Musa Ahmed Zayyad

Musa Ahmed Zayyad
Umaru Musa Yar'adua University Katsina · Computer Science

Doctor of MIS

About

17
Publications
10,244
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
174
Citations
Introduction

Publications

Publications (17)
Article
The COVID-19 pandemic has posed unprecedented challenges requiring teachers and students to adapt to online teaching and learning, because schools were closed by governments all over the world in order to contain the spread of the virus. However, despite the advantages of continued teaching and learning during the COVID-19 lockdown, learning online...
Article
Background: Computer virus pose increased risk to computer data integrity, they cause loss of important information and data and cost a huge enormous amount in wasted effort in restoration or duplication of lost and damaged data. Everyday new viruses are discovered, and as the problem increases, there is the need to employ modern tools to identify...
Article
Full-text available
Sentiment analysis is the task of determining the sentiment expressed in a given text. It has gained significant attention in recent years due to its applications in various domains such as social media analysis, customer feedback analysis, and opinion mining. While many studies focus on document-level sentiment analysis, the analysis of sentiments...
Article
Social media have become extremely popular in recent years, and their widespread adoption has led to the presence of huge volumes of users’ personal information on the Internet. The ever-increasing number of social media users on one hand and the massive amount of information being shared daily on the other hand have encouraged attackers to develop...
Article
Full-text available
User evaluations on social networking sites such as Twitter, YouTube, and Facebook have grown rapidly due to their widespread use in sentiment analysis, providing valuable insight for both governmental and non-governmental organizations. Analyzing these evaluations not only helps improve the effectiveness of products and services, but also aids in...
Article
Vehicular ad hoc networks (VANETs) is a sort of mobile ad hoc network (MANET) that is designed based on moving vehicles, which are referred to as nodes. The nodes communicate with one another wirelessly, without the need for a network infrastructure that physically connects them. Once the network design has changed, nodes are free to migrate in wha...
Article
Big data analytics is a significant way of improving telecommunications operators’ Quality of Service (QoS) and improve their businesses. This study was aimed at determining the impact of big data analysis in telecommunication industry and also to arouse their interest towards big data. The study used four domestic telecommunication companies as ca...
Article
Full-text available
Context: Deployment of 5G wireless technology has taken place in some developed and developing countries. The technology is expected to provide faster speed, greater reliability, low latency, in addition to opening up a new sphere of possibilities such as connected vehicles and devices. However, despite the expectation of improvements promised in t...
Poster
Full-text available
The 2nd International Conference on Administration (ICAM 2022) is slated for 21st - 24th,June, 2022 at the Entrepreneurship Center, Hassan Usman Katsina Polytechnic, Katsina, Nigeria. The conference is intended on providing a discussion, for exchanging of knowledge, researches and of recent solutions for many researchers and experts in various fiel...
Preprint
Full-text available
Big data is a form of data with increased volume, difficult to analyze, process, and store using traditional database technologies. It has long been adopted in business and finance where a large number of bank transaction are executed daily. The emergence of big data in banking industry results to large proportion of technical improvements in the i...
Article
Full-text available
Requirements negotiation involves discussion on the requirements conflict to have some compromise that will satisfy the participating stakeholders of a software project. The output of a requirement negotiation is a set of satisfied requirements of two or more parties. In this paper, we present a systematic review of requirements negotiation challen...
Article
Full-text available
Objective: Cholera has been endemic in Nigeria since the 1970s and has resulted in several early deaths, which probably could have been avoided. This study examined the various factors that contribute to the infection and spread of cholera in Benue State, Nigeria, from 2008 to 2017. We also proposed a cloud based health management system (CBHMS) f...
Article
Full-text available
Background E-health technology applications are essential tools of modern information technology that improve quality of healthcare delivery in hospitals of both developed and developing countries. However, despite its positive benefits, studies indicate that the rate of the e-health adoption in some developing countries is either low or underutili...

Network

Cited By