272 research outputs found

    Influence of Training Levels of Private Security Service Providers in Crime Prevention in Lurambi Sub-County, Kenya

    Get PDF
    This study aimed to examine the role of private security providers in crime prevention in Lurambi Sub-County, Kenya. The study was necessitated by private security providers' presence and use to protect life, property, and maintenance of law and order in Lurambi Sub-County, Kakamega County, Kenya. The Routine Activity and Situational Crime Prevention Theories of criminology informed the study. Specifically, this study intended to establish resource availability for private security service providers in crime prevention in Lurambi Sub-county, Kenya. The study adopted descriptive and correlational research designs. The primary target population constituted 358 respondents, both male and female, drawn from six registered and regulated private security service providers in Lurambi Sub-County, 5 senior police officers in charge of security, police administration, and 4 police stations across Lurambi Sub-County, and 133 clients of private security services. Purposive sampling was used to identify the 6 registered and licensed private security firms which provided the study population. Proportionate sampling with a statistical framework of 30% was used to identify 108 private security service providers who formed the sample size to ensure that the private security officers from the 6 firms were represented in the same proportion that they existed within the population. Questionnaires were used to collect data from three groups of respondents, including 108 private security officers, 6 managers each in charge of each private security firm that participated in the study, and 40 clients sampled from the 6 private security firms that participated in the study. Interview guides were used to collect data from 5 senior police officers in charge of security, police administration, and 4 police stations spread across Lurambi Sub-County. The study findings revealed that private security service providers were not adequately trained, hence impacting crime prevention negatively in Lurambi Sub-County. The study recommended that private security service providers consider providing relevant and timely training programs to strengthen crime prevention efforts. Key Terms: Training Levels, Private Security, Crime Prevention DOI: 10.7176/PPAR/11-6-04 Publication date:July 31st 202

    The Role of Private Security Service Providers in Crime Prevention; A Study of Lurambi Sub-County, Kenya

    Get PDF
    This study aimed to examine the role of private security providers in crime prevention in Lurambi Sub-County, Kenya. The study was necessitated by private security providers' presence and use to protect life, property, and maintenance of law and order in Lurambi Sub-County, Kakamega County, Kenya. The Routine Activity and Situational Crime Prevention Theories of criminology informed the study. Specifically, this study intended to establish resource availability for private security service providers in crime prevention in Lurambi Sub-county, Kenya. The study adopted descriptive and correlational research designs. The primary target population constituted 358 respondents, both male and female, drawn from six registered and regulated private security service providers in Lurambi Sub-County, 5 senior police officers in charge of security, police administration, and 4 police stations across Lurambi Sub-County, and 133 clients of private security services. Purposive sampling was used to identify the 6 registered and licensed private security firms which provided the study population. Proportionate sampling with a statistical framework of 30% was used to identify 108 private security service providers who formed the sample size to ensure that the private security officers from the 6 firms were represented in the same proportion that they existed within the population. Questionnaires were used to collect data from three groups of respondents, including 108 private security officers, 6 managers each in charge of each private security firm that participated in the study, and 40 clients sampled from the 6 private security firms that participated in the study. Interview guides were used to collect data from 5 senior police officers in charge of security, police administration, and 4 police stations spread across Lurambi Sub-County. Study findings revealed that private security service providers in Lurambi Sub-County did not possess adequate resources needed to prevent crime. The study recommended that private security service providers should consider deploying adequate resources to strengthen crime prevention efforts. Key Terms: Private Security, Resources Availability, Crime Prevention DOI: 10.7176/PPAR/11-6-05 Publication date:July 31st 202

    Iris recognition method based on segmentation

    Get PDF
    The development of science and studies has led to the creation of many modern means and technologies that focused and directed their interests on enhancing security due to the increased need for high degrees of security and protection for individuals and societies. Hence identification using a person's vital characteristics is an important privacy topic for governments, businesses and individuals. A lot of biometric features such as fingerprint, facial measurements, acid, palm, gait, fingernails and iris have been studied and used among all the biometrics, in particular, the iris gets the attention because it has unique advantages as the iris pattern is unique and does not change over time, providing the required accuracy and stability in verification systems. This feature is impossible to modify without risk. When identifying with the iris of the eye, the discrimination system only needs to compare the data of the characteristics of the iris of the person to be tested to determine the individual's identity, so the iris is extracted only from the images taken. Determining correct iris segmentation methods is the most important stage in the verification system, including determining the limbic boundaries of the iris and pupil, whether there is an effect of eyelids and shadows, and not exaggerating centralization that reduces the effectiveness of the iris recognition system. There are many techniques for subtracting the iris from the captured image. This paper presents the architecture of biometric systems that use iris to distinguish people and a recent survey of iris segmentation methods used in recent research, discusses methods and algorithms used for this purpose, presents datasets and the accuracy of each method, and compares the performance of each method used in previous studie

    Fabrication of ZnO/nanobentonite as a new efficient adsorbent for rapid elimination of xylenol orange dye

    Get PDF
    A novel ZnO-nanobentonite (ZnO/NB) nanocomposite was successfully prepared using hexadecyltrimethylammonium bromide (HDTMA) as a surfactant and used as an efficient adsorbent to remove the xylenol orange (XO) from aqueous solutions. The fabricated nanocomposite was fully characterized by FTIR, FESEM, XRD, EDX, and BET measurements. The ZnO33%/NB sample with a high SBET and low total pore volume compared with the nanobentonite clay, based on BET results, indicated an increase in SBET due to the incorporation of ZnO nanoparticles into the layer of nanobentonite. For achieving the optimum condition, the effect of ZnO33%/NB sorbent dosage, initial pH, reaction time, and primary dye concentration, on XO dye elimination was investigated. The result show that the 97% elimination of XO dye occurred at optimum condition (40 mgl/l of dye concentration, pH 2, 15 mg of ZnO33%/NB adsorbent at 30 minutes), and the adsorption capacity and residual XO after treatment at this conditions is 48.5 and 1.2 ppm, respectively. Langmuir models and Freundlich model were used to studying the adsorption isotherms of the elimination process and results authenticated that XO dye adsorption followed the Langmuir model. Also, the recycling experiments showed that ZnO33%/NB adsorbent had more stability and recoverability. High adsorption capacity, simple fabrication method, short reaction time, and supreme reusability of ZnO33%/NB nanocomposite make it an effective sorbent for the elimination of XO dye from wastewaters

    Integrated Performance Optimization of Higher Education Buildings Using Low-Energy Renovation Process and User Engagement

    Get PDF
    Building performance improvement through low-energy renovation traditionally involves building performance diagnostics of the existing building, technology evaluation, selection and implementation. Effective building performance diagnostics, post-retrofit assessment and user engagement are essential to deliver performance as well as achieving socio-economic and environmental benefits at every stage of the renovation project life cycle. User’s views are often ignored when renovating a building, causing sub-optimal energy performance, user comfort and wellbeing. This paper seeks to critically evaluate the low-energy renovation process and the role of user and stakeholder engagement in the strategic implementation of low-energy retrofit technologies for performance improvement of higher education buildings. The research focuses on renovation methodology, innovative materials/systems and end-user engagement throughout the renovation project phases (pre-renovation, the renovation process and post renovation). A mixed research method was adopted, which includes building performance modelling, monitoring and user evaluation questionnaires pre and post-renovation. The research is part of European Union (EU)-funded project, targeting 50% reduction in energy consumption using innovative materials and technologies in existing public buildings. The surveys allow comparative analysis of comfort levels and user satisfaction as an indicator of the efficacy of renovation measures. A new renovation process and user engagement framework was developed. The findings suggest that there is a direct relationship between retrofit intervention, improving energy performance of low-carbon buildings and the comfort of occupants. The technologies and strategies also appear to have different impacts on user satisfaction

    Implementation of a Sustainable Security Architecture using Radio Frequency Identification (RFID) Technology for Access Control

    Full text link
    Implementation of a sustainable security architecture has been quite a challenging task with several technology deployed to achieve the feat. Automatic IDentification (Auto-ID) procedures exist to provide information about people, animals, goods and products in transit and found several applications in purchasing and distribution logistics, industries, manufacturing companies and material flow systems. This work focuses on the development and implementation of an access control system using Radio Frequency Identification (RFID) technology to enhance a sustainable security architecture. The system controls access into a restricted area by granting access only to authorized persons, which incorporates the RFID hardware (RFID tags and readers and their antennas) and the software. The antenna are to be configured for a read range of about 1.5 m and TMBE kit reader module was used to test the RFID tags. The encoding and decoding process for the reading and writing to the tag as well as interfacing of the hardware and software was achieved through the use of a FissaiD RFID Reader Writer. The software that controls the whole system was designed using in Java Language. The database required for saving the necessary information, staff/guest was designed using appropriate DataBase Management System (DBMS). The system designed and implemented provide records of all accesses (check-in and check-out) made into the restricted area with time records. Other than this system, Model based modeling through the MATLAB/Simulink, Arduino platform, etc. can be used for similar implementation.Comment: Presented at the 19th Annual National Conference of the School of Business Studies, Federal Polytechnic, Ede, 11 pages, 10 figure

    YAR-US relations 1962-1990: A case study of a superpower-small state relationship.

    Get PDF
    This study examines the nature of the relationship between a superpower and a small state, using as a case study that of the Yemen Arab Republic (YAR) and the USA. The period covered is the lifetime of the YAR from 26 September 1962 when the Republic was declared, to 22 May 1990, when the YAR was united with the People's Democratic Republic of Yemen (PDRY) to form the Republic of Yemen (ROY). After a brief examination of pre-revolutionary North Yemen-US contacts, which provide the backdrop to the relationship inherited by the Republic, Chapters 2-5 adopt a chronological approach to the different phases in the YAR-US interaction. The sixth chapter focuses on the economic dimension of the relationship. Beyond establishing a chronological account, this thesis analyzes several interrelated themes. It explores how the emergence of what was the first Republic in the Arabian Peninsula affected the balance of power in the Middle East and how this, in turn, affected US policy towards the region and towards Sana'a during the Cold War. In particular, it examines to what extent, if at all, the YAR benefitted from the bilateral relationship, and how this fitted in with the YAR government's overall foreign policy. It investigates the extent to which the YAR was subjected to US Middle Eastern and global policies. It further examines how international strategic rivalries between the superpowers and other interested nations affected the YAR and how Sana'a attempted to exploit and benefit from these rivalries and intersections. Other themes include the role played by the Yemeni people in affecting regional and international relations and the effect of regional religious differences on the YAR-US interaction. This study also studies how the YAR as a small state experienced a degree of freedom of manoeuvre in determining its own foreign policy

    Potato tissue resistance to the growth of Phytophthora infestans (Mont.) de Bary

    Get PDF
    This thesis describes an investigation of aspects of race nonspecific resistance which determines the rate at which tuber tissue is colonized by Phytophthora infestans. It was mainly concerned to deterimine whether active resistance mechanisms are involved or whether resistance could be explained by passive factors only. Five clones with different levels of race non-specific resistanc were used. Hyphal growth rates in all clones and in all tissues tested were similar and thus growth rate can play no part in the differences in race non-specific resistance between these clones. The growth rates in all experiments at all temperatures used were linear indicating that resistance does not involve active factors accumulating in the tissue ahead of the lesion to concentrations high enough to affect hyphal growth. Thus resistance to hyphal growth would appear to depend upon passive factors only. The growth rate on different media was always faster than that in tuber tissue indicating that hyphal growth in vivo may be affected by inhibitory factors, but if so, these factors are equally active in all clones. The total time required for the penetration and initiation of hyphal growth at the inoculated surface and for the establishment of visible sporulating mycelium on the opposite surface (Growth phases I and III) differed between clones and thus is a factor in the differences in race non-specific resistance 'between the clones. The rate of initiation and spread of lesions in the tubers differed between clones. These rates, in all clones, were slower than those calculated for the initiation of hyphal growth and for hyphal growth itself, indicating that the hyphae are growing ahead of the fluorescent tissue surrounding the nectoric tissue. The tuber tissues of the different clones were colonized to an equal extent and thus there was no evidence to indicate that active factors might accumulate to different levels in the tissues behind the hyphal front in the different clones and thus affect the extent to which lateral branches developed to further colonize the tissues. Hyphae were distributed non-randomly in the medullary tissue in the tubers and stems of Craigs Alliance and in the tubers of Pentland Dell and Pentland Squire, indicating that this tissue is not uniformly susceptible to colonization, but that there are pockets of tissue more resistant than others. Four types of haustoria were found in tuber and stem tissue but only two types were found in leaf tissue and there was no obvious relation between haustorial type and resistance. Haustoria were distributed non-randomly between cells indicating that cells may differ in their resistance to penetration. There were also differences between clones in total number of haustoria produced which appeared to be correlated with resistance to growth phases I and III and to resistance to lesion growth. Thus factors affecting haustorial formation may be important in the differences in race non-specific resistance between the clones

    Thermal properties variation of Malaysian yellowtail catfish during precooling process and numerical verification

    Get PDF
    Malaysian yellowtail catfish, which is widely consumed in Malaysia, was investigated to determine the thermal properties and their variation during precooling process. These properties encompassed thermal conductivity, specific heat and thermal diffusivity. The moisture, fat, protein, carbohydrate and ash contents of the fish muscle were determined in a fresh fish. Mathematical formulae, which correlated between the constituent values and the thermal properties, were used to determine these properties and their variation with temperature. The results were compared with the existing literature of other fishes. Slight differences were noticed, however, the results were still within the common range of fish thermal properties values. The differences may be attributed to the different growing conditions. Models correlated between the thermal properties and temperature variations were developed which are the basic requirements of solving heat transfer problems related to precooling process. These models were used in conjunction with Ansari’s empirical equation to predict temperature history at the midpoint of preassumed slab subjected to precooling process. When a typical real slab was tested experimentally in the precooling process, similar experimental temperature history at the mid point was observed

    The Effect of Audit Quality on Fraud Reduction: A Moderating Role of International Financial Reporting Standards (IFRS) Adoption in Malaysia and Indonesia

    Get PDF
    Purpose: This study examines the relationship between audit quality and fraud reduction as well as investigates the adoption of IFRS in developing countries which is Malaysia and Indonesia to provide a comparison between IFRS adopter (Malaysia) and non-adopter (Indonesia) countries in the relationship between audit quality and fraud reduction.   Theoretical framework: This study applies two main theories; Policeman Theory and Institutional Theory.   Design/methodology/approach: The research data covers listed companies in Malaysia and Indonesia. The total number of firms is 643 from the year 2015 to 2020 with 2502 total observations. Findings: The findings indicate that audit tenure, return on assets (ROA) and size have a significant and positive relationship in the reduction of fraud in Malaysia but audit fee, leverage and size have a significant and negative relationship in the reduction of fraud in Malaysia. Similarly, this study found that audit fee, leverage, return on assets (ROA) and audit tenure has a positive and significant relationship in the reduction of fraud in Indonesia. Besides, size have a negative and significant relationship in the reduction of fraud in Indonesia. This study also found that IFRS has a moderate effect on the relationship between audit fees and audit tenure towards fraud reduction in Malaysia and Indonesia.   Research, Practical & Social implications: Future studies are encouraged to examine the effects of Sharia Compliance on the quality of audit processes and the reduction of fraud, especially in areas where Islamic finance is common. It is also suggested that future research should expand the statistical methods used beyond the Ordinary Least Squares (OLS) model to potentially include Logistic Regression Models (LRM). This could lead to a significant improvement in the accuracy and dependability of the research outcomes.   Originality/value: The study provides valuable insights into the relationship between audit quality and fraud reduction, as well as the moderating effect of IFRS in Malaysia and Indonesia. The findings have significant practical implications for policymakers, companies, and auditors looking to improve the regulation of auditing practices and reduce the occurrence of fraud
    corecore