About
83
Publications
39,610
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
694
Citations
Introduction
Current institution
Additional affiliations
August 2011 - December 2014
February 2008 - present
Publications
Publications (83)
High-resolution images are increasingly used in fields such as remote sensing, medical imaging, and agriculture, but they present significant computational challenges when processed with deep learning models. This paper provides a systematic review of deep learning techniques developed to improve the efficiency of high-resolution image processing....
Reactive and preventive maintenance strategies have been applied to avert transformer failures and safeguard their operations. However, these approaches have limitations of high operational downtimes, over‐ and under‐maintenance issues, maintenance fatigue and revenue loss. The advancements in machine learning and artificial intelligence have posit...
Convolutional neural networks (CNNs) typically compress high‐resolution images to minimize computational requirements. However, this can lead to loss of information and reduced accuracy in classification tasks. This paper introduces WaveNet, a novel approach for processing high‐resolution images using wavelet‐domain inputs in CNNs. We address the c...
Wounds contribute to 30%–42% of hospital visits and 9% of deaths but remain underreported in Africa. Diseases and surgeries increase wound prevalence, especially in rural areas where 27%–82% of people live, and health facilities are poor or non‐existent. This research aims to design a disease‐related wound classification model for online diagnosis...
Access to electricity is a cornerstone for sustainable development and is pivotal to a country's progress. The absence of electricity impedes development and elevates poverty. The first step in sustainable energy planning is accurately estimating the people's electricity demand. However, accurately estimating or modelling electricity demand for loc...
In Africa, rapid population growth and a focus on increasing food production have often overlooked the crucial aspect of food
safety, leading to the highest per capita incidences of foodborne illness globally. This underscores the imperative to address the
food safety challenges on the continent. A critical concern is the widespread adulteration of...
This review paper delves into the global agricultural food supply chains through the lens of African perspectives, examining the role of blockchain and Internet of Things (IoT) technologies in transforming food traceability. It assesses the applicability and efficacy of these innovations in addressing critical issues such as food fraud, contaminati...
Energy profligacy and appliance degradation are the apex reasons accounting for the continuous rise in power wastage and high energy bills. The decline in energy conservation and management in residences has been largely attributed to the financial implications of using intrusive methods. This work aimed to resolve the challenges of intrusive load...
This work presents a printed monopole antenna with a miniature size and enhanced wideband using characteristic mode analysis (CMA). The printed monopole antenna structure comprises one vertical and one horizontal monopole, and a ground plane with a vertical extension. By connecting the horizontal monopole to the ground plane extension through a via...
This paper presents the design of a simple dual-band circularly polarized monopole antenna using characteristic mode analysis. First, a dual-band elliptically polarized “L”-shaped monopole antenna with a partial ground is designed; then, a rectangular stub and a parasitic structure on the ground plane are implemented to achieve dual-band CP operati...
The rise of generative AI requires a research agenda grounded in the African context to determine locally relevant strategies for its development and use. With a critical mass of evidence on the risks and benefits that generative AI poses to African societies, the scaled use of this new technology might help to reduce rising global inequities.
The increasing demands for higher bandwidth and lower latency in modern telecommunications networks have led to the exploration of network slicing as a means to meet these requirements more efficiently in next-generation 5G networks. Despite substantial academic interest in resource allocation and management in network slicing, existing research is...
Methods to integrate different access technologies such as heterogeneous communication architecture remains a challenge. Among a variety of V2X-supporting access technologies, Dedicated Short Range Communication (DSRC) and cellular communications, e.g., Long Term Evolution (LTE) is promising reliable and efficient vehicular communications. DSRC has...
Concerns about food safety have grown across society in recent years. Building a trustworthy traceability system is essential for effectively identifying and preventing food safety issues as well as tracing the responsible parties. The entire food supply chain, which includes the stages of production, processing , warehousing, transportation, and s...
Presented in this paper is a circularly polarized (CP) wide 45° rotated slot antenna with a broad bandwidth. Characteristic mode analysis is initially carried out to show that, by simply rotating a square slot, CP waves can be radiated if it is properly excited. A simple 50 Ω feedline is then designed to excite the slot for the generation of broadb...
Blockchain-IIoT integration into industrial processes promises greater security, transparency, and traceability. However, this advancement faces significant storage and scalability issues with existing blockchain technologies. Each peer in the blockchain network maintains a full copy of the ledger which is updated through consensus. This full repli...
A pattern-reconfigurable circularly polarized antenna for 2.45 GHz industrial, scientific, and medical (ISM) band applications is designed in this work. The proposed antenna consists of a slotted-stepped monopole connected to a rectangular ground plane via a shorting side-stub. This converts the omnidirectional radiation pattern of the antenna into...
A directional planar monopole antenna is described. The antenna comprises of a circular monopole, coplanar waveguide (CPW) feed line and a ground plane. To achieve unidirectional radiation, a stub is also attached to on the ground plane to increase the lower end impedance bandwidth and also increase the Front-to-Back ratio (F/B). The proposed anten...
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security. This attack targets the flow of information between endpoints. An attacker is able to eavesdrop on the communication between two targets and can either perform active or passive monitoring; this affects the confidentiality and integrity of the data flow. Sev...
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to s...
The Internet of Things (IoT) describes physical objects or subsystems enhanced by sensors, actuators, transducers, softwares, communication interfaces, and data exchange mechanisms among peers over the Internet. It has emerged as a critical component of modern distributed systems. The concept of “things” has a broad definition that includes any phy...
Within the frequency band designated by the FCC for UWB systems, there are other frequency bands that are also designated for use for other technologies like WLAN (5.15 –
5.35 GHz) and WiMAX (3.3 – 3.7 GHz). These systems can cause interference with UWB systems when operated at the same time. Therefore, an antenna operating in the UWB spectrum need...
This paper presents a novel model of a closed
loop capacitive accelerometer. Capacitive accelerometer is able
to detect the displacement/position of a vehicle by means of
Position-Velocity-Acceleration (PVA) model. The closed loop
design is design to overcome the steady state error obtained in
the equivalent open loop design. Therefore, in this pa...
The rising interest in the Internet of Things has contributed to the rapid deployment of wireless sensor networks (WSNs). However, as a result of the design of the sensor nodes and networks, WSNs exhibit dynamic challenges in mobile and large-scale applications. The nodes are equipped with limited resources and the networks have static architecture...
End-Point (EP) Man-In-The-Middle (MITM) attack is a well-known threat in computer security. This attack targets the flow of information between endpoints. An attacker is able to eavesdrop on the communication between two targets and can either perform active or passive monitoring; this affects the confidentiality and integrity of the data flow. Sev...
Software-defined networking is a novel concept that is ported into wireless sensor networks to make them more manageable and customizable. unfortunately, the topology discovery and maintenance processes generate high overhead control packet exchange between the sensor nodes and the central controller leading to a deterioration of the network's perf...
The Internet of Things (IoT) is an intelligent network that connects smart objects to the Internet. A large number of IoT devices are connecting to the Internet, yet many of these devices are insecure, exposing them to a number of security threats. Most IoT devices are resource constrained hence making it difficult to secure them using conventional...
Electricity is one of the most crucial resources that drives any given nation’s growth and development. The latest Sustainable Development Goals report indicates Africa still has a high deficit in electricity generation. Concentrating solar power seems to be a potential option to fill the deficit. That is because most of the components of concentra...
Electricity is one of the most crucial resources that drives any given nation's growth and development. The latest Sustainable Development Goals report indicates Africa still has a high deficit in electricity generation. Concentrating solar power seems to be a potential option to fill the deficit. That is because most of the components of concentra...
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet to exchange information. The direct connection of IoT devices to the internet makes them susceptible to several security threats. S...
A circularly polarized printed antenna using an asymmetric open‐slot is designed in this paper. The presented antenna consists of conducting ground plane with open wide‐slot, fed electromagnetically by a microstrip feedline. The slot and feedline are positioned at the edge of the ground plane and substrate, hence making the antenna asymmetric. The...
This article presents a novel planar monopole antenna with circular polarization. The 3‐dB axial ratio (AR) is achieved by: shifting a vertical monopole to the left edge of the substrate in conjunction with a laterally inverted L‐shaped ground plane. When viewed from the top, the antenna resembles an uneven T‐shaped structure rotated at 90°. Measur...
The outbreaks of infectious diseases have had a huge impact on the human society. Researchers have developed models aimed at understanding how various infectious diseases spread in communities and also proposed control measures that can minimize or stop the spread of the diseases. Most researchers have developed stochastic mathematical models which...
The agricultural sector significantly contributes to the economic growth of every country. This sector faces challenges with respect to producing the right quantity and quality of food. Most traditional methods used in growing crops are inadequate to ensuring food security. This challenge can be addressed by applying Information and Communication T...
Most Sub-Saharan Africa countries including Ghana experience a shortage of medical professionals, especially in the rural areas. This is mainly caused by the low-intake of students into medical schools due to inadequacy of facilities to train students. Also, a number of medical students graduate and emigrate to foreign countries to seek new opportu...
Internet of Things(IoT), allows communication among heterogeneous devices including everyday existing objects , embedded intelligent sensors, context-aware computing, traditional computing networks and smart objects that differ in their design, systems, protocols, intelligence, applications, vendors, and sizes. The direct connection of these hetero...
The Internet of Things (IoT) is a new paradigm that enables the convergence of smart objects and the internet. This convergence has led to the creation of an intelligent network that connects all things to the internet for the purpose of exchanging information. The direct connection of IoT devices to the internet makes them susceptible to several s...
Man-In-The-Middle (MITM) attack is one of the well-known threats in computer security. With the convergence of smart objects and the Internet (Internet of Things), there has been the need to ensure confidentiality, integrity and availability of information. MITM targets the data flow between endpoints, and the confidentiality and integrity of the d...
The problem of vehicular traffic congestion is ubiquitous yet non-trivial. It is increasingly worsening by the day all around the world with severe vehicular traffic taking its toll on all road users. With the upsurge in urban traffic jams, innovative control strategies are therefore essential to allow efficient flow of vehicular movement. It is th...
Internet of Things (IoT) is a new paradigm that integrates the internet and smart objects. It is an intelligent network that connects all things to the Internet for the purpose of exchanging information and communicating through the information sensing devices in accordance with agreed protocols. Aside the various benefits IoT provides, it also pre...
A compact wideband planar monopole antenna with unidirectional radiation properties is proposed in this paper. The measured results demonstrate that the antenna has an S11 < -10 dB bandwidth ranging from 2.3 × 6 GHz with an end-fire radiation pattern with front-to-back ratio (F/B) > 10 dB across the operating frequency range. The antenna is very si...
A novel miniature wideband microstrip antenna is presented. The proposed miniature design is achieved by exploiting the idea of a quasi-radiator. Here, a part of the radiator is connected to the ground plane through a shorting pin or via. The proposed antenna achieves a starting frequency of 1.8 GHz with a small antenna area of 20 mm². An electrica...
In this paper we present a selective mobile phone communication blocking system for mobile phone restricted areas. Since existing systems are looking at selective blocking for calls, we extend the scope to cover other communication services; that is for data connection, SMS and emergency call services. This was implemented using fuzzy inference sys...
Data dissemination is the core of the Vehicular Ad-hoc Networks(VANETs). Current media through which information is disseminated in the vehicular environment pose number of challenges. Some of these challenges include bandwidth and data latency. In the light of these challenges, this paper presents a review on current data dissemination technologie...
One of the salient factors to look at during wireless network planning is developing a modified path loss prediction models to suit a new environment other than the one it was originally designed for. This helps to give accurate predictive outcomes. This paper seeks to demonstrate the effects of applying correction factors on radio propagation mode...
One of the salient factors to look at during wireless network planning is developing a modified path loss prediction models to suit a new environment other than the one it was originally designed for. This helps to give accurate predictive outcomes. This paper seeks to demonstrate the effects of applying correction factors on radio propagation mode...
This paper presents an ongoing investigation into the effect of modulation schemes on Radio Frequency Identification performance and forecast the implication for a ubiquitous network such as the future Internet of Things. The paper plans to employ the use of two popular metrics-Bit Error Ratio and Signal-to-Noise Ratio to evaluate the success rate...
A compact circularly polarized antenna using a wide L-shaped slot and a microstrip feedline is proposed. The measured results demonstrate that the antenna has an axial ratio (AR) < 3 dB bandwidth ranging from 5–8.5 GHz and an S 11 < −10 dB bandwidth ranging from 4–8.6 GHz. The antenna is very simple, composed of an L-slot and a microstrip feedline...
As vehicle population continues to increase, traffic
management and issues related to congestion is an inevitable
consequence. The path taken by drivers to arrive at their
destination has the tendency of reducing the traffic within
the network or increasing it. The choice of path, however,
depends on how much traffic information is available to
the...
In this paper, we demonstrate the 6-port network technique for the extraction noise correlation matrix of a
2-port DUT and thus its noise parameters. The passive 6-port network which is extended to an 8-port is designed using
five Wilkinson power dividers, and a 90̊ hybrid. Three Low Noise Amplifiers (LNA) as well as SP4T switch are
incorporated in...
This paper presents an ongoing investigation into the effect of modulation schemes on Radio Frequency Identification performance and forecast the implication for a ubiquitous network such as the future Internet of Things. The paper plans to employ the use of two popular metrics – Bit Error Ratio and Signal-to-Noise Ratio to evaluate the success rat...
In this paper the effect of channel estimation errors on the energy efficiency of a downlink massive multiple-input multiple-output system is investigated and analyzed. The required downlink transmit power of the zero forcing (ZF) and maximum ratio transmission (MRT) precoding schemes are derived and analyzed under imperfect channel state informati...
A Dynamic Travel Path Optimization System (DTPOS) based on Ant Colony Optimization (ACO) for the prediction of the best path to a given destination is presented. The system is modeled in a multi-agent multipurpose framework in NetLogo and experiments conducted on 100 test vehicles under different traffic scenarios. The test vehicles are released fr...
In this letter, we present the mode combinations needed to achieve orthogonal sub-channels in an ideal wireless orbital angular momentum based multiple-input multiple-output (OAM-MIMO) multiplexing system with $N$ OAM transmitters and $M$ receive antennas. The results show that, orthogonality is achieved if the absolute difference between any two t...
Current traffic control systems regulate traffic flows only by switching traffic lights according to historical data. Status-prediction and routing services also rely on historical data and as such the accuracy of such predictions cannot be fully relied upon. This paper models the traffic control problem as a multi-agent-multipurpose system (MAMP)...
We present a formulation for the calibration of a
passive eight-port network, which could be used for extracting
the noise wave correlation matrix of a two-port Device Under
Test (DUT) from measurement of only noise figures and gains
with a commercially available Noise Figure Analyzer (NFA).
The extracted noise wave correlation matrix can be conver...
A wireless multiple-input multiple-output (MIMO) multiplexing system consists of multiple transmit and receive antennas. The channel capacity of such systems does not merely depend on the number of degrees of freedom (DoF) it can support, but also on their gains, represented by the singular values of the channel matrix. A radio frequency based orbi...
The use of multiple-input multiple-output (MIMO) techniques is one of the proposed methods for detecting message signals multiplexed on a single frequency using multiple wireless orbital angular momentum (OAM) states. In a recent study, the use of a uniform circular array (UCA) of conventional antennas at the receive side was used in an ideal wirel...
The use of multiple-input multiple-output (MIMO)
techniques is one of the proposed methods for detecting message
signals multiplexed on a single frequency using multiple wireless
orbital angular momentum (OAM) states. In a recent study,
the use of a uniform circular array (UCA) of conventional
antennas at the receive side was used in an ideal wirel...
In this paper the performances of zero-forcing (ZF) and maximum ratio transmission (MRT) are analyzed and compared in a downlink massive multiple-input multiple-output system. The system employs a large number of base station antennas serving multiple user terminals within the same cell. The achievable sum rate and the required downlink transmit po...
This paper demonstrates that ant colony optimization can efficiently improve the traffic situation in an urban environment. A Dynamic Travel Path Optimization System (DTPOS) based on Ant Colony Optimization (ACO) is proposed for the prediction of the best path to a given destination. In DTPOS, traffic factors such as average travel speed, average w...
This paper demonstrates that ant colony optimization can efficiently improve the traffic situation in an urban environment. A Dynamic Travel Path Optimization System (DTPOS) based on Ant Colony Optimization (ACO) is proposed for the prediction of the best path to a given destination. In DTPOS, traffic factors such as average travel speed, average w...
In this paper, a single fed wideband circularly polarized slot antenna is proposed for multiband applications. The antenna consists of a rotated hexagonal slot with a parasitic patch placed in the slot which also has a thin slot in its center. The antenna has a feed-line offset which in addition to the parasitic stubs produce the two near degenerat...
Vehicle to Vehicle (V2V) communication offers great potential as far as information dissemination in VANETs is concerned. Research has shown that clustering vehicles and relaying information through cluster-heads (CHs) has several advantages over allowing all the vehicles to broadcast the information. Forming and maintaining stable clusters as well...
Reliability is an important issue for safety-critical and traffic situation broadcast services in Vehicular Ad-hoc Networks (VANETs). The Packet Reception Rate (PRR) is a key metric to evaluate broadcast reliability. Most researches of broadcasting in VANETs focus on multi-hop routing and connection establishing, taking all one-hop links for grante...
The average travel speed and waiting time of cars are factors which determine the time taken to get to a destination. These factors are influenced by the traffic situation at various sections of the road. In this paper a novel Distributed Intelligent Traffic System (DITS) which is based on Ant Colony Optimization has been proposed. In the proposed...
Vehicular traffic congestion often occurs on the main roads of most cities as the number of vehicles grows, wasting the time and fuel of motorists. One important reason for traffic congestion is a lack of timely information on traffic conditions. In this paper, a time and area limited epidemic forwarding method is proposed to alleviate traffic cong...
Questions
Questions (2)
I have done some works with NetLogo simulation tool in artificial intelligence and I will be glad to have a discussion with anyone who is familiar with it. I want to integrate real maps into the simulation environment and will like to discuss how to go about it.
I am working on applying artificial intelligence to VANETS. I have already done some simulations using 4x4 and 6x6 road topologies. I am now trying to integrate real maps into the simulation, can anyone who is familiar with NetLogo simulation show me how this can be done?