Department of Computer Science
Permanent URI for this community
The Bridging Application and Network Gaps (BANG) group examines the
intersection of human computer interfaces, computer networks and
software engineering within the context of ICT interventions in disadvantaged communities.
The South African Sign Language (SASL) group looks at the integration of signed and verbal communication building on the South African Sign Language Translation System.
Browse
Browsing by Author "Agbinya, Johnson I."
Now showing 1 - 4 of 4
Results Per Page
Sort Options
Item A digital identity management system(UWC, 2007) Phiri, Jackson; Agbinya, Johnson I.The recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system is proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user’s credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.Item Models and applications of wireless networks in rural environments(University of the Western Cape, 2005) Li, Yang; Agbinya, Johnson I.; Dept. of Computer Science; Faculty of ScienceWith the unprecedented growth of the communication industry that the world is experiencing, the demand from rural inhabitants for high quality communications at an economically affordable cost is growing. However, rural areas are rather restricted from deploying communication services due to the rough natural environment, and the shortage of rudimentary communication facilities and technical personnel. Appropriate models for building rural wireless networks and a concomitant simulation environment are, therefore, expected to enable the construction of technologically-optimal and economically-efficient networks in specified rural areas.The research has set up two independent models, one for the economic need and the other for the technical need of building networks in rural areas. One model was the Impact of Telecommunications Model, which disclosed the importance of building a wireless network in specified rural areas by choosing an economic parameter to forecast the profitability of the network. The other was the Service Model, which collected primitive data from given rural areas and abstracted these data by flowing them through four technical layers to form the predicted technical wireless network. Both of the models had been applied to real-world cases to demonstrate how to use them.A simulation environment was finally designed and implemented to realize the above two models for the sake of instantiation. This environment could simulate the specified rural network by constructing a wireless network on the invented areas and evaluating its quality and economic efficiency. It was written in Scilab simulation language, which was an open source.Item Remote surveillance and face tracking with mobile phones (smart eyes)(University of the Western Cape, 2005) Da Silva, Sandro Cahanda Marinho; Agbinya, Johnson I.; Dept. of Computer Science; Faculty of ScienceThis thesis addresses analysis, evaluation and simulation of low complexity face detection algorithms and tracking that could be used on mobile phones. Network access control using face recognition increases the user-friendliness in human-computer interaction. In order to realize a real time system implemented on handheld devices with low computing power, low complexity algorithms for face detection and face tracking are implemented. Skin color detection algorithms and face matching have low implementation complexity suitable for authentication of cellular network services. Novel approaches for reducing the complexities of these algorithms and fast implementation are introduced in this thesis. This includes a fast algorithm for face detection in video sequences, using a skin color model in the HSV (Hue-Saturation-Value) color space. It is combined with a Gaussian model of the H and S statistics and adaptive thresholds. These algorithms permit segmentation and detection of multiple faces in thumbnail images. Furthermore we evaluate and compare our results with those of a method implemented in the Chromatic Color space (YCbCr). We also test our test data on face detection method using Convolutional Neural Network architecture to study the suitability of using other approaches besides skin color as the basic feature for face detection. Finally, face tracking is done in 2D color video streams using HSV as the histogram color space. The program is used to compute 3D trajectories for a remote surveillance system.Item SIP-based content development for wireless mobile devices with delay constraints(University of the Western Cape, 2006) Lakay, Elthea Trevolee; Agbinya, Johnson I.; Dept. of Computer Science; Faculty of ScienceSIP is receiving much attention these days and it seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services. Realizing this, there is the obvious need to provide a certain level of quality comparable to the traditional telephone service signalling system. Thus, we identified the major costs of SIP, which were found to be delay and security. This thesis discusses the costs of SIP, the solutions for the major costs, and the development of a low cost SIP application. The literature review of the components used to develop such a service is discussed, the networks in which the SIP is used are outlined, and some SIP applications and services previously designed are discussed. A simulation environment is then designed and implemented for the instant messaging service for wireless devices. This environment simulates the average delay in LAN and WLAN in different scenarios, to analyze in which scenario the system has the lowest costs and delay constraints.