School Bus Routing Problem is an optimization problem which falls under the class of the Vehicle Routing Problem. It involves the use of a fleet of vehicles to efficiently and optimally transport students to and from their schools. To solve this problem, optimal school bus routes are found by minimizing the number of buses, the number of routes and the total distance traversed along all routes. Manual routing of school buses have led to creation of many routes, increased number of buses and several buses navigating the same route, thereby incurring more cost. One of such methods used in solving school bus routing problems is meta-heuristic method which has proven better results in terms of optimal solution and reduced time complexity. In this study, Genetic algorithm is utilized to solve the school bus routing problem because of its simplicity and ability to generate many possible solutions. The algorithm is implemented in C# programming language and tested using secondary data obtained from Ondo State Free-School Bus Shuttle Scheme, Akure, Nigeria. The result shows that of all four nodes (bus stops) used in performance evaluation, Alakure to Oke-Aro junction bus stop presents as the best route which covers a total of 69 nodes with a total distance of 34.5km. This shows that there can be less number of buses in use and reduced number of routes in which the buses are assigned.
Cyber security is among the most complex and rapidly evolving issues and has been the focus of present day organizations. Cyber security risk management is the process of managing or reducing potentially harmful and uncertain events that posse as threats to cyber security. It involves looking at what could go wrong on the cyber space and deciding on ways to prevent or minimize their occurrences or effects. One of the prominent cyber security risk management techniques is the Game Theoretic Approach (GTA), which focuses on the use of resources, internal controls, information sharing, technical improvements, behavioral or organizational scale-ups and cyber insurance for cyber risk management. This paper presents a review of game theoretic-based model for cyber security risk management. Specifically, issues on modeling, some related works and significance of game theoretic approach to cyber security risk management are presented. Findings from the review revealed the peculiarities and specificity of each model. It is also revealed that the models are just evolving and require much improvement.
The unpredictable cyber attackers and threats have to be detected in order to determine the outcome of risk in a network environment. This work develops a Bayesian network classifier to analyse the network traffic in a cyber situation. It is a tool that aids reasoning under uncertainty to determine certainty. It further analyze the level of risk using a modified risk matrix criteria. The classifier developed was experimented with various records extracted from the KDD Cup '99 dataset with 490,021 records. The evaluations showed that the Bayesian Network classifier is a suitable model which resulted in same performance level for classifying the Denial of Service (DoS) attacks with Association Rule Mining while as well as Genetic Algorithm, the Bayesian Network classifier performed better in classifying probe and User to Root (U2R) attacks and classified DoS equally. The result of the classification showed that Bayesian network classifier is a classification model that thrives well in network security. Also, the level of risk analysed from the adapted risk matrix showed that DoS attack has the most frequent occurrence and falls in the generally unacceptable risk zone.
Nigeria and China were probably experiencing roughly similar economic fortunes only about two decades ago. Then, both had large populations and very low per capita incomes. But their socio-economic fortunes and growth rates have diverged dramatically since, with China now being a superpower and the second largest economy in the world, while Nigeria is still tottering along as one of the poorest countries in the world in terms of various global human development indices and rankings. The rapid economic transformations that China has experienced should normally be expected to be accompanied by equally dramatic socio-cultural changes, including the emancipation and greater participation of women in national economic activities. This study sought to investigate the extent to which women in China participate now in the ICT sector of their country compared to women in Nigeria. Data were collected through a questionnaire administered to cross sections of 123 and 151 women surveyed in purposively selected cities in Nigeria and China respectively. Women in both countries recognize the importance of ICT, but those in Nigeria were constrained from full utilization of ICT benefits due to electricity supply problems, financial constraints and inadequate training for ICT. The study found that improved levels of education of women promote the adoption and use of ICT by women in both countries, and that owning personal computers and the availability of time for women helped to increase participation of women in ICT. Some recommendations were made based on the findings.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.