Babcock Hosts Third International Conference on ICET

Babcock Hosts Third International Conference on ICET

The third international conference on intelligent computing and emerging technologies (ICET) has ended in Babcock University with a call on IT experts to begin to use global innovations to solve local problems.Speaking at the conference with the theme, Global Innovations in Information Technology for Sustainable Development, President of Computer Professional Registration Council of Nigeria (CPN) Professor Charles Uwadia said while innovations in ICT for sustainable development should be global, especially for branding, researches should focus more on solving problems locally.

He congratulated the University for sustaining the conference, which he said CPN would continue to give her support.Professor Uwadia singled out the school of computing and engineering sciences of Babcock University for maintaining a mutually rewarding relationship with the council over the years.‘The council is happy with Babcock University’s School of Computing and engineering sciences for not giving us problems like other universities,” he said.

Also speaking, President/ Vice Chancellor, Professor Ademola Tayo agreed that there could never be any sustainable development without the application of information technology. This, according to him, implied that the collaboration of all experts to forge ahead in information technology world in Africa.He commended both Nigeria Computer Society (NCS) and CPN for continuous support toward the hosting of the conference and partnering the University to bring about a sustainable development in information technology.

He added that the University was ready to enter into any partnership that would meet human capital needs of the country.Keynote speaker, Professor Atul Gonsai of Saurahtra University, Rajkot, India, said modern mobile phones are now configured like computers with CPU to encrypt and decrypt data at full network bandwidth with more than usual algorithms.He said to encrypt, is to secure information electronically using a key, while to decrypt, is to use the key to unlock the information.

In his paper, Design and Development of Audio Encryption Algorithm for Secure Communication,Professor Gonsai proposed the use of blowfish algorithms to en-sure that calls from mobile station to base station are fully secured beyond one base station.“In the GSM market currently, data is secured from the mobile terminal to base station, after that it is open on the network,” he stated.Dean of the School of Computing and Engineering Sciences, Professor Oludele Awodele said the conference aimed at bringing together information administrators, professionals, entrepreneurs, re-searchers and students to discuss and engage in an active and inter-active atmosphere.