Papers by KWAME OSEI BOATENG
International Journal of Interdisciplinary Telecommunications and Networking, 2013
Fading is the most observed and frustrating problem in transmitting and receiving radio signals. ... more Fading is the most observed and frustrating problem in transmitting and receiving radio signals. A Study in correlation properties of fading helps to design proper communication systems that are robust to it. In this work, received power signal was obtained by drive-test technique. The analysis was determined using distribution fitting tool in Matlab software 7.5.0 (R2007b). The following fading distributions were used, Rayleigh, Rician, Nakagami-m, Lognormal and Weibull. Weibull fading distribution was found to give the best description of fading experienced in Ghana.On the other hand, Rician distribution, Nakagami-m distribution and lognormal distribution have less agreement with the measured data while Rayleigh fading distribution has much less agreement with measured data. The obtained mean scale parameter and the mean shape parameter in the Weibull distribution for the environment considered were 133.76 and 15.93, respectively. Furthermore, the path loss exponents in the near a...
Electrical distribution networks are prone to power quality disturbances originating from the com... more Electrical distribution networks are prone to power quality disturbances originating from the complexity of the distribution network, mode of distribution (overhead or underground) and types of loads used by customers. Data on the types of disturbances present and frequency of occurrence is needed for economic evaluation and hence finding solution to the problem. Utility companies have resorted to using secondary power quality devices such as smart meters to help gather the required data. Even though this approach is easier to adopt, data gathered from these devices may not serve the required purpose, since the installation of these devices in the electrical network usually does not conform to available PQM placement methods. This paper presents a design of a PQM that is capable of integrating into an existing DAS infrastructure to take advantage of available placement methodologies. The monitoring component of the design is implemented and installed to monitor an existing LV networ...
IEICE Transactions on Information and Systems, 2000
A lot of attention has been drawn to ensuring a secure communication in an ad hoc network environ... more A lot of attention has been drawn to ensuring a secure communication in an ad hoc network environment. It is important to anonymously send and receive sensitive data from secure sources. Digital signature is one of the powerful ways of ensuring integrity, privacy, confidentiality and nonrepudiation in terms of signing messages. A technique from RSA is employed to propose a new digital signature to be used in wireless networks. This concept also ensures both source and location anonymity. Adversaries will find it difficult to identify the source of a message and exactly where the message is being sent to. With regard to a zone, it will not be possible to identify who sends a message and also who receives it within the group in the zone. It is believed that the signature is light weight and can easily be generated by any of the nodes in the zone. In the context of using the scheme without wireless network, individual uses alternative steps for signing sensitive documents by classifyin...
Proceedings of the Future Technologies Conference (FTC) 2018, 2018
Television White Spaces (TVWS) are unused and unassigned channels called Vacant Channels (VCs) in... more Television White Spaces (TVWS) are unused and unassigned channels called Vacant Channels (VCs) in the licensed broadband wireless spectrum allocated to TV broadcasters also called Primary Users (PUs). One of the major objectives for implementing TVWS technology in delivering broadband internet is to ensure the efficient utilization of VCs in wireless spectrum. To this end, the Geolocation Database (GLDB) has been widely accepted by regulators as the main technique for detecting VCs for use by unlicensed Secondary Users (SUs), because it offers better prospects in preventing harmful interference to licensed PUs. However, in the open literature, little attention has been given to its capacity to ensure that VCs assigned to SUs for data transmissions are fully utilized. There is the tendency for SUs to misuse VCs assigned to them, by staying idle for long periods without transmitting since there are no proper monitoring mechanisms. This denies other SUs the opportunity to access same c...
International Journal of Computer Applications, Jan 17, 2018
This paper seeks to address problem of load balancing for ad hoc networks which are small radio d... more This paper seeks to address problem of load balancing for ad hoc networks which are small radio devices with limited computational capacity. We have provide a metric that will optimize load distribution and provide a modify routing protocol in any of the proactive routing protocols in ad hoc environment. Maintaining the good performance of this complex network is a complicated task and efficient load balancing plays major role in the network. Nodes in these networks are limited in resources and load should be evenly distributed throughout the network. Congestion and delays will occur when nodes are heavily loaded with packets. Its create bottleneck that affect routing and performance of the network. We are therefore proposing a new metric and efficient way of balancing the weight on single nodes or cluster heads.
2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), 2012
Chromosome pairing and synaptonemal complex (SC) formation have been analysed on spread and silve... more Chromosome pairing and synaptonemal complex (SC) formation have been analysed on spread and silver stained chromosome complements from autotetraploid Bombyx spermatocytes (4n = 112). The establishment of distant subtelomeric associations between homologous chromosomes previously shown to precede SC formation in diploid Bombyx spermatocytes is also found in the tetraploid spermatocytes. Specific associations can form on either side of a chromosome leading to SC formation between three or all four homologues. In an animal with aberrant meiosis homologous associations were infrequent or absent resulting in almost random SC formation. A mean of 13.3 quadrivalents and 25.1 bivalents was present at zygotene while in pachytene complements the mean ofquadrivalents was reduced to 8.7 and that of bivalents correspondingly increased to 37.1. It is concluded 1) that chromosome pairing and SC formation during zygotene combine the four homologues at frequencies approaching the theoretical maximum of 67%, 2) that the initial pairing is optimized during the zygotene-pachytene transition to yield a maximum of bivalents and 3) that the occurrence of crossing over at pachytene effectively prevents conversion of multivalents into bivalents. A reduction of quadrivalent frequency occurs also between pachytene and metaphase I probably due to bivalent and trivalent-univalent formation when the SC is resolved and suitable chiasmata are absent to hold the four chromosomes together. These and earlier observations on chromosome pairing in the male silkworm are compared and compiled into a flow-chart summarising the events of chromosomes pairing as deduced from ultrastructural analysis.
Digital images are often corrupted by Impulse noise due to errors generated in noisy sensor, erro... more Digital images are often corrupted by Impulse noise due to errors generated in noisy sensor, errors that occur in the process of converting signals from analog-to-digital and also errors that are generated in the communication channels. This error that occurs inevitably alters some of the pixels intensity while some of the pixels remain unchanged. In order to remove impulse noise and enhance the affected image quality, we have studied the median filter and are proposing a method based on an improved median filtering algorithm. This method removes or effectively suppresses the impulse noise in the image whiles preserving the image edges information and enhancing the image quality. The proposed method is a spatial domain approach and uses the overlapping window to filter the signal based on the selection of an effective median per window. The approach chosen in this work is based on a functional level 2n +1 window that makes the selection of the normal median easier, since the number of elements in the window is odd. The median so chosen is confirmed as the effective median or, where the median is an impulse a more representative value is sought and used as the effective median. The performance of the proposed effective median filter has been evaluated in MATLAB simulations on an image that has been subjected to various degrees of corruption with impulse noise. The results demonstrate the effectiveness of our algorithm vis-à-vis the standard and adaptive median filtering algorithms.
Noise, as random, unwanted data, appears in images from various sources. So its reduction or remo... more Noise, as random, unwanted data, appears in images from various sources. So its reduction or removal is an important task in image processing. This study employed an intelligent mean filter, which is an extension of the median filter, adaptive median filter, and the mean filter, to achieve the purpose of noise reduction. The proposed mean filter belongs to the broad class of nonlinear filters. The method is more effective in image processing because it utilizes an intelligent technique to find the mean of a set of pixels in the active window, which is used to perform the filtering process. Impulsive noise is a form of image corruption where each pixel value is replaced with an extremely large or small value that is not related to the surrounding pixel values by a significant probability. Any pixel that is noisy is replaced with the computed mean. The adaptiveness of the method lies in the size of the filtering window, which is determined by the amount of noise in the window. The filtering process starts with a 3x3 window and extends it to a 5x5 window until it gets to the maximum window size chosen by this technique, which is 9x9. The window size extends from the initial size to the subsequent sizes if the amount of noise pollution in each chosen size is greater than 40% using some approximation schemes. The moving-window architecture is employed to the movement of the window through the entire image in order to aid the filtering process. The performance of the proposed intelligent Mean filter has been evaluated in MATLAB simulations on an image that was subjected to various degrees of corruption with impulse noise. The results demonstrated the effectiveness of the algorithm.
The use of traditional meters presents both the users and utilities providers with various challe... more The use of traditional meters presents both the users and utilities providers with various challenges in developing countries. For instance utility providers must get access to their user's premises to be able to read this meters or check fraudulent connections, which are usually challenges. Users on the other hand have to wait for months or more before knowing their utility consumptions or join long queues to purchase credit for the post-payment and pre-payment meters respectively. This paper seeks to upgrade meters on site into smart meters by retrofitting them with embedded units for communication and control purposes. The traditional meters where studied and the proposed system was designed based on design science methodology, using General Packet Radio Service (GPRS) technology for communication and Peripheral Interface Controller (PIC). Web based applications will be designed to present both the consumers and the utilities with the ability to interact with the meters remotely. Identified security issues of smart metering were addressed using Advance Encryption Standard (AES) in the design. The GPRS Retrofitted Smart Metering System (GRSMS) will provide the utility companies and the consumers the full benefit of a Smart Metering Systems using their existing meters.
Journal of Engineering and Applied Sciences, 2011
International Journal of Computer Applications, 2014
Modern trends of managing energy consumption have proved the smart metering system as an effectiv... more Modern trends of managing energy consumption have proved the smart metering system as an effective scheme. With its capability of transmitting energy usage information in realtime to parties that matter, such as power generation stations, transmission stations, distribution stations and customers, more qualitative decisions concerning generation, distribution and usage of power are made. This energy usage information helps to match demand with supply hence reducing cost of production, increasing profitability, reducing waste and higher customer satisfaction. Despite the many benefits offered by smart meters, most developing countries in Africa such as Ghana still hold on to standalone energy meters that offer less capabilities. This paper brings to light some important drawbacks of smart meters implemented in other parts of the world and suggest possible solutions. The paper also assays the possibility of implementing secured smart retrofitted electric energy meters in developing countries in Africa taking the suggested solutions into consideration. This implementation does not require the replacement of the old meters.
Journal of Science and Technology (Ghana), 2010
Journal of Science and Technology (Ghana), 2005
Fournier's gangrene can no longer be considered idiopathic or a disease of young adult males in a... more Fournier's gangrene can no longer be considered idiopathic or a disease of young adult males in apparent good health. This work aims to highlight the changes in the knowledge of the epidemiology vis-à-vis current management recommendations. This study is retrospective. Case files of seventeen patients seen within the ten-year period of 1997-2006 were retrieved, relevant information extracted. All were males who had easily identifiable aetiological factors. Perianal sepsis was the most common (23.53%) followed by diabetes mellitus (17.64%). The disease was fulminating in 2 (11.76%) with over all mortality of 2 (11.76%), one a diabetic and the other an HIV positive patient. Epidemiology of Fournier's gangrene is better understood now. There is an a etiology in most of the cases. All our patients were males, a finding similar to other authors from the region and casting doubt on the existence of female genital gangrene. The prognosis is worse when it is associated with immune suppression from diabetes mellitus and HIV infection.
Proceedings 10th Asian Test Symposium, 2001
Abstract Large numbers of test stimuli impact on test application time and cost of test applicati... more Abstract Large numbers of test stimuli impact on test application time and cost of test application. Hence there is the need to keep numbers of test stimuli low while maintaining as high fault coverage as possible. In this paper, static compaction of test stimuli is seen as a ...
Journal of Electrical Engineering
Test application time is a major factor of the cost associated with the scan technique. On one ex... more Test application time is a major factor of the cost associated with the scan technique. On one extreme test application time can be drastically reduced by using built-in self-test (BIST). However, the quality of random test pattern used by BIST is low. On the other extreme, automated test equipment based testing using quality automatic test pattern generation is very time-consuming. Research in the area of economics of test application is directed towards finding a good blend of the two extremes to arrive at a workable optimal hybrid. A novel method for achieving this hybrid is presented in this paper. The approach used consists of a modification of the scan architecture and the development of a matching algorithm. The modified scan architecture involves the addition of a multiple-input signature register (MISR) to the scan chain. This way test responses are not captured in the scan chain but, rather, are compressed in the MISR. The proposed algorithm then takes advantage of repeate...
International Journal of Computer Applications, 2014
Electrical energy (electricity) has become an indispensable asset in building sustainable economi... more Electrical energy (electricity) has become an indispensable asset in building sustainable economies and reducing poverty. For such reasons many countries have embarked on various electrification projects, from urban areas to rural areas. However, these projects would not achieve the earlier stated objectives where there is unreliable supply of electric power. Most developing countries especially in Africa are often plagued with power crises. These crises are often as a result of energy constraints and/or generation capacity constraints. Various energy efficiency/demand side management schemes have been implemented to properly ration power. These schemes range from rotational load shedding programs to energy quota systems, with the latter presenting more advantages than the former. Energy quota systems were first known to be only effective in rationing power in energy-constrained environments. However, the advent of smart metering technology has also proved this scheme also effective in capacity-constrained environments. Despite the many advantages of this scheme over rotational load shedding programs, most developing countries in Africa such as Ghana and Nigeria, still use the latter as the only means of rationing power. In this paper, the advantages of energy quota systems over load shedding programs are brought to light, international best
2012 IEEE 4th International Conference on Adaptive Science & Technology (ICAST), 2012
ABSTRACT One of the main challenges of Securing effective computation in network devices tends to... more ABSTRACT One of the main challenges of Securing effective computation in network devices tends to be a limitation of their computation power. They all tend to have a feature in common: limited computational capabilities and equally limited power (as most operate on batteries). Server assisted signature (SAS) scheme was recently presented as non-repudiation service for mobile and constrained devices. The scheme however made use of traditional protocols such as those based on RSA. Such protocols are computationally intensive and time consuming. In this paper we propose a scheme that is based on a modification of the RSA algorithm, ne modified algorithm has less complexity than the traditional RSA. Additionally, the proposed scheme shares the computational load between the mobile device and a server we call security mediator (SEM). Thus the mobile device effectively plays a part in the generation of public key signatures. The scheme has been evaluated against the standard RSA-based scheme and we present a result that shows that the proposed scheme leads to much faster operation.
Peer-to-Peer Networking and Applications
Uploads
Papers by KWAME OSEI BOATENG