oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Search Results: 1 - 10 of 222 matches for " Haruna Isah "
All listed articles are free for downloading (OA Articles)
Page 1 /222
Display every page Item
Information and Communication Technology in Combating Counterfeit Drugs
Haruna Isah
International Journal of Engineering and Technology , 2012,
Abstract: Pharma frauds are on the rise, counterfeit drugs are giving sleepless nights to patients, pharmaceutical companies and governments. The laws prohibiting the sales of counterfeit drugs cannot succeed without technological interventions. Several analytical techniques and tools including spectroscopy, holograms, barcoding, differentiated packing, radio frequency identification, fingerprints, hyperspectral imaging etc. have been employed over the years in combating this menace; however this challenge is becoming more sophisticated with the evolution of the World Wide Web and online pharmacies. This paper presents a review on the contribution of Information and Communication Technology (ICT) as a drug counterfeit countermeasure.
Full Data Controlled Web-Based Feed Aggregator
Haruna Isah
International Journal of Computer Science & Information Technology , 2012,
Abstract: Feed syndication is analogous to electronic newsletters, both are aimed at delivering feeds to subscribers;the difference is that while newsletter subscription requires e-mail and exposed you to spam and securitychallenges, feed syndication ensures that you only get what you requested for. This paper reports a reviewon the state of the art of feed aggregation technology and the development of a locally hosted web basedfeed aggregator as a research tool using the core features of WordPress; the software was furtherenhanced with plugins and widgets for dynamic content publishing, database and object caching, socialweb syndication, back-up and maintenance, among others. The results highlight the current developmentsin software re-use and describes; how open source content management systems can be used for bothonline and offline publishing, a means whereby feed aggregator users can control and share feed data, aswell as how web developers can focus on extending the features of built-in software libraries inapplications rather than reinventing the wheel.
Information and Communication Technology in Combating Counterfeit Drugs
Haruna Isah
Computer Science , 2012,
Abstract: Pharma frauds are on the rise, counterfeit drugs are giving sleepless nights to patients, pharmaceutical companies and governments. The laws prohibiting the sales of counterfeit drugs cannot succeed without technological interventions. Several analytical techniques and tools including spectroscopy, holograms, barcoding, differentiated packing, radio frequency identification, fingerprints, hyperspectral imaging etc. have been employed over the years in combating this menace; however this challenge is becoming more sophisticated with the evolution of the World Wide Web and online pharmacies. This paper presents a review on the contribution of Information and Communication Technology (ICT) as a drug counterfeit countermeasure.
Full Data Controlled Web-Based Feed Aggregator
Haruna Isah
Computer Science , 2012, DOI: 10.5121/ijcsit.2012.4307
Abstract: Feed syndication is analogous to electronic newsletters, both are aimed at delivering feeds to subscribers; the difference is that while newsletter subscription requires e-mail and exposed you to spam and security challenges, feed syndication ensures that you only get what you requested for. This paper reports a review on the state of the art of feed aggregation technology and the development of a locally hosted web based feed aggregator as a research tool using the core features of WordPress; the software was further enhanced with plugins and widgets for dynamic content publishing, database and object caching, social web syndication, back-up and maintenance, among others. The results highlight the current developments in software re-use and describes; how open source content management systems can be used for both online and offline publishing, a means whereby feed aggregator users can control and share feed data, as well as how web developers can focus on extending the features of built-in software libraries in applications rather than reinventing the wheel.
Health Risk Assessment from Exposure to Heavy Metals in Surface and Groundwater Resources within Barkin Ladi, North Central Nigeria  [PDF]
Joyce Ayuba Ramadan, Ahmad Isah Haruna
Journal of Geoscience and Environment Protection (GEP) , 2019, DOI: 10.4236/gep.2019.72001
Abstract: Concentration of heavy metals from surface and groundwater within the communities were determined in order to assess the health risks linked to the use/consumption of same. Furthermore, the cancer risk for adults in surface water revealed medium to high cancer risk for arsenic (As); low to medium cancer risk for cadmium (Cd) and very high cancer risk for chromium (Cr). In addition, the cancer risk for adults in groundwater is as follows: high cancer risk for As; low cancer risk for Cd and very high cancer risk for Cr while that for children is very high cancer risk for As and Cr and then low cancer risk for Cd. The findings from this research confirm that the inhabitants within the study area are at direct health risk (carcinogenic and non-carcinogenic) due to the alternate use of surface and groundwater without any form of treatment.
Social Media Analysis for Product Safety using Text Mining and Sentiment Analysis
Haruna Isah,Daniel Neagu,Paul Trundle
Computer Science , 2015, DOI: 10.1109/UKCI.2014.6930158
Abstract: The growing incidents of counterfeiting and associated economic and health consequences necessitate the development of active surveillance systems capable of producing timely and reliable information for all stake holders in the anti-counterfeiting fight. User generated content from social media platforms can provide early clues about product allergies, adverse events and product counterfeiting. This paper reports a work in progresswith contributions including: the development of a framework for gathering and analyzing the views and experiences of users of drug and cosmetic products using machine learning, text mining and sentiment analysis, the application of the proposed framework on Facebook comments and data from Twitter for brand analysis, and the description of how to develop a product safety lexicon and training data for modeling a machine learning classifier for drug and cosmetic product sentiment prediction. The initial brand and product comparison results signify the usefulness of text mining and sentiment analysis on social media data while the use of machine learning classifier for predicting the sentiment orientation provides a useful tool for users, product manufacturers, regulatory and enforcement agencies to monitor brand or product sentiment trends in order to act in the event of sudden or significant rise in negative sentiment.
Bipartite Network Model for Inferring Hidden Ties in Crime Data
Haruna Isah,Daniel Neagu,Paul Trundle
Computer Science , 2015, DOI: 10.1145/2808797.2808842
Abstract: Certain crimes are hardly committed by individuals but carefully organised by group of associates and affiliates loosely connected to each other with a single or small group of individuals coordinating the overall actions. A common starting point in understanding the structural organisation of criminal groups is to identify the criminals and their associates. Situations arise in many criminal datasets where there is no direct connection among the criminals. In this paper, we investigate ties and community structure in crime data in order to understand the operations of both traditional and cyber criminals, as well as to predict the existence of organised criminal networks. Our contributions are twofold: we propose a bipartite network model for inferring hidden ties between actors who initiated an illegal interaction and objects affected by the interaction, we then validate the method in two case studies on pharmaceutical crime and underground forum data using standard network algorithms for structural and community analysis. The vertex level metrics and community analysis results obtained indicate the significance of our work in understanding the operations and structure of organised criminal networks which were not immediately obvious in the data. Identifying these groups and mapping their relationship to one another is essential in making more effective disruption strategies in the future.
The Impact of Pesticide Application on Heavy Metal (Cd, Pb and Cu) Levels in Spinach
Timothy Musa CHIROMA,Bala Isah ABDULKARIM,Haruna Mavakumba KEFAS
Leonardo Electronic Journal of Practices and Technologies , 2007,
Abstract: The impact of Pesticides (DELVAP 1000EC) application on the levels of Cd, Pb and Cu in two species of Spinach (maroon and green) was investigated. The results shows highest accumulation in leaves compared to stem and roots for both species. The levels of Cd, Pb and Cu in leaves of maroon Spinach treated with pesticides are 6.8, 1.4 and 18.6 times respectively higher than the maximum tolerable levels of 30μg/g, 300μg/g and100μg/g for Cd, Pb and Cu respectively in plants, while in green Spinach treated with pesticides the levels of Cd and Cu in leaves are 4.9 and 14.7 times respectively higher than the maximum tolerable levels. The concentration of Cd, Pb and Cu in leaves, stem and roots of maroon Spinach treated with pesticides are 163%, 222% and 178%; 364%, 325% and 449%; and 254%, 363%and 224% respectively higher than the untreated Spinach while their corresponding concentration in green Spinach treated with pesticides are 1! 56%, 238% and 150%; 163%, 454% and 462%; and 156%, 407% and 346% respectively higher than the untreated green Spinach.
Behaviour of People Living with HIV Aids in Northeastern Nigeria  [PDF]
Mohammed Tahiru Bolori, Mary Olubisi Amodu, Isah Muhammad Ahmad, Haruna Yusuph, Jalal-Eddeen Abubakar Saleh
Open Access Library Journal (OALib Journal) , 2017, DOI: 10.4236/oalib.1103944
Abstract:
Introduction: Human Behavior is important as one of the determinants of transmission of Human Immunodeficiency Virus (HIV) infection. The risk of getting infected with HIV as well as subsequent developments and reactions after the infection has a direct bearing on human behavior. Positive behavior change of HIV infection prevention is less than the level of awareness and knowledge pertaining the disease among PLWHA. Method: A cross-sectional descriptive study was carried out on PLWHA attending clinic at the University of Maiduguri Teaching Hospital. A structured interviewer administered questionnaire was used to collect data by systematic random sampling technique. The objective of the research was to understand more about the behaviour of PLWHA and make recommendations on how to improve the behavioral change communications among PLWHA to curb the menace of HIV infection. Results: The people living with HIV/AIDs may be knowledgeable and having high awareness on HIV/AIDS but may not necessarily reflect into good behaviors concerning, taking the right steps to prevent menaces of HIV infection. The behavior of PLWHA was found to have gaps that portend danger in regard to making life more miserable to victims and portend more risk of getting others infected. The gaps are mainly related to psychological issues (e.g., lack of enjoyment or with condom use), beliefs, stigma and financial issues. Conclusion: Counselling should be used to inculcate technic, good morals, attitude and practices among PLWHA to prevent them from deliberate or spontaneous attempts to infect others with the virus. Safer and satisfying sex can be promoted through expanding knowledge and awareness about HIV/AIDS and removing stigma among the general populace through community health education as well as through schools’ curricula. Empowerment of the youths in public and private settings discourages exchanging sexual intercourse for financial gains.
Optical and Morphological Studies of Chemical Bath Deposited Nanocrystalline Cd1-xZnxS Thin Films  [PDF]
Kasim Uthman Isah
Materials Sciences and Applications (MSA) , 2013, DOI: 10.4236/msa.2013.45036
Abstract:

Cadmium Zinc Sulfide, Cd1-xZnxS thin films were deposited by chemical bath deposition technique at bath temperature of 75°C. The morphology of the films was analyzed by scanning electron microscope, the optical constants of the films were estimated from the transmission and reflection spectra of the films in the wavelength range of 300 - 900 nm. The films had a transmittance between 75% and 85% and optical band gap in the range 2.8 - 3.4 eV. The dependence of the refractive index of the films on the wavelength was investigated using the single oscillator model, from which the dispersion parameters were determined. The high frequency dielectric constant εL and the ratio of the carrier concentration to the effective mass N/m* were estimated based on the Spitzer and Fan model. Both εL and N/m* show a decrease in value with increase in Zinc

Page 1 /222
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.