There has been a reduction in the numbers of Dressmaking/Tailoring apprenticeship in Koforidua, Ghana. Masters and
Mistresses in tailoring and dressmaking industry complain of the lack of workers to help them meet their ...
Ghann, Patricia; laryea, Samuel Afotey; Owiredu, Joseph Ohene; Bonsu, Priscilla; Kabu, Leticia Mamley; Tornyie, Michael(2022-08-16)
Using passwords, pin-codes, facial recognition, voice recognition, and the OTP (One Time Password) two
way veri cation protocol, work ne but are subject to easy access due to human errors. Thus, it is very
easy for a ...
Computer and information technology has evaded
our every aspect of life. Information technology is seen in all
aspect of the individual from banking and investing to
shopping and communicating through the use of the ...
Information Technologies have come to be accepted as the new normal in many parts of the world. Events
like the outbreak of the COVID-19 have highlighted the significance of these artifacts in facilitating the
continuance ...
Ghann, Patricia; Owiredu, Joseph; laryea, Samuel Afotey(Research Square, 2022-10-28)
Crimes committed via the internet and other electronic media are a growing threat and an important
subject to most organizations. This is because most organizations rely on the internet to provide services
to customers. ...
Access and usage control is a major challenge in information and computer security in a distributed network connected
environment. Many models have been proposed such as traditional access control and UCONABC. Though ...
We propose an algorithm for generating mutant policies based on XACML Context Schema, known as Change
Rule and Swap Rule Algorithm (CRSR). Compared to other testing techniques and tools for testing access control policies,
...
Advancement in technology comes with several opportunities and issues. Organizations are able to move
their businesses online to reach a greater number of potential customers. Security and privacy in
cyberspace are ...
Organizations now deal with massive amounts of data. Data
is collected from various points such as hospitals, credit card companies, and
search engines. After collecting this voluminous data, it is published and shared ...
Faced with the growing risks of weather and climate disasters to economic and social
development, the global community needs to act quickly to strengthen National Meteorological
and Hydrological Services. This strengthening ...
This paper proposes a model for enhancing privacy and security in cloud computing known as the Covenant Code
Exchange (CCE). The model is proposed as part of the Service Level Agreement (SLA) for cloud providers and users ...
Education helps in creating innovations and meeting the growing needs of every nation. Thus, the
development of a nation can be ascribed to its educational system: not through the buildings it has
put up, the roads ...
Information Communication Technology (ICT) is advancing
with rapid development aimed at offering quality education among learners to
ensure satisfaction as well as convenience. With the devastating effects of the ...
To solve the issues of restricted access to virtual learning environments and improve online
learning experiences, Koforidua Technical University's Computer Science Department is
developing a mobile application for a ...
The INTELLIGENCE SURVEILLANCE IMPLEMENTATION SYSTEM (ISIS)
project endeavors to enhance security measures and monitoring
capabilities within the Computer Science Department at Koforidua
Technical University (KTU). ...
Blockchain technology has the potential to completely transform the travel and hospitality
sectors by improving efficiency, security, and transparency across a wide range of operations.
This study investigates how ...
E-banking, the electronic delivery of banking services, has revolutionized the financial industry by providing convenient access to accounts and transactions. This study examines the relationship between e-banking and ...
The Anime Recommendation System is a sophisticated application focused on
improving the anime viewing experience through personalized recommendations
that align with each user's unique tastes. In contrast to existing ...
A ONLINE CAR RENTAL MANAGEMENT SYSTEM is to make tour planning,
organization and execution as seamless and excellent experience as
possible for both tour operators and tourists to improve customer
happiness given the ...
This work is an extension of a research work presented at ICSIoT 2019. A suggested cryptographic primitive by Carnard
et al. 2012 permits the checkability of a plaintext to a ciphertext to determine whether the ciphertext ...