer, Josef Frysak

Abstract:

According to the scientific information management literature, the improper use of information technology (e.g. personal computers) by employees are one main cause for operational and information security loss events. Therefore, organizations implement information security awareness programs to increase employees’ awareness to further prevention of loss events. However, in many cases these information security awareness programs consist of conventional delivery methods like posters, leaflets, or internal messages to make employees aware of information security policies. We assume that a viral information security awareness video might be more effective medium than conventional methods commonly used by organizations. The purpose of this research is to develop a viral video artifact to improve employee security behavior concerning information technology.

Keywords: information security awareness, delivery methods, viral videos, employee security behavior

Procedia PDF Downloads 542