Abstract: There is a trend in development discourse to
understand and explain the level of corruption in Nigeria, its anticorruption
crusade and why it is failing, as well as its level of
compliance with International standards of United Nations
Convention against Corruption (UNCAC) & African Union
Convention on Converting and Preventing Corruption) to which
Nigeria is a signatory. This paper discusses the legal and
Constitutional provisions relating to corrupt practices and safeguards
in Nigeria, as well as the obstacles to the implementation of these
Conventions.
The paper highlights the challenges posed to the Anti-Corruption
crusade by analysing the loopholes that exist both in administrative
structure and in scope of the relevant laws. The paper argues that
Nigerian Constitution did not make adequate provisions for the
implementation of the conventions, hence a proposal which will
ensure adequate provision for implementing the conventions to better
the lives of Nigerians. The paper concludes that there is the need to
build institutional parameters, adequate constitutional and structural
safeguards, as well as to synergise strategies, collaborations and
alliances to facilitate the timely domestication and implementation of
the conventions.
Abstract: In its efforts to utilize the information and
communication technology to enhance the quality of public service
delivery, national and local governments around the world are
competing to introduce more ICT applications as tools to automate
processes related to law enforcement or policy execution, increase
citizen orientation, trust, and satisfaction, and create one-stop-shops
for public services. In its implementation, e-Government ICTs need
to maintain transparency, participation, and collaboration. Due to this
diverse of mixed goals and requirements, e-Government systems
need to be designed based on special design considerations in order
to eliminate the risks of failure to compliance to government
regulations, citizen dissatisfaction, or market repulsion.
In this article we suggest a framework with guidelines for
designing government information systems that takes into
consideration the special requirements of the public sector. Then we
introduce two case studies and show how applying those guidelines
would result in a more solid system design.
Abstract: In this paper we present the efficient parallel
implementation of elastoplastic problems based on the TFETI (Total
Finite Element Tearing and Interconnecting) domain decomposition
method. This approach allow us to use parallel solution and compute
this nonlinear problem on the supercomputers and decrease the
solution time and compute problems with millions of DOFs. In
our approach we consider an associated elastoplastic model with
the von Mises plastic criterion and the combination of linear
isotropic-kinematic hardening law. This model is discretized by
the implicit Euler method in time and by the finite element
method in space. We consider the system of nonlinear equations
with a strongly semismooth and strongly monotone operator. The
semismooth Newton method is applied to solve this nonlinear
system. Corresponding linearized problems arising in the Newton
iterations are solved in parallel by the above mentioned TFETI. The
implementation of this problem is realized in our in-house MatSol
packages developed in MatLab.
Abstract: The present work describes the implementation of the
Enhanced Collaborative Optimization (ECO) multilevel architecture
with a gradient-based optimization algorithm with the aim of
performing a multidisciplinary design optimization of a generic
unmanned aerial vehicle with morphing technologies. The concepts
of weighting coefficient and dynamic compatibility parameter are
presented for the ECO architecture. A routine that calculates the
aircraft performance for the user defined mission profile and vehicle’s
performance requirements has been implemented using low fidelity
models for the aerodynamics, stability, propulsion, weight, balance
and flight performance. A benchmarking case study for evaluating
the advantage of using a variable span wing within the optimization
methodology developed is presented.
Abstract: In this paper we are presenting some spamming
techniques their behaviour and possible solutions. We have analyzed
how Spammers enters into online social networking sites (OSNSs) to
target them and diverse techniques used by them for this purpose.
Spamming is very common issue in present era of Internet
especially through Online Social Networking Sites (like Facebook,
Twitter, and Google+ etc.). Spam messages keep wasting Internet
bandwidth and the storage space of servers. On social networking
sites; spammers often disguise themselves by creating fake accounts
and hijacking user’s accounts for personal gains. They behave like
normal user and they continue to change their spamming strategy.
Following spamming techniques are discussed in this paper like
clickjacking, social engineered attacks, cross site scripting, URL
shortening, and drive by download. We have used elgg framework
for demonstration of some of spamming threats and respective
implementation of solutions.
Abstract: The present study is an attempt to provide a relatively
comprehensive preview of the Iranian English translators’ perception
on Machine Translation. Furthermore, the study tries to shed light on
the status of implementation of Machine Translation among the
Iranian English Translators. To reach the aforementioned objectives,
the Localization Industry Standards Association’s questioner for
measuring perceptions with regard to the adoption of a technology
innovation was adapted and used to investigate the perception and
implementation of Machine Translation applications by the Iranian
English language translators. The participants of the study were 224
last-year undergraduate Iranian students of English translation at 10
universities across the country. The study revealed a very low level of
adoption and a very high level of willingness to get familiar with and
learn about Machine Translation, as well as a positive perception of
and attitude toward Machine Translation by the Iranian English
translators.
Abstract: Africa enjoys some of the best solar radiation levels in
the world averaging between 4-6 kWh/m2/day for most of the year
and the global economic and political conditions that tend to make
African countries more dependent on their own energy resources
have caused growing interest in renewable energy based
technologies. However to-date, implementation of modern Energy
Technologies in Africa is still very low especially the use of solar
conversion technologies. This paper presents literature review and
analysis relating to the techno-economic feasibility of solar
photovoltaic power generation in Africa. The literature is basically
classified into the following four main categories. Techno-economic
feasibility of solar photovoltaic power generation, design methods,
performance evaluations of various systems and policy of potential
future of technological development of photovoltaic (PV) in Africa
by exploring the impact of alternative policy instruments and
technology cost reductions on the financial viability of investing solar
photovoltaic in Africa.
Abstract: This paper addresses the issue of the autonomous
mobile robot (AMR) navigation task based on the hybrid control
modes. The novel hybrid control mode, based on multi-sensors
information by using the fuzzy approach, has been presented in this
research. The system operates in real time, is robust, enables the robot
to operate with imprecise knowledge, and takes into account the
physical limitations of the environment in which the robot moves,
obtaining satisfactory responses for a large number of different
situations. An experiment is simulated and carried out with a pioneer
mobile robot. From the experimental results, the effectiveness and
usefulness of the proposed AMR obstacle avoidance and navigation
scheme are confirmed. The experimental results show the feasibility,
and the control system has improved the navigation accuracy. The
implementation of the controller is robust, has a low execution time,
and allows an easy design and tuning of the fuzzy knowledge base.
Abstract: This paper describes the problem of building secure
computational services for encrypted information in the Cloud
Computing without decrypting the encrypted data; therefore, it meets
the yearning of computational encryption algorithmic aspiration
model that could enhance the security of big data for privacy,
confidentiality, availability of the users. The cryptographic model
applied for the computational process of the encrypted data is the
Fully Homomorphic Encryption Scheme. We contribute a theoretical
presentations in a high-level computational processes that are based
on number theory and algebra that can easily be integrated and
leveraged in the Cloud computing with detail theoretic mathematical
concepts to the fully homomorphic encryption models. This
contribution enhances the full implementation of big data analytics
based cryptographic security algorithm.
Abstract: The goal of this study is to identify success factors
that could influence the ISMS self-implementation in government
sector from qualitative perspective. This study is based on a case
study in one of the Malaysian government agency. Semi-structured
interviews involving five key informants were conducted to examine
factors addressed in the conceptual framework. Subsequently,
thematic analysis was executed to describe the influence of each
factor on the success implementation of ISMS. The result of this
study indicates that management commitment, implementer
commitment and implementer competency are part of the success
factors for ISMS self-implementation in Malaysian Government
Sector.
Abstract: The implementation of e-assessment as tool to support
the process of teaching and learning in university has become a
popular technological means in universities. E-Assessment provides
many advantages to the users especially the flexibility in teaching and
learning. The e-assessment system has the capability to improve its
quality of delivering education. However, there still exists a
drawback in terms of security which limits the user acceptance of the
online learning system. Even though there are studies providing
solutions for identified security threats in e-learning usage, there is no
particular model which addresses the factors that influences the
acceptance of e-assessment system by lecturers from security
perspective. The aim of this study is to explore security aspects of eassessment
in regard to the acceptance of the technology. As a result
a conceptual model of secure acceptance of e-assessment is proposed.
Both human and security factors are considered in formulation of this
conceptual model. In order to increase understanding of critical issues
related to the subject of this study, interpretive approach involving
convergent mixed method research method is proposed to be used to
execute the research. This study will be useful in providing more
insightful understanding regarding the factors that influence the user
acceptance of e-assessment system from security perspective.
Abstract: Risk analysis is considered as a fundamental aspect
relevant for ensuring the level of critical infrastructure protection,
where the critical infrastructure is seen as system, asset or its part
which is important for maintaining the vital societal functions. Article
actually discusses and analyzes the potential application of selected
tools of information support for the implementation and within the
framework of risk analysis and critical infrastructure protection. Use
of the information in relation to their risk analysis can be viewed as a
form of simplifying the analytical process. It is clear that these
instruments (information support) for these purposes are countless, so
they were selected representatives who have already been applied in
the selected area of critical infrastructure, or they can be used. All
presented fact were the basis for critical infrastructure resilience
evaluation methodology development.
Abstract: The decision-making process is theoretically clearly
defined. Generally, it includes the problem identification and
analysis, data gathering, goals and criteria setting, alternatives
development and optimal alternative choice and its implementation.
In practice however, various modifications of the theoretical
decision-making process can occur. The managers can consider some
of the phases to be too complicated or unfeasible and thus they do not
carry them out and conversely some of the steps can be
overestimated.
The aim of the paper is to reveal and characterize the perception of
the individual phases of decision-making process by the managers.
The research is concerned with managers in the military environment
– commanders. Quantitative survey is focused cross-sectionally in the
individual levels of management of the Ministry of Defence of the
Czech Republic. On the total number of 135 respondents the analysis
focuses on which of the decision-making process phases are
problematic or not carried out in practice and which are again
perceived to be the easiest. Then it is examined the reasons of the
findings.
Abstract: ESPRIT-TLS method appears a good choice for high
resolution fault detection in induction machines. It has a very high
effectiveness in the frequency and amplitude identification.
Contrariwise, it presents a high computation complexity which
affects its implementation in real time fault diagnosis. To avoid this
problem, a Fast-ESPRIT algorithm that combined the IIR band-pass
filtering technique, the decimation technique and the original
ESPRIT-TLS method was employed to enhance extracting accurately
frequencies and their magnitudes from the wind stator current with
less computation cost. The proposed algorithm has been applied to
verify the wind turbine machine need in the implementation of an online,
fast, and proactive condition monitoring. This type of remote
and periodic maintenance provides an acceptable machine lifetime,
minimize its downtimes and maximize its productivity. The
developed technique has evaluated by computer simulations under
many fault scenarios. Study results prove the performance of Fast-
ESPRIT offering rapid and high resolution harmonics recognizing
with minimum computation time and less memory cost.
Abstract: This article discusses issues related to the System of
Innovation: Comparing economies of Brazil and South Africa.
Having as this study aimed at comparing the Innovation System of
the countries mentioned. Then briefly describe the process of Venture
Capital and present the industry innovation in Brazil and South
Africa. The methodological approach described in this article is
descriptive and the approach is qualitative, taking as a basis
secondary data relating to research articles. The main results are
related to the different forms of financing of Venture Capital used by
countries compared, in addition to the training and economic policy.
And finally, it was highlighted the importance of implementation of
policy reforms for the Brazil and Africa in the innovation process.
Abstract: Nature is a great source of inspiration for solving
complex problems in networks. It helps to find the optimal solution.
Metaheuristic algorithm is one of the nature-inspired algorithm which
helps in solving routing problem in networks. The dynamic features,
changing of topology frequently and limited bandwidth make the
routing, challenging in MANET. Implementation of appropriate
routing algorithms leads to the efficient transmission of data in
mobile ad hoc networks. The algorithms that are inspired by the
principles of naturally-distributed/collective behavior of social
colonies have shown excellence in dealing with complex
optimization problems. Thus some of the bio-inspired metaheuristic
algorithms help to increase the efficiency of routing in ad hoc
networks. This survey work presents the overview of bio-inspired
metaheuristic algorithms which support the efficiency of routing in
mobile ad hoc networks.
Abstract: In this paper, we propose an automatic verification
technology of software patches for user virtual environments on IaaS
Cloud to decrease verification costs of patches. In these days, IaaS
services have been spread and many users can customize virtual
machines on IaaS Cloud like their own private servers. Regarding to
software patches of OS or middleware installed on virtual machines,
users need to adopt and verify these patches by themselves. This task
increases operation costs of users. Our proposed method replicates
user virtual environments, extracts verification test cases for user
virtual environments from test case DB, distributes patches to virtual
machines on replicated environments and conducts those test cases
automatically on replicated environments. We have implemented the
proposed method on OpenStack using Jenkins and confirmed the
feasibility. Using the implementation, we confirmed the effectiveness
of test case creation efforts by our proposed idea of 2-tier abstraction
of software functions and test cases. We also evaluated the automatic
verification performance of environment replications, test cases
extractions and test cases conductions.
Abstract: The restrained construction zoning, an important part
in the urban master plan, is a necessary planning tool to control the city
sprawl, to guarantee the reservation implementation of the various
types of protective elements, and to realize the storage of the essential
urban spatial resources. Simultaneously, owing to the diverse
constitutes of restrained construction area and the various stakeholders
involved in, its planning requires an overall consideration of all
elements from the perspective of coordination+, balance and
practicability to deal with the problems and conflicts in this process.
Taking Yangzijin Ecological Restrained Construction Area in
Yangzhou as an example, this study analyzes all the potential actors,
agencies and stakeholders in this restrained construction area, as well
as the relevant conflicts between each other. Besides, this study tries to
build up a planning procedure based on the framework of governance
theory, and proposes a possible planning method that combines
"rigidity" and "flexibility" to protect the ecological limitation
boundary, to take every interest into account, and to promote economic
development in a harmonious society.
Abstract: Recently, universities are increasingly consuming
energy to support various activities. A large population of staff and
students in Malaysian universities has led to excessive energy
consumption which directly gives an impact to the environment. The
key question then ascended “How well is an energy management
(EM) been practiced in universities without taking the Critical
Success Factors (CSFs) into consideration to ensure the management
of university achieves the goals in reducing energy consumption.
Review on past literature is carried out to establish CSFs for EM best
practices. Thus, this paper highlighted the CSFs which have to be
focused on by management of university to successfully measure the
EM implementation and its performance. At the end of this paper, a
theoretical framework is developed for EM success factors towards
sustainable university.
Abstract: The present paper summarizes the analysis of the
request for consultation of information and data on industrial
emissions made publicly available on the web site of the Ministry of
Environment, Land and Sea on integrated pollution prevention and
control from large industrial installations, the so called “AIA Portal”.
As a matter of fact, a huge amount of information on national
industrial plants is already available on internet, although it is usually
proposed as textual documentation or images.
Thus, it is not possible to access all the relevant information
through interoperability systems and also to retrieval relevant
information for decision making purposes as well as rising of
awareness on environmental issue.
Moreover, since in Italy the number of institutional and private
subjects involved in the management of the public information on
industrial emissions is substantial, the access to the information is
provided on internet web sites according to different criteria; thus, at
present it is not structurally homogeneous and comparable.
To overcome the mentioned difficulties in the case of the
Coordinating Committee for the implementation of the Agreement
for the industrial area in Taranto and Statte, operating before the
IPPC permit granting procedures of the relevant installation located
in the area, a big effort was devoted to elaborate and to validate data
and information on characterization of soil, ground water aquifer and
coastal sea at disposal of different subjects to derive a global
perspective for decision making purposes. Thus, the present paper
also focuses on main outcomes matured during such experience.