80 research outputs found

    Arousing elements in children’s digital interactive storybook

    Get PDF
    This paper reports an ongoing study on making children’s digital storybook arousing.The problem being addressed in this paper is the lack of proper elements for guiding designers to incorporate into children’s digital storybook. Without the proper elements, designers tend to design digital storybook based on their preferences, instead of those usable to the children.This may lead to discouraging state when children interact with the digital storybook. To address that, this paper aims at determining the most common interface components for digital interactive storybook that make children feel aroused when interacting with. In accomplishing that, a series of field study was carried out, involving a sample of interactive digital storybook.Data were collected from 13 children aged seven to nine through observation and interview.In the end, a set of most common elements that make children aroused when interacting with interactive digital storybook were gathered

    Politics of poverty alleviation programs in Nigeria: challenges and prospects

    Get PDF
    Poverty is a social evil that affects the economic growth and development of different countries. This paper uses literature and power theory to examine the politics of poverty alleviation before, during and after the implementation of the structural adjustment program in the Federal Republic of Nigeria. Findings from the study reveals that over fifteen poverty alleviation programs were implemented like National Poverty Eradication Program but poverty remains at an alarming rate in the country. However, many reasons were attributed to the perpetual economic, social, psychological and political denial in the country.The high rate of absolute and relative poverty is as a result of political instability, inadequate policy continuity, especially during the military era. Similarly, corruption, mismanagement of resources allocated for these programs, the social evils in the aspects of violence, terrorism, insurgencies, communal and inter-religious conflicts crippled the poverty reduction strategies.Economically, other factors include a fall in the prices of petroleum products which is the country`s main sources of revenue, the budget deficits to finance the poverty reduction.Consequently, the inadequate harmonization and collaborations between the all tiers of governments, private sector, civil society organisations had again contributed to the failures of economic intervention measures.The paper recommended for, Agricultural policies and agribusiness initiatives, provision of social amenities, revival of War Against corruption, institutionalization of vocational education and training centers and entrepreneurship innovation to serve as a noble solution heartrending paucity diminution in Nigeria

    Public policies on entrepreneurships: The implication for poverty reduction: A qualitative approach

    Get PDF
    The identification of entrepreneurship as a veritable tool for poverty reduction in developing countries has accelerated economic growth and development.This study applied qualitative research design and collected data from fifteen informants; we analyze the data using Nvivo software and assess entrepreneurship public policies on the paucity of resources.The cardinal objectives of our study are to identify entrepreneurship potentials to moderate multidimensional economic challenges such as poverty, youth unemployment and suggest laudable strategies to policy makers in the Nigeria context. Findings from the study revealed that policy thrust, capacity building and provision of capital resources was discovered in concrete terms to revamp the illness of small and medium scale enterprises.We equally found that strengthening government commissions, agencies and directorates will unlock the multifarious challenges confronting entrepreneurship culture to lessen poverty.Finally, this paper passionately recommended for establishment of cooperatives, proven financial policies, expanding SMEs projects to the local governments, legislations and vigorous political will.Future research direction suggested for a quantitative research approach from the beneficiaries and participants of poverty alleviation programs in the study are

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    The imperatives of NDE programs for poverty reduction and youth employment in Nigeria

    Get PDF
    The constitutional roles of National Directorate of Employment NDE on job creation and implications for poverty reduction have accelerated economic development via its laudable initiatives of establishing 174 skills acquisition centers in the thirty six states of Nigeria and the Federal capital Territory, Abuja.Concurrently, four model centers were equipped with boarding facilities and accommodated trainees.A total of 1721 participants of the Rural Agricultural Development Scheme were trained in different apprentice programs in 2014 alone despite its political and organizational challenges.This study uses qualitative research design, non-probability sampling, and semi structured interview via fifteen informants; we analyzed the data with Nvivo software.Our cardinal objectives were to explore the employment generation strategies and poverty reduction initiatives of this Directorate.Findings from our study reveal that the four basic packages of Small Scale Enterprises, Vocational Skills Development, Rural promotion scheme and Special Public Works were the prominent capacity building programs undertaken by this institution since its establishment in last 30 years.Our study passionately, recommended for the Provision of social amenities such constant electricity supply, funding and establishment of modern equipments, diversification of the economy, Good Governance and proper management of the endowed resources and establishment agro-entrepreneurship/ agribusiness projects respectively

    Understanding Link Fabrication Attack in Software Defined Network using Formal Methods

    Get PDF
    The complex nature of SDN coupled with the huge number of services they provide; makes the system as a whole prone to some malicious attacks. An attack such as Link Fabrication Attack (LFA) is becoming more and more common with a high degree of sophistication. Different techniques exist which examine the occurrence of LFA in SDN. To ensure that SDN does not suffer from the same attack from the same origin, we have to consider in general the entire system liability, service information, dependencies, and switch as well as host vulnerabilities. However, due to the complex nature and scalability property of SDN, determining the origin of the LFA is not a straight forward. Although other solutions have been proposed to address this problem in traditional networks, a formal method to security in SDN is lacking. In this paper, we discuss a formal method for SDN using Higher-Order Logic (HOL) and as a case study used to examine the LFA in SDN

    Local Descriptor for Retinal Fundus Image Registration

    Get PDF
    A feature-based retinal image registration (RIR) technique aligns multiple fundus images and composed of pre-processing, feature point extraction, feature descriptor, matching and geometrical transformation. Challenges in RIR include difference in scaling, intensity and rotation between images. The scale and intensity differences can be minimised with consistent imaging setup and image enhancement during the pre-processing, respectively. The rotation can be addressed with feature descriptor method that robust to varying rotation. Therefore, a feature descriptor method is proposed based on statistical properties (FiSP) to describe the circular region surrounding the feature point. From the experiments on public Fundus Image Registration dataset, FiSP established 99.227% average correct matches for rotations between 0° and 180°. Then, FiSP is paired with Harris corner, scale-invariant feature transform (SIFT), speeded-up robust feature (SURF), Ghassabi's and D-Saddle feature point extraction methods to assess its registration performance and compare with the existing feature-based RIR techniques, namely generalised dual-bootstrap iterative closet point (GDB-ICP), Harris-partial intensity invariant feature descriptor (PIIFD), Ghassabi's-SIFT, H-M 16, H-M 17 and D-Saddle-histogram of oriented gradients (HOG). The combination of SIFT-FiSP registered 64.179% of the image pairs and significantly outperformed other techniques with mean difference between 25.373 and 60.448% (p = <;0.001*)

    Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network

    Get PDF
    Vehicular ad hoc networks (VANETs) are considered an emerging technology in the industrial and educational fields. This technology is essential in the deployment of the intelligent transportation system, which is targeted to improve safety and efficiency of traffic. The implementation of VANETs can be effectively executed by transmitting data among vehicles with the use of multiple hops. However, the intrinsic characteristics of VANETs, such as its dynamic network topology and intermittent connectivity, limit data delivery. One particular challenge of this network is the possibility that the contributing node may only remain in the network for a limited time. Hence, to prevent data loss from that node, the information must reach the destination node via multi-hop routing techniques. An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. Therefore, this paper proposes a novel routing algorithm called efficient and stable routing algorithm based on user mobility and node density (ESRA-MD). The proposed algorithm can adapt to significant changes that may occur in the urban vehicular environment. This algorithm works by selecting an optimal route on the basis of hop count and link duration for delivering data from source to destination, thereby satisfying various quality of service considerations. The validity of the proposed algorithm is investigated by its comparison with ARP-QD protocol, which works on the mechanism of optimal route finding in VANETs in urban environments. Simulation results reveal that the proposed ESRA-MD algorithm shows remarkable improvement in terms of delivery ratio, delivery delay, and communication overhead

    A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Get PDF
    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC

    A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

    Get PDF
    Network forensics enables investigation and identification of network attacks through the retrieved digital content. The proliferation of smartphones and the cost-effective universal data access through cloud has made Mobile Cloud Computing (MCC) a congenital target for network attacks. However, confines in carrying out forensics in MCC is interrelated with the autonomous cloud hosting companies and their policies for restricted access to the digital content in the back-end cloud platforms. It implies that existing Network Forensic Frameworks (NFFs) have limited impact in the MCC paradigm. To this end, we qualitatively analyze the adaptability of existing NFFs when applied to the MCC. Explicitly, the fundamental mechanisms of NFFs are highlighted and then analyzed using the most relevant parameters. A classification is proposed to help understand the anatomy of existing NFFs. Subsequently, a comparison is given that explores the functional similarities and deviations among NFFs. The paper concludes by discussing research challenges for progressive network forensics in MCC
    corecore