© 2026 KNUST Research Atlas. All rights reserved.

Back to Search
Profile photo of Frimpong Twum

Frimpong Twum

Computer Science

View Official KNUST Profile

About

Prof. Frimpong Twum (Ph.D) received his B.Sc. (Hons) degree in Electrical and Electronic Engineering and MSc. Internet and Multimedia Engineering from London South Bank University in 2004, and 2007 respectively. He also received MSc. Degree in Information System from Roehampton University, London in 2011. He completed his Ph.D in Computer Science from Kwame Nkumah University of Science and Technology (KNUST), Ghana, in 2017 with specialization in Computer Security. He is currently ASSOCIATE PROFESSOR OF COMPUTER SCIENCE at the Department of Computer Science, College of Science, KNUST. Ghana's Premier Science and Technology University in KUMASI, and the Number 1 University in the world for the provision of quality education (SDG 4) - [Source - Times Higher Education Impact Ranking (1st June, 2023)] . Prof. Twum is a committed, highly skilled, motivated, hardworking, and technically competent professional with passion for knowledge acquisition and dissemination in the field of computer science especially computer network security, machine learning, and cloud computing. His long-term goal is to help improve life by finding solutions to problems using knowledge acquired in these fields. He is effective communicator at all levels and a team player in dealing with technical/non-technical issues with proven organizational and people skills. Prof. Twum has several papers to his credit in credible journals including PLOS ONE, HINDAWI, KSII TIIS, MDPI Sensors, IEEE access, SPRINGER, Informatica (Slovenia) and Journal of Computer Science. His articles have global reach with over 200 Google Scholar citations. Prior to his appointment at KNUST, he worked as a Lecturer and Systems Engineer at Roehampton University in London. He also worked as Systems Administrator and Business Analyst at PC World, UK. Prof. Twum also worked as a Computer Technician at Council for Scientific and Industrial Research (CSIR) - Crops Research Institute (CRI). His areas of research interest include Computer Networks, Computer and Data Security, Cloud Computing, Computer Vision and Machine Learning, Image Processing, Software Engineering, Computer Programming and Algorithms.Prof. Twum has served on many national organizations as member or chairman including; National Accreditation Board (now, Ghana Tertiary Education Commission (GTEC), West African Examinations Council (WAEC), and Internet Society, Ghana Chapter. He is External Examiner for Computer Science and Information Technology programmes for Ghana Communications Technology University,  Garden City University College, Takoradi Technical University, and Tamale Technical University. Prof. Twum has served as an interview panel member for recruitment of lectures for computer science, Information Technology and related programmes for many institutions and has also been nominated severally by other universities as an external assessor for assessment of promotion document to senior lecturer of computer science, Information Technology and related programmes. Prof. Twum was appointed as examiner and subject expert for ICT by the National Teaching Council (NTC) to design, review and set questions for the teachers licensure examinations in Ghana. Prof. Twum has also served as resource person for the Ghana Science Association Science (GSA) workshop for Science Technology Engineering and Mathematics (STEM) teachers on many occasions.In addition, Prof. Twum has rendered many international  services including: Editorial Advisory Board Member for African Union (AU) – Africa Centre for Study and Research on Terrorism, WASSCE Elective ICT Examiner for West African Examinations Council (WAEC), WAEC Moderating Committee Member, and a reviewer for; IEEE ACCESS, Academia Letters, Science Publishing Group (SciencePG): International Journal of Sustainability Management and Information Technologies, INDERSCIENCE - International Journal of Information and Computer Security (IJICS) and International Journal of Advanced Computer Science and Applications (IJCSA). Prof. Twum has been an Invited Speaker to the 2nd Global Summit on Electronics & Electrical Engineering (GSEEE2022) in Chicago, USA.

Research Summary

(inferred from publications by AI)

The researcher's work is centered on integrating advanced AI techniques with traditional computational methods across diverse fields such as healthcare, smart agriculture, cybersecurity, and data analysis. Their focus includes enhancing security protocols through steganography and cryptography, optimizing data classification and anomaly detection, improving network performance, and addressing health-related challenges. By combining innovative solutions with robust methodologies, the researcher aims to develop a comprehensive approach that integrates these elements across various domains, ultimately striving for a secure and efficient framework.

Research Themes

All Papers

Rainfall Prediction Using Machine Learning Algorithms for the Various Ecological Zones of Ghana(2021)
Imbalanced class distribution and performance evaluation metrics: A systematic review of prediction accuracy for determining model performance in healthcare systems(2023)
A systematic review of prediction accuracy as an evaluation measure for determining machine learning model performance in healthcare systems(2023)
Machine Learning Modeling of Disease Treatment Default: A Comparative Analysis of Classification Models(2023)
Chronic disease treatment default prediction with random sampling optimization.(2023)
Machine learning prediction accuracy score: The use of Feature selection techniques(2023)
Imbalanced Dataset and Optimization Technique Use for Disease Treatment Default Prediction(2023)
Applied machine learning techniques for chronic disease treatment default prediction and its potential benefits for patient outcome: A case series study approach(2024)
A Novel Computer Vision Model for Medicinal Plant Identification Using Log-Gabor Filters and Deep Learning Algorithms(2022)
Textural Analysis for Medicinal Plants Identification Using Log Gabor Filters(2022)
Hybrid Approach to Medicinal Plant Leaf Image Enhancement Using Contrast Limited Adaptive Histogram Equalization and Homomorphic Filter(2021)
A bilateral filtering-based image enhancement for Alzheimer disease classification using CNN(2024)
A Neural Architecture Search CNN for Alzheimer’s Disease Classification(2024)
Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection(2022)
Corrections to “Evaluation of Conversational Agents: Understanding Culture, Context and Environment in Emotion Detection”(2022)
Expert System in Enhancing Efficiency in Basic Educational Management using Data Mining Techniques(2021)
Integrating expert system in managing basic education: A survey in Ghana(2023)
Agile neural expert system for managing basic education(2023)
Systematic Review of Data Mining in Education on the Levels and Aspects of Education.(2023)
Data Mining and Visualisation of Basic Educational Resources for Quality Education(2022)
PRISMA Archetype-Based Systematic Literature Review of Security Algorithms in the Cloud(2023)
Delivering a Secured Cloud Computing Architecture and Traditional IT Outsourcing Environment via Penetration Tools in Ghana(2019)
A Comparative Study of Existing Cloud Security System Models as against an Implementation of the CDDI Model Dubbed SecureMyFiles System(2020)
Cryptographic Solutions for Data Security in Cloud Computing:(2024)
A Proposed Cloud Security Framework for Service Providers in Ghana(2017)
Improving Security Levels In Automatic Teller Machines (ATM) Using Multifactor Authentication(2016)
Information System Security Threats and Vulnerabilities: Evaluating the Human Factor in Data Protection(2016)
Internet Banking Security Strategy: Securing Customer Trust(2012)
Ensuring confidentiality and privacy of cloud data using a non-deterministic cryptographic scheme(2023)
Ensuring privacy and confidentiality of cloud data: A comparative analysis of diverse cryptographic solutions based on run time trend(2023)
A Proposed New Framework for Securing Cloud Data on Multiple Infrastructures using Erasure Coding, Dispersal Technique and Encryption(2019)
An Enhanced Rsa Algorithm For Data Security Using Gaussian Interpolation Formula(2022)
Securing cloud data using secret key 4 optimization algorithm (SK4OA) with a non-linearity run time trend(2024)
A Comparative Study of Linear and Non-Linear Cryptographic Algorithms in Cloud Computing(2023)
Enhancing Data Security using Video Steganography, RSA and Huffman Code Algorithms with LSB Insertion(2016)
Image steganography techniques for resisting statistical steganalysis attacks: A systematic literature review(2024)
A Multilayered Secure Image Steganography Technique for Resisting Regular-Singular Steganalysis Attacks Using Elliptic Curve Cryptography and Genetic Algorithm(2023)
A Modified High Capacity Video Steganography Technique Based On Spatial Domain Method, Asymmetric Cryptography and Huffman Code Algorithms(2016)
A Secure and High Embedding Capacity Image Steganography Scheme Using Image Enhancement Technique, Compression, and Genetic Algorithm(2024)
Medicinal Plant Identification using Gabor Filters and Deep Learning Techniques: A Paper Review(2021)
An enhanced RSA algorithm using Gaussian interpolation formula(2022)
Evaluating Agile Neural Educational System for Effective Resource Management(2023)
Evaluating Agile Neural Educational System for Effective Resource Management.(2023)
A Tool Selection Framework for Cross Platform Mobile App Development(2015)
Ensuring privacy and confidentiality of data on the cloud using an enhanced homomorphism scheme(2022)
An AI-based approach to predict delivery outcome based on measurable factors of pregnant mothers(2024)
An AI-based approach to predict delivery outcome based on measurable factors of pregnant mothers(2025)
Cold Boot Attack on Encrypted Containers for Forensic Investigations(2022)
Cloud Computing Framework for E-Health in Ghana: Adoption Issues and Strategies: Case Study of Ghana Health Service(2015)
Evaluating the Impact of Full Virtualized High- Performance Computing Platform on Large Scale Scientific Data using Quantum Espresso(2020)
SmartGuard: An Improved Leaky Bucket Algorithm-Based Secure and Scalable Congestion Control Framework for the Edge-Cloud Continuum(2025)
A Proposed Enhanced Transposition Cipher Algorithm based on Rubik’s Cube Transformations(2019)
Binary Image Segmentation through the Carl Friedrich Gauss Equation(2018)
Employing transfer learning for breast cancer detection using deep learning models(2025)
A Comparative Study Of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol(2015)
An Improved Computer Network Access Control using Free BSD PFSENSE: A Case Study of UMaT Local Area Network(2016)
A Proposed Algorithm for Generating the Reed-Solomon Encoding Polynomial Coefficients over GF(256) for RS[255,223]8,32(2016)
An Enhanced Elliptic Curve Cryptosystem for Securing Data(2018)
A Framework for Securing Data by using Elliptic Curve Cryptography and Reed Solomon Coding Schemes(2021)
Implementation of a Data Protection Model dubbed Harricent_RSECC(2022)
Mitigating Computer Attacks in a Corporate Network using Honeypots: A Case Study of Ghana Education Service(2018)
An Improved VoIP using Adaptive Multirate Encoder (AMR)(2019)
Agile Neural Expert System for Managing Basic Education(2022)
Chronic disease treatment default prediction, potential benefits with applied random sampling optimization techniques(2023)
Implementation of Network Services on IPV6 Networks(2016)
Mapping Cases of Tuberculosis Distribution and Treatment Outcomes using Geographical Information System - The Case of Birim Central Municipality, E/R - Ghana(2019)
Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems(2021)
Network-Centric Optimal Hybrid Mobility Scheme for IPv6 Wireless Sensor Networks(2021)
Network-centric Optimal Hybrid Sensing Hole Recovery and Self- Healing in IPV6 WSNs(2024)

Collaboration Network

7ac94c77-6669-4f23-b5a4-950f09606e8d
Research Collaboration Map
Collaboration Frequency
Less
More

About This Profile

This profile is generated from publicly available publication metadata and is intended for research discovery purposes. Themes, summaries, and trajectories are inferred computationally and may not capture the full scope of the lecturer's work. For authoritative information, please refer to the official KNUST profile.