Skip to main content

Showing 1–9 of 9 results for author: Nkenyereye, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.09020  [pdf, other

    cs.CV

    FISTNet: FusIon of STyle-path generative Networks for Facial Style Transfer

    Authors: Sunder Ali Khowaja, Lewis Nkenyereye, Ghulam Mujtaba, Ik Hyun Lee, Giancarlo Fortino, Kapal Dev

    Abstract: With the surge in emerging technologies such as Metaverse, spatial computing, and generative AI, the application of facial style transfer has gained a lot of interest from researchers as well as startups enthusiasts alike. StyleGAN methods have paved the way for transfer-learning strategies that could reduce the dependency on the huge volume of data that is available for the training process. Howe… ▽ More

    Submitted 2 April, 2024; v1 submitted 18 July, 2023; originally announced July 2023.

    Comments: 21 pages, 6 figures, 2 tables

  2. arXiv:2305.03123  [pdf

    cs.CY cs.AI cs.CL cs.LG

    ChatGPT Needs SPADE (Sustainability, PrivAcy, Digital divide, and Ethics) Evaluation: A Review

    Authors: Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev, Weizheng Wang, Lewis Nkenyereye

    Abstract: ChatGPT is another large language model (LLM) vastly available for the consumers on their devices but due to its performance and ability to converse effectively, it has gained a huge popularity amongst research as well as industrial community. Recently, many studies have been published to show the effectiveness, efficiency, integration, and sentiments of chatGPT and other LLMs. In contrast, this s… ▽ More

    Submitted 27 March, 2024; v1 submitted 13 April, 2023; originally announced May 2023.

    Comments: 29 pages, 8 figures, 4 tables

  3. arXiv:2011.06211  [pdf

    cs.CR

    Fog based Secure Framework for Personal Health Records Systems

    Authors: Lewis Nkenyereye, S. M. Riazul Islam, Mahmud Hossain, M. Abdullah-Al-Wadud, Atif Alamri

    Abstract: The rapid development of personal health records (PHR) systems enables an individual to collect, create, store and share his PHR to authorized entities. Health care systems within the smart city environment require a patient to share his PRH data with a multitude of institutions' repositories located in the cloud. The cloud computing paradigm cannot meet such a massive transformative healthcare sy… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: 12 pages (CMC Journal, Tech Science Press)

  4. arXiv:2011.05935  [pdf

    cs.CR cs.NI

    Blockchain-Enabled EHR Framework for Internet of Medical Things

    Authors: Lewis Nkenyereye, S. M. Riazul Islam, Mahmud Hossain, M. Abdullah-Al-Wadud, Atif Alamri

    Abstract: The Internet of Medical Things (IoMT) offers an infrastructure made of smart medical equipment and software applications for health services. Through the internet, the IoMT is capable of providing remote medical diagnosis and timely health services. The patients can use their smart devices to create, store and share their electronic health records (EHR) with a variety of medical personnel includin… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 9 pages (CMC Journal, Tech Science Press)

  5. arXiv:2008.10210  [pdf

    cs.NI

    IoT service slicing and task offloading for edge computing

    Authors: JaeYoung Hwang, Lionel Nkenyereye, NakMyoung Sung, JaeHo Kim, JaeSeung Song

    Abstract: With the advancement of IoT technology, various domains such as smart factories, smart cities and smart cars use the IoT to provide value-added services. In addition, technologies such as MEC and network slicing provide another opportunity for the IoT to support more advanced and real-time services that could not have been previously supported. However, the simple integration of such technologies… ▽ More

    Submitted 24 August, 2020; originally announced August 2020.

  6. arXiv:2003.01519  [pdf, other

    eess.AS cs.LG cs.SD eess.SP stat.ML

    Amateur Drones Detection: A machine learning approach utilizing the acoustic signals in the presence of strong interference

    Authors: Zahoor Uddin, Muhammad Altaf, Muhammad Bilal, Lewis Nkenyereye, Ali Kashif Bashir

    Abstract: Owing to small size, sensing capabilities and autonomous nature, the Unmanned Air Vehicles (UAVs) have enormous applications in various areas, e.g., remote sensing, navigation, archaeology, journalism, environmental science, and agriculture. However, the unmonitored deployment of UAVs called the amateur drones (AmDr) can lead to serious security threats and risk to human life and infrastructure. T… ▽ More

    Submitted 28 February, 2020; originally announced March 2020.

    Comments: 25 pages, 10 figures, accepted for the publication in future issue of "Computer Communications (2020)"

    MSC Class: 68T45; 68T10; 62H30; ACM Class: C.2; C.2.4; G.3

  7. RDSP: Rapidly Deployable Wireless Ad Hoc System for Post-Disaster Management

    Authors: Ajmal Khan, Adnan Munir, Zeeshan Kaleem, Farman Ullah, Muhammad Bilal, Lewis Nkenyereye, Shahen Shah, Long D. Nguyen, S. M. Riazul Islam, Kyung-Sup Kwak

    Abstract: In post-disaster scenarios, such as after floods, earthquakes, and in war zones, the cellular communication infrastructure may be destroyed or seriously disrupted. In such emergency scenarios, it becomes very important for first aid responders to communicate with other rescue teams in order to provide feedback to both the central office and the disaster survivors. To address this issue, rapidly de… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

    Comments: 23 pages, 12 figures, accepted for publication in Sensors 2020

    MSC Class: C.2.1; C.2.2; C.2.6; E.1; G.2.2; E.4; G.1.3; I.1

  8. Software-Defined Network-Based Vehicular Networks: A Position Paper on Their Modeling and Implementation

    Authors: Lionel Nkenyereye, Lewis Nkenyereye, S M Riazul Islam, Yoon Ho Choi, Muhammad Bilal, Jong Wook Jan

    Abstract: There is a strong devotion in the automotive industry to be part of a wider progression towards the Fifth Generation (5G) era. In-vehicle integration costs between cellular and vehicle-to-vehicle networks using Dedicated Short Range Communication could be avoided by adopting Cellular Vehicle-to-Everything (C-V2X) technology with the possibility to re-use the existing mobile network infrastructure.… ▽ More

    Submitted 31 August, 2019; originally announced September 2019.

    Comments: 14 pages, 3 figures, Sensors 2019

    MSC Class: 68M10; 68M11; 68M12; 68M15; 68M14; 94C15; 68P30; 05Cxx ACM Class: C.2.1; C.2.2; C.2.6; E.1; G.2.2; E.4; G.1.3; I.1

    Journal ref: Sensors 2019, 19, 3788

  9. arXiv:1812.08652  [pdf

    cs.NI

    A Fuzzy System based Approach to Extend Network Lifetime for En-Route Filtering Schemes in WSNs

    Authors: M. K. Shahzad, Lewis Nkenyereye, S. M. Riazul Islam

    Abstract: Wireless sensor networks suffer from false report injection attacks. This results in energy drain over sensor nodes on the event traversal route. Novel en-route filtering schemes counter this problem by filtering these attacks on designated verification nodes. However, these filtering schemes among other limitations inherently are network lifetime inefficient. Generally, report traversal paths and… ▽ More

    Submitted 20 December, 2018; originally announced December 2018.

    Comments: 4 Pages, 4 Figures, ICCAE 2019