{"title":"METAMORPHISM AND DEFORMATION OF GOLD-BEARING NEOPROTEROZOIC WONAKA SCHIST BELT, NORTHWEST-NIGERIA.","authors":"U. S. Umar","doi":"10.52417/ojps.v5i1.626","DOIUrl":"https://doi.org/10.52417/ojps.v5i1.626","url":null,"abstract":"The role of metamorphism and deformation is indispensable in the occurrences of gold mineralization worldwide. In this work, deformation and metamorphic conditions for gold-bearing Neoproterozoic Wonaka Schist Belt; located around Kutcheri town of Tsafe Local Government of Zamfara State, was investigated. This is achieved using metamorphic litho-minerals obtained from ternary plots via X-Ray fluorescence (XRF) geochemical data, and directly using minerals phases from X-Ray Diffraction (XRD) technique. Index minerals identified from petrographic analysis previously suggest low to medium-grade metamorphism (M1). XRD analysis indicates quartz, albite, oligoclase, microcline, chlorite, and biotite, suggesting greenschist to lower amphibolite facies (M2). Sillimanite, andalusite, kyanite, staurolite, chlorite, biotite, and garnet were identified from the ternary plots using XRF major oxides, indicating upper amphibolite to granulite facies metamorphism (M3). This is typical of prograde metamorphism, granulite facie metamorphic grade is indicated. Na2O/Al2O3 versus K2O/Al2O3 for petrogenetic character suggests shale provenance, while the trace elements spider diagram indicates Wonaka litho-units as co-genetic compositionally, as high concentrations of V and Cr linked the petrogenetic affinity to mafic sources. Three circles of deformations are indicated; ductile deformation (D1) of the paleosome Schist producing foliations and lineation, brittle type (D2) in mid Pan-African and was accompanied by several fractures and felsic intrusions. Late Pan-African (D3) involves the folding of banded orthogneisses, the development of boudinage as well as intense shearing (ductile fault). Geospatial analysis of the fractures suggests that they represent regional Pan-African sutures cross-cutting Nigeria into the Atlantic and up to South American plate. The research therefore concludes that Au-fluid emanating through this regional event, utilizes D2 as channel ways and loci. D3 with M3 engulfed the entire structures repositioning the geometry to its present disposition.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"19 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141660925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PUBLIC KEY ENCRYPTION SCHEME BASED ON KEYWORD SEARCH","authors":"A. M. Soroush","doi":"10.52417/ojps.v4i1.471","DOIUrl":"https://doi.org/10.52417/ojps.v4i1.471","url":null,"abstract":"This study explores the concept of a Public Key Encryption Scheme (PKES) with an emphasis on enabling keyword search functionality. The aim of this research is to develop a cryptographic framework that allows users to securely search over encrypted data without revealing sensitive information. The study investigates various methods and techniques employed in PKES to achieve efficient and privacy-preserving keyword search capabilities. The research highlights the increasing importance of data privacy and the need for secure information retrieval over encrypted data. Traditional encryption methods hinder search functionality, making it challenging to perform keyword searches on encrypted data. To address this limitation, the study focuses on PKES, which facilitates search operations while preserving the confidentiality of the underlying data. Experimental research design was used for this research. To accomplish the objectives, the study employs a combination of cryptographic algorithms and data transformation techniques. Public key encryption algorithms are utilized to secure the data, ensuring that only authorized users can access the information. Additionally, searchable encryption methods, such as Searchable Symmetric Encryption (SSE) and Index-Based Encryption (IBE), are explored to enable efficient and secure keyword searches on encrypted data. The results of the research demonstrate the feasibility and effectiveness of the proposed PKES with keyword search. The developed framework allows users to encrypt their data and store it securely, while still being able to search for specific keywords without decrypting the data. The experiments conducted on different datasets showcase the efficiency of the implemented techniques, providing a practical solution for secure data retrieval. In conclusion, the study presents a robust and privacy-preserving Public Key Encryption Scheme that incorporates keyword search capabilities. The research contributes to the field of cryptography by addressing the limitations of traditional encryption methods and offering an effective solution for secure information retrieval. The findings highlight the significance of PKES in safeguarding sensitive data while allowing users to perform keyword searches conveniently","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127255618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IDENTIFICATION AND MITIGATION OF BIAS USING EXPLAINABLE ARTIFICIAL INTELLIGENCE (XAI) FOR BRAIN STROKE PREDICTION","authors":"K. Mohammed, G. George","doi":"10.52417/ojps.v4i1.457","DOIUrl":"https://doi.org/10.52417/ojps.v4i1.457","url":null,"abstract":"Stroke is a time-sensitive illness that without rapid care and diagnosis can result in detrimental effects on the person. Caretakers need to enhance patient management by procedurally mining and storing the patient's medical records because of the increasing synergy between technology and medical diagnosis. Therefore, it is essential to explore how these risk variables interconnect with each other in patient health records and understand how they each individually affect stroke prediction. Using explainable Artificial Intelligence (XAI) techniques, we were able to show the imbalance dataset and improve our model’s accuracy, we showed how oversampling improves our model’s performance and used explainable AI techniques to further investigate the decision and oversample a feature to have even better performance. We showed and suggested explainable AI as a technique to improve model performance and serve as a level of trustworthiness for practitioners, we used four evaluation metrics, recall, precision, accuracy, and f1 score. The f1 score with the original data was 0% due to imbalanced data, the non-stroke data was significantly higher than the stroke data, the 2nd model has an f1 score of 81.78% and we used explainable AI techniques, Local Interpretable Model-agnostic Explanations (LIME) and SHapely Additive exPlanation (SHAP) to further analyse how the model came to a decision, this led us to investigate and oversample a specific feature to have a new f1 score of 83.34%. We suggest the use of explainable AI as a technique to further investigate a model’s method for decision-making.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130413271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A REVIEW OF ARTIFICIAL INTELLIGENCE (AI) CHALLENGES AND FUTURE PROSPECTS OF EXPLAINABLE AI IN MAJOR FIELDS: A CASE STUDY OF NIGERIA","authors":"K. Mohammed, A. Shehu","doi":"10.52417/ojps.v4i1.458","DOIUrl":"https://doi.org/10.52417/ojps.v4i1.458","url":null,"abstract":"Artificial intelligence (AI) has been used widely in essential fields such as energy, health, agriculture, finance etc. However, Artificial intelligence is still faced with social, ethical, legal, and technological challenges. It is important to know how these systems make their decisions while still achieving and implementing the benefits of AI. Explainable AI (XAI) is a technique that is used to explain how a machine made a decision. In this review, we discuss the challenges of AI and recommend XAI as a tool to solve the limitations of AI and suggest a human and conditions-based approach to challenges faced in the technology in Nigeria. This paper employs a narrative review to highlight problems that are limiting the use of AI in four important sectors of Nigeria: Health, Energy, Agriculture, and Finance, and suggest recommendations to solve the AI challenges. The review data was obtained from journals and researchers. We discuss Explainable AI (XAI) as a technique for solving challenges like trustworthiness, bias, lack of data, expertise, and confidence in using AI in major sectors. The paper focuses on the users, conditions, and challenges and recommends that humans and conditions be taken into consideration when building XAI systems.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115162285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Ijabor, A. O. Nwabuoku, A. F. Ozakpor, D. Azesi, I. C. Nwaebise, O. Ikechukwu, I. P. Nwankwo
{"title":"ASSESSMENT OF INDOOR AND OUTDOOR RADIATION DOSE LEVELS IN DELTA STATE POLYTECHNIC, OGWASHI-UKU, DELTA STATE, NIGERIA","authors":"B. Ijabor, A. O. Nwabuoku, A. F. Ozakpor, D. Azesi, I. C. Nwaebise, O. Ikechukwu, I. P. Nwankwo","doi":"10.52417/ojps.v3i2.431","DOIUrl":"https://doi.org/10.52417/ojps.v3i2.431","url":null,"abstract":"This study assessed the indoor and outdoor radiation dose levels of twelve (12) laboratories of Delta State Polytechnic, Ogwashi-Uku using a handheld inspector survey meter and estimation revealed that the average BIR, average annual equivalent dose rate (EDR), average annual absorbed dose rate (ADR), average annual effective dose equivalent (AEDE), average excess lifetime cancer risk (ELCR) is 0.0116 mR/hr, 0.9733 mSv/yr, 100.69 nGy/hr, 0.4940 mSv/yr and 1.755. Dose to organs showed that the testes received the highest dose, while the liver received the lowest dose indoors and outdoors respectively. In general, indoor and outdoor BIR, ED, AD, and AEDE values are less than the recommended limit of unity (1 mSv/yr) for public exposure (ICRP). ELCR for indoor and outdoor is above the world permissible limit of 0.29×10-3. The calculated ELCR in the study area is 1:29719 (about 33 in 1 million) indoors and 1:115735 (9 in 1 million) outdoors. Although the average value for ELCR in this study is high further analysis and studies need to be carried out to ascertain the risk of staff and students to cancer. ","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114231981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EVALUATION OF CLASSIFICATION ALGORITHMS ON LOCKY RANSOMWARE USING WEKA TOOL","authors":"F. Peter, G. George, K. Mohammed, U. B. Abubakar","doi":"10.52417/ojps.v3i2.382","DOIUrl":"https://doi.org/10.52417/ojps.v3i2.382","url":null,"abstract":"The ongoing danger of ransomware has led to a struggle between creating and identifying novel approaches. Although detection and mitigation systems have been created and are used widely, they are always evolving and being updated due to their reactive nature. This is because harmful code and its behavior can frequently be altered to evade detection methods. In this study, we present a classification method that combines static and dynamic data to improve the precision of locky ransomware detection and classification. We trained supervised machine learning algorithms using cross-validation and used a confusion matrix to observe accuracy, enabling a systematic comparison of each algorithm. In this work, supervised algorithms such as the decision tree algorithm resulted in an accuracy of 97%, naïve baiyes 95%, random tree 63%, and ZeorR 50%.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131325023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PATH LOSS PREDICTION BASED ON MACHINE LEARNING TECHNIQUES: SUPPORT VECTOR MACHINE, ARTIFICIAL NEURAL NETWORK, AND MULTILINEAR REGRESSION MODEL","authors":"J. Idogho, G. George","doi":"10.52417/ojps.v3i2.393","DOIUrl":"https://doi.org/10.52417/ojps.v3i2.393","url":null,"abstract":"The rapid progress in fairness, transparency, and reliability is inextricably linked to Nigeria's rise as one of the continent's leading telecom markets. Path loss has been one of the key issues in providing high-quality service in the telecommunications industry. Comparing route loss prediction systems with high accuracy and minimal complexity is so critical. In this article, the simulation of data was compared using three alternative models: Artificial Neural Network (ANN), Support Vector Machine (SVM), and a conventional Multilinear Regression (MLR) model. The performance of the various models is evaluated using measured data. The simulated outcome was then assessed using various performance efficiency metrics, including the Determination Coefficient (R2) and Root Mean Square Error (RMSE), Mean Square Error (MSE) and Root Square Error (R2) (MSE). For the modelling of all inputs, the anticipated results showed that the ANN model is marginally better than the SVM model. The results also demonstrated that the ANN and SVM models could model path loss prediction better than the MLR model. As a result, it is possible to recommend using ANN to estimate path loss.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127438584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NATURAL LANGUAGE PROCESSING APPROACH TO DETERMINE THE POLARITY AND SUBJECTIVITY OF IPHONE 12 TWITTER FEEDS USING TEXTBLOB","authors":"B. Abubakar, C. Uppin","doi":"10.52417/ojps.v2i2.276","DOIUrl":"https://doi.org/10.52417/ojps.v2i2.276","url":null,"abstract":"Sentiment analysis and opinion mining is a branch of computer science that has gained considerable growth over the last decade. This branch of computer science deals with determining the emotions, opinions, feelings amongst others of a person on a particular topic. Social media has become an outlet for people to voice out their thoughts and opinions publicly about various topics of discussion making it a great domain to apply sentiment analysis and opinion mining. Sentiment analysis and opinion mining employ Natural Language Processing (NLP) in order to fairly obtain the mood of a person’s opinion about any specific topic or product in the case of an ecommerce domain. It is a process involving automatic feature extractions by mode of notions of a person about service and it functions on a series of different expressions for a given topic based on some predefined features stored in a database of facts. In an ecommerce system, the process of analyzing the opinions of customers about products is vital for business growth and customer satisfaction. This proposed research will attempt to implement a model for sentiment analysis and opinion mining on Twitter feeds. In this paper, we address the issues of combining sentiment classification and the domain constraint analysis techniques for extracting opinions of the public from social media. The dataset that was employed in the paper was gotten from Twitter through the tweepy API. The TextBlob library was used for the analysis of the tweets to determine their sentiments. The result shows that more tweets were having a positive subjectivity and polarity on the subject matter.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"487 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124423567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A PROACTIVE APPROACH TO NETWORK FORENSICS INTRUSION (DENIAL OF SERVICE FLOOD ATTACK) USING DYNAMIC FEATURES, SELECTION AND CONVOLUTION NEURAL NETWORK","authors":"G. George, C. Uppin","doi":"10.52417/ojps.v2i2.237","DOIUrl":"https://doi.org/10.52417/ojps.v2i2.237","url":null,"abstract":"Currently, the use of internet-connected applications for storage by different organizations have rapidly increased with the vast need to store data, cybercrimes are also increasing and have affected large organizations and countries as a whole with highly sensitive information, countries like the United States of America, United Kingdom and Nigeria. Organizations generate a lot of information with the help of digitalization, these highly classified information are now stored in databases via the use of computer networks. Thus, allowing for attacks by cybercriminals and state-sponsored agents. Therefore, these organizations and countries spend more resources analyzing cybercrimes instead of preventing and detecting cybercrimes. The use of network forensics plays an important role in investigating cybercrimes; this is because most cybercrimes are committed via computer networks. This paper proposes a new approach to analyzing digital evidence in Nigeria using a proactive method of forensics with the help of deep learning algorithms - Convolutional Neural Networks (CNN) to proactively classify malicious packets from genuine packets and log them as they occur.","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125732574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Nd3+ CONCENTRATION DEPENDENT OPTICAL FEATURES OF GADOLINIUM BOROPHOSPHO-TELLURITE GLASSES","authors":"I. Bulus, J. Sheyin, E. Yayock, A. Dalhatu","doi":"10.52417/OJPS.V1I1.84","DOIUrl":"https://doi.org/10.52417/OJPS.V1I1.84","url":null,"abstract":"Improving the optical response of glass host with two or more strong network formers via suitable controlled of rare earth ions is the key issue in the fabrication of optical based glass for solid state lasers and light emitting devices. Hence, we report the Nd3+ concentration dependent on optical parameters such as absorption edge, optical band gap (direct and indirect) and Urbach’s energy of gadolinium borophospho-tellurite glasses with chemical composition of 10Gd2O + 30B2O3 + 20P2O5 + (40-)TeO2 + Nd2O3 (where 0.0 ≤ x ≤ 1.0 mol%). The glass samples were synthesized by convectional melt quenching method and characterized through X-Ray Diffraction (XRD) and Ultraviolet Visible Near-Infrared (UV-Vis-NIR) measurements. The amorphous nature of these glasses was confirmed by X-Ray diffraction pattern while the UV-Vis-NIR spectra revealed six absorption peaks corresponding to the transition from ground level 4I9/2 to the various excited state of Nd3+ ions. It was found that the investigated range of Nd3+ doping concentrations has a great influence on aforementioned parameters. The excellent optical features established in the present glass host suggest their potentiality for solid-state lasers and other photonic applications. \u0000Bulus, I. | Department of Physics, School of Sciences, Kaduna State College of Education Gidan waya, Kafanchan, Nigeria","PeriodicalId":218584,"journal":{"name":"Open Journal of Physical Science (ISSN: 2734-2123)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125951976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}