Search results for: Idris Ajibade
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 100

Search results for: Idris Ajibade

100 Examining the Extent and Magnitude of Food Security amongst Rural Farming Households in Nigeria

Authors: Ajibade T., Omotesho O. A., Ayinde O. E, Ajibade E. T., Muhammad-Lawal A.

Abstract:

This study was carried out to examine the extent and magnitude of food security amongst farming rural households in Nigeria. Data used for this study was collected from a total of two hundred and forty rural farming households using a two-stage random sampling technique. The main tools of analysis for this study include descriptive statistics and a constructed food security index using the identification and aggregation procedure. The headcount ratio in this study reveals that 71% of individuals in the study area were food secure with an average per capita calorie and protein availability of 4,213.92kcal and 99.98g respectively. The aggregated household daily calorie availability and daily protein availability per capita were 3,634.57kcal and 84.08g respectively which happens to be above the food security line of 2,470kcal and 65g used in this study. The food insecure households fell short of the minimum daily per capita calorie and protein requirement by 2.1% and 24.9%. The study revealed that the area is food insecure due to unequal distribution of the available food amongst the sampled population. The study recommends that the households should empower themselves financially in order to enhance their ability to afford the food during both on and off seasons. Also, processing and storage of farm produce should be enhanced in order to improve on availability throughout the year.

Keywords: farming household, food security, identification and aggregation, food security index

Procedia PDF Downloads 255
99 Variation of Compressive Strength of Hollow Sand Crate Block (6”) with Mix Ratio Using Locally Made Cement (Sokoto Cement)

Authors: Idris Adamu Idris

Abstract:

The Nigerian construction industry is faced with problems of failure of structures/buildings. These failures are attributed to the use of low quality construction materials of which sand crate bock is inclusive. The research was conducted to determine the compressive strength of hollow sand crate block (6”) using locally made cement (Sokoto cement). Samples were tested for 7, 14, 21 and 28 days for mix ratio of 1:3 to 1:12. From the laboratory results obtained, a mix ratio of 1:10 corresponding to a minimum compressive strength of 1.9N/mm2 at 7 days should be adopted. This satisfies the BS 2028, 1364 1986 which specified a minimum compressive strength of 1.8N/mm2 at 7 days. At 28 days of curing, the same mix ratio meets the minimum BS standard of 2.5N/mm2 .

Keywords: buildings, cement, construction, hollow sand crate block, Nigeria

Procedia PDF Downloads 358
98 The Impact of Information Communication Technology on Promoting Travel Trade Industry in a Developing Economy, Case Study Nigeria

Authors: Murtala Mohammed Alamai, Abdullahi Marshal Idris, Adama Idris

Abstract:

Today, marketing does not only involve selecting target markets, but it also involves communicating with the customers through various means to put across your selling point. Modern marketing involves driving new product development based on customer needs by getting feedback from them. Utilizing the latest technology for better communication with the customers is the latest advancement in Marketing in the 21st century. The survey approach was used where a sample of tourist destinations across the six geographical zones of the country at random was done to ascertain the use of information communication systems in promoting their products and or services, the findings revealed that only a few utilize these modern advanced means in marketing and promoting their products and a need to develop effective and up to date online services for marketing was proffered as solutions to the findings observed.

Keywords: information, communication, travel, trade, promotion

Procedia PDF Downloads 294
97 Social Network Impact on Self Learning in Teaching and Learning in UPSI (Universiti Pendidikan Sultan Idris)

Authors: Azli Bin Ariffin, Noor Amy Afiza Binti Mohd Yusof

Abstract:

This study aims to identify effect of social network usage on the self-learning method in teaching and learning at Sultan Idris Education University. The study involved 270 respondents consisting of students in the pre-graduate and post-graduate levels from nine fields of study offered. Assessment instrument used is questionnaire which measures respondent’s background includes level of study, years of study and field of study. Also measured the extent to which social pages used for self-learning and effect received when using social network for self-learning in learning process. The results of the study showed that students always visit Facebook more than other social sites. But, it is not for the purpose of self-learning. Analyzed data showed that 45.5% students not sure about using social sites for self-learning. But they realize the positive effect that they will received when use social sites for self-learning to improve teaching and learning process when 72.7% respondent agreed with all the statements provided.

Keywords: facebook, self-learning, social network, teaching, learning

Procedia PDF Downloads 497
96 Safeguarding the Cloud: The Crucial Role of Technical Project Managers in Security Management for Cloud Environments

Authors: Samuel Owoade, Zainab Idowu, Idris Ajibade, Abel Uzoka

Abstract:

Cloud computing adoption continues to soar, with 83% of enterprise workloads estimated to be in the cloud by 2022. However, this rapid migration raises security concerns, needing strong security management solutions to safeguard sensitive data and essential applications. This paper investigates the critical role of technical project managers in orchestrating security management initiatives for cloud environments, evaluating their responsibilities, challenges, and best practices for assuring the resilience and integrity of cloud infrastructures. Drawing from a comprehensive review of industry reports and interviews with cloud security experts, this research highlights the multifaceted landscape of security management in cloud environments. Despite the rapid adoption of cloud services, only 25% of organizations have matured their cloud security practices, indicating a pressing need for effective management strategies. This paper proposes a strategy framework adapted to the demands of technical project managers, outlining the important components of effective cloud security management. Notably, 76% of firms identify misconfiguration as a major source of cloud security incidents, underlining the significance of proactive risk assessment and constant monitoring. Furthermore, the study emphasizes the importance of technical project managers in facilitating cross-functional collaboration, bridging the gap between cybersecurity professionals, cloud architects, compliance officers, and IT operations teams. With 68% of firms seeing difficulties integrating security policies into their cloud systems, effective communication and collaboration are critical to success. Case studies from industry leaders illustrate the practical use of security management projects in cloud settings. These examples demonstrate the importance of technical project managers in using their expertise to address obstacles and generate meaningful outcomes, with 92% of firms reporting improved security practices after implementing proactive security management tactics. In conclusion, this research underscores the critical role of technical project managers in safeguarding cloud environments against evolving threats. By embracing their role as guardians of the cloud realm, project managers can mitigate risks, optimize resource utilization, and uphold the trust and integrity of cloud infrastructures in an era of digital transformation.

Keywords: cloud security, security management, technical project management, cybersecurity, cloud infrastructure, risk management, compliance

Procedia PDF Downloads 15
95 E-Marketing Strategies and Destination Branding for the Tourism Industry in Nigeria

Authors: Abdullahi Marshal Idris, Murtala Mohammed Alamai, Adama Jummai Idris, Bello Mohammed Gwagwada

Abstract:

The technological revolution of the 1990s have brought about many new opportunities and challenges for the tourism and hospitality industries mostly in Nigeria and with tourism having global industry information as its life-blood and technology becoming fundamental to the ability of the industry to operate effectively and competitively. The whole system of information technologies is being rapidly diffused throughout the tourism industry and no player will escape information technologies impacts. The paper gives an insight into the importance of destination branding and the application of information technologies and the use of Internet in tourism and hospitality industries in Nigeria giving strategic frameworks, providing analysis of the Internet and its impact on these sectors. It also aims to show how technological innovations and information system can be beneficial for destinations companies like game reserves national parks, and other resorts by using the literature of existing efforts in global industry players as well as documented evidences where recommendations for destinations and companies is made to seek to foster the development of this connection by investing considerable resources in marketing activities on social networks and by reinforcing the trust of users, because credibility and reliability are still critical in this area.

Keywords: branding, marketing, technology, tourism product

Procedia PDF Downloads 409
94 Preventing Violent Extremism through Augmenting Community Resilience and Empowering Community Members in Swat

Authors: Dr. Muhammad Idris Idris, Dr. Said Saeed Saeed

Abstract:

Terrorism is the chronic issue of the hour. It is the disciplined practice of vicious activities like assassinating, slaughtering, mutilating, and frightening of the innocents to attain religious, fiscal, and political goals and to question the authority of the government. Leaders of the world promised to transform the planet by empowering community members and building community resilience (CR) against terrorism. This study concentrates to explore building community resilience against terrorism and empowering community members and implement strategies for strengthening community resilience. For data collection a mixed methods methodology will be used. Means, STD deviation, Pearson correlation, and thematic analysis will be employed to analyze the gathered data. The findings of the study will be interpreted and recommendations will be furnished accordingly. Study results will be disseminated to all concerned through conferences and seminar sessions. It is predicted that after the completion, the project team will be in a robust position to start writing the report that concentrates on strengthening community resilience, which is the crucial goal of this project. The publication will contribute effectively to all stakeholders and society, particularly to the lower rungs of social order. Moreover, it is expected that this project will contribute to future research in the domain of community resilience. This project will also reveal the remarkable potential of archival research on community resilience.

Keywords: Violent Extremism, community Role, community resilience, community empowerment, Leadership role

Procedia PDF Downloads 113
93 Performance Evaluation of Iar Multi Crop Thresher

Authors: Idris Idris Sunusi, U.S. Muhammed, N.A. Sale, I.B. Dalha, N.A. Adam

Abstract:

Threshing efficiency and mechanical grain damages are among the important parameters used in rating the performance of agricultural threshers. To be acceptable to farmers, threshers should have high threshing efficiency and low grain. The objective of the research is to evaluate the performances of the thresher using sorghum and millet, the performances parameters considered are; threshing efficiency and mechanical grain damage. For millet, four drum speed levels; 700, 800, 900 and 1000 rpm were considered while for sorghum; 600, 700, 800 and 900 rpm were considered. The feed rate levels were 3, 4, 5 and 6 kg/min for both sorghum and millet; the levels of moisture content were 8.93 and 10.38% for sorghum and 9.21 and 10.81% for millet. For millet the test result showed a maximum of 98.37 threshing efficiencies and a minimum of 0.24% mechanical grain damage while for sorghum the test result indicated a maximum of 99.38 threshing efficiencies, and a minimum of 0.75% mechanical grain damage. In comparison to the previous thresher, the threshing efficiency and mechanical grain damage of the modified machine has improved by 2.01% and 330.56% for millet and 5.31%, 287.64% for sorghum. Also analysis of variance (ANOVA) showed that, the effect of drum speed, feed rate and moisture content were significant on the performance parameters.

Keywords: Threshing Efficiency, Mechanical Grain Damages, Sorghum and Millet, Multi Crop Thresher

Procedia PDF Downloads 319
92 Investigation of the Stability of the F* Iterative Algorithm on Strong Peudocontractive Mappings and Its Applications

Authors: Felix Damilola Ajibade, Opeyemi O. Enoch, Taiwo Paul Fajusigbe

Abstract:

This paper is centered on conducting an inquiry into the stability of the F* iterative algorithm to the fixed point of a strongly pseudo-contractive mapping in the framework of uniformly convex Banach spaces. To achieve the desired result, certain existing inequalities in convex Banach spaces were utilized, as well as the stability criteria of Harder and Hicks. Other necessary conditions for the stability of the F* algorithm on strong pseudo-contractive mapping were also obtained. Through a numerical approach, we prove that the F* iterative algorithm is H-stable for strongly pseudo-contractive mapping. Finally, the solution of the mixed-type Volterra-Fredholm functional non-linear integral equation is estimated using our results.

Keywords: stability, F* -iterative algorithm, pseudo-contractive mappings, uniformly convex Banach space, mixed-type Volterra-Fredholm integral equation

Procedia PDF Downloads 59
91 Zinc (II) Complexes of Nitrogen, Oxygen and Sulfur Coordination Modes: Synthesis, Spectral Studies and Antibacterial Activities

Authors: Ayodele Odularu, Peter Ajibade, Albert Bolhuis

Abstract:

This study aimed at assessing the antibacterial activities of four zinc (II) complexes. Zinc (II) complexes of nitrogen, oxygen and sulfur coordination modes were synthesized using direct substitution reaction. The characterization techniques involved physicochemical properties (molar conductivity) and spectroscopic techniques. The molar conductivity gave the non-electrolytic nature of zinc (II) complexes. The spectral studies of zinc (II) complexes were done using electronic spectra (UV-Vis) and Fourier Transform Infra-red Spectroscopy (FT-IR). Spectral data from the spectroscopic studies confirmed the coordination of the mixed ligands with zinc (II) ion. The antibacterial activities of zinc(II) complexes of were all in supportive of Overtone’s concept and Tweedy’s theory of chelation for bacterial strains of S. aureus MRSA252 and E coli MC4100 because the zones of inhibition were greater than the corresponding ligands. In summary, all zinc (II) complexes of ZEPY, ZE1PH, ZE1PY and ZE135PY all have potentials for antibacterial activities.

Keywords: antibacterial activities, spectral studies, syntheses, zinc(II) complexes

Procedia PDF Downloads 243
90 Traditional Terms, Spaces, Forms and Artifacts in Cultural Semiotics of Southwest Nigeria

Authors: Ajibade Adeyemo

Abstract:

The paper examined local terms used for spaces, forms and building practices in southwest Nigeria as cultural semiotics. Housing has more cultural meaning than mere shelter as shown in building terms such as ‘roof over my head’. The study is significant in the study area because its people were traditionally orally centered until ‘culture contact’ led to graphical presentation and appreciation in the form of drawings which is a modern language of architecture. This semiotic study will facilitate the understanding of the wholesomeness of traditional building practices and thoughts. This is in the culture of the traditional multi-sensory appreciation of architecture, urban design and the arts. It will analyze traditional aphoristic words and terms which are like proverbs which are significant in language because of their metaphorical essence. Many of such terms in the dominant Yoruba language of the study area are oftentimes phenomenal reducing universal terms like the earth and heaven to the simple module of housing. These words could be worth investigating because they are symbolic serve as codes which are cultural tool of regional ethnic significance. Sassure’s and Pierce’s concepts of Semiotics in line with Eco’s concept of semiotics of metaphor shall be deployed.

Keywords: traditional terms, spaces, forms, artifacts, cultural semiotics, southwest

Procedia PDF Downloads 247
89 The Impacts of Technology on Operations Costs: The Mediating Role of Operation Flexibility

Authors: Fazli Idris, Jihad Mohammad

Abstract:

The study aims to determine the impact of technology and service operations flexibility, which is divided into external flexibility and internal robustness, on operations costs. A mediation model is proposed that links technology to operations costs via operation flexibility. Drawing on a sample of 475 of operations managers of various service sectors in Malaysia and South Africa, Structural Equation Modeling (SEM) was employed to test the relationship using Smart-PLS procedures. It was found that a significant relationship was established between technologies to operations costs via both operations flexibility dimensions. Theoretical and managerial implications are offered to explain the results.

Keywords: Operations flexibility, technology, costs, mediation

Procedia PDF Downloads 581
88 A Recommender System for Dynamic Selection of Undergraduates' Elective Courses

Authors: Adewale O. Ogunde, Emmanuel O. Ajibade

Abstract:

The task of selecting a few elective courses from a variety of available elective courses has been a difficult one for many students over the years. In many higher institutions, guidance and counselors or level advisers are usually employed to assist the students in picking the right choice of courses. In reality, these counselors and advisers are most times overloaded with too many students to attend to, and sometimes they do not have enough time for the students. Most times, the academic strength of the student based on past results are not considered in the new choice of electives. Recommender systems implement advanced data analysis techniques to help users find the items of their interest by producing a predicted likeliness score or a list of top recommended items for a given active user. Therefore, in this work, a collaborative filtering-based recommender system that will dynamically recommend elective courses to undergraduate students based on their past grades in related courses was developed. This approach employed the use of the k-nearest neighbor algorithm to discover hidden relationships between the related courses passed by students in the past and the currently available elective courses. Real students’ results dataset was used to build and test the recommendation model. The developed system will not only improve the academic performance of students, but it will also help reduce the workload on the level advisers and school counselors.

Keywords: collaborative filtering, elective courses, k-nearest neighbor algorithm, recommender systems

Procedia PDF Downloads 135
87 The Failure of Democracy in Libya

Authors: Ali Musbah Mohamed Elwahishi

Abstract:

Democracy is demand for the majority of people in the whole world, Specifically in the regions that are still outside the democratic life such as Libya and other Arab countries. Although democracy has spread across the world through three waves of democratization, Libya is still outside the democratic process, even recently its regime has changed. The challenges of democracy in Libya are not new, they represent accumulations over time that impeded to achieve this goal. This paper concludes that the absence of democracy in Libya because of set of factors that include: colonial legacy, oil wealth, the lack of institutions, the lack of political parties, tribal factor and recently the spread of the armed groups. These factors prevented Libya to be democratic state whether during King Idris’, Qaddafi’s or even after Qaddafi rule.

Keywords: the failure of democracy, political transition, the lack of institutions, Libya, Arab countries

Procedia PDF Downloads 425
86 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 611
85 Power Quality Evaluation of Electrical Distribution Networks

Authors: Mohamed Idris S. Abozaed, Suliman Mohamed Elrajoubi

Abstract:

Researches and concerns in power quality gained significant momentum in the field of power electronics systems over the last two decades globally. This sudden increase in the number of concerns over power quality problems is a result of the huge increase in the use of non-linear loads. In this paper, power quality evaluation of some distribution networks at Misurata - Libya has been done using a power quality and energy analyzer (Fluke 437 Series II). The results of this evaluation are used to minimize the problems of power quality. The analysis shows the main power quality problems that exist and the level of awareness of power quality issues with the aim of generating a start point which can be used as guidelines for researchers and end users in the field of power systems.

Keywords: power quality disturbances, power quality evaluation, statistical analysis, electrical distribution networks

Procedia PDF Downloads 500
84 The Nature of Intelligence and Its Forms: An Ontological-Modeling Approach

Authors: Husam El-Asfour, Fateh Adhnouss, Kenneth McIsaac, Abdul Mutalib Wahaishi, Raafat Aburukba, Idris El-Feghia

Abstract:

Although intelligence is commonly referred to as the observable behavior in various fields and domains, it must also be shown how it develops by exhibiting multiple forms and without observing the inherent behavior. There have been several official and informal definitions of intelligence in various areas; however, no scientific agreement on a definition has been agreed upon. There must be a single definition, structure, and precise modeling for articulating how intelligence is perceived by people and machines in order to comprehend intelligence. Another key challenge is defining the different environment types based on the integral elements (agents) and their possible interactions. On the basis of conceptualization, this paper proposes a formal model for defining and developing intelligence. Forms of intelligence are derived from an ontological view, and thus intelligence is defined, described, and modeled based on the various types of environments.

Keywords: intelligence, forms, transformation, conceptualization, ontological view

Procedia PDF Downloads 97
83 Algorithmic Fault Location in Complex Gas Networks

Authors: Soban Najam, S. M. Jahanzeb, Ahmed Sohail, Faraz Idris Khan

Abstract:

With the recent increase in reliance on Gas as the primary source of energy across the world, there has been a lot of research conducted on gas distribution networks. As the complexity and size of these networks grow, so does the leakage of gas in the distribution network. One of the most crucial factors in the production and distribution of gas is UFG or Unaccounted for Gas. The presence of UFG signifies that there is a difference between the amount of gas distributed, and the amount of gas billed. Our approach is to use information that we acquire from several specified points in the network. This information will be used to calculate the loss occurring in the network using the developed algorithm. The Algorithm can also identify the leakages at any point of the pipeline so we can easily detect faults and rectify them within minimal time, minimal efforts and minimal resources.

Keywords: FLA, fault location analysis, GDN, gas distribution network, GIS, geographic information system, NMS, network Management system, OMS, outage management system, SSGC, Sui Southern gas company, UFG, unaccounted for gas

Procedia PDF Downloads 598
82 Forensic Challenges in Source Device Identification for Digital Videos

Authors: Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan

Abstract:

Video source device identification has become a problem of concern in numerous domains especially in multimedia security and digital investigation. This is because videos are now used as evidence in legal proceedings. Source device identification aim at identifying the source of digital devices using the content they produced. However, due to affordable processing tools and the influx in digital content generating devices, source device identification is still a major problem within the digital forensic community. In this paper, we discuss source device identification for digital videos by identifying techniques that were proposed in the literature for model or specific device identification. This is aimed at identifying salient open challenges for future research.

Keywords: video forgery, source camcorder, device identification, forgery detection

Procedia PDF Downloads 596
81 Preliminary Design Considerations for Achieving Stabilized Orbit, Telemetary, Command, and Ranging for HTS Communication Satellite

Authors: Ibrahim Isa Ali (Pantami), Abdu Jaafaru Bambale, Abimbola Alale, Danjuma Ibrahim Ndihgihdah, Muhammad Alkali, Adamu Idris Umar, Samson Olufunmilayo Abodunrin, Muhammad Dokko Zubairu, Moshood Kareem

Abstract:

This paper discusses the consideration and trade-offs used for the implementation of robust systems for orbit stability; Telemetry, Command and Ranging (TC& R) for Nigcomsat-1R and applicability for planned NigComSat-2 satellites. NigComSat-1R satellite was built by China Academy of Space Technology (CAST). The Satellite designed with quad-band payload (L, C, Ku, and Ka) was launched on the 20th of December 2011. The functionality of all satellite is driven by robust systems including Attitude & Orbit Control System (AOCS) and TC&R. The planned Nigcomsat-2 is a high throughput Satellite expected to function with better AOCS and TC&R.

Keywords: AOCS, CAST, Nigcomsat-1R, TC&R

Procedia PDF Downloads 69
80 Synthesis of Biolubricant Base Stock from Palm Methyl Ester

Authors: Nur Sulihatimarsyila Abd Wafti, Harrison Lik Nang Lau, Nabilah Kamaliah Mustaffa, Nur Azreena Idris

Abstract:

The use of biolubricant has gained its popularity over the last decade. Base stock produced using methyl ester and trimethylolethane (TME) can be potentially used for biolubricant production due to its biodegradability, non-toxicity and good thermal stability. The synthesis of biolubricant base stock e.g. triester (TE) via transesterification of palm methyl ester and TME in the presence of sodium methoxide as the catalyst was conducted. Factors influencing the reaction conditions were investigated including reaction time, temperature and pressure. The palm-based biolubricant base stock produced was analysed for its monoester (ME), diester (DE) and TE contents using gas chromatography as well as its lubricating properties such as viscosity, viscosity index, oxidation stability, and density. The resulting base stock containing 90 wt% TE was successfully synthesized.

Keywords: biolubricant, methyl ester, triester transesterification, lubricating properties

Procedia PDF Downloads 422
79 The Determinants of Corporate Hedging Strategy

Authors: Ademola Ajibade

Abstract:

Previous studies have explored several rationales for hedging strategies, but the evidence provided by these studies remains ambiguous. Using a hand-collected dataset of 2460 observations of non-financial firms in eight African countries covering 2013-2022, this paper investigates the determinants and extent of corporate hedge use. In particular, this paper focuses on the link between country-specific conditions and the corporate hedging behaviour of firms. To our knowledge, this represents the first African studies investigating the association between country-specific factors and corporate hedging policy. The evidence based on both univariate and multivariate reveal that country-level corruption and government quality are important indicators of the decisions and extent of hedge use among African firms. However, the connection between country-specific factors as a rationale for corporate hedge use is stronger for firms located in highly corrupt countries. This suggest that firms located in corrupt countries are more motivated to hedge due to the large exposure they face. In addition, we test the risk management theories and observe that CEOs educational qualification and experience shape corporate hedge behaviour. We implement a lagged variables in a panel data setting to address endogeneity concern and implement an interaction term between governance indices and firm-specific variables to test for robustness. Generally, our findings reveal that institutional factors shape risk management decisions and have a predictive power in explaining corporate hedging strategy.

Keywords: corporate hedging, governance quality, corruption, derivatives

Procedia PDF Downloads 49
78 Analysis of Effect of Microfinance on the Profit Level of Small and Medium Scale Enterprises in Lagos State, Nigeria

Authors: Saheed Olakunle Sanusi, Israel Ajibade Adedeji

Abstract:

The study analysed the effect of microfinance on the profit level of small and medium scale enterprises in Lagos. The data for the study were obtained by simple random sampling, and total of one hundred and fifty (150) small and medium scale enterprises (SMEs) were sampled for the study. Seventy-five (75) each are microfinance users and non-users. Data were analysed using descriptive statistics, logit model, t-test and ordinary least square (OLS) regression. The mean profit of the enterprises using microfinance is ₦16.8m, while for the non-users of microfinance is ₦5.9m. The mean profit of microfinance users is statistically different from the non-users. The result of the logit model specified for the determinant of access to microfinance showed that three of specified variables- educational status of the enterprise head, credit utilisation and volume of business investment are significant at P < 0.01. Enterprises with many years of experience, highly educated enterprise heads and high volume of business investment have more potential access to microfinance. The OLS regression model indicated that three parameters namely number of school years, the volume of business investment and (dummy) participation in microfinance were found to be significant at P < 0.05. These variables are therefore significant determinants of impacts of microfinance on profit level in the study area. The study, therefore, concludes and recommends that to improve the status of small and medium scale enterprises for an increase in profit, the full benefit of access to microfinance can be enhanced through investment in social infrastructure and human capital development. Also, concerted efforts should be made to encouraged non-users of microfinance among SMEs to use it in order to boost their profit.

Keywords: credit utilisation, logit model, microfinance, small and medium enterprises

Procedia PDF Downloads 171
77 Hit-Or-Miss Transform as a Tool for Similar Shape Detection

Authors: Osama Mohamed Elrajubi, Idris El-Feghi, Mohamed Abu Baker Saghayer

Abstract:

This paper describes an identification of specific shapes within binary images using the morphological Hit-or-Miss Transform (HMT). Hit-or-Miss transform is a general binary morphological operation that can be used in searching of particular patterns of foreground and background pixels in an image. It is actually a basic operation of binary morphology since almost all other binary morphological operators are derived from it. The input of this method is a binary image and a structuring element (a template which will be searched in a binary image) while the output is another binary image. In this paper a modification of Hit-or-Miss transform has been proposed. The accuracy of algorithm is adjusted according to the similarity of the template and the sought template. The implementation of this method has been done by C language. The algorithm has been tested on several images and the results have shown that this new method can be used for similar shape detection.

Keywords: hit-or-miss operator transform, HMT, binary morphological operation, shape detection, binary images processing

Procedia PDF Downloads 296
76 Concept and Implementation of Religious Tourism as a City Icon; Case Study: Golden Dome Mosque in Depok, Indonesia

Authors: Azhari Fauzan

Abstract:

Dian Al Mahri Mosque or more known as Golden Dome Mosque is one of the biggest mosques in Southeast Asia which located in Depok, West Java Province, Indonesia. Instead of a place for praying, this beautiful Mosque is also becoming an icon of Depok for religious tourism destination. The purpose of this study is to understand the concept and objective of religious tourism, also how to be implemented as an icon of the city. As a qualitative method, the data was collected by direct interview with three of the most influential persons: K. H. Amirudin Said S. Q. MA as a Manager of the Mosque, K. H. Dr. Mohammad Idris, MA as a Major of Depok, and Mulyamto as a Head of Tourism Department of Depok. As a result, Golden Dome Mosque involves three integrated aspects (social, economic, and cultural) which can be implemented to evaluate their daily activities and services in order to define themselves as a religious tourism destination.

Keywords: city icon, golden mosque, Muslim Indonesia, religious tourism

Procedia PDF Downloads 279
75 Distribution of Synechococcus and Prochlorococcus in Southeastern Coast of Peninsular Malaysia

Authors: Roswati Md. Amin, Nurul Asmera Mudiman, Muhammad Faisal Abd. Rahman, Md-Suffian Idris, Noor Hazwani Mohd Azmi

Abstract:

Distribution of picophytoplankton from two genera, Synechococcus and Prochlorococcus at the surface water (0.5m) were observed from coastal to offshore area of the southeastern coast of Peninsular Malaysia, for a six day cruise in August 2014 during SouthWest monsoon. The picophytoplankton was divided into two different size fractions (0.7-2.7μm and <0.7 μm) by filtering through GF/D (2.7 μm) and GF/F (0.7 μm) filter papers and counted by using flow cytometer. Synechococcus and Prochlorococcus contribute higher at 0.7-2.7μm size range (ca. 90% and 95%, respectively) compared to <0.7 μm (ca. 10% and 5%, respectively). Synechococcus (>52%) dominated the total picophytoplankton compared to Prochlorococcus (<26%) for both size fractions in southeastern coast of Peninsular Malaysia. Total density (<2.7 μm) of Synechococcus was ranging between 1.72 x104 and 12.57 x104 cells ml-1, while Prochlorococcus varied from 1.50 x104 to 8.62 x104. Both Synechococcus and Prochlorococcus abundance showed a decreasing trend from coastal to offshore.

Keywords: Peninsular Malaysia, prochlorococcus, South China Sea, synechococcus

Procedia PDF Downloads 284
74 Effects of Alkaline Pretreatment Parameters on the Corrosion Resistance and ‎Wettability of Magnesium Implant

Authors: Mahtab Assadian, Mohd Hasbullah Idris, Mostafa Rezazadeh Shirdar, Mohammad Mahdi Taheri, ‎S. Izman

Abstract:

Corrosion behaviour and surface roughness of magnesium substrate were investigated after NaOH pretreatment in different concentrations (1, 5, and 10 molar) and duration of (10 min, 30 min, 1 h, 3 h, 6 h and 24 h). Creation of Mg(OH)2 barrier layer after pretreatment enhanced corrostion resistance as well as wettability of substrate surface. Characterization including Fourier transform infrared spectroscopy (FTIR) and X-ray diffraction (XRD) was conducted to detect the existence of this barrier layer. Surface roughness and wettability of substrate was evaluated using atomic force microscopy (AFM) and contact angle measurement respectively. It is found that magnesium treated by 1M NaOH for 30 min reveals higher corrosion resistance and lower water contact angle of substrate surface. In addition, this investigation indicates that pH value of SBF solution is strongly influenced by different time and concentration of alkaline pretreatment.

Keywords: magnesium, NaOH pretreatment, corrosion resistance, wettability

Procedia PDF Downloads 932
73 Square Wave Anodic Stripping Voltammetry of Copper (II) at the Tetracarbonylmolybdenum(0) MWCNT Paste Electrode

Authors: Illyas Isa, Mohamad Idris Saidin, Mustaffa Ahmad, Norhayati Hashim

Abstract:

A highly selective and sensitive electrode for determination of trace amounts of Cu (II) using square wave anodic stripping voltammetry (SWASV) was proposed. The electrode was made of the paste of multiwall carbon nanotubes (MWCNT) and 2,6–diacetylpyridine-di-(1R)–(-)–fenchone diazine tetracarbonylmolybdenum(0) at 100:5 (w/w). Under optimal conditions the electrode showed a linear relationship with concentration in the range of 1.0 × 10–10 to 1.0 × 10– 6 M Cu (II) and limit of detection 8.0 × 10–11 M Cu (II). The relative standard deviation (n = 5) of response to 1.0 × 10–6 M Cu(II) was 0.036. The interferences of cations such as Ni(II), Mg(II), Cd(II), Co(II), Hg(II), and Zn(II) (in 10 and 100-folds concentration) are negligible except from Pb (II). Electrochemical impedance spectroscopy (EIS) showed that the charge transfer at the electrode-solution interface was favorable. Result of analysis of Cu(II) in several water samples agreed well with those obtained by inductively coupled plasma-optical emission spectrometry (ICP-OES). The proposed electrode was then recommended as an alternative to spectroscopic technique in analyzing Cu (II).

Keywords: chemically modified electrode, Cu(II), Square wave anodic stripping voltammetry, tetracarbonylmolybdenum(0)

Procedia PDF Downloads 232
72 Implied Adjusted Volatility by Leland Option Pricing Models: Evidence from Australian Index Options

Authors: Mimi Hafizah Abdullah, Hanani Farhah Harun, Nik Ruzni Nik Idris

Abstract:

With the implied volatility as an important factor in financial decision-making, in particular in option pricing valuation, and also the given fact that the pricing biases of Leland option pricing models and the implied volatility structure for the options are related, this study considers examining the implied adjusted volatility smile patterns and term structures in the S&P/ASX 200 index options using the different Leland option pricing models. The examination of the implied adjusted volatility smiles and term structures in the Australian index options market covers the global financial crisis in the mid-2007. The implied adjusted volatility was found to escalate approximately triple the rate prior the crisis.

Keywords: implied adjusted volatility, financial crisis, Leland option pricing models, Australian index options

Procedia PDF Downloads 349
71 Big Data Analytics and Data Security in the Cloud via Fully Homomorphic Encryption

Authors: Waziri Victor Onomza, John K. Alhassan, Idris Ismaila, Noel Dogonyaro Moses

Abstract:

This paper describes the problem of building secure computational services for encrypted information in the Cloud Computing without decrypting the encrypted data; therefore, it meets the yearning of computational encryption algorithmic aspiration model that could enhance the security of big data for privacy, confidentiality, availability of the users. The cryptographic model applied for the computational process of the encrypted data is the Fully Homomorphic Encryption Scheme. We contribute theoretical presentations in high-level computational processes that are based on number theory and algebra that can easily be integrated and leveraged in the Cloud computing with detail theoretic mathematical concepts to the fully homomorphic encryption models. This contribution enhances the full implementation of big data analytics based cryptographic security algorithm.

Keywords: big data analytics, security, privacy, bootstrapping, homomorphic, homomorphic encryption scheme

Procedia PDF Downloads 335