Publish in OALib Journal
APC: Only $99
This article examines the limitations of all stakeholders in providing support for street children in Nigeria in the face of continuous increase in their number with a view to identify possible policy options in the light of inabilities of the stakeholders to adequately support the children. Qualitative research techniques were employed to collect the primary data from NGOs, community members and government agencies saddled with the responsibility of caring for the children. It was found that the stakeholders are incapable of addressing the problems of street children due to inadequate skills, lack of necessary facilities and stakeholders working in parallels among others. It emphasizes the need for collaboration among stakeholders to enjoy the benefit of synergy while there is also need to embark on capacity development for all the stakeholders in order to make meaningful progress and the situation of the street children improved in the country.
This paper introduces a new datapath architecture for reconfigurable processors. The proposed datapath is based on Network-on-Chip approach and facilitates tight coupling of all functional units. Reconfigurable functional elements can be dynamically allocated for application specific optimizations, enabling polymorphic computing. Using a modified network simulator, performance of several NoC topologies and parameters are investigated with standard benchmark programs, including fine grain and coarse grain computations. Simulation results highlight the flexibility and scalability of the proposed polymorphic NoC processor for a wide range of application domains.
We investigate security at
the same time as the functional requirements by refining and integrating use,
misuse, and mitigation use cases. Security requirements rely on the
interactions among normal system execution (use cases), attacks (misuse cases),
and necessary security strategies (mitigation use cases), but previous
approaches only use a high-level of abstraction. We use refinement to uncover details
of each case and the relationships among them before integrating them. We
identify and model “includes” and “extends” relationships within each refined
case type, and use a condition-driven process that maintains these
relationships as refinement continues. We then systematically identify and
model “threatens” and “mitigates” relationships to integrate the cases at a