Kester Quist-Aphetsi
Orcid: 0000-0002-5378-6268
According to our database1,
Kester Quist-Aphetsi
authored at least 24 papers
between 2013 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020
2016
Using Formal Concepts Analysis Techniques in Mining Data from Criminal Databases and Profiling Events Based on Factors to Understand Criminal Environments.
Proceedings of the Computational Science and Its Applications - ICCSA 2016, 2016
A Hybrid Lossy Compression Using 2-D Discrete Cosine Transform and Visual Cryptographic Technique for Security of Multimedia Image Data Communications in Internet of Things.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016
Spatial Cryptographic and Watermarking Technique for Authentication and Security of Medical Images in a Cloud Based Health Information Systems.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016
An Integrated RoIP Communication Network for Effective Collaboration During Emergency and Disaster Management.
Proceedings of the e-Infrastructure and e-Services for Developing Countries, 2016
2015
A Novel Hybrid Discrete Cosine Transformation and Visual Cryptographic Technique for Securing Digital Images.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015
A Hybrid Image Cryptographic and Spatial Digital Watermarking Encryption Technique for Security and Authentication of Digital Images.
Proceedings of the UKSim-AMSS 17th International Conference on Computer Modelling and Simulation, 2015
A Hybrid Cryptographic and Steganographic Security Approach for Identity Management and Security of Digital Images.
Proceedings of the Security in Computing and Communications, 2015
A Fast Discrete Cosine Transform and a Cryptographic Technique for Authentication and Security of Digital Images.
Proceedings of the Security in Computing and Communications, 2015
Feature Based Encryption Technique for Securing Digital Image Data Based on FCA-Image Attributes and Visual Cryptography.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015
A Security Technique for Authentication and Security of Medical Images in Health Information Systems.
Proceedings of the 15th International Conference on Computational Science and Its Applications, 2015
2014
A Hybrid Encryption Technique for Securing Biometric Image Data Based on Feistel Network and RGB Pixel Displacement.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
2013
CoRR, 2013
Using SOA with Web Services for effective data integration of Enterprise Pharmaceutical Information Systems.
CoRR, 2013
Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data.
CoRR, 2013
Visualization and Analysis of Geographical Crime Patterns Using Formal Concept Analysis.
CoRR, 2013
Using SOA with Web Services for effective Integration of Hospital Information Systems via an Enterprise Service Bus.
CoRR, 2013
The Role of Rural Banks in Providing Mobile Money Services to Rural Poor Communities: An effective integration approach of Rural Banks and existing mobile communications infrastructure.
CoRR, 2013
Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis.
CoRR, 2013
CoRR, 2013
A New Encryption Cipher for Securing Digital Images of Video Surveillance Devices Using Diffie-Hellman-MD5 Algorithm and RGB Pixel Shuffling.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013
A Novel Cryptographic Encryption Technique for Securing Digital Images in the Cloud Using AES and RGB Pixel Displacement.
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013