Griffith Klogo

Griffith Klogo
Kwame Nkrumah University of Science and Technology | KNUST · Department of Computer Engineering

Doctor of Philosophy

About

30
Publications
8,135
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
276
Citations
Introduction
Smart metering and metering infrastructure, IoT and Cyber Physical Systems are my research interest. Applications of engineering principles to African challenges are the focus of my projects and community service engagements. IoT, connected devices and smart systems to solve agricultural challenges in Africa are interest I share

Publications

Publications (30)
Article
Full-text available
Background: The rapid advancement of technology is reshaping industries, including healthcare. Doctors and pharmacists require efficient tools to manage inventory and meet patient needs effectively.. Contribution: This project introduces a mobile application that leverages QR code technology to provide real-time information on the availability of p...
Article
Full-text available
Efficient blockchain querying is crucial for unlocking the full potential of blockchain technology in diverse applications and enabling it to compete with traditional databases in data management. This paper comprehensively analyzes existing literature and presents a taxonomy of state-of-the-art techniques employed to optimize query efficiency in b...
Article
Full-text available
With its promise of transparency, security, and decentralization, blockchain technology faces significant challenges related to data storage and query efficiency. Current indexing methods, which often rely on structures like Merkle trees and Patricia tries, contribute to excessive storage overhead and slower query responses, particularly for full n...
Article
Full-text available
This review paper delves into the global agricultural food supply chains through the lens of African perspectives, examining the role of blockchain and Internet of Things (IoT) technologies in transforming food traceability. It assesses the applicability and efficacy of these innovations in addressing critical issues such as food fraud, contaminati...
Article
Full-text available
The enhanced capacity of optical networks is a significant advantage within the global telecommunications industry. Optical networks provides transmission of information over large distances with reduced latency. However, the growing intricacy of network topologies poses a significant challenge to network adaptability, network resilience, device co...
Article
Full-text available
One aspect of natural language processing, text classification, has become necessary in the educational domain due to the increasing number of students and the COVID-19 outbreak. The advent of the devastating pandemic and the need to remain safe have surged the discussions around online learning and integrated modules in teaching and learning. In t...
Article
Full-text available
Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usual...
Article
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security. This attack targets the flow of information between endpoints. An attacker is able to eavesdrop on the communication between two targets and can either perform active or passive monitoring; this affects the confidentiality and integrity of the data flow. Sev...
Article
Full-text available
Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usual...
Article
Full-text available
The fast emergence of IoT devices and its accompanying big and complex data has necessitated a shift from the traditional networking architecture to software-defined networks (SDNs) in recent times. Routing optimization and DDoS protection in the network has become a necessity for mobile network operators in maintaining a good QoS and QoE for custo...
Article
Full-text available
With the exponential increase in connected devices and its accompanying complexities in network management, dynamic Traffic Engineering (TE) solutions in Software-Defined Networking (SDN) using Reinforcement Learning (RL) techniques has emerged in recent times. The SDN architecture empowers network operators to monitor network traffic with agility,...
Article
Full-text available
Advances in cloud computing and distributed systems are enhancing the advantages that computing delivers to systems that can be integrated with computers due to their multitasking ability. This is already the case when discussing Smart Grid (SG). This enhancement can be applied to drive efficiency in energy management systems in electricity generat...
Article
Full-text available
Digitization and automation have engulfed every scope and sphere of life. Internet of Things (IoT) has been the main enabler of the revolution. There still exist challenges in IoT that need to be addressed such as the limited address space for the increasing number of devices when using IPv4 and IPv6 as well as key security issues such as vulnerabl...
Article
Full-text available
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security. This attack targets the flow of information between endpoints. An attacker is able to eavesdrop on the communication between two targets and can either perform active or passive monitoring; this affects the confidentiality and integrity of the data flow. Sev...
Article
The Internet of Things (IoT) is an intelligent network that connects smart objects to the Internet. A large number of IoT devices are connecting to the Internet, yet many of these devices are insecure, exposing them to a number of security threats. Most IoT devices are resource constrained hence making it difficult to secure them using conventional...
Article
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet to exchange information. The direct connection of IoT devices to the internet makes them susceptible to several security threats. S...
Article
Full-text available
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet for the purpose of exchanging information. The direct connection of IoT devices to the internet makes them susceptible to several s...
Article
Full-text available
Internet of Things (IoT) is a new paradigm that integrates the internet and smart objects. It is an intelligent network that connects all things to the Internet for the purpose of exchanging information and communicating through the information sensing devices in accordance with agreed protocols. Aside the various benefits IoT provides, it also pre...
Article
Full-text available
The use of trust and reputation models (TRMs) are on the rise due to the increasing complexities of cryptography. The use of cryptography though potent on traditional networks, cannot be supported by the resource constraint wireless sensor network (WSN). Trust evaluations have made use of a number of approaches, such as analytical, bio-and socio-in...
Article
Full-text available
Relay technology promises appreciable network throughput and coverage enhancement which is required for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing the link performance of a relay-based WiMAX network under varying conditions. Comparison is made between relay and direct link communication in...
Article
Full-text available
The number of anchor nodes required for accurate localization is an important problem in the wireless sensor network research community. The error associated with localization is high when anchor nodes are not optimally placed in the network. No matter how the network is set up, the error associated with localization is inevitable. There are variou...
Article
Full-text available
The widespread nature of wireless computing and communications offers the promise of many societal and individual benefits. Consumer devices such as cell phones, PDAs and laptops have received a lot of attention over the years, even though the impact of wireless technology is much broader, e.g., through sensor networks for safety applications and h...
Article
Full-text available
Synthetic Aperture Radar (SAR) imagery to monitor oil spills are some methods that have been proposed for the West African sub-region. With the increase in the number of oil exploration companies in Ghana (and her neighbors) and the rise in the coastal activities in the sub-region, there is the need for proper monitoring of the environmental impact...
Article
Full-text available
Sensor Network (WSN) localization is an important and fundamental problem that has received a lot of attention from the WSN research community. Determining the absolute and relative coordinate of sensor nodes in the network adds much more meaning to sense data. The research community is very rich in proposals to address this challenge in WSN. This...

Network

Cited By