Department of InformationTechnology Education
Permanent URI for this collection
Browse
Browsing Department of InformationTechnology Education by Issue Date
Now showing 1 - 20 of 40
Results Per Page
Sort Options
- ItemAnalyses of optimum generation scenarios for sustainable power generation in Ghana(Brunel University London, 2010) Albert, K. Awopone; Ahmed, F. ZobaaThis study examines optimum generation scenarios for Ghana from 2010 to 2040. The Open Source Energy Modelling System (OSeMOSYS), an optimisation model for long term energy planning, which is integrated in Long-range Energy Alternatives Planning (LEAP) tool, was applied to model the generation system. The developed model was applied to the case study of the reference scenario (OPT) which examines the least cost development of the system without any shift in policy. Three groups of policy scenario were developed based on the future possible energy policy direction in Ghana: energy emission targets, carbon taxes and transmission and distribution losses improvements. The model was then used to simulate the development of technologies in each scenario up to 2040 and the level of renewable generation examined. Finally, cost benefit analysis of the policy scenarios, as well as their greenhouse gas mitigation potential were also discussed. The results show that: suitable policies for clean power generation have an important role in CO2 mitigation in Ghana. The introduction of carbon minimisation policies will also promote diversification of the generation mix with higher penetration of renewable energy technologies, thus reducing the overall fossil fuel generation in Ghana. It further indicated that, significant greenhouse emissions savings is achieved with improvement in transmission and distribution losses.
- ItemStudents’ perception of blended learning environment: A case study of the University of Education, Winneba, Kumasi-Campus, Ghana(International Journal of Education and Development using Information and Communication Technology, 2015) Gyamgi, Adu Samuel; Gyaase, Ohemeng PatrickABSTRACT The increasing utilization of Information and Communications Technology (ICT) in addressing various societal needs has catalysed the need to deploy this all important tool in education in developing countries to address the need of the increasing student enrolment in universities. This study was conducted to assess students’ perception of blended learning environment. The blended learning environment was designed on a Moodle platform using an adaptation of the practical enquiry model. This intervention was designed to ensure that the benefits of both online and face-to-face learning environment were harnessed for the achievement of set pedagogical goals. The study used formative experiment with 75 first year university students who were studying Communication Skills (CS) and their lecturers as the participants. The experiment was carried out over two semesters at the University of Education, Winneba – Kumasi Campus in Ghana. The findings showed positive perceptions of student on the blended learning environment. However, the problem of slow Internet connectivity and lack of Internet access for some of the students outside the university campus hindered the effectiveness of the blended learning environment for a few students. Improvement in ICT infrastructure and capacity building for lecturers to adopt blended learning approach were recommended.
- ItemComparative analysis of convergence times between RIP And EIGRP routing protocols in a network(Research Journal of Computer Science, 2015) Boansi, Oliver Kuffour; Panford, Joseph Kobina; Yehuza, Rasheeda Mendeeya; Riverson, KwabenaThe convergence time of a network is very essential to a network. Networks that converge faster are considered to be very reliable. Users of the network appreciate it when they are always able to access resources. The research was carried out to compare the convergence of two routing protocols namely RIP and EIGRP. Network scenarios were created and a simulation was performed using packet tracer to measure the convergence times of both protocols separately. Results indicated that EIGRP had the fastest convergence time and both protocols’ convergences were not affected by a change in topology. This will help network administrators in their choice of protocols
- ItemLeveraging VOIP on Local Area Network using Java Media Framework(International Journal of Computer Applications (0975 – 8887), 2015-03-19) Asante, George; K., Riverson; Acquah,-J.B HayfronVoice over Internet Protocol (VoIP) is a standard for taking analogue audio signals, and turning them into digital data that can be transmitted over a network. VoIP has become an important factor in network communication. It has a lower operational cost, greater flexibility, and a variety of enhanced applications. VoIP is time – based. To ensure real-time transmission, Real-Time Transmission Protocol (RTP) is used on top of User Datagram Protocol (UDP). RTP provides end to-end network transport functions suitable for applications transmitting real-time data, such as audio, video or simulation data, over multicast or unicast network services. Java Media Framework (JMF) is an Application Programming Interface (API) that uses RTP and therefore ideal for time-based media. Thus, the topic: leveraging VOIP on LAN using Java Media Framework. The research aims at designing a system that will allow users to communicate over a data network. That is to be able to send text, make voice and video call, and transfer file over a network. The system uses client/server architecture. The architecture is a 3-tier: the client, the main server and the database server. The system designed could be used on Android mobile phones and computers with Windows operating system.The outcome of the research will allow users to communicate at virtually no cost. The product will also put the network of various organizations into full utilization.
- ItemCompliance In Education Institutions Based On Students Experience Survey(2015-05-29) Adasa Nkrumah Kofi Frimpong; Petra Maria AsprionIn this paper, we follow a survey approach to analyse the level of compliance with study and examination regulations governing two educational institutions in Switzerland. The results revealed that compliance with automatic registration was different in the two investigated units of analysis and in both we found deficiencies in compliance-related activities. For example in both institutions the deregistration process was not compliant because students were most often not informed about the process. In addition we found a compliance imbalance regarding the extent of assessments. With regard to the examination supervision the status of compliance was much better in one of the two analysed units. However, compliance regarding lecture sessions seemed balanced.
- ItemE-Banking Preferences and Middle Class Values in Ghana(Journal of Computer Sciences and Applications, 2016, 2016) Dagadu, Caleb Joshua; Opoku Aboagye, Emelia; Opokua Ansong, Mary; Asante Antwi, Henry; Agbezuge, EricThe study was premised to assess E-Banking Preferences and Middle Class Values in Ghana in far reaching and inclusive way. The researchers adopted the positivist research paradigm. Overall, five hundred (500) customers were randomly sample from 26 banks in Ghana to participate in the study. A questionnaire containing 35 items were used to collect the data from the target population and the items were scaled on 5-points Likert scale to compute and assess the responses. The data were analysed with the aid of Predictive Analytic Software (PASW). The regression results show that Sheth-Newman Gross Model of Consumption Values was significant in predicting customers’ e-banking adoption in Ghana. ANOVA reveals a p-value of 0.000. The study further revealed that 92.2% variation in use of e-banking are due to social values and conditional values. The study again reveals that functional and epistemic values are not significant predictors of use of e-banking (p-value>0.05). Meanwhile, emotional value has significant and inverse relationship with use of e-banking (β=-24.2%). The descriptive results also revealed that, direct deposit and withdrawal services were the appropriate and satisfactory service preferred by clients showing the mean of 4.1879 and the standard deviation of 0.7. Again, ATM was identified as the next appropriate and satisfactory service preferred by clients revealing the means of 4.0 and standard deviation of 1.0. However, the less appropriate and satisfactory services use by client was Electronic fund transfer at point of sale (EFTPOS) showing the mean of 3.6222 and standard deviation of 0.77975. We herein propose the banks to adopt excellent customer education to improve public confidence in the system such as Deming 14 Principles on Quality Service and the Japanese Kaisen Principles to ensure complete e-banking adoption in the banking industry.
- ItemWAVELETS FOR MEDICAL BIG DATA ACCESS IMPROVEMENT STRATEGY OVER WIRELESS NETWORK(University of Electronic Science and Technology of China, 2016) Dagadu, Caleb Joshua; Fadia, Shah; Jianping, Li; Wang, Zhou; Yasir, Shah; Faiza, ShahMedical Big Data (MBD) is the most critical form of information. MBD over a colossal Wireless Network (WN) is a sophisticated area of concern. Every day WN is becoming more dense and complicated. The MBD can be saved to wireless network after applying suitable Wavelet Compression. The quality of MBD is the most important factor; which means efficient and reliable transmission. Wavelet Compression ensures the best image compression schemes such that the quality of data is not affected. MBD is in the form of medical reports, x-rays, CT scan image, audio video files. MBD over WN needs limited bandwidth utilization. Software Define Network (SDN) divides the network infrastructure into two planes. The Control Plane manages data flow and the Data Plane deals with the data. In- network coordinating cache via SDN support is a better way of network efficiency improvement. The cache size is very limited and can entertain only a limited number of requests. Our proposed system for MBD Cache (MBDC) is efficient to improvement the network performance using Wavelets. It is capable to work in Heterogeneous Network (Het Net) and Software Define Network (SDN) Architecture. By considering any shortest path like K-Means algorithm, the neighboring- content cache awareness reduces the latency time to fulfill the request from destination.
- ItemDWT BASED ENCRYPTION TECHNIQUE FOR MEDICAL IMAGES(1 International Centre for Wavelet Analysis and Its Applications, 2016) Dagadu, Caleb Joshua; Jian-Ping, Li; Fadia, Shah; Nadir, Musafa; Kamlesh, KumarThe security of medical images has attracted much attention recently, especially when these images are hosted by third party cloud service providers and therefore must be sent through the communication networks. A key challenge in the cloud computing paradigm is the design of efficient security schemes that help address the issues of confidentiality, integrity and authentication. Consequently, we propose a fast and robust encryption technique for gray scale medical images for real time applications. Our technique first compresses the medical image in the discrete wavelet transform (DWT) domain before encrypting with an algorithm based on basic pixel permutation and randomness. In the DWT domain, correlation and redundancy are reduced while random pixel permutation with encryption key provides confusion and diffusion. Our simulation results demonstrate the potentials of our technique.
- ItemDigital Video Broadcasting-Return Channel via Satellite (DVB-RCS) Implementation in Ghana for Maritime and Other Mobile Communication(Communications on Applied Electronics (CAE) – ISSN : 2394-4714 Foundation of Computer Science FCS, New York, USA, 2016-02) Asante, George; Akom, Kingsley; Frimpong- Adjei, BernardThis paper presents solution to developing trends in next generation satellite communication technologies which have significant implication on maritime and mobile communication systems based on specific need and significant broadband connectivity, quality delivery of service and interactivity in Ghana. Due to the narrow bandwidth of terrestrial access links and the enormous costs for increasing bandwidth in remote location and enabling IP-multicast streaming for access, a satellite overlay network using Digital Video Broadcasting Return channel service (DVB-RCS) technology will be examined and the infrastructure required for communication, navigation and surveillance selected for implementation. The satellite network will delivers live streaming of voice, data and video over IP contents simultaneously to numerous users in every remote location. An overview of the technical aspect will be implemented in order to establish quality infrastructures, allowing the services of DVB-RCS distributed via satellite. The paper also outlines DVB-RCS benefits which will be achieved in practice, based on requirements from implementing these applications in urban, rural and mobile environments including maritime solutions.
- ItemDrive-In As E-Commerce Strategy In Ghana(2016-05) Adasa Nkrumah Kofi Frimpong; Samuel Adu GyamfiThe study sought to critically analyze the impact, awareness and importance of Drive-In as electronic commerce strategy in Ghana. The high demand of consumers and competition among Ghanaian markets has caused changes in electronic commerce strategy as a result of technological innovations, increased awareness and improved supply chain management. This paper uses Ababio Express (a supermarket in Ghana) as a case study in exploring the impact, awareness and importance of Drive-In as e-commerce strategy. On the whole, a “Drive-In” framework was proposed which formed the basis for a successful e-commerce site to aid online shopping. The study revealed that E-commerce is one of the fastest and easiest way of shopping for busy people in Ghana. This has made the transition to internet shopping a necessity for organizations. Despite its benefits, developing countries still lag behind in the adoption of electronic commerce. The study further explored the history of drive-in markets in other countries, their impacts and innovations as time went on and drive-in today. The findings show that there is room for service quality as in improving online shopping in the Ghanaian supermarkets. Recommendations and suggestions for future research were presented in the end.
- ItemMobile Commerce: Mobile Money Transfer In Ghana(Customers's Perspective)(2016-05) Adasa Nkrumah Kofi Frimpong; Samuel Adu GyamfiMobile money transfer allows people to send money using Short Message Service (SMS). Its low costs, fast speed and no need of having a bank account. The service started in Kenya as MPESA introduced by Safaricom and has since been replicated in other parts of the world especially in developing countries. The service was introduced in Ghana in 2009. Much research has been done in mobile money transfer but mostly focused on the success of MPESA. Very little is known with respect to the service in Ghana. This paper studied the use of mobile money transfer service in Ghana from the customers’ perspective. The study sought to compare the extension and impact of the service as against the successful implementation of Kenya’s MPESA. The objective was to investigate the socioeconomic characteristics of MMT users, and their MMT experience. Quantitative and qualitative research method based on the Positivism and the Interpretivism philosophies were used. The survey method using questionnaire was used. The mobile money transfer processes, as used in Ghana, was modelled. The result of the survey showed that MMT was used to a large extent in Ghana, just as in Kenya; it was concluded that like the survey by Mas & Radcliffe, (2010) which found that 98 percent of users in Kenya were happy with the service, the users in Ghana were equally happy, however, the percentage in Ghana was 88%
- ItemThe Impact of Cloud Computing In Developing Countries A Case Study of Ghana(Advances in Multidisciplinary And Scientific Research, 2016-12-04) Asante, George; E.I., Promise -Egho; O. R,AgyeiIn today’s world, technology is driving the flow of change in everything. The advancement in Information and Communication Technology and the increasing demand for it is associated with high cost of resource utilization. Several organizations are making efforts to minimize the cost of computing via the means of virtualization. The response to diminish the cost of computing has brought about the development of Cloud Computing (CC). In cloud computing, administration, better-quality utilization and cost of infrastructure are reduced by providing services as pay per usage.As a service, CC is having enormous effects that are very crucial and inevitable towards the development of developing countries that want to survive in the highly competitive world. Concentration of cloud–related accomplishments is mainly in vast markets in countries such as Vietnam, South Africa, India, Brazil and China. Such does not dispute the fact that, the cloud is progressively making an intrusion into miniature markets like Ghana and other countries. This research provided the effects of cloud computing on developing countries and the possible future prospects. One vital benefit developing countries will derive from this adoption is that they will not only capitalize on value-added service delivery, but also enhance efficiency with maximized productivity. Keywords: on-demand, configurable computing resource, virtualization, bandwidth, cloud computing, outsourcing
- ItemChaotic Medical Image Encryption Based on Arnold Transformation and Pseudorandomly Enhanced Logistic Map(Journal of Multidisciplinary Engineering Science and Technology (JMEST), 2017) Dagadu, Caleb Joshua; Jianping, Li; O. Aboagye, Emelia; Xuedzi, GeTransmission and storage of digital medical images for telemedicine facilitates healthcare delivery. However, this gives rise to security concerns such as confidentiality integrity and reliability. In this paper, an efficient chaotic encryption scheme is proposed for gray scale medical images using Arnold cat map and pseudorandomly enhanced chaotic map. The scheme achieves secure encryption by Arnold transformation followed by pixel value modification with chaotic key sequence. The robustness of the scheme is measured by various metrics such as histogram analysis, key sensitivity and information entropy. Furthermore, we compare the efficiency of the pseudorandomly enhanced logistic map with the logistic map. The initial experimental results show that the scheme promises stronger resistance against diverse forms of common attacks.
- ItemEfficient and Scalable Matrix Factorization Transfer with Review Helpfulness for Massive Data Processing(Journal of Computer Sciences and Applications, 2017, 2017) Dagadu, Caleb Joshua; Aboagye, Emelia Opoku; Jianbin, Gao; Qi, XiaWe explore the sparsity problem associated with recommendation system through the concept of transfer learning (TL) which are normally caused by missing and noisy ratings and or review helpfulness. TL is a machine learning (ML) method which aims to extract knowledge gained in a source task/domain and use it to facilitate the learning of a target predictive function in a different domain. The creation and transfer of knowledge are a basis for competitive advantage. One of the challenges prevailing in this era of big data is scalable algorithms that process the massive data in reducing computational complexity. In the RS field, one of the inherent problems researchers always try to solve is data sparsity. The data associated with rating scores and helpfulness of review scores are always sparse presenting sparsity problems in recommendation systems (RSs). Meanwhile, review helpfulness votes helps facilitate consumer purchase decision-making processes. We use online review helpfulness votes as an auxiliary in formation source and design a matrix transfer framework to address the sparsity problem. We model our Homogenous Fusion Transfer Learning approach based on Matrix Factorization HMT with review helpfulness to solve sparsity problem of recommender systems and to enhance predictive performance within the same domain. Our experiments show that, our framework Efficient Matrix Transfer Learning (HMT) is scalable, computationally less expensive and solves the sparsity problem of recommendations in the e-commerce industry.
- ItemOptimising energy systems of Ghana for long-term scenarios(Brunel University London, 2017) Albert, Kotawoke AwoponeThis study explored energy solutions for Ghana by analysing alternative pathways from 2010 to 2040. The Long-range Energy Alternating Pathways (LEAP) tool was used the scenarios analysis. Four scenarios were developed based on key influencing factors identified in the literature. These are Base case, Coal, Modest Renewable Energy Technology (RET), and High RET scenarios. The Base case scenario was based on government-planned expansion and assumed no shift in policy. The Coal scenario assumed the same expansion trend as Base case with introduction of coal plants replacing a percentage of natural gas generation. Modest and High RET scenarios examined the development of the system with increased renewable energy integration. The results revealed that overall benefits are achieved with higher integration of renewable energy technologies. Economic benefits of 0.5 – 13.23% is achieved in the RET scenarios depending on the cost development over the 30 year study period. The high RET offers the highest economic and environmental benefits. Subsequently, the optimal development of the system was examined using the LEAP/OSeMOSYS (Open Source Energy Modelling System) optimisation methodology. The least cost system developed by LEAP (Optimum scenario), was used as a reference to examine future possible energy policy direction in Ghana. The policy constraints analysed included emission targets, carbon taxes and transmission, distribution losses improvements and demand side efficiency. The results show that: suitable policies for clean power generation have an important role in CO2 mitigation in Ghana. The introduction of carbon minimisation policies will also promote diversification of the generation mix with higher penetration of renewable energy technologies. The study proposes promoting energy efficiency and improvement in transmission and distribution losses and utilisation of renewable energy as the best energy strategy for Ghana. Ghana needs ambitious targets, policies and implementation strategies to enhance energy efficiency, and decrease demand in the long term. Stable funding and promotion of transparent policies are required to promote high development of renewable energy technologies.
- ItemAssessment of optimal pathways for power generation system in Ghana(Cogent Engineering, 2017) Albert, K. Awopone; Ahmed, F. Zobaa; Walter, Banuenumah: This study applied the Open Source Energy Modelling System (OSeMOSYS), an optimisation model for long term energy planning, which is integrated in Long range Energy Alternatives Planning (LEAP) to develop optimal generation pathways and dispatch scheduling of selected generating technologies for power generation in Ghana. Simulating conventional and non-conventional energy technologies, the study examines the technological, economic and environmental implications of re newable energy policies from 2010 to 2040. Sensitivity analyses were undertaken to determine the effect of varied development in non-conventional renewable energy technologies investment cost as well as fuel prices. The findings suggest that, with a comprehensive implementation of energy efficiency and other strategies, renewable energy technologies can contribute more than 70% of the generation requirement in Ghana by 2040. This will result in significant economic and environmental ben efits as well as sustainability of the energy sector.
- ItemTunnel Magnetoresistive Sensors based Current Transducer with Adaptive Blind Source Separation(International Journal of Electrical and Electronics Engineering, 2017) Ayambire, Patrick Nyaaba; Qi, Huang; Awopone, AlbertIn this paper, we propose a new approach for designing a high performance and low cost sensor array based current transducer. This is based on the use of tunnel magnetoresistive sensor array and adaptive blind source separation method. Such a sensor array is able to cancel magnetic interference from nearby current carrying conductors by giving a near perfect estimation and separation of the unknown source signals. Experiment using a hardware prototype based on an analog interface and a DSP for enhancing flexibility was used. The result obtained with the used of Tunnel Magnetoresistive sensor array is presented in this paper.
- ItemPromoting Information Resource Management for E Government th(2018-08) Md Nazirul Islam Sarker; Md Altab Hossin; Adasa Nkrumah Kofi Frimpong; Yin XiaohuaBig data has a potential to transform traditional government system to data-driven e-government system by utilizing modern analytical techniques. The aim of this article is to explore the applicability of big data for ensuring e-government. An extensive literature review has been administered using various levels of scales and indicators. Literature survey shows that a number of models have been developed to explain e-governance but systematic research on the suitability of big data for e-government is still lacking. This article argues that big data can help the information resource management system of the government for improving transparency and reducing corruption, fastest public service delivery, reducing public hassle, providing easy access to public services, reducing error and reducing poverty through e services, e-management, e-democracy, and e-commerce. This article further argues that big data has a significant role in cost effective service delivery to citizens, policy coherence, access to public services, participation and engagement, representation, access to information, open government and corruption control. The finding suggests that big data technologies should be implemented in every public-sector organization by minimizing technological challenges and threats, ensuring the privacy of citizen’s information, maximizing utilization of data and promoting information management capacity.
- ItemDevelopment dimensions of E-Commerce in Bangladesh: Scope, challenges and threats(2018-08) Adasa Nkrumah Kofi Frimpong; Md Nazirul Islam Sarker; Md Altab Hossin; Yin XiaohuaThe main purpose of the study is to explore the scope, challenges and threats of e-commerce as well as its development dimensions in Bangladesh. The study uses survey findings, SWOT analysis approach and case study of two top ranking e-commerce business institutions in Bangladesh. The study also uses secondary data through extensive literature review. It reveals that there is a great prospect of e-commerce in Bangladesh with growing trust, e commerce facilities, security, people’s awareness and transformation from traditional shopping to online shopping. It also explores that people like online shopping due to its convenience, security and time saving nature. The study further reveals that quality of the product, consumer dishonesty, lack of proper cyber security in some e-commerce site, unavailable banking facility, product availability and mandatory credit card requirement are the major challenges to the development of e commerce in Bangladesh. The article suggests that a proper initiative should be taken by the government to implement ICT policy properly for smooth running e-commerce business in Bangladesh and achieving goals of digital Bangladesh.
- ItemMedical Image Encryption Scheme Based on Multiple Chaos and DNA Coding(International Journal of Network Security, 2019) Dagadu, Caleb Joshua; Jianping, Li; O. Aboagye, Emelia; K. Deynu, FaithThe combination of chaos and deoxyribonucleic acid (DNA) coding for image encryption in recent times has proven to provide robust security for images. In this paper, an encryption scheme based on multiple chaos and DNA coding is proposed for gray scale medical im ages. The chaotic tent map is used to generate chaotic key stream and the logistic map is used to randomly select DNA encoding and decoding rules. The chaotic key and the plain medical image are first encoded into DNA sequences. A selected DNA algebraic operation (addition/subtraction/XOR) is carried out between the plain image DNA sequence and the key DNA sequence; the outcome is then decoded to obtain the cipher image. The process is carried out both on row and column bases to achieve a robust cipher. The initial experimental re sults show that the scheme demonstrates strong resistance against diverse forms of attacks.