Albert Kwansh Ansah | University Of Mines and Technology, Tarkwa (original) (raw)

Uploads

Papers by Albert Kwansh Ansah

Research paper thumbnail of Comparing Wireless N ( IEEE 802 . 11 n ) and Wireless G ( IEEE 802 . 11 g ) Standards in terms of Performance and Reliability

After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environme... more After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.

Research paper thumbnail of Developing a Mobile Application to be used in Mineral/Geological Exploration with Emphasis on Geochemical Soil Sampling

Research paper thumbnail of The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hote

The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated ... more The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of ICT has any effect on chain hotels' front office operations. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.

Research paper thumbnail of The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hotels in Ghana

International Journal of Advanced Computer Science and Applications, 2012

Research paper thumbnail of E-governance public key infrastructure (PKI) model

International Journal of Electronic Governance, 2013

Research paper thumbnail of Investigation into IEEE 802.11 Security Issues Affecting Wireless Networks

Wireless Communications, 2011

ABSTRACT

Research paper thumbnail of Developing a Mobile Application to be used in Mineral/Geological Exploration with emphasis on Geochemical Soil Sampling

N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile ... more N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile application that could be used during geological field exploration placing emphasis on Geochemical Soil Sampling technique to capture data. Geological Soil Sampling Field data recorded digitally benefits from quick processing, hence facilitating the mineral exploration task and reducing exploration duration. This paper describes a prototype application developed with NetBeans IDE 6.7/J2ME Wireless Toolkit 2.2 emulator platform, which could run on any MIDP compatible devices. [New York Science Journal 2010;3(4):54-65]. (ISSN: 1554-0200).

Research paper thumbnail of The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hotels in Ghana

The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated ... more The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of IC s. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.

Research paper thumbnail of Design of Cost Effective Total Dissolved Solids Logger for Water Quality Monitoring in Mining Communities

Mining operations adversely affect water bodies by way of releasing toxics into local streams and... more Mining operations adversely affect water bodies by way of releasing toxics into local streams and filling in entire valleys. There are fears that, mining activities could cause serious metal pollution to water resources in its catchment area. This poses a threat to human use as well as the existence of aquatic organisms. The number of victims affected by mining related diseases is bound to escalate in the future if effective monitoring water resource around its catchment area is not conducted. In view of this, there is the need to have a system that would aid environmental authorities to monitor the pollution levels of these water bodies around the mining communities. This paper seeks to design a cost effective logger that could be used to monitor the degree of ionic concentration of these water bodies found around mine operation areas. The device measures and monitors the Total Dissolved Solids (TDS) levels of these water bodies around the mining.

Research paper thumbnail of Fatigue Crack Initiation Analysis in 1060 Steel

This study investigates initiation of small cracks on dumble-shaped plate type specimens of 1060 ... more This study investigates initiation of small cracks on dumble-shaped plate type specimens of 1060 steel at the load ratio of R = 0 under varied cyclic stress amplitudes between 0.6 and 1.0 of yield stress using the Instron machine (model: 8501). Sinusoidal wave of a frequency of 10 Hz was used in the experiment. The experiment was conducted at a room temperature of 23ºC. Each test for different applied stress ranges was carried out for 2×10 4 cycles. Microstructure and fractography of the fractured specimen were also analyzed. Nucleations of cracks were observed at Ferrite-Ferrite Grain Boundary (FFGB) as well as inside Ferrite Grain Body (FGB), but the FFGB location was preferred. Results show that the average length of FFGB cracks is found larger than that of the average length of cracks initiated inside FGB at the same cyclic loading conditions. The formation of slip band inside grain body, slip band impingement at grain boundary and elastic-plastic incompatibility synergistically have significant influence on fatigue crack initiation in 1060 steel. Additionally, the formation of irregular voids inside slip bands, initiation and growth of small voids at grain boundary and the subsequent joining of these with other voids were seen as specific characteristics of 1060 steel. It was also established that cracks nucleate both at grain boundary and inside grain body in 1060 steel in the investigated domain of 0.6 to 1.0F y .It was further established that the orientation of the grain body cracks at low stress level is greater than 45º and the average angle of orientation of these cracks increases like that of grain boundary cracks with increased magnitude of stress range.

Conference Presentations by Albert Kwansh Ansah

Research paper thumbnail of Analysis of Freeware Hacking Toolkit ICCSA_17

—Computer networks are constantly under threats from intruders affectionately called hackers. Thi... more —Computer networks are constantly under threats from intruders affectionately called hackers. This paper looks at assessing the extent to which the Internet abounds in easily accessible freeware computer security tools and online resources which can facilitate unauthorised computer network intrusions. The current position of open source computer network security tools, computer operating systems' vulnerabilities and vendors' responsibility towards their customers would be covered in this paper. The paper also looks at a couple of freeware computer security tools and a handful of computer system vulnerability websites as well. A virtual computer network environment was setup to demonstrate how some computer security tools can be exploited for malicious purposes. A survey to solicit opinions on freeware computer security toolkit was commissioned to ascertain the extent to which respondents use computer security freeware. The concept of some companies trading in computer system exploits would be explored by this paper. An appraisal of a few groups behind the development of some of these freeware computer security tools i.e. hacking tools and why the need for these tools would be also explored. Suggestions of possible defensive countermeasures against malicious use of hacking freeware computer tools would be touched upon. The paper is to inform and educate ICT professionals to be very heedful and pay mindfulness to suggested defensive countermeasures.

Research paper thumbnail of Technology for the Aging Society -A Focus and Design of a Cost Effective Smart Home for the Aged and Disabled

─Smart homes automations no longer exist as design concepts for the future generation. With the f... more ─Smart homes automations no longer exist as design concepts for the future generation. With the fast growing and increasing trends in technologies in smart systems, the development of smart homes have seen innovative trends in designs. The aged, Alzheimer and Anosmia patients and people with disability face many difficulties in going about their routines at home. The challenges they encounter especially when they are at home alone pose a threat to their safety and security. This paper seeks to design and prototype a smart home which consists of a lighting control system developed with photo sensors to regulate the external and internal lighting and a vibrating alert system to assist the deaf when the doorbell rings or scenarios that may endanger them using Arduino microcontroller. A human-movement detection system was also integrated into the design to enhance security. The Alzheimer patient is assisted by a gas detection system. The smart home developed is monitored and controlled remotely using a web browser. The prototype has been tested and found to be very assistive to the aged and disabled.

Research paper thumbnail of INVESTIGATION INTO IEEE 802.11 SECURITY ISSUES AFFECTING WIRELESS NETWORKS

Wireless networking is one of the exciting developments in the world of networking technology. Af... more Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.

Research paper thumbnail of Comparing Wireless N (IEEE 802.11n) and Wireless G (IEEE 802.11g) Standards in terms of Performance and Reliability

—After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environm... more —After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.

Research paper thumbnail of Comparing Wireless N ( IEEE 802 . 11 n ) and Wireless G ( IEEE 802 . 11 g ) Standards in terms of Performance and Reliability

After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environme... more After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.

Research paper thumbnail of Developing a Mobile Application to be used in Mineral/Geological Exploration with Emphasis on Geochemical Soil Sampling

Research paper thumbnail of The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hote

The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated ... more The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of ICT has any effect on chain hotels' front office operations. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.

Research paper thumbnail of The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hotels in Ghana

International Journal of Advanced Computer Science and Applications, 2012

Research paper thumbnail of E-governance public key infrastructure (PKI) model

International Journal of Electronic Governance, 2013

Research paper thumbnail of Investigation into IEEE 802.11 Security Issues Affecting Wireless Networks

Wireless Communications, 2011

ABSTRACT

Research paper thumbnail of Developing a Mobile Application to be used in Mineral/Geological Exploration with emphasis on Geochemical Soil Sampling

N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile ... more N e w Y o r k S c i e n c e J o u r n a l 2 0 1 0 ; 3 (4) Abstract: This paper presents a mobile application that could be used during geological field exploration placing emphasis on Geochemical Soil Sampling technique to capture data. Geological Soil Sampling Field data recorded digitally benefits from quick processing, hence facilitating the mineral exploration task and reducing exploration duration. This paper describes a prototype application developed with NetBeans IDE 6.7/J2ME Wireless Toolkit 2.2 emulator platform, which could run on any MIDP compatible devices. [New York Science Journal 2010;3(4):54-65]. (ISSN: 1554-0200).

Research paper thumbnail of The Use of Information and Communication Technologies (ICT) in Front Office Operations of Chain Hotels in Ghana

The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated ... more The proliferation of Information and Communication Technologies (ICT) coupled with sophisticated network protocols have unveiled new avenues for enterprises and organizations and the hospitality industries cannot be left out. Technology-based systems stand in a pivotal position to offer better service to the populace. Hospitality industries such as hotels can take advantage of the pervasiveness of ICT vis-à-vis technology-based systems to advance some of their operations. This paper seeks to assess the use of Information and Communication Technologies (ICT) in a front office operation of chain hotels in Ghana. The paper determines the extent of the use of information technology in a front office operation of chain hotels in Ghana. The paper continues to assess the effect of the use of information technology in the front office operation of chain hotels in Ghana, thus if the use of IC s. The paper further makes recommendations to chain hotel operators and the Ghana Tourist Authority (GTA) and policy makers on the use of information and communications technology in front office operation in chain hotels. Three chain hotels in Ghana were assessed.

Research paper thumbnail of Design of Cost Effective Total Dissolved Solids Logger for Water Quality Monitoring in Mining Communities

Mining operations adversely affect water bodies by way of releasing toxics into local streams and... more Mining operations adversely affect water bodies by way of releasing toxics into local streams and filling in entire valleys. There are fears that, mining activities could cause serious metal pollution to water resources in its catchment area. This poses a threat to human use as well as the existence of aquatic organisms. The number of victims affected by mining related diseases is bound to escalate in the future if effective monitoring water resource around its catchment area is not conducted. In view of this, there is the need to have a system that would aid environmental authorities to monitor the pollution levels of these water bodies around the mining communities. This paper seeks to design a cost effective logger that could be used to monitor the degree of ionic concentration of these water bodies found around mine operation areas. The device measures and monitors the Total Dissolved Solids (TDS) levels of these water bodies around the mining.

Research paper thumbnail of Fatigue Crack Initiation Analysis in 1060 Steel

This study investigates initiation of small cracks on dumble-shaped plate type specimens of 1060 ... more This study investigates initiation of small cracks on dumble-shaped plate type specimens of 1060 steel at the load ratio of R = 0 under varied cyclic stress amplitudes between 0.6 and 1.0 of yield stress using the Instron machine (model: 8501). Sinusoidal wave of a frequency of 10 Hz was used in the experiment. The experiment was conducted at a room temperature of 23ºC. Each test for different applied stress ranges was carried out for 2×10 4 cycles. Microstructure and fractography of the fractured specimen were also analyzed. Nucleations of cracks were observed at Ferrite-Ferrite Grain Boundary (FFGB) as well as inside Ferrite Grain Body (FGB), but the FFGB location was preferred. Results show that the average length of FFGB cracks is found larger than that of the average length of cracks initiated inside FGB at the same cyclic loading conditions. The formation of slip band inside grain body, slip band impingement at grain boundary and elastic-plastic incompatibility synergistically have significant influence on fatigue crack initiation in 1060 steel. Additionally, the formation of irregular voids inside slip bands, initiation and growth of small voids at grain boundary and the subsequent joining of these with other voids were seen as specific characteristics of 1060 steel. It was also established that cracks nucleate both at grain boundary and inside grain body in 1060 steel in the investigated domain of 0.6 to 1.0F y .It was further established that the orientation of the grain body cracks at low stress level is greater than 45º and the average angle of orientation of these cracks increases like that of grain boundary cracks with increased magnitude of stress range.

Research paper thumbnail of Analysis of Freeware Hacking Toolkit ICCSA_17

—Computer networks are constantly under threats from intruders affectionately called hackers. Thi... more —Computer networks are constantly under threats from intruders affectionately called hackers. This paper looks at assessing the extent to which the Internet abounds in easily accessible freeware computer security tools and online resources which can facilitate unauthorised computer network intrusions. The current position of open source computer network security tools, computer operating systems' vulnerabilities and vendors' responsibility towards their customers would be covered in this paper. The paper also looks at a couple of freeware computer security tools and a handful of computer system vulnerability websites as well. A virtual computer network environment was setup to demonstrate how some computer security tools can be exploited for malicious purposes. A survey to solicit opinions on freeware computer security toolkit was commissioned to ascertain the extent to which respondents use computer security freeware. The concept of some companies trading in computer system exploits would be explored by this paper. An appraisal of a few groups behind the development of some of these freeware computer security tools i.e. hacking tools and why the need for these tools would be also explored. Suggestions of possible defensive countermeasures against malicious use of hacking freeware computer tools would be touched upon. The paper is to inform and educate ICT professionals to be very heedful and pay mindfulness to suggested defensive countermeasures.

Research paper thumbnail of Technology for the Aging Society -A Focus and Design of a Cost Effective Smart Home for the Aged and Disabled

─Smart homes automations no longer exist as design concepts for the future generation. With the f... more ─Smart homes automations no longer exist as design concepts for the future generation. With the fast growing and increasing trends in technologies in smart systems, the development of smart homes have seen innovative trends in designs. The aged, Alzheimer and Anosmia patients and people with disability face many difficulties in going about their routines at home. The challenges they encounter especially when they are at home alone pose a threat to their safety and security. This paper seeks to design and prototype a smart home which consists of a lighting control system developed with photo sensors to regulate the external and internal lighting and a vibrating alert system to assist the deaf when the doorbell rings or scenarios that may endanger them using Arduino microcontroller. A human-movement detection system was also integrated into the design to enhance security. The Alzheimer patient is assisted by a gas detection system. The smart home developed is monitored and controlled remotely using a web browser. The prototype has been tested and found to be very assistive to the aged and disabled.

Research paper thumbnail of INVESTIGATION INTO IEEE 802.11 SECURITY ISSUES AFFECTING WIRELESS NETWORKS

Wireless networking is one of the exciting developments in the world of networking technology. Af... more Wireless networking is one of the exciting developments in the world of networking technology. After the introduction of IEEE 802.11 Ethernet standard, Wi-Fi has become the most widely adopted wireless networking type on the wireless network environment. Since wireless networking is easy to deploy and upgrade and with decent data rate available today at low cost, implementation of wireless networking is growing all over the place. Organizations and enterprises are switching from the traditional wired networks to wireless networking. Wireless can serve in many capacities, from a simple extension to a distribution point. One of the leading glitches with wireless networking is that, the wireless networking devices provide no security as they come out of their boxes. Considering the fact that wireless networks are built on a shared medium and data packets float through the air on radio waves, security cannot be overemphasized when dealing with wireless networking. It is arguable that many network users don't have procedures when they deploy their WLAN for the first time. It is the dearth of procedures that help attackers get into any networks they want. This paper seeks to demystify the security issues of the IEEE 802.11 wireless standards. The paper goes on to address these security concerns and points out the method used to secure a wireless network.

Research paper thumbnail of Comparing Wireless N (IEEE 802.11n) and Wireless G (IEEE 802.11g) Standards in terms of Performance and Reliability

—After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environm... more —After the emergence of IEEE 802.11, Wi-Fi has made a big impact on the wireless network environment. With decent data rate available lately at low cost, implementation of wireless networks are growing all over the place. To deliver bandwidth of around 54 Mbps, 802.11g was released. This paper seeks to compare wireless N (802.11n) and wireless G (802.11g) standards in terms of performance and reliability. Since security cannot be overemphasized when dealing with Wireless LAN, this paper also looks at the security implementation of these standards. It is worth nothing that the effectiveness of a wireless network depends on the structure of the building, interference with other networks and security implemented. This paper could be useful for those who want increase in bandwidth with strong security encryption activated. It is tuned to small and medium scale enterprises and also home users.