Shoulder Surfing Resistant Graphical Authentication Scheme for Web Based Applications
Since the design and development of the first graphical authentication pioneered by Blonder in 1996, numerous research has been conducted on this area to be used in different scenario especially on the Internet. One of the major motivators is the picture superiority which as studies have shown, states that image/pictures provides higher memorability as opposed to Text based authentication. However, graphical authentication is still faced with some challenges. In this paper, a shoulder surfing resistant graphical authentication scheme is proposed to tackle the major issues related to the graphical authentication schemes developed. In summary, the proposed scheme provides a high level of resistance to shoulder surfing attacks, mitigating the need to upload pictures and aids in finding chosen objects in the scheme. Finally, the schemes still have some vulnerabilities thus, concluding that there cannot be a perfect graphical authentication scheme; each scheme has its merits and demerits making it a suitable candidate for different environment and/or event based on its architecture.
Teenage Violence in Secondary Schools in Anambra State: Causes, Effects and Possible Solutions
The study of the causes, effects and possible solutions to teenage violence in secondary schools was carried out in Onitsha Education Zone of Anambra State. The schools used for the study were randomly selected. The population of the study comprised 2932 students. The sample for this study consisted of 1743 subjects representing 60 percent of each stratum. The instrument used was a questionnaire. The instrument was duly validated by experts and the reliability index was 0.94 which was considered adequate for the study. The instrument was administered by the researcher with the help of research assistants. The direct approach method was used. Mean scores were used in data analysis. The results obtained indicated that the causes of teenage violence included anti social family background, negative media information, making the teenager behave anti-socially affecting their lives, that of their families and the society at large. However an administrator should be concerned with the mental and social growth of students and also establish guidelines and procedures to protect the students and provide for their emotional growth. It was also recommended that the teachers should endeavour to become approachable and assessable and be role models by-being non-judgmental and supportive in their dealing with students.
Strategies for Enhancing Peace Education for National Security in Nigeria
This work is a product of library research. The purpose was to discuss national security in Nigeria in relation to peace education. The concepts of peace education and national security were presented. The reasons for national security were discussed. The researchers also articulated the efforts so far made in Nigeria to promote national security. The work also articulated the importance of peace education to national security. The major challenges to national security in Nigeria were highlighted and strategies for enhancing peace education for national security were documented. Part of the suggestions was that elders at family and society levels should show good examples and inculcate in the children, the culture of tolerance and coexistence in the plural society, as well as teaching them patriotism and civic responsibilities to the nation over and above allegiance to tribe or ethnicity as a way of achieving national security in Nigeria.
Is L-arginine or glucose dependence required for fetal growth, survival and maternal progesterone during late pregnancy in ewes?
This study aimed at investigating effects of drenching low and high dosage of L-arginine alone, combined with propylene glycol or propylene glycol alone during the eight weeks during late ewe’s gestation on the litter weight and survival at birth and maternal progesterone (P4). Thirty four adult Najdi ewes were randomly allotted into six groups (G). G1 (C, control, n=6) ewes orally given 50 ml physiological saline daily, G2 (LA, n=6) ewes given 50 ml containing 37.5 mg L-arginine/kg/day, G3 (HA, N=6) ewes given 50 ml containing 75 mg l-arginine/kg/day, G4 (P, n=6) ewes given 50 ml propylene glycol, G5 (LAP, n=5) ewes given 50 ml containing 25 ml propylene glycol and 25 ml LA and G6 (HAP, n=5) ewes given 50 ml containing 25 ml propylene glycol and 25 ml HA. Jugular blood samples for serum P4 were collected once a week from the beginning of treatment till parturition. At parturition litter size, litter weight, neonatal birth weight and viability were determined. Mean lamb birth weight was 3.75, 5.44, 5.72, 5.75, 7.33 and 5.6 kg in C, LA, HA, P, LAP and HAP, respectively. Survival rates at birth were 75, 87.5, 100, 83.3, 83.3 and 100% in C, LA, HA, P, LAP and HAP, respectively. The highest P4 level with typical profile was found in LAP ewes. In conclusion, administration of a combination of l-arginine (37.5 mg/kg/d) with propylene glycol during eight weeks of late sheep pregnancy not only enhanced fetal growth and survival of neonates but it also enhanced maternal corpus luteum function.
A Quantitative Model of Smartphone Adoption Among Urban and Rural Nigerians: The Role of Social Context In Ensuring Continuous Usage
Rapid diffusion and adoption of smartphone technologies could accelerate development in developing nations like Nigeria. Much is known about the factors that influence technology adoption and continuous use in general, but these theories of socio-economic impact have rarely been tested in Nigeria. Additionally, there may be differences in technology adoption and use behaviors between urban and rural settings. Such differences could influence strategies for encouraging widespread smartphone adoption in Nigeria. Therefore, the present quantitative, survey study sought to test a theoretical model of smartphone adoption and continuous use based on the unified theory of acceptance and use of technologies as well as on expectation confirmation theory. Using factor analysis and partial least squares analysis, this research tested a set of hypotheses related to intention to use smartphones and continuous use, exploring the moderating role of urban versus rural locations. The study discovered that, among Nigerians with high performance expectancy, those who lives in urban areas are more likely to intend to use smartphones when compared with their rural counterparts. The study concluded that social, socio-economic, and infrastructure factors enable urban dwellers to utilize smartphones, whereas context factors make smartphone adoption more difficult in rural areas. That is social influence was positively correlated with intention to use smartphones. Additionally, there is a strong positive correlation between intent to use and continuous usage of mobile technologies, justifying intent to use as an important outcome variable in research on technology adoption in Africa. Based on the results of the finding, this work recommends amongst others, that adequate Information Technology Infrastructure should be planned on a continuous basis for deployment in the rural areas.
Walking Behavior Based Human Recognition System
In the recent period with the growing need for surveillance system, people looking for suitable method to identify person. Depending on the features of biometric that can specify human identity by using identification and verification functions. The verification process is done by compare the biometric features such as, fingerprint, iris, face recognition, etc., with a record stored previously. While the identification process is performed by find the best match between the biometric features and all records kept in a database. Walking behavior recognition is the only biometric that can specify an individual identity at distance that relying on walking behavior features such as step length, angle of hip and knee, etc. In this paper we propose a biometric based human identification system depending on walking behavior characteristic which is vertical hip angle, horizontal hip angle and slop of thigh that extract from captured picture of person. A database of numerous people has been used. A database has been constructed using SQL server software environment in which person identification performed with high efficiency. The outcome of the proposal system reflects flexibility in term of inserting, searching, updating, deleting and matching.
Review of Mathematical Approach to Engineering Problems
Mathematics is widely used in every engineering fields. In this paper, several examples of applications of mathematics in mechanical, chemical, optimization and electrical engineering are discussed. Laplace transform mathematical tool is applied to solve problems. Applications here are the real ones found in the engineering fields, which may not be the same as discussed in many mathematics text books. The purpose of this paper is to relate mathematics to engineering field.
Composed Reed Solomon Sequences Generated by ith Partial Sum of Geometrical Sequences
Reed–Solomon codes are an important group of error-correcting that were introduced by Irving S. Reed and Justine Solomon in 1960. They used in the error coding control, special in systems that have two way communication channels in two externally applications: deep telecommunications and the compact disc. They have many important applications, the most prominent of which include consumer technologies such as CDs, DVDs, Blue-ray Discs, QR Codes, data transmission, technologies such as DSL and Wi MAX, broadcast, systems such as DVB and ATSC, and storage systems such as RAID 6 . They are also used in satellite communication. This research is useful to generate new Reed Solomon Codes and their composed sequences using the ith partial sum of geometrical sequences with the bigger lengths and the bigger minimum distance that assists to increase secrecy of these information and increase the possibility of correcting mistakes resulting in the channels of communication.