M
Michael Asante
Researcher at Kwame Nkrumah University of Science and Technology
Publications - 50
Citations - 157
Michael Asante is an academic researcher from Kwame Nkrumah University of Science and Technology. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 6, co-authored 36 publications receiving 97 citations. Previous affiliations of Michael Asante include Council of Scientific and Industrial Research.
Papers
More filters
Book
Deforestation in Ghana: Explaining the Chronic Failure of Forest Preservation Policies in a Developing Country
TL;DR: This book discusses the power and Dominance of Heads of Government and Politicians over the Ghanaian Forest Policy Process, and the Roles of Bureaucratic and non-Governmental Institutions in Determining the Outcome of the Forestry Policy Process.
Journal ArticleDOI
Growth, Nodulation, and Yield Responses of Groundnut (Arachis hypogaea L.) as Influenced by Combined Application of Rhizobium Inoculant and Phosphorus in the Guinea Savanna Zone of Ghana
TL;DR: The study observed a positive interaction between the rhizobium strains and P fertilizer, which had a significant interactive influence on the pod yield of groundnut.
Journal ArticleDOI
Improved approximated median filter algorithm for real-time computer vision applications
TL;DR: The introduction of Mid-Value-Decision-Median in DP reduces the chances of selecting corrupted pixel for denoised image and results indicate that the IAMFA-II has better running time and equivalent output compared with DP, while IAM FA-I generates better output and has equivalent running time when compared withDP.
Proceedings ArticleDOI
Encrypted Traffic Analytic using Identity Based Encryption with Equality Test for Cloud Computing
TL;DR: The concept of identity based encryption with equality test (IBEET) was used to propose a new scheme for malware detection and verifiability of encrypted data and was instantiated using Bilinear map and BilInear Diffie-Hellman assumption to define one-way chosen-ciphertext security against a chosen identity attack.
Journal ArticleDOI
Penetration Testing of IEEE 802.11 Encryption Protocols using Kali Linux Hacking Tools
TL;DR: In this article, the authors use penetration testing to assess vulnerabilities and conduct attacks on Wireless Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and 802.11i (Wi-Fi2) security protocols.