Publications
-
Oppong, O. S, Twum, F., Hayfron-Acquah, J. B, Missah, Y. M, "A Novel Computer Vision Model for Medicinal Plant Identification Using Log-Gabor Filters and Deep Learning Algorithms", Computational Intelligence and Neuroscience (HINDAWI), vol. 2022, Article ID 1189509, 21 pages, 2022. https://doi.org/10.1155/2022/1189509
- Twum, F., Lagoh E. M., Missah, Y. M., Ussiph, N., Ahene, E. (2022). Cold Boot Attack on Encrypted Containers for Forensic Investigations. Korean Society for Internet Information - Transactions on Internet and Information Systems (KIIS-TIIS).16(9)
- Twum, F., Missah, Y. M., Oppong, O. S., Ussiph, N. (2022). Textural Analysis for Medicinal Plants Identification Using Log Gabor Filters. IEEE Access, DOI: 10.1109/ACCESS.2022.3196788
- Twum, F., Amankona V., Missah, Y. M., Ussiph, N., Opoku, M. (2022). Implementation of a Data Protection Model dubbed Harricent_RSECC. International Journal of Advanced Computer Science and Applications (IJACSA), 13(5), pp. 133 – 145
- Dawson J. K., Twum, F., Hayfron-Acquah, J. B., Missah, Y., Ayawli, B. K. (2022). An Enhanced RSA Algorithm Using Gaussian Interpolation Formula. International Journal of Computer Aided Engineering and Technology, 16(4), pp. 534 – 552
- Teye, M.T., Missah, Y. M., Ahene, E., Twum, F. (2022). Ethical Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection. IEEE Access, Vol 10, pp.24976-24984 DOI: 1109/ACCESS.2022.3153787
- Appiah, J., Missah, Y. M., Amekudzi, L., Ussiph, N., Twum, F., Ahene, E. (2022). Rainfall Prediction Using Machine Learning Algorithms for the Various Ecological Zones of Ghana. IEEE Access, 10, pp. 5069 – 5082. DOI: 1109/ACCESS.2021.3139312
- Oppong, S.O., Twum, F., Hayfron-Acquah, J. B. (2022). Medicinal Plant Identification Using Log Gabor Filters and Deep Learning Algorithms. Journal of Computer Science, 17(12), pp. 1210 – 1221. DOI: https://doi.org/10.3844/jcssp.2021.1210.1221
- Amankona V. Twum, F. Hayfron-Acquah, J. B. (2021). ‘A Framework for Securing Data by using Elliptic Curve Cryptography (ECC) and Reed Solomon (RS) Coding Schemes’, Proceedings of the International Conference on Electrical, Computer and Energy Technologies (ICECET). 9-10 December 2021, Cape Town-South Africa. IEEE Xplore. DOI: 1109/ICECET52533.2021.9698759
- Asante, K., Twum, F., Missah, Y. M., Asante, M. (2021). ‘Network-Centric Optimal Hybrid Mobility Scheme for IPv6 Wireless Sensor Networks’, Proceedings of the International Conference on Electrical, Computer and Energy Technologies (ICECET). 9-10 December 2021, Cape Town-South Africa. IEEE Xplore. DOI: 1109/ICECET52533.2021.9698636
- Oppong, S.O., Twum, F., Hayfron-Acquah, J. B., Missah, Y. M. (2021). ‘Hybrid Approach to Medicinal Plant Leaf Image Enhancement using Contrast Limited Adaptive Histogram Equalization and Homomorphic Filter’. Proceedings of the International Conference on Electrical, Computer and Energy Technologies (ICECET). 9-10 December 2021, Cape Town-South Africa. IEEE Xplore. DOI: 10.1109/ICECET52533.2021.9698460
- Ahene, E., Ofori-Oduro, M., Twum, F., Walker, J., Missah, Y. M. (2021). Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems. MDPI Sensors, 21(8245), pp 2-12. DOI: 10.3390/s21248245
- Inusah, F., Missah, Y. M., Ussiph, N.,Twum, F. (2021). Expert System in Enhancing Efficiency in Basic Educational Management using Data Mining Techniques. International Journal of Advanced Computer Science and Applications (IJACSA), 12(11), pp. 427 – 434. (DOI): 14569/IJACSA.2021.0121148
- Kattah M., Asamoah D., Twum F., Evaluating the Impact of Full Virtualized High-Performance Computing Platform on Large Scale Scientific Data using Quantum Espresso., International Journal of Computer Applications 177, No. 37, pp. 10-14, February 2020.
- Twum F., Hayfron-Acquah J. B, Panford J.K. A comparative study of existing cloud security system models as against an implementation of the CDDI model dubbed SecureMyFiles system., International Journal of Computer Applications177, No. 31, pp. 17-37, January 2020.
- Sayibu U., Twum F., Baako I., Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana. International Journal of Computer Network and Information Security, No. 11, pp 46-59, November 2019.
- Mohammed Tee A. B., Asante M., Twum F., An Improved VoIP using Adaptive Multivariate Encoder (AMR). International Journal of Computer Applications, Vol. 178, No. 51, pp 23-32, September 2019.
- Twum F., Hayfron-Acquah J. B, Panford J.K. A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption, International Journal of Computer Applications, Vol. 181, No. 50, pp. 38-49, April 2019.
- Twum F., Hayfron-Acquah J. B, Morgan-Darko W., A Proposed Enhanced Transposition Cipher Algorithm Based on Rubik’s Cube Transformations, International Journal of Computer Applications, Vol. 182, No. 35, pp 18-26, January 2019.
- Ahulu B., Twum F, Hayfron-Acquah J. B., Mapping cases of Tuberculosis Distribution and Treatment Outcomes using Geographical Information Systems – The case of Birim Central Municipality, E/R, Ghana. International Journal of Computer Applications, Vol. 182, No. 35, pp 45-54, January 2019.
- Ibrahim, U.; Hayfron-Acquah, J. B.; Twum, F. Comparative Analysis of Codeigniter and Laravel in relation to Object-Relational Mapping, Load Testing and Stress Testing. International Research Journal of Engineering and Technology (IRJET). Vol. 5, No. 2, 2018
- Boahen E. K., Hayfron-Acquah J. B., and Twum F., An Enhanced Elliptic Curve Cryptosystem for Securing Data, International Journal of Computer Applications, Vol. 182, No. 9, pp 47-53, August 2018.
- Oppong-Twum F.,Twum F., Hayfron-Acquah J. B., Binary Image Segmentation through the Carl Friedrich Gauss Equation, International Journal of Computer Applications, Vol. 179, No. 41, pp 1-9, May 2018.
- Agbedanu P. R., Hayfron-Acquah J. B., and Twum F., Mitigating computer attacks in a corporate network using honeypots: A case study of Ghana Education Service, International Journal of Computer Applications, Vol. 180, No. 32, pp. 18-22, April 2018.
- Terkper J. N, Hayfron-Acquah J. B., Twum F. An Efficient and Secure One-Way Cryptographic Hash Function with Digest Length of 1024 Bits, International Journal of Computer Science and Information Security, Vol 15, No. 2, February 2017
- Okoampa-Larbi R.,Twum F., Hayfron-Acquah J. B., A proposed cloud security framework for service providers in Ghana, International Journal of Computer Applications, Vol. 158, No. 1, pp 17-22, January 2017.
- Twum, F., Hayfron-Acquah J. B., Oblitey W. W., Morgan-Darko W., Reed-Solomon Decoding Simplified for Programmers, International Journal of Computer Science and Information Security, Vol 15, No. 1, January 2017
- Twum F., Hayfron-Acquah J. B., Oblitey W. W., Boadi R. K., A proposed algorithm for generating the Reed-Solomon Encoding Polynomial Coefficeints over GF(256) for RS[255,223]8,32, International Journal of Computer Applications, Vol. 156, No. 1, pp 24-39, December 2016.
- Twum, F., Hayfron-Acquah J. B., Oblitey W. W., Morgan-Darko W., Reed-Solomon Encoding: Simplified for Programmers, International Journal of Computer Science and Information Security, Vol 14, No. 11, November 2016
- Akpah S., Asante, M., Twum, F., An Improved Computer Network Access Control Using FREE BSD PFSENCE, Communications on Applied Electronics, Vol. 6, No. 1, October 2016
- Apau R., Hayfron-Acquah, J. B., Twum, F., A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithm, Communications on Applied Electronics, Vol. 5, No. 10, September, 2016
- Obaweya O., Hayfron-Acquah J. B., Twum F. Performance Enhancement of 4G Networks Using Network Coding, International Journal of Computer Science and Information Security, Vol 14, No. 8, August 2016
- Safianu O., Twum F., Hayfron-Acquah J. B., Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection, International Journal of Computer Applications, Vol. 143, No. 5, pp 8-14, June 2016.
- Apau R., Hayfron-Acquah J. B., Twum F., Enhancing Data Security using Video Steganography, RSA, and Huffman Code Algorithm with LSB Insertion, International Journal of Computer Applications, Vol. 143, No. 4, pp 28-36, June 2016.
- Yeng P. K, Panford J. K., Hayfron-Acquah J. B., Twum F., An efficient Symmetric Cipher Algorithm for Data Encryption, International Research Journal of Engineering and Technology, Vol. 3, No. 5, pp 1713-1732, May 2016.
- Twum F., Nti K., Asante M., Improving Security Levels In Automatic Teller Machines (ATM) Using Multifactor Authentication, International Journal of Science and Engineering Applications, Vol. 5, No. 3, pp 126-134, May 2016.
- Twum F., Asante K., Asante M., Implementation of Network Services on IPv6 Networks, International Journal of Computer Applications, Vol. 142, No. 5, pp 11-16, May 2016.
- Ampomah M. O., Hayfron-Acquah J. B., Twum F., Panford J. K., Hash-Based Random Salt Password Authentication in Two Servers, International Research Journal of Engineering and Technology, Vol. 2, No. 5, pp 853-859, August 2015.
- Appiah F., Hayfron-Acquah J. B., Panford J. K., Twum F., A Tool Selection Framework for Cross Platform Mobile App Development, International Journal of Computer Applications, Vol. 123, No. 2, pp 14-19, August 2015.
- Ganaa E. D., Twum F., Hayfron-Acquah J. B. A Comparative Study of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol, International Journal of Science and Engineering Applications, Vol. 4, No. 4, pp 163-168, July 2015.
- Karkari A. O., Panford J. K., Hayfron-Acquah J. B., Twum F. Detecting Data Leakage in Cloud Computing Environment (A Case Study of General Hospital Software), International Journal of Scientific Engineering and Applied Science, Vol. 1, No. 3, pp 192-197, June 2015.
- Sedem A. A.Y., Twum F., Hayfron-Acquah J. B., Panford J. K., Cloud Computing Framework for E-Health in Ghana: Adoption Issues and Strategies: Case Study of Ghana Health Service, International Journal of Computer Applications, Vol. 118, No. 17, pp 13-17, May 2015.
- Twum F., Ahenkora K., Internet Banking Security: Securing Customer Trust, Journal of Management and Strategy, Vol. 3, No. 4, pp 78-83, October 2012.