<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://hdl.handle.net/123456789/30" />
  <subtitle />
  <id>http://hdl.handle.net/123456789/30</id>
  <updated>2026-04-23T21:01:01Z</updated>
  <dc:date>2026-04-23T21:01:01Z</dc:date>
  <entry>
    <title>CORRELATES OF HAEMOGLOBIN LEVEL IN MOTHERS OF CHILDREN UNDER TWO YEARS IN NANTON DISTRICT: A CROSS-SECTIONAL STUDY FROM GHANA</title>
    <link rel="alternate" href="http://hdl.handle.net/123456789/4444" />
    <author>
      <name>Anthony Wemakor, A.</name>
    </author>
    <author>
      <name>Daniel Edem Kpewou, D. E.</name>
    </author>
    <author>
      <name>Wemah, K.</name>
    </author>
    <id>http://hdl.handle.net/123456789/4444</id>
    <updated>2025-07-09T10:45:56Z</updated>
    <published>2023-01-01T00:00:00Z</published>
    <summary type="text">Title: CORRELATES OF HAEMOGLOBIN LEVEL IN MOTHERS OF CHILDREN UNDER TWO YEARS IN NANTON DISTRICT: A CROSS-SECTIONAL STUDY FROM GHANA
Authors: Anthony Wemakor, A.; Daniel Edem Kpewou, D. E.; Wemah, K.
Abstract: Objectives: Anaemia, defined using haemoglobin level, is one of the most prevalent nutritional deficiency diseases among women of childbearing age. Whilst most studies of anaemia were conducted on pregnant women, data are lacking on the haemoglobin level and its correlates of mothers in Ghana. In this paper, we report data on the correlates of haemoglobin level among mothers in Nanton district, Northern Region, Ghana. Method: A cross-sectional study design was used to study 420 mothers of children under 2 years selected randomly from the child welfare clinics (CWCs) of five health facilities in Nanton District, Ghana. Women were interviewed on their socio-demographic characteristics, dietary practices, reproductive history, and knowledge on anaemia using a structured questionnaire in health facilities.&#xD;
Haemoglobin values during pregnancy were retrieved from antenatal clinic files whilst finger-pricked blood test samples were obtained and used to determine haemoglobin levels during the survey. Multiple linear regression was used to identify the correlates of haemoglobin level of the mothers. Results: The mean age (±SD) and parity of the subjects were 29.4 (±6.36) years, and 3.36 (±1.78) respectively. The mean haemoglobin (±SD) was 10.35 (±2.17) g/dl and 56.0% of the subjects had anaemia. Multivariable regression analysis identified 12 haemoglobin correlates, but based on standardized regression coefficients, the seven most important correlates of haemoglobin were: parity (β =􀀀0.396), age (β =0.352), having malaria infection postpartum (β =- 0.340), frequency of fruit consumption (once weekly, β =0.322), frequency of vegetable consumption (twice weekly, β =0.296), overall index of anaemia knowledge (richest tertile, β =0.125), and CWC attendance (β =0.110). It is recommended to strengthen family planning and malaria prevention programmes, and to intensify education on fruit and vegetable consumption, and anaemia</summary>
    <dc:date>2023-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>AN IMPROVED HYBRID ALGORITHM FOR OPTIMIZING THE PARAMETERS OF HIDDEN MARKOV MODELS</title>
    <link rel="alternate" href="http://hdl.handle.net/123456789/4365" />
    <author>
      <name>Danaa, A. A. A.</name>
    </author>
    <author>
      <name>Daabo, M. I.</name>
    </author>
    <author>
      <name>Abdul-Barik, A.</name>
    </author>
    <id>http://hdl.handle.net/123456789/4365</id>
    <updated>2025-02-05T12:15:09Z</updated>
    <published>2021-01-01T00:00:00Z</published>
    <summary type="text">Title: AN IMPROVED HYBRID ALGORITHM FOR OPTIMIZING THE PARAMETERS OF HIDDEN MARKOV MODELS
Authors: Danaa, A. A. A.; Daabo, M. I.; Abdul-Barik, A.
Abstract: Hidden Markov Models (HMMs) have become increasingly popular in the last several years due to the fact that, the models are very rich in mathematical structure and hence can form the theoretical basis for use in a wide range of applications. Various algorithms have been proposed in literature for optimizing the parameters of these models to make them applicable in real-life. However, the performance of these algorithms has remained computationally challenging largely due to slow/premature convergence and their sensitivity to preliminary estimates. In this paper, a hybrid algorithm comprising the Particle Swarm Optimization (PSO), Baum-Welch (BW), and Genetic Algorithms (GA) is proposed and implemented for optimizing the parameters of HMMs. The algorithm not only overcomes the shortcomings of the slow convergence speed of the PSO but also helps the BW escape from local optimal solution whilst improving the performance of GA despite the increase in the search space. Detailed experimental results demonstrates the effectiveness of our proposed approach when compared to other techniques available in literature.</summary>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>FAST IMPLEMENTATION OF THE RIVEST-SHAMIR-ADLEMAN (RSA) ALGORITHM WITH ROBUST PACKET DATA LOSS DETECTION FUNCTION</title>
    <link rel="alternate" href="http://hdl.handle.net/123456789/4336" />
    <author>
      <name>Mubasir, I.</name>
    </author>
    <author>
      <name>Abdul-Barik, A.</name>
    </author>
    <author>
      <name>Salamudeen, A.</name>
    </author>
    <id>http://hdl.handle.net/123456789/4336</id>
    <updated>2025-02-04T11:12:53Z</updated>
    <published>2021-01-01T00:00:00Z</published>
    <summary type="text">Title: FAST IMPLEMENTATION OF THE RIVEST-SHAMIR-ADLEMAN (RSA) ALGORITHM WITH ROBUST PACKET DATA LOSS DETECTION FUNCTION
Authors: Mubasir, I.; Abdul-Barik, A.; Salamudeen, A.
Abstract: Abstract - Encryption is the process of protecting information from unauthorized parties by converting such information into an unreadable form. Packet data is a method of transferring data, broken into bits called packets which travel over a network. Packet losses occur when packets fail to reach their destination devices as a result of network congestion, faulty routers or as a result of an attack. Encryption is the standard method for making a communication private. In sending a private message to another user, it is first encrypted (termed encipher), the intended recipient alone knows how to correctly decrypt (decipher) the message. There are several algorithms developed for the purpose of encryption which provides data security and integrity. This paper proposes the use of the Rivest-Shamir-Adleman (RSA) algorithm to implement a system for encrypting text files of any length (by breaking long messages into valid blocks and encrypting each block) capable of being transmitted using a Simple Mail Transfer Protocol (SMTP). Probable primes, 3048 bits in length are generated to be used in the generation of public, private key pairs for encryption and decryption. The proposed scheme is better because the route taken during transmission of data is recorded and packet losses are also checked for during transmission of encrypted files as compared to known state-of-the-art scheme</summary>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM</title>
    <link rel="alternate" href="http://hdl.handle.net/123456789/4299" />
    <author>
      <name>Alhassan, S.</name>
    </author>
    <author>
      <name>Armah, G. K.</name>
    </author>
    <author>
      <name>Alhassan, I. Z.</name>
    </author>
    <id>http://hdl.handle.net/123456789/4299</id>
    <updated>2025-01-27T12:39:31Z</updated>
    <published>2021-01-01T00:00:00Z</published>
    <summary type="text">Title: AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
Authors: Alhassan, S.; Armah, G. K.; Alhassan, I. Z.
Abstract: As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to allay public fears during communication. This paper expands the scope of audio data security via an enhanced genetic algorithm. Here, each individual (audio sample) is genetically engineered to produce new individuals. The enciphering process of the proposed technology acquires, conditions, and transforms each audio sample into bit strings. Bits fission, switching, mutation, fusion, and deconditioning operations are then applied to yield cipher audio signals. The original audio sample is recovered at the receiver's end through a deciphering process without the loss of any inherent message. The novelty of the proposed technique resides in the integration of fission and fusion into the traditional genetic algorithm operators and the use of a single (rather than two) individual(s) for reproduction. The effectiveness of the proposed cryptosystem is demonstrated through simulations and performance analyses.</summary>
    <dc:date>2021-01-01T00:00:00Z</dc:date>
  </entry>
</feed>

