About
13
Publications
3,939
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
35
Citations
Current institution
Cktutas
Current position
- Senior lecturer
Publications
Publications (13)
This study examines computer based record keeping systems among small and medium sized enterprises (SMEs) in the Obuasi Municipality of Ghana. The study surveyed 200 SME owners or managers in the municipality with three years or longer operating history, using purposive random sampling. Furthermore, the study employed both open and closed-ended que...
The transformation of payment systems in the digital age has reshaped the way customers interact with businesses. This study, conducted at Melcom Mall in Bolgatanga, Upper East Region, Ghana, delves into ”Customer Preference for Electronic Payment Systems for Goods.” Through extensive surveys and analysis, this paper reveals critical insights into...
In the era of the Knowledge Economy, Intellectual Property Rights (IPRs) have become a crucial aspect of the twenty-first-century environment. Software piracy, characterized by the unauthorized copying, downloading, sharing, selling, or installation of copyrighted software, remains a serious problem worldwide, and Ghana is no exception. Various for...
The safety of pupils is of uttermost concern to school authorities and especially parents in this age of
rampant kidnappings and other malicious activities by unscrupulous people within the human ecosystem.
In this paper, a robust security system, referred to as a Parent Authentication System (PAS) is designed
and implemented using bi-modal authent...
The rapid expansion in Technology has transformed our everyday objects into interconnected entities, globally changing connectivity through the Internet and reshaping human interactions with their surroundings. This paradigm shift has occasioned the need for various networked infrastructures to facilitate and improve innovative services as well as...
Secure communication is most effective when it is covert. In the realm of covert communication, steganography conceals secret message within a cover medium. This ensures that adversaries who have access to this carrier medium are unaware of the existence of the secret message. This paper proposes a novel twin K-Shuffling and embedding technique tha...
Loss distribution plays an influential role in evaluating risks from policyhold-ers' claims. Nevertheless, the auto insurance market in Ghana pays little attention to policyholders' claims distribution, resulting in the market's inefficiency. This study investigates the type of loss distribution function that best approximates policyholders' claims...
The unprecedented financial and economic ledger performing bitcoin is continuously suffering from anonymity troubles. In bitcoin framework, users as nodes submit coins publicly in which transactions lead to privacy breaches resulting from recurrent attacks by malicious and/or dishonest nodes. Thereby, introducing anonymity into bitcoin transaction...
The study sought to establish some algebraic properties of the Chinese Remainder
Theorem. The Chinese Remainder Theorem is an ancient but important mathematical
theorem that enables one to solve simultaneous equations with respect to
different modulo and makes it possible to reconstruct integers in a certain range
from their residues modulo to the...
As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to allay public fears during communication. This paper expands the scope of audio data security via an enhanced genet...
Medical images naturally occur in smaller quantities and are not balanced. Some medical domains such as radiomics involve the analysis of images to diagnose a patient’s condition. Often, images of sick inaccessible parts of the body are taken for analysis by experts. However, medical experts are scarce, and the manual analysis of the images is time...
Data encryption is very important to the security of information or valuable data. The need for highly secured communication through a transmission medium is of paramount interest, recognizing the fact that most of our business and personal matters are involved. A new highly secured data encryption technique is proposed in this study. The residue n...