Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm <p>VJSTM is a bi-annual Villanova Journal of Science, Technology and Management. The Journal is primarily concerned with publishing research articles, reviews, and innovations in diverse fields as Science, Engineering Technology and Management. Opinions espoused on any issue are that of the writer(s) and do not reflect the view of the Editorial Board. However, copyright on any article published here is vested in the publisher.</p> en-US ikee_mario@yahoo.com (Prof. Ikechukwu Anthony Kanu) Thu, 02 Jul 2020 23:15:56 +0000 OJS 3.1.2.4 http://blogs.law.harvard.edu/tech/rss 60 HYBRID DATA SECURITY: A REVIEW OF CRYPTOGRAPHY AND STEGANOGRAPHY TECHNIQUES https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_1 <p>As the use of computer networks and internet is ubiquitous, information security has become sizzling area of research in recent times. Data security is very crucial in exchange of information over computer networks because it secures the information from intruders. Although cryptography and steganography are two popular security mechanisms that could be used to provide data security, each of them has drawbacks. Cryptography encrypts the content of the message thereby making it difficult for intruders to fathom. Steganography on the other hand makes communication invisible, that is, message is embedded in a cover media in such a way that intruders cannot detect it existence. Cryptography problem is that, the cypher text looks meaningless, so the intruder can interrupt the transmission and use cryptanalysis to reveal the meaning of the message. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message has become known. Therefore, effort in this paper was directed at reviewing various types of cryptography and steganography techniques. Also, a hybrid data security model was proposed by combining cryptography and steganography to improve information security leveraging on the strengths of the two techniques. In the proposed model, plain message was first encrypted using Data Encryption Standard (DES) making it cypher text. Secondly, the encrypted message (cypher text) was hidden in an image using Least Significant Bit (LSB) technique. The proposed model provided an enhanced data security scheme as attacker will not be able to detect the existence of the message hidden in the image and if per chance the message is discovered, the attacker will still not be able to make meaning of the content because the message was encrypted.</p> M. O. Asanbe Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_1 Thu, 02 Jul 2020 22:58:52 +0000 RESTRUCTURING SCIENCE AND TECHNOLOGY EDUCATION TOWARDS ACHIEVING 2030 EDUCATION AGENDA FOR INDUSTRIALIZATION AND SUSTAINABLE DEVELOPMENT IN NIGERIA https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_2 <p>It has been observed that science and technology (S&amp;T) policies have not been a critical determinant of national development performance in Nigeria. Also, that Nigeria has not fully realized its national objectives of S&amp;T-driven rapid industrialization and development. It is in recognition of this fact that this paper is intended to stimulate discussion and recommendations related to why have science and technology education failed in its industrialization cum economic development objectives? Through extensive review of literatures, the paper recognizes that all is not well within science and technology education and that there are concerns related to its vision, its philosophy, its research, its approach, its teaching methodology and most definitely its way of meeting needs. It therefore recognizes that science and technology education must do more than simply pay „lip service‟ to industrialization for sustainable development and must focus learning on issues of relevance facing society. In order to reduce poverty and to achieve equitable and sustainable development, we have to develop industries that provide increased employment opportunities for all citizens. Therefore, the development of labor- intensive industries ought to be a central theme of development economics and a central focus of development policies. As a result of this, the paper identified some strategies for restructuring science and technology education in achieving 2030 education agenda for industrialization and sustainable development.</p> M.A. Bello Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_2 Thu, 02 Jul 2020 22:59:04 +0000 DEVELOPMENT OF ELECTRONIC TIME LOCK CONTROL FOR SECURITY SYSTEM https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_3 <p>The problems associated with production of electronic devices without corresponding locking system has been a serious concern in the security system. This paper looked into the development of electronic time lock control system in security system. Due to the fact that lives and property may be at stake, it is important to always have a reliable lock system, putting into consideration the high rate of crime and insecurity. The design is made of a keypad unit for entering the access time, a LCD that displays different messages at specific time, a door controller section made up of an H-bridge driver IC that controls the movement of the motor attached to the door and an alarm system that triggers when the conditions are bridged. The whole system is controlled by an AT89S52 microcontroller programmable IC. The setup allows the user to operate in real-time and also preserving the time data if the main power supply fails. The design is meant to prevent unauthorized person from having access to ones properties through the use of times and it‟s focused on security system for buildings, cars, safes, doors and gates.</p> E.O. Oni, A. Olawuni Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_3 Thu, 02 Jul 2020 22:59:10 +0000 CHALLENGES AND WAY OUT OF CYBER SECURITY ISSUES IN NIGERIA https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_4 <p>Cyber-space is a platform where you can process, receive and send information. It includes phone set, computer system, network, information stored on the network, network devices, all this constitute what is being called Cyber space. This cyber space is not secure, and the process to make it secure is known as Cyber Security. Cyber-crime refers to the series of organized crime attacking both cyber space and cyber security. The Internet is one of the fastest-growing areas of technical infrastructure development. Google, Wikipedia and Bing to mention a few, give detailed answers to millions of questions every day. Cyberspace is a world that contains just about anything one is searching for. With the advent of these advancements in information accessibility and the advantages and applications of the internet comes an exponentially growing disadvantage- Cyber Crime. Cyber security has risen to become a national concern as threats concerning it now need to be taken more seriously. This paper attempts to provide an overview of Cybercrime and Cyber-security. It defines the concept of cybercrime, identify reasons for cyber-crime and its eradication. It looks at those involved and the reasons for their involvement. Methods of stepping up cyber security and the recommendations that would help in checking the increasing rate of cyber-crimes were highlighted. The paper also attempts to name some bottleneck of cybercrime and present practical and logical solutions to these threats.</p> Dauda A. Adenusi, A. U. Adekunle, J.B. Ekuewa, O.R. Ayediran Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_4 Thu, 02 Jul 2020 22:59:27 +0000 NIGERIA‟S ELECTORAL SYSTEM IN NEED OF SCIENTIFIC UPGRADE FOR SMOOTH AND SUCCESSFULLY ACCEPTED OUTCOME. https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_5 <p>World-over, the conduct of general elections are made easier through the use of scientific and technological devices. Countries with greater populations around the world employ electronic means of voting and counting, such that elections are easily conducted with faster, credible and acceptable results. Nigeria has remained with its traditional system which is outdated, non-fashionable and crude manual devices. No doubt such elections results are bound to be unacceptable, and also contested at tribunals. Free, fair and credible electioneering processes might continue to elude Nigeria for years to come. On this platform, I wish to propose an establishment of scientific and technological methods be adopted in Nigeria. The case emanating from fraud elections, manipulation of voting processes and declaration of rigged results would lead to voter‟s apathy, it could result in violence and subsequent death of innocent people. More advanced countries with larger populations like India, Indonesia and United State of America etc conduct their elections electronically, the processes there are generally acceptable. They are devoid of manipulations. Why would Nigeria not adopt such scientific technological systems? Nigeria has grown over the years and has become the leading Nation in Africa, we stand as role models to smaller African countries, and ironically the level of our development has not been fully harnessed. Talents abound, human resources are plentiful and the push for our advancement are still untapped. This paper therefore, wishes to seek ways of improving our electioneering processes for more acceptable and credibly worked systems in Nigeria. This paper calls for an electronic voting process in Nigeria.</p> SYLVESTER ONMOKE Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_5 Thu, 02 Jul 2020 22:59:43 +0000 LIBRARY REFERENCE SERVICES BASED ON ARTIFICIAL INTELLIGENCE https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_6 <p>Libraries are commonly known for information acquisition and organization - for easy access. The third vital service rendered by the Library is the dissemination of the acquired information, which is more delicate than the acquisition services. Reference services fulfill this third library function which are especially, offered by Library Information Scientists. This arm of Library service, focuses on establishing prompt contacts between users and the right resources, thereby saving the research or searching time of the user. The advent of Digital Library Systems is known to have ignited the massive drift from the traditional library system, which is expected to influence the entire mode of Library service delivery. This further implies that Library Reference services now have to move from offering full human assistance to a digital solution. Data dissemination in the sphere of Information Technology (IT) has gone wild, especially with the implementation of Artificial Intelligence (AI). Since Libraries have decided to join the IT sphere, it is then expected to adopt such competitive dissemination technology for its Reference Services. Using Analytic induction - a model for qualitative research design, this study carefully examines Library reference services in relation to AI-based solutions for selective Information dissemination. The result of this study is a discussion on how AI, which has Machine Learning paradigm underneath, can now be tuned to Knowledge Assimilation and Dissemination agents in an academic digital Library.</p> CATHERINE HONGHAI GYANG Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_6 Thu, 02 Jul 2020 23:14:15 +0000 AMADIOHA AS A PREFIGURATION OF CHRIST IN IGBO TRADITIONAL RELIGION: TOWARDS THE MANAGEMENT OF RELIGIOUS DIVERSITY https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_7 <p>This paper is a comparative study of Amadioha known as the son of Chineke, and sometimes referred to as the husband of Ala in Igbo traditional religion, with the person of Jesus Christ, the Son of God and the Second Person of the Most Holy Trinity of the Christian religion. The comparative method of investigation is, therefore, employed to investigate the possibility of relationships between Amadioha in Igbo Religion and Jesus Christ. It strongly asserts that certain similarities exist between Amadioha worshipped among the Igbo before the advent of Christianity, and Jesus Christ of the Christian religion. While it does not in any way attempt at equating Amadioha with Jesus Christ, this paper believes that Amadioha, rather being thrown to the background as a pagan deity can be understood as an imperfect expression of Christ given to the Igbo in preparation for the revelation of Christ. Christ would have been more comprehensible to the Igbo if the missionaries to move from the understanding of Amadioha to the understanding of Jesus Christ, rather than presenting the gospel message as an entirely new message to the Igbo. Catechesis always make more impact if it begins from what the people know to what they do not know.</p> Ikechukwu Anthony Kanu Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_7 Thu, 02 Jul 2020 23:14:31 +0000 PERFORMANCE EVALUATION OF DISCRETE COSINE TRANSFORM (DCT) AND PRINCIPAL COMPONENTS ANALYSIS (PCA) FOR FINGERPRINT RECOGNITION SYSTEMS. https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_8 <p>Fingerprint recognition is the oldest biometric technique that criminal science has been using for more than 150 years. A typical fingerprint includes several singular points called minutiae (generally a number from 12 to 30) [1]. These specific points correspond to the places of ending, bifurcation or crossover of ridges and valleys of the finger. Extraction of the relative positions and orientations of these minutiae allows creating a specific signature for each user guaranteeing a secured identification. Conflicting report on the performance of the most widely adopted feature extraction techniques for fingerprint recognition remain an open challenge. Hence, this paper sets to conduct the performance of DCT and PCA for fingerprint recognition. The system was designed using MATLAB R2009b programming studio, Fingerprint images were acquired, the acquired images was compressed by breaking it into 8 X 8 blocks of pixels, working from left to right and top to bottom, the DCT was applied to each block to remove the redundancy between neighboring pixels. Each block is compressed through quantization. The array of compressed blocks that constitutes the image is stored in a drastically reduced amount of space. Training phase and testing phase was carried out on both processes of Discrete Cosine Transform (DCT) and Principal component Analysis (PCA) to obtain the time taken for both training and testing of the images, with 70*70, 75*75, 80*80, 85*85 as image resolution. The results show that the DCT exploits interpixel redundancies to render excellent decorrelation for most natural images</p> Mary Ponle Olagunju Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_8 Thu, 02 Jul 2020 23:14:47 +0000 TECHNOLOGY IN ENTREPRENEURSHIP MANAGEMENT https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_9 <p>Technology in entrepreneurship is an investment in a project that assembles and deploys specialized individuals and heterogeneous assets to create and capture value for the firm. Technology entrepreneurship lies at the heart of any important debates including those around and growing firms, regional economic development, selecting the appropriate stakeholders to take ideas to markets, and educating managers, engineering and scientists. This work is carried out in a way to identify the themes that dominate the technology entrepreneurship literature. This study provides a definition of technology entrepreneurship. What distinguishes technology entrepreneurship from other entrepreneurship types (e.g.) social entrepreneurship, small business management, and self-employment which is the collaborative experimentation and production of new products, assets, and their attributes, which are related to advances in scientific and technological knowledge and the firms asset ownership right.</p> B.O. Oni Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_9 Thu, 02 Jul 2020 23:15:08 +0000 THE IGBO-AFRICAN KOLA NUT AS A „TYPE‟ OF HOLY COMMUNION: TOWARDS THE MANAGEMENT OF CULTURAL DIVERSITY https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_10 <p>This paper is a comparative study of two major elements of worship from two major religions: African traditional religion and Christianity. The comparative method of investigation is, therefore, employed to study the relationship between the Igbo kola nut and the Christian Holy Communion. It strongly asserts that the Igbo kola nut, having been studied alongside the Christian Holy communion, is the Igbo Holy Communion in Igbo traditional religion. While it does not in any way equate the Igbo kola nut with the Holy Communion, it believes that the Igbo kola nut can be understood within the parameters of a typology of the Christian Holy Communion given to Ndi‟gbo as a preparation for the gospel message. As already indicated, the method of research employed in this work is the comparative method of investigation, with an ascension theory, which heavily emphasizes that for evangelization to be fruitful, pastoral agents need to begin from what the people know to what they do not know. In this case, from the kola nut as a „type‟, a „copy‟, a „shadow‟ to the Holy Communion as its fullness.</p> Ikechukwu Anthony Kanu Copyright (c) 2020 Villanova Journal of Science, Technology and Management https://acjol.org/index.php/vjstm/article/view/vjstm_v2n1_10 Thu, 02 Jul 2020 23:15:17 +0000