Posts

On the Launch of ‘Zo Mu Gina Kamfani’

Image
As I set to launch my Zo Mu Gina Kamfani today, 21st February 2021, I’d like to share its first chapter for free as a giveaway. The event Arewa Computer Library, which took place at the School of Arabic Studies, Kano, has been acknowledged by well-recognized public figures –where surfeit advice and excellent ideas have been given to encourage youths to invent and bring positive change. #ZoMuGinaKamfani’s thousands of adherents have contributed in any possible and legitimate way to move the trend and the book forward, in such a way that other youths will get aware of it and abide by it its mission. Furthermore, people from different parts of Northern Nigeria –northeastern, western and central regions have managed to attend the event. I am, however, ecstatic to have such a paramount honour. I was also privileged to have an Award of Excellence as the Motivational Master of the Year 2020 –the twin year, from Arewa Computer Library, as well as being appointed as its Special Adviser. This ...

Mohiddeen Set to Launch His Entrepreneurial Book in Kano

Image
  Zo Mu Gina Kamfani, an entrepreneurial book 21st February 2021, has been scheduled as the day to launch Zo Mu Gina Kamfani , an entrepreneurial book written by Muhammad Auwal Ahmad, popularly known as Mohiddeen, in Kano State. I have gained the opportunity from the CEO and Co-founder of Arewa Computer Library , Salees Abdulrazak Sahel, to introduce my book at an event he and colleagues have organized, Arewa Computer Library 2021 Summit. The attention of many people has been dragged to an attractive topic, #ZoMuGinaKamfani , which has been trending on social media since September 2020. I have explained in detail during my interview with DailyStar NG , about the hashtag and why we create the motive movement. Well, the trend has to do with my aforementioned unpublished book, as it partakes in motivating youths to be competent enough to create multiple opportunities to be self-reliant by building a company.  To make the trend more understandable, a friend and one of its co-found...

An Introduction on the Release of “Perceptible Ideologies”

Image
  I have decided to release my philosophical book at the end of this year, 2020, for my fellow philosophers and those who strive to seek the truth no matter how bitter it seems to be. In a nutshell, Perceptible Ideologies is a special book on ideology; how humans view things and how they differ in most cases with regard to their different ideologies. Aliyu Ibrahim Haidar is responsible for writing the book’s forward, he states: "God created this universe as a diverse, sophisticated, and wonderful abode for His creatures. The most sophisticated creature of all His creations is a human being. We, humans, are the most intelligent, curious, and mysterious of His creations. What made us even more fascinating is how we perceive things differently from others. "Mohiddeen Ahmad, an intelligent and humble friend of mine who is an advocate of peaceful co-existence wrote this book to explain how we can live with other people who have a different perspective from ours in a harmoniou...

Quantum Mechanics: A Panacea for all Scientific Hypothesis

Image
In today’s science, when we fail to conclude critical research or hypothesis we relate it to quantum mechanics as the panacea for all scientific problems. This is because of its mysterious features that have not been discovered by humans, today. First of all, futurists have predicted that the use of classical computers will be rare in the next 50 years when quantum computers will overwhelm the planet. So, we have now realized the use of quantum mechanics in computing, it is one of the greatest successes in modern computing today. It is because of these computers and of course some modern technologies like the Internet of Things, Artificial Intelligence, and Robotics that caused the existence of 5G network technology. In the case of time travel – a scientific hypothesis to travel to the future, it is believed that it will only be possible when quantum mechanics is fully achieved to create a time machine which will probably travel at the speed of light. Though, Albert Einstein said nothi...

Data Science: Digital Means of Unveiling Culprits and Their Deadliest Intentions

Image
In one of my unpublished research papers “The Role of Data Science in Detection of Fraud and Intrusion over a Network”, I explained in detail how fraud, intrusion and any kind of illegal communications and actions can be detected and thwarted with the use of modern technologies. The implementation of modern technologies such as machine learning and data science algorithms like logistic regression and artificial neural networks which have human-like decision-making techniques will play an enormous role in this kind of task. Today, internet fraud is increasingly becoming very common in the modern world because even in the technologically and economically developed countries like the United States, this pandemic fraud is still partaking on the virtual planet like a bushfire. According to Rossenberg (2007), in 2006, the United States recorded a loss of 198 million dollars due to internet fraud, while in the same year BBC report says the United Kingdom recorded an annual loss of 150 million...

(Opinion) Digitalize Nigeria’s Biometric Security System

Image
                                                                   Nigeria as the most populous country in the entire continent is yet to innovate and implement its security system in which hypocritical communications will be hindered whereas intrusions, fraud and terrorism will be thwarted. Today, all developed countries have approached this unavoidable development. In these counties, a fraudster or an intruder would be detected in a short period of time using their modern detection machines with artificial intelligence capability. A recent project proposed by the Honourable Minister of Communications and Digital Economy shows how mobile phone numbers and Bank Verification Numbers (BVN) will be linked with citizens’ national identity cards to thwart all those hypocritical communications ov...

The Tripartite Spatial Holes: Blackhole, Whitehole and Wormhome

Image
  What we have known earlier regarding the laws of the universe includes the law of relativity, which clearly indicates that everything is in relation with each other. But in this case, these objects I call “the tripartite spatial holes” aren’t meant to relate with each other nor they meant to twin themselves, these are blackhole, whitehole and wormhole. Black hole We have already known the concept of blackhole. NASA defined it as an astronomical object with a gravitational pull so strong that nothing, not even light, can escape it. A black hole’s “surface,” called its event horizon, defines the boundary where the velocity needed to escape exceeds the speed of light, which is the speed limit of the cosmos. Matter and radiation fall in, but they can’t get out. The most massive blackhole discovered so far weights 40 billion times the mass of the sun, or 20 times the size of the solar system. White hole Wikipedia says, in general relativity, a white hole is a hypothetic...

Essential Guidance on Web Development: Download “Program a Computer to Learn ‘How to Think’”

Image
Do you want to get essential guide on web development? Download my Program a Computer to Learn ‘How to Think’ now to help you get step-by-step procedures to learn how to declare your programming field. Many programming newbies quit it due to lack of guidance and procedures. Today, it has been reported that this eBook has helped many newbie programmers in terms of understanding the facts about programming and how to select the right field of their choice. Download below Program a Computer to Learn ‘How to think’ Download

The Prince Without a Head: An Introduction

Image
  A short science fiction written by Mohiddeen Ahmad narrates how a squad of three astronauts took a trip to explore space but were unfortunately kidnapped by aliens and were taken to their planet in the jungle. On the aliens’ planet, the commander-in-chief of the empire, Rando, who was in charge of the kingdom where a headless prince was ruling, gave the astronauts a story of how the prince lost his head. The battle they all called  the battle of the salient jungle , was somehow terrible. It was such an unforgettable battle that caused the loss of millions of lives. Rando narrated, it was their foes from outer space that came to invade their planet, but it was not a successful attempt at last. They got the audacity to quash those enemies by all means despite their weaknesses, loss of lives, and lack of good weapons. In the end, Rando concluded that it was that battle that caused their prince to have lost his head. He wept while narrating how a warrior among the enemies cut of...

The Role of Human Heart as an Auxiliary Memory

Image
  Numerous scientific theories that are springing up always show the functions of the human brain for storing data. The memory unit in the brain stores encoded data in an unknown form. The structure or the form of the data in the memory unit is not yet explained. Some modern scientific theories suggest that high knowledge of quantum physics is needed to understand the form of encoded data in the memory unit whereas manipulating those data could be possible in the era of technological singularity. This, perhaps, will come with the technological advancement of transhumanism which states that upgrading humans will be possible in the near future. Furthermore, scientists and futurists have predicted that high knowledge of quantum physics will give rise to the development of a time machine, which will likely make time travel possible in the future. Now, the controversial point for brain’s function of storing data has started in the past centuries when some educationists came up with some...

Why You Should Not Expose Your Identity Everywhere

Image
  Advisably, you’re not meant to expose your identity everywhere. Today, social media has become a great challenge to your identity. It is a public podium in which different kinds of people appear for many purposes. To even forget the egoism of being scammed, cheated, or deceived your identity and sensitive information should always remain private. Here are the five security challenges you might have faced on social media and advises to avoid them: 1. Do not share your whereabouts It is always one of the habits of social media users sharing their whereabouts at current places. Be careful and not to share your current location wherever you are. This, of course, gives adversaries an opportunity to easily find victims and trace them. The only thing you need to do is to allow the ‘location’ feature of your phone to be turned on whenever you’re traveling. This will enable authority trackers to trace your whereabouts for security purposes. 2. Do not upload pictures where travelling Your ...

5G Technology: History, Concept, Features and Constraints:

Image
Historical Background History of Wireless Cellular Technology Way back in the 1950s, the first commercial analog mobile communication system was launched in the US. It had very low market penetration for years after its launch. Formally speaking, the first generation (1G) mobile phone was launched three decades later and continued to use analog signals. With the advent of microprocessors and the dawn of the digital age, analog mobile communication was digitized and we had a second generation of mobile communication (2G) technology enter the picture. 2G was fully digital, i.e., dealing only with 1s and 0s. Besides improving the quality of voice transmission and reception, 2G also introduced SMS—a feature that millennials used with devotedly before instant messengers like WhatsApp arose and changed the social lives of “netizens”. A couple of years later, General Packet Radio Services (GPRS) was added to 2G, which allowed users to browse th...