Papers by Bernard Ephraim
The Journal of Computer Science and Its Applications, 2023
Artificial Intelligence (AI) has made computers capable to learn, reason, and make decisions. Thr... more Artificial Intelligence (AI) has made computers capable to learn, reason, and make decisions. Through AI powered tool and platforms usually created using different programming paradigms and languages, business strategists, production engineers and managers, military commanders and public administrators have changed the way they interact with their clients, colleagues and stakeholders. This paper critically examined the relevance of Object-Oriented Programming Languages (OOPLs) in this era which Artificial Intelligence has induced technological exploits in every area of human endeavor. An explorative study was adopted using literature review as the basis for information gathering. The study revealed that object oriented programming languages like Python, C#, C++ and Java gained serious popularity in the field of software engineering and applications development due to their high execution speed, quick response time, portability, ease of coding and code reusability which brought about code library formation. The study noted that the pervasive trend of AI would continue in the future and that OOPLs would still be veritable tools for development of AI systems. It therefore recommended that object oriented thinking should be introduced in early stage education of children to create "catch them young initiative" since AI is expanding with great speed and would continue to expand.
Journal of Mobile Computing and Application, 2024
Background: This paper investigates the prevalence and the negative impacts of cybercrime in deve... more Background: This paper investigates the prevalence and the negative impacts of cybercrime in developing countries. It also attempts to proffer solution to the problem of cybercrime focusing on identity theft, phishing, and other cybercriminal activities that are common in 21st century. This research is imperative because cybercrime has become a teething problem to most developing countries where monitoring and tracking of cybercrime offenders is still a big challenge. In Nigeria for example, cybercrime comes in different forms and affects almost all aspect of human endeavor in our day due to the rapid expansion of internet access and digital technologies. Materials and Methods: The research employs a mixed-method approach. First, it took a tour on different established cases of cybercrimes in recent time. It then carried out real life survey using a sample of about 68 students studying computing science in some universities in the southern part of Nigeria. Results: Findings reveal a high level of concern about cybercrime among respondents, with many reporting personal experiences such as phishing attempts and identity theft via social media platforms like Facebook and Instagram. The discussion emphasizes the importance of cybersecurity education and robust government regulations to combat cyber threats effectively. Conclusion: Recommendations include addressing youth unemployment, promoting ethical wealth generation, and strengthening cyber security laws to mitigate the socioeconomic and moral impacts of cybercrime in developing countries. This study contributes to understanding the multifaceted challenges posed by cybercrime in developing nations and underscores the necessity for comprehensive strategies encompassing policy reforms, educational initiatives, and socioeconomic interventions.
Journal of Computer, Software, and Program (JCSP), 2024
The research critically examines the current security features of the Unified Tertiary Matriculat... more The research critically examines the current security features of the Unified Tertiary Matriculation Examination (UTME) results in Nigeria, highlighting their vulnerabilities and proposing pragmatic solutions to enhance result authentication. The study emphasizes the importance of robust security measures in maintaining the integrity of the examination system, especially in the face of increasing attempts at result manipulation and forgery. While acknowledging the existing security features, including the candidate's photo, watermark, and QR code, the research reveals significant weaknesses, such as the absence of advanced security elements and the limited functionality of the QR code verification system. To address these challenges, the study advocates for a comprehensive approach, recommending measures such as exclusive issuance of result slips by the Joint Admission and Matriculation Board (JAMB), real-time third-party authentication systems, and accessible lists of top scorers. The proposed solutions aim to streamline the verification process, boost public trust in JAMB's operations, and generate additional revenue for the examination board. The research underscores the necessity of continuous improvement and adaptation in security measures to ensure the credibility and reliability of UTME results.
International journal of engineering research and technology, 2016
Imperial journal of interdisciplinary research, 2016
As the world of trade increasingly continue to expand, more and more information technology syste... more As the world of trade increasingly continue to expand, more and more information technology systems are adopted to bring about flexible and easy transactions. In recent times cases of theft ranging from shop lifting to credit card data heist have been identified leading to huge financial losses worldwide. Due to the need for reduced administrative and running costs, shopping malls around the world are gradually adopting self-service systems. This comes well but not without a price – Security compromise! This research work probes into the scenario whereby a dubious customer manipulates the price tags of items for the sole purpose of disguisedly compelling the cashier to undercharge him (the customer). The researcher solves this problem by developing a novel robust encryption for price tags’ barcodes and designing a database structure which keeps track of items that have been tagged recently. of 6:1, 8:1 & 10:1, w/c ratio of 0.35, 0.4 & 0.45 have been used. Properties of no-fines conc...
As the world of trade increasingly continue to expand, more and more information technology syste... more As the world of trade increasingly continue to expand, more and more information technology systems are adopted to bring about flexible and easy transactions. In recent times cases of theft ranging from shop lifting to credit card data heist have been identified leading to huge financial losses worldwide. Due to the need for reduced administrative and running costs, shopping malls around the world are gradually adopting self-service systems. This comes well but not without a price – Security compromise! This research work probes into the scenario whereby a dubious customer manipulates the price tags of items for the sole purpose of disguisedly compelling the cashier to undercharge him (the customer). The researcher solves this problem by developing a novel robust encryption for price tags' barcodes and designing a database structure which keeps track of items that have been tagged recently.
The need for security in data communication is as long as mankind; since eavesdroppers often inte... more The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. Several techniques such as steganography and cryptography have been employed to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and steganography has proven to have taken data communication security to another level. In this work, a review of these techniques is presented with major focus on two journals titled " Dual Layer Security of Data Using LSB Image Steganography Method and AES Encryption Algorithm " [1] and " An Efficient Data Hiding Scheme Using Steganography and Cryptography Technique " [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques could improve security of data communication beyond the present levels if properly combined with little or no performance degradation.
The need for security in data communication is as long as mankind; since eavesdroppers often inte... more The need for security in data communication is as long as mankind; since eavesdroppers often intercept such communication for malicious purposes. Several techniques such as steganography and cryptography have been employed to hide the existence of communication and scramble such communication making it difficult to interpret in cases where steganography fails. Combining Cryptography and steganography has proven to have taken data communication security to another level. In this work, a review of these techniques is presented with major focus on two journals titled " Dual Layer Security of Data Using LSB Image Steganography Method and AES Encryption Algorithm " [1] and " An Efficient Data Hiding Scheme Using Steganography and Cryptography Technique " [2]were considered for review. A brief description of the techniques is provided. It is found that these techniques could improve security of data communication beyond the present levels if properly combined with litt...
Uploads
Papers by Bernard Ephraim