559 research outputs found

    Econometric Analysis of Foreign Reserves and Some Macroeconomic Variables in Nigeria (1970–2007)∗

    Get PDF
    Countries are showing interest in accumulating foreign reserves to ensure macroeconomic stability. There has been some debate whether to beef up the level of nations’ foreign reserves or make it lower, especially in developing countries like Nigeria. Whereas some argue that the foreign reserve determines the country’s rating in the global market, others hold opposing views. In this light, this paper examined the interactive influence of foreign reserve (FRS) on some macroeconomic variables such as: economic size (GDP); trade; level of capital inflows (KFL); exchange rate (EXR); and inflation. Analyzing secondary data from CBN statistical bulletins (1970–2007), the econometric results obtained from cointegration test, vector error correction (VEC) within the framework of autoregressive distributed lags (ARDL) revealed the following: (1) existence of a longrun relationship between the variables and two cointegrating equations; (2) possibility of convergence of the variables from the short run to the long run with slow speed of adjustment. It is thus the conclusion of this paper that accumulation of large foreign reserves is not very productive in Nigeria due to its inability to induce some of the macroeconomic variables

    Academic and Research Libraries in the Digital Environment. Challenges and Prospects

    Get PDF
    The research work is about Academic and Research Libraries in the digital environment of 21st century. The researcher undertake a survey of Nigeria society with respect to the Library operation in Nigeria and concluded that Nigerian Librarian need to be literate in information technology which brought drastic changes to the world and to the library profession. The research took a survey of the capability of most of Nigerian Librarians, the challenges, and gives its recommendation after conclusion. KEY WORDS: Digital, Environment, Information, Literary, Literacy, Challenge

    Marketing Information Services in Polytechnics Libraries in Nigeria

    Get PDF
    This study was to investigate marketing of library and information services prevalent in six geographical zones in Nigeria Polytechnic. The survey method was used for conducting the study, the instruments used for gathering data were questionnaire, observations and documentary sources. The librarians and students were sample using purposive sample techniques. The data collected was analyzed using frequency and percentages. The study reveals the information resources that are available in most polytechnics libraries as books, journals, pamphlets as well as information communication technology in most Polytechnics libraries, also library orientation and current awareness services are mostly used in marketing their resources and services. Recommendations, annual displays and exhibitions of resources were among resources recommended to library resources so as to attract users to library services. Key word: Communication, Technology, Orientation, Exhibitions, Marketin

    Potentials of Moringa oleifera Leaf Extracts as Biostimulant on the Field Performance of Sweetcorn

    Get PDF
    The potentials of Moringa oleifera Leaf Extract (MLE) as a bio-stimulant have been established in some vegetable crops.  A field experiment was conducted at the Teaching and Research Farm of Ekiti State University, Ado-Ekiti in 2015 cropping season to study the effects of MLE as bio-stimulant on the performance of two varieties of sweet corn. Treatment consisted of two forms of MLE (dry and fresh), three times of application which are 2 weeks after planting (WAP), 2 and 4 WAP, 2, 4 and 6 WAP and a control. The experiment was laid out in a randomized complete block design with three replicates.  Application of MLE significantly increased plant height; stem girth, number of leaves, cob weight, cob length, kernel row and cob girth of sweet corn. The highest yield in terms of cob weight was observed to be 16.8% and 16.3% higher than the control for dry and fresh methods respectively. The highest cob weight which was 21.15% higher than the control was observed when application was done once. Furthermore, the yellow variety had higher cob weight than white variety with about 2.55%. It is concluded that application of MLE can be used to improve the productivity of sweet corn. Keywords: Sweetcorn, Maize, leaf extract, Moringa olifera, biostimulan

    Caesarean section-related blood transfusion: risk factors in a private teaching hospital in Nigeria

    Get PDF
    Background: Comprehensive emergency obstetric care, which includes the life-saving procedure of blood transfusion, is one of the essential components of effective emergency obstetric care that leads to a reduction in maternal mortality. In this study, blood transfusion risk factors were found in patients who had Caesarean deliveries at our facility.Methods: This was a retrospective study of all pregnant women who had caesarean section at Babcock University Teaching Hospital, Nigeria between 2016 and 2020. Their medical records were retrieved and reviewed using pro-forma. Chi square analysis was used to determine significant association between blood transfusion status and independent variables. Information was extracted from medical records using pro-forma.Results: Of 1568 obstetric admissions, there were 1210 deliveries and 369 (30.5%) caesarean sections. Ninety-five women (25.7%) of those that had caesarean sections were transfused. The incidence of blood transfusion was 13.7%. The preoperative packed cell volume, age and caesarean delivery type were significantly associated with blood transfusion status (p<0.05).Conclusions: Preoperative anemia, age and caesarean delivery type were all associated with blood transfusion status. To maximize hemoglobin levels at delivery and to identify high-risk patients, regular antenatal checkups should be given more importance

    Availability, Accessibility and Use of Information Resources and Services among Information Seekers of Lafia Public Library in Nasarawa State

    Get PDF
    The sample population comprised of 114 users of Lafia Public Library. Summary of the study and findings were given. From the findings of the study information resources of Lafia public library are inadequate. It was revealed that information resources of Lafia public library are used mostly for solving assignment questions, this was because the major users of the library were the secondary school students. It was established that Lafia public library depends on direct purchase as the method of acquiring information resources to the library. The findings revealed that books are the major information resources in the library. Based on the findings of the study, conclusion and recommendation were drawn to help public libraries management to improve availability, accessibility and use of its information resources Keywords: Information resources, Availability, Accessibility, Public Library, Indexing and Abstracting Services.                 

    Investigation of techniques for combating malicious objects in unreliable wireless sensor networks

    Get PDF
    Unreliable net\vorks can take many different forms such as in the general case an ad hoc network or more specifical1y as a wireless sensor networks (WSNs). Some of the fields you can [md these types of networks used in would be the telecommunications industry with mobile phones, biological research for monitoring animals in the wild and military applications to monitor soldiers. Networks in these areas are handling an increasing amount of data. This data is very valuable and therefore a source of concern in making sure that none of it is lost or damaged. From a security standpoint there are many ways that an attack on these types of networks can be implemented. Some attacks are rather difficult to execute and would require knowledge of the particular network that is being attacked to be effective. One of the most effective attack methods would be for the attacker to inject its own data into the network either with the simplest goal of consuming network resources or having some other purpose such as capturing or corrupting the data stored in the network. Thinking in terms of biological systems the data that these attackers inject into the network is similar to a virus entering a human body. In the medical field medicine can be used to help cure a person by targeting this virus, in much the same way this chapter considers introducing a special type of anti-virus to the network to remove this data inserted by an attacker. This chapter considers leveraging the properties of unreliable network combined with a recommended approach employing an anti-virus to remove the virus from the network effectivel

    INTELLIGENT TECHNIQUE FOR ELECTRICITY THEFT IDENTIFICATION USING AUTOREGRESSIVE MODEL

    Get PDF
    Various studies have investigated electricity theft, an illegally act, perpetrated to the detriment of the electricity power providers, however, less attention has been given to identification of the types of electricity theft. Data were acquired from the Consumer Load Prototype developed at two different levels using Sensor-A connected to the Pole Terminal Unit and Sensor-B connected to the Consumer Terminal Unit. The output of the sensors were connected to BNC-2110 device and linked to the PCI 6420E channel, which log the data in the computer for further analysis. LABVIEW (2012) software was programmed to acquires data at a sampling frequency of 500Hz and decimated at 10s interval before logging into the computer hard disk. The feature extraction of the data acquired was achieved using autoregressive technique and model order selectionwas based on minimum description length. The model coefficient AR (20), data acquired and predicted data were used for theft identification. Meter-bypassing theft was identified when the energy consumption from sensor A and sensor B are different, however sensor B reads zero value and there are disparities in the model coefficients. Illegal connection before the meter theft was identified whenever there is difference in energy consumption as evaluated form sensor A and sensor B and there is no zero value recorded from sensor B, while Meter tampering was detected when the energy consumption as evaluated form sensor A and sensor B are different and there are no disparities in the model coefficients
    corecore