Kponyo Jerry

Kponyo Jerry
  • PhD
  • Professor (Associate) at Kwame Nkrumah University of Science and Technology

About

83
Publications
39,610
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
694
Citations
Current institution
Kwame Nkrumah University of Science and Technology
Current position
  • Professor (Associate)
Additional affiliations
August 2011 - December 2014
University of Electronic Science and Technology of China
Position
  • PhD Student
February 2008 - present
Kwame Nkrumah University of Science and Technology
Position
  • Lecturer

Publications

Publications (83)
Article
Full-text available
High-resolution images are increasingly used in fields such as remote sensing, medical imaging, and agriculture, but they present significant computational challenges when processed with deep learning models. This paper provides a systematic review of deep learning techniques developed to improve the efficiency of high-resolution image processing....
Article
Full-text available
Reactive and preventive maintenance strategies have been applied to avert transformer failures and safeguard their operations. However, these approaches have limitations of high operational downtimes, over‐ and under‐maintenance issues, maintenance fatigue and revenue loss. The advancements in machine learning and artificial intelligence have posit...
Article
Full-text available
Convolutional neural networks (CNNs) typically compress high‐resolution images to minimize computational requirements. However, this can lead to loss of information and reduced accuracy in classification tasks. This paper introduces WaveNet, a novel approach for processing high‐resolution images using wavelet‐domain inputs in CNNs. We address the c...
Article
Full-text available
Wounds contribute to 30%–42% of hospital visits and 9% of deaths but remain underreported in Africa. Diseases and surgeries increase wound prevalence, especially in rural areas where 27%–82% of people live, and health facilities are poor or non‐existent. This research aims to design a disease‐related wound classification model for online diagnosis...
Article
Access to electricity is a cornerstone for sustainable development and is pivotal to a country's progress. The absence of electricity impedes development and elevates poverty. The first step in sustainable energy planning is accurately estimating the people's electricity demand. However, accurately estimating or modelling electricity demand for loc...
Article
Full-text available
In Africa, rapid population growth and a focus on increasing food production have often overlooked the crucial aspect of food safety, leading to the highest per capita incidences of foodborne illness globally. This underscores the imperative to address the food safety challenges on the continent. A critical concern is the widespread adulteration of...
Article
Full-text available
This review paper delves into the global agricultural food supply chains through the lens of African perspectives, examining the role of blockchain and Internet of Things (IoT) technologies in transforming food traceability. It assesses the applicability and efficacy of these innovations in addressing critical issues such as food fraud, contaminati...
Article
Full-text available
Energy profligacy and appliance degradation are the apex reasons accounting for the continuous rise in power wastage and high energy bills. The decline in energy conservation and management in residences has been largely attributed to the financial implications of using intrusive methods. This work aimed to resolve the challenges of intrusive load...
Article
Full-text available
This work presents a printed monopole antenna with a miniature size and enhanced wideband using characteristic mode analysis (CMA). The printed monopole antenna structure comprises one vertical and one horizontal monopole, and a ground plane with a vertical extension. By connecting the horizontal monopole to the ground plane extension through a via...
Article
Full-text available
This paper presents the design of a simple dual-band circularly polarized monopole antenna using characteristic mode analysis. First, a dual-band elliptically polarized “L”-shaped monopole antenna with a partial ground is designed; then, a rectangular stub and a parasitic structure on the ground plane are implemented to achieve dual-band CP operati...
Article
Full-text available
The rise of generative AI requires a research agenda grounded in the African context to determine locally relevant strategies for its development and use. With a critical mass of evidence on the risks and benefits that generative AI poses to African societies, the scaled use of this new technology might help to reduce rising global inequities.
Article
Full-text available
The increasing demands for higher bandwidth and lower latency in modern telecommunications networks have led to the exploration of network slicing as a means to meet these requirements more efficiently in next-generation 5G networks. Despite substantial academic interest in resource allocation and management in network slicing, existing research is...
Article
Methods to integrate different access technologies such as heterogeneous communication architecture remains a challenge. Among a variety of V2X-supporting access technologies, Dedicated Short Range Communication (DSRC) and cellular communications, e.g., Long Term Evolution (LTE) is promising reliable and efficient vehicular communications. DSRC has...
Conference Paper
Concerns about food safety have grown across society in recent years. Building a trustworthy traceability system is essential for effectively identifying and preventing food safety issues as well as tracing the responsible parties. The entire food supply chain, which includes the stages of production, processing , warehousing, transportation, and s...
Article
Full-text available
Presented in this paper is a circularly polarized (CP) wide 45° rotated slot antenna with a broad bandwidth. Characteristic mode analysis is initially carried out to show that, by simply rotating a square slot, CP waves can be radiated if it is properly excited. A simple 50 Ω feedline is then designed to excite the slot for the generation of broadb...
Article
Full-text available
Blockchain-IIoT integration into industrial processes promises greater security, transparency, and traceability. However, this advancement faces significant storage and scalability issues with existing blockchain technologies. Each peer in the blockchain network maintains a full copy of the ledger which is updated through consensus. This full repli...
Article
Full-text available
A pattern-reconfigurable circularly polarized antenna for 2.45 GHz industrial, scientific, and medical (ISM) band applications is designed in this work. The proposed antenna consists of a slotted-stepped monopole connected to a rectangular ground plane via a shorting side-stub. This converts the omnidirectional radiation pattern of the antenna into...
Article
Full-text available
A directional planar monopole antenna is described. The antenna comprises of a circular monopole, coplanar waveguide (CPW) feed line and a ground plane. To achieve unidirectional radiation, a stub is also attached to on the ground plane to increase the lower end impedance bandwidth and also increase the Front-to-Back ratio (F/B). The proposed anten...
Article
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security. This attack targets the flow of information between endpoints. An attacker is able to eavesdrop on the communication between two targets and can either perform active or passive monitoring; this affects the confidentiality and integrity of the data flow. Sev...
Article
Full-text available
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to s...
Chapter
Full-text available
The Internet of Things (IoT) describes physical objects or subsystems enhanced by sensors, actuators, transducers, softwares, communication interfaces, and data exchange mechanisms among peers over the Internet. It has emerged as a critical component of modern distributed systems. The concept of “things” has a broad definition that includes any phy...
Article
Full-text available
Within the frequency band designated by the FCC for UWB systems, there are other frequency bands that are also designated for use for other technologies like WLAN (5.15 – 5.35 GHz) and WiMAX (3.3 – 3.7 GHz). These systems can cause interference with UWB systems when operated at the same time. Therefore, an antenna operating in the UWB spectrum need...
Article
Full-text available
This paper presents a novel model of a closed loop capacitive accelerometer. Capacitive accelerometer is able to detect the displacement/position of a vehicle by means of Position-Velocity-Acceleration (PVA) model. The closed loop design is design to overcome the steady state error obtained in the equivalent open loop design. Therefore, in this pa...
Article
Full-text available
The rising interest in the Internet of Things has contributed to the rapid deployment of wireless sensor networks (WSNs). However, as a result of the design of the sensor nodes and networks, WSNs exhibit dynamic challenges in mobile and large-scale applications. The nodes are equipped with limited resources and the networks have static architecture...
Article
Full-text available
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security. This attack targets the flow of information between endpoints. An attacker is able to eavesdrop on the communication between two targets and can either perform active or passive monitoring; this affects the confidentiality and integrity of the data flow. Sev...
Article
Full-text available
Software-defined networking is a novel concept that is ported into wireless sensor networks to make them more manageable and customizable. unfortunately, the topology discovery and maintenance processes generate high overhead control packet exchange between the sensor nodes and the central controller leading to a deterioration of the network's perf...
Article
The Internet of Things (IoT) is an intelligent network that connects smart objects to the Internet. A large number of IoT devices are connecting to the Internet, yet many of these devices are insecure, exposing them to a number of security threats. Most IoT devices are resource constrained hence making it difficult to secure them using conventional...
Article
Full-text available
Electricity is one of the most crucial resources that drives any given nation’s growth and development. The latest Sustainable Development Goals report indicates Africa still has a high deficit in electricity generation. Concentrating solar power seems to be a potential option to fill the deficit. That is because most of the components of concentra...
Preprint
Full-text available
Electricity is one of the most crucial resources that drives any given nation's growth and development. The latest Sustainable Development Goals report indicates Africa still has a high deficit in electricity generation. Concentrating solar power seems to be a potential option to fill the deficit. That is because most of the components of concentra...
Article
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet to exchange information. The direct connection of IoT devices to the internet makes them susceptible to several security threats. S...
Article
Full-text available
A circularly polarized printed antenna using an asymmetric open‐slot is designed in this paper. The presented antenna consists of conducting ground plane with open wide‐slot, fed electromagnetically by a microstrip feedline. The slot and feedline are positioned at the edge of the ground plane and substrate, hence making the antenna asymmetric. The...
Article
Full-text available
This article presents a novel planar monopole antenna with circular polarization. The 3‐dB axial ratio (AR) is achieved by: shifting a vertical monopole to the left edge of the substrate in conjunction with a laterally inverted L‐shaped ground plane. When viewed from the top, the antenna resembles an uneven T‐shaped structure rotated at 90°. Measur...
Article
Full-text available
The outbreaks of infectious diseases have had a huge impact on the human society. Researchers have developed models aimed at understanding how various infectious diseases spread in communities and also proposed control measures that can minimize or stop the spread of the diseases. Most researchers have developed stochastic mathematical models which...
Article
Full-text available
The agricultural sector significantly contributes to the economic growth of every country. This sector faces challenges with respect to producing the right quantity and quality of food. Most traditional methods used in growing crops are inadequate to ensuring food security. This challenge can be addressed by applying Information and Communication T...
Article
Full-text available
Most Sub-Saharan Africa countries including Ghana experience a shortage of medical professionals, especially in the rural areas. This is mainly caused by the low-intake of students into medical schools due to inadequacy of facilities to train students. Also, a number of medical students graduate and emigrate to foreign countries to seek new opportu...
Conference Paper
Full-text available
Internet of Things(IoT), allows communication among heterogeneous devices including everyday existing objects , embedded intelligent sensors, context-aware computing, traditional computing networks and smart objects that differ in their design, systems, protocols, intelligence, applications, vendors, and sizes. The direct connection of these hetero...
Article
Full-text available
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet for the purpose of exchanging information. The direct connection of IoT devices to the internet makes them susceptible to several s...
Article
Full-text available
Man-In-The-Middle (MITM) attack is one of the well-known threats in computer security. With the convergence of smart objects and the Internet (Internet of Things), there has been the need to ensure confidentiality, integrity and availability of information. MITM targets the data flow between endpoints, and the confidentiality and integrity of the d...
Article
Full-text available
The problem of vehicular traffic congestion is ubiquitous yet non-trivial. It is increasingly worsening by the day all around the world with severe vehicular traffic taking its toll on all road users. With the upsurge in urban traffic jams, innovative control strategies are therefore essential to allow efficient flow of vehicular movement. It is th...
Article
Full-text available
Internet of Things (IoT) is a new paradigm that integrates the internet and smart objects. It is an intelligent network that connects all things to the Internet for the purpose of exchanging information and communicating through the information sensing devices in accordance with agreed protocols. Aside the various benefits IoT provides, it also pre...
Article
A compact wideband planar monopole antenna with unidirectional radiation properties is proposed in this paper. The measured results demonstrate that the antenna has an S11 < -10 dB bandwidth ranging from 2.3 × 6 GHz with an end-fire radiation pattern with front-to-back ratio (F/B) > 10 dB across the operating frequency range. The antenna is very si...
Article
Full-text available
A novel miniature wideband microstrip antenna is presented. The proposed miniature design is achieved by exploiting the idea of a quasi-radiator. Here, a part of the radiator is connected to the ground plane through a shorting pin or via. The proposed antenna achieves a starting frequency of 1.8 GHz with a small antenna area of 20 mm². An electrica...
Article
Full-text available
In this paper we present a selective mobile phone communication blocking system for mobile phone restricted areas. Since existing systems are looking at selective blocking for calls, we extend the scope to cover other communication services; that is for data connection, SMS and emergency call services. This was implemented using fuzzy inference sys...
Conference Paper
Full-text available
Data dissemination is the core of the Vehicular Ad-hoc Networks(VANETs). Current media through which information is disseminated in the vehicular environment pose number of challenges. Some of these challenges include bandwidth and data latency. In the light of these challenges, this paper presents a review on current data dissemination technologie...
Preprint
Full-text available
One of the salient factors to look at during wireless network planning is developing a modified path loss prediction models to suit a new environment other than the one it was originally designed for. This helps to give accurate predictive outcomes. This paper seeks to demonstrate the effects of applying correction factors on radio propagation mode...
Article
Full-text available
One of the salient factors to look at during wireless network planning is developing a modified path loss prediction models to suit a new environment other than the one it was originally designed for. This helps to give accurate predictive outcomes. This paper seeks to demonstrate the effects of applying correction factors on radio propagation mode...
Article
Full-text available
This paper presents an ongoing investigation into the effect of modulation schemes on Radio Frequency Identification performance and forecast the implication for a ubiquitous network such as the future Internet of Things. The paper plans to employ the use of two popular metrics-Bit Error Ratio and Signal-to-Noise Ratio to evaluate the success rate...
Article
Full-text available
A compact circularly polarized antenna using a wide L-shaped slot and a microstrip feedline is proposed. The measured results demonstrate that the antenna has an axial ratio (AR) < 3 dB bandwidth ranging from 5–8.5 GHz and an S 11 < −10 dB bandwidth ranging from 4–8.6 GHz. The antenna is very simple, composed of an L-slot and a microstrip feedline...
Conference Paper
As vehicle population continues to increase, traffic management and issues related to congestion is an inevitable consequence. The path taken by drivers to arrive at their destination has the tendency of reducing the traffic within the network or increasing it. The choice of path, however, depends on how much traffic information is available to the...
Article
Full-text available
In this paper, we demonstrate the 6-port network technique for the extraction noise correlation matrix of a 2-port DUT and thus its noise parameters. The passive 6-port network which is extended to an 8-port is designed using five Wilkinson power dividers, and a 90̊ hybrid. Three Low Noise Amplifiers (LNA) as well as SP4T switch are incorporated in...
Article
This paper presents an ongoing investigation into the effect of modulation schemes on Radio Frequency Identification performance and forecast the implication for a ubiquitous network such as the future Internet of Things. The paper plans to employ the use of two popular metrics – Bit Error Ratio and Signal-to-Noise Ratio to evaluate the success rat...
Article
In this paper the effect of channel estimation errors on the energy efficiency of a downlink massive multiple-input multiple-output system is investigated and analyzed. The required downlink transmit power of the zero forcing (ZF) and maximum ratio transmission (MRT) precoding schemes are derived and analyzed under imperfect channel state informati...
Conference Paper
Full-text available
A Dynamic Travel Path Optimization System (DTPOS) based on Ant Colony Optimization (ACO) for the prediction of the best path to a given destination is presented. The system is modeled in a multi-agent multipurpose framework in NetLogo and experiments conducted on 100 test vehicles under different traffic scenarios. The test vehicles are released fr...
Article
In this letter, we present the mode combinations needed to achieve orthogonal sub-channels in an ideal wireless orbital angular momentum based multiple-input multiple-output (OAM-MIMO) multiplexing system with $N$ OAM transmitters and $M$ receive antennas. The results show that, orthogonality is achieved if the absolute difference between any two t...
Article
Full-text available
Current traffic control systems regulate traffic flows only by switching traffic lights according to historical data. Status-prediction and routing services also rely on historical data and as such the accuracy of such predictions cannot be fully relied upon. This paper models the traffic control problem as a multi-agent-multipurpose system (MAMP)...
Conference Paper
We present a formulation for the calibration of a passive eight-port network, which could be used for extracting the noise wave correlation matrix of a two-port Device Under Test (DUT) from measurement of only noise figures and gains with a commercially available Noise Figure Analyzer (NFA). The extracted noise wave correlation matrix can be conver...
Conference Paper
A wireless multiple-input multiple-output (MIMO) multiplexing system consists of multiple transmit and receive antennas. The channel capacity of such systems does not merely depend on the number of degrees of freedom (DoF) it can support, but also on their gains, represented by the singular values of the channel matrix. A radio frequency based orbi...
Conference Paper
The use of multiple-input multiple-output (MIMO) techniques is one of the proposed methods for detecting message signals multiplexed on a single frequency using multiple wireless orbital angular momentum (OAM) states. In a recent study, the use of a uniform circular array (UCA) of conventional antennas at the receive side was used in an ideal wirel...
Conference Paper
The use of multiple-input multiple-output (MIMO) techniques is one of the proposed methods for detecting message signals multiplexed on a single frequency using multiple wireless orbital angular momentum (OAM) states. In a recent study, the use of a uniform circular array (UCA) of conventional antennas at the receive side was used in an ideal wirel...
Conference Paper
Full-text available
In this paper the performances of zero-forcing (ZF) and maximum ratio transmission (MRT) are analyzed and compared in a downlink massive multiple-input multiple-output system. The system employs a large number of base station antennas serving multiple user terminals within the same cell. The achievable sum rate and the required downlink transmit po...
Conference Paper
Full-text available
This paper demonstrates that ant colony optimization can efficiently improve the traffic situation in an urban environment. A Dynamic Travel Path Optimization System (DTPOS) based on Ant Colony Optimization (ACO) is proposed for the prediction of the best path to a given destination. In DTPOS, traffic factors such as average travel speed, average w...
Article
This paper demonstrates that ant colony optimization can efficiently improve the traffic situation in an urban environment. A Dynamic Travel Path Optimization System (DTPOS) based on Ant Colony Optimization (ACO) is proposed for the prediction of the best path to a given destination. In DTPOS, traffic factors such as average travel speed, average w...
Conference Paper
Full-text available
In this paper, a single fed wideband circularly polarized slot antenna is proposed for multiband applications. The antenna consists of a rotated hexagonal slot with a parasitic patch placed in the slot which also has a thin slot in its center. The antenna has a feed-line offset which in addition to the parasitic stubs produce the two near degenerat...
Conference Paper
Full-text available
Vehicle to Vehicle (V2V) communication offers great potential as far as information dissemination in VANETs is concerned. Research has shown that clustering vehicles and relaying information through cluster-heads (CHs) has several advantages over allowing all the vehicles to broadcast the information. Forming and maintaining stable clusters as well...
Article
Full-text available
Reliability is an important issue for safety-critical and traffic situation broadcast services in Vehicular Ad-hoc Networks (VANETs). The Packet Reception Rate (PRR) is a key metric to evaluate broadcast reliability. Most researches of broadcasting in VANETs focus on multi-hop routing and connection establishing, taking all one-hop links for grante...
Conference Paper
Full-text available
The average travel speed and waiting time of cars are factors which determine the time taken to get to a destination. These factors are influenced by the traffic situation at various sections of the road. In this paper a novel Distributed Intelligent Traffic System (DITS) which is based on Ant Colony Optimization has been proposed. In the proposed...
Article
Vehicular traffic congestion often occurs on the main roads of most cities as the number of vehicles grows, wasting the time and fuel of motorists. One important reason for traffic congestion is a lack of timely information on traffic conditions. In this paper, a time and area limited epidemic forwarding method is proposed to alleviate traffic cong...

Questions

Questions (2)
Question
I have done some works with NetLogo simulation tool in artificial intelligence and I will be glad to have a discussion with anyone who is familiar with it. I want to integrate real maps into the simulation environment and will like to discuss how to go about it.
Question
I am working on applying artificial intelligence to VANETS. I have already done some simulations using 4x4 and 6x6 road topologies. I am now trying to integrate real maps into the simulation, can anyone who is familiar with NetLogo simulation show me how this can be done?

Network

Cited By