167 results on '"Adamu, Abubakar"'
Search Results
2. Forward–Reflected–Backward Splitting Algorithms with Momentum: Weak, Linear and Strong Convergence Results
- Author
-
Yao, Yonghong, Adamu, Abubakar, and Shehu, Yekini
- Published
- 2024
- Full Text
- View/download PDF
3. Three novel inertial subgradient extragradient methods for quasi-monotone variational inequalities in Banach spaces
- Author
-
Wang, Zhong-bao, Sunthrayuth, Pongsakorn, Promkam, Ratthaprom, and Adamu, Abubakar
- Published
- 2024
- Full Text
- View/download PDF
4. Strongly convergent inertial forward-backward-forward algorithm without on-line rule for variational inequalities
- Author
-
Yao, Yonghong, Adamu, Abubakar, and Shehu, Yekini
- Published
- 2024
- Full Text
- View/download PDF
5. Mapping of structural features related to hydrocarbon and other mineralization potentials of southeastern Sokoto Basin NW, Nigeria, by high-resolution aeromagnetic data
- Author
-
Adamu, Abubakar, Likkason, Othniel Kamfani, Maigari, Abubakar Sadiq, and Ali, Sani
- Published
- 2024
- Full Text
- View/download PDF
6. Potentiating the Epidural Analgesic Effect of Lidocaine in Uda Sheep with Xylazine and Medetomidine
- Author
-
Shittu Shamsudeen, Sherifat Idris, Adamu Abubakar, and Mayaki Abubakar
- Subjects
epidural analgesia ,lidocaine ,medetomidine ,uda sheep ,xylazine ,Zoology ,QL1-991 ,Veterinary medicine ,SF600-1100 ,Animal biochemistry ,QP501-801 - Abstract
This study was undertaken to compare the analgesic effects of lidocaine, xylazine, and medetomidine alone and their combinations with lidocaine in Uda sheep. The sheep (n = 6) were assigned to five different epidural treatment groups using a cross-over design with a wash-out period of one week between the treatment groups. The group (A) received lidocaine at 2.86 mg/kg, the group (B) received xylazine at 0.05 mg/kg, the group (C) received medetomidine at 20 µg/kg, the group (D) received lidocaine-xylazine combination at 2.15 mg/kg and 0.125 mg/kg, respectively, and the group (E) received lidocaine-medetomidine combination at 2.15 mg/kg and 5 µg/kg, respectively. The analgesic effect was evaluated by the needle-prick test method. The onset and duration of analgesia in the mentioned regions were recorded. Ataxic and sedative effects were carefully observed and recorded according to the scoring system. Blood was collected at baseline (0), immediately after onset, and 24 hours post-administration. Results showed that medetomidine treatment produced a highly significant (p < 0.01) earlier onset of action (6–8 min) than the rest of the treatment groups. Medetomidine treatment also produced a significantly (p < 0.001) longer duration of analgesia (190-230 min) than the rest of the treatment groups. Lidocaine alone or in combination with xylazine or medetomidine induced severe ataxia, while xylazine and medetomidine alone or in combination with lidocaine produced mild to moderate sedation. In conclusion, epidural administration of medetomidine, lidocaine-xylazine, and xylazine produced a prolonged, longer duration of analgesia with useful systemic sedation in sheep.
- Published
- 2024
- Full Text
- View/download PDF
7. Aeromagnetic Anomalies and Tectonic Trends in and Around the Southern Part of Sokoto Basin, NW, Nigeria, using the Enhancement Filtering Techniques
- Author
-
Adamu Abubakar, Alhasan Abubakar Sadiq, Abdulrahman Idris Augie, Mubarak Muhammad Fana, Hadiza Umar, Sufyan Umar, Aliyu Muhammad Kaura, Kelvins Godfrey Ugbena, and Abdulrahman Olatunde
- Subjects
Aeromagnetic anomalies ,Tectonic trends ,Digital filtering tools ,Metalliferous minerals ,Sokoto Basin ,Technology - Abstract
The Taloka formation Sokoto Basin, Nigeria, was studied in an effort to discover and map the structural features favourable for metalliferous mineral deposits. High-resolution aeromagnetic data was subjected to structural analysis in order to map and highlight structural lineaments and their trends, as well as the depth of magnetic source bodies. Several digital filtering approaches were used to analyze, process, and interpret the data, including total gradient, total horizontal derivative of tilt of angle derivative (THDR_TDR), source parameter imaging (SPI), and spectral depth analysis. The RTE method was employed to prevent the North-South signal from predominating the results because the area was within the low latitude zones. The eastern Gundumi formation (Marafaro, Rujin Tsamia, Kwanawa, Dande, and Rikaka), the northeastern Taloka formation (Dutsen Bature, Bange, and Kumazo), and the western Taloka formation (Bejiji, Bagu, Danjiru, Baranzaki, and Awakala) are all found to have low amplitude magnetic anomalies. The research area exhibits magnetic anomalies with strong amplitudes (0.078 nT/m), which are consistent with the total gradient (AS) approach and might be caused by ferromagnetic minerals like iron stone. The aforementioned filters were also used to outline the lineaments (such as faults, fractures, or shear zones) believed to be associated with alteration zones, which are essential in locating the mineralized zones. The lineaments typically trend in the E-W, NW-SE, and NE-SW directions. Utilizing the SPI techniques, the depth of occurrence of the causative bodies was found to be below 250.3 m. The crustal magnetic field values were utilized to generate the two-dimensional Fourier transforms, from which the radial spectrum was recovered. The depth values were calculated using the slopes of the sixteen sections' spectrum energy against frequency graph. According to the findings, the study area's deeper depth lies between 1.10 and 1.69 km, while its shallower depth lies between 0.39 and 0.90 km. The study finds that alteration zones may harbour minerals and that the thickness of the sedimentary layer may not be sufficiently buoyant to support the build-up of hydrocarbons but will enhance the possibility of other mineralization.
- Published
- 2024
- Full Text
- View/download PDF
8. Modified symbiotic organisms search optimization for automatic construction of convolutional neural network architectures
- Author
-
Fatsuma Jauro, Abdulsalam Ya'u Gital, Usman Ali Abdullahi, Aminu Onimisi Abdulsalami, Mohammed Abdullahi, Adamu Abubakar Ibrahim, and Haruna Chiroma
- Subjects
Convolutional neural network ,Neural architecture search ,Symbiotic organism search ,And deep learning ,Cybernetics ,Q300-390 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Convolutional Neural Networks (ConvNets) have demonstrated impressive capabilities in image classification; however, the manual creation of these models is a labor-intensive and time-consuming endeavor due to their inherent complexity. This research introduces an innovative approach to Convolutional Neural Network (ConvNet) architecture generation through the utilization of the Symbiotic Organism Search ConvNet (SOS_ConvNet) algorithm. Leveraging the Symbiotic Organism Search optimization technique, SOS_ConvNet evolves ConvNet architectures tailored for diverse image classification tasks. The algorithm's distinctive feature lies in its ability to perform non-numeric computations, rendering it adaptable to intricate deep learning problems. To assess the effectiveness of SOS_ConvNet, experiments were conducted on diverse datasets, including MNIST, Fashion-MNIST, CIFAR-10, and the Breast Cancer dataset. Comparative analysis against existing models showcased the superior performance of SOS_ConvNet in terms of accuracy, error rate, and parameter efficiency. Notably, on the MNIST dataset, SOS_ConvNet achieved an impressive 0.31 % error rate, while on Fashion-MNIST, it demonstrated a competitive 6.7 % error rate, coupled with unparalleled parameter efficiency of 0.24 million parameters. The model excelled on CIFAR-10 and BreakHis datasets, yielding accuracies of 82.78 % and 89.12 %, respectively. Remarkably, the algorithm achieves remarkable accuracy while maintaining moderate model size.
- Published
- 2024
- Full Text
- View/download PDF
9. Relaxed viscosity-type iterative methods with application to compressed sensing
- Author
-
Deepho, Jitsupa, Adamu, Abubakar, Ibrahim, Abdulkarim Hassan, and Abubakar, Auwal Bala
- Published
- 2023
- Full Text
- View/download PDF
10. Inertial Halpern-type methods for variational inequality with application to medical image recovery
- Author
-
Adam, Aisha Aminu, Adamu, Abubakar, Ibrahim, Abdulkarim Hassan, and Uzun Ozsahin, Dilber
- Published
- 2024
- Full Text
- View/download PDF
11. Modified symbiotic organisms search optimization for automatic construction of convolutional neural network architectures
- Author
-
Jauro, Fatsuma, Ya'u Gital, Abdulsalam, Abdullahi, Usman Ali, Abdulsalami, Aminu Onimisi, Abdullahi, Mohammed, Ibrahim, Adamu Abubakar, and Chiroma, Haruna
- Published
- 2024
- Full Text
- View/download PDF
12. A Tseng-type algorithm for approximating zeros of monotone inclusion and J-fixed-point problems with applications
- Author
-
Adamu, Abubakar, Kumam, Poom, Kitkuan, Duangkamon, and Padcharoen, Anantachai
- Published
- 2023
- Full Text
- View/download PDF
13. Relaxed modified Tseng algorithm for solving variational inclusion problems in real Banach spaces with applications
- Author
-
Adamu, Abubakar, Kumam, Poom, Kitkuan, Duangkamon, and Padcharoen, Anantachai
- Published
- 2023
14. Geotechnical Stability Analysis of the Tiga Dam, Nigeria on the Assessment of Downstream Soil Properties, Erosion Risk, and Seasonal Expansion
- Author
-
Ibrahim Haruna Umar, Adamu Abubakar, Ibrahim Mu’azzam Salisu, Hang Lin, and Jubril Izge Hassan
- Subjects
geotechnical properties ,earth dam ,soil erodibility ,soil expansion rate ,dam stability ,RUSLE ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
The Tiga Dam, a primary hydraulic structure in northern Nigeria, is subjected to intense hydrological stress during the rainy season, posing potential risks to its structural integrity. This study investigates the geotechnical properties and stability of the Tiga Dam in Kano State, Nigeria. Twelve soil samples from the downstream area were analyzed for specific gravity, grain size distribution, Atterberg limits, compaction parameters, permeability, and shear strength. The dam’s stability was assessed using Plaxis 2D under various reservoir conditions. Soil erodibility was evaluated using the Revised Universal Soil Loss Equation (RUSLE), and a linear regression model with noise was developed to predict soil expansion rates. The results showed heterogeneous soil properties, with specific gravity ranging from 2.11 to 2.63 and permeability from 3.40 × 10−9 to 1.49 × 10−7 m/s. Stability analysis revealed factors of safety of 1.322, 1.006, 1.002, and 1.147 for high reservoir, rapid drawdown, slow drawdown, and low reservoir conditions, respectively. The RUSLE K factor ranged from 0.055 to 0.145, indicating low to moderate soil erodibility. The expansion rate model demonstrated high accuracy (R2 = 0.989) in predicting seasonal and long-term soil expansion trends, with peak rates increasing from 16.94 mm/month in 2010–2013 to 19.45 mm/month in 2017–2020. This comprehensive analysis provides crucial insights into the Tiga Dam’s geotechnical behavior, highlighting potential vulnerabilities and the need for targeted management strategies to ensure long-term stability and safety.
- Published
- 2024
- Full Text
- View/download PDF
15. جهود معلمي اللغة العربية لدفع رغبة الطالبات في تعليم اللغة العربية
- Author
-
Juwairiyah Siregar and Adamu Abubakar Muhammad
- Subjects
arabic teacher ,student learning interest ,arabic learning. ,Education (General) ,L7-991 ,Theory and practice of education ,LB5-3640 ,Language and Literature - Abstract
يهدف هذا البحث إلى وصف صور رغبة الطالبات، ووصف جهود معلمي اللغة العربية لدفع رغبة الطالبات، ثم الصعوبات التي يواجهها المعلم لدفع رغبة الطالبات في تعليم اللغة العربية. المنهج المعتمد هو الوصفي الكيفي. والنتائج هي أن الطالبات يرغبن بشدة في تعلم اللغة العربية، وجهود معلمي اللغة العربية لدفع رغبة الطالبات هي جعلهن يعتقدن أن الدرس مهم في حياتهن، وتشجيعهن ليصبحن متحمسات لاشتراك التعليم، تفهيم الطالبات مفهوم الدرس، إقامة علاقات وثيقة مع الطالبات، استخدام الطرق المتنوعة في عملية تعليم اللغة العربية. أما الصعوبات التي يواجهها معلمو اللغة العربية لتحفيز الطالبات هي وجودهن بكثرة في كل الفصول وبعض الطالبات لا يتوفرن على الكتاب المقرر. فقد وُجد أن المعلم حاول لدفع رغبة في تعليم اللغة العربية بمحاولات عديدة وجيدة. This study aimed to describe the interest of students, teachers' efforts to increase student interest, and the difficulties faced by teachers in increasing student interest in learning arabic. The research method used was descriptive qualitative. The results showed that the students' interest in learning Arabic was high. Some of the efforts of arabic teachers to increase students' interest in learning were to make students believe that arabic lessons are important in their lives, to encourage students to participate in learning, to make students understand the subject, to establish good relations with students, the use of various methods in the learning process. While the difficulties faced by teachers in increasing students' interest in learning arabic were the students' laziness to learn, the large number of students in each class, some students did not have textbooks that's why students did not pay attention to the lesson. It was found that the teacher had tried to increase students’ interest in learning Arabic with various good efforts.
- Published
- 2023
- Full Text
- View/download PDF
16. Social Network Analysis: Identification of Communication and Information Dissemination (Case Study of Holywings)
- Author
-
Umar Aditiawarman, Mega Lumbia, Teddy Mantoro, and Adamu Abubakar Ibrahim
- Subjects
cluster analysis ,sentiment analysis ,social media ,social network analysis ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Social media especially Twitter has been used by corporation or organization as an effective tool to interact and communicate with the consumers. Holywings is one of the popular restaurants in Indonesia that use social media as a tool to promote and disseminate information regarding their products and services. However, one of their promotional items has gone viral and invited public protests which turned into a trending topic on Twitter for a couple of weeks. Holywings allegedly improperly promoted their products by using the most honorable names, “Muhammad” and “Maria”. Social network analysis of Twitter data is conducted to identify and examine information circulating among the users, which leads to wider public attention and law enforcement. In this study, we focused on the conversation about Holywings on Twitter from 24 June to 31 July 2022. The analysis was carried out using Python to retrieve data and Gephi software to visualize the interactions and the intensity of the network group in viewing the spread of information. The findings reveal the centrality account that caused the news to go viral are the CNN Indonesia (@CNNIndonesia) news media account and Haris Pertama (@knpiharis), with a centrality of 0.161 and 0.282, respectively. There are also 121 groups involved in the conversation with modularity of 0.821.
- Published
- 2023
- Full Text
- View/download PDF
17. A FEMALE LEADERS IN THE PERSPECTIVE OF ISLAMIC LAW AND LEGAL REGULATIONS
- Author
-
Edy Sutrisno, Ahmad Fanani, Marsidi Marsidi, and Adamu Abubakar Muhammad
- Subjects
penghulu ,women ,islamic ,law ,Islamic law ,KBP1-4860 - Abstract
The leader is a profession with the functions and duties of representing the government in recording and supervising marriages. Then how women become penghulu seen from Islamic law and legislation. This writing uses library research method with a qualitative descriptive approach. The results of this discussion state; First, from a juridical-normative perspective, if women are appointed as penghulu, their position will be questioned if they carry out their duties as guardian judges, which in fiqh must be a man. Second, it is considered that there are still problems in entering the public sphere for women, such as supervising and recording marriages in the mosque while she is in an impure condition, and attending marriage contracts which are carried out outside the office and outside working hours. Then in PMA Number 20 of 2019 concerning Marriage Registration, it has been explained that the leader can be held by both men and women. Likewise, in the Minister of Administrative Affairs Regulation Number 9 of 2019 concerning the Functional Position of Penghulu, it also does not require that the Penghulu must be held by a male Penghulu.
- Published
- 2023
18. Characterisation of grapevine canopy leaf area and inter-row management using Sentinel-2 time series
- Author
-
Mukhtar Adamu Abubakar, André Chanzy, Fabrice Flamain, and Dominique Courault
- Subjects
remote sensing ,Sentinel-2 ,leaf area index ,grapevine ,characterization ,canopy ,Agriculture ,Botany ,QK1-989 - Abstract
Accurate data on crop canopy are among the prerequisites for hydrological modelling, environmental assessment, and irrigation management. In this regard, our study concentrated on an in-depth analysis of optical satellite data of Sentinel-2 (S2) time series of the leaf area index (LAI) to characterise canopy development and inter-row management of grapevine fields. Field visits were conducted in the Ouveze-Ventoux area, South Eastern France, for two years (2021 and 2022) to monitor phenology, canopy development, and inter-row management of eleven selected grapevine fields. Regarding the S2-LAI data, the annual dynamic of a typical grapevine canopy leaf area was similar to a double logistic curve. Therefore, an analytic model was adopted to represent the grapevine canopy contribution to the S2-LAI. Part of the parameters of the analytic model were calibrated from the actual grapevine canopy dynamics timing observation from the field visits, while the others were inferred at the field level from the S2-LAI time series. The background signal was generated by directly subtracting the simulated canopy from the S2 LAI time series. Rainfall data were examined to see the possible explanations behind variations in the inter-row grass development. From the background signals, we could group the inter-row management into three classes: grassed, partially grassed, and tilled, which corroborated our findings on the field. To consider the possibility of avoiding field visits, the model was recalibrated on a grapevine field with a clear canopy signal and applied to two fields with different inter-row management. The result showed slight differences among the inter-row signals, which did not prevent the identification of inter-row management, thus indicating that field visits might not be mandatory.
- Published
- 2023
- Full Text
- View/download PDF
19. Camel milk ameliorates diabetes in pigs by preventing oxidative stress, inflammation and enhancing beta cell function
- Author
-
Rilwan, Hadiza Bello, Adebisi, Sunday Samuel, Timbuak, James Abrak, Oladele, Sunday Blessing, Muhammad, Aliyu, Sadeeq, Adamu Abubakar, and Makena, Wusa
- Published
- 2022
- Full Text
- View/download PDF
20. Attacks Notification of Differentiated Services Code Point (DSCP) Values Modifications
- Author
-
Ala Abdulsalam Alarood, Adamu Abubakar Ibrahim, and Faisal S. Alsubaei
- Subjects
Assured forwarding ,class selector ,differentiated services ,expedited forwarding ,vector space ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
The DSCP is an integral component within the Internet Protocol (IP) header of a packet, serving the purpose of categorizing and administering network traffic, as well as facilitating the provision of Quality of Service (QoS) on IP networks. In the context of network communication, it is feasible for an adversary to transmit packets with a DSCP value of “x,” which represents a high priority. This action aims to prioritize the specified packet over other network traffic packets without triggering any notifications during the transmission session. It is possible to use identical DSCP values for both offensive and defensive purposes. This study therefore proposed a method for generating attack notifications in response to changes in DSCP values by using binary vectors to represent entries that detect attacks and those that do not. The method returns a list of Boolean values, each of which indicates whether or not the corresponding packet was classified as an attack. The study employed an experimental research methodology to generate transmission scenarios in which an attacker would attempt to transmit packets with a malicious DSCP value so that they would be prioritized over other traffic. A function was developed to detect deviation from normal and modification values involving DSCP value operations of normal traffic and generate alert. The finding of the experimental analysis indicates the vector, represents normal traffic because it does not have a DSCP value associated with an attack. The vectors representing spoofed, Assured Forwarding (AF), Class Selector (CS) and Expedited Forwarding (EF) respectively and generate an alert based on their values. This has contributed in detecting when an attacker tries to send packets with modified DSCP value in order to get them prioritized over the other packet on the normal traffic.
- Published
- 2023
- Full Text
- View/download PDF
21. Common Practices in Orphanages: A Case Study of Bauchi Nigeria
- Author
-
Adamu Abubakar Muhammad
- Subjects
practice ,orphanages ,bauchi ,nigeria ,Architecture ,NA1-9428 - Abstract
Orphanages worldwide are responsible for providing the support and resources for a whole development in the lives of orphans and vulnerable children. This research discusses the availability and ways of running orphanages in Bauchi State. Data are mainly generated through interview with orphanage directors across the study area and review of related literatures. The findings of the research offer an important clarity on the most common practices that orphanage houses use to care for orphans. It revealed that Among the main challenges in common practice of orphanages in Bauchi State includes; education, health, finances, and the staffing structure. It revealed that the status of extant practices in orphanages in the study area needs to be upgraded, the structure needs to be formalized and the directors need to educate. The future studies should follow these findings to measure the quality and effectiveness of the common practices in Bauchi orphanages as well as Nigeria at large.
- Published
- 2022
22. Terrorism as a Threat for Economic Development in Nigeria
- Author
-
Adamu Abubakar Muhammad
- Subjects
terrorism ,threat ,economy ,development ,region ,northern nigeria ,Architecture ,NA1-9428 - Abstract
Islam condemn terrorism and rejects all its kinds, it legalized trade and investment as a way of earning halal. The activities of Boko Haram sect become a major challenge to the Nigerian government in recent times; it had led to loss of lives and properties in the country especially in Northern Nigeria. Some of these activities include bombings, suicide, random shooting, burning of police stations, government offices and places of worship, kidnapping of school girls and innocent people, raping, armed robbery, political crises, murder, destruction of communication facilities alongside the attacks carried out by Herdsmen on some communities in the northern part of the country. Many lives and properties have been lost and a large number of citizens rendered homeless, many women are now widows, children become orphans with no hope of the future. Government had made uptight efforts to tackle these challenges posed by terrorism in the region and put an end to it but the rate of insurgency and insecurity is still disquieting. This work is therefore investigated the challenges of terrorism as a major threat on economic development in Nigeria. The scope of this study is limited on impact of terrorism on economic development in Northern Nigeria between 2000-2017. Data used was sourced from interview with related people, newspapers and related journal articles by using historical and analytical methods, the results showed that terrorism impacts negatively on economic development in Northern Nigeria, it has made government to divert resources meant for economic development purposes to security votes, expenditure made by government on security matters had positively impacted on region’s economic development. It is therefore recommended that government must be pre-emptive in dealing with security threats in view of managing security challenges. The government should accelerate the rapidity of economic growth by creating an economy with a relevant economic and physical infrastructure to support business and industrial growth, the government should remain committed and declare war on terrorism and seek assistance/advice from international communities who have in the past faced this kind of challenge and were able to tackle it, grazing grounds and ranches should be built in the region for herdsmen who rear cattle, relevant security agencies should be well train and liaised with international security experts for gaining modern tactics on fighting terrorism, religious leaders, governments, business associations and NGOs should increase their efforts on enlightment, awareness, education and sensitization campaign on the effects of terrorism on social and economic development in the region.
- Published
- 2022
23. A Literature Review of Salam Contract for Agricultural Development in Gombe State, Nigeria
- Author
-
Adamu Abubakar Muhammad, Ibrahim Dahiru Idriss, and Ikilima Abubakar Sheriff
- Subjects
agriculture, salam contract, economic development, farmers, islamic finance ,Islam ,BP1-253 - Abstract
Agriculture is essential to a country's economic development as seen in many advanced and developed nations who have valued and viewed agriculture as a catalyst for national prosperity and major source of food security. Bay’ Salam can be directly translated to ‘a forward sale or contract whereby a buyer purchases specific commodities that will be delivered by a seller in a future date which is more relevant to agricultural development. Although little has been accomplished in Nigeria, successive governments have placed a strong emphasis on the need to give the agricultural sector top priority to achieve both local and export food sufficiency. It's interesting to note that Gombe is recognized as one of the Nigerian states that have prioritized food and cash crop production as a vital endeavor that can improve both the state's and the nation's fortunes. However, agriculture must be integrated into modern society through Salam contract as suggested by this research to simplify agricultural endeavors, have a positive economic impact on the lives of farmers and rural communities, and to meet its demands and overcome its obstacles in Gombe state, Nigeria. The work used a qualitative research method that includes interview with relevant people on the subject matter and literature review to gather data. The study suggests that, if adopted, managed, and effectively used, the opportunities provided by Salam contract will strengthen the agricultural sector, lessen the frequent conflicts between farmers and herders, and ensure food security in Gombe State, Nigeria
- Published
- 2022
- Full Text
- View/download PDF
24. Subsurface Structural Characterization as Deduced from High-Resolution Aeromagnetic Data over The Confluence Zones in Central, Nigeria
- Author
-
Emmanuel Agada Anthony, Othniel Kamfani Likkason, Abubakar Sadiq Maigari, Sani Ali, and Adamu Abubakar
- Subjects
Aeromagnetic data ,Depth to basement ,Edge detection techniques ,Niger-Benue river confluence zone ,Subsurface structures ,Meteorology. Climatology ,QC851-999 ,Geology ,QE1-996.5 ,Environmental sciences ,GE1-350 - Abstract
This study aimed to delineate the intrusion body that controls the structural setting and formation around the river Niger-Benue confluence zone with particular attention to its solid mineral potentials, this is achieved in mapping subsurface structural features through the analysis of recent high-resolution aeromagnetic (HRAM) data-sets with the purpose of examining their effects on geological structures that characterize the confluence zones from the study area. To obtain the necessary reduction in geomagnetic variation, measurements of regional gradients and time variation were used. After applying the reduction to the magnetic equator (RTE) to the corrected magnetic data that was obtained from the Nigerian Geological Survey Agency, NGSA, it was possible to determine the regional expansions of subsurface structural units for both qualitative and quantitative interpretations. In addition, the edge detection method is used to depict the structures and buried subsurface anomalies. Different handling processes were applied to the (HRAM) data, such as local wavenumber (SPI), power spectrum analysis, and Euler and Werner deconvolution analysis. The RTE magnetic anomaly caused by local structures and anomalous body delineated six sub-basins with low amplitude response, which agrees with the total gradient anomaly (analytic signal) and tilt of angle derivative that clearly outlined and characterize edges of lithostratigraphic of Niger-Benue river confluence zones. The sub-basin delineated are the southern Bida basin and northern Anambra basin. The source parameter imagings as well as the Euler and Werner deconvolution were used to delineate major subsurface structures and determine their source depth. Results showed that the area was affected by different lineament trending NE-SW, E-W, and S-E trends. Directional analysis indicates that the dominant trend agrees with the regional fault orientations. The estimated depth to the top of the lineaments on average varies from 0.3 km to 4.6 km and it is relatively deeper in the basins compared to the surrounding areas giving clues to the amount of sediment infill. A 2D forward model showed a sedimentary thickness ranging from 1 to 7 km, and this estimated depth is consistent with the average of 3.5 km proposed by previous researchers.
- Published
- 2023
- Full Text
- View/download PDF
25. Approximation method for monotone inclusion problems in real Banach spaces with applications
- Author
-
Adamu, Abubakar, Kitkuan, Duangkamon, Kumam, Poom, Padcharoen, Anantachai, and Seangwattana, Thidaporn
- Published
- 2022
- Full Text
- View/download PDF
26. An inertial Halpern-type algorithm involving monotone operators on real Banach spaces with application to image recovery problems
- Author
-
Muangchoo, Kanikar, Adamu, Abubakar, Ibrahim, Abdulkarim Hassan, and Abubakar, Auwal Bala
- Published
- 2022
- Full Text
- View/download PDF
27. The Effect Covid-19 and Sectoral Financing on Islamic Bank Profitability in Indonesia
- Author
-
Mohammad Zen Nasrudin Fajri, Adamu Abubakar Muhammad, Khoirul Umam, Lila Prisilia Putri, and Mohammad Ali Ramadhan
- Subjects
covid-19 ,profitability ,islamic bank ,business sector ,ardl ,Social Sciences - Abstract
COVID-19 pandemic has created a new economic crisis worldwide. Islamic Bank which was reportedly resilient against the financial crisis is expected to be stable in this period. Apart from that, Islamic Bank has channeled financing fund to various business sectors with different portions leading to a question whether they have different impact on Bank. This paper aims to discover the impact of COVID-19 pandemic and financing to business sectors on Islamic Bank profitability. An ARDL approach is employed for analysis. The result of the study shows that COVID-19 pandemic has a negative relationship with Islamic Bank profitability in the long-run. Furthermore, financing to transportation, warehousing and communication sectors is associated with higher profitability in the short-run. On the other hand, financing to wholesale and retail trade sectors hurt Islamic Bank profitability. Based on this result, it is suggested that Government impose some measures in stabilizing Islamic Bank’s performance during COVID-19 pandemic. In addition, Islamic Banks are expected to make adjustment on financing to business sectors ratio accordingly in order to maintain the profitability of Islamic Bank.
- Published
- 2022
- Full Text
- View/download PDF
28. Approximation of solutions of split equality fixed point problems with applications
- Author
-
Adamu, Abubakar and Adam, Aisha A.
- Published
- 2021
29. Threats From Unintentional Insiders: An Assessment of an Organization’s Readiness Using Machine Learning
- Author
-
M. M. Hafizur Rahman, Mohammed Abdulaziz Al Naeem, and Adamu Abubakar
- Subjects
Unintentional insiders ,threats ,network ,attacks ,data breaches ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Today’s organisations are facing a number of challenges, one of the most significant of which is ensuring the safety of their digital data. This is as a result of the fact that they are frequently faced with internal and external threats that can put the data they have been entrusted with in jeopardy of being compromised. As a result of this, this study investigates the dimension of threats associated to unintentional internal user of an organisation and utilises NARX to model and test a detection scheme associated to the menace. In addition, this study aims to provide a better understanding of the current state of the threat landscape. The data adopted for this research is primarily a “user activity logs” dataset from CERT (release version r4.2). From the data, the study conceptualized “Access”, “Motivation”, and “Action” to be the key dimensions influencing “insider”, whereas “Intent”, “+Action”, “Method”, and “knowledge” are the key dimension influencing “threats”. Experimental analyses conducted by NARX within several numbers of partitions of the data point to a good detection capacity, with the greatest value of R2 coming in at 0.97. This indicates that NARX was able to detect the crucial dimension that was formulated for by the research to be the detections parameter of an inadvertent insider threat when operating under the best partition. In light of these findings, organisations can use the proposed approach to assess their preparedness for Insider attacks.
- Published
- 2022
- Full Text
- View/download PDF
30. A High Static Performance Hierarchical Three-Dimensional Shifted Completely Connected Network
- Author
-
Mohammed N. M. Ali, M. M. Hafizur Rahman, Adamu Abubakar Ibrahim, Mohammed Al-Naeem, and Eklas Hossain
- Subjects
Shifted completely connected network (SCCN) ,network-on-chip (NOC) ,interconnection networks ,hierarchical interconnection networks (HINs) ,static network performance ,massively parallel computer (MPC) systems ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In recent years, there has been a significant shift toward the adoption of the “Internet of Things (IoT)” era, in which vast amounts of data are collected and processed, and Artificial intelligence (AI) is used to make critical choices. When acting in real-time, it is vital to use devices with a lot of computing power. MPC (Massively Parallel Computer) Two-dimensional (2D) design systems are the most powerful computers available. Unfortunately, they can’t meet the need for the advanced computing operation required by many applications. As a result, it is critical to invest in developing high operational capacity systems that will meet the current computational power consumption demands. This paper developed the architecture of the two-dimensional Shifted Completely Connected Network (2D-SCCN) and proposed a three-dimensional (3D) network to achieve greater capacity and performance. The shortest path protocol on three-dimensional Shifted Completely Connected Network (3D- SCCN) was established, tested by computer simulator, and compared based on “shortest diameter”, “shortest average distance”, “lowest cost”, “moderate bisection width”, and “high arc-connectivity” among other characteristics. As a result, “3D-SCCN” was the most efficient method of transmitting a message between two nodes, increasing the system’s real-time response capability.
- Published
- 2022
- Full Text
- View/download PDF
31. ZIF-90 nanoparticles modified with a homing peptide for targeted delivery of cisplatin
- Author
-
Adamu Abubakar, Emilia Abdulmalek, Wan Norhamidah Wan Ibrahim, Kyle E. Cordova, and Mohd Basyaruddin Abdul Rahman
- Subjects
nanocarrier (nanoparticle) ,zeolitic imidalozate framework ,post-synthetic modification (PSM) ,RGD ,peptide ,targeted delivery ,Chemistry ,QD1-999 - Abstract
To improve the selective delivery of cisplatin (Cis) to cancer cells, we report and establish the significance of active, targeting drug delivery nanosystems for efficient treatment of lung cancer. Specifically, pH-responsive nano-sized zeolitic imidazolate framework (nZIF-90) was synthesized, post-synthetically modified with an Arg-Gly-Asp peptide motif (RGD@nZIF-90), a known cancer cell homing peptide, and loaded with a large amount of Cis (RGD@Cis⊂nZIF-90). RGD@Cis⊂nZIF-90 was shown to be highly stable under physiological conditions (pH = 7.4) with framework dissociation occurring under slightly acidic conditions (pH = 5.0)–conditions relevant to tumor cells–from which 90% of the encapsulated Cis was released in a sustained manner. In vitro assays demonstrated that RGD@Cis⊂nZIF-90 achieved significantly better cytotoxicity (65% at 6.25 μg ml−1) and selectivity (selectivity index = 4.18 after 48 h of treatment) against adenocarcinoma alveolar epithelial cancer cells (A549) when compared with the unmodified Cis⊂nZIF-90 (22%). Cellular uptake using A549 cells indicated that RGD@Cis⊂nZIF-90 was rapidly internalized leading to significant cell death. After successfully realizing this nanocarrier system, we demonstrated its efficacy in transporting and delivering Cis to cancer cells.
- Published
- 2022
- Full Text
- View/download PDF
32. A three-term Polak-Ribière-Polyak derivative-free method and its application to image restoration
- Author
-
Ibrahim, Abdulkarim Hassan, Deepho, Jitsupa, Bala Abubakar, Auwal, and Adamu, Abubakar
- Published
- 2021
- Full Text
- View/download PDF
33. Advances in the use of aerobic sequencing batch reactors for biological wastewater treatment
- Author
-
Rasheed, Adamu Abubakar
- Subjects
628.3 ,Water reuse ,Sewage ,Aerated package treatment systems - Abstract
The overall aim of this research was to contribute to the optimisation of aerobic wastewater treatment processes in sequencing batch reactors, by investigating the performance of the process with real and model wastewaters in order to achieve the highest possible reduction of influent COD with the minimum reactor volume and oxygen consumption. Six industrial wastewaters from the food and drink companies were treated in lab-scale aerobic sequencing batch reactors (SBRs) inoculated with soil and monitored for COD and total suspended solids (TSS) removal. The results showed high COD removal efficiencies for all the wastewaters, in the range of 64-95 %. Extended aeration tests were carried out on the reactor effluents and the results indicated that the residual soluble COD was not further biodegradable. This indicates that the soluble BOD removal in the reactors was virtually 100 %. The biodegradation efficiency was investigated over two values of the solids retention time (SRT) and the performance of the reactors was essentially unaffected by the SRT (in the range of 7-18 days considered in this study). This means that very good COD removal can be achieved at relatively lower SRT, with potential savings in capital and operating costs. The removal of TSS for the wastewaters was not satisfactory, largely due to the low food to microorganism (F/M) ratios (0.13-0.29 kg COD/kg biomass.day) in the reactors. Three batch tests at different initial substrate to biomass (So/Xo) ratios were carried out on each of the two industrial wastewaters for kinetic characterisation of the wastewaters. Oxygen uptake rate (OUR) was measured during the tests and the OUR profiles were used for the estimation of the kinetic parameters using a mathematical model consisting of substrate hydrolysis, biomass growth and endogenous metabolism. The results showed large variations with regards to the values of the parameters for each wastewater due to day-to-day variability in the biomass's response to substrate utilisation. For the two industrial wastewaters, the hydrolysis rate constant (kh) and half saturation constant for slowly biodegradable substrate (KX) were found to be in the range of 2.21-14.8 kg COD/kg biomass.day and 0.006-0.45 kg COD/kg biomass respectively. The maximum growth rate (μmax) and the half saturation rate constant for readily biodegradable substrates (KS) ranged between 1.21-7.3 day-1 and 0.004-0.89 kg COD/m3 respectively. The biomass growth yield (YX/S) and the endogenous metabolism coefficient (b) were found to be 0.3-0.57 kg biomass/kg COD and 0.001-0.41 day -1 respectively. The hydraulic retention time (HRT) and SRT were optimised in order to minimise the SBR volume and maximise the organic loading rate (OLR) of the SBR process. Two model wastewaters, glucose and ethanol, were used in the study. An experiment of eleven different SBR runs (HRT in the range of 0.25-4 days and SRT of 1-65.3 days) was carried on the glucose wastewater. Nine different SBR runs were carried out on ethanol wastewater (HRT in the range of 0.5-4 days and SRT of 1-73.6 days). The minimum HRT and SRT values for the successful operation for glucose wastewater treatment were 0.25 days and 3.1 days respectively while the minimum HRT and SRT for ethanol were 0.5 days and 4.9 days respectively. The highest corresponding OLR values from the minimum HRT and SRT which gave satisfactory process performance were 4.28 g COD/l.day and 4.14 g COD/l.day for glucose and ethanol wastewaters respectively, which are among the highest OLRs reported in the literature for aerobic conventional dispersed-growth processes. The calculated oxygen consumption and biomass production were found to depend on the SRT as well as the OLR, where in general, oxygen consumption increased while biomass production decreased at higher OLR. Batch tests were also carried out on the two model wastewaters for kinetic characterisation. The kinetic parameters for glucose wastewater were: 1.07-4.79 day -1 for μmax, 0.24-0.45 kg COD/m3 for KS, 0.04-0.1 day-1 and 0.47-0.6 kg biomass/kg COD for b and YX/S respectively. For ethanol wastewater, the kinetic parameters were: 0.99-2.3 day -1 for μmax, 0.001-0.04 kg COD/m3 for KS, 0.05-0.2 day-1 and 0.38-0.51 kg biomass/kg COD for b and YX/S respectively. A new mathematical model and procedure to calculate the periodic steady state of the SBR using a kinetic model of the biological process and values of the kinetic parameters was developed. This new procedure allows the direct calculation of the steady state profiles of biomass and substrate in the SBR without calculating the dynamics of the system from start up to steady state. The numerical accuracy of the procedure was discussed and the model was applied to show the effect of the operating parameters (SRT, HRT, length of the phases and number of cycles) on the steady state performance in terms of biomass and substrate concentrations. It was also shown how the model can be used for various applications like: optimisation of operating parameters for a minimum reactor volume; simulation of the competition between filamentous and floc-forming bacteria for bulking control; and calculation of the minimum volumetric mass-transfer coefficient required to maintain a desired oxygen concentration. In the end, the periodic steady state of the SBR was simulated for the industrial and model wastewaters at various values of the operating conditions (e.g. HRT, SRT, number of cycles) using the developed SBR model with values of kinetic parameters obtained from the various batch tests. The predicted model performance in terms of effluent quality and biomass concentration was compared with experimental results achieved during the treatment of the wastewaters. The simulation gave very good prediction of the extent of substrate removal for all the wastewaters. However, the prediction was not very accurate for biomass concentration. The study indicated that a good model prediction in terms of biomass production is strongly dependent on the values of the kinetic parameters especially b and YX/S.
- Published
- 2017
34. Production of biobutanol using Clostridia Spp through novel ABE continuous fermentation of selected waste streams and industrial by-products
- Author
-
Etteh, Chinedu Casmir, Ibiyeye, Abdulrazaq Olalekan, Jelani, Ftepti Benson, Rasheed, Adamu Abubakar, Ette, Ogechukwu Jennifer, and Victor, Igwe
- Published
- 2021
- Full Text
- View/download PDF
35. Delineation of Orchard, Vineyard, and Olive Trees Based on Phenology Metrics Derived from Time Series of Sentinel-2
- Author
-
Mukhtar Adamu Abubakar, André Chanzy, Fabrice Flamain, Guillaume Pouget, and Dominique Courault
- Subjects
woody crop classification ,Sentinel-2 ,random forest ,crop phenology ,olive ,orchard ,Science - Abstract
This study aimed to propose an accurate and cost-effective analytical approach for the delineation of fruit trees in orchards, vineyards, and olive groves in Southern France, considering two locations. A classification based on phenology metrics (PM) derived from the Sentinel-2 time series was developed to perform the classification. The PM were computed by fitting a double logistic model on temporal profiles of vegetation indices to delineate orchard and vineyard classes. The generated PM were introduced into a random forest (RF) algorithm for classification. The method was tested on different vegetation indices, with the best results obtained with the leaf area index. To delineate the olive class, the temporal features of the green chlorophyll vegetation index were found to be the most appropriate. Obtained overall accuracies ranged from 89–96% and a Kappa of 0.86–0.95 (2016–2021), respectively. These accuracies are much better than applying the RF algorithm to the LAI time series, which led to a Kappa ranging between 0.3 and 0.52 and demonstrates the interest in using phenological traits rather than the raw time series of the remote sensing data. The method can be well reproduced from one year to another. This is an interesting feature to reduce the burden of collecting ground-truth information. If the method is generic, it needs to be calibrated in given areas as soon as a phenology shift is expected.
- Published
- 2023
- Full Text
- View/download PDF
36. Geophysical Investigation of a Fault Zone from Aeromagnetic Data over the Ageva Area of Okene Kogi State, Nigeria
- Author
-
Ahmed A Lawal, Adamu Abubakar, and Avazi O Victor
- Subjects
regional-residual separation ,second vertical derivative ,analytic signal ,werner deconvolution ,euler deconvolution ,contact - dyke ,Physics ,QC1-999 - Abstract
High-resolution aeromagnetic data over a part of Ageva fault zone in Nigeria have been analyzed with a view to estimate sedimentary thicknesses within the studied area. The data set of this study area, was subjected to various corrections and interpretation techniques. Regional residual correction was done and the noise level of the data was reduced via upward continuation to a height of 250 m thereby enhancing the reliability of the results obtained. Qualitative interpretation techniques which include: Second Vertical Derivative, Analytic Signal, Tilt derivative were used to delineate the trending pattern of the anomalies in the study area which are in the E-W, NE-SW, NW-SE, and N-S directions. The result suggests that fault zone within Ageva and Owo may be mineralized and also that the faults within Ageva and Ibilo extend by a quarter of their exposed length. The Werner solutions revealed that inferred faults within Owo and Ibilo may have relatively low susceptibilities as compared with others in the study area and the range of the depth extent of linear features is 401.5 m – 982.5 m.
- Published
- 2021
- Full Text
- View/download PDF
37. Paleomagnetic Susceptibility Distribution and Geochemical Analysis from the Eastern Part of Kalambaina Formation Sokoto Basin North West, Nigeria
- Author
-
Adamu Abubakar, Faruk Usman, and Musa M Zayyanu
- Subjects
paleomagnetic ,susceptibility measurement ,geochemical analysis ,soil samples ,kalambaina formation ,Physics ,QC1-999 - Abstract
Magnetic measurements, mineralogical and geochemical studies were carried out on surface soil samples in order to delineate susceptibility distribution and to find possible relationships based on paleomagnetic implications in some part of Kalambaina Area of Sokoto Northwestern Nigeria. Geomorphologically, this area is generally gentle, with occasionally tabular, capped by resistance laterites. Elevation generally decreases towards the northwest around the Nigeria - Niger Republic boarder with an average elevation of about 215 m above mean sea level. A total of 90 sample were measured at random with DSM-10 susceptibility Kappa metre as well 20 core drilling samples were collected for further XRF geochemical analysis. Mass specific susceptibility value ranges between 11.2 × 10 ^-6 and 1.4 − 8.2 × 10 ^-6 and magnetic remanence at 1 T values range between 10 × 10 ^-6 and 0.5 − 9.0 × 10 ^-6 as well as 0.5 − 7.4 × 10 ^-6. Chemical analysis by Xray Fluorescence analysis revealed the presence concentration of various elements with their percentage composition (%) and the percentage composition of calcium carbonate (CaCO3) content between > 40% and < 70%, > 70% and < 80%, core drilling depth and overburden thickness of a limestone Layer and Overburden. Has also revealed low- and high-grade calcium carbonate CaCO3 content.
- Published
- 2021
- Full Text
- View/download PDF
38. Modelling Precipitable Water Vapour (PWV) Over Nigeria from Ground-Based GNSS
- Author
-
Bawa Swafiyudeen, Usman Ibrahim Sa'i, Adamu Bala, Aliyu Zailani Abubakar, Adamu Abubakar Musa, and Nura Shehu
- Subjects
ncep, gnss, water vapour, nignet, rainfall ,Geography. Anthropology. Recreation ,Geography (General) ,G1-922 - Abstract
Global Navigational Satellite System (GNSS) over the past and present time has shown a great potential in the retrieval of the distribution of water vapour in the atmosphere. Taking the advantage of the effect of the atmosphere on GNSS signal as they travel from the constellation of satellite to ground-based GNSS receivers such that information (water vapour content) about the atmosphere (mostly from the troposphere) can be derived is referred to as GNSS meteorology. This paper presents the spatiotemporal variability of Precipitable Water Vapour (PWV) retrieved from ground–based Global Navigation Satellite System (GNSS) stations over Nigeria for the years 2012 to 2013. In this paper, the GNSS data were processed using GAMIT (ver. 10.70). The GNSS PWV were grouped into daily and monthly averages; the variability of the daily and monthly GNSS PWV were compared and validated with the daily and monthly PWV from National Centre for Environmental Prediction (NCEP) and monthly Rainfall data for the study years respectively. The results revealed that the spatiotemporal variability of PWV across Nigeria is a function of geographic location and seasons. The result shows that there is temporal correlation between GNSS PWV, NCEP PWV and rainfall events. The research also affirms that GNSS PWV could be used to improve weather forecasting/monitoring as well as climate monitoring.
- Published
- 2021
- Full Text
- View/download PDF
39. Human Rhinosporidiosis of the Nasal Cavity: a Case Report
- Author
-
Adamu Abubakar, Abba Kabir, Amina Muhammad Abdullahi, Aliyu Mohammed Kodiya, and Ibrahim Idris
- Subjects
nasal mass ,nasal obstruction ,rhinosporidiosis ,rhinosporidium seeberi ,Medicine (General) ,R5-920 ,Dentistry ,RK1-715 - Abstract
Background: Rhinosporidiosis is a rare chronic granulomatous disease caused by Rhinosporidium seeberi. It is endemic in some parts of Asia and commonly involves the mucous membrane of the nose presenting with nasal obstruction, a nasal mass, and epistaxis. The main treatment for rhinosporidiosis remains surgical excision, although it may recur after excision. Rhinosporidiosis is a condition that clinicians should keep in mind when managing patients with nasal masses even in non-endemic areas. Case presentation: A 52-year-old housewife presented with a 9-month history of left progressive nasal obstruction and progressive enlarging left nasal growth associated with recurrent nasal bleeding and nasal discharge. She had a history of rearing animals and bathing in ponds as well as engaging in farming activities. Examination revealed a fleshy polypoid mass attached to the nasal septum by pedicle and filling the whole of the left nasal cavity covered with a mucopurulent nasal discharge with associated contact bleeding. She had endoscopic resection under local anaesthesia with cauterization of the base of the mass with a silver nitrate pencil. A histopathological diagnosis of rhinosporidiosis was made. Conclusion: Rhinosporidiosis is rare in our environment, its presentation mimics that of nasal tumours. Therefore, it should be part of the differential diagnosis; both clinicians and pathologists should have it at the back of their minds when managing patients with nasal masses even in non-endemic areas.
- Published
- 2022
- Full Text
- View/download PDF
40. Comparative Analysis Of The Prophet’s Jihad And Boko Haram Jihadist Movement
- Author
-
Ibrahim Adamu Abubakar and Tukur Bello
- Subjects
prophetic jihad: boko haram: comparison ,Law ,Social Sciences - Abstract
Different concepts of Jihad in Islam are floating in the minds of the people around the world. Some hold that Islam is a religion of terrorism; others label it with extremism. In reality, Islam preaches tolerance and moderation. Islam forbids killing/bloodshed without valid justification. Boko Haram, the Islamic radical sect from northeastern Nigeria, has been responsible since 2009 for a string of bomb attacks strategically directed at the Nigerian government, security officials, mosques, churches, civilians etc. This paper is aimed at providing a clear and true picture of “Jihad” which is in consonance with sublime teachings of the Qur’an and Sunnah of the Holy prophet Muhammad (SAW). As It will highlight the presence and future generation about the concept of Jihad in Islam and Boko Haram Jihadist as well. The paper finally ends with the comparison between the prophet Muhammad (SAW)’s Jihad and Boko Haram. This research work adopt analytical method.
- Published
- 2022
41. Structural Mapping Inferred from Gravity Data to Image the Upper Lithospheric Structures and its Hydrocarbon Implication from Gwandu Formation NW, Nigeria
- Author
-
Adamu Abubakar, Othniel Kamfani Likkason, Ahmed Sadiq Maigari, and Sani Ali
- Subjects
Enhancement filtering techniques ,Gwandu formation ,Structural mapping ,Satellite gravity data ,Sokoto Basin ,Meteorology. Climatology ,QC851-999 ,Geology ,QE1-996.5 ,Environmental sciences ,GE1-350 - Abstract
Presently a digitized composite satellite gravity data covering the Gwandu formation in Sokoto Basin were acquired and processed with a view to interpret the Bouguer anomalies as well to equally image the upper lithospheric structures beneath the Study area and its environs. The research work was aim to study the structural settings of crustal movement in the Gwandu formation. A least-square fitting polynomial surface of a third-degree order was applied in separating regional and residual gravity components from the Bouguer anomaly. The attributed low gravity sedimentary infill from the residual anomalies were tectonically trends NE -to- SW about the vicinities of Tambuwal, Goronyo, Gada and Argungu, Kolmalo and about Yauri, Koko and Jega, Kamba as well as Bagudo. Data enhancement techniques such as first vertical derivative, total horizontal derivative (THDR), analytic signal, spectral depth analysis, and the standard Euler deconvolution (SED) were applied to enhance deep-seated structures. Results from the Spectral Analysis revealed that the average thickness of the sediments varies from 1.679 km to 4.181 km, outsized enough for hydrocarbon prospect. The derivative maps revealed parallel to sub-parallel trending NW –to- SE, E -to- W fracture zones within the sedimentary infill underlying the study area, coinciding with the cretaceous zones. Hence, the identified lineaments (faults or lithologic contacts) and structures in the area can be attributed to the tectonic setting of the area and probable migratory routes for hydrocarbon migration. More detailed ground gravity and seismic studies may lead to discoveries of structural or stratigraphic traps.
- Published
- 2022
- Full Text
- View/download PDF
42. Subsurface Investigation of Basement Structures Using Electrical Resistivity Methods at Zainawa Village Kano, Nigeria
- Author
-
Ahmed A Lawal and Adamu Abubakar
- Subjects
vertical electrical sounding (ves) ,weathered basement ,geopulse metre ,zainawa village ,Physics ,QC1-999 - Abstract
Electrical Resistivity Methods involving Schlumberger Vertical Electrical Sounding (VES) and Wenner Electrical Profiling (EP) were carried out to map the Geological features of the earth subsurface in Zainawa Area of Kano State, Nigeria. Five profiles were established; consist of six (6) VES points at each profile. GEOPULSE resistivity meter (SAS 300) was used for the data acquisition. The field data obtained have been analyzed using computer software (IPI2win) which gives an automatic interpretation of the apparent resistivity. A maximum of three geoelectric subsurface layers were delineated from the VES master curves. The geoelectric section beneath the study area was composed of top soil (clayey-sandy and sandy-lateritic), weathered layer, partly weathered (fractured basement) and fresh basement. The resistivity value for the topsoil layer varies from 20 Ωm to 600 Ωm with thickness ranging from 0.5 to 7.2 m. The weathered basement has resistivity values ranging from 15 Ωm to 593 Ωm and thickness of between 2.75 to 33.04 m. The fractured basement has resistivity values ranging from 201 Ωm to 835 Ωm and thickness of between 11 to 20.4 m. The fresh basement (bedrock) has resistivity values ranging from 1161 Ωm to 3115 Ωm with infinite depth. The depth to basement map was produced to give a good picture of the basement topography within the study area. The depth to basement ranges from 11 m around VES 01 to 85 m around VES 25 m. The map also reveals linear structures (VES 05, 21, 22 and VES 23) which trends in the NE-SW direction. These structures suggest a basement depression at these points. However, the depth from the topsoil to the bedrock surface varies between 2.5 to 37.75 m.
- Published
- 2021
- Full Text
- View/download PDF
43. Drug resistant tuberculosis classification using logistic regression
- Author
-
Bridget, Odu Nkiruka, Prasad, Rajesh, Onime, Clement, and Ali, Adamu Abubakar
- Published
- 2021
- Full Text
- View/download PDF
44. A modified Tseng algorithm approach to restoring thoracic diseases' computerized tomography images.
- Author
-
Ozsahin, Dilber Uzun, Adamu, Abubakar, Aliyu, Maryam Rabiu, and Umar, Huzaifa
- Subjects
- *
COMPUTED tomography , *IMAGE reconstruction , *MONOTONE operators , *SUBCUTANEOUS emphysema , *ALGORITHMS , *DIAGNOSTIC imaging - Abstract
It is well-known that the Tseng algorithm and its modifications have been successfully employed in approximating zeros of the sum of monotone operators. In this study, we restored various thoracic diseases' computerized tomography (CT) images, which were degraded with a known blur function and additive noise, using a modified Tseng algorithm. The test images used in the study depict calcification of the Aorta, Subcutaneous Emphysema, Tortuous Aorta, Pneumomediastinum, and Pneumoperitoneum. Additionally, we employed well-known image restoration tools to enhance image quality and compared the quality of restored images with the originals. Finally, the study demonstrates the potential to advance monotone inclusion problem-solving, particularly in the field of medical image recovery. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Modified accelerated Bregman projection methods for solving quasi-monotone variational inequalities.
- Author
-
Wang, Zhong-bao, Sunthrayuth, Pongsakorn, Adamu, Abubakar, and Cholamjiak, Prasit
- Subjects
HILBERT space ,IMAGE reconstruction ,VARIATIONAL inequalities (Mathematics) ,PRIOR learning - Abstract
In this paper, we introduce three new inertial-like Bregman projection methods with a nonmonotone adaptive step-size for solving quasi-monotone variational inequalities in real Hilbert spaces. Under some suitable conditions, the weak convergence of these methods is proved without the prior knowledge of the Lipschitz constant of the operator and the strong convergence of some proposed methods under a strong quasi-monotonicity assumption of the mapping is also provided. Finally, several numerical experiments and applications in image restoration problems are provided to illustrate the performance of the proposed methods. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Double inertial steps extragadient-type methods for solving optimal control and image restoration problems.
- Author
-
Ofem, Austine Efut, Abuchu, Jacob Ashiwere, Ugwunnadi, Godwin Chidi, Nabwey, Hossam A., Adamu, Abubakar, and Narain, Ojen Kumar
- Subjects
SUBGRADIENT methods ,VARIATIONAL inequalities (Mathematics) ,IMAGE reconstruction ,HILBERT space ,NONEXPANSIVE mappings ,PROBLEM solving ,VISCOSITY - Abstract
In order to approximate the common solution of quasi-nonexpansive fixed point and pseudo-monotone variational inequality problems in real Hilbert spaces, this paper presented three new modified sub-gradient extragradient-type methods. Our algorithms incorporated viscosity terms and double inertial extrapolations to ensure strong convergence and to speed up convergence. No line search methods of the Armijo type were required by our algorithms. Instead, they employed a novel self-adaptive step size technique that produced a non-monotonic sequence of step sizes while also correctly incorporating a number of well-known step sizes. The step size was designed to lessen the algorithms' reliance on the initial step size. Numerical tests were performed, and the results showed that our step size is more effective and that it guarantees that our methods require less execution time. We stated and proved the strong convergence of our algorithms under mild conditions imposed on the control parameters. To show the computational advantage of the suggested methods over some wellknown methods in the literature, several numerical experiments were provided. To test the applicability and efficiencies of our methods in solving real-world problems, we utilized the proposed methods to solve optimal control and image restoration problems. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. The Static Performance Effect of Hybrid- Hierarchical Interconnection by Shifted Completely Connected Network
- Author
-
Mohammed N. M. Ali, M. M. Hafizur Rahman, Adamu Abubakar Ibrahim, Yasushi Inoguchi, and Eklas Hossain
- Subjects
Shifted completely connected network (SCCN) ,Network-on-Chip ,interconnection networks ,hierarchical interconnection networks (HINs) ,static network performance parameters ,massively parallel computer (MPC) systems ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Massively parallel computer (MPC) systems execute many operations based on internal networks called interconnection networks. The performance of these networks is affected by their topologies.There are many topologies of interconnection networks for MPC systems, unfortunately, they faced many drawbacks. Expanding the size of the network degrades the performance of these topologies. That is why this current paper presents a hybrid-hierarchical interconnection network (HIN) topology by Shifted Completely Connected Network (SCCN) to circumvent the drawbacks of the existing topologies. An experimental evaluation involving the design and development of a hierarchical network was carried out. A two-dimensional higher level networks has been produced and its static network performance parameters evaluated through simulators. The finding of the simulations has shown some good performances compared to many previous designed networks. SCCN is better than all conventional networks in terms of diameter, cost and average distance.
- Published
- 2021
- Full Text
- View/download PDF
48. Unidirectional and Bidirectional Optimistic Modes IP Header Compression for Real-Time Video Streaming
- Author
-
Douma Bouthiba Farouq, Ala Abdusalam Alarood, Nahla Aljojo, and Adamu Abubakar
- Subjects
Datagram protocol ,real-time transport protocol ,transmission control protocol ,protocol headers ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Communication over Internet Protocol (IP) networks, has become crucial component of day everyday activities. They are utilized over the Internet to support a wide range of services. The flexibility of this kind of transmission relies on the IP User Datagram Protocol (UDP), IP/UDP/Real-time Transport Protocol (RTP) and IP/Transmission Control Protocol (TCP). Unfortunately, the weight of encapsulated protocol headers affects the transmission efficiency. This research aims at improving a technique that reduce the packets header size by compression. Performance analysis of the enhanced efficient techniques in both unidirectional and bidirectional optimistic modes applied to real-time video streaming traffic for UDP/IP and HTTP/TCP flows over free error channel has been conducted. The finding shows that the header compression ratio in each case is good and better than the previous studies. The technique achieved a reduction up to 90% for RTP/UDP/IP, 89% for UDP /IP and 77.5 to 86.5 % for TCP/IP profile. This research contribution is restricted to compression gain and saving for 0 × 0000, 0 × 0001, 0 × 0002 and 0 × 0006 profiles in the unidirectional and bidirectional optimistic modes.
- Published
- 2020
- Full Text
- View/download PDF
49. Dealing With Well-Formed and Malformed Packets, Associated With Point of Failure That Cause Network Security Breach
- Author
-
Mohammed Abdulaziz Al Naeem, Adamu Abubakar, and M. M. Hafizur Rahman
- Subjects
Well-formed packet ,malformed packet ,point of failure ,security breaches ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
It is quite challenging to understand the weakest single points of failure in a network because it is the point where an entire network system can be taken down. The paths leading to a point of failure, and the status of packets that causes network security breaches were examined by Intent-Based Networking approach in this study. Two algorithms are proposed, utilizing single-path and multipath in transmission flow. Every path is potentially weak and a point of failure for which a network security can be breached. Two sets of rules, namely, “vulnerability rules policies” with “rules formulation” from the regions of connection recognized by Euler's theorem were outlined. The intent is to use these sets of rules in finding the point of failure the packet status that is leading to possible security breaches within network connections. The frequencies of the packets that are liable to create security breaches and the paths where they originate are analyzed. Well-formed packet originating from the least likely weak point of failure is associated the network security breach than malformed packets. This study has contributed to revealing that network security breaches are influenced by the paths with least likely point of failure from well-formed packets.
- Published
- 2020
- Full Text
- View/download PDF
50. Trust and Tax: A Grounded Theory
- Author
-
Pertiwi Imanda Firmantyas Putri, Muhammad Adamu Abubakar, Puspitosari Indriyana, Wijayati Fitri Laela, and Rahmawati Anim
- Subjects
Environmental sciences ,GE1-350 - Abstract
The abuse case involving a tax official's child (MD) and members of a sizable religious organization in Indonesia shocked a lot of people. This case affects people's mistrust of the government and propensity for tax fraud because the perpetrators of this persecution are also known to frequently flaunt their wealth on social media. The aim of this research is to present a systematic measure of trust in government associated with tax based on Netnography. This research applies Netnography. Qualitative research uses a netnographic approach with a sample size of 9,915 netizen comments extracted with Nawala software and processed using NVIVO. This study, which employs the netnography method, tries to map what the public says on social media about this MD’s issue. The factors might develop and have an impact on their trust in the government formulated by the Conceptual MAP. After these factors are found, this study will test further statistically regarding the significance of these factors in influencing their tax compliance. The new thing in this research is using netnography to examine tax issues with a large sample size.
- Published
- 2023
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.