23 research outputs found

    BarkDroid: Android Malware Detection Using Bark Frequency Cepstral Coefficients

    Get PDF
    Since their inaugural releases in 2007, Google’s Android and Apple’s iOS have grown to dominate the mobile OS market share. Currently, they jointly possess over 99% of the global market share with Android being the leading mobile Operating System of choice worldwide, controlling close to 70% of the market share. Mobile devices have enabled the exponential growth of a plethora of mobile applications that play key roles in enabling many use cases that are pivotal in our daily lives. On the other hand, access to a large pool of potential end users is available to both legitimate and nefarious applications, thus making mobile devices a burgeoning target of malicious applications. Current malware detection solutions rely on tedious, time-consuming, knowledge-based, and manual processes to identify malware. This paper presents BarkDroid, a novel Android malware detection technique that uses the low-level Bark Frequency Cepstral Coefficients audio features to detect malware. The results obtained outperform results obtained using other features on the same datasets. BarkDroid achieved 97.9% accuracy, 98.5% precision, an F1 score of 98.6%, and shorter execution times

    ADVANCING LIBRARY AND INFORMATION LITERACY (LIL) IN THE NIGERIAN EDUCATIONAL SYSTEM

    Get PDF
    Information literacy is a pertinent aspect of any developing or developed society, hence the need to make it an integral part of the education system of any aspiring great society. This article x-rays the library and information literacy in the Nigerian educational system and how it can be advanced. Common approach to libraries in Nigerian educational system, which cuts across the primary, secondary and tertiary institutions, is seen as the reason for the laxity in library and information real time advancement. The article also looked at the discrepancies between the theory and practice in library literacy in accessing necessary information and the difficulties experienced in the process in the Nigerian educational system. The position of the National Education Policy (NPE), according to this article, should go beyond its theoretical placements and make the needed changes so as to practically accommodate the Library and Information Centres. This paper is based on the longitudinal (observatory) studies of the author aided with secondary data to buttress the positions made. It posits that the seeming laxity (common approach) of students’ literacy on library and information centres is primarily because of the lacuna at their early levels of education. Such gaps presented pertinent suggestions for improving library and information literacy. This prompted a useful yard stick for the paper to present workable recommendations that in its opinion will be of immense help to solving it

    Globalisation, adjustment and the structural transformation of African economies?: the role of international financial institutions

    Get PDF
    Under the auspices of the World Bank and IMF, for almost two decades, sub-Saharan African countries have implemented structural adjustment, an orthodox package of economic reform measures. During this period there has been an unprecedented proliferation of technology investment and trade in the world economy. However sub-Saharan Africa has performed poorly under adjustment and has been largely marginalized from the international economy. The paper investigates the problems with the theoretical model underlying structural adjustment policies to explain why the model is not conducive to either African development or Africa’s increasing participation in the global economy. An example is used to illustrate the existence of an alternative set of policies that may be better suited for Africa

    Molecular pathways leading to loss of skeletal muscle mass in cancer cachexia can findings from animal models be translated to humans?

    Get PDF
    Background: Cachexia is a multi-factorial, systemic syndrome that especially affects patients with cancer of the gastrointestinal tract, and leads to reduced treatment response, survival and quality of life. The most important clinical feature of cachexia is the excessive wasting of skeletal muscle mass. Currently, an effective treatment is still lacking and the search for therapeutic targets continues. Even though a substantial number of animal studies have contributed to a better understanding of the underlying mechanisms of the loss of skeletal muscle mass, subsequent clinical trials of potential new drugs have not yet yielded any effective treatment for cancer cachexia. Therefore, we questioned to which degree findings from animal studies can be translated to humans in clinical practice and research. Discussion: A substantial amount of animal studies on the molecular mechanisms of muscle wasting in cancer cachexia has been conducted in recent years. This extensive review of the literature showed that most of their observations could not be consistently reproduced in studies on human skeletal muscle samples. However, studies on human material are scarce and limited in patient numbers and homogeneity. Therefore, their results have to be interpreted critically. Summary: More research is needed on human tissue samples to clarify the signaling pathways that lead to skeletal muscle loss, and to confirm pre-selected drug targets from animal models in clinical trials. In addition, improved diagnostic tools and standardized clinical criteria for cancer cachexia are needed to conduct standardized, randomized controlled trials of potential drug candidates in the future

    Global patient outcomes after elective surgery: prospective cohort study in 27 low-, middle- and high-income countries.

    Get PDF
    BACKGROUND: As global initiatives increase patient access to surgical treatments, there remains a need to understand the adverse effects of surgery and define appropriate levels of perioperative care. METHODS: We designed a prospective international 7-day cohort study of outcomes following elective adult inpatient surgery in 27 countries. The primary outcome was in-hospital complications. Secondary outcomes were death following a complication (failure to rescue) and death in hospital. Process measures were admission to critical care immediately after surgery or to treat a complication and duration of hospital stay. A single definition of critical care was used for all countries. RESULTS: A total of 474 hospitals in 19 high-, 7 middle- and 1 low-income country were included in the primary analysis. Data included 44 814 patients with a median hospital stay of 4 (range 2-7) days. A total of 7508 patients (16.8%) developed one or more postoperative complication and 207 died (0.5%). The overall mortality among patients who developed complications was 2.8%. Mortality following complications ranged from 2.4% for pulmonary embolism to 43.9% for cardiac arrest. A total of 4360 (9.7%) patients were admitted to a critical care unit as routine immediately after surgery, of whom 2198 (50.4%) developed a complication, with 105 (2.4%) deaths. A total of 1233 patients (16.4%) were admitted to a critical care unit to treat complications, with 119 (9.7%) deaths. Despite lower baseline risk, outcomes were similar in low- and middle-income compared with high-income countries. CONCLUSIONS: Poor patient outcomes are common after inpatient surgery. Global initiatives to increase access to surgical treatments should also address the need for safe perioperative care. STUDY REGISTRATION: ISRCTN5181700

    Seasonal Rainfall Prediction in Lagos, Nigeria Using Artificial Neural Network

    No full text
    Deliberating the importance of rainfall in determining process such as agriculture, flood and water management, these study aim at evaluation of non-linear techniques on seasonal rainfall prediction (SRP). One of the non-linear method widely used is the Artificial Neural Networks (ANN) approach which has the ability of mapping between input and output patterns. The complexity of the atmospheric processes that generate rainfall makes quantitative forecasting of rainfall an extremely, difficult task. The research goal is to train/develop Artificial Neural Network model using backward propagation algorithm to predict seasonal Rainfall. Using some meteorological variables like, sea surface temperature (SST), U-wind at (surface, 700, 850 and 1000), air temperature, specific humidity, ITD and relative humidity. The study adopt  monthly June-October (JJASO) rainfall data and January-May (JFMAM) monthly data of SST, U-wind at (surface, 700, 850 and 1000), air temperature, specific humidity and relative humidity for a period of 31 years (1986-2017) over Ikeja. The proposed ANN model architecture (9-4-1) in training the network using back-propagation algorithm indicated that the statistical performance of the model for predicting 2013 to 2017 (JJASO) rainfall amount indicated as follows; MSE, RMSE, and MAE were 7174, 84.7 and 18.6 respectively with a high statistical coefficient of variation of 94% when the ANN model prediction is validated with the observed rainfall. The result indicated that the propose ANN built network is reliable in prediction of seasonal rainfall amount in Ikeja with a minimal error

    Intensifying human-driven heatwaves characteristics and heat related mortality over Africa

    No full text
    Heatwaves in Africa are expected to increase in frequency, number, magnitude, and duration. This is significant because the health burden is only expected to worsen as heatwaves intensify. Inadequate knowledge of the climate’s impact on health in developing nations such as Africa makes safeguarding the health of vulnerable groups at risk challenging. In this study, we quantify possible roles of human activity in heatwave intensification during the historical period, and project the future risk of heat-related mortality in Africa under two Representative Concentration Pathways (RCP26) and (RCP60). Heatwaves are measured using the Excess Heat Factor (EHF); the daily minimum ( T _n ) and maximum ( T _x ) are used to compute the EHF index; by averaging T _x and T _n . Two heat factors, significance and acclimatization are combined in the EHF to quantify the total excess heat. Our results confirm the intensification of heatwaves across Africa in recent years is due anthropogenic activity (increase in greenhouse gas concentration and changes in land use). The Return event highlights the potential future escalation of heatwave conditions brought on by climate change and socioeconomic variables. RCP26 projects a substantial rise in heat-related mortality, with an increase from about 9000 mortality per year in the historical period to approximately 23 000 mortality per year at the end of the 21st century. Similarly, RCP60 showed an even more significant increase, with heat-related mortality increasing to about 43 000 annually. This study highlights the potentially growing risk of intensifying heatwaves in Africa under different emission scenarios. It projects a significant increase in heatwave magnitude, number, duration, frequency, and heat-related mortality. Africa’s low adaptive capacity will amplify the impact, emphasizing the need for emissions reduction and effective adaptation measures

    Blockchain-Based Security Model for LoRaWAN Firmware Updates

    No full text
    The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices

    Blockchain-Based Security Model for LoRaWAN Firmware Updates

    No full text
    The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too much attention to security. Consequently, attackers usually compromise IoT devices with lax security to retrieve sensitive information such as encryption keys, user passwords, and sensitive URLs. Moreover, expanding IoT use cases and the exponential growth in connected smart devices significantly widen the attack surface. Despite efforts to deal with security problems, the security of IoT devices and the privacy of the data they collect and process are still areas of concern in research. Whenever vulnerabilities are discovered, device manufacturers are expected to release patches or new firmware to fix the vulnerabilities. There is a need to prioritize firmware attacks, because they enable the most high-impact threats that go beyond what is possible with traditional attacks. In IoT, delivering and deploying new firmware securely to affected devices remains a challenge. This study aims to develop a security model that employs Blockchain and the InterPlanentary File System (IPFS) to secure firmware transmission over a low data rate, constrained Long-Range Wide Area Network (LoRaWAN). The proposed security model ensures integrity, confidentiality, availability, and authentication and focuses on resource-constrained low-powered devices. To demonstrate the utility and applicability of the proposed model, a proof of concept was implemented and evaluated using low-powered devices. The experimental results show that the proposed model is feasible for constrained and low-powered LoRaWAN devices
    corecore