44 research outputs found
Comparative study on energy consumption in dynamic window secured implicit geographic forwarding routing protocol
An Ideal WSNs should operate with the least possible energy required in order to increase the lifetime of the sensor nodes and at the same time, ensure network connectivity. But the Inherent power limitation makes power-awareness a critical requirement for WSN, this calls for the need to manage energy in sensor nodes. Also In order to ensure successful transmission of data from sensor node source to destination, it becomes necessary to maintain network availability. The network must be resilient to individual node failure which can happen due to zero power posses by the node and due to security attacks posed on the node and the network. Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) routing protocol has proven to be robust, efficient and resistant to some security attack which causes failure in network availability. However the extent to which energy is consumed in sensor nodes which deploys DWSIGF as its routing protocol has never been mentioned. In this research, we performed a comparative study on energy consumption in DWSIGF routing protocol. Using the first order radio model, we determined the energy consumed in a network. The protocol (DWSIGF) is matched up against its counterpart SIGF as the traffic is increased. Observation shows that DWSIGF due to the variable timing assigned to the CTS collection window, CTS signal fails to reach destination as collection window time expires, thus the need for retransmission. This in turn consumes more energy than the counterpart SIGF which has a fixed CTS collection time. The simulation work was done using Matlab 7.0. Energy consumed in the random variant of both protocols (DWSIGF and SIGF) was also observed to be higher than the priority variant of the protocols
The Gbagyi Bayekpe (Education) and Imperialism in Minna, 1928 – 1960
This article discussed the Gbagyi Bayekpe (education) and imperialism in Minna, 1928-1960. The contact of the Gbagyi in Minna with imperialism dates back to the early part of the twentieth century. The Bayekpe (education) of the Gbagyi which was a process of preparing the children and every individual for happy and useful living and to prepare the Gbagyi individual who will be honest, responsible, skilled, cooperative and conform to the social order of the day as a result of the encounter of the Gbagyi with the imperial power was supplanted with a new system of knowledge This new order which was explicitly designed to restructure the social pattern of the Gbagyi and his society began in 1928 and by 1960 had replaced the Gbagyi Bayekpe (education). This development, the paper explained marked the starting point of the dependency syndrome which characterized the Gbagyi modernity and remains an obstacle to the growth of Gbagyi and his Minna society. The paper exposed the effect of this alien knowledge system on the Gbagyi in Minna and made a case for the redefinition of the Gbagyi knowledge system different from western tradition of education which holistically emphasizes dominance as a measure of education attainment
Impact of Trade Liberalization on the Nigerian Manufacturing Sector
The study examines the inter-relationship between trade liberalization and manufacturing performance in Nigeria Time series data sourced from Central Bank of Nigeria CBN National Bureau of Statistics NBS and Manufactures Association of Nigeria MAN for the period 1980 to 2010 were utilised Short-run error correction model ECM and long-run OLS regression techniques was employed to derive the estimates The findings from the study indicate that the adoption of trade liberalization strategies in Nigeria have negatively affected the country s manufacturing sector This shows that trade openness has brought about negative total factor productivity in Nigeria as manufacturers often respond to uncompetitive ease in trade restrictions by outright closures reduction in production and sometimes relocation to neighboring countries However empirical evidence suggests trade liberalization increases Nigeria s manufacturing output when total value of manufacturing output was used as measure of performance although was not significant at the conventional test levels Additionally the incidence of the Dutch Disease syndrome was found to adversely affect Nigeria s manufacturing sector performance measures employed in this study and result aptly support the resource-curse hypothesi
Evaluation of Manufacturing Sector Performances and its Employment Creation in Nigeria
This study evaluates the performances of manufacturing sector and its effects on employment creation in Nigeria. Historical data relating to performance of some selected sectors of the manufacturing sector of the economy and employment were gathered. Secondary sources (Central Bank of Nigeria (CBN), Nigerian Economic Submit Group (NESG) and Manufacturing Association of Nigeria (MAN)) were explored for data used in this study. Data were analysed using descriptive approach .This study documented that performances of the sector has not been encouraging given its overall percentage contributions to growth of Nigeria economy. Poor performances of manufacturing sector have far-reaching negative effect on the employment generation and standard of living of the people. Therefore, to improve this sector, this study recommends the strengthening of the infrastructures especially energy, transportation, security system, reduction of interest rate and avoidance of imposition of multiple taxes as the major impediments to manufacturing performances in Nigeria
Choice of delivery positions among multiparous women in Kano
Background: Confining women to hospital bed with limited power of movement and involvement of decision making during labor process and restricting them to supine position in second stage of labor might contribute significantly to aversion to hospital delivery.
Objective: To determine the different delivery positions women take during home delivery.
Method: This was a cross sectional survey among 285 multiparous women who had vaginal delivery of life singleton babies. They were interviewed using questionnaire at Murtala Muhammad Specialist hospital Kano on choices of delivery position. Ethical approval was obtained from the ethical committee of the state. Data obtained were analyzed using SPSS Version 19. Qualitative data were summarized using frequencies and percentages. Chi (χ2) test was used for categorical data. A P value of ≤ 0.05 was considered statistically significant.
Results: The mean age (±SD) of the respondents was 28.9 ± 7.12 years. Majority of the women that delivered at home assumed the squatting position for delivery (60%) and were mainly assisted by traditional birth attendants (TBA) (41.3%). Over 50% of those that delivered at home were instructed to take the position they delivered in by their assistants at delivery while those that chose their position by themselves did that because they felt more comfortable in that position (85%). Over 80% of those that were instructed to take a position at delivery did not ask their assistant the reason for advising on that position. There was statistically significant association between educational level and right to decide in which positionto deliver the baby (χ²=28.517, P = 0.000).
Conclusion: Squatting position was the most assumed position following home delivery. There was statistically significant association between educational level and right to decide in which position to deliver the baby.
Key words: Choices; delivery position; multiparous women; Nigeria; vaginal birth
A forwarding strategy for DWSIGF routing protocol
Routing protocols in Wireless Sensor Network (WSN) are responsible for propagating and coordinating of information transfer from one end of the network to the other. Dynamic Window Secured Implicit Geographic Forwarding (DWSIGF) is a robust, cross layer, security bound routing protocol that propagates information in a multi-hop network using the greedy and random forwarding strategies. These strategies are known for their poor resistivity to interference and erratic behavior in path selection. In this paper, we propose a forwarding strategy that uses an optimal distance to mitigate these problems. The optimal distance is computed based on the path loss coefficient and energy dissipated in the hardware (sensor). Extensive simulations have been conducted to evaluate the performance of the proposed approach. The results illustrate that the proposed approach performs better than the compared strategies in terms of packet delivery ratio and energy consumption
The Interplay Between Epigenetics, Vector Competence and Vaccine Immunodynamics as a Possible Explanation for Recent Yellow Fever Resurgence in Nigeria
Background: Yellow fever virus (YFV), a member of the genus Flaviviridae is the causative agent of YFD. The virus is classified as single-stranded RNA which is mostly transmitted by mosquitoes identified by Walter Reed in the year 1900 as Aedes aegypti [4]. In the past, Nigeria had been facing asporadic outbreaks of Yellow fever (YF), which began with the populous Northern region of the country. Aedes species of mosquitoes mainly transmit yellow fever virus (YFV) and vaccination is the only effective means of preventing it.Objectives: This article presents a critical review and literature updates on the vector biology, YF vaccine immunodynamics and epigenetics of YFV, with the aim to understand the interplay of these factors in the re-emergence of YF and risk assessment of living or traveling to YF endemic areas. (in the year 2016-2018)Methodology: The live, attenuated viral strain of the 17D vaccine was administered to tourists and inhabitants of endemic regions of Africa (Figure: 2) and South America. Those eligible for the vaccine were usually given through routes of administration either by single subcutaneous or intramuscular injection. The vaccine (17D-204 strain) could be given either to infants (pediatric dosage) above 9 months or adults (adult dosage) using one dose of subcutaneous injection (≥4.74 log10 plaque-forming units/0.5mL) not later than 10 days to regional migrationConclusion: Vectorial migration, jungle-to-urban spillover, immunization failure (especially in persons with chronic immune-mediated inflammatory diseases) and perhaps, genetic modification of YFV could be reasons for the resurgence of YF in the country. The single dose of the vaccine was usually sufficient to confer prolonged immunity against the infection but booster doses were often required based on endemic state of certain countries' Medical Laboratory Staff who frequently work on wild-type yellow fever virus. Based on regular exposure to this virus on routine basis, the neutralizing antibody titers against the virus are usually assessed every ten years to determine the necessity for booster doses of the 17D vaccine. Irrespective of the knowledge of neutralizing antibody titers for the virus, vaccination every 10 years is recommended especially for individuals frequently exposed to the virRecommendations: Increase vaccination coverage. Include YF vaccine in childhood vaccination programs. Make effort to maintain and control future outbreaks.
Keywords: Vaccination, Genetics, Yellow Fever, Re-emergenc
Capital Structure Choices in Services Firms: Empirical Results from Nigeria Listed Companies
The effects of the worldwide economic slump, which was largely triggered by SARS-CoV-2, have undermined the profitability of businesses. As a result, the overarching goal of this research is to look into the impact of capital structure choices on the financial performance of services firms quoted on the Nigerian Exchange Group (NGX). With an adjusted population of 11 listed services firms in Nigeria, the analysis spans from 2011 to 2020. The secondary data was collected from the annual reports of the selected enterprises and African financials, using an ex-post facto design. The generalised least square model was employed for the analysis of the data. While both retained earnings and total debt have a positive and significant influence on earnings per share, short-term and long-term debts, and equity were insignificant, according to the findings. The study, on the other hand, suggests that company executives save earnings to be spent solely on rainy days in order to minimize negative shocks that could harm a company's going-concern objective
Operation and Maintenance of Hydraulic Structures
Water is among the most valuable resources that nature has endowed to human beings. Water has cut across all spans of life from cradle to grave. Since time immemorial, man continuously developed methods and techniques to harness the benefits of water and as well to protect himself from the destruction that may be caused by the same water. Therefore, for a hydraulic structure to answer its name, it must be capable of being used smoothly for the purposes it was designed for and also be able to be controlled effectively without the risk of causing any havoc to the environment. Using water, especially for agricultural purposes, cannot be overemphasized. Hence, this chapter discusses the hydraulic structures based on the work they performed, challenges facing hydraulic structures, and management procedures of the hydraulic structures in order to adequately and efficiently serve their purpose
TruFiX: a configurable trust-based cross-layer protocol for wireless sensor networks
The cross-layering concept has enabled flexibility in sensor communication by decreasing the level of modularity through inter-layer information exchange. This has improved adaptability, reliability, and efficiency in the communication process. This is principally so, because the inter-layer information is utilized to enable the selection of nodes that are perceived to foster efficient communication. However, despite these numerous achievements, the cross-layering concept suffers immensely as a result of security attacks, which prey on nodes utilized for data forwarding. In this paper, we propose T-XLM, a trust-based cross-layering framework to provide minimal defense against security attacks. The framework introduces a fuzzy-based trust estimation mechanism, which is used to formulate imprecise empirical knowledge that is utilized for reputation building in the nodes to ensure secure forwarding and reliable delivery of data. We further proposed trust-based fuzzy implicit cross-layer protocol (TruFiX), a T-XLM inspired protocol which utilizes multiple parameters pulled through inter-layer information exchange to mitigate the effects of security threats in a network. Using extensive simulation experiments, TruFiX was compared with resource bound security solution (RBSS)-based protocols, which also achieved minimal security by altering their routing semantics. The conducted experiments evaluated the security performance of the protocols and the results show that the proposed TruFiX significantly outperforms the RBSS-based protocols in terms of packet delivery