Wednesday, 25 February 2015

NIGERIA HISTORY ...WHAT DO YOU THINK?


                                          Map of Colonial Nigeria
                                                     
Producing an objective history of Nigeria can be likened to sifting facts from huge rubble with a sickle- an arduous task but none less within the orbit of possibility if one is to focus on the facts. The challenge lies in attempting to separate the biases of two distinct camps – the camp of those who define Nigeria as a forced union of unwilling entities with practically nothing in common and the camp that opposes the former, insisting Nigeria was an inevitable creation. However, our mandate lies in defining the sovereign entity called and recognized as Nigeria.

The popular position is that Nigeria is a creation of the British Colonial authority which was the political power from the late 19th century until the middle of the 20th century in 1960. It is important to note that the states or city-states as they often designated, that later made up what is known as Nigeria pr-existed the country itself. It is also noted by some research that, these city-states were very much in contact with one another long before the first foreigner set foot on their soil.

Archaeological finding dating as far back as 2nd century BC, suggest movements of people from one community to another for mostly trade related purposes. Evidence of inter-marriages and cultural exchanges among these trade-towns has also been widely documented by Historians. The coming of Islam (to be dealt in detail in subsequent issues) increased these interrelations among these towns. Nonetheless, these evidences do not suggest that the towns were willing to be merged as one entity as the amalgamation did. It also does not mean the possibility didn’t exist. What we can distill from them is that, it is erroneous as some scholars assert, that the amalgamation took place among towns which had nothing absolutely in common.
Until the amalgamation in 1914 by the British colonial authorities, these states existed independently. They had their well established political, economic, social, religious and even educational systems.  Sir Hugh Clifford, the second colonial governor, described Nigeria as “a collection of independent Native States, separated from one another by great distances, by differences of history and traditions and by ethnological, racial, tribal, political, social and religious barriers.” (Nigeria Council Debate, Lagos, 1920). 

                                          Colonial Officers
          
The birth of Nigeria took place on 1 January 1914 when the Northern Protectorate (formed in 1900 based on the Treaty of Berlin 1885) and Southern Protectorate (formed in 1900 from Niger Coast Protectorate) were brought together as one political entity. The merger was accomplished by Sir Lord Lugard a former High Commissioner, who was appointed Governor-General in 1912. However, Major Abubaker Atofarati a naval historian, pointed out that “The building of Nigeria as a multi - national state began in 1900 with the creation of Northern and Southern Protectorates along with the colony of Lagos by the British government.” (CSC, 1992). In other words, in the making of Nigeria, there were three processes. First was the contact that took place among the native states and with the British colonial machinery in the 19th century, second was the build-up to the amalgamation from 1900 and finally the formal merging of the entities in 1914.

The idea of the appellation Nigeria is believed to have originated from Flora Shaw a former journalist and later the wife of Lord Lugard. As with the entire entity, the name was the merging of two key words “Niger” the name of the famous river that traverses the greater part of the country’s land mass and “Area”.
The amalgamation of Nigeria in 1914 set in motion the processes from what would emerge an independent country in 1960. The following are the colonial governors in Nigeria from 1914:

-          Sir Fredrick Lugard:                           1 January 1912 – 8 August 1918
-          Sir Hugh Clifford:                              8 August 1919 – 13 November 1925 (b. 1866 – d. 1941)
-          Sir Graeme Thomson:                         13 November 1925 – 17 Jun 1931 (b. 1875 – d. 1933)
-          Sir Donald Charles Bourdillon:          1 November 1935 – 1 July 1940 (b. 1883 – d. 1948)
-          Sir John Evelyn Shuckburgh:              1 July 1940 – 1942 (b. 1877 –d. 1953)
-          Sir Alan Cuthbert Maxwell Burns:     1942 – 18 December 1943 (b. 1887 – d. 1980)
-          Sir Arthur Fredrick Richards:             18 December 1943 – 5 February 1948 (b. 1885 – d. 1978)
-          Sir John Stuart Macpherson:               5 February 1948 – 1 October 1954 (b. 1898 – d. 1971)
-          Sir James Wilson Robertson:              15 June 1955 – 16 November 1960 (b. 1899 - 1983)

It is instructive to remember the words of Bamber Gascoigne, “The sixty years of Britain’s rule in Nigeria are characterized by frequent reclassifying of different regions for administrative purposes. They are symptomatic of the problem of uniting the country as a single state” In the second part of Nigeria from 1900 – 1960 we shall examine the amalgamation, political developments and nationalism in Nigeria.

FCFMT

Federal College of Fisheries and Marine Technology.
Victoria Island, off Hamadu Bello Way, Bar Beach,
Victoria Island, Lagos

2014/2015 CERTIFICATE AND POST GRADUATE COURSES ADMISSIONS ADVERTISEMENT

Applications are invited from suitably qualified candidates for admission into the following programmes of the Federal College of Fisheries and Marine Technology Further Studies Department 2014/2015 Academic Session:

AVAILABLE PROGRAMMES
‎1. Certificate in Safety Management
2. Certificate in Jetty Operation (Stevedoring and Off Operations)
3 ‎Certificate in Marine Safety (Survey, Inspection and Ships Operation)
4. Certificate in Environmental Protection (Marine Liquid and ‎shore Operations)
5. Certificate in Maritime Operation Management (Ships Port & Offshore Operations)
6. ‎Certificate in shipping operation (Commercial Vessels / Cargo Operations)
7. Certificate in Tank Farm Operation (Upstream & Downstream)
8. ‎Certificate in Aqua-culture Management
‎9. Certificate in Agricultural Extension Management
10. ‎Certificate in Marine Cargo Operations
‎11. Certificate in Oil Spill Management (Management, Recovery &. Remediation‎)

ENTRY REQUIREMENTS: ‎
1. Good SSSCE, Ex WASC, NECO, GCE and NABTEB
2.  Mariners with Certificate of Competency and Engineering Graduates
‎3. Mature applicants With Prove of more than 7 years experience in Shipping, Engineering, Oil and Gas Industries are eligible to apply.

POST-GRADUATE DIPLOMA IN MARITIME TECHNOLOGY
(Shipping, Environment‎, Safety and Fisheries Streams)
Requirements:
HND (Minimum Lower Credit) and Graduates in Engineering and related discipline are qualified for admission in Post-graduate Diploma in Maritime Technology (Shipping, Safety and Fisheries).
Duration is Eighteen Months (18)

HOW TO CREATE A VIRUS BY GROUP 23

How do I create a computer virus?

Computer VirusIf you are interested in creating a computer virus, Trojan, worm, malware, or other malicious program as revenge, payback, or as a prank, we suggest you rethink. Creating a virus that deletes files or causes other issues resolves nothing and will result in prosecution by the law. In other words, you could be fined or sent to prison.
Instead of creating computer viruses or other malware, consider learning a computer programming language. You will learn a lot more by learning one or more programming languages and become more qualified in getting hired at a company that designs programs or analyzes viruses. No one ever got hired because they wrote a computer virus.

I only want to write a virus to learn how they work.

You will learn a lot more about how computer programs and viruses work by learning to program than you ever will by writing and tinkering with computer viruses. A computer virus is only a program designed to do malicious tasks on the computer, such as deleting files, inserting its code into other files, and copying itself to other places and computers accessible to the computer that is running the virus. By learning to program, you will not only know how these tasks are possible, but also learn much more.

I need to test my virus scanner.

You can create test virus files that can be used to test your computer's anti-virus scanner without having to create your own virus. See the link below for additional information and code on how to create a test virus.

If I create a good computer virus, I will be famous.

No, the only fame you may get is a brief news article or a picture of you being handcuffed and sent to prison. Once incarcerated, it will go on your record and make it next to impossible to get hired at any respectable computer company and impossible to get hired by any government agency.
If you were to write a computer virus that was successful, you would want to remain anonymous in fear of being prosecuted by the law. Also, if you think about it, almost everyone knows who Bill Gates is and what he has done for computers, but have no clue about Jeffrey Parson.

If I write a good virus, a security firm or antivirus company will hire me.

False, no respectable security firm or antivirus company wants to be affiliated with a virus or malware creator that infected potential customer computers. If you are interested in getting a job with a security firm or antivirus company, you have a much better chance learning to program, becoming a participant in security discussions, being a beta tester, or finding vulnerabilities in programs and reporting them to the developers. Companies such as Google will even pay good money to anyone who reports bugs or security vulnerabilities about any of their products.

In need details, examples, or other information about creating viruses.

Computer Hope will not send anyone any other additional information about creating computer viruses, worms, or Trojans. This document was only created to help deter people from creating computer viruses and learn computer programming instead.

Monday, 9 February 2015

3-D Air-Touch display operates on mobile devices

(TechXplore) —While interactive 3D systems such as the Wii and Kinect have been popular for several years, 3D technology is yet to become part of mobile devices. Researchers are working on it, however, with one of the most recent papers demonstrating a 3D "Air-Touch" system that allows users to touch floating 3D images displayed by a mobile device. Optical sensors embedded in the display pixels can sense the movement of a bare finger in the 3D space above the device, leading to a number of novel applications.
The researchers, Guo-Zhen Wang, et al., from National Chiao Tung University in Taiwan, have published a paper on the 3D Air-Touch system in a recent issue of the IEEE's Journal of Display Technology.
"The 3D Air-Touch system in mobile devices can offer non-contact finger detection and limited viewpoint for operating on a floating image, which can be applied to 3D games, interactive digital signage and so on," Wang told Phys.org. "Although current technology still has some issues, such as yield rate, sensor uniformity and so on, we predict that this technology could become available in the near future."
Because of the small size and portable nature of mobile devices, implementing a 3D system on these devices is different from 3D systems used on TVs and other large screens. Often, large 3D systems require either additional bulky devices or cameras for motion detection. For mobile systems, these additional devices would be inconvenient and the cameras have a limited field of view for detecting objects in close proximity to the display. Some proposed 3D systems for mobile devices use sensors near the screen, but these systems require bright environmental lighting, so they don't work well in dark conditions.
3D Air-Touch display operates on mobile devices
Optical sensors that are embedded in the mobile device detect finger movement. The depth range is currently 3 cm. Credit: Wang, et al. ©2013 IEEE
Working around these restrictions, Wang, et al., designed a 3D system in a 4-inch display screen in which optical sensors are embedded directly into the display pixels, while an infrared backlight is incorporated into the device itself. The researchers also added angular scanning illuminators to the edges of the display to provide adequate lighting. Overall, these three components provide a 3D system that is compact, has a wide field of view, and is independent of ambient conditions.
The researchers explain that the algorithm for calculating the 3-axis (x, y, z) position of the fingertip is less complex than that used for image processing, allowing for rapid real-time calculations. First, the infrared backlight and the are used to determine the 2D (x, y) position of the fingertip. Then to calculate the depth of the fingertip, the angular illuminators emit infrared light at different tilt angles. An analysis of the accumulated intensity at different regions provides the scanning angle with maximum reflectance, resulting in the 3D location of the fingertip.
3D Air-Touch display operates on mobile devices
(a) To calculate the 2-axis (x and y) positions of a fingertip, the IR backlight is reflected by the fingertip. (b) To calculate the depth (z) of the fingertip, the system uses IR scanning devices on opposite sides of the display panel. Credit: Wang, et al. ©2013 IEEE
Experimental results showed that the prototype 3D Air-Touch system performed very well. 2D touch systems require that the maximum error in positioning be no more than 0.5 cm, and the 3D touch prototype has a maximum error of 0.45 cm at large depths, and smaller errors for smaller depths. The prototype's depth range is 3 cm, but the researchers predict that this range can be further increased by improving the sensor sensitivity and scanning resolution.
In the future, the 3D touch interface might also be extended from single-touch to multi-touch functionality, which could enable more applications. However, multi-touch functionality will require overcoming the occlusion effect, which occurs when one fingertip blocks the second so that the sensors cannot distinguish between the two. The researchers also plan to work on 3D Air-gesture operation for making 3D signatures in .

Saturday, 7 February 2015

Programming safety into self-driving cars: Better AI algorithms for semi-autonomous vehicles


Date:
February 4, 2015
Source:
National Science Foundation
Summary:
For decades, researchers in artificial intelligence, or AI, worked on specialized problems, developing theoretical concepts and workable algorithms for various aspects of the field. Computer vision, planning and reasoning experts all struggled independently in areas that many thought would be easy to solve, but which proved incredibly difficult.



For decades, researchers in artificial intelligence, or AI, worked on specialized problems, developing theoretical concepts and workable algorithms for various aspects of the field. Computer vision, planning and reasoning experts all struggled independently in areas that many thought would be easy to solve, but which proved incredibly difficult.
Related Articles
Computer vision
Artificial intelligence
Bioinformatics
Scientific visualization
Quantum computer
Robot
However, in recent years, as the individual aspects of artificial intelligence matured, researchers began bringing the pieces together, leading to amazing displays of high-level intelligence: from IBM's Watson to the recent poker playing champion to the ability of AI to recognize cats on the internet.
These advances were on display this week at the 29th conference of the Association for the Advancement of Artificial Intelligence (AAAI) in Austin, Texas, where interdisciplinary and applied research were prevalent, according to Shlomo Zilberstein, the conference committee chair and co-author on three papers at the conference.
Zilberstein studies the way artificial agents plan their future actions, particularly when working semi-autonomously--that is to say in conjunction with people or other devices.
Examples of semi-autonomous systems include co-robots working with humans in manufacturing, search-and-rescue robots that can be managed by humans working remotely and "driverless" cars. It is the latter topic that has particularly piqued Zilberstein's interest in recent years.
The marketing campaigns of leading auto manufacturers have presented a vision of the future where the passenger (formerly known as the driver) can check his or her email, chat with friends or even sleep while shuttling between home and the office. Some prototype vehicles included seats that swivel back to create an interior living room, or as in the case of Google's driverless car, a design with no steering wheel or brakes.
Except in rare cases, it's not clear to Zilberstein that this vision for the vehicles of the near future is a realistic one.
"In many areas, there are lots of barriers to full autonomy," Zilberstein said. "These barriers are not only technological, but also relate to legal and ethical issues and economic concerns."
In his talk at the "Blue Sky" session at AAAI, Zilberstein argued that in many areas, including driving, we will go through a long period where humans act as co-pilots or supervisors, passing off responsibility to the vehicle when possible and taking the wheel when the driving gets tricky, before the technology reaches full autonomy (if it ever does).
In such a scenario, the car would need to communicate with drivers to alert them when they need to take over control. In cases where the driver is non-responsive, the car must be able to autonomously make the decision to safely move to the side of the road and stop.
"People are unpredictable. What happens if the person is not doing what they're asked or expected to do, and the car is moving at sixty miles per hour?" Zilberstein asked. "This requires 'fault-tolerant planning.' It's the kind of planning that can handle a certain number of deviations or errors by the person who is asked to execute the plan."
With support from the National Science Foundation (NSF), Zilberstein has been exploring these and other practical questions related to the possibility of artificial agents that act among us.
Zilberstein, a professor of computer science at the University of Massachusetts Amherst, works with human studies experts from academia and industry to help uncover the subtle elements of human behavior that one would need to take into account when preparing a robot to work semi-autonomously. He then translates those ideas into computer programs that let a robot or autonomous vehicle plan its actions--and create a plan B in case of an emergency.
There are a lot of subtle cues that go into safe driving. Take for example a four-way stop