780 research outputs found

    The role of cultural values in understanding the challenges faced by female entrepreneurs in Nigeria

    Get PDF
    This article is (c) Emerald Group Publishing and permission has been granted for this version to appear here (http://bura.brunel.ac.uk/handle/2438/4036). Emerald does not grant permission for this article to be further copied/distributed or hosted elsewhere without the express permission from Emerald Group Publishing Limited.Purpose: This paper examines the challenges female entrepreneurs face in the development of their business in the context of Nigeria. In so doing, it addresses a gap in the literature on the experiences of female entrepreneurs in a non-Western context and acknowledges the contribution that women make in this area of work. Design: It draws on survey data from 274 female entrepreneurs currently engaged in their businesses in three states—Lagos (Nigeria’s largest city), Ogun, and Oyo within the south west of Nigeria. Findings: Results indicate that female entrepreneurs are generally confident and resourceful and that they enjoy the challenge of entrepreneurial activity. As in the West, they experience difficulties relating to family commitments and access to finance – as well as problems gaining acceptance and accessing networks. Originality: It is argued that cultural values specific to the situation mean that these challenges, while common to female entrepreneurs in other national contexts, ‘play out’ differentially and that they are experienced with different levels of depth and ‘intensity’. It is also argued that future research might uncover at a deeper level and drawing on qualitative methodology how some of the factors identified are experienced in women’s day to day lives. The paper suggests some policy implications in the form of support for female entrepreneurs in this context

    Repositioning Conceptual Understanding of Adult Education for Social Transformation in Nigeria

    Get PDF
    The conceptual understanding of Adult Education and its mission has continued to suffer much neglect in various quarters in the education sector. The debate on the status of the discipline has been accorded low esteem and relegated to the background in government circles, in the intellectual community and public perception despite the huge potentials it offers in the developmental process. This paper is an attempt at repositioning the understanding of Adult Education to restore the image of poor perception from policy makers and implementers of adult education programmes in Nigeria. The paper examined the utilitarian value of adult education needed for the transformation of the plethora of problems in the economic, social and political landscape of society. It recommended that there is need to redesign adult education curriculum to sustain its nomenclature for lifelong learning to bring about the needed recognition as a career discipline in the education system for maximum benefit in Nigeria. Key Words: Repositioning, Conceptual, Understanding, Social, Transformation, Adult Educatio

    Mitral annular fibrous band - a unique morphological variant of a rare congenital mitral valve anomaly: a case report

    Get PDF
    Background: Left atrial bands are rare and can be associated with mitral valve dysfunction, heart failure, and stroke. Most cases are identified on autopsy, and the demonstration in vivo is very uncommon. Various anatomical configurations have been reported. This description of a mitral annular fibrous band contributes to the literature as the first reported case to traverse the supravalvular mitral inflow region, without involving the left atrium. Case summary: A 59-year-old man with a history of metastatic duodenal carcinoma was admitted with a 2-week history of fever and rigors. Inflammatory markers were elevated and blood cultures positive for Enterococcus feacium. Transoesophageal echocardiography performed to investigate for infective endocarditis revealed a 2.3 cm long, thin fibrous band attached to the posterior mitral annulus and extending to the base of the middle scallop of the anterior mitral valve leaflet causing localized tethering, but no valve dysfunction. The band was felt to represent a bystander anatomic variant unrelated to the sepsis, which was most likely gastrointestinal in origin. The patient responded well to intravenous antibiotics. Conclusions: The presence of an abnormal intracardiac structure in the setting of occult infection should always raise the suspicion of infective endocarditis. Using detailed 2D multiplanar and 3D transoesophageal echocardiography, we were able to identify the anomalous band and exclude any overt infective vegetations attached to the band or the leaflets. Once identified, treatment options range from conservative management to surgical resection and mitral valve surgery if concomitant valvular dysfunction is demonstrated

    Information Sources Used by Postgraduate Students in Library and Information Science: A Citation Analysis of Dissertations

    Get PDF
    This paper is a citation analyses that assesses references of theses submitted to the Department of Library and Information Science at the University of Nigeria, Nsukka from 1997 to 2007 The results revealed that journals are cited more than other information resources, and online resources cited were very rarely from 1997-2005, but increased from 2006 and 2007. College and Research Libraries is the most cited journal. The major subject area covered in their research is library management/administration; user studies, information communication technology, and collection development while bibliometrics, preservation, special and public libraries were less commonly researched

    The Gamma-Rayleigh Distribution and Applications to Survival Data

    Get PDF
    Studies on probability distribution functions and their properties are needful as they are very important in modeling random phenomena. However, research has shown that some real life data can be modeled more adequately by distributions obtained as combination of two random variables with known probability distributions. This paper introduces the Gamma-Rayleigh distribution (GRD) as a new member of the Gamma-X family of generalized distributions. The Transformed-Transformer method is used to combine the Gamma and Rayleigh distributions. Various properties of the resulting twoparameter Gamma-Rayleigh distribution, including moments, moment generating function, survival function and hazard function are derived. Results of simulation study reveals that the distribution is unimodal, skewed and normal-type for some values of the shape parameter. The distribution is also found to relate with the Gamma, Rayleigh and Generalized-Gamma distributions. The method of maximum likelihood has been used to estimate the shape and scale parameters of the distribution. To illustrate its adequacy in modelling real life data the distribution is fitted to two survival data sets. The results show that the distribution produced fits that are competitive and compared better, in some cases, to the Gamma, Rayleigh, Weibull and Lognormal distributions.Keywords: Gamma-X family, Gamma-Rayleigh distribution, Maximum Likelihood estimators, Survival data

    Potentiality of Diethylamine as Agent of Deproteination and Deacetylation in the Extraction of Chitosan from Scylla serrata Shell

    Get PDF
    The potentiality of diethylamine as deproteination and deacetylation agent in the extraction of chitosan from Scylla serrata (giant mud crab) shell was investigated. The aim was to find an alternative agent to inorganic alkalis as possible replacement for use in the production of high quality chitosan with the right stability. Pretreatment of the shell was carried out and followed by demineralization using hydrochloric acid. Diethylamine was used for deproteination and deacetylation by modifying some published protocols. Moisture, ash, fat and protein contents of the extracts were determined using their respective standard methods. Fourier Transform Infrared (FTIR) technique was used for spectroscopic analysis. Scylla serrata shell was composed of 14.25% protein, 32.84% mineral (CaCO3), 31.52% chitin and 21.39% chitosan. Moisture, ash, fat and protein contents of chitin extracted from Scylla serrata shell were 2.35%, 3.03%, 1.79% and 3.85% respectively while those of chitosan were 1.65%, 3.84%, 0.53% and 2.80% respectively. Degree of deacetylation (DDA) and carbon to nitrogen ratio were 69.24% and 5.67 respectively. FTIR spectra of the extracted chitin and chitosan from Scylla serrata showed the presence of some active compounds of carbonyl, amide, amine and hydroxyl groups. However, CH3 waging along chain (952 cm-1), CO stretching at 1026 cm-1 and 1073 cm-1, and amide II band (1563 cm-1) were not found in the extracted chitin while HPO42- and amide III were also not found in the extracted chitosan. These moieties were present in the standard chitin and chitosan respectively. This study has shown that diethylamine (organic base) has great potential as agent of deproteination and deacetylation in the extraction of chitosan from Scylla serrata. Consequently, academic activity in the area of investigation of the stability of the extracted chitosan from Scylla serrata using diethylamine as deproteination and deacetylation agent is strongly recommended. Keywords: Diethylamine, deproteination, deacetylation, chitin and chitosan, Scylla serrata shell. DOI: 10.7176/CMR/12-7-07 Publication date:October 31st  2020

    SoK: Analysis of Software Supply Chain Security by Establishing Secure Design Properties

    Get PDF
    This paper systematizes knowledge about secure software supply chain patterns. It identifies four stages of a software supply chain attack and proposes three security properties crucial for a secured supply chain: transparency, validity, and separation. The paper describes current security approaches and maps them to the proposed security properties, including research ideas and case studies of supply chains in practice. It discusses the strengths and weaknesses of current approaches relative to known attacks and details the various security frameworks put out to ensure the security of the software supply chain. Finally, the paper highlights potential gaps in actor and operation-centered supply chain security techniques

    Effect of Zinc Galvanization on the Microstructure and Fracture Behavior of Low and Medium Carbon Structural Steels

    Get PDF
    Microstructure and fracture behavior of ASTM 572 Grade 65 steels used for wind tower applications have been studied. Steels of two carbon level chemistries designed for this grade were used in the study. Fracture toughness of the steels was studied using 3-point bend test on samples coated with zinc and not coated with zinc. Lower carbon steel showed higher resistance to fracture than medium carbon steel after zinc galvanization. SEM study suggests that zinc and zinc bath additives that migrated to crack tips are responsible for the loss in ductility. The phenomenon of Liquid Metal Embrittlement (LME) is suggested to have taken place. Zinc bath additives traced at crack zones are suggested to have migrated at the zinc galvanizing temperatures

    One-vs-One classification for deep neural networks

    Get PDF
    For performing multi-class classification, deep neural networks almost always employ a One-vs-All (OvA) classification scheme with as many output units as there are classes in a dataset. The problem of this approach is that each output unit requires a complex decision boundary to separate examples from one class from all other examples. In this paper, we propose a novel One-vs-One (OvO) classification scheme for deep neural networks that trains each output unit to distinguish between a specific pair of classes. This method increases the number of output units compared to the One-vs-All classification scheme but makes learning correct decision boundaries much easier. In addition to changing the neural network architecture, we changed the loss function, created a code matrix to transform the one-hot encoding to a new label encoding, and changed the method for classifying examples. To analyze the advantages of the proposed method, we compared the One-vs-One and One-vs-All classification methods on three plant recognition datasets (including a novel dataset that we created) and a dataset with images of different monkey species using two deep architectures. The two deep convolutional neural network (CNN) architectures, Inception-V3 and ResNet-50, are trained from scratch or pre-trained weights. The results show that the One-vs-One classification method outperforms the One-vs-All method on all four datasets when training the CNNs from scratch. However, when using the two classification schemes for fine-tuning pre-trained CNNs, the One-vs-All method leads to the best performances, which is presumably because the CNNs had been pre-trained using the One-vs-All scheme

    Familial adenomatous polyposis with synchronous invasive colonic carcinomas and metastatic jejunal adenocarcinoma in a Nigerian male

    Get PDF
    Familial adenomatous polyposis is rare. Three cases were previously reported in Nigeria. An intriguing feature of this case is an ulcerated jejunal carcinoma which was metastatic rather than synchronous carcinoma. This patient presented with partial large bowel obstruction and the pathological analysis revealed 4 invasive adenocarcinomas, 3 in the colon and 1 in the jejunum (Dukes stage D). Palliative pancolectomy and jejunal tumour resection with chemotherapy was offered to him. He died eight months after surgery from disease progression. The challenges of managing a hereditary cancer syndrome in a resource poor country are highlighted
    • 

    corecore