Olawoyin, Abdul-Rahman Musrafah, N. Faruk, A. OloyedeA., C. .AdeniranT., .. Imam-Fulani, Bashir Abdullahi Baba
Due to quest for high data rate, reliable and secure communication, this has motivated both wired and wireless network access service providers to deploy a next-generation network with ability to meet the required need. The use orthogonal frequency division multiplexing(OFDM) enables reliable transmission of various data traffic by optimizing subcarrier, power, and allocation of bits among different users. Traditionally, securing data in wireless system is always at the upper layer of open system interconnection(OSI) Model by using data encryption techniques. However, such techniques may not be acceptable for future decentralized networks due to their high complexity in implementation and computation. In this work, an OFDM IEEE 802.11a wireless system is used and physical layer encryption (PLE) schemes are implemented in securing the information transfer between two legitimate parties. In the simulation, the source data are encrypted by obfuscation with dummy data in between the encrypted data of which 52 subcarriers were considered of which 25 subcarriers are reserved for dummy data and 27 were for data. The simulation was conducted for four different modulation techniques i.e., BPSK, QPSK, 16 QAM, and 64 QAM. The result obtained shown that for all the modulation schemes, the key rate increases with an increase in the reserved subcarrier bits. Also ,the security level increased when substantial percentages of the subcarriers are reserved for dummy data
{"title":"Hybridization of OFDMand Physical Layer Techniques for Information Security in Wireless System","authors":"Olawoyin, Abdul-Rahman Musrafah, N. Faruk, A. OloyedeA., C. .AdeniranT., .. Imam-Fulani, Bashir Abdullahi Baba","doi":"10.56471/slujst.v6i.301","DOIUrl":"https://doi.org/10.56471/slujst.v6i.301","url":null,"abstract":"Due to quest for high data rate, reliable and secure communication, this has motivated both wired and wireless network access service providers to deploy a next-generation network with ability to meet the required need. The use orthogonal frequency division multiplexing(OFDM) enables reliable transmission of various data traffic by optimizing subcarrier, power, and allocation of bits among different users. Traditionally, securing data in wireless system is always at the upper layer of open system interconnection(OSI) Model by using data encryption techniques. However, such techniques may not be acceptable for future decentralized networks due to their high complexity in implementation and computation. In this work, an OFDM IEEE 802.11a wireless system is used and physical layer encryption (PLE) schemes are implemented in securing the information transfer between two legitimate parties. In the simulation, the source data are encrypted by obfuscation with dummy data in between the encrypted data of which 52 subcarriers were considered of which 25 subcarriers are reserved for dummy data and 27 were for data. The simulation was conducted for four different modulation techniques i.e., BPSK, QPSK, 16 QAM, and 64 QAM. The result obtained shown that for all the modulation schemes, the key rate increases with an increase in the reserved subcarrier bits. Also ,the security level increased when substantial percentages of the subcarriers are reserved for dummy data","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129706653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Modern computer systems have an operating system, which serves as an interface between the device and the user and has the dual objectives of making the device easier to operate and making optimal use of device resources. The operating system offers some level of computer security like user authentication, file permission, firewall, encryption etc., but occasionally, problems develop due to societal or technical challenges like: vulnerable to malicious programs and viruses, which can cause the system to become sluggish or malicious actors be able to have an access to confidential user data, which compromise computer security. This comparative study provides insight into each of these operating systems and their relative strengths and weaknesses. The paper begins by discussing the concepts of memory management and security in general and then examines the specifics of each OS's memory management and security features. A case study of three popular applications is presented to illustrate how memory management and security features can be used in practice. The results of the comparison show that while each operating system has its own advantages and disadvantages, Windows is generally the most powerful and secure of the three, while iOS and Android offer more flexibility and ease of use.
{"title":"A Comparative Study of Modern Operating Systems in terms of Memory and Security: A Case Study of Windows, iOS, and Android","authors":"Abdullahi Umar Umar","doi":"10.56471/slujst.v6i.353","DOIUrl":"https://doi.org/10.56471/slujst.v6i.353","url":null,"abstract":"Modern computer systems have an operating system, which serves as an interface between the device and the user and has the dual objectives of making the device easier to operate and making optimal use of device resources. The operating system offers some level of computer security like user authentication, file permission, firewall, encryption etc., but occasionally, problems develop due to societal or technical challenges like: vulnerable to malicious programs and viruses, which can cause the system to become sluggish or malicious actors be able to have an access to confidential user data, which compromise computer security. This comparative study provides insight into each of these operating systems and their relative strengths and weaknesses. The paper begins by discussing the concepts of memory management and security in general and then examines the specifics of each OS's memory management and security features. A case study of three popular applications is presented to illustrate how memory management and security features can be used in practice. The results of the comparison show that while each operating system has its own advantages and disadvantages, Windows is generally the most powerful and secure of the three, while iOS and Android offer more flexibility and ease of use.","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Over the years, scientists have used natural discoveries such as evolution to solve real-world problems. Addressing the challenges that arise when dealing with high-dimensional data is one such problem. These challenges include difficulties in analyzing, visualizing, and modelling these high-dimensional data. As a result, the Swarm Intelligence (SI) techniquewas developed, which was inspired by natural swarm foraging behaviors. Particle swarm optimization (PSO) is a well-known SI algorithm for addressing a wide range of optimization problems. As a result, it has been used to solve a variety of optimization problems in fields as diverse as genomic analysis and intrusion detection systems. One of the most successful areas of PSO application is feature selection, which entails using computational techniques to select a reduced subset of features that have a sufficient relationship with their corresponding class labels. This, in turn, addresses the mentioned challenges. Nonetheless, progressive research has revealed several problems with PSO, including problems with diversity, and premature convergence among others. As a result, several improvements and extensions were made to various aspects of the algorithm since its inception to make it efficient. This paper organizes and summarizes current research on improvements to the PSO algorithm for solving the feature selection problem. Consequently, it presents current trends and directions for scholars in the field, as well as open challenges and literature gaps to investigate
{"title":"Towards an Improved Particle Swarm Optimization for Feature Selection: A Survey","authors":"Isuwa Jeremiah","doi":"10.56471/slujst.v6i.354","DOIUrl":"https://doi.org/10.56471/slujst.v6i.354","url":null,"abstract":"Over the years, scientists have used natural discoveries such as evolution to solve real-world problems. Addressing the challenges that arise when dealing with high-dimensional data is one such problem. These challenges include difficulties in analyzing, visualizing, and modelling these high-dimensional data. As a result, the Swarm Intelligence (SI) techniquewas developed, which was inspired by natural swarm foraging behaviors. Particle swarm optimization (PSO) is a well-known SI algorithm for addressing a wide range of optimization problems. As a result, it has been used to solve a variety of optimization problems in fields as diverse as genomic analysis and intrusion detection systems. One of the most successful areas of PSO application is feature selection, which entails using computational techniques to select a reduced subset of features that have a sufficient relationship with their corresponding class labels. This, in turn, addresses the mentioned challenges. Nonetheless, progressive research has revealed several problems with PSO, including problems with diversity, and premature convergence among others. As a result, several improvements and extensions were made to various aspects of the algorithm since its inception to make it efficient. This paper organizes and summarizes current research on improvements to the PSO algorithm for solving the feature selection problem. Consequently, it presents current trends and directions for scholars in the field, as well as open challenges and literature gaps to investigate","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125990480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Most Wireless Rechargeable Sensor Networks (WRSN) allow simultaneous energy replenishment with data gathering. These schemes suffer from high energy consumption of mobile chargers and could require new sensor design for their integration. Thus, we propose Distributed Energy Replenishment and Data Gathering (DERDG) to reduce the energy consumption of the chargers and Spatio-Temporal Non-Concurrent Data gathering and Energy replenishment (ST-NCDR) that are easily be integrable on the sensor nodes. In these schemes, sensor nodes are divided into clusters and requests from energy-hungry nodes are arranged based on their temporal properties in DERDG, but using their spatial and temporal properties in ST-NCDR. In ST-NCDR scheme, two mobile chargers replenish the energy of energy-hungry nodes when they are not performing sensing and transmission of data, but irrespective of their operational states in DERDG scheme. Simulation results indicate the superiority of the schemes over state-of-the-art schemes in terms of energy consumption of mobile chargers and average residual energy of the nodes. Both DERDG and ST-NCDR reduced the energy consumption of the chargers, without reduction in the network lifetime, by an average of 29.45% and 73.70%, respectively, when compared to the work of Han et al. (2018), and by 71.40% and 93.80% in comparison to the work of Mikail et al. (2020). DERDG reduces data delivery delay by 95.50% in comparison to the work of Han et. al, (2018). The findings imply that ST-NCDR can be easily integrated into sensor nodes and yields a reduction in the energy of mobiles chargers use in charging the sensor nodes that translate to lower cost of network operation, in addition to improving the residual energy of nodes in WRSN. This part should state the context of the research being reported. Aim: the objective of the research should be clearly stated here Method: the research approach used in the study, justifying its suitability for the study should be stated here. Results: the findings and their implication(s) should be clearly enumerated and briefly discussed here
{"title":"Schemes for Extending the Network Lifetime of Wireless Rechargeable Sensor Networks","authors":"S. A. Mikail","doi":"10.56471/slujst.v6i.373","DOIUrl":"https://doi.org/10.56471/slujst.v6i.373","url":null,"abstract":"Most Wireless Rechargeable Sensor Networks (WRSN) allow simultaneous energy replenishment with data gathering. These schemes suffer from high energy consumption of mobile chargers and could require new sensor design for their integration. Thus, we propose Distributed Energy Replenishment and Data Gathering (DERDG) to reduce the energy consumption of the chargers and Spatio-Temporal Non-Concurrent Data gathering and Energy replenishment (ST-NCDR) that are easily be integrable on the sensor nodes. In these schemes, sensor nodes are divided into clusters and requests from energy-hungry nodes are arranged based on their temporal properties in DERDG, but using their spatial and temporal properties in ST-NCDR. In ST-NCDR scheme, two mobile chargers replenish the energy of energy-hungry nodes when they are not performing sensing and transmission of data, but irrespective of their operational states in DERDG scheme. Simulation results indicate the superiority of the schemes over state-of-the-art schemes in terms of energy consumption of mobile chargers and average residual energy of the nodes. Both DERDG and ST-NCDR reduced the energy consumption of the chargers, without reduction in the network lifetime, by an average of 29.45% and 73.70%, respectively, when compared to the work of Han et al. (2018), and by 71.40% and 93.80% in comparison to the work of Mikail et al. (2020). DERDG reduces data delivery delay by 95.50% in comparison to the work of Han et. al, (2018). The findings imply that ST-NCDR can be easily integrated into sensor nodes and yields a reduction in the energy of mobiles chargers use in charging the sensor nodes that translate to lower cost of network operation, in addition to improving the residual energy of nodes in WRSN. This part should state the context of the research being reported. Aim: the objective of the research should be clearly stated here Method: the research approach used in the study, justifying its suitability for the study should be stated here. Results: the findings and their implication(s) should be clearly enumerated and briefly discussed here","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114838585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: Bank loan approval is one of the important pillars of the banking system; it is the process of approving or denying a loan to companies or individual customers by the bank. The approval process has a lot of parameters to be taken into consideration, which is ambiguous in nature; hence, bank loan approval required special knowledge to be executed. Aim: Due to the ambiguity of the approval process, we proposed the use of a fuzzy expert system which proved to handle such ambiguous problems to help banks easily and accurately make decisions on bank credit approval. This proposed fuzzy expert system will help banks in making accurate decisions easily even in the absence of the domain expert on credit approval based on the knowledge of an expert in the field. Method: The proposed fuzzy expert system was developed using a fuzzy tool in MATLAB software and it has two stages, where the first stage decides on three output parameters which are repayment, ability manage, and risk. Total asset, credit repayment, 18% earning, business stability, credit missed, asset/debt ratio, bond rating, and dollar to Naira ratio are the input parameters for the first stage of the system. The second stage of the system used the output parameters values of the first stage as its input parameters to make the final decision on whether to approve the credit or not. Results: Using 0.938, 0.583, 0.715, 0.88, 0.104, 0.897, 0.842, and 0.856 membership degree for total asset, credit request (loan amount), 18% earning, business stability, asset/debt ratio, bond rating, and dollar to naira ratio respectively as an input to the first stage of the system, the resultant output were 0.625, 0.367, and 0.25 for repayment, ability manage, and risk respectively, and those were feed to the second stage and result in 0.656 loan membership degree which means the loan can be approve to the customer
{"title":"Fuzzy Expert System for Bank Loan Approval","authors":"A. Ismail","doi":"10.56471/slujst.v6i.349","DOIUrl":"https://doi.org/10.56471/slujst.v6i.349","url":null,"abstract":"Background: Bank loan approval is one of the important pillars of the banking system; it is the process of approving or denying a loan to companies or individual customers by the bank. The approval process has a lot of parameters to be taken into consideration, which is ambiguous in nature; hence, bank loan approval required special knowledge to be executed. Aim: Due to the ambiguity of the approval process, we proposed the use of a fuzzy expert system which proved to handle such ambiguous problems to help banks easily and accurately make decisions on bank credit approval. This proposed fuzzy expert system will help banks in making accurate decisions easily even in the absence of the domain expert on credit approval based on the knowledge of an expert in the field. Method: The proposed fuzzy expert system was developed using a fuzzy tool in MATLAB software and it has two stages, where the first stage decides on three output parameters which are repayment, ability manage, and risk. Total asset, credit repayment, 18% earning, business stability, credit missed, asset/debt ratio, bond rating, and dollar to Naira ratio are the input parameters for the first stage of the system. The second stage of the system used the output parameters values of the first stage as its input parameters to make the final decision on whether to approve the credit or not. Results: Using 0.938, 0.583, 0.715, 0.88, 0.104, 0.897, 0.842, and 0.856 membership degree for total asset, credit request (loan amount), 18% earning, business stability, asset/debt ratio, bond rating, and dollar to naira ratio respectively as an input to the first stage of the system, the resultant output were 0.625, 0.367, and 0.25 for repayment, ability manage, and risk respectively, and those were feed to the second stage and result in 0.656 loan membership degree which means the loan can be approve to the customer","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"578 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131512690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lecture attendance management is usually tedious, and time-consuming and may be prone to errors or manipulations when done manually. Hence, in this work, a web application called RollCall was developed and tested, for use by both students and lecturers in the Faculty of Engineering at the University of Ilorin as a model to manage attendance. The system manages attendance by allowing the lecturers to create courses, and take and retrieve attendance records for the courses created. Student functionalities include uploading their face data, enrolling for courses, and retrieving attendance records for the courses in which they enrolled. Attendance is marked through face recognition technology implemented with Python, OpenCV and Sci-kit Learn. The web interface was implemented using HTML5, Twitter Bootstrap CSS framework and JavaScript. The findings revealed that RollCall effectively streamlined attendance management, making it easier for both students and lecturers to keep track of attendance records. The web application is user-friendly and enhances the overall academic experience by improving the accuracy and efficiency of attendance management
{"title":"Development of Face Recognition-Based Attendance System","authors":"Okechukwu. M. Chukwude","doi":"10.56471/slujst.v6i.362","DOIUrl":"https://doi.org/10.56471/slujst.v6i.362","url":null,"abstract":"Lecture attendance management is usually tedious, and time-consuming and may be prone to errors or manipulations when done manually. Hence, in this work, a web application called RollCall was developed and tested, for use by both students and lecturers in the Faculty of Engineering at the University of Ilorin as a model to manage attendance. The system manages attendance by allowing the lecturers to create courses, and take and retrieve attendance records for the courses created. Student functionalities include uploading their face data, enrolling for courses, and retrieving attendance records for the courses in which they enrolled. Attendance is marked through face recognition technology implemented with Python, OpenCV and Sci-kit Learn. The web interface was implemented using HTML5, Twitter Bootstrap CSS framework and JavaScript. The findings revealed that RollCall effectively streamlined attendance management, making it easier for both students and lecturers to keep track of attendance records. The web application is user-friendly and enhances the overall academic experience by improving the accuracy and efficiency of attendance management","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135949923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Background: Measuring and monitoring the temperature and humidity levels in a computer laboratory is crucial for ensuring the safety of the facility and the comfort of those using it. The latest technology for collecting this data is the Internet of Things (IoT), which uses sensors to monitor these parameters remotely. Aim: This paper presents an IoT system that assesses the temperature and humidity levels in a computer laboratory using a Raspberry Pi single-board computer and a DHT11 sensorMethod: The major contribution of this research is it utilizes the ThingSpeak Cloud database which provide the result faster within the shortest interval time which improve the temperature and humidity values more than the traditional Message Queue Telemetry Transport (MQTT). The DHT11 sensor captures the temperature and humidity data, which is then uploaded to the servers in real-time. This allows laboratory managers and decision-makers to monitor the laboratory's condition through a web portal or a mobile application installed on their Android or iOS devices from anywhere.Results:The results show that the ThingSpeak Cloud database provides the result of the temperatureas to 31.5°C and the relative humidity 74.8%.
{"title":"Embedded Internet of Things (IoT) Enviromental Monitoring System Using Raspberry PI","authors":"Dauda Muhammad","doi":"10.56471/slujst.v6i.352","DOIUrl":"https://doi.org/10.56471/slujst.v6i.352","url":null,"abstract":"Background: Measuring and monitoring the temperature and humidity levels in a computer laboratory is crucial for ensuring the safety of the facility and the comfort of those using it. The latest technology for collecting this data is the Internet of Things (IoT), which uses sensors to monitor these parameters remotely. Aim: This paper presents an IoT system that assesses the temperature and humidity levels in a computer laboratory using a Raspberry Pi single-board computer and a DHT11 sensorMethod: The major contribution of this research is it utilizes the ThingSpeak Cloud database which provide the result faster within the shortest interval time which improve the temperature and humidity values more than the traditional Message Queue Telemetry Transport (MQTT). The DHT11 sensor captures the temperature and humidity data, which is then uploaded to the servers in real-time. This allows laboratory managers and decision-makers to monitor the laboratory's condition through a web portal or a mobile application installed on their Android or iOS devices from anywhere.Results:The results show that the ThingSpeak Cloud database provides the result of the temperatureas to 31.5°C and the relative humidity 74.8%.","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128449498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Before the COVID-19 pandemic, global food security has been known to be a major threat for developed and developing countries of the world. However, during the COVID-19 pandemic, global food security was expected to be at a very high risk due to lockdown across the globe. Consequently, the developing countries, most especially, were expected to experience food shortage challenges. One important way to measure the amount of food production of any country in the world is through the use of a macroeconomic variable known as Food Production Index (FPI). Therefore, this study seeks to examine the post-COVID-19 behaviorof the Nigeria’s FPI using the Box-Jenkins methodology for modelingunivariate time series. A low-frequency time series datasets over 56 years spanning from 1961 to 2016 on Nigerian FPI was extracted from World Bank repository. Pre-tests results from the unit root analyses, correlogram and selection criteria techniques showed that the FPI is a differenced stationary series of order one {I(1)}and that ARIMA (2, 1, 2) model best fitted the series. Besides, diagnostic checking of the fitted model confirmed that the error was white noise and forecast of 8 years (2017 to 2024) was made. Findings from the study revealed that the future values of the FPI are erratic and expected to fluctuate (i.e.,rise and fall) within the predicted periods. Conclusively, the fourteen years out sample forecast of FPI for the periods 2017 to 2030 indicates that the gains of FPI in recent years is currently being affected bythe current COVID-19 pandemic. The study recommends that concerted efforts to achieve optimal FPI must be focused on the improvement of inter-regional trade which will result in shorter food chains, and thereby creating more market for farmers and enhancing accessibility to both inputs and outputs
{"title":"Modelling of Post-COVID-19 Food Production Index in Nigeria using Box-Jenkins Methodology","authors":"M. Garba","doi":"10.56471/slujst.v6i.286","DOIUrl":"https://doi.org/10.56471/slujst.v6i.286","url":null,"abstract":"Before the COVID-19 pandemic, global food security has been known to be a major threat for developed and developing countries of the world. However, during the COVID-19 pandemic, global food security was expected to be at a very high risk due to lockdown across the globe. Consequently, the developing countries, most especially, were expected to experience food shortage challenges. One important way to measure the amount of food production of any country in the world is through the use of a macroeconomic variable known as Food Production Index (FPI). Therefore, this study seeks to examine the post-COVID-19 behaviorof the Nigeria’s FPI using the Box-Jenkins methodology for modelingunivariate time series. A low-frequency time series datasets over 56 years spanning from 1961 to 2016 on Nigerian FPI was extracted from World Bank repository. Pre-tests results from the unit root analyses, correlogram and selection criteria techniques showed that the FPI is a differenced stationary series of order one {I(1)}and that ARIMA (2, 1, 2) model best fitted the series. Besides, diagnostic checking of the fitted model confirmed that the error was white noise and forecast of 8 years (2017 to 2024) was made. Findings from the study revealed that the future values of the FPI are erratic and expected to fluctuate (i.e.,rise and fall) within the predicted periods. Conclusively, the fourteen years out sample forecast of FPI for the periods 2017 to 2030 indicates that the gains of FPI in recent years is currently being affected bythe current COVID-19 pandemic. The study recommends that concerted efforts to achieve optimal FPI must be focused on the improvement of inter-regional trade which will result in shorter food chains, and thereby creating more market for farmers and enhancing accessibility to both inputs and outputs","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114482781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rising from the outbreak of COVID-19 pandemic, all schools in Nigeria were put under lock and key, like other countries. This was to curtail the rapid spread of the virus, while the medical practitioners were in the laboratories. But due to longer period of shutdown to formal education, most higher institutions instantaneously keyed-in to any available social media platform (SMP) without understudying its efficiency and effectiveness for knowledge transfer. The consequences of this include non-satisfactory knowledge transfer, most especially, by the learners; hence, aim of knowledge impact is jeopardized. This study therefore is aimed to fill the gap to correct the existing damage, and prevent the likelihood of not-afore-put-to-test syndrome in the subsequent choice of SMP. To achieve this, University of Ilorin is chosen as the territory survey for being the most sought-after University for admission in Nigeria. Quantitative research methods were adopted, being the most appropriate for this study in the literature. A total of 200 respondents participated voluntarily with the adoption of Slovin’s formula for the sampling techniques; 156 students and 44 lecturers. The data collection process was performed through a survey comprising demographic, dichotomous, multiple choice, and open-ended questionnaire to capture detail information for the research work. Simple descriptive statistics was employed for the analysis. Our findings reveal that out of the seventeen SMPs put to test, zoom platform ranks the most effective and efficient for the knowledge delivery and acquisition by the lecturers and students of the University respectively, based on the designed principles. Therefore, making Zoom platform the most preferred for e-learning. This study recommends that choice of satisfactory SMP for knowledge delivery should be utmost concern of all institutions before embarking on virtual learning system
{"title":"Towards the Choice of Better Social Media Platform for Knowledge Delivery: Exploratory Study in University of Ilorin","authors":"I. A. Sikiru","doi":"10.56471/slujst.v6i.361","DOIUrl":"https://doi.org/10.56471/slujst.v6i.361","url":null,"abstract":"Rising from the outbreak of COVID-19 pandemic, all schools in Nigeria were put under lock and key, like other countries. This was to curtail the rapid spread of the virus, while the medical practitioners were in the laboratories. But due to longer period of shutdown to formal education, most higher institutions instantaneously keyed-in to any available social media platform (SMP) without understudying its efficiency and effectiveness for knowledge transfer. The consequences of this include non-satisfactory knowledge transfer, most especially, by the learners; hence, aim of knowledge impact is jeopardized. This study therefore is aimed to fill the gap to correct the existing damage, and prevent the likelihood of not-afore-put-to-test syndrome in the subsequent choice of SMP. To achieve this, University of Ilorin is chosen as the territory survey for being the most sought-after University for admission in Nigeria. Quantitative research methods were adopted, being the most appropriate for this study in the literature. A total of 200 respondents participated voluntarily with the adoption of Slovin’s formula for the sampling techniques; 156 students and 44 lecturers. The data collection process was performed through a survey comprising demographic, dichotomous, multiple choice, and open-ended questionnaire to capture detail information for the research work. Simple descriptive statistics was employed for the analysis. Our findings reveal that out of the seventeen SMPs put to test, zoom platform ranks the most effective and efficient for the knowledge delivery and acquisition by the lecturers and students of the University respectively, based on the designed principles. Therefore, making Zoom platform the most preferred for e-learning. This study recommends that choice of satisfactory SMP for knowledge delivery should be utmost concern of all institutions before embarking on virtual learning system","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114581666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This research presents two robots cooperative hunting behavior by the use of a differential game method. There are two pursuer robots that are trying to find and then surround another robot prey evader. The purpose of the game is for the two pursuer robots to find the evader simultaneously or when one of the robots finds the evader first it will wait for the other robot to cooperate with it within a specified period of time. We use differential game theory to formulate the problem with a system of an ordinary differential equation. The conditions for the termination of the game were given to be when one of the pursuers catch the evader and the other cooperate with it or when the two pursuers catch it simultaneously.We carefully analyzed all the mathematical equations developed using the ordinary differential equations for the game and present the sufficient conditions that can warrant the two pursuers to catch the evader either simultaneously or one first and then the other cooperates with the first one which will result in termination of the game. We also show mathematically that in the course of the game the robot prey evader tries to prolong the capture time, while the pursuer robots try to shorten the capture time
{"title":"Analysis of Multi-Robot Cooperative Hunting Using Differential Game Technique","authors":"Bashir Abdullahi Baba","doi":"10.56471/slujst.v6i.221","DOIUrl":"https://doi.org/10.56471/slujst.v6i.221","url":null,"abstract":"This research presents two robots cooperative hunting behavior by the use of a differential game method. There are two pursuer robots that are trying to find and then surround another robot prey evader. The purpose of the game is for the two pursuer robots to find the evader simultaneously or when one of the robots finds the evader first it will wait for the other robot to cooperate with it within a specified period of time. We use differential game theory to formulate the problem with a system of an ordinary differential equation. The conditions for the termination of the game were given to be when one of the pursuers catch the evader and the other cooperate with it or when the two pursuers catch it simultaneously.We carefully analyzed all the mathematical equations developed using the ordinary differential equations for the game and present the sufficient conditions that can warrant the two pursuers to catch the evader either simultaneously or one first and then the other cooperates with the first one which will result in termination of the game. We also show mathematically that in the course of the game the robot prey evader tries to prolong the capture time, while the pursuer robots try to shorten the capture time","PeriodicalId":299818,"journal":{"name":"SLU Journal of Science and Technology","volume":"10 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124473568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}