Bashir Abdullahi - Academia.edu (original) (raw)

Papers by Bashir Abdullahi

Research paper thumbnail of SDG18 Communication for All, Volume 2

Sustainable Development Goals Series

Research paper thumbnail of On the question of the use of isotretinoin forms with various bioavailability for the treatment of severe acne

Research paper thumbnail of The Effect of Study and Time Management Skills of Ugiv Hausa Education Student S of Usmanu Danfodiyo University Sokoto

Research paper thumbnail of Quantitative model for dynamic propagation and countermeasure of malicious cyber attack on the mobile wireless network

2017 Intelligent Systems Conference (IntelliSys), 2017

One major concern of network and data security consultants globally is the capabilities of infect... more One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopy Perturbation Method (HPM). The simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple. From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, privacy inversion and running of scam can be curtailed to a significant level.

Research paper thumbnail of The Need for a Multimodal Means of Effective Digital Learning through Data Mining and Institutional Knowledge Repository

Proceedings of the 2019 5th International Conference on Computer and Technology Applications, 2019

Educational institutions, information and knowledge givers in Nigeria are faced with numerous cha... more Educational institutions, information and knowledge givers in Nigeria are faced with numerous challenges of carrying everyone on the same page through the lack of proper digital learning and knowledge preservation tools simply regarded as a digital library. In any learning institution, digital libraries and institutional repositories are the keys to a qualitative knowledge stockpiling and delivery. The main aim of the paper is to propose a viable means of effective digital learning for the Polytechnics in Northern Nigeria. This paper also attempted to highlight the major information system components needed to develop a digital learning that will fit the Institutions with an approach through Multimedia data mining and suggests an Institutional Knowledge repository for proper academic data storage such as journals, thesis, lecture notes, dissertations, undergraduate student projects etc. The proposed system is expected to serve as a step towards bridging the gap between the polytechnics learning system and the tertiary institutions in the developed nations.

Research paper thumbnail of 2 Literatures Review : Ontology-Based Query Expansion Technique of Information Retrieval

A promising evolution of the existing web where machine and people are in cooperation is the Sema... more A promising evolution of the existing web where machine and people are in cooperation is the Semantic Web. That is, a machine’s represented and understandable web. This is against the existing web which is syntactic in nature where meaning of query search and its expected results on the web is mostly understood and interpreted by user not machine. However, the technologies drive behind this goal of semantic web is on one hand ontologies and on the other hand information retrieval techniques. Ontology is a data modeling technique for structured data repository premised on collection of concepts with their semantic relationships and constraints on a chosen area of knowledge. While on the other hand information retrieval technique is a mechanism of retrieving relevant information based on the query search. There are existing techniques for information retrieval processes, which includes that of ontological process. Therefore, this paper aimed to present a review on these existing techn...

Research paper thumbnail of Feminism and International Relations: A Socio-Economical Study

Selected Topics in Humanities and Social Sciences Vol. 8, 2021

Research paper thumbnail of A Human-Centered Usability Evaluation of University Websites Using SNECAAS Model

Handbook of Research on the Role of Human Factors in IT Project Management, 2020

One of the ways universities ensure constant touch with the human populace is through their websi... more One of the ways universities ensure constant touch with the human populace is through their websites. Therefore, websites must be engaging, interactive, easy-to-use, and provide users with the necessary information needed. Unfortunately, most universities have found this objective quite difficult to achieve. This chapter presents an evaluation the usability of six Nigerian university websites using a model which is based on seven usability criteria of speed, ease of use, navigation, content, aesthetic, accessibility, and security. The best six university websites based on webometric ranking were selected for the study with 233 participants via an online questionnaire using Google Docs. The overall results of the evaluation indicate that the usability of Nigerian university websites performed fairly well in ease of use, navigation, and aesthetic, averagely on speed and content, while the ratings based on accessibility and security are not very satisfactory.

Research paper thumbnail of Communicating Development: News Coverage of the SDGs in the Nigerian Press

The Palgrave Handbook of International Communication and Sustainable Development, 2021

This chapter examines the reporting of the Sustainable Development Goals (SDGs) in the Nigerian p... more This chapter examines the reporting of the Sustainable Development Goals (SDGs) in the Nigerian press and the challenges impeding journalists from effectively covering the SDGs. Using content analysis and framing analysis of the news coverage by two national dailies, Daily Trust and Vanguard, as well as semi-structured interviews with a selection of Nigerian journalists, the chapter seeks to determine the dominant news frames used in representing the SDGs; the SDGs targets receiving the most attention and why; and the key issues journalists grapple with in covering the SDGs. Four dominant news frames were identified within which the two newspapers constructed the SDGs, namely problem frame, solution frame, action frame and responsibility frame. This framing narrowed the scope of understanding of the SDGs as a global agenda for sustainable development. The chapter finds that the newspapers paid more attention to some of the goals than to others, indicating what the press considers as the most important or most urgent development targets. Furthermore, through the semi-structured interviews, the chapter finds that Nigerian journalists are constrained by certain factors in reporting the SDGs. These include the journalists’ lack of adequate understanding of the SDGs and poor working conditions, further narrowing the scope within which the SDGs are reported. The chapter concludes that the Nigerian press has a crucial role to play in the country’s journey towards achieving the SDGs. However, there is need for sensitization of journalists and ensuring better working conditions for them.

Research paper thumbnail of Optimization of Intermittent Gas Lift Surface Injection Pressure in High Water Cut Oil Well

Day 1 Tue, August 11, 2020, 2020

Gas lifted oil wells contributed substantially worldwide during the production life of the oil re... more Gas lifted oil wells contributed substantially worldwide during the production life of the oil reservoir. The intermittent gas lift optimization process leads to an overall reduction of OPEX and increases the NPV from the asset. When the reservoir pressure is insufficient to produce the desired rate, consequently the oil well productivity declines and the percentage of water cut increases. The well level optimization is one of the practical strategies employs to optimize well parameters especially surface injection pressure of intermittent gas lift. A sensitivity study was implemented on surface injection pressure using IPM Prosper. Gas lifted oil rates were analyzed at several surface injection pressures from 1000-5400psi. The optimum surface injection pressure of 1300psi at an oil rate of 140 STB/day was achieved with 6 injection valves (4 operating valves and 2 safety valves) at a depth of total valves of 7316ft producing 80% water cut.

Research paper thumbnail of The Hausa 12-item short-form health survey (SF-12): Translation, cross-cultural adaptation and validation in mixed urban and rural Nigerian populations with chronic low back pain

PLOS ONE, 2020

Introduction Measuring health-related quality of life (HRQOL) in patients with chronic low back p... more Introduction Measuring health-related quality of life (HRQOL) in patients with chronic low back pain (LBP) is crucial to monitor and improve the patients' health status through effective rehabilitation. While the 12-item short-form health survey (SF-12) was developed as a shorter alternative to the 36-item short-form health survey for assessing HRQOL in large-scale studies, to date, no cross-culturally adapted and validated Hausa version exists. This study aimed to translate and cross-culturally adapt the SF-12 into Hausa language, and test its psychometric properties in mixed urban and rural Nigerian populations with chronic LBP. Methods The Hausa version of the SF-12 was developed following the guidelines of the International Quality of Life Assessment project. Fifteen patients with chronic LBP recruited from urban and rural communities of Nigeria pre-tested the Hausa SF-12. A consecutive sample of 200 patients with chronic LBP recruited from urban and rural clinics of Nigeria completed the instrument, among which 100 respondents re-tested the instrument after two weeks. Factorial structure and invariance were assessed using confirmatory factor analysis (CFA) and multi-group CFA respectively. Multi-trait scaling analysis (for convergent and divergent validity) and known-groups validity were performed to assess construct validity. Composite reliability (CR), internal consistency (Cronbach's α), intraclass correlation coefficients (ICC), and Bland-Altman plots were computed to assess reliability.

Research paper thumbnail of Rheological Properties of Grain in Progeny of Winter Common Wheat from Hybridization with Amylopectin Variety

Belgorod State University Scientific bulletin Natural Sciences, 2018

Исследовали реологические свойства зерна озимой мягкой пшеницы урожая 2017 года в потомстве от ги... more Исследовали реологические свойства зерна озимой мягкой пшеницы урожая 2017 года в потомстве от гибридизации с амилопектиновым сортом Софийка. Погодные условия этого года способствовали дифференциации образцов по реологическим свойствам, связанным с углеводным составом семени. На основе анализа на приборе Миксолаб выделены формы, имеющие реологические параметры крахмального комплекса подобные сорту Софийка. Обнаружена существенная положительная связь между урожайностью и водопоглотительной способностью зерна (r = 0.472±0.167÷0.697±0.136). На высокие значения результирующей углеводной части семени (Ретроградацию) влияют повышенные величины Вязкости и Амилазы, что приводит к ухудшению качества хлебопекарной продукции. На Ретроградацию не влияют особенности белковой части зерна. Индекс деформации клейковины (ИДК) отражает ее качество и влияет на реологический индекс Замес (r =-0.741±0.127; t = 5.842). Это позволило одновременно контролировать качество зерна селекционных образцов, обусловленное как белковым, так и углеводным комплексами эндосперма.

Research paper thumbnail of Status of malondialdehyde, catalase and superoxide dismutase levels/activities in schoolchildren with iron deficiency and iron-deficiency anemia of Kashere and its environs in Gombe State, Nigeria

Heliyon, 2019

Background: Iron-deficiency anemia (IDA) or iron deficiency (ID) is by far the most common form o... more Background: Iron-deficiency anemia (IDA) or iron deficiency (ID) is by far the most common form of disorder affecting the cognitive development, physical growth and school performance of children in developing countries including Nigeria. Objectives: In the present study, we aimed to examine whether IDA or ID, or both are associated with oxidative stress or otherwise by assessing the perturbations in oxidative stress markers including malondialdehyde (MDA), catalase (CAT) and superoxide dismutase (SOD). Methods: Here, a total of eighty-one IDA, ID, and healthy control subjects of twenty-seven replicates each, were recruited and investigated. Human serum MDA, CAT and SOD levels were quantitatively analyzed using Enzyme-Linked Immunosorbant Assay. Results: Mean serum MDA levels of IDA (5.10 AE 2.35 mmol/L) and ID (4.05 AE 1.35 mmol/L) groups were found to perturb significantly (p < 0.05), being higher than those of control (3.30 AE 0.95 mmol/L) subjects. Similarly, mean serum MDA levels of IDA (5.10 AE 2.35 mmol/L) group was found to be significantly (p < 0.05) higher when compared with ID (4.05 AE 1.35 mmol/L) subjects. Conversely, mean serum CAT and SOD activities of IDA (8.35 AE 2.21 ng/mL and 340.70 AE 153.65 ng/mL) group were found to differ significantly (p < 0.05), and those of ID (9.40 AE 1.47 ng/mL and 435.00 AE 144.75 ng/mL) subjects were found to perturb slightly (p > 0.05), being lower than those of control (10.40 AE 4.31 ng/mL and 482.12 AE 258.37 ng/mL) subjects. Conclusions: Taken together, the results of the present study showed that lipid peroxidation was dramatically increased in both IDA and ID subjects in hydroperoxide-superoxide-dependent manner; in contrast, enzymatic antioxidant capacity was drastically decreased in both IDA and ID groups as evidenced by biochemical markers.

Research paper thumbnail of Meningococcus serogroup C clonal complex ST-10217 outbreak in Zamfara State, Northern Nigeria

Scientific reports, Jan 21, 2018

After the successful roll out of MenAfriVac, Nigeria has experienced sequential meningitis outbre... more After the successful roll out of MenAfriVac, Nigeria has experienced sequential meningitis outbreaks attributed to meningococcus serogroup C (NmC). Zamfara State in North-western Nigeria recently was at the epicentre of the largest NmC outbreak in the 21 Century with 7,140 suspected meningitis cases and 553 deaths reported between December 2016 and May 2017. The overall attack rate was 155 per 100,000 population and children 5-14 years accounted for 47% (3,369/7,140) of suspected cases. The case fatality rate (CFR) among children 5-9 years was 10%, double that reported among adults ≥ 30 years (5%). NmC and pneumococcus accounted for 94% (172/184) and 5% (9/184) of the laboratory-confirmed cases, respectively. The sequenced NmC belonged to the ST-10217 clonal complex (CC). All serotyped pneumococci were PCV10 serotypes. The emergence of NmC ST-10217 CC outbreaks threatens the public health gains made by MenAfriVac, which calls for an urgent strategic action against meningitis outbreaks.

Research paper thumbnail of Performance analysis of particle swarm optimization algorithm-based parameter tuning for fingerprint image enhancement

2016 Future Technologies Conference (FTC), 2016

Existing algorithms designed for Fingerprint Image Enhancement either lack the ability to enhance... more Existing algorithms designed for Fingerprint Image Enhancement either lack the ability to enhance poor quality image or are computationally expensive. Evolutionary algorithms are often used to enhance images. Particle Swarm Optimization (PSO) is one of the most progressive algorithms but has parameters, which are not properly tuned to reduce the number of iterations. In this paper, PSO parameters; inertia weight (w) and acceleration constants (c1 and c2) were fine-tuned. PSO-based parameterized transformation function, which incorporates both the global and local information of an image was developed to maximize the information content of the fingerprint image. In the transformation function, a threshold of 0.99 was set to control the contrast effect of the enhanced image. The intensity values of pixels that are less than the threshold were transformed. The image quality was evaluated using an Objective Function in term of Number of Edges, Sum of Edge intensities and the exponential of the entropy. The commonly-well-known database FVC-2004 is used in this study. It was observed from the experiments that the best PSO parameters set used for successful convergence of the PSO Algorithm were w ∊ [0.7, 0.75] and (c1, c2) ∊ [1.2,1.3]. Therefore, any set of values used outside these ranges would result to local minimum convergence and increase the computational effort by searching in unwanted areas.

Research paper thumbnail of Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies

International Journal of Information Technology and Computer Science, 2016

Insecurity is one of the major challenges that the entire world is facing now, each country havin... more Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for co mmitting criminal activities mo re than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The development of a vehicle theft alert and location identification system beco mes more necessary for vehicle o wners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM applicat ion developed and installed in a mobile phone device wh ich is embedded in the vehicle to communicate with the vehicle owner's mobile phone. The communicat ion is established via SMS (i.e. between the installed mobile phone device and that of the vehicle owner). The co mmunications established include; (i). Sending an SMS alert fro m installed mobile phone device to vehicle owner mobile phone when the car ignition is put on. (ii). Sending an SMS fro m the vehicle owner's mobile phone to start and stop the installed mobile phone device application. The location identificat ion function makes use of a web application developed to; (i). Determine the real time location of a vehicle by means of tracking using GPS. (ii). Broadcast missing or stolen vehicle informat ion to social media and security agency. The implementation of the installed mobile phone device application was done using JAVA because of its capabilit ies in programming mobile applications while PHP and MySQL was used for the web application functions. Integration testing of the system was carried out using simple percentage calculation for the performance evaluation. Fifty seven (57) vehicle owners were sampled and questionnaires were d istributed to them in order to ascertain the acceptability and wo rkab ility of the developed system. The result obtained shows the effectiveness of the system and hence it can be used to effectively monitor vehicle as it is been driven within or outside its jurisdiction. More so, the system can be used as database of missing, identified or recovered vehicles by various security agencies.

Research paper thumbnail of A Survey on Mobile Cloud Computing with Embedded Security Considerations

International Journal of Cloud Computing and Services Science, Apr 13, 2014

The emergence of cloud computing hold a promise to computing where software is provided as a serv... more The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.

Research paper thumbnail of A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

ABSTRACT

Research paper thumbnail of Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks

2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Recently, it was argued that the true potential of sensor network services can be realized only i... more Recently, it was argued that the true potential of sensor network services can be realized only if they become an integral part of a larger context-aware distributed system. The benefit is that, the intergration allows sensor network services to be seamlessly accessible to remote users through devices that they are already familiar with. This integration can be simplified using a publish-subscribe system. However, the wireless medium facilitates eavesdropping and some data is sensitive. This makes the security extremely important. Furthermore, sensor nodes have limited power and processing resources, so standard security mechanisms, which are heavy in weight and resource consumption, are unsuitable. These challenges increase the need to develop comprehensive and secure solutions that achieve wider protection, while maintaining desirable network performance. In this paper, we propose a secure publish-subscribe-based in-network data storage service in WSNs to provide different security requirements such as confidentiality, authentication, integrity, availability, and authorized access.

Research paper thumbnail of A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011

In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor ... more In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) in real time are stored in the network. Without proper protection for the sensitive data generated in this setting, a compromised storage node (by an enemy soldier) may divulge its stored sensitive data about the monitored environment, and even worse, it may alter the data. In this paper, we integrate an elliptic curve cryptography scheme and an erasure coding scheme to provide reliable and secure distributed in-network data storage for sensor networks. The main idea is to distribute each erasure coded fragment appended with a fingerprint to different storage nodes. The fingerprint is to allow each coded data fragment to be independently verified as a valid and correct subset of a specific data item. So, the scheme achieves localization of data error. The proposed scheme is resilient to collusion attack, pollution attack, and data dropping attack, and guarantees forward and backward data secrecy as well. The security of the proposed scheme relies on the intractability of the elliptic curve discrete logarithm problem. Different from the existing solutions, the uniqueness of our method comes from the use of lightweight encryption scheme, which is well suited for resource constrained wireless sensors.

Research paper thumbnail of SDG18 Communication for All, Volume 2

Sustainable Development Goals Series

Research paper thumbnail of On the question of the use of isotretinoin forms with various bioavailability for the treatment of severe acne

Research paper thumbnail of The Effect of Study and Time Management Skills of Ugiv Hausa Education Student S of Usmanu Danfodiyo University Sokoto

Research paper thumbnail of Quantitative model for dynamic propagation and countermeasure of malicious cyber attack on the mobile wireless network

2017 Intelligent Systems Conference (IntelliSys), 2017

One major concern of network and data security consultants globally is the capabilities of infect... more One major concern of network and data security consultants globally is the capabilities of infectious malicious cyber-attacks (Malware) to invade the entire population of the network terminals within few days of an outbreak of an attack to wreak havoc ranging from identity theft, financial fraud to systemic digital assault on critical national assets. It is known that when the vulnerable mobile device communicates with the infected nodes, it becomes infected. This work studies the behavioral dynamics of the Vulnerable, infected and the recovered terminals on the mobile wireless network and the effectiveness of an antivirus security signature as countermeasure and the effect of lack of anti-virus update. Solving for stability, we found out that its Eigen values gives a negative value which means that the equilibrium point is in a stable state. We analyzed the differential equations using Homotopy Perturbation Method (HPM). The simulation to evaluate the consequence of different countermeasure options were carried on a mathematical-tool platform called maple. From our results we discovered that if security patches are fixed on our mobile devices and there is regular antivirus update on the devices, then financial fraud, privacy inversion and running of scam can be curtailed to a significant level.

Research paper thumbnail of The Need for a Multimodal Means of Effective Digital Learning through Data Mining and Institutional Knowledge Repository

Proceedings of the 2019 5th International Conference on Computer and Technology Applications, 2019

Educational institutions, information and knowledge givers in Nigeria are faced with numerous cha... more Educational institutions, information and knowledge givers in Nigeria are faced with numerous challenges of carrying everyone on the same page through the lack of proper digital learning and knowledge preservation tools simply regarded as a digital library. In any learning institution, digital libraries and institutional repositories are the keys to a qualitative knowledge stockpiling and delivery. The main aim of the paper is to propose a viable means of effective digital learning for the Polytechnics in Northern Nigeria. This paper also attempted to highlight the major information system components needed to develop a digital learning that will fit the Institutions with an approach through Multimedia data mining and suggests an Institutional Knowledge repository for proper academic data storage such as journals, thesis, lecture notes, dissertations, undergraduate student projects etc. The proposed system is expected to serve as a step towards bridging the gap between the polytechnics learning system and the tertiary institutions in the developed nations.

Research paper thumbnail of 2 Literatures Review : Ontology-Based Query Expansion Technique of Information Retrieval

A promising evolution of the existing web where machine and people are in cooperation is the Sema... more A promising evolution of the existing web where machine and people are in cooperation is the Semantic Web. That is, a machine’s represented and understandable web. This is against the existing web which is syntactic in nature where meaning of query search and its expected results on the web is mostly understood and interpreted by user not machine. However, the technologies drive behind this goal of semantic web is on one hand ontologies and on the other hand information retrieval techniques. Ontology is a data modeling technique for structured data repository premised on collection of concepts with their semantic relationships and constraints on a chosen area of knowledge. While on the other hand information retrieval technique is a mechanism of retrieving relevant information based on the query search. There are existing techniques for information retrieval processes, which includes that of ontological process. Therefore, this paper aimed to present a review on these existing techn...

Research paper thumbnail of Feminism and International Relations: A Socio-Economical Study

Selected Topics in Humanities and Social Sciences Vol. 8, 2021

Research paper thumbnail of A Human-Centered Usability Evaluation of University Websites Using SNECAAS Model

Handbook of Research on the Role of Human Factors in IT Project Management, 2020

One of the ways universities ensure constant touch with the human populace is through their websi... more One of the ways universities ensure constant touch with the human populace is through their websites. Therefore, websites must be engaging, interactive, easy-to-use, and provide users with the necessary information needed. Unfortunately, most universities have found this objective quite difficult to achieve. This chapter presents an evaluation the usability of six Nigerian university websites using a model which is based on seven usability criteria of speed, ease of use, navigation, content, aesthetic, accessibility, and security. The best six university websites based on webometric ranking were selected for the study with 233 participants via an online questionnaire using Google Docs. The overall results of the evaluation indicate that the usability of Nigerian university websites performed fairly well in ease of use, navigation, and aesthetic, averagely on speed and content, while the ratings based on accessibility and security are not very satisfactory.

Research paper thumbnail of Communicating Development: News Coverage of the SDGs in the Nigerian Press

The Palgrave Handbook of International Communication and Sustainable Development, 2021

This chapter examines the reporting of the Sustainable Development Goals (SDGs) in the Nigerian p... more This chapter examines the reporting of the Sustainable Development Goals (SDGs) in the Nigerian press and the challenges impeding journalists from effectively covering the SDGs. Using content analysis and framing analysis of the news coverage by two national dailies, Daily Trust and Vanguard, as well as semi-structured interviews with a selection of Nigerian journalists, the chapter seeks to determine the dominant news frames used in representing the SDGs; the SDGs targets receiving the most attention and why; and the key issues journalists grapple with in covering the SDGs. Four dominant news frames were identified within which the two newspapers constructed the SDGs, namely problem frame, solution frame, action frame and responsibility frame. This framing narrowed the scope of understanding of the SDGs as a global agenda for sustainable development. The chapter finds that the newspapers paid more attention to some of the goals than to others, indicating what the press considers as the most important or most urgent development targets. Furthermore, through the semi-structured interviews, the chapter finds that Nigerian journalists are constrained by certain factors in reporting the SDGs. These include the journalists’ lack of adequate understanding of the SDGs and poor working conditions, further narrowing the scope within which the SDGs are reported. The chapter concludes that the Nigerian press has a crucial role to play in the country’s journey towards achieving the SDGs. However, there is need for sensitization of journalists and ensuring better working conditions for them.

Research paper thumbnail of Optimization of Intermittent Gas Lift Surface Injection Pressure in High Water Cut Oil Well

Day 1 Tue, August 11, 2020, 2020

Gas lifted oil wells contributed substantially worldwide during the production life of the oil re... more Gas lifted oil wells contributed substantially worldwide during the production life of the oil reservoir. The intermittent gas lift optimization process leads to an overall reduction of OPEX and increases the NPV from the asset. When the reservoir pressure is insufficient to produce the desired rate, consequently the oil well productivity declines and the percentage of water cut increases. The well level optimization is one of the practical strategies employs to optimize well parameters especially surface injection pressure of intermittent gas lift. A sensitivity study was implemented on surface injection pressure using IPM Prosper. Gas lifted oil rates were analyzed at several surface injection pressures from 1000-5400psi. The optimum surface injection pressure of 1300psi at an oil rate of 140 STB/day was achieved with 6 injection valves (4 operating valves and 2 safety valves) at a depth of total valves of 7316ft producing 80% water cut.

Research paper thumbnail of The Hausa 12-item short-form health survey (SF-12): Translation, cross-cultural adaptation and validation in mixed urban and rural Nigerian populations with chronic low back pain

PLOS ONE, 2020

Introduction Measuring health-related quality of life (HRQOL) in patients with chronic low back p... more Introduction Measuring health-related quality of life (HRQOL) in patients with chronic low back pain (LBP) is crucial to monitor and improve the patients' health status through effective rehabilitation. While the 12-item short-form health survey (SF-12) was developed as a shorter alternative to the 36-item short-form health survey for assessing HRQOL in large-scale studies, to date, no cross-culturally adapted and validated Hausa version exists. This study aimed to translate and cross-culturally adapt the SF-12 into Hausa language, and test its psychometric properties in mixed urban and rural Nigerian populations with chronic LBP. Methods The Hausa version of the SF-12 was developed following the guidelines of the International Quality of Life Assessment project. Fifteen patients with chronic LBP recruited from urban and rural communities of Nigeria pre-tested the Hausa SF-12. A consecutive sample of 200 patients with chronic LBP recruited from urban and rural clinics of Nigeria completed the instrument, among which 100 respondents re-tested the instrument after two weeks. Factorial structure and invariance were assessed using confirmatory factor analysis (CFA) and multi-group CFA respectively. Multi-trait scaling analysis (for convergent and divergent validity) and known-groups validity were performed to assess construct validity. Composite reliability (CR), internal consistency (Cronbach's α), intraclass correlation coefficients (ICC), and Bland-Altman plots were computed to assess reliability.

Research paper thumbnail of Rheological Properties of Grain in Progeny of Winter Common Wheat from Hybridization with Amylopectin Variety

Belgorod State University Scientific bulletin Natural Sciences, 2018

Исследовали реологические свойства зерна озимой мягкой пшеницы урожая 2017 года в потомстве от ги... more Исследовали реологические свойства зерна озимой мягкой пшеницы урожая 2017 года в потомстве от гибридизации с амилопектиновым сортом Софийка. Погодные условия этого года способствовали дифференциации образцов по реологическим свойствам, связанным с углеводным составом семени. На основе анализа на приборе Миксолаб выделены формы, имеющие реологические параметры крахмального комплекса подобные сорту Софийка. Обнаружена существенная положительная связь между урожайностью и водопоглотительной способностью зерна (r = 0.472±0.167÷0.697±0.136). На высокие значения результирующей углеводной части семени (Ретроградацию) влияют повышенные величины Вязкости и Амилазы, что приводит к ухудшению качества хлебопекарной продукции. На Ретроградацию не влияют особенности белковой части зерна. Индекс деформации клейковины (ИДК) отражает ее качество и влияет на реологический индекс Замес (r =-0.741±0.127; t = 5.842). Это позволило одновременно контролировать качество зерна селекционных образцов, обусловленное как белковым, так и углеводным комплексами эндосперма.

Research paper thumbnail of Status of malondialdehyde, catalase and superoxide dismutase levels/activities in schoolchildren with iron deficiency and iron-deficiency anemia of Kashere and its environs in Gombe State, Nigeria

Heliyon, 2019

Background: Iron-deficiency anemia (IDA) or iron deficiency (ID) is by far the most common form o... more Background: Iron-deficiency anemia (IDA) or iron deficiency (ID) is by far the most common form of disorder affecting the cognitive development, physical growth and school performance of children in developing countries including Nigeria. Objectives: In the present study, we aimed to examine whether IDA or ID, or both are associated with oxidative stress or otherwise by assessing the perturbations in oxidative stress markers including malondialdehyde (MDA), catalase (CAT) and superoxide dismutase (SOD). Methods: Here, a total of eighty-one IDA, ID, and healthy control subjects of twenty-seven replicates each, were recruited and investigated. Human serum MDA, CAT and SOD levels were quantitatively analyzed using Enzyme-Linked Immunosorbant Assay. Results: Mean serum MDA levels of IDA (5.10 AE 2.35 mmol/L) and ID (4.05 AE 1.35 mmol/L) groups were found to perturb significantly (p < 0.05), being higher than those of control (3.30 AE 0.95 mmol/L) subjects. Similarly, mean serum MDA levels of IDA (5.10 AE 2.35 mmol/L) group was found to be significantly (p < 0.05) higher when compared with ID (4.05 AE 1.35 mmol/L) subjects. Conversely, mean serum CAT and SOD activities of IDA (8.35 AE 2.21 ng/mL and 340.70 AE 153.65 ng/mL) group were found to differ significantly (p < 0.05), and those of ID (9.40 AE 1.47 ng/mL and 435.00 AE 144.75 ng/mL) subjects were found to perturb slightly (p > 0.05), being lower than those of control (10.40 AE 4.31 ng/mL and 482.12 AE 258.37 ng/mL) subjects. Conclusions: Taken together, the results of the present study showed that lipid peroxidation was dramatically increased in both IDA and ID subjects in hydroperoxide-superoxide-dependent manner; in contrast, enzymatic antioxidant capacity was drastically decreased in both IDA and ID groups as evidenced by biochemical markers.

Research paper thumbnail of Meningococcus serogroup C clonal complex ST-10217 outbreak in Zamfara State, Northern Nigeria

Scientific reports, Jan 21, 2018

After the successful roll out of MenAfriVac, Nigeria has experienced sequential meningitis outbre... more After the successful roll out of MenAfriVac, Nigeria has experienced sequential meningitis outbreaks attributed to meningococcus serogroup C (NmC). Zamfara State in North-western Nigeria recently was at the epicentre of the largest NmC outbreak in the 21 Century with 7,140 suspected meningitis cases and 553 deaths reported between December 2016 and May 2017. The overall attack rate was 155 per 100,000 population and children 5-14 years accounted for 47% (3,369/7,140) of suspected cases. The case fatality rate (CFR) among children 5-9 years was 10%, double that reported among adults ≥ 30 years (5%). NmC and pneumococcus accounted for 94% (172/184) and 5% (9/184) of the laboratory-confirmed cases, respectively. The sequenced NmC belonged to the ST-10217 clonal complex (CC). All serotyped pneumococci were PCV10 serotypes. The emergence of NmC ST-10217 CC outbreaks threatens the public health gains made by MenAfriVac, which calls for an urgent strategic action against meningitis outbreaks.

Research paper thumbnail of Performance analysis of particle swarm optimization algorithm-based parameter tuning for fingerprint image enhancement

2016 Future Technologies Conference (FTC), 2016

Existing algorithms designed for Fingerprint Image Enhancement either lack the ability to enhance... more Existing algorithms designed for Fingerprint Image Enhancement either lack the ability to enhance poor quality image or are computationally expensive. Evolutionary algorithms are often used to enhance images. Particle Swarm Optimization (PSO) is one of the most progressive algorithms but has parameters, which are not properly tuned to reduce the number of iterations. In this paper, PSO parameters; inertia weight (w) and acceleration constants (c1 and c2) were fine-tuned. PSO-based parameterized transformation function, which incorporates both the global and local information of an image was developed to maximize the information content of the fingerprint image. In the transformation function, a threshold of 0.99 was set to control the contrast effect of the enhanced image. The intensity values of pixels that are less than the threshold were transformed. The image quality was evaluated using an Objective Function in term of Number of Edges, Sum of Edge intensities and the exponential of the entropy. The commonly-well-known database FVC-2004 is used in this study. It was observed from the experiments that the best PSO parameters set used for successful convergence of the PSO Algorithm were w ∊ [0.7, 0.75] and (c1, c2) ∊ [1.2,1.3]. Therefore, any set of values used outside these ranges would result to local minimum convergence and increase the computational effort by searching in unwanted areas.

Research paper thumbnail of Vehicle Theft Alert and Location Identification Using GSM, GPS and Web Technologies

International Journal of Information Technology and Computer Science, 2016

Insecurity is one of the major challenges that the entire world is facing now, each country havin... more Insecurity is one of the major challenges that the entire world is facing now, each country having their peculiar security issues. The crime rate in every part of the society these days has become a threatening issue such that vehicles are now used for co mmitting criminal activities mo re than before. The issue of vehicle theft has increased tremendously, mostly at gunpoint or car parks. In view of these, there is a need for adequate records of stolen, identified and recovered vehicles which are not readily available in our society and as such very important. The development of a vehicle theft alert and location identification system beco mes more necessary for vehicle o wners to ensure theft prevention and a speedy identification towards recovery efforts in situations where a vehicle is missing, stolen or driven by an unauthorized person. The theft alert function makes use of a GSM applicat ion developed and installed in a mobile phone device wh ich is embedded in the vehicle to communicate with the vehicle owner's mobile phone. The communicat ion is established via SMS (i.e. between the installed mobile phone device and that of the vehicle owner). The co mmunications established include; (i). Sending an SMS alert fro m installed mobile phone device to vehicle owner mobile phone when the car ignition is put on. (ii). Sending an SMS fro m the vehicle owner's mobile phone to start and stop the installed mobile phone device application. The location identificat ion function makes use of a web application developed to; (i). Determine the real time location of a vehicle by means of tracking using GPS. (ii). Broadcast missing or stolen vehicle informat ion to social media and security agency. The implementation of the installed mobile phone device application was done using JAVA because of its capabilit ies in programming mobile applications while PHP and MySQL was used for the web application functions. Integration testing of the system was carried out using simple percentage calculation for the performance evaluation. Fifty seven (57) vehicle owners were sampled and questionnaires were d istributed to them in order to ascertain the acceptability and wo rkab ility of the developed system. The result obtained shows the effectiveness of the system and hence it can be used to effectively monitor vehicle as it is been driven within or outside its jurisdiction. More so, the system can be used as database of missing, identified or recovered vehicles by various security agencies.

Research paper thumbnail of A Survey on Mobile Cloud Computing with Embedded Security Considerations

International Journal of Cloud Computing and Services Science, Apr 13, 2014

The emergence of cloud computing hold a promise to computing where software is provided as a serv... more The emergence of cloud computing hold a promise to computing where software is provided as a services (SaaS) via the Internet. Mobile cloud computing integrates cloud computing with mobile devices. By this architecture, certain challenges (e.g., battery life, storage, and bandwidth) of mobile devices are addressed. Cloud computing provides the foundation for mobile cloud computing through the delivery of services, software, storage and computational capacity over the Internet, thereby reducing cost, increasing storage, improving battery life of mobile devices and providing flexibility and mobility of data and information. However, the realization of some of these benefits is far from reality in mobile applications, as a result, opens new areas of research such as security of privacy and services. To better understand how to facilitate the development of mobile cloud computing, we surveyed existing work in mobile cloud computing in the context and principles of its foundational cloud computing technology. We provided a definition of mobile cloud computing and gave a summary of results from this review, in particular, the models, architecture, applications and challenges of mobile cloud computing. We concluded with recommendations for how this better understanding of mobile cloud computing can assist in the development of better and stronger mobile applications.

Research paper thumbnail of A Lightweight Anonymous On-demand Routing Scheme in Wireless Sensor Networks

2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 2012

ABSTRACT

Research paper thumbnail of Secure Publish-Subscribe-Based In-Network Data Storage Service in Wireless Sensor Networks

2012 IEEE 8th International Conference on Distributed Computing in Sensor Systems, 2012

Recently, it was argued that the true potential of sensor network services can be realized only i... more Recently, it was argued that the true potential of sensor network services can be realized only if they become an integral part of a larger context-aware distributed system. The benefit is that, the intergration allows sensor network services to be seamlessly accessible to remote users through devices that they are already familiar with. This integration can be simplified using a publish-subscribe system. However, the wireless medium facilitates eavesdropping and some data is sensitive. This makes the security extremely important. Furthermore, sensor nodes have limited power and processing resources, so standard security mechanisms, which are heavy in weight and resource consumption, are unsuitable. These challenges increase the need to develop comprehensive and secure solutions that achieve wider protection, while maintaining desirable network performance. In this paper, we propose a secure publish-subscribe-based in-network data storage service in WSNs to provide different security requirements such as confidentiality, authentication, integrity, availability, and authorized access.

Research paper thumbnail of A Reliable and Secure Distributed In-network Data Storage Scheme in Wireless Sensor Networks

2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, 2011

In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor ... more In a battlefield surveillance scenario, data readings and events emerging from a wireless sensor network deployed that may not be used immediately by or simply impossible to transmit to an authorized user (a Soldier) in real time are stored in the network. Without proper protection for the sensitive data generated in this setting, a compromised storage node (by an enemy soldier) may divulge its stored sensitive data about the monitored environment, and even worse, it may alter the data. In this paper, we integrate an elliptic curve cryptography scheme and an erasure coding scheme to provide reliable and secure distributed in-network data storage for sensor networks. The main idea is to distribute each erasure coded fragment appended with a fingerprint to different storage nodes. The fingerprint is to allow each coded data fragment to be independently verified as a valid and correct subset of a specific data item. So, the scheme achieves localization of data error. The proposed scheme is resilient to collusion attack, pollution attack, and data dropping attack, and guarantees forward and backward data secrecy as well. The security of the proposed scheme relies on the intractability of the elliptic curve discrete logarithm problem. Different from the existing solutions, the uniqueness of our method comes from the use of lightweight encryption scheme, which is well suited for resource constrained wireless sensors.