scispace - formally typeset
M

Michael Asante

Researcher at Kwame Nkrumah University of Science and Technology

Publications -  50
Citations -  157

Michael Asante is an academic researcher from Kwame Nkrumah University of Science and Technology. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 6, co-authored 36 publications receiving 97 citations. Previous affiliations of Michael Asante include Council of Scientific and Industrial Research.

Papers
More filters
Book

Deforestation in Ghana: Explaining the Chronic Failure of Forest Preservation Policies in a Developing Country

TL;DR: This book discusses the power and Dominance of Heads of Government and Politicians over the Ghanaian Forest Policy Process, and the Roles of Bureaucratic and non-Governmental Institutions in Determining the Outcome of the Forestry Policy Process.
Journal ArticleDOI

Growth, Nodulation, and Yield Responses of Groundnut (Arachis hypogaea L.) as Influenced by Combined Application of Rhizobium Inoculant and Phosphorus in the Guinea Savanna Zone of Ghana

TL;DR: The study observed a positive interaction between the rhizobium strains and P fertilizer, which had a significant interactive influence on the pod yield of groundnut.
Journal ArticleDOI

Improved approximated median filter algorithm for real-time computer vision applications

TL;DR: The introduction of Mid-Value-Decision-Median in DP reduces the chances of selecting corrupted pixel for denoised image and results indicate that the IAMFA-II has better running time and equivalent output compared with DP, while IAM FA-I generates better output and has equivalent running time when compared withDP.
Proceedings ArticleDOI

Encrypted Traffic Analytic using Identity Based Encryption with Equality Test for Cloud Computing

TL;DR: The concept of identity based encryption with equality test (IBEET) was used to propose a new scheme for malware detection and verifiability of encrypted data and was instantiated using Bilinear map and BilInear Diffie-Hellman assumption to define one-way chosen-ciphertext security against a chosen identity attack.
Journal ArticleDOI

Penetration Testing of IEEE 802.11 Encryption Protocols using Kali Linux Hacking Tools

TL;DR: In this article, the authors use penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (Wi-Fi2) security protocols.