1,729 research outputs found
Analysing oil price- macroeconomic volatility in Nigeria
This study provides analytical insight on modelling macroeconomic and oil price volatility in Nigeria. Mainly, the paper employed GARCH model and its variants (GARCH-M, EGARCH and TGARCH) with daily, monthly and quarterly data. The findings reveal that: all the macroeconomic variables considered (real gross domestic product, interest rate, exchange rate and oil price) are highly volatile; the asymmetric models (TGARCH and EGARCH) outperform the symmetric models (GARCH (1 1) and GARCH - M); and oil price is a major source of macroeconomic volatility in Nigeria. By implication, the Nigerian economy is vulnerable to both internal shocks (interest rate volatility, real GDP volatility) and external shocks (exchange rate volatility and oil price volatility). Therefore, it is concluded that more credence should be given to asymmetric models in dealing with macroeconomic volatility in Nigeria and oil price volatility should be considered as relevant variable in the analysis of macroeconomic fluctuations in Nigeria. The study recommends that, the Nigerian economy should be diversified by revamping other sectors such as the agricultural sector and the industrial sector in order to reduce the impact of oil price uncertainty on macroeconomic volatility
Determination of Optical Energy Gap for Copper oxide at Different Temperatures
In this work, thin films of copper oxide (CuO) have been prepared using spraypyrols is technique. The energy gap was determined for samples of the copper oxide (CuO) at different temperatures ranging from (150 to 330) 0C. The absorption and transmission spectra, shows the energy gap for (CuO) in the range from (2.44- 2.19) eV. These values are comparable to the actual values
A Fuzzy Classifier-Based Penetration Testing for Web Applications
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul- nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec- tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications
Comparative Evaluation of Mobile Forensic Tools
The rapid rise in the technology today has brought to limelight mobile devices which are now being used as a tool to commit crime. Therefore, proper steps need to be ensured for Confidentiality, Integrity, Authenticity and legal acquisition of any form of digital evidence from the mobile devices. This study evaluates some mobile forensic tools that were developed mainly for mobile devices memory and SIM cards. An experiment was designed with five android phones with different Operating System. Four tools were used to find out the capability and efficiency of the tools when used on the sampled phones. This would help the forensic investigator to know the type of tools that will be suitable for each phone to be investigated for acquiring digital evidence. The evaluation result showed that AccessData FTK imager and Paraben device seizure performs better than Encase and Mobiledit. The experimental result shows that, Encase could detect the unallocated space on the mobile deice but could retrieve an deleted data
End to End Delay Performance Analysis of Video Conferencing over LTE
Mental development to use the data, such as multimedia, video and online games led to the development of a technique called LTE long term evolution. The goal of this paper is to analyze the quality of service (QoS) performance and its effects when video is streamed over LTE .Using OPNET (Optimized Network Engineering Tool). the performance can be simulated having Different scenarios for video conferencing . in addition to we also measured the performance of packet End-to-End delay
A Fuzzy Classifier-Based Penetration Testing for Web Applications
The biggest challenge of Web application is the inestimable losses arising from security flaws. Two approaches were advanced by a number of scholars to provide security to Web space. One of such approach is vulnerability assessment, which is a conscious effort to isolate, identify and recognize potentials vulnerabilities exploited by attackers. The second being the estimation and determination of level of risks/threats posed to Web applications by vul- nerabilities obvious to the developer (or tester); this is generally referred to as penetration testing. Recently, there is Vulnerability Assessment and Penetration Testing (VAPT) that combined these two schemes to improve safety and effec- tively combat the menace of attackers on Web applications. This paper proposed Fuzzy Classifier-based Vulnerability and Assessment Testing (FCVAPT) model to provide security for sensitive data/information in Web applications. Cross Site Scripting (XSS) and Structured Query Language (SQL) injections were selected for evaluation of proposed FCVAPT model. FCVAPT model’s classification performance for MSE, MAPE and RMSE were 33.33, 14.81% and 5.77% respectively. FCVAPT is considerably effective for detecting vulnerability and ascertaining the nature of threats/risks available to Web applications
Steam-Induced Coarsening of Single-Unit-Cell MFI Zeolite Nanosheets and Its Effect on External Surface Brønsted Acid Catalysis.
Commonly used methods to assess crystallinity, micro-/mesoporosity, Brønsted acid site density and distribution (in micro- vs. mesopores), and catalytic activity suggest nearly invariant structure and function for aluminosilicate zeolite MFI two-dimensional nanosheets before and after superheated steam treatment. Yet, pronounced reaction rate decrease for benzyl alcohol alkylation with mesitylene, a reaction that cannot take place in the zeolite micropores, is observed. Transmission electron microscopy images reveal pronounced changes in nanosheet thickness, aspect ratio and roughness indicating that nanosheet coarsening and the associated changes in the external (mesoporous) surface structure are responsible for the changes in the external surface catalytic activity. Superheated steam treatment of hierarchical zeolites can be used to alter nanosheet morphology and regulate external surface catalytic activity while preserving micro- and mesoporosity, and micropore reaction rates
- …
