© 2026 KNUST Research Atlas. All rights reserved.

Back to Search
Profile photo of Michael Asante

Michael Asante

Computer Science

View Official KNUST Profile

About

Professor  Michael   Asante is currently a professor in Computer Science at the department of Computer Science at the Kwame Nkrumah University of Science and technology,Kumasi,Ghana. he had his primary and Middle school education form 1970-1975 and 1975-1977 at the Bekwai- Ashanti,  SDA Primary and Middle school respectively.He then proceeded to the Obuasi Secondary-Technical School from 1977-1982 and 1983- 1985 for his General Certificate Examination Ordinary and Advanced Levels organized by the West Afriiucan Examination Council (WAEC) He did his national Service from 1985-1986. From 1987  he then proceeded to the Tarkwa School of Mines to undertake  a three-Year course in Mineral Survey  aand completed in 1990.He enrolled at the  London South  Bank University, United Kingdom, from 1992-1994 where he obtained a MSc degree in Scientific Computing/scientific Information Technology. Then from 2003-2007,he persued his PhD in Systems Engineering  at the University of Reading ,United Kingdom.

Research Summary

(inferred from publications by AI)

The researcher focused on advancing cybersecurity, image processing, network security, and edge computing techniques across diverse domains. Their work integrates advanced algorithms, technologies, and frameworks to enhance data security, improve image quality, optimize network performance, and address privacy concerns in critical infrastructure applications. Contributions include cryptographic systems, secure communication protocols, intelligent decision-making models, and real-time threat detection solutions across sectors like healthcare, smart grids, and IoT.

Research Themes

All Papers

Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms(2023)
Implementing Morpheme-based Compression Security Mechanism in Distributed Systems(2020)
Improved approximated median filter algorithm for real-time computer vision applications(2020)
An Effective Algorithm for Denoising Salt-And-Pepper Noise in Real-Time(2020)
Integration of Advanced Metering Infrastructure for Mini-Grid Solar PV Systems in Off-Grid Rural Communities (SoAMIRural)(2023)
Testing for Randomness in Pseudo Random Number Generators Algorithms in a Cryptographic Application(2015)
Optimizing Secure and Efficient Data Communication in Health Information Systems: A Hybrid Cryptographic Approach(2025)
Improving Security Levels In Automatic Teller Machines (ATM) Using Multifactor Authentication(2016)
Implementation of Advanced Encryption Standard Algorithm with Key Length of 256 Bits for Preventing Data Loss in an Organization(2017)
Penetration Testing of IEEE 802.11 Encryption Protocols using Kali Linux Hacking Tools(2020)
Dynamic Routing Implementation Decision between OSPFv3 and IS–IS in IPv6 Networks(2016)
Implementation of Network Services on IPV6 Networks(2016)
Performance Analysis of the Impact on Both the use of Redundant Equipment and Link Failure Repair Paths in Convergence Mobile IP Transactions Utilizing MPLS.(2006)
Penetration Testing of IEEE 802.1X Port-based Authentication Protocols using Kali Linux Hacking Tools(2021)
Survey of Websites and Web Application Security Threats Using Vulnerability Assessment(2019)
Encrypted Traffic Analytic using Identity Based Encryption with Equality Test for Cloud Computing(2018)
An Improved Computer Network Access Control using Free BSD PFSENSE: A Case Study of UMaT Local Area Network(2016)
An Enhanced Non-Cryptographic Hash Function(2020)
A Comparative Study of RSA and ELGAMAL Cryptosystems(2023)
Efficient deniable authentication and its application in location-based services(2022)
A Symmetric, Probabilistic, Non-Circuit Based Fully Homomorphic Encryption Scheme(2022)
ID-based key-insulated signcryption with equality test in cloud computing(2021)
ID-Based Outsourced Plaintext Checkable Encryption in Healthcare Database(2019)
Parallel Key Insulated ID-Based Public Key Cryptographic Primitive with Outsourced Equality Test(2020)
ID-Based Plaintext Checkable Signcryption with Equality Test in Healthcare Systems(2021)
Evolution of Homomorphic Encryption(2021)
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review(2024)
A Survey of Modern Ant Colony Optimization Algorithms for MANET: Routing Challenges, Perpectives and Paradigms(2020)
Reengineering MANET Routing using Ant Colony Optimization: Modelling and Performance Study(2020)
Performance Analysis of AODV and DSR Routing Protocols Under Blackhole Attack Using NS-2(2023)
Analyzing the Impact of Blackhole Attacks on AODV and DSR Routing Protocols’ Performance in NS-2(2023)
Performance Analysis of Enhanced Interior Gateway Routing Protocol (EIGRP) Over Open Shortest Path First (OSPF) Protocol with Opnet(2016)
Enhancing the Security of Vehicles and the Work of the DVLA Using GSM/SMS Technologies(2015)
Impact Of Firewall On Network Performance(2018)
ResFCNET: A Skin Lesion Segmentation Method Based on a Deep Residual Fully Convolutional Neural Network(2023)
A Comparative Performance Analysis of 6to4 Transition Mechanism over MPLS and Frame Relay using OPNET(2020)
Real-Time Motion Detection and Surveillance using Approximation of Image Pre-processing Algorithms(2019)
Android applications classification with deep neural networks(2023)
Android Applications Classification with Deep Neural Networks(2022)
Deit-Mi: Advancing Malware Detection and Classification with Data-Efficient Image Transformers(2023)
Improved Grey Wolf Optimizer based on Levy Flight for Multi-thresholding Image Segmentation(2023)
Enhancing AMI network security with STI model: A mathematical perspective(2024)
Analysis of Electronic Payment Systems in Ghana - A Case Study of Mobile Payment System(2018)
Comparative Analysis Of The Performance Of Principal Component Analysis (PCA) And Linear Discriminant Analysis (LDA) As Face Recognition Techniques(2017)
A Survey of Machine Learning’s Electricity Consumption Models(2018)
An Innovative Technique for Analyzing Network Performance and Congestion in a Hybrid Network Topology(2019)
GENERATIVE ADVERSARIAL NETWORK AIDED SECURITY CHECK WITH TERAHERTZ IMAGES USING IMPROVED YOLOV3.(2021)
Effect of Asynchronous Transfer Mode Adaptation Layers and Service Class on Network Performance(2021)
Intelligent Detection Technique for Malicious Websites Based on Deep Neural Network Classifier(2022)
Numerical modeling of nosocomial infection in a multi-bed ward environment(2012)
Wireless Sensor Network Surveillance on Forest Illegal Mining using ‘Planned Behaviour Abortion Tower’: Analytical Modelling(2018)
Measurement of television white space spectrum in the Central region of Ghana(2021)
Network-Centric Optimal Hybrid Mobility Scheme for IPv6 Wireless Sensor Networks(2021)
The Impact of Information Technology on the Management of Diabetes – A Case Study of the Trust Hospital, Accra(2022)
Enhancing the Time Complexity of Mathematically Intensive Algorithms; the Case of Cryptography(2023)
Predicting Software Vulnerability Based on Software Metrics: A Deep Learning Approach(2023)
Rsencarver": Enhancing File Carving Techniques with Error Correction Using the Reed Solomon Algorithm(2023)
Network-centric Optimal Hybrid Sensing Hole Recovery and Self- Healing in IPV6 WSNs(2024)
A Hybrid Integrated High Availability Cluster (Ihac) for Enhancing System Resilience and Addressing Persistent Cyber Threats(2025)
Fog computing-enabled smart seating systems: optimizing latency and network bandwidth efficiency in classrooms(2025)

Collaboration Network

b6aeaf64-1df8-4832-a430-7b4435086c36
Research Collaboration Map
Collaboration Frequency
Less
More

About This Profile

This profile is generated from publicly available publication metadata and is intended for research discovery purposes. Themes, summaries, and trajectories are inferred computationally and may not capture the full scope of the lecturer's work. For authoritative information, please refer to the official KNUST profile.