Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 51

Full-Text Articles in Physical Sciences and Mathematics

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd Dec 2012

An Assessment Of The Effects Of Desertification In Yobe State, Nigeria, Jibril Musa Phd

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Desertification is one of the most serious environmental and socio-economic problems of our time. Desertification describes circumstances of land degradation in arid, semi-arid and dry sub-humid regions resulting from the climatic variation and human activities. The fundamental goal of this thesis was to assess the effects of desertification in Yobe State, Nigeria. The present threat of desertification in the sahel has reached an alarming stage where crops cultivation and animal rearing/grazing are no more productive, soil has lost its nutrient/fertility, various infrastructure had given way because of windstorm from the neighbouring Niger Republic and sand dunes had taken over. The …


Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa Dec 2012

Using Remote Sensing Data To Improve Rice Production In Kutigi, Niger State, Nigeria, Jibril Musa Phd, M B. Yunusa

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This research work looked in the used of Remote Sensing to improve Agricultural production in Kutigi, Niger State. The aim of the study is to use remote sensing to improve rice farming activities in Kutigi, Niger State. It is very important to identify such methods to improve Agricultural production because experts are always interested in new researches and findings to better the standard of living in any environment. In view of this, Remotely-sensed data could be used or employed to elevate most of these agricultural problems in Kutigi through the following objectives: Using Landsat imagery to assess the present landuse …


An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson Dec 2012

An Estate Dilemma - Inaccessible Assets Hiding Behind Passwords And Encryption, Douglas J. Henderson

DOUGLAS J HENDERSON

Every person living in the modern world holds valuable assets, data, or information in digital mediums. Digital mediums include not only digital hardware storage mediums in personal possession (like external hard drives and internal hard drives within laptop and desktop computers, personal digital assistants, cell phones, and the like), but also those only accessible through a network. Because so much is held in digital mediums, when an individual dies or becomes incapacitated, another person must know how to access the incapacitated person’s digital assets and other important information (this person is known herein as the ‘Responsible Party’). There are potential …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh Oct 2012

Variations In Climatic Parameters And Food Crop Yields: Implications On Food Security In Benue State, Nigeria., Emmanuel Adamgbe, Fanan Ujoh

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

Agricultural production in Nigeria like in other developing countries is highly vulnerable to variations in climatic parameters which may have inverse or direct effect on the performance of food crops. This paper examines the patterns and trends of the variations in the climatic parameters and the implications of such variations on efficient yield rates of some food crops in Benue State using data on climatic variables (rainfall, temperature, sunshine) and the yield of some crops per hectare for 25 years (1986-2010). Data on the climatic variables were collected from the Nigerian Meteorological Agency, AirForce Base, Makurdi while the data on …


Water Law In The United States And Brazil - Climate Change And Two Approaches To Emerging Water Poverty, David N. Cassuto, Rômulo S. R. Sampaio Oct 2012

Water Law In The United States And Brazil - Climate Change And Two Approaches To Emerging Water Poverty, David N. Cassuto, Rômulo S. R. Sampaio

David N Cassuto

This article examines two of the major water legal regimes in theAmericas—that of Brazil and the United States. Both countries haveextensive wet and dry regions and both hydro-regimes face a significantthreat from global warming. Brazil, for instance, is home to betweeneight and fifteen percent of the world’s fresh water, and its fast-growingeconomy and population present major challenges in management andallocation. The U.S. also faces major water allocation problems resultingfrom past settlement policies; unsustainable reclamation projects; andalso fast-growing domestic, industrial and agricultural demand. In the United States, water has traditionally been perceived as arenewable and limitless resource, a cultural legacy that …


Rural Waste Management: Challenges And Issues In Romania, Liviu Apostol, Florin C. Mihai Oct 2012

Rural Waste Management: Challenges And Issues In Romania, Liviu Apostol, Florin C. Mihai

Florin C MIHAI

Rural areas of the new EU Member States face serious problems in compliance of EU regulation on waste management. Firstly, the share of rural population is higher and it has lower living standards and secondly, the waste collection services are poorly-developed covering some rural regions. In this context, open dumping is used as an appropriate waste disposal solution generating complex pollution. This paper analyzes the disparities between Romanian counties regarding the rural population access to waste collection services in 2008 which reflects the geographical distribution of rural dumpsites in 2009. It examines on one hand , the role of waste …


It Takes A Global Sustainability Movement, John C. Dernbach Sep 2012

It Takes A Global Sustainability Movement, John C. Dernbach

John C. Dernbach

No abstract provided.


Integrated Mathematics Proof Of Pythagorean Theorem, Dean A. Cantalupo Esq. Sep 2012

Integrated Mathematics Proof Of Pythagorean Theorem, Dean A. Cantalupo Esq.

Dean A Cantalupo Esq.

Integrated Mathematics Proof of the Pythagorean Theorem


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Deliberating Beyond Evidence: Lessons From Integrated Assessment Modelling, Elisa Vecchione Jul 2012

Deliberating Beyond Evidence: Lessons From Integrated Assessment Modelling, Elisa Vecchione

Elisa Vecchione

The premises of this paper rely on associating policy inertia toward action on climate change with the inadequacy of the classical ‘liability culture’ of evidence-based policy-making to deal with this global environmental challenge. To provide support to this hypothesis, the following discussion analyses the technical properties and the current policy use of Integrated Assessment Modelling (IAM) of economic-climate interactions. The paper contends that IAM is still not clarified enough as far as its potential for information-production in the framework of policy making processes is concerned, and that this fact is symptomatic of the current inability of societies to undertake the …


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


When Will America, World Make Sustainability A Priority?, John Dernbach Jun 2012

When Will America, World Make Sustainability A Priority?, John Dernbach

John C. Dernbach

No abstract provided.


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Acting As If Tomorrow Matters: Accelerating The Transition To Sustainability, John Dernbach May 2012

Acting As If Tomorrow Matters: Accelerating The Transition To Sustainability, John Dernbach

John C. Dernbach

No abstract provided.


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd) May 2012

Dynamics Of Land Use/Land Cover Changes And Its Implication On Food Security In Anyigba, North Central, Nigeria, Tokula E. Arome, Sunday P. Ejaro (Phd)

Confluence Journal Environmental Studies (CJES), Kogi State University, Nigeria

This study assessed land use/land cover changes and its effect on Agricultural land in Anyigba. The objectives were to identify and delineate different land use / land cover categories, assess the rate of change that occurred and examine the impact of land use/land cover change on food security using satellite remote sensing data collected at three different years (1987 Land sat TM, 2001 Land Sat TM and 2011 Land Sat ETM). The study utilized GIS software such as Idrisi Andes academic and ArcGIS 9.3. The study area covers approximately 31.8km2, and four major land use/cover classes were utilized (built up, …


Disparities In Municipal Waste Management Across Eu-27. A Geographical Approach, Florin C. Mihai, Liviu Apostol May 2012

Disparities In Municipal Waste Management Across Eu-27. A Geographical Approach, Florin C. Mihai, Liviu Apostol

Florin C MIHAI

Inadequate waste management leads to many environmental issues and the adoption of an efficient and sustainable waste management has become a priority objective of the EU. However, besides the demographic factors, the various socio-economic and geographical conditions of this complex space lead to major disparities in municipal waste management between North and South, East and West. This paper aims to do a spatial-temporal analysis of the Eurostat indicators using ascending hierarchical cluster analysis that divides the member states into five typological classes. The resulted maps highlight territorial disparities among Member States on municipal waste management and also reveal the evolution …


Sustaining America, John Dernbach Apr 2012

Sustaining America, John Dernbach

John C. Dernbach

This essay summarizes U.S. sustainability efforts over the two decades since the U.N. Conference on Environment and Development (or Earth Summit) in 1992. It also summarizes basic findings and recommendations from Acting as if Tomorrow Matters: Accelerating the Transition to Sustainability (Environmental Law Institute 2012). Drawing on the expertise of more than four dozen sustainability practitioners in a variety of fields, the book teases from the limited progress made in the United States over the past two decades the overall patterns for that progress. It also reviews the most significant obstacles to sustainability, again showing patterns in those obstacles across …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.