1,393 research outputs found

    French Studies In Nigerian Private Universities: A Case Study Of Covenant University

    Get PDF
    In Nigeria there is this restricted view that ‘French’ as a discipline has to do with just the study of French language as a means of communication. Consequently, there is usually low subscription with regard to the study of French in Nigerian Private Universities, where the school fee is relatively high. In the Federal and State Universities where the fee is low and subscription higher, most of the candidates that take up French as a programme of study, do so out of desperation. They resort to French just to be in the university. The choice of this topic is therefore largely out of a desire to contextualize ‘French studies’ as a discipline, highlight its status and challenges at Covenant University, sensitize the Nigerian public on the necessity of French studies in Nigeria by highlighting its relevance to the nation for a global impact. Furthermore, as Covenant University is poised to raise a new generation of leaders and with its present continuous drive for Innovation, Impact and Internationalization, this paper intends to disabuse the minds of Nigerians of the notion that French is merely the study of the language as a means of communication. We conclude by proffering solutions to the challenges, proposing the way forward and showing the benefits that accrue to students that study French as a discipline

    Dance of Attrition and Resistance: Semiotics of Gender Stratification in Three Suitors, One Husband, and Until Further Notice

    Get PDF
    This study is an assessment of African social structures through the lens of structuralist ideology by examining the opposing binaries of gender conflict which are eyjdcnt in the literature of colonised societies because the intersection of gender and power structm·e in societies is · often reflected in fictional literature of the region. The mythic establishment of patriarchal systems dominated the writings that predated the evolution of feminism and portrayed female subjugation as the status quo; a position wruch in retrospect reveals the rift underlying the conb:oversy of gender relations in contemporary African societies; especially in trado-western marriage systems. This article draws attention to the iilltializmg symbols of dominance which are celebrated during marriage c~remonics and how these act as endorsement for the gender subjugation of the woman wjthin the marriage itself. The tripartite semiotic system of the sign; the index; and the symbol of Peircian philosophy are employed for the purpose of analysis in this regard. The work focuses on the importance of gestural signifiers of inequality and reveals the potential danger of female attrition that lies in downplaying the unspoken and intrinsic power which subjugation practices in marriage ceremonies symbolize. The choice of the play is informed by the playwright's unique fusion of satiric irony and gestural d)rnmnics to portray gender stratification The work should bridge the gap in the dearth of literature that aims to deconstruct gender characterization m African dramaturgy

    Factors affecting thrips resistance in cabbage

    Get PDF
    In two field experiments in the Netherlands the development of thrips populations and thrips damage in ten cabbage varieties was monitored. Also a number of morphological, physiological en biochemical plant traits were measured. The most important factors leading to a low level of thrips dam-age were a late development of a compact head, a low dry matter content and a high amount of leaf wax

    Discovering a junction tree behind a Markov network by a greedy algorithm

    Full text link
    In an earlier paper we introduced a special kind of k-width junction tree, called k-th order t-cherry junction tree in order to approximate a joint probability distribution. The approximation is the best if the Kullback-Leibler divergence between the true joint probability distribution and the approximating one is minimal. Finding the best approximating k-width junction tree is NP-complete if k>2. In our earlier paper we also proved that the best approximating k-width junction tree can be embedded into a k-th order t-cherry junction tree. We introduce a greedy algorithm resulting very good approximations in reasonable computing time. In this paper we prove that if the Markov network underlying fullfills some requirements then our greedy algorithm is able to find the true probability distribution or its best approximation in the family of the k-th order t-cherry tree probability distributions. Our algorithm uses just the k-th order marginal probability distributions as input. We compare the results of the greedy algorithm proposed in this paper with the greedy algorithm proposed by Malvestuto in 1991.Comment: The paper was presented at VOCAL 2010 in Veszprem, Hungar

    Mean-field analysis of a dynamical phase transition in a cellular automaton model for collective motion

    Get PDF
    A cellular automaton model is presented for random walkers with biologically motivated interactions favoring local alignment and leading to collective motion or swarming behavior. The degree of alignment is controlled by a sensitivity parameter, and a dynamical phase transition exhibiting spontaneous breaking of rotational symmetry occurs at a critical parameter value. The model is analyzed using nonequilibrium mean field theory: Dispersion relations for the critical modes are derived, and a phase diagram is constructed. Mean field predictions for the two critical exponents describing the phase transition as a function of sensitivity and density are obtained analytically.Comment: 4 pages, 4 figures, final version as publishe

    Developing an Algorithm for Securing the Biometric Data Template in the Database

    Get PDF
    This research article published by the International Journal of Advanced Computer Science and Applications, Vol. 10, No. 10, 2019In the current technology advancement, biometric template provides a dependable solution to the problem of user verification in an identity control system. The template is saved in the database during the enrollment and compared with query information in the verification stage. Serious security and privacy concerns can arise, if raw, unprotected data template is saved in the database. An attacker can hack the template information in the database to gain illicit access. A novel approach of encryption-decryption algorithm utilizing a design pattern of Model View Template (MVT) is developed to secure the biometric data template. The model manages information logically, the view shows the visualization of the data, and the template addresses the data migration into pattern object. The established algorithm is based on the cryptographic module of the Fernet key instance. The Fernet keys are combined to generate a multiFernet key to produce two encrypted files (byte and text file). These files are incorporated with Twilio message and securely preserved in the database. In the event where an attacker tries to access the biometric data template in the database, the system alerts the user and stops the attacker from unauthorized access, and cross-verify the impersonator based on the validation of the ownership. Thus, helps inform the users and the authority of, how secure the individual biometric data template is, and provided a high level of the security pertaining the individual data privac

    A study of users’ compliance and satisfied utilization of biometric application system

    Get PDF
    This research article published by Taylor & Francis Online, 2020Currently, the adoption rate of biometric technology has speedily grown in all applications. The technology is considered as an effective measure for the protection against crime. However, there is a concern that it violates the privacy and rights of the individuals. For instance, the possibility of fraud, identity theft, civil liberty violations, and inaccuracy of data. As a result, create the conflicts between service provider and public as they may be accused of a crime or become a victim of discrimination. This study constitutes exploratory research and is restricted to the usage of the biometric application system within the passport. It aims at discovering the substantial acceptance of users in implementing the biometric application for the East African passport (Uganda). Factor influencing users’ opinions regarding the acceptance of the biometric application, User willingness, trust and techniques for securing the biometric information are presented. Strategies aimed at regulating the protection of biometric data on the usage of the application are explained. The findings suggested encryption techniques as the most favorable tactic of protecting the biometric data application. Therefore, best practices such as individual desirability, practical accurateness, and eagerness are required

    A world of cobenefits : solving the global nitrogen challenge

    Get PDF
    Houlton, Benjamin Z. University of California. John Muir Institute of the Environment. Davis, CA, USA.Houlton, Benjamin Z. University of California. Department of Land, Air and Water Resources. Davis, CA, USA.Almaraz, Maya. University of California. Department of Land, Air and Water Resources. Davis, CA, USA.Aneja, Viney. North Carolina State University at Raleigh. Department of Marine, Earth, and Atmospheric Sciences. Raleigh, NC, USA.Austin, Amy T. Universidad de Buenos Aires. Facultad de Agronomía. Instituto de Investigaciones Fisiológicas y Ecológicas Vinculadas a la Agricultura (IFEVA). Buenos Aires, Argentina.Austin, Amy T. CONICET – Universidad de Buenos Aires. Instituto de Investigaciones Fisiológicas y Ecológicas Vinculadas a la Agricultura (IFEVA). Buenos Aires, Argentina.Bai, Edith. Chinese Academy of Sciences. Institute of Applied Ecology. CAS Key Laboratory of Forest Ecology and Management. Shenyang, China.Bai, Edith. Northeast Normal University. School of Geographical Sciences. Changchun, China.Cassman, Kenneth. University of Nebraska – Lincoln. Department of Agronomy and Horticulture. Lincoln. NE, USA.Compton, Jana E. Environmental Protection Agency. Western Ecology Division. Washington, DC, USA.Davidson, Eric A. University of Maryland Center for Environmental Science. Appalachian Laboratory. Cambridge, MD, USA.865-872Nitrogen is a critical component of the economy, food security, and planetary health. Many of the world's sustainability targets hinge on global nitrogen solutions, which, in turn, contribute lasting benefits for (i) world hunger; (ii) soil, air, and water quality; (iii) climate change mitigation; and (iv) biodiversity conservation. Balancing the projected rise in agricultural nitrogen demands while achieving these 21st century ideals will require policies to coordinate solutions among technologies, consumer choice, and socioeconomic transformation
    • 

    corecore