Papers by BENJAMIN OKIKE
Social Networking is a structure made up of individuals or organizations referred to as
nodes and... more Social Networking is a structure made up of individuals or organizations referred to as
nodes and is connected by one or more specific types of interdependencies. Such
interdependencies may include: friendships, kinships, sexual relationships, belief relationships,
knowledge, etc. Knowledge is a discovery or invention made by an individual or group. When this
knowledge is propagated so that others may learn it, then that may lead to scientific knowledge
which is the subject of this study. It is strongly believed that social networking sites are made
possible due to the existence of Information and Communication Technology (ICT). The study
intends to investigate the effects of social networking on scientific knowledge from research
works in Nigerian Universities with University of Abuja as the case study. The choice of the case
study is because only University of Abuja has fairly equal representations of students from every
nook and cranny of the Nigeria nation. The study deployed the administration of questionnaires to
collect data from students and staff who are involved in social networking as well as research
works. These data are analyzed to arrive at a conclusion.
Today, the Internet has made the world a global village in which one can in a blink of an eye rea... more Today, the Internet has made the world a global village in which one can in a blink of an eye reach out to someone in any other part of the world. Some of us from the third world countries have not fully deployed Information and Communication Technology (ICT) in our educational system for the purpose of teaching and learning. In cases where ICT facilities are available, high cost of these facilities are always problem. Even though, University of Abuja is located in Nigeria, which of course is a developing country, teaching and learning are often carried out using Internet facilities.
The protection of sensitive information against unauthorized access or fraudulent changes has bee... more The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques using computers connected through networks make all data even more vulnerable to these threats. The researchers in this work propose a new encryption technique to be known as Okike's Merged Irregular Transposition Cipher. In this proposed encryption technique, a message to be encrypted will first of all be split into multiple parts depending on the length of the message. After the split, different keywords are chosen to encrypt different parts of the message. After encrypting all parts of the message, the positions of the encrypted message could be swapped to other positions thereby making it very difficult to decrypt by any unauthorized user. The researchers intend to show the pattern of splitting sequence as the message deployed is split from 2 through 10. The result show that as the number of splits, S increase from 2 through 10, the number of swap positions, Z increase by factorial of S (S = Z!). The swapping of the positions of the encrypted message would further increase the complexity with which an adversary may take the decrypt such a message.
A model is a product (physical or digital) that represents a system of interest. A model is simil... more A model is a product (physical or digital) that represents a system of interest. A model is similar to but simpler than the system it represents, while approximating most of the same salient features of the real system as close as possible. A good model is a judicious trade-off between realism and simplicity. A key feature of a model is manipulability. A model can be a physical model (for example a physical architectural house scale model, a model aircraft, a fashion mannequin, or a model organism in biology research); or a conceptual model (for example a computer model, a statistical or mathematical model, a business model,
Teaching and learning in all aspects of education have taken a dramatic change all over
the world... more Teaching and learning in all aspects of education have taken a dramatic change all over
the world today due to the advent of the Internet. Before the Internet came into existence, teaching
and learning have always been carried out within classroom environments. But with the Internet,
teaching and learning may take place outside the classroom environments. The Internet has made
e-learning a reality because students may receive their lectures through the Internet irrespective
of geographic locations. Ideally, distance learning programmes are meant for people who are
engaged in some full-time jobs. These people may not easily leave their jobs for full-time programmes.
Often times, distance learning programmes are online in nature, hence they are usually referred
to e-learning. E-learning is one directional in nature and is usually teacher-centered. In other
words, the learners are passively involved in the learning process, and as such cannot make
contributions to the learning process in which they are directly involved. The learning process in
web 2.0 is participatory, hence both the teacher and the learner may engage in dialogue through
a web application. This makes the learning process an active one. This study will examine the
effect of web 2.0 on the teaching and learning processes of a developing country such as Nigeria’s
universities with emphasis on University of Abuja. In the study, questionnaires are to be randomly
distributed to teachers and students of University of Abuja to ascertain the effect of web 2.0 in the
teaching and learning processes within the university.Data to be collected will be analyzed in other
to find the effect of web 2.0 in the teaching and learning processes in the university.
— Today, many cryptographic algorithms exist that may be deployed to conceal cyberspace informati... more — Today, many cryptographic algorithms exist that may be deployed to conceal cyberspace information from unauthorized access. There is no doubt that some of these algorithms can easily be decrypted, there are others that may prove difficult decrypting. This work looks at a new encryption technique that may be used to encrypt information on the cyberspace from illegal accessors. This new technique deploys randomly generated numbers to encrypt information that may travel over the web. Because this new technique employs random numbers for its encryption process, it will be very difficult to decrypt.
Today, it has been observed that security of information along the superhighway is often compromi... more Today, it has been observed that security of information along the superhighway is often compromised by those who are not authorized to have access to such information. In other to ensure the security of information along the superhighway, such information should be encrypted by some means to conceal the real meaning of the information. There are many encryption techniques out there in the market. However, some of these encryption techniques are often decrypted by adversaries with ease. The researchers have decided to develop a new encryption technique that may be more difficult to decrypt. This may be achieved by splitting the message to be encrypted into parts and encrypting each part separately and swapping the positions before transmitting the message along the superhighway. The method is termed Okike's Merged Irregular Transposition Cipher. Also, the research would determine the complexity level in respect to the number of splits of the message.
All over the world today, there is a paradigm shift from the conventional method of banking for a... more All over the world today, there is a paradigm shift from the conventional method of banking for a technology-based method through the use of Information and Communication Technology (ICT). There is no doubt that the citizens of developed economies across the globe are already enjoying the full benefits of this new banking method generally referred to as electronic banking (e-banking). The same cannot be said of their developing economies counterparts who are still " struggling " to grasp the new banking method concepts. Nigeria as a developing nation has made a giant stride in the implementation of this new method of banking. In this work, the researchers investigated if the year of adoption of electron banking technology is dependent on bank customer's age. To achieve that, 300 questionnaires were randomly distributed to bank customers. Out of this, 269 questionnaires were returned representing 89.7% of the distributed questionnaires. Again, about 7% (21) of the returned questionnaires were invalid, thereby leaving a total analyzed questionnaire of 248, representing 82.7%. The Chi-square statistic tool was deployed for the analysis. The result of the analysis showed that the year of adoption of electronic banking technology is dependent of the age of the bank customers in the study.
— Encryption is used to conceal information from prying eyes. Presently, information and data enc... more — Encryption is used to conceal information from prying eyes. Presently, information and data encryption are common due to the volume of data and information in transit across the globe on daily basis. Image encryption is yet to receive the attention of the researchers as deserved. In other words, video and multimedia documents are exposed to unauthorized accessors. The authors propose image encryption using matrix transpose. An algorithm that would allow image encryption is developed. In this proposed image encryption technique, the image to be encrypted is split into parts based on the image size. Each part is encrypted separately using matrix transpose. The actual encryption is on the picture elements (pixel) that make up the image. After encrypting each part of the image, the positions of the encrypted images are swapped before transmission of the image can take place. Swapping the positions of the images is carried out to make the encrypted image more robust for any cryptanalyst to decrypt.
Okike's Merged Irregular Transposition Cipher is a new technique for enciphering information alon... more Okike's Merged Irregular Transposition Cipher is a new technique for enciphering information along the superhighway. In this method, a message to be transmitted along the superhighway is first split into parts and each part is encrypted separately before transmission occurs. The positions of the split encrypted messages may be swapped. This work deployed a message with approximately 58 characters to study the behavior of the error level as the message is split from 2 through 10. It was observed that as the number of split increases, the error level decreases. Similarly, the optimal split number occurs when the integer value of the error begins to repeat as is seen when the split number equals 8.
— Today, the word encryption has become very popular even among non-computer professionals. There... more — Today, the word encryption has become very popular even among non-computer professionals. There is no doubt that some works have been carried out in this area, but more works need to be done. Presently, most of the works on encryption is concentrated on the sender of the message without paying any attention to the message recipient. However, it is a good practice if any message sent to someone is received by the particular person whom the message is sent to. This work seeks to ensure that at the receiving end of the message, there is a security to ensure that the recipient computes a key that would enable the encrypted message to be accessed. This key would be in form of password. This would make it possible for a given message to be sent to several people at the same time. When this happens, it is only those people who computes the key correctly that would be given the opportunity to access even the encrypted message, which can in turn be decrypted using the appropriate key
There is need to hide information along the superhighway. Today, information relating to the surv... more There is need to hide information along the superhighway. Today, information relating to the survival of individuals, organizations or government agencies are transmitted from one point to another. Adversaries are always on the watch along the superhighway to intercept any information that would enable them to inflict psychological 'injuries' to their victims. But with information encryption, this can be prevented completely or at worst reduced to the barest minimal. There is no doubt that so many encryption techniques have been proposed and some of them are already being implemented. However, adversaries always discover loopholes on them to perpetuate their evil plans. In this work, we propose Enhanced Data Encryption Standard (EDES) that would deploy randomly generated numbers as an encryption method. Each time encryption is to be carried out, new set of random numbers would be generated, thereby making it almost impossible for cryptanalysts to decrypt any information encrypted with this newly proposed encryption method.
Books by BENJAMIN OKIKE
This book deploys Information and Communication Technology in reducing corruption not only in Afr... more This book deploys Information and Communication Technology in reducing corruption not only in Africa, but all countries of the world where corruption has stamped its "foot" on the ground. Corruption has been known to be one the major causes of underdevelopment in the world and underdevelopment has often led to crisis, war, hunger and diseases. Hence, any system that can check its occurrences will certainly be a boast to world peace since war in one of the world affects other parts of the world directly or indirectly.
In this work, the researchers introduced the concept of Information Security
by the application o... more In this work, the researchers introduced the concept of Information Security
by the application of firewall and encryption techniques. Also, the problem
of explicitly exposing information in transit is discussed. We developed
several algorithms. Among the algorithms are those of random sequence
and non-arithmetic sequence using modified generators for the problem to
secure information that may pass through intermediate computers linked in
the Internet. Some of these algorithms employ modified random generators
in a crucial way. In all, four applications are presented for our results:
Firstly, we show that generated random integers can represent the letters
of the alphabets in the encrypted information. This makes it possible for the
encrypted information not to be easily decrypted by cryptanalysts.
Secondly, it is shown that before encrypting information, such information is
split into parts, and each part encrypted separately using a different
keyword. Before sending the encrypted information out, the various parts
are combined into a single stream. Thirdly, it is also shown that the optimal
number of splits of information to encrypt could be obtained, and result
proves that the more the number of splits, the more complex the
information becomes to decrypt. Finally, our research finding shows that
encrypted information may be embedded in a computed decimal digit and
only revealed when corresponding accurate decimal digit is computed by
the information recipient.
Conference Presentations by BENJAMIN OKIKE
There is no doubt that societal progress in this era of information society is measured by the am... more There is no doubt that societal progress in this era of information society is measured by the amount of information available for access to the citizens of such societies. As a citizen of Nigeria, a country ranked as the world's most corrupt country by Transparency International, the reason why Africans are dwelling in the ocean of abject poverty is that less than one percent (1%) of the continent's citizens have access to information relating to the operations of their governments at all levels. Since African leaders are aware of this fact, they made embezzlement their watch words, thereby leaving the masses of their countries to live on their mercies by depending solely on them for their daily bread, shelter and clothing. We Nigerians have been adversely affected by the actions of our leaders both at present and in the past. This problem of no free access to information can be corrected by joining the global information society whereby information about the activities of government is readily available for access by interested members of the public. Funds that are usually siphoned by leaders of developing countries can be used to provide Internet infrastructures, which may positively contribute in no small measure to some qualitative research works in developing economies. This will in turn lead to the overall socioeconomic development of such countries.
Diversity may exist in several flavors. Diversities may be found in areas such as education, cult... more Diversity may exist in several flavors. Diversities may be found in areas such as education, culture, gender, language, socioeconomic backgrounds, religion, sexuality and ethnicity. While some of these differences can easily be handled without any problem, some others are very problematic and as such may need some levels of maturity and care to handle them to avoid them igniting crisis in a given society. The main aim of this work is to show the effect of the Internet on linguistic diversity in a developing country such as Nigeria and therefore suggest ways in which the Internet may be used as linguistics unifying factor.
Uploads
Papers by BENJAMIN OKIKE
nodes and is connected by one or more specific types of interdependencies. Such
interdependencies may include: friendships, kinships, sexual relationships, belief relationships,
knowledge, etc. Knowledge is a discovery or invention made by an individual or group. When this
knowledge is propagated so that others may learn it, then that may lead to scientific knowledge
which is the subject of this study. It is strongly believed that social networking sites are made
possible due to the existence of Information and Communication Technology (ICT). The study
intends to investigate the effects of social networking on scientific knowledge from research
works in Nigerian Universities with University of Abuja as the case study. The choice of the case
study is because only University of Abuja has fairly equal representations of students from every
nook and cranny of the Nigeria nation. The study deployed the administration of questionnaires to
collect data from students and staff who are involved in social networking as well as research
works. These data are analyzed to arrive at a conclusion.
the world today due to the advent of the Internet. Before the Internet came into existence, teaching
and learning have always been carried out within classroom environments. But with the Internet,
teaching and learning may take place outside the classroom environments. The Internet has made
e-learning a reality because students may receive their lectures through the Internet irrespective
of geographic locations. Ideally, distance learning programmes are meant for people who are
engaged in some full-time jobs. These people may not easily leave their jobs for full-time programmes.
Often times, distance learning programmes are online in nature, hence they are usually referred
to e-learning. E-learning is one directional in nature and is usually teacher-centered. In other
words, the learners are passively involved in the learning process, and as such cannot make
contributions to the learning process in which they are directly involved. The learning process in
web 2.0 is participatory, hence both the teacher and the learner may engage in dialogue through
a web application. This makes the learning process an active one. This study will examine the
effect of web 2.0 on the teaching and learning processes of a developing country such as Nigeria’s
universities with emphasis on University of Abuja. In the study, questionnaires are to be randomly
distributed to teachers and students of University of Abuja to ascertain the effect of web 2.0 in the
teaching and learning processes within the university.Data to be collected will be analyzed in other
to find the effect of web 2.0 in the teaching and learning processes in the university.
Books by BENJAMIN OKIKE
by the application of firewall and encryption techniques. Also, the problem
of explicitly exposing information in transit is discussed. We developed
several algorithms. Among the algorithms are those of random sequence
and non-arithmetic sequence using modified generators for the problem to
secure information that may pass through intermediate computers linked in
the Internet. Some of these algorithms employ modified random generators
in a crucial way. In all, four applications are presented for our results:
Firstly, we show that generated random integers can represent the letters
of the alphabets in the encrypted information. This makes it possible for the
encrypted information not to be easily decrypted by cryptanalysts.
Secondly, it is shown that before encrypting information, such information is
split into parts, and each part encrypted separately using a different
keyword. Before sending the encrypted information out, the various parts
are combined into a single stream. Thirdly, it is also shown that the optimal
number of splits of information to encrypt could be obtained, and result
proves that the more the number of splits, the more complex the
information becomes to decrypt. Finally, our research finding shows that
encrypted information may be embedded in a computed decimal digit and
only revealed when corresponding accurate decimal digit is computed by
the information recipient.
Conference Presentations by BENJAMIN OKIKE
nodes and is connected by one or more specific types of interdependencies. Such
interdependencies may include: friendships, kinships, sexual relationships, belief relationships,
knowledge, etc. Knowledge is a discovery or invention made by an individual or group. When this
knowledge is propagated so that others may learn it, then that may lead to scientific knowledge
which is the subject of this study. It is strongly believed that social networking sites are made
possible due to the existence of Information and Communication Technology (ICT). The study
intends to investigate the effects of social networking on scientific knowledge from research
works in Nigerian Universities with University of Abuja as the case study. The choice of the case
study is because only University of Abuja has fairly equal representations of students from every
nook and cranny of the Nigeria nation. The study deployed the administration of questionnaires to
collect data from students and staff who are involved in social networking as well as research
works. These data are analyzed to arrive at a conclusion.
the world today due to the advent of the Internet. Before the Internet came into existence, teaching
and learning have always been carried out within classroom environments. But with the Internet,
teaching and learning may take place outside the classroom environments. The Internet has made
e-learning a reality because students may receive their lectures through the Internet irrespective
of geographic locations. Ideally, distance learning programmes are meant for people who are
engaged in some full-time jobs. These people may not easily leave their jobs for full-time programmes.
Often times, distance learning programmes are online in nature, hence they are usually referred
to e-learning. E-learning is one directional in nature and is usually teacher-centered. In other
words, the learners are passively involved in the learning process, and as such cannot make
contributions to the learning process in which they are directly involved. The learning process in
web 2.0 is participatory, hence both the teacher and the learner may engage in dialogue through
a web application. This makes the learning process an active one. This study will examine the
effect of web 2.0 on the teaching and learning processes of a developing country such as Nigeria’s
universities with emphasis on University of Abuja. In the study, questionnaires are to be randomly
distributed to teachers and students of University of Abuja to ascertain the effect of web 2.0 in the
teaching and learning processes within the university.Data to be collected will be analyzed in other
to find the effect of web 2.0 in the teaching and learning processes in the university.
by the application of firewall and encryption techniques. Also, the problem
of explicitly exposing information in transit is discussed. We developed
several algorithms. Among the algorithms are those of random sequence
and non-arithmetic sequence using modified generators for the problem to
secure information that may pass through intermediate computers linked in
the Internet. Some of these algorithms employ modified random generators
in a crucial way. In all, four applications are presented for our results:
Firstly, we show that generated random integers can represent the letters
of the alphabets in the encrypted information. This makes it possible for the
encrypted information not to be easily decrypted by cryptanalysts.
Secondly, it is shown that before encrypting information, such information is
split into parts, and each part encrypted separately using a different
keyword. Before sending the encrypted information out, the various parts
are combined into a single stream. Thirdly, it is also shown that the optimal
number of splits of information to encrypt could be obtained, and result
proves that the more the number of splits, the more complex the
information becomes to decrypt. Finally, our research finding shows that
encrypted information may be embedded in a computed decimal digit and
only revealed when corresponding accurate decimal digit is computed by
the information recipient.