Skip to main content
Haruna Isah
  • Dept. of Electrical and Computer Engineering FUT PMB 065 Minna
    Nigeria

Haruna Isah

  • Haruna Isah studied Electrical and Electronics Engineering between 2002 and 2008 at the University of Maiduguri, Nigeria and obtained his MSc. in Software Engineering at the Uni... moreedit
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive... more
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology
with security needs. In this research, electronic switches in the form of sensors were used to implement a
point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and
residential buildings. The system is a simple and reliable security system and uses switch sensor technology
to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is
designed in six major units which include; the power supply, the input/sensor micro-switches, the
monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply
in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being
activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat
at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point
of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flipflop
IC and LED’s. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which
output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the
LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the
building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability,
compatibility as well as the availability of required materials. This system works on the principle of the
micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped
in any one of the switches under the mat. Verification and validation of the system indicate compliances to
design specification hence the output requirements were met.
Research Interests:
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive... more
Sophistications in theft and other criminal damages necessitates for the symbiotic blending of technology with security needs. In this research, electronic switches in the form of sensors were used to implement a point-to point intrusive monitoring system for the detection of an unauthorized access to commercial and residential buildings. The system is a simple and reliable security system and uses switch sensor technology to revolutionize the standards of living. The system is also simple, adaptable and cost-effective. It is designed in six major units which include; the power supply, the input/sensor micro-switches, the monitoring and indicator, the timing, the tone generation and output units. To ensure steady power supply in the circuit, the power unit constitutes both the mains and DC supplies. The alarm unit are being activated by the normally closed sensor micro-switches unit which is connected in an electronic/door mat at both the entrance and exit of buildings. In order to facilitate easy location of the intruder, the exact point of intrusion is being determined by the monitoring and indicator unit which constitutes the quad R/S flip-flop IC and LED's. The timing/tone generation unit is built on the 555 timer IC, in the Astable mode, which output keeps changing as far as there is a breakage of the sensors. The output of the system is mainly the LEDs and buzzer, which gives electrical light and audio signal to notify the owner of an intruder in the building. Major design issues considered include; efficiency, portability, cost-effectiveness, durability, compatibility as well as the availability of required materials. This system works on the principle of the micro-switch sensor and dependent on the condition that an intruder entered through the door and stepped in any one of the switches under the mat. Verification and validation of the system indicate compliances to design specification hence the output requirements were met.
Research Interests:
Certain crimes are hardly committed by individuals but carefully organised by group of associates and affiliates loosely connected to each other with a single or small group of individuals coordinating the overall actions. A common... more
Certain crimes are hardly committed by individuals but carefully organised by group of associates and affiliates loosely connected to each other with a single or small group of individuals coordinating the overall actions. A common starting point in understanding the structural organisation of criminal groups is to identify the criminals and their associates. Situations arise in many criminal datasets where there is no direct connection among the criminals. In this paper, we investigate ties and community structure in crime data in order to understand the operations of both traditional and cyber criminals, as well as to predict the existence of organised criminal networks. Our contributions are twofold: we propose a bipartite network model for inferring hidden ties between actors who initiated an illegal interaction and objects affected by the interaction, we then validate the method in two case studies on pharmaceutical crime and underground forum data using standard network algorithms for structural and community analysis. The vertex level metrics and community analysis results obtained indicate the significance of our work in understanding the operations and structure of organised criminal networks which were not immediately obvious in the data. Identifying these groups and mapping their relationship to one another is essential in making more effective disruption strategies in the future.
Research Interests:
The growing incidents of counterfeiting and associated economic and health consequences necessitate the development of active surveillance systems capable of producing timely and reliable information for all stake holders in the... more
The growing incidents of counterfeiting and associated economic and health consequences necessitate the development of active surveillance systems capable of producing timely and reliable information for all stake holders in the anti-counterfeiting fight. User generated content from social media platforms can provide early clues about product allergies, adverse events and product counterfeiting. This paper reports a work in progress with contributions including: the development of a framework for gathering and analyzing the views and experiences of users of drug and cosmetic products using machine learning, text mining and sentiment analysis; the application of the proposed framework on Facebook comments and data from Twitter for brand analysis, and the description of how to develop a product safety lexicon and training data for modeling a machine learning classifier for drug and cosmetic product sentiment prediction. The initial brand and product comparison results signify the usefulness of text mining and sentiment analysis on social media data while the use of machine learning classifier for predicting the sentiment orientation provides a useful tool for users, product manufacturers, regulatory and enforcement agencies to monitor brand or product sentiment trends in order to act in the event of sudden or significant rise in negative sentiment.
Research Interests:
Web feed syndication is analogous to electronic newsletters, both are aimed at delivering feeds to subscribers; the difference is that while newsletter subscription requires e-mail and exposed users to spam and several security... more
Web feed syndication is analogous to electronic newsletters, both are aimed at delivering feeds to subscribers; the difference is that while newsletter subscription requires e-mail and exposed users to spam and several security challenges, feed syndication ensures that subscribers get only what they requested for. This research investigate the state of the art of web feed aggregation technology and the development of a locally hosted or intranet based feed aggregator as a tool for getting news update, research, information sharing, rapid alert, product promotion and advertising using the core features of WordPress; the software was further enhanced with plugins and widgets for user management, dynamic content publishing, database and object caching, social web syndication, mobile device detection, back-up and maintenance. The results highlight the current developments in software re-use and describes; how open source content management systems can be used for both online and offline publishing, a means whereby feed aggregator users can control and share feed data, as well as how web developers can focus on extending built-in software libraries rather than re-inventing the wheel.