DEVELOPMENT OF RIG HANGING HYDRO TURBINE BASED ON WASTE WATER DISCHARGE AT CHALLAWA INDUSTRIAL AREA OF KANO STATE

Authors

  • F. A. Umar
  • S. M. Lawan
  • C. N. Okpala
  • A. Aminu

DOI:

https://doi.org/10.33003/fjs-2021-0502-622

Keywords:

Hydro; micro hydro; renewable energy; waste water

Abstract

Design of hydroelectricity system is employed here in an effort to produce electric energy using an exhaust waste water of steam power plant. The major concern in this work is how the system is designed, selection of site and resources. The system after designed and fabricated was mounted at waste water outlet for proof run for about three months period. The result obtained exhibit the overall design is feasible for the sensitive site application

References

Ajayi, K. (2015). Intelligence Data Sources Methods and Problems. Ado - Ekiti, Ekiti: Intelligence and Security Studies Programme.

Akiyode-Lawanson, J. (2019, March 09). Cybercrime: Nigeria ranks 3rd most attacked country in Africa. Retrieved October 08, 2019, from Businessday NG: https://businessday.ng/technology/article/cybercrime-nigeria-ranks-3rd-most-attacked-country-in-africa/

Akpan, U. E. (2019). An Argumentative Review Essay on the Conceptualization and Definition of Cyber Security Synthesizing a Proprietary Definition of Cyber Security. Kaduna: Unpublished.

Aladenusi, T. (2018). 2018 Nigeria Cybersecurity Outlook [Online]. Retrieved September 25, 2019, from Deloitte Nigeria: https://www2.deloitte.com/ng/en/pages/risk/articles/2018_nigeria_cybersecurity_outlook.html#

Aladenusi, T., & Olukoju, A. (2016). 2016 Nigeria Cybersecurity Outlook. Retrieved September 26, 2019, from Deloitte Nigeria: http://www2.deloitte.com/ng/en/pages/risk/articles/2016-nigeria-cybersecurity-outlook.html

Aniche, D.C.P. (2019). General Introduction to Cybersecurity. Kaduna: Unpublished.

Bureau of Justice Statistics, U.S. Dept. of Justice. (1989). Computer Crime: Criminal Justice Resource Manual.

Buzan, B. &. (2013). Regions and powers: the structure of international security. Cambridge: Cambridge University Press.

Buzan, B., Waever, O., & Wilde, J. (2013). Security a new framework for analysis. Boulder, CO: Lynne Rienner.

CIS. (2017, April 24). What is Cyber Threat Intelligence? Retrieved September 28, 2019, from CIS: https://www.cisecurity.org/blog/what-is-cyber-threat-intelligence/

Deloitte. (2019). Cyber 101 | Deloitte SEA | Risk Advisory. Retrieved October 11, 2019, from Deloitte Singapore: https://www2.deloitte.com/sg/en/pages/risk/articles/cyber-101.html

Denardis, L. (2014). The Internet Governance Oxymoron. The Global War for Internet Governance, 1-32. DOI:10.12987/yale/9780300181357.003.0001

Digital-Guardian. (2019, July 15). What is Cyber Security? Definition, Best Practices & More. Retrieved September 28, 2019, from Digital Guardian: https://digitalguardian.com/blog/what-cyber-security

DOD, J. C. (2016). Department of Defense Dictionary of Military and Associated Terms. Washington: Joint Publication 1-02.

ENISA. (2019, September 19). National Cybersecurity Strategies. Retrieved September 28, 2019, from ENISA: https://www.enisa.europa.eu/topics/national-cyber-security-strategies

Fireeye. (2019). FireEye Threat Intelligence. [online]. Retrieved September 25, 2019, from FireEye.com: https://www.fireeye.com/solutions/cyber-threat-intelligence.html

Gercke, M. (2012). Understanding Cybercrime: Phenomena, Challenges and Legal Response. Geneva, Geneva, Switzerland. Retrieved October 08, 2019, from www.itu.int/ITU-D/cyb/cybersecurity/legislation.html

Hallingstad, G., & Dandurand, L. (2010). Cyber Defence Capability Framework. The Hague: NATO C3 Agency.

Hansel, M. (2013, June 27). Cyber Security Governance and the Theory of Public Goods. Retrieved from E: https://www.e-ir.info/2013/06/27/cyber-security-governance-and-the-theory-of-public-goods/

Ibikunle, F., & Eweniyi, O. (2013). Approach to Cyber Security Issues in Nigeria: Challenges and Solution. International Journal of Cognitive Research in Science, Engineering and Education (IJCRSEE), 1(1), 1-11. Retrieved September 25, 2019

Idom, A. M., & Ugal, D. B. (2016). Influence of ICT competence on cybercrimes in selected cities of the six geo-political zones in Nigeria. FULafia Journal of Humanities and Social Sciences, 1(1), 220 - 241. Retrieved September 25, 2019

Marzoni, D. (2019, January). IT Law: Lawyer: Dmitriy Marzoni: +38097-44444-55. Retrieved December 30, 2019, from Lawyer: https://www.dmlawyer.top/it-law/

Morgenthau, H. (2012). Politics among Nations: the Struggle for Power and Peace. (K. Thompson, Ed.) New Delhi: Kalyani.

Odinma, A. C. (2010). Cybercrime & Cert: Issues & Probable Policies for Nigeria. DBI Presentation.

Oforji, J. C., Udensi, E. J., & Ibegbu, K. C. (2017). Cybersecurity Challenges in Nigeria: The Way Forward. SosPoly Journal of Science & Agriculture, 2, 1-5.

Okoli, A. C. (2013). 'Rebranding Nigeria' as a Reputation Management Drive: Implications for National Image. Journal of Communication and Media Research, 5(2), 81 - 87.

Okoli, A. l., & Idom, A. M. (2018). The Internet and National Security in Nigeria: A Threat - Import Discourse. Covenant University Journal of Politics & International Affairs, 6(1), 1. Retrieved September 25, 2019

Okonigene, R. E., & Adekanle, B. (2009). Cybercrime In Nigeria. Business Intelligence Journal.

Olubayo, A. (n.d.). Cybersecurity: Africa's Next Challenge. Retrieved September 26, 2019, from Linkedin.com: http://www.linkedin.com/pulse/20140722215101-5180516-cybersecurity-africa-s-next-challenge

Olugbile, S. (2019). Overview of Nigeria Cybersecurity Readiness. Retrieved October 09, 2019, from Aficta.africa: https://aficta.africa/images/stories/roundtable/overview-of-nigeria-cybersecurity.pdf

Omale, D. J., & Idom, A. M. (2016). Fibre optics technology and cybercrimes in Calabar Metropolis, Nigeria. International Journal of Social Relevance & Concern, 4(4), 1 - 15. Retrieved September 25, 2019, from www.ijournals.in/ijsrc

ONSA, (2014). National Coordinator for Security and Counterterrorism. Nigeria: National Cyber Security Strategy.

Osho, O., & Onoja, A. (2015). National Cyber Security Policy and Strategy of Nigeria: A Qualitative Analysis. International Journal of Cyber Criminology (IJCC), 9(1), 120 - 143. doi:001:10.5281/ZENODO.22390

PaloAlto. (2016). New from Unit 42. Retrieved October 11, 2019, from The Insider Report November 2016 - Palo Alto Networks: https://www.paloaltonetworks.com/customers/customer-newsletter/the-insider-report-november-2016

RecordedFuture. (2019). What is Threat Intelligence? Retrieved September 25, 2019, from Recorded Future: https://www.recordedfuture.com/threat-intelligence/

Roehrs, P. (2005). Weak States And Implications For Regional Security: A Case Study Of Georgian Instability And Caspian Regional Insecurity. Athens: Research Institute For European And American Studies, RIEAS.

Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019

Schweitzer, Y., Siboni, G., & Yogev, E. (2011). Cyberspace and Terrorist Organizations. Journal of Military and Strategic Affairs, 3(3), p. 40. Retrieved September 26, 2019

SuperUser. (2017). Nigeria Faces Greatest Cyber Security Threat Ever In 2017. Retrieved October 11, 2019, from Stop. Think. Connect. | Nigeria: https://stopthinkconnect.ng/index.php/blog/item/23-nigeria-faces-greatest-cyber-security-threat-ever-in-2017

Techopedia.com. (n.d.). What is Cyber Defense? - Definition from Techopedia. Retrieved September 28, 2019, from Techopedia.com: https://www.techopedia.com/definition/6705/cyber-defense

Underwood, K. (2018, August 30). Cyber Threat Intelligence Leader Warns of Changing Nature of Attacks [Online]. Retrieved September 25, 2019, from AFCEA International: https://www.afcea.org/content/cyber-threat-intelligence-leader-warns-changing-nature-attacks

UNECA, U. N. (2014). Tackling the challenges of Cybersecurity in Africa. Retrieved from Tackling the challenges of cybersecurity in Africa | United Nations Economic Commission for Africa: https://www.uneca.org/publications/tackling-challenges-cybersecurity-africa

Published

2021-07-07

How to Cite

Umar, F. A., Lawan, S. M., Okpala, C. N., & Aminu, A. (2021). DEVELOPMENT OF RIG HANGING HYDRO TURBINE BASED ON WASTE WATER DISCHARGE AT CHALLAWA INDUSTRIAL AREA OF KANO STATE. FUDMA JOURNAL OF SCIENCES, 5(2), 320 - 326. https://doi.org/10.33003/fjs-2021-0502-622