DEVELOPMENT OF RIG HANGING HYDRO TURBINE BASED ON WASTE WATER DISCHARGE AT CHALLAWA INDUSTRIAL AREA OF KANO STATE
DOI:
https://doi.org/10.33003/fjs-2021-0502-622Keywords:
Hydro; micro hydro; renewable energy; waste waterAbstract
Design of hydroelectricity system is employed here in an effort to produce electric energy using an exhaust waste water of steam power plant. The major concern in this work is how the system is designed, selection of site and resources. The system after designed and fabricated was mounted at waste water outlet for proof run for about three months period. The result obtained exhibit the overall design is feasible for the sensitive site application
References
Ajayi, K. (2015). Intelligence Data Sources Methods and Problems. Ado - Ekiti, Ekiti: Intelligence and Security Studies Programme.
Akiyode-Lawanson, J. (2019, March 09). Cybercrime: Nigeria ranks 3rd most attacked country in Africa. Retrieved October 08, 2019, from Businessday NG: https://businessday.ng/technology/article/cybercrime-nigeria-ranks-3rd-most-attacked-country-in-africa/
Akpan, U. E. (2019). An Argumentative Review Essay on the Conceptualization and Definition of Cyber Security Synthesizing a Proprietary Definition of Cyber Security. Kaduna: Unpublished.
Aladenusi, T. (2018). 2018 Nigeria Cybersecurity Outlook [Online]. Retrieved September 25, 2019, from Deloitte Nigeria: https://www2.deloitte.com/ng/en/pages/risk/articles/2018_nigeria_cybersecurity_outlook.html#
Aladenusi, T., & Olukoju, A. (2016). 2016 Nigeria Cybersecurity Outlook. Retrieved September 26, 2019, from Deloitte Nigeria: http://www2.deloitte.com/ng/en/pages/risk/articles/2016-nigeria-cybersecurity-outlook.html
Aniche, D.C.P. (2019). General Introduction to Cybersecurity. Kaduna: Unpublished.
Bureau of Justice Statistics, U.S. Dept. of Justice. (1989). Computer Crime: Criminal Justice Resource Manual.
Buzan, B. &. (2013). Regions and powers: the structure of international security. Cambridge: Cambridge University Press.
Buzan, B., Waever, O., & Wilde, J. (2013). Security a new framework for analysis. Boulder, CO: Lynne Rienner.
CIS. (2017, April 24). What is Cyber Threat Intelligence? Retrieved September 28, 2019, from CIS: https://www.cisecurity.org/blog/what-is-cyber-threat-intelligence/
Deloitte. (2019). Cyber 101 | Deloitte SEA | Risk Advisory. Retrieved October 11, 2019, from Deloitte Singapore: https://www2.deloitte.com/sg/en/pages/risk/articles/cyber-101.html
Denardis, L. (2014). The Internet Governance Oxymoron. The Global War for Internet Governance, 1-32. DOI:10.12987/yale/9780300181357.003.0001
Digital-Guardian. (2019, July 15). What is Cyber Security? Definition, Best Practices & More. Retrieved September 28, 2019, from Digital Guardian: https://digitalguardian.com/blog/what-cyber-security
DOD, J. C. (2016). Department of Defense Dictionary of Military and Associated Terms. Washington: Joint Publication 1-02.
ENISA. (2019, September 19). National Cybersecurity Strategies. Retrieved September 28, 2019, from ENISA: https://www.enisa.europa.eu/topics/national-cyber-security-strategies
Fireeye. (2019). FireEye Threat Intelligence. [online]. Retrieved September 25, 2019, from FireEye.com: https://www.fireeye.com/solutions/cyber-threat-intelligence.html
Gercke, M. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. Geneva, Geneva, Switzerland. Retrieved October 08, 2019, from www.itu.int/ITU-D/cyb/cybersecurity/legislation.html
Hallingstad, G., & Dandurand, L. (2010). Cyber Defence Capability Framework. The Hague: NATO C3 Agency.
Hansel, M. (2013, June 27). Cyber Security Governance and the Theory of Public Goods. Retrieved from E: https://www.e-ir.info/2013/06/27/cyber-security-governance-and-the-theory-of-public-goods/
Ibikunle, F., & Eweniyi, O. (2013). Approach to Cyber Security Issues in Nigeria: Challenges and Solution. International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE), 1(1), 1-11. Retrieved September 25, 2019
Idom, A. M., & Ugal, D. B. (2016). Influence of ICT competence on cybercrimes in selected cities of the six geo-political zones in Nigeria. FULafia Journal of Humanities and Social Sciences, 1(1), 220 - 241. Retrieved September 25, 2019
Marzoni, D. (2019, January). IT Law: Lawyer: Dmitriy Marzoni: +38097-44444-55. Retrieved December 30, 2019, from Lawyer: https://www.dmlawyer.top/it-law/
Morgenthau, H. (2012). Politics among Nations: the Struggle for Power and Peace. (K. Thompson, Ed.) New Delhi: Kalyani.
Odinma, A. C. (2010). Cybercrime & Cert: Issues & Probable Policies for Nigeria. DBI Presentation.
Oforji, J. C., Udensi, E. J., & Ibegbu, K. C. (2017). Cybersecurity Challenges in Nigeria: The Way Forward. SosPoly Journal of Science & Agriculture, 2, 1-5.
Okoli, A. C. (2013). 'Rebranding Nigeria' as a Reputation Management Drive: Implications for National Image. Journal of Communication and Media Research, 5(2), 81 - 87.
Okoli, A. l., & Idom, A. M. (2018). The Internet and National Security in Nigeria: A Threat - Import Discourse. Covenant University Journal of Politics & International Affairs, 6(1), 1. Retrieved September 25, 2019
Okonigene, R. E., & Adekanle, B. (2009). Cybercrime In Nigeria. Business Intelligence Journal.
Olubayo, A. (n.d.). Cybersecurity: Africa's Next Challenge. Retrieved September 26, 2019, from Linkedin.com: http://www.linkedin.com/pulse/20140722215101-5180516-cybersecurity-africa-s-next-challenge
Olugbile, S. (2019). Overview of Nigeria Cybersecurity Readiness. Retrieved October 09, 2019, from Aficta.africa: https://aficta.africa/images/stories/roundtable/overview-of-nigeria-cybersecurity.pdf
Omale, D. J., & Idom, A. M. (2016). Fibre optics technology and cybercrimes in Calabar Metropolis, Nigeria. International Journal of Social Relevance & Concern, 4(4), 1 - 15. Retrieved September 25, 2019, from www.ijournals.in/ijsrc
ONSA, (2014). National Coordinator for Security and Counterterrorism. Nigeria: National Cyber Security Strategy.
Osho, O., & Onoja, A. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), 120 - 143. doi:001:10.5281/ZENODO.22390
PaloAlto. (2016). New from Unit 42. Retrieved October 11, 2019, from The Insider Report November 2016 - Palo Alto Networks: https://www.paloaltonetworks.com/customers/customer-newsletter/the-insider-report-november-2016
RecordedFuture. (2019). What is Threat Intelligence? Retrieved September 25, 2019, from Recorded Future: https://www.recordedfuture.com/threat-intelligence/
Roehrs, P. (2005). Weak States And Implications For Regional Security: A Case Study Of Georgian Instability And Caspian Regional Insecurity. Athens: Research Institute For European And American Studies, RIEAS.
Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019
Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019
SuperUser. (2017). Nigeria Faces Greatest Cyber Security Threat Ever In 2017. Retrieved October 11, 2019, from Stop. Think. Connect. | Nigeria: https://stopthinkconnect.ng/index.php/blog/item/23-nigeria-faces-greatest-cyber-security-threat-ever-in-2017
Techopedia.com. (n.d.). What is Cyber Defense? - Definition from Techopedia. Retrieved September 28, 2019, from Techopedia.com: https://www.techopedia.com/definition/6705/cyber-defense
Underwood, K. (2018, August 30). Cyber Threat Intelligence Leader Warns of Changing Nature of Attacks [Online]. Retrieved September 25, 2019, from AFCEA International: https://www.afcea.org/content/cyber-threat-intelligence-leader-warns-changing-nature-attacks
UNECA, U. N. (2014). Tackling the challenges of Cybersecurity in Africa. Retrieved from Tackling the challenges of cybersecurity in Africa | United Nations Economic Commission for Africa: https://www.uneca.org/publications/tackling-challenges-cybersecurity-africa
Published
How to Cite
Issue
Section
FUDMA Journal of Sciences