Henry Nunoo-Mensah

Henry Nunoo-Mensah
  • Doctor of Philosophy
  • Senior Lecturer at Kwame Nkrumah University of Science and Technology

About

53
Publications
88,563
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,366
Citations
Introduction
Henry Nunoo-Mensah is currently a Senior Lecturer in the Department of Computer Engineering, KNUST-Kumasi. He is also the project coordinator for Connected Devices (CoDe) Lab. He has a PhD in Computer Engineering from the Kwame Nkrumah University of Science and Technology, Kumasi. His current research interests include wireless sensor network, network security, intelligent agents (AI4D), and algorithm design and optimisation.
Current institution
Kwame Nkrumah University of Science and Technology
Current position
  • Senior Lecturer
Additional affiliations
August 2016 - present
Kwame Nkrumah University of Science and Technology
Position
  • Lecturer
Description
  • I teach, conduct research and provide service to the university, nation and the world at large.
August 2015 - July 2016
Ghana Communication Technology University
Position
  • Lecturer
Description
  • I taught, conducted research and provided service to the university, nation and the world at large.
Education
August 2015 - June 2018
Kwame Nkrumah University of Science and Technology
Field of study
  • Computer Engineering

Publications

Publications (53)
Article
Full-text available
The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods for wireless sensor networks into socio-inspired, bio-inspired, and analytical methods...
Preprint
Full-text available
Emotion detection is a branch of sentiment analysis that deals with the extraction and analysis of emotions. The evolution of Web 2.0, has put text mining and analysis at the frontiers of organizational success. It helps service providers provide tailor-made services to their customers. Numerous studies are being carried out in the area of text min...
Preprint
Full-text available
We cannot overemphasize the essence of contextual information in most natural language processing (NLP) applications. The extraction of context yields significant improvements in many NLP tasks, including emotion recognition from texts. The paper discusses transformer-based models for NLP tasks. It highlights the pros and cons of the identified mod...
Article
Full-text available
With the exponential increase in connected devices and its accompanying complexities in network management, dynamic Traffic Engineering (TE) solutions in Software-Defined Networking (SDN) using Reinforcement Learning (RL) techniques has emerged in recent times. The SDN architecture empowers network operators to monitor network traffic with agility,...
Preprint
Full-text available
The use of ensembles has given rise to improved performance in various machine learning tasks. Following the performance of major transformer-based language models in detecting emotions from written texts, the paper investigates the ensemble's performance of the RoBERTa and XLNet transformer-based language models in recognizing emotions from the IS...
Article
Full-text available
Convolutional neural networks (CNNs) typically compress high‐resolution images to minimize computational requirements. However, this can lead to loss of information and reduced accuracy in classification tasks. This paper introduces WaveNet, a novel approach for processing high‐resolution images using wavelet‐domain inputs in CNNs. We address the c...
Article
Full-text available
Wounds contribute to 30%–42% of hospital visits and 9% of deaths but remain underreported in Africa. Diseases and surgeries increase wound prevalence, especially in rural areas where 27%–82% of people live, and health facilities are poor or non‐existent. This research aims to design a disease‐related wound classification model for online diagnosis...
Article
Full-text available
The Industrial Internet of Things collects data from the environment to improve industrial processes. Data integrity, privacy, authorisation, and authentication attacks are among the security vulnerabilities in traditional IIoT networks. Blockchain is a potential solution to some of these security issues. However, the throughput of traditional bloc...
Article
Access to electricity is a cornerstone for sustainable development and is pivotal to a country's progress. The absence of electricity impedes development and elevates poverty. The first step in sustainable energy planning is accurately estimating the people's electricity demand. However, accurately estimating or modelling electricity demand for loc...
Preprint
Full-text available
IoT devices relying on cloud-based computing resources for data processing are causing unsustainable growth and latency, thus making their dependence on these computing resources a foremost challenge to real-time and time-critical IoT applications. Researchers have proffered several approaches, but notable amongst them are the bio-inspired optimisa...
Article
Full-text available
The rise of generative AI requires a research agenda grounded in the African context to determine locally relevant strategies for its development and use. With a critical mass of evidence on the risks and benefits that generative AI poses to African societies, the scaled use of this new technology might help to reduce rising global inequities.
Chapter
Living and working smarter is becoming the new trend, and this is primarily made possible by the growth in the number of connected internet of things (IoT) devices globally. IoT’s foremost challenges include energy challenges and their inability to meet the latency demands of user applications. These are somewhat connected to their over-dependence...
Article
Full-text available
Blockchain technology has been increasingly adopted over the past few years since the introduction of Bitcoin, with several blockchain architectures and solutions being proposed. Most proposed solutions have been developed in isolation, without a standard protocol or cryptographic structure to work with. This has led to the problem of inter-operabi...
Article
Full-text available
Blockchain-IIoT integration into industrial processes promises greater security, transparency, and traceability. However, this advancement faces significant storage and scalability issues with existing blockchain technologies. Each peer in the blockchain network maintains a full copy of the ledger which is updated through consensus. This full repli...
Article
Full-text available
The changes experienced in technology due to the third industrial revolution have over the years contributed immensely to the development of efficient devices and systems. As a result, solutions have been provided to challenges encountered in the heating industry. However, higher efficiency and better performance has undoubtedly been highly sort af...
Article
Full-text available
Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usual...
Article
Full-text available
Facial emotion recognition (FER) forms part of affective computing, where computers are trained to recognize human emotion from human expressions. Facial Emotion Recognition is very necessary for bridging the communication gap between humans and computers because facial expressions are a form of communication that transmits 55% of a person's emotio...
Article
Full-text available
The increase of the Internet of Things (IoT) calls for secure solutions for industrial applications. The security of IoT can be potentially improved by blockchain. However, blockchain technology suffers scalability issues which hinders integration with IoT. Solutions to blockchain’s scalability issues, such as minimizing the computational complexit...
Article
Full-text available
Over the years, road traffic accidents keep claiming lives of people all over the world and alcohol impaired driving is one major cause of these road crashes. While most countries aim at curbing alcohol impaired driving by educating the masses on drunk driving through rallied campaigns, most developed and some developing countries have coupled mass...
Preprint
Full-text available
Background and Objectives: To a large extent, low production of maize can be attributed to diseases and pests. Accurate, fast, and early detection of maize plant disease is critical for efficient maize production. Early detection of a disease enables growers, breeders, and researchers to effectively apply the appropriate controlled measures to miti...
Article
Full-text available
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to s...
Article
Full-text available
Social Internet of Things (SIoT) involves integrating social networking concepts in the Internet of Things (IoT) to enhance social interactions among IoT objects and users. SIoT is envisaged to provide adequate service selection and discovery. Trust is an essential factor whenever social concepts are discussed in communication networks. Trust usual...
Article
Full-text available
Facial emotion recognition (FER) forms part of affective computing, where computers are trained to recognize human emotion from human expressions. Facial Emotion Recognition is very necessary for bridging the communication gap between humans and computers because facial expressions are a form of communication that transmits 55% of a person's emotio...
Preprint
Full-text available
This paper presents the complete industrial development of a new system of a microwave device for use in S-band networks (2.45 GHz ISM band in this application): a vector network analyzer (VNA). The VNA, which is designed based on the six-port measurement principle, provides accurate measurements of both magnitude and phase of the load reflection c...
Article
Full-text available
The integration of Internet of Things devices onto the Blockchain implies an increase in the transactions that occur on the Blockchain, thus increasing the storage requirements. A solution approach is to leverage cloud resources for storing blocks within the chain. The paper, therefore, proposes two solutions to this problem. The first being an imp...
Article
Full-text available
We cannot overemphasize the essence of contextual information in most natural language processing (NLP) applications. The extraction of context yields significant improvements in many NLP tasks, including emotion recognition from texts. The paper discusses transformer-based models for NLP tasks. It highlights the pros and cons of the identified mod...
Conference Paper
Full-text available
In this paper, an intelligent audible sound-based method for detecting cracks in engine crankshaft is proposed. To achieve this, an experimental setup was designed and used for the acquisition of samples from the crankshaft. A total of 13 features were extracted from the acquired sound samples but 7 of them were shortlisted using the neighborhood c...
Article
Full-text available
The fast emergence of IoT devices and its accompanying big and complex data has necessitated a shift from the traditional networking architecture to software-defined networks (SDNs) in recent times. Routing optimization and DDoS protection in the network has become a necessity for mobile network operators in maintaining a good QoS and QoE for custo...
Article
Full-text available
Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brilliant architecture is exposed to several security threats, e.g., the distributed denial of service (DDo...
Article
Full-text available
This paper presents the complete industrial development of a new system of a microwave device for use in S-band networks (2.45 GHz ISM band in this application): a vector network analyzer (VNA). The VNA, which is designed based on the six-port measurement principle, provides accurate measurements of both magnitude and phase of the load reflection c...
Conference Paper
The popularity of using pre-trained models results from the training ease and superior accuracy achieved in relatively shorter periods. The paper analyses the efficacy of utilizing transformer encoders on the ISEAR dataset for detecting emotions (i.e., anger, disgust, sadness, fear, joy, shame, and guilt). This work proposes a two-stage architectur...
Conference Paper
Transformers' feat is attributed to its better language understanding abilities to achieve state-of-the-art results in medicine, education, and other major NLP tasks. This paper analyzes the efficacy of BERT, RoBERTa, DistilBERT, and XLNet pre-trained transformer models in recognizing emotions from texts. The paper undertakes this by analyzing each...
Preprint
Full-text available
The popularity of using pre-trained models is as a result of the training ease and superior accuracy achieved in relatively shorter periods. The paper analyses the efficacy of utilizing transformer encoders on the ISEAR dataset for detecting emotions (i.e., anger, disgust, sadness, fear, joy, shame, and guilt). To achieve this, a two-stage architec...
Preprint
Full-text available
Transformers' feat is attributed to its better language understanding abilities to achieve the state-of-the-art results in medicine, education, and other major NLP tasks. This paper analyzes the efficacy of BERT, RoBERTa, DistilBERT, and XLNet pre-trained transformer models in recognizing emotions from texts. The paper undertakes this by analyzing...
Article
Full-text available
The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the abi...
Article
Full-text available
The cover image is based on the Review Article Text based emotion detection: Advances, challenges, and opportunities by Francisca Adoma Acheampong et al., https://doi.org/10.1002/eng2.12189.
Article
Full-text available
Emotion detection (ED) is a branch of sentiment analysis that deals with the extraction and analysis of emotions. The evolution of Web 2.0 has put text mining and analysis at the frontiers of organizational success. It helps service providers provide tailor‐made services to their customers. Numerous studies are being carried out in the area of text...
Preprint
Full-text available
The high possibility of benign nodes being maligned for reporting malicious behaviours can cause these benign nodes not to cooperate or may attempt to share inaccurate information with trustors in order to prevent being maligned. The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the se...
Article
Full-text available
The use of trust and reputation models (TRMs) are on the rise due to the increasing complexities of cryptography. The use of cryptography though potent on traditional networks, cannot be supported by the resource constraint wireless sensor network (WSN). Trust evaluations have made use of a number of approaches, such as analytical, bio-and socio-in...
Article
Full-text available
This paper deals with the implementation of a simple algorithm for automatic brain tumor segmentation. Brain tumor is commonly diagnosed by Computer tomography and Magnetic Resonance Imaging in clinical treatment. The paper uses Simple Linear Iterative Clustering (SLIC) to segment brain images according to their spatial and color proximities. The r...
Conference Paper
Full-text available
The use of computer vision in everyday applications is increasing but there has been little attention to the detection of contraband goods. The motivation behind the work is primarily due to the increasing rate of criminal activities due to the influx of contrabands, such as guns, at the various entry points of Ghana. Thus, the paper is aimed at th...
Conference Paper
Full-text available
In cases of fire outbreak, people struggle to find the telephone numbers of the nearest fire station(s). Once they manage to call the fire station, the cluttered addressing system of Ghana, makes it difficult to figure out the shortest possible road segments to use in order to arrive at the scene timeously. Sometimes by the time the fire engine get...
Article
Full-text available
Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the need to develop energy efficient framew...
Conference Paper
Full-text available
Electronics education is very much enhanced by adequate practical experiences. Due to this fact, a lot of educational institutions have set up electronics laboratories to aid in the teaching and learning process. The high cost of tooling these laboratories and the financial constraints of institutions in developing countries make it difficult to me...
Conference Paper
Full-text available
The widespread use of ubiquitous networks in sensitive application areas such as military surveillance and monitoring have necessitated the need to adopt encryption methods that are very fast and still assures a certain level of data confidentiality. Fast encryption methods that are not computationally intensive leads to an increase in energy-effic...
Article
Full-text available
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against node tampering and node subversion. Works carried out by wireless sensor network researchers pertaining to increas...
Article
Full-text available
The number of anchor nodes required for accurate localization is an important problem in the wireless sensor network research community. The error associated with localization is high when anchor nodes are not optimally placed in the network. No matter how the network is set up, the error associated with localization is inevitable. There are variou...
Article
Full-text available
In enterprise networks, the concept of bringing your own devices (BYOD) to work and also allowing guest nodes to connect to the network is encouraged. As a factor the need to control access to the network is critical as visibility of nodes attached to the network is paramount in determining potential threats. The use of opensource technology is not...
Article
Full-text available
The widespread nature of wireless computing and communications offers the promise of many societal and individual benefits. Consumer devices such as cell phones, PDAs and laptops have received a lot of attention over the years, even though the impact of wireless technology is much broader, e.g., through sensor networks for safety applications and h...

Questions

Questions (2)
Question
What are the indicators that can be used in determining whether a node is capable of communicating (functional) with another node.
Question
Privacy in a wireless broadcast domain. Chaffing and winnowing is not an option to be considered.

Network

Cited By