84 research outputs found

    EXPLORING SUBJECTS SWAPPING, AVAILABILITY AND PUPILS’ PARTICIPATION OF PHYSICAL EDUCATION AMONG PRIMARY SCHOOLS IN BAKU, AZERBAIJAN

    Get PDF
    The study investigates the relationship between subject swapping, availability, and pupil participation in the physical education lesson. A quantitative survey was undertaken, and amongst 512 survey respondents, a random selection of 140 pupils was chosen. Pearson correlation was performed after descriptive statistics was used to analyze the relative frequency on the proportion of time a value occurred. The findings indicate a strong, positive relationship amongst the three variables. The response of the pupils for all parameters suggested that the school switched physical education frequently. Pupils should be given opportunity and access to physical activity on a regular basis in order to develop physically and mentally. Article visualizations

    Contributions of Melon Production to Livelihood Sustainability of Rural Farming Households in Oyo State, Nigeria.

    Get PDF
    The study was carried out to assess the contributions of melon production to livelihood sustainability of rural farming households in Oyo State, Nigeria. Multi-stage sampling technique was used to select 96 respondents for the study. Data for the study was collected with the aid of a well structured interview guide and focus group Discussion. Descriptive statistics was used to describe the objectives while the hypotheses were analyzed using Chi-Square and Pearson Product Moment Correlation (PPMC). Cost and returns analysis was used to compute the profitability of melon production. Result showed that majority (89.58%) of the respondents were less than 50 years old with mean age of 41.00 years. Also, majority (78.12%) were males while 21.88% were females. Further more, (51.04%) of the respondents did not have formal education while 48.96% had one form of education or the other. The mean household size was 5 people. The result also indicated that most (69.79%) of the respondents had been in melon farming for more than 7 years.  Estimated average income of the melon farmers for the previous farming season was ?74,508.50/ha Cost and returns analysis revealed an estimated sum of ?23, 16/ha in the previous farming season. Chi Square analysis showed that there was significant association between the respondents’ sex (?2 = 51.96, df = 8, p < 0.05); marital status (?2 = 59.26, df = 18, p < 0.05) and their utilization of income derived from sales of melon produced. Also, Pearson Product Moment Correlation analysis shows that there was significant relationship between the respondents’ age (r= 0.21, p < 0.05); household size (r= 0.14, p < 0.05), level of Education (r = 0.87, p < 0.05) and their utilization of income derived from sales of melon produced. Also, there was an inverse relationship between constraints to melon production and profit (r = -0.19, p < 0.05). However, the efficient productivity and profitability of melon were affected by climate change (100%), limited access to agricultural extension service support (98.96%), pest and diseases out break (97.92%), and non-availability of shelling and oil extraction devices (96.80%). The study concluded that melon production was profitable and it contributed to rural farmers’ household food security and livelihood sustainability. It was recommended that extension agents should design and provide necessary support that can boost melon production while government should supply subsidized melon-shellers/extractors to support melon farmers in the study area. Keywords: Contributions, Melon production, Sustainability, Rural farmers, Livelihood, Profitability

    Privacy Preserving Location-Based Client-Server Service Using Standard Cryptosystem

    Get PDF
    Location-Based Mobile Services (LBMS) is rapidly gaining ground and becoming increasingly popular, because of the variety of efficient and personalized services it offers. However, if users are not guaranteed their privacy and there is no assurance of genuineness of server\u27s response, the use of these services would be rendered useless and could deter its growth in mobile computing. This paper aims to provide confidentiality and integrity for communication that occurs between users and location service providers. A practical system that guarantees a user\u27s privacy and integrity of server\u27s response, using a cryptographic scheme with no trusted intermediary, is provided. This scheme also employs the use of symmetric and asymmetric encryption algorithms to ensure secure message and key transfer. In order to overcome the problem of computational complexities with these algorithms, AES-256 is used to encrypt the message and user\u27s location. Several researches have been done in this category but there is still no system that checks the integrity of server\u27s response. The proposed scheme is resistant to a range of susceptible attacks, because it provides a detailed security analysis and, when compared with related work, shows that it can actually guarantee privacy and integrity with faster average response time and higher throughput in LBMS

    Gender differences in time-poverty among rural households in Southwest Nigeria

    Get PDF
    This study seeks to assess gender inequality in and correlates of time poverty among 360 rural households in Southwest, Nigeria. A person is deemed to be time poor if (s)he works more than 10.5 hours per day, the internationally accepted threshold. Using the time allocation domain of the Abbreviated Women’s Empowerment in Agriculture Index, the study found that on the average, rural women and men spent about 10.3 hours and 8 hours, respectively, on work activities on a daily basis. Work activities for women were found to be diverse, spreading across reproductive and productive domains largely farming, own business e. g. trading, cooking and domestic work, while for men, work activities centred on productive economic activities, dominated by farming. Using a Probit regression model, the study found experience in agriculture and adoption of television to reduce the likelihood of time poverty among rural men. Surprisingly, participation in empowerment projects was found to increase the likelihood of time poverty among rural women. In conclusion, empowerment programmes should be expanded to address the non-material aspects of human well-being. Hence, the study recommends a gender-sensitive approach to intervention programmes in agriculture and adoption of a broader definition of empowerment which not only focus on expanding access to markets and increasing income but enhances control over time. This is more important for women who are already under the double burden of paid and unpaid domestic work

    A Natural Language Architecture

    Get PDF
    Natural languages are the latest generation of programming languages, which require processing real human natural expressions. Over the years, several groups or researchers have trying to develop widely accepted natural language languages based on artificial intelligence (AI). But no true natural language has been developed. The goal of this work is to design a natural language preprocessing architecture that identifies and accepts programming instructions or sentences in their natural forms and generate equivalent codes in the base high level language. The new programming language platform developed called H++, translates and processes real human natural expressions. Using Visual Basic 6.0 as the base high level programming language, the implementation resulted in an interactive and easy to use natural language platform

    An Improved Technique for Multi-Dimensional Constrained Gradient Mining

    Get PDF
    Multi-dimensional Constrained Gradient Mining, which is an aspect of data mining, is based on mining constrained frequent gradient pattern pairs with significant difference in their measures in transactional database. Top-k Fp-growth with Gradient Pruning and Top-k Fp-growth with No Gradient Pruning were the two algorithms used for Multi-dimensional Constrained Gradient Mining in previous studies. However, these algorithms have their shortcomings. The first requires construction of Fp-tree before searching through the database and the second algorithm requires searching of database twice in finding frequent pattern pairs. These cause the problems of using large amount of time and memory space, which retrogressively make mining of database cumbersome.  Based on this anomaly, a new algorithm that combines Top-k Fp-growth with Gradient pruning and Top-k Fp-growth with No Gradient pruning is designed to eliminate these drawbacks. The new algorithm called Top-K Fp-growth with support Gradient pruning (SUPGRAP) employs the method of scanning the database once, by searching for the node and all the descendant of the node of every task at each level. The idea is to form projected Multidimensional Database and then find the Multidimensional patterns within the projected databases. The evaluation of the new algorithm shows significant improvement in terms of time and space required over the existing algorithms.  &nbsp

    Performance Assessment of some Phishing predictive models based on Minimal Feature corpus

    Get PDF
    Phishing is currently one of the severest cybersecurity challenges facing the emerging online community. With damages running into millions of dollars in financial and brand losses, the sad tale of phishing activities continues unabated. This led to an arms race between the con artists and online security community which demand a constant investigation to win the cyberwar. In this paper, a new approach to phishing is investigated based on the concept of minimal feature set on some selected remarkable machine learning algorithms. The goal of this is to select and determine the most efficient machine learning methodology without undue high computational requirement usually occasioned by non-minimal feature corpus. Using the frequency analysis approach, a 13-dimensional feature set consisting of 85% URL-based feature category and 15% non-URL-based feature category was generated. This is because the URL-based features are observed to be more regularly exploited by phishers in most zero-day attacks. The proposed minimal feature set is then trained on a number of classifiers consisting of Random Tree, Decision Tree, Artificial Neural Network, Support Vector Machine and Naïve Bayes. Using 10 fold-cross validation, the approach was experimented and evaluated with a dataset consisting of 10000 phishing instances. The results indicate that Random Tree outperforms other classifiers with significant accuracy of 96.1% and a Receiver’s Operating Curve (ROC) value of 98.7%. Thus, the approach provides the performance metrics of various state of art machine learning approaches popular with phishing detection which can stimulate further deeper research work in the evaluation of other ML techniques with the minimal feature set approach

    Determining Training Needs for Cloud Infrastructure Investigations using I-STRIDE

    Full text link
    As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. This work applies the STRIDE asset-based risk assessment method to cloud computing infrastructure for the purpose of identifying and assessing an organization's ability to respond to and investigate breaches in cloud computing environments. An extension to the STRIDE risk assessment model is proposed to help organizations quickly respond to incidents while ensuring acquisition and integrity of the largest amount of digital evidence possible. Further, the proposed model allows organizations to assess the needs and capacity of their incident responders before an incident occurs.Comment: 13 pages, 3 figures, 3 tables, 5th International Conference on Digital Forensics and Cyber Crime; Digital Forensics and Cyber Crime, pp. 223-236, 201

    ASSESSMENT OF STATE GOVERNMENTS PROGRAMMES FOR SUSTAINABLE MANAGEMENT OF WETLANDS IN SOUTHWEST NIGERIA

    Get PDF
    This paper attempted to put into a clearer perspective the different programmes embarked upon by Ogun, Oyo and Lagos states government in the management of wetlands located within their domain. Zeroing on state ministries, agencies or parastatal involved in water management, the study investigated the various existing management plans embarked upon by the three State Governments. Results showed that solid waste management was in place in all the states. However, none of the States has clear legislation, enforcement and prosecution as regards the different use that are injurious to the Wetlands. Habitat creation/restoration, in situ and ex situ action, protected areas options are also not being employed in managing wetlands in southwest, Nigeria. The study therefore recommends that policies geared towards sustainable management of Wetlands should be put in place and actively pursued by the state Governments
    • …
    corecore