Search results for: Obe Olumide Olayinka
37 An ANN-Based Predictive Model for Diagnosis and Forecasting of Hypertension
Authors: Obe Olumide Olayinka, Victor Balanica, Eugen Neagoe
Abstract:
The effects of hypertension are often lethal thus its early detection and prevention is very important for everybody. In this paper, a neural network (NN) model was developed and trained based on a dataset of hypertension causative parameters in order to forecast the likelihood of occurrence of hypertension in patients. Our research goal was to analyze the potential of the presented NN to predict, for a period of time, the risk of hypertension or the risk of developing this disease for patients that are or not currently hypertensive. The results of the analysis for a given patient can support doctors in taking pro-active measures for averting the occurrence of hypertension such as recommendations regarding the patient behavior in order to lower his hypertension risk. Moreover, the paper envisages a set of three example scenarios in order to determine the age when the patient becomes hypertensive, i.e. determine the threshold for hypertensive age, to analyze what happens if the threshold hypertensive age is set to a certain age and the weight of the patient if being varied, and, to set the ideal weight for the patient and analyze what happens with the threshold of hypertensive age.Keywords: neural network, hypertension, data set, training set, supervised learning
Procedia PDF Downloads 39036 Development of a Sequential Multimodal Biometric System for Web-Based Physical Access Control into a Security Safe
Authors: Babatunde Olumide Olawale, Oyebode Olumide Oyediran
Abstract:
The security safe is a place or building where classified document and precious items are kept. To prevent unauthorised persons from gaining access to this safe a lot of technologies had been used. But frequent reports of an unauthorised person gaining access into security safes with the aim of removing document and items from the safes are pointers to the fact that there is still security gap in the recent technologies used as access control for the security safe. In this paper we try to solve this problem by developing a multimodal biometric system for physical access control into a security safe using face and voice recognition. The safe is accessed by the combination of face and speech pattern recognition and also in that sequential order. User authentication is achieved through the use of camera/sensor unit and a microphone unit both attached to the door of the safe. The user face was captured by the camera/sensor while the speech was captured by the use of the microphone unit. The Scale Invariance Feature Transform (SIFT) algorithm was used to train images to form templates for the face recognition system while the Mel-Frequency Cepitral Coefficients (MFCC) algorithm was used to train the speech recognition system to recognise authorise user’s speech. Both algorithms were hosted in two separate web based servers and for automatic analysis of our work; our developed system was simulated in a MATLAB environment. The results obtained shows that the developed system was able to give access to authorise users while declining unauthorised person access to the security safe.Keywords: access control, multimodal biometrics, pattern recognition, security safe
Procedia PDF Downloads 33235 Capacity Optimization in Cooperative Cognitive Radio Networks
Authors: Mahdi Pirmoradian, Olayinka Adigun, Christos Politis
Abstract:
Cooperative spectrum sensing is a crucial challenge in cognitive radio networks. Cooperative sensing can increase the reliability of spectrum hole detection, optimize sensing time and reduce delay in cooperative networks. In this paper, an efficient central capacity optimization algorithm is proposed to minimize cooperative sensing time in a homogenous sensor network using OR decision rule subject to the detection and false alarm probabilities constraints. The evaluation results reveal significant improvement in the sensing time and normalized capacity of the cognitive sensors.Keywords: cooperative networks, normalized capacity, sensing time
Procedia PDF Downloads 63234 Effect of School Environment on Students’ Responsiveness to Learning
Authors: Abel Olayinka Ogbungbemi, I. A. Omunagbe, O. R. King, O. H. Akingbade
Abstract:
This study examined the influence of environmental factors on the academic performance of students in Lagos State Polytechnic. One hundred and thirty-eight students (138) questionnaire was randomly administered among 2,600 students in the 6 departments in the school of environmental studies, Lagos state Polytechnic. The result of the study established that the school environment affects learning. Hence, improper maintenance of fixtures led to lower than average student’s performance. Based on this, the school should endeavour to sustain the school facilities and dull colour points should not be used for painting, interactions between teachers and students should be encouraged, and teachers should relate to all the students irrespective of their age, level of study, department of study and gender.Keywords: environment, learning, responsiveness, school effect
Procedia PDF Downloads 19333 Placenta Parenchymal Dysplasia: When to Depend on Color Doppler and MRI
Authors: Bernard Olumide Ewuoso, Asma Gharaibeh
Abstract:
Rationale: Placental mesenchymal dysplasia (PMD) resembles molar pregnancy quite a bit. Although there have been documented live births of healthy babies, obtaining an objective diagnosis is crucial to assisting the mother in making an educated decision on what option of management she would like to explore. Prenatal invasive testing is recommended to help obtain an objective diagnosis in cases of abnormal placenta. We present a 23-year-old who, at 14 weeks, had ultrasonographic findings suggestive of placental mesenchymal dysplasia. She was offered prenatal invasive testing but declined and opted for surgical management, with a diagnosis of PMD confirmed on histopathology. There will be occasions such as this when prenatal invasive testing is declined. In these situations, careful consideration can be given to color Doppler and MRI, especially if the patient decides to keep pregnancy.Keywords: placental mesenchymal dysplasisa, molar pregnancy, prenatal invasive testing, Color doppler, MRI
Procedia PDF Downloads 2332 The Safety of Microbiologically Prepared Fructooligosaccharide on White Albino Rats
Authors: Olayinka Risiquat Raimi
Abstract:
FOS was produced from FTase of Aspergillus niger. HPLC analysis showed 32.24%. Consisting of 28.57% ketose and 4.67% nystose. Effects of FOS were studied on 12 weeks old albino rats. All animals survived until scheduled euthanasia. A low incidence of clinical sign and no toxicological effect were observed. Male rats fed with 2500mg/kg fructooligosaccharides had the highest weight. Male and female rat showed a significant increase in weight from first week to the fifth week. All haematological parameters examined were normal in male and female rats. Mean haematological and haemoglobin values for 2500mg/kg bw FOS fed male rats were the highest. Clinical chemistry test, glucose, albumin, and cholesterol were within normal laboratory values for a rat. The mean glucose value was lower for FOS fed male and female rats compared to those fed with honey and 60% sucrose. Gross necropsy observation showed no remarkable internal gross abnormalities for any of the animals.Keywords: fructooligosaccharide, white albino rat, haematology values, clinical chemistry values
Procedia PDF Downloads 39531 Industrial Practical Training for Mechanical Engineering Students: A Multidisciplinary Approach
Authors: Bashiru Olayinka Adisa, Najeem Lateef
Abstract:
The integrated knowledge in the application of mechanical engineering, microprocessor and electronic sensor technologies is becoming the basic skill of a modern engineer in machinery based processes. To meet this objective, we have developed a cross-disciplinary industrial training to teach essential hard technical and soft project skills to the mechanical engineering students in mid-curriculum. Ten groups of students were selected to participate in a 150 hour program. The students were required to design and build a robot with ability to follow tracks and pick/place target blocks in specific locations. The students were trained to integrate the knowledge of computer aid design, electronics, sensor theories and motor technology to fabricate a workable robot as a major outcome of this course. On completion of the project, students competed for top robot honors by demonstrating their robots' movements and performance in pick/place to a panel of judges.Keywords: electronics, sensor theories and motor, robot, technology
Procedia PDF Downloads 27830 Communicative Language Teaching Technique: A Neglected Approach in Reading Comprehension Instruction
Authors: Olumide Yusuf Jimoh
Abstract:
Reading comprehension is an interactive and purposeful process of getting meaning from and bringing meaning to a text. Over the years, teachers of the English Language (in Nigeria) have been glued to the monotonous method of making students read comprehension passages silently and then answer the questions that follow such passages without making the reading session interactive. Hence, students often find such exercises monotonous and boring. Consequently, students' interest in language learning continues to dwindle, and this often affects their overall academic performance. Relying on Communicative Accommodation Theory therefore, the study employed the qualitative research design method to x-ray Communicative Language Teaching Approach (CLTA) in reading comprehension. Moreover, techniques such as the Genuinely Collaborative Reading Approach (GCRA), Jigsaw reading, Pre-reading, and Post-reading tasks were examined. The researcher submitted that effective reading comprehension could not be done passively. Students must respond to what they read; they must interact not only with the materials being read but also with one another and with the teacher; this can be achieved by developing communicative and interactive reading programs.Keywords: collaborative reading approach, communicative teaching, interactive reading program, pre-reading task, reading comprehension
Procedia PDF Downloads 10429 Construction and Evaluation of Soybean Thresher
Authors: Oladimeji Adetona Adeyeye, Emmanuel Rotimi Sadiku, Oluwaseun Olayinka Adeyeye
Abstract:
In order to resuscitate soybean production and post-harvest processing especially, in term of threshing, there is need to develop an affordable threshing machine which will reduce drudgery associated with manual soybean threshing. Soybean thresher was fabricated and evaluated at Institute of Agricultural Research and Training IAR&T Apata Ibadan. The machine component includes; hopper, threshing unit, shaker, cleaning unit and the seed outlet, all working together to achieve the main objective of threshing and cleaning. TGX1835 - 10E variety was used for evaluation because of its high resistance to pests, rust and pustules. The final moisture content of the used sample was about 15%. The sample was weighed and introduced into the machine. The parameters evaluated includes moisture content, threshing efficiency, cleaning efficiency, machine capacity and speed. The threshing efficiency and capacity are 74% and 65.9kg/hr respectively. All materials used were sourced locally which makes the cost of production of the machine extremely cheaper than the imported soybean thresher.Keywords: efficiency, machine capacity, speed, soybean, threshing
Procedia PDF Downloads 48328 Corrosion and Microstructural Properties of Vanadium-Microalloyed High-Manganese Steels
Authors: Temitope Olumide Olugbade
Abstract:
Low resistance and delayed fracture to corrosion, especially in harsh environmental conditions, often limit the wide application of high-manganese (high-Mn) steels. To address this issue, the present work investigates the influence of microalloying on the corrosion properties of high-Mn steels. Microalloyed and base high-Mn steels were synthesized through an arc melting process under an argon atmosphere. To generate different microstructures, the temperature and duration were varied via thermal homogenization treatments. The electrochemical impedance spectroscopy (EIS) and potentiodynamic polarization techniques were used to determine the corrosion properties in 0.6 M NaCl aqueous solution at room temperature. The relationship between the microstructures and corrosion properties was investigated via Scanning Kelvin Probe Microscopy (SKPFM), energy dispersive X-ray spectroscopy (EDX), and Scanning electron microscopy (SEM) techniques. The local corrosion properties were investigated via in situ atomic force spectroscopy (AFM), considering the homogenization treatments. The results indicate that microalloying is a successful technique for enhancing the corrosion behavior of high-Mn steels. Compared to other alloying elements, Vanadium has shown improvement in corrosion properties for both general and local corrosion in chloride environments.Keywords: corrosion, high-manganese steel, homogenization, microalloying, vanadium
Procedia PDF Downloads 9327 Comparative Advantage of Mobile Agent Application in Procuring Software Products on the Internet
Authors: Michael K. Adu, Boniface K. Alese, Olumide S. Ogunnusi
Abstract:
This paper brings to fore the inherent advantages in application of mobile agents to procure software products rather than downloading software content on the Internet. It proposes a system whereby the products come on compact disk with mobile agent as deliverable. The client/user purchases a software product, but must connect to the remote server of the software developer before installation. The user provides an activation code that activates mobile agent which is part of the software product on compact disk. The validity of the activation code is checked on connection at the developer’s end to ascertain authenticity and prevent piracy. The system is implemented by downloading two different software products as compare with installing same products on compact disk with mobile agent’s application. Downloading software contents from developer’s database as in the traditional method requires a continuously open connection between the client and the developer’s end, a fixed network is not economically or technically feasible. Mobile agent after being dispatched into the network becomes independent of the creating process and can operate asynchronously and autonomously. It can reconnect later after completing its task and return for result delivery. Response Time and Network Load are very minimal with application of Mobile agent.Keywords: software products, software developer, internet, activation code, mobile agent
Procedia PDF Downloads 31126 Radical Islam and Transnational Security: West Africa and the Asia Pacific in View
Authors: Olumide A. Fafore, Khondlo Mtshali
Abstract:
The beginning of the 21st century saw the emergence of new and global threats to national and transnational security in West Africa and the Asia Pacific regions as a result of the spread of jihadist terrorism across borders, a manifestation of the rise of radical Islam. Extremist and armed Islamic movements influenced by Salafism, the Jihad in Afghanistan and the Muslim Brotherhood are prevalent in Northern Nigeria, Niger, Cameroon, Mali, Chad, Pakistan, Afghanistan, and India. Carrying out attacks across borders, including assassinations, murders, armed robberies, and kidnapping, assisted by open and porous borders and large flow of illegal immigrants across borders. This paper examines the effect of Radical Islam on Transnational security through a review of past literature and the social and security consequences on the people of the regions. Our findings indicate that the activities of armed Islamic movements such as Boko Haram, Ansaru and Al-Qaeda are having a negative impact on the economy, development, and security of the states and people of West Africa and the Asia Pacific. It stresses the importance of regional, transnational and international cooperation, as these threats to national and transnational security can no longer be solved in a national or regional framework.Keywords: Islamic movements, jihadist terrorism, radical Islam, transnational security
Procedia PDF Downloads 16225 Comparison between Simulation and Experimentally Observed Interactions between Two Different Sized Magnetic Beads in a Fluidic System
Authors: Olayinka Oduwole, Steve Sheard
Abstract:
The magnetic separation of biological cells using super-magnetic beads has been used widely for various bioassays. These bioassays can further be integrated with other laboratory components to form a biosensor which can be used for cell sorting, mixing, purification, transport, manipulation etc. These bio-sensing applications have also been facilitated by the wide availability of magnetic beads which range in size and magnetic properties produced by different manufacturers. In order to improve the efficiency and separation capabilities of these biosensors, it is important to determine the magnetic force induced velocities and interaction of beads within the magnetic field; this will help biosensor users choose the desired magnetic bead for their specific application. This study presents for the first time the interaction between a pair of different sized super-paramagnetic beads suspended in a static fluid moving within a uniform magnetic field using a modified finite-time-finite-difference scheme. A captured video was used to record the trajectory pattern and a good agreement was obtained between the simulated trajectories and the video data. The model is, therefore, a good approximation for predicting the velocities as well as the interaction between various magnetic particles which differ in size and magnetic properties for bio-sensing applications requiring a low concentration of magnetic beads.Keywords: biosensor, magnetic field, magnetic separation, super-paramagnetic bead
Procedia PDF Downloads 47224 A Critical Re-Evaluation of Knowledge Management Definitions and Terminologies
Authors: Raymond Olayinka
Abstract:
The last three decades have witnessed myriads of definitions of knowledge management proposed by researchers and industry practitioners. Despite the magnitude of research and available literature on knowledge management, there is yet to be a consensus on what constitutes a good definition. There exists an in-exhaustive list of definitions which can appear confusing, conflicting and overlapping. What is even more daunting is the lack of common terminology in describing knowledge management processes and the inconsistency in the sequence in which the processes take. Whilst newbies to knowledge management research would struggle to make sense of knowledge management definitions, industry practitioners would struggle with their applicability. Against this backdrop, this study aimed to re-evaluate knowledge management definitions and terminologies. The objectives were threefold: (1) to conduct a critical review of an existing body of work around knowledge management concepts and definitions (2) to analyse and synthesise findings (3) to present conclusions and recommendations. The methodology for this study centres around the review of the literature and secondary data sources. A total of 48 knowledge management processes were found and extracted from various definitions (e.g. ‘identify’, ‘capture’, ‘codify’, ‘store’…). A taxonomy of the processes was created based on the commonality of the entities. The 48 processes were classified under 8 headings which were further converged into 3 main headings namely ‘acquire’, ‘exploit’ and ‘evaluate’, of which all definitions therefore hinge. The study concludes that in the multitude of knowledge management definitions, there is a consistent pattern to which the processes are organised and should be utilised. The contribution of this study is in the synthesis of previous work by various authors and the presentation of a more holistic approach to knowledge management definitions and terminologies.Keywords: knowledge management definitions, knowledge management terminologies, knowledge management processes, literature review
Procedia PDF Downloads 25423 Effects of Cognitive Reframe on Depression among Secondary School Adolescents: The Moderating Role of Self-Esteem
Authors: Olayinka M. Ayannuga
Abstract:
This study explored the effect of cognitive reframe in reducing depression among Senior Secondary School Adolescents. It adopted a pre-test, post-test, control quasi-experimental research design with a 2x2 factorial matrix. Participants included 120 depressed adolescents randomly drawn from public Senior Secondary School Two (SSS.II) students in Lagos State, Nigeria. Sixty participants were randomly selected and assigned to the treatment and control groups. Participants in the Cognitive Reframe (CR) group were trained for 8 weeks, while those in the Control group were given a placebo. Two instruments were used for data collection namely: Self – Esteem Scale (SES: Rosenberg 1965: α = 0.85), and The Self Rating Depression Scale (SDS: Zung, 1972; α 0 = 0.87) were administered at pretest level. However, only the Self-Rating Depression Scale (SDS) was re-administered at post-test to measure the effect of the intervention. The results revealed that there was a significant effect of cognitive reframe training programmes on secondary school adolescents’ depression, also there were significant effects of self-esteem on secondary school adolescents’ depression. The study showed that the technique is capable of reducing depression among adolescents. It was recommended, amongst others, that Counselling psychologists, Curriculum planners and Teachers could explore incorporating the contents of cognitive reframe into the secondary school curriculum for students’ capacity building to reduce depression tendencies.Keywords: adolescents, cognitive reframe, depression, self – esteem
Procedia PDF Downloads 28222 Learners’ Characteristics as Correlates of Effective English Language Teaching in English as a Second Language Classroom
Authors: Jimoh Olumide Yusuf
Abstract:
Various factors have continued to bedevil the effective teaching and learning of English Language in Nigeria and prominent among these factors are learners’ characteristics. Unfortunately, these particular factors seem to have recorded paucity of research efforts by scholars and the problem of lack of proficiency in the target language continues to linger. This study therefore investigates the relationship between specific learners’ characteristics and effective teaching of English as a Second Language (ESL) in senior secondary schools in Nigeria. To this end, Self-Determination, and Integrative Motivation Theories were applied to investigate motivation, language learning, learners’ characteristics and its relationship to language proficiency. A survey of 500 students and 100 English Language teachers across 20 schools was conducted. Descriptive statistics was used to analyze the data and findings revealed that; specific learners’ characteristics such as learners’ age, learning style and motivation significantly determine the performance of students in English Language. Specifically, students with appropriate school age, visual learning style and intrinsic motivation, demonstrated English Language proficiency; as they performed better than students with extrinsic motivation, audio and kinaesthetic learning styles. Moreover, teachers related factors such as teaching experience; teaching strategies and teachers’ extrinsic motivation also emerged as essential correlates of effective language teaching. The findings conclude that learning characteristics are significant factors that should be considered by the teachers and education planners for adequate, sequential and effective implementation of the ESL curriculum in Nigeria.Keywords: senior secondary school, English as a second language, intrinsic motivation, Kinaesthetic learning style
Procedia PDF Downloads 1721 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems
Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu
Abstract:
Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system
Procedia PDF Downloads 29720 An Intelligent Scheme Switching for MIMO Systems Using Fuzzy Logic Technique
Authors: Robert O. Abolade, Olumide O. Ajayi, Zacheaus K. Adeyemo, Solomon A. Adeniran
Abstract:
Link adaptation is an important strategy for achieving robust wireless multimedia communications based on quality of service (QoS) demand. Scheme switching in multiple-input multiple-output (MIMO) systems is an aspect of link adaptation, and it involves selecting among different MIMO transmission schemes or modes so as to adapt to the varying radio channel conditions for the purpose of achieving QoS delivery. However, finding the most appropriate switching method in MIMO links is still a challenge as existing methods are either computationally complex or not always accurate. This paper presents an intelligent switching method for the MIMO system consisting of two schemes - transmit diversity (TD) and spatial multiplexing (SM) - using fuzzy logic technique. In this method, two channel quality indicators (CQI) namely average received signal-to-noise ratio (RSNR) and received signal strength indicator (RSSI) are measured and are passed as inputs to the fuzzy logic system which then gives a decision – an inference. The switching decision of the fuzzy logic system is fed back to the transmitter to switch between the TD and SM schemes. Simulation results show that the proposed fuzzy logic – based switching technique outperforms conventional static switching technique in terms of bit error rate and spectral efficiency.Keywords: channel quality indicator, fuzzy logic, link adaptation, MIMO, spatial multiplexing, transmit diversity
Procedia PDF Downloads 15119 Effect of Rice Husk Ash and Metakaolin on the Compressive Strengths of Ternary Cement Mortars
Authors: Olubajo Olumide Olu
Abstract:
This paper studies the effect of Metakaolin (MK) and Rice husk ash (RHA) on the compressive strength of ternary cement mortar at replacement level up to 30%. The compressive strength test of the blended cement mortars were conducted using Tonic Technic compression and machine. Nineteen ternary cement mortars were prepared comprising of ordinary Portland cement (OPC), Rice husk ash (RHA) and Metakaolin (MK) at different proportion. Ternary mortar prisms in which Portland cement was replaced by up to 30% were tested at various age; 2, 7, 28 and 60 days. Result showed that the compressive strength of the cement mortars increased as the curing days were lengthened for both OPC and the blended cement samples. The ternary cement’s compressive strengths showed significant improvement compared with the control especially beyond 28 days. This can be attributed to the slow pozzolanic reaction resulting from the formation of additional CSH from the interaction of the residual CH content and the silica available in the Metakaolin and Rice husk ash, thus providing significant strength gain at later age. Results indicated that the addition of metakaolin with rice husk ash kept constant was found to lead to an increment in the compressive strength. This can either be attributed to the high silica/alumina contribution to the matrix or the C/S ratio in the cement matrix. Whereas, increment in the rice husk ash content while metakaolin was held constant led to an increment in the compressive strength, which could be attributed to the reactivity of the rice husk ash followed by decrement owing to the presence of unburnt carbon in the RHA matrix. The best compressive strength results were obtained at 10% cement replacement (5% RHA, 5% MK); 15% cement replacement (10% MK and 5% RHA); 20% cement replacement (15% MK and 5% RHA); 25% cement replacement (20% MK and 5% RHA); 30% cement replacement (10%/20% MK and 20%/10% RHA). With the optimal combination of either 15% and 20% MK with 5% RHA giving the best compressive strength of 40.5MPa.Keywords: metakaolin, rice husk ash, compressive strength, ternary mortar, curing days
Procedia PDF Downloads 34718 Intelligent Parking Systems for Quasi-Close Communities
Authors: Ayodele Adekunle Faiyetole, Olumide Olawale Jegede
Abstract:
This paper presents the experimental design and needs justifications for a localized intelligent parking system (L-IPS), ideal for quasi-close communities with increasing vehicular volume that depends on limited or constant parking facilities. For a constant supply in parking facilities, the demand for an increasing vehicular volume could lead to poor time conservation or extended travel time, traffic congestion or impeded mobility, and safety issues. Increased negative environmental and economic externalities are other associated and consequent downsides of disparities in demand and supply. This L-IPS is designed using a microcontroller, ultrasonic sensors, LED indicators, such that the current status, in terms of parking spots availability, can be known from the main entrance to the community or a parking zone on a LCD screen. As an advanced traffic management system (ATMS), the L-IPS is designed to resolve aspects of infrastructure-to-driver (I2D) communication and parking detection issues. Thus, this L-IPS can act as a timesaver for users by helping them know the availability of parking spots. Providing on-time, informed routing, to a next preference or seamless moving to berth on the available spot on a proximate facility as the case may be. Its use could also increase safety and increase mobility, and fuel savings and costs, therefore, reducing negative environmental and economic externalities due to transportation systems.Keywords: intelligent parking systems, localized intelligent parking system, intelligent transport systems, advanced traffic management systems, infrastructure-to-drivers communication
Procedia PDF Downloads 16917 Diversities, Antibiogram and Antibiotic Resistance Genes in Staphylococcus Species in Raw Meat from a Research Farm
Authors: Anthony Ayodeji Adegoke, Olayinka Ayobami Aiyegoro, Thor Axel Stenstrom
Abstract:
A study to investigate the species diversities, antibiogram and antibiotic resistance genes in Staphylococcus species from raw meat and dairy products collected from an abattoir and a farm shop of a research institute in Irene, South Africa over a six-month period was conducted. Polymerase Chain Reaction was used to speciate the bacteria and to detect the presence and otherwise of resistance genes. Antibiotic susceptibility testing was performed by disk diffusion method on Mueller-Hinton agar according to the Clinical Laboratory Standards Institute standards. A total of twenty-six (26) antibiotics were used to determine the antibiotic susceptibility. S. xylosus was the predominant isolate with 30% total occurrence, followed by S. epidermis, S. aureus, S. saprophyticus and S. haemolyticus with 25%, 15%, 15%, and 10% abundance respectively. The isolates were resistant to ceftezidime, gentamycin, nalidixic acid, nortrafuration, ampicillin, penicillin, oxytetracycline, tetracycline, doxycycline, clindamycin and lincomycin. mecA genes was detected among the methicillin resistant Staphylococcus species (MRSS) but no vancomycin resistance genes (van A and van B) were detected in these isolates. The presence of MRSS and multidrug resistant Staphylococcus species in meat affirms the need to avoid consumption of partially cooked meat currently rampant in South Africa, to avoid the spread of difficult to control pathogens in epidemiological proportion.Keywords: Staphylococcus species, antibiotics, antibiotic resistance genes, food products, methicillin resistance, mecA gene
Procedia PDF Downloads 29816 Aggressive Behaviour and Its Association with Substance Use Disorder among Senior Secondary School Students in Ilesha, Nigeria
Authors: Famurewa Olumide Joseph, Akinsulore Adesanmi
Abstract:
The current study investigated aggressive behaviour and its association with substance use disorder among senior secondary school students in Ilesha, Nigeria. Participants were three hundred and seventy-five (375) comprising (212) females and (163) males of senior secondary school students in Ilesa East and Ilesa West; who were randomly selected among the population of students from the schools. The mean age of the respondents was 14.61 years (S.D = 1.16), with 311 (82.9%) between 14 – 16 years. Female respondents were 212 (56.5%), while male respondents were 163 (43.5%). A cross sectional design was adopted. Three instruments were used for data collection. Buss Perry Aggression Questionnaire, Alcohol Use Disorder Identification Test (AUDIT) and Drug Abuse Screening Test (DAST). It was hypothesized that aggressive behaviour will be associated with substance use disorder among senior secondary school students in Ilesa East and Ilesa West. The result indicated that the overall prevalence of substance use disorder was 16.0%. Chi-Square test exploring the association between aggressive behaviour and substance use disorder shows that there is a significant association between aggressive behaviour and substance use disorder (χ2 =8.55, p =0.014). Results also showed that emotional problem (χ2 (2) =13.0; p = 0.001) was statistically significant while current medications intake (χ2 (2) =2.03; p =0.362) and overall wellbeing (χ2 (4) =2.49; p =0.646) were not statistically significant. There is an inverse association between prosocial behaviour and aggressive behaviour (r= -0.037, p>0.05). This indicates that as the level of prosocial behaviour increases, the level of aggressive behaviour among respondents decreases. However, alcohol use had no correlation with aggressive behaviour (r=0.070, p>0.05). Among the implications stated is that factors such as emotional symptoms, conduct problems, hyperactivity, peer problem and drug use contributed to the prevalence of aggressive behaviour among students. Suggestions for further studies were equally made.Keywords: aggressive behaviour, alcohol, prevalence, students, substance use disorder (SUD)
Procedia PDF Downloads 8615 Geothermal Energy Potential Estimates of Niger Delta Basin from Recent Studies
Authors: Olumide J. Adedapo
Abstract:
In this work, geothermal energy resource maps of the Niger Delta Basin were constructed using borehole thermal log data from over 300 deep wells. Three major geothermal anomalies were delineated and quantitatively interpreted in both onshore and offshore parts of the Niger Delta. The geothermal maps present the distribution of geothermal energy stored in the sedimentary rock mass in two ways: the accessible resources in depth interval 0-4000 m and static geothermal energy resources stored in the complete sedimentary infill of the basin (from the ground surface to the basement). The first map shows two major onshore anomalies, one in the north (with maximum energy values, 800 GJ/m2), another in the east to northeastern part (maximum energy values of 1250–1500 GJ/m2). Another two major anomalies occur offshore, one in the south with values of 750-1000 GJ/m2, occurring at about 100 km seawards and the other, in the southwest offshore with values 750-1250 GJ/m2, still at about 100 km from the shore. A second map of the Niger Delta shows a small anomaly in the northern part with the maximum value of 1500 GJ/m2 and a major anomaly occurring in the eastern part of the basin, onshore, with values of 2000-3500 GJ/m2. Offshore in the south and southwest anomalies in the total sedimentary rock mass occur with highest values up to 4000GJ/m2, with the southwestern anomaly extending west to the shore. It is much of interest to note the seaward–westward extension of these anomalies both in size, configuration, and magnitude for the geothermal energy in the total sedimentary thickness to the underlying basement. These anomalous fields show the most favourable locations and areas for further work on geothermal energy resources.Keywords: geothermal energy, offshore, Niger delta, basin
Procedia PDF Downloads 21214 Implications of Dehusking and Aqueous Soaking on Anti-nutrients, Phytochemical Screening and Antioxidants Properties of Jack Beans (Canavalia Ensiformis L. DC)
Authors: Oseni Margaret Oladunni, Ogundele Joan Olayinka, Olusanya Olalekan Samuel, Akinniyi Modupe Olakintan
Abstract:
The world's growing population is pushing humans to look for alternative food sources among underutilised or wild plants. One of these food sources has been identified as Canavalia enisiformis, or jack beans. The only issue with using jack beans is that they contain anti-nutrient chemicals, which must be removed or diminished in order for them to be fit for human consumption. The objective of this study is to determine the nutritional and industrial utility of Canavalia enisiformis by analysing the anti-nutrient, phytochemical, and antioxidant composition of raw whole seed and soaking dehusked seeds using established procedures. Phytate (23.48±0.24, 15.24±0.41 and 14.83±0.00), oxalate (4.32±0.09, 3.96±0.09 and 2.88±0.09), tannins (22.77±0.73, 18.68±0.03 and 17.50±0.46), and lectins (6.67±0.04, 6.20±0.01 and 6.42±0.07) exhibited the highest anti-nutrient values in raw whole seed and, at the very least, in dehusked, soaked seeds. The samples were subjected to phytochemical screening, which detected the presence of cardiac glycosides as well as anthraquinones, alkaloids, tannins, saponins, steroids, flavonoids, terpenoids, phlobatannins, and flavonoids. Due to the reduction in phytochemical contents quantified as a result of dehusking and soaking, phenolbatannins and anthraquinones were not found in the samples. The research findings also demonstrated elevated concentrations of several plausible phytochemical components with potential medical value, with the raw whole seed exhibiting the greatest capacity to scavenge free radicals. Accordingly, the study's findings validate the seed's therapeutic applications and imply that it might be an inexpensive source of antioxidants for humans and animals alike.Keywords: dehusking, soaking, anti-nutrients, antioxidants, jack bean
Procedia PDF Downloads 4713 Maternal Care Practices on Nutritional Status of Pre School Children in Dass Local Government Area of Bauchi State, Nigeria
Authors: Adebusoye Michael, Okunola Olayinka, Owolabi Abdulateef, Jacob Anayo
Abstract:
Introduction: Child undernutrition remains one of Africa’s most fundamental challenges for improved human development because the time and capacities of caregivers are limited; far too many children are unable to access effectively amenities they need for a healthy life. Methods and procedures: This cross-sectional, descriptive study evaluated the maternal care practices on nutritional status of pre-school children, 150 mothers were selected by systematic random sampling in Dass L.G.A., Bauchi-State, Nigeria. Information on relevant parameters were collected by questionaire, analysed by various indices of descriptive statistics using SPSS version 16.0.Spearman’s rank correlation was used to test for associations between the variables. Results: Thirty-five (23.3%) of the respondents were aged 21-25 years. Thirty-three (28.0%) had secondary education, while forty-nine (32.7%) were full housewives. Majority 79(52.7) earned NI,000- N10,000 monthly versus 10(6.7%) who earned N11,000- N20,000.113(75.3%) married while 7(4.7%) of respondents were separated. Sixty-one (40.7%) practiced exclusive breastfeeding within six months. Only seventy-one (47.3%) initiated breastfeeding between 7 and 13 months. Five (3.3%) of children were mildly underweight while nine (6.0%) were severely stunted. Conclusion: The outcome suggested that working time of mothers is a major determinant on their child nutritional status. However, there is a significant relationship on the working time of mothers, income level and educational level of mothers to the nutritional status of their children (P<0.05). Recommendation: Good policy programmes should aim at eradicating poverty, better child care practices that would reduce malnutrition among under-five children.Keywords: maternal care, nutritional status, preschool children, Dass L.G.A.
Procedia PDF Downloads 61012 Making Permanent Supportive Housing Work for Vulnerable Populations
Authors: Olayinka Ariba, Abe Oudshoorn, Steve Rolfe, Carrie Anne Marshall, Deanna Befus, Jason Gilliland, Miranda Crockett, Susana Caxaj, Sarah McLean, Amy Van Berkum, Natasha Thuemler
Abstract:
Background: Secure housing is a platform for health and well-being. Those who struggle with housing stability have complex life and health histories and often require some support services such as the provision of permanent supportive housing. Poor access to supportive resources creates an exacerbation of chronic homelessness, particularly affecting individuals who need immediate access to mental health and addiction supports. This paper presents the first phase of a three-part study examining how on-site support impacts housing stability for recently-re-housed persons. Method: This study utilized a community-based participatory research methodology. Twenty in-depth interviews were conducted with permanent supportive housing residents from a single-site dwelling. Interpretative description analysis was used to draw common themes and understand the experiences and challenges of housing support. Results: Three interconnected themes were identified: 1) Available and timely supports; 2) Affordability; and 3) Community, but with independence as desired. These interconnected components are helping residents transition from homelessness or long-term mental health inpatient care to live in the community. Despite some participant concerns about resident conflicts, staff availability, and affordability, this has been a welcome and successful move for most. Conclusion: Supportive housing is essential for successful tenancies as a platform for health and well-being among Canada’s most vulnerable and, from the perspective of persons recently re-housed, permanent supportive housing is a worthwhile investment.Keywords: homelessness, supportive housing, rehoused, housing stability
Procedia PDF Downloads 10511 Value Chain Network: A Social Network Analysis of the Value Chain Actors of Recycled Polymer Products in Lagos Metropolis, Nigeria
Authors: Olamide Shittu, Olayinka Akanle
Abstract:
Value Chain Analysis is a common method of examining the stages involved in the production of a product, mostly agricultural produce, from the input to the consumption stage including the actors involved in each stage. However, the Functional Institutional Analysis is the most common method in literature employed to analyze the value chain of products. Apart from studying the relatively neglected phenomenon of recycled polymer products in Lagos Metropolis, this paper adopted the use of social network analysis to attempt a grounded theory of the nature of social network that exists among the value chain actors of the subject matter. The study adopted a grounded theory approach by conducting in-depth interviews, administering questionnaires and conducting observations among the identified value chain actors of recycled polymer products in Lagos Metropolis, Nigeria. The thematic analysis of the collected data gave the researchers the needed background to formulate a truly representative network of the social relationships among the value chain actors of recycled polymer products in Lagos Metropolis. The paper introduced concepts such as Transient and Perennial Social Ties to explain the observed social relations among the actors. Some actors have more social capital than others as a result of the structural holes that exist in their triad network. Households and resource recoverers are at disadvantaged position in the network as they have high constraints in their relationships with other actors. The study attempted to provide a new perspective in the study of the environmental value chain by analyzing the network of actors to bring about policy action points and improve recycling in Nigeria. Government and social entrepreneurs can exploit the structural holes that exist in the network for the socio-economic and sustainable development of the state.Keywords: recycled polymer products, social network analysis, social ties, value chain analysis
Procedia PDF Downloads 40810 Investigation of Geothermal Gradient of the Niger Delta from Recent Studies
Authors: Adedapo Jepson Olumide, Kurowska Ewa, K. Schoeneich, Ikpokonte A. Enoch
Abstract:
In this paper, subsurface temperature measured from continuous temperature logs were used to determine the geothermal gradient of NigerDelta sedimentary basin. The measured temperatures were corrected to the true subsurface temperatures by applying the American Association of Petroleum Resources (AAPG) correction factor, borehole temperature correction factor with La Max’s correction factor and Zeta Utilities borehole correction factor. Geothermal gradient in this basin ranges from 1.20C to 7.560C/100m. Six geothermal anomalies centres were observed at depth in the southern parts of the Abakaliki anticlinorium around Onitsha, Ihiala, Umuaha area and named A1 to A6 while two more centre appeared at depth of 3500m and 4000m named A7 and A8 respectively. Anomaly A1 describes the southern end of the Abakaliki anticlinorium and extends southwards, anomaly A2 to A5 were found associated with a NW-SE structural alignment of the Calabar hinge line with structures describing the edge of the Niger Delta basin with the basement block of the Oban massif. Anomaly A6 locates in the south-eastern part of the basin offshore while A7 and A8 are located in the south western part of the basin offshore. At the average exploratory depth of 3500m, the geothermal gradient values for these anomalies A1, A2, A3, A4, A5, A6, A7, and A8 are 6.50C/100m, 1.750C/100m, 7.50C/100m, 1.250C/100m, 6.50C/100m, 5.50C/100m, 60C/100m, and 2.250C/100m respectively. Anomaly A8 area may yield higher thermal value at greater depth than 3500m. These results show that anomalies areas of A1, A3, A5, A6 and A7 are potentially prospective and explorable for geothermal energy using abandoned oil wells in the study area. Anomalies A1, A3.A5, A6 occur at areas where drilled boreholes were not exploitable for oil and gas but for the remaining areas where wells are so exploitable there appears no geothermal anomaly. Geothermal energy is environmentally friendly, clean and reversible.Keywords: temperature logs, geothermal gradient anomalies, alternative energy, Niger delta basin
Procedia PDF Downloads 2789 Personalization of Context Information Retrieval Model via User Search Behaviours for Ranking Document Relevance
Authors: Kehinde Agbele, Longe Olumide, Daniel Ekong, Dele Seluwa, Akintoye Onamade
Abstract:
One major problem of most existing information retrieval systems (IRS) is that they provide even access and retrieval results to individual users specially based on the query terms user issued to the system. When using IRS, users often present search queries made of ad-hoc keywords. It is then up to IRS to obtain a precise representation of user’s information need, and the context of the information. In effect, the volume and range of the Internet documents is growing exponentially and consequently causes difficulties for a user to obtain information that precisely matches the user interest. Diverse combination techniques are used to achieve the specific goal. This is due, firstly, to the fact that users often do not present queries to IRS that optimally represent the information they want, and secondly, the measure of a document's relevance is highly subjective between diverse users. In this paper, we address the problem by investigating the optimization of IRS to individual information needs in order of relevance. The paper addressed the development of algorithms that optimize the ranking of documents retrieved from IRS. This paper addresses this problem with a two-fold approach in order to retrieve domain-specific documents. Firstly, the design of context of information. The context of a query determines retrieved information relevance using personalization and context-awareness. Thus, executing the same query in diverse contexts often leads to diverse result rankings based on the user preferences. Secondly, the relevant context aspects should be incorporated in a way that supports the knowledge domain representing users’ interests. In this paper, the use of evolutionary algorithms is incorporated to improve the effectiveness of IRS. A context-based information retrieval system that learns individual needs from user-provided relevance feedback is developed whose retrieval effectiveness is evaluated using precision and recall metrics. The results demonstrate how to use attributes from user interaction behavior to improve the IR effectiveness.Keywords: context, document relevance, information retrieval, personalization, user search behaviors
Procedia PDF Downloads 4618 To Include or Not to Include: Resolving Ethical Concerns over the 20% High Quality Cassava Flour Inclusion in Wheat Flour Policy in Nigeria
Authors: Popoola I. Olayinka, Alamu E. Oladeji, B. Maziya-Dixon
Abstract:
Cassava, an indigenous crop grown locally by subsistence farmers in Nigeria has potential to bring economic benefits to the country. Consumption of bread and other confectionaries has been on the rise due to lifestyle changes of Nigerian consumers. However, wheat, being the major ingredient for bread and confectionery production does not thrive well under Nigerian climate hence the huge spending on wheat importation. To reduce spending on wheat importation, the Federal Government of Nigeria intends passing into law mandatory inclusion of 20% high-quality cassava flour (HQCF) in wheat flour. While the proposed policy may reduce post harvest loss of cassava, and also increase food security and domestic agricultural productivity, there are downsides to the policy which include reduction in nutritional quality and low sensory appeal of cassava-wheat bread, reluctance of flour millers to use HQCF, technology and processing challenges among others. The policy thus presents an ethical dilemma which must be resolved for its successful implementation. While inclusion of HQCF to wheat flour in bread and confectionery is a topic that may have been well addressed, resolving the ethical dilemma resulting from the act has not received much attention. This paper attempts to resolve this dilemma using various approaches in food ethics (cost benefits, utilitarianism, deontological and deliberative). The Cost-benefit approach did not provide adequate resolution of the dilemma as all the costs and benefits of the policy could not be stated in the quantitative term. The utilitarianism approach suggests that the policy delivers greatest good to the greatest number while the deontological approach suggests that the act (inclusion of HQCF to wheat flour) is right hence the policy is not utterly wrong. The deliberative approach suggests a win-win situation through deliberation with the parties involved.Keywords: HQCF, ethical dilemma, food security, composite flour, cassava bread
Procedia PDF Downloads 406