KTU Repository

Browsing Computer Science Department by Issue Date

Browsing Computer Science Department by Issue Date

Sort by: Order: Results:

  • Mohammed, Adamu Mustapha; Alornyo, Seth; Asante, Michael; Essah, Obo Bernard (ADRRI JOURNAL OF ENGINEERING AND TECHNOLOGY, 202)
    IoT devices have fundamental security flaws that leave them open to a variety of security threats and attacks, including attacks from botnets. Therefore, creators of botnets continue to take advantage of the security ...
  • Alornyo, Seth; Mohammed, Adamu Mustapha; Botchey, Francis; Agbesi, Colin M. Collinson (Advances in Science, Technology and Engineering Systems Journal, 2020)
    his paper is an extension of a research work presented at ICSIoT 2019. An attack continuum against the insider attack in mobile money security in Ghana using a witness based crypto graphic method proposed by Alornyo et ...
  • Alornyo, Seth; Mohammed, Adamu Mustapha; Kodzo, Anibrika Selorm Bright; Sarpong, Akwasi Pious; Asante, Michael (Scientific Research Publishing, 2020)
    Parallel key-insulation allows the use of multiple helper keys to protect pri vate decryption keys during secret decryption key updates. This approach prevents decryption key leakage or exposure in insecure environment. ...
  • Alornyo, Seth; Mireku, Kingsford Kissi; Mohammed, Mustapha Adamu; Adu‑Gyamf, Daniel; Asante, Michael (Research Article, 2021)
    Key-insulated encryption reduces the problem of secret key exposure in hostile setting while signcryption cryptosystem attains the benefts of digitally signing a ciphertext and public key cryptosystem. In this study, we ...
  • Alornyo, Seth; Mohammed, Adamu Mustapha; Anibrika, Selorm Bright; Asante, Michael (SN Computer Science, 2021)
    This work is an extension of a research work presented at ICSIoT 2019. A suggested cryptographic primitive by Carnard et al. 2012 permits the checkability of a plaintext to a ciphertext to determine whether the ciphertext ...
  • Mohammed, Adamu Mustapha; Asante, Michael; Alornyo, Seth; Essah, Obo Bernard (Research Gate, 2022)
    A major risk associated with internet usage is the access of websites that contain malicious content, since they serve as entry points for cyber attackers or as avenues for the download of files that could harm users. ...
  • Mohammed, Adamu Mustapha; Asante, Michael; Alornyo, Seth; Essah, Obo Bernard (Iran Journal of Computer Science, 2023)
    Currently, Android is the most widely used mobile operating system globally. This platform has become a target for malware activities due to its technological and user appeal, open-source code, and the possibility of ...
  • Mohammed, Mustapha Adamu; Obeng, Bismark; Alornyo, Seth; Asante, Michael; Obo Essah, Bernard (transaction on data analysis and forecasting, 2023)
    Melanoma, a high-level variant of skin cancer, is very difficult to distinguish from other skin cancer types in patients. The presence of a large variety of sizes of lesions, fuzzy boundar ies, their irregular-shaped ...
  • AMANOR, MICHAEL (2023-09)
    The School Management System is an all-inclusive software program created to transform academic management procedures and educational administration in educational establishments. An overview of the system, its ...
  • ARHIN, PAUL (2023-09)
    The Online Learning Platform emerges as a disruptive answer in the ever-changing landscape of education. The goal of this project is to design and build a dynamic online learning environment for the Computer Science ...
  • AWUAH, SMITH JUNIOR (2023-10)
    Transportation hubs, serves as a vital transit point for various cargo and passenger services however, the current package delivery processes at various stations often lack organization, leading to delays, loss, and ...
  • TIEKU-DADEY, KWAKU (2023-10)
    In light of a rapid digital evolution, Ghana has experienced an unprecedented digital device adoption. With an estimated market share of 75.82%, the Android OS dominates the country's digital landscape. This research ...
  • QUAYE, SAMUEL NEE KWEIKUMA (2023-10)
    Satellite dish communication enables long-distance communication, including television broadcasting, internet connectivity, and telecommunication services. However, it faces challenges such as signal interference, ...
  • AMFO, DANIEL (2023-10)
    This study examines the prevalence and influencing factors of sports betting behavior among students at Koforidua Technical University in September 2023. Through extensive data analysis, the research unveils that sports ...
  • KABU, LETICIA MAMLEY; EPHRAIM, GYAMFI DASEY (2023-10)
    Advancements in technology have revolutionized various industries, including the management of fuel resources. A fuel management system plays a crucial role in efficiently tracking and managing fuel usage, inventory, and ...
  • TIZAANIBENI, ABUBA SILAS (2023-10)
    The research focuses on cloud computing as a better means of IT outsourcing. It provides an analytical framework for the nature of cloud computing, its characteristics, and its source models. It also provides a detailed ...
  • Anab, Solomon; Mensah, Godbless; Baagyere, Yellakuor Edward; Mohammed, Adamu Mustapha (International Journal for Multidisciplinary Research (IJFMR), 2024)
    From security systems to human-computer interaction, face recognition technology is a key component in many different applications. In this domain, the Local Binary Pattern Histogram (LBPH) algorithm has shown great ...
  • AGYEI, FRANCIS (2024-10)
    Most people who apply for admission into Koforidua Koforidua Technical University are not offered their programme of choice because they lack the necessary knowledge about their program requirements, The primary aim ...

Search KTU-IR


Advanced Search

Browse

My Account