• Home
  • Gabriel Kofi Armah
Gabriel Kofi Armah

Gabriel Kofi Armah
  • Senior lecturer at Cktutas

About

13
Publications
3,939
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
35
Citations
Current institution
Cktutas
Current position
  • Senior lecturer

Publications

Publications (13)
Article
Full-text available
This study examines computer based record keeping systems among small and medium sized enterprises (SMEs) in the Obuasi Municipality of Ghana. The study surveyed 200 SME owners or managers in the municipality with three years or longer operating history, using purposive random sampling. Furthermore, the study employed both open and closed-ended que...
Article
Full-text available
The transformation of payment systems in the digital age has reshaped the way customers interact with businesses. This study, conducted at Melcom Mall in Bolgatanga, Upper East Region, Ghana, delves into ”Customer Preference for Electronic Payment Systems for Goods.” Through extensive surveys and analysis, this paper reveals critical insights into...
Article
Full-text available
In the era of the Knowledge Economy, Intellectual Property Rights (IPRs) have become a crucial aspect of the twenty-first-century environment. Software piracy, characterized by the unauthorized copying, downloading, sharing, selling, or installation of copyrighted software, remains a serious problem worldwide, and Ghana is no exception. Various for...
Article
Full-text available
The safety of pupils is of uttermost concern to school authorities and especially parents in this age of rampant kidnappings and other malicious activities by unscrupulous people within the human ecosystem. In this paper, a robust security system, referred to as a Parent Authentication System (PAS) is designed and implemented using bi-modal authent...
Article
The rapid expansion in Technology has transformed our everyday objects into interconnected entities, globally changing connectivity through the Internet and reshaping human interactions with their surroundings. This paradigm shift has occasioned the need for various networked infrastructures to facilitate and improve innovative services as well as...
Article
Full-text available
Secure communication is most effective when it is covert. In the realm of covert communication, steganography conceals secret message within a cover medium. This ensures that adversaries who have access to this carrier medium are unaware of the existence of the secret message. This paper proposes a novel twin K-Shuffling and embedding technique tha...
Article
Full-text available
Loss distribution plays an influential role in evaluating risks from policyhold-ers' claims. Nevertheless, the auto insurance market in Ghana pays little attention to policyholders' claims distribution, resulting in the market's inefficiency. This study investigates the type of loss distribution function that best approximates policyholders' claims...
Article
Full-text available
The unprecedented financial and economic ledger performing bitcoin is continuously suffering from anonymity troubles. In bitcoin framework, users as nodes submit coins publicly in which transactions lead to privacy breaches resulting from recurrent attacks by malicious and/or dishonest nodes. Thereby, introducing anonymity into bitcoin transaction...
Article
Full-text available
The study sought to establish some algebraic properties of the Chinese Remainder Theorem. The Chinese Remainder Theorem is an ancient but important mathematical theorem that enables one to solve simultaneous equations with respect to different modulo and makes it possible to reconstruct integers in a certain range from their residues modulo to the...
Article
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to allay public fears during communication. This paper expands the scope of audio data security via an enhanced genet...
Article
Full-text available
Medical images naturally occur in smaller quantities and are not balanced. Some medical domains such as radiomics involve the analysis of images to diagnose a patient’s condition. Often, images of sick inaccessible parts of the body are taken for analysis by experts. However, medical experts are scarce, and the manual analysis of the images is time...
Article
Full-text available
Data encryption is very important to the security of information or valuable data. The need for highly secured communication through a transmission medium is of paramount interest, recognizing the fact that most of our business and personal matters are involved. A new highly secured data encryption technique is proposed in this study. The residue n...

Network

Cited By