Magister Scientiae - MSc (Computer Science)
Permanent URI for this collection
Browse
Browsing by Issue Date
Now showing 1 - 20 of 94
Results Per Page
Sort Options
Item Policy based network management of legacy network elements in next generation networks for voice services(University of the Western Cape, 2002) Naidoo, Vaughn; Tucker, William; Dept. of Computer ScienceTelecommunication companies, service providers and large companies are now adapting converged multi-service Next Generation Networks (NGNs). Network management is shifting from managing Network Elements (NE) to managing services. This paradigm shift coincides with the rapid development of Quality of Service (QoS) protocols for IP networks. NEs and services are managed with Policy Based Network Management (PBNM) which is most concerned with managing services that require QoS using the Common Open Policy Service (COPS) Protocol. These services include Voice over IP (VoIP), video conferencing and video streaming. It follows that legacy NEs without support for QoS need to be replaced and/or excluded from the network. However, since most of these services run over IP, and legacy NEs easily supports IP, it may be unnecessary to throw away legacy NEs if it can be made to fit within a PBNM approach. Our approach enables an existing PBNM system to include legacy NEs in its management paradigm. The Proxy-Policy Enforcement Point (P-PEP) and Queuing Policy Enforcement Point (Q-PEP) can enforce some degree of traffic shaping on a gateway to the legacy portion of the network. The P-PEP utilises firewall techniques using the common legacy and contemporary NE management protocol Simple Network Management Protocol (SNMP) while the Q-PEP uses queuing techniques in the form Class Based Queuing (CBQ) and Random Early Discard (RED) for traffic control.Item Long short-term memory recurrent neural networks for signature verification(UWC, 2003) Tiflin, C; Omlin, CHandwritten signature verification is defined as the classification process that strives to learn the manner in which an individual makes use of the muscular memory of their hands, fingers, and wrist to reproduce a signature. A handwritten signature is captured by a pen input device and sampled at a high frequency which results in time series with several hundred data points. A novel recurrent neural network architecture known as long short-term memory was designed for modeling such a long-time series. This research investigates the suitability of long short-term memory recurrent neural networks for the task of online signature verification. We design and experiment with various network architectures to determine if this model can be trained to discriminate between authentic and fraudulent signatures. We further determine whether the complexity of a signature impacts the performance level of the network when applied to fraudulent signatures. We also investigate the performance level of the network when varying the number of signature features.Item Articulated structure from motion(University of the Western Cape, 2004) Scheffler, Carl; Omlin, Christian W.P.; Dept. of Computer Science; Faculty of ScienceThe structure from motion (SfM) problem is that of determining 3-dimensional (3D) information of a scene from sequences of 2-dimensional (2D) images [59]. This information consists of object shape and motion and relative camera motion. In general, objects may undergo complex non-rigid motion and may be occluded by other objects or themselves. These aspects make the general SfM problem under-constrained and the solution subject to missing or incomplete data.Item Carrier grade adaptation for an IP-based multimodal application server: moving the softbridge into SLEE(University of the Western Cape, 2004) Sun, Tao; Tucker, William; Dept. of Computer ScienceProviding carrier grade characteristics for Internet Protocol (IP) communication applications is a significant problem for IP application providers in order to offer integrated services that span IP and telecommunication networks. This thesis addresses the provision of life-cycle management, which is only one carrier grade characteristic, for a SoftBridge application, which is an example of IP communication applications. A SoftBridge provides semi-synchronous multi-modal IP-based communication. The work related to IP-Telecommunication integrated services and the SoftBridge is analyzed with respect to life-cycle management in a literature review. It is suggested to use an Application Server in a Next Generation Network (NGN) to provide life-cyclemanagement functionality for IP-Telecommunication applications. In this thesis, the Application Server is represented by a JAIN Service Logic Execution Environment(JSLEE), in which a SoftBridge application can be deployed, activated, deactivated, uninstalled and upgraded online.Two methodologies are applied in this research: exploratory prototyping, which evolves the development of a SoftBridge application, and empirical comparison, which is concerned with the empirical evaluation of a SoftBridge application in terms of carriergrade capabilities. A SoftBridge application called SIMBA provides a Deaf Telephony service similar to aprevious Deaf Telephony SoftBridge, However, SIMBA’s SoftBridge design and implementation are unique to this thesis. In order to test the life-cycle management ability of SIMBA, an empirical evaluation is carried out including the experiments oflife-cycle management and call-processing performance. The final experimental results of the evaluation show that a JSLEE is able to provide life-cycle management for SIMBA without causing a significant decrease in performance. In conclusion, the life-cycle management can be provided or a SoftBridge application by using an Application Server such as a JSLEE. Futhermore, the results indicate that approach of using Application Server (JSLEE) integration should be sufficiently general to provide life cycle management, and indeed other carrier grade capabilities, for other IP communication applications. This allows IP communication applications to be integrated into an NGN.Providing carrier grade characteristics for Internet Protocol (IP) communication applications is a significant problem for IP application providers in order to offer integrated services that span IP and telecommunication networks. This thesis addresses the provision of life-cycle management, which is only one carrier grade characteristic, for a SoftBridge application, which is an example of IP communication applications. A SoftBridge provides semi-synchronous multi-modal IP-based communication. The work related to IP-Telecommunication integrated services and the SoftBridge is analyzed with respect to life-cycle management in a literature review. It is suggested to use an Application Server in a Next Generation Network (NGN) to provide life-cyclemanagement functionality for IP-Telecommunication applications. In this thesis, the Application Server is represented by a JAIN Service Logic Execution Environment(JSLEE), in which a SoftBridge application can be deployed, activated, deactivated, uninstalled and upgraded online.Two methodologies are applied in this research: exploratory prototyping, which evolves the development of a SoftBridge application, and empirical comparison, which is concerned with the empirical evaluation of a SoftBridge application in terms of carriergrade capabilities. A SoftBridge application called SIMBA provides a Deaf Telephony service similar to aprevious Deaf Telephony SoftBridge, However, SIMBA’s SoftBridge design and implementation are unique to this thesis. In order to test the life-cycle management ability of SIMBA, an empirical evaluation is carried out including the experiments oflife-cycle management and call-processing performance. The final experimental results of the evaluation show that a JSLEE is able to provide life-cycle management for SIMBA without causing a significant decrease in performance. In conclusion, the life-cycle management can be provided or a SoftBridge application by using an Application Server such as a JSLEE. Futhermore, the results indicate that approach of using Application Server (JSLEE) integration should be sufficiently general to provide life cycle management, and indeed other carrier grade capabilities, for other IP communication applications. This allows IP communication applications to be integrated into an NGN.Item SIP-based location service provision(University of the Western Cape, 2005) Wu, YanHao; Radovanovic, Aleksandar; Tucker, William; Dept. of Computer Science; Faculty of ScienceLocation-based service (LBS) is a geographical location-related service that provides highly personalized services for users. It is a platform for network operators to provide new and innovative ways of increasing profits from new services. With the rapidly growing trend toward LBS, there is a need for standard LBS protocols. This thesis started with introducing the Internet Engineering Task Force GEOPRIV working group, which endeavors to provide standard LBS protocols capable of transferring geographic location information for diverse location-aware applications. Through careful observation, it was found that Session Initiation Protocol (SIP) is well suited to the GEOPRIV requirements. The aim of this research was therefore to explore the possibility of the integration of LBS and the SIP protocol and, to some extent fulfill the GEOPRIV requirements.Item Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks(University of the Western Cape, 2005) Abidogun, Olusola Adeniyi; Omlin, Christian W.P.; Dept. of Computer Science; Faculty of ScienceHuge amounts of data are being collected as a result of the increased use of mobile telecommunications. Insight into information and knowledge derived from these databases can give operators a competitive edge in terms of customer care and retention, marketing and fraud detection. One of the strategies for fraud detection checks for signs of questionable changes in user behavior. Although the intentions of the mobile phone users cannot be observed, their intentions are reflected in the call data which define usage patterns. Over a period of time, an individual phone generates a large pattern of use. While call data are recorded for subscribers for billing purposes, we are making no prior assumptions about the data indicative of fraudulent call patterns, i.e. the calls made for billing purpose are unlabeled. Further analysis is thus, required to be able to isolate fraudulent usage. An unsupervised learning algorithm can analyse and cluster call patterns for each subscriber in order to facilitate the fraud detection process. This research investigates the unsupervised learning potentials of two neural networks for the profiling of calls made by users over a period of time in a mobile telecommunication network. Our study provides a comparative analysis and application of Self-Organizing Maps (SOM) and Long Short-Term Memory (LSTM) recurrent neural networks algorithms to user call data records in order to conduct a descriptive data mining on users call patterns. Our investigation shows the learning ability of both techniques to discriminate user call patterns; the LSTM recurrent neural network algorithm providing a better discrimination than the SOM algorithm in terms of long time series modelling. LSTM discriminates different types of temporal sequences and groups them according to a variety of features. The ordered features can later be interpreted and labeled according to specific requirements of the mobile service provider. Thus, suspicious call behaviours are isolated within the mobile telecommunication network and can be used to to identify fraudulent call patterns. We give results using masked call data from a real mobile telecommunication network.Item Remote surveillance and face tracking with mobile phones (smart eyes)(University of the Western Cape, 2005) Da Silva, Sandro Cahanda Marinho; Agbinya, Johnson I.; Dept. of Computer Science; Faculty of ScienceThis thesis addresses analysis, evaluation and simulation of low complexity face detection algorithms and tracking that could be used on mobile phones. Network access control using face recognition increases the user-friendliness in human-computer interaction. In order to realize a real time system implemented on handheld devices with low computing power, low complexity algorithms for face detection and face tracking are implemented. Skin color detection algorithms and face matching have low implementation complexity suitable for authentication of cellular network services. Novel approaches for reducing the complexities of these algorithms and fast implementation are introduced in this thesis. This includes a fast algorithm for face detection in video sequences, using a skin color model in the HSV (Hue-Saturation-Value) color space. It is combined with a Gaussian model of the H and S statistics and adaptive thresholds. These algorithms permit segmentation and detection of multiple faces in thumbnail images. Furthermore we evaluate and compare our results with those of a method implemented in the Chromatic Color space (YCbCr). We also test our test data on face detection method using Convolutional Neural Network architecture to study the suitability of using other approaches besides skin color as the basic feature for face detection. Finally, face tracking is done in 2D color video streams using HSV as the histogram color space. The program is used to compute 3D trajectories for a remote surveillance system.Item Models and applications of wireless networks in rural environments(University of the Western Cape, 2005) Li, Yang; Agbinya, Johnson I.; Dept. of Computer Science; Faculty of ScienceWith the unprecedented growth of the communication industry that the world is experiencing, the demand from rural inhabitants for high quality communications at an economically affordable cost is growing. However, rural areas are rather restricted from deploying communication services due to the rough natural environment, and the shortage of rudimentary communication facilities and technical personnel. Appropriate models for building rural wireless networks and a concomitant simulation environment are, therefore, expected to enable the construction of technologically-optimal and economically-efficient networks in specified rural areas.The research has set up two independent models, one for the economic need and the other for the technical need of building networks in rural areas. One model was the Impact of Telecommunications Model, which disclosed the importance of building a wireless network in specified rural areas by choosing an economic parameter to forecast the profitability of the network. The other was the Service Model, which collected primitive data from given rural areas and abstracted these data by flowing them through four technical layers to form the predicted technical wireless network. Both of the models had been applied to real-world cases to demonstrate how to use them.A simulation environment was finally designed and implemented to realize the above two models for the sake of instantiation. This environment could simulate the specified rural network by constructing a wireless network on the invented areas and evaluating its quality and economic efficiency. It was written in Scilab simulation language, which was an open source.Item Affective gesture fast-track feedback instant messaging (AGFIM)(University of Western Cape, 2005) Adesemowo, A. Kayode; Tucker, William D.Text communication is often perceived as lacking some components of communication that are essential in sustaining interaction or conversation. This interaction incoherency tends to make text communication plastic. It is traditionally devoid of intonation, pitch, gesture, facial expression and visual or auditory cues. Nevertheless, Instant Messaging (IM), a form of text communication is on the upward uptake both on PCs and on mobile handhelds. There is a need to rubberise this plastic text messaging to improve co-presence for text communications thereby improving synchronous textual discussion, especially on handheld devices. One element of interaction is gesture, seen as a natural way of conversing. Attaining some level of interaction naturalism requires improving synchronous communication spontaneity, partly achieved by enhancing input mechanisms. To enhance input mechanisms for interactive text-based chat on mobile devices, there is a need to facilitate gesture input. Enhancement is achievable in a number of ways, such as input mechanism redesigning and input offering adaptation. This thesis explores affective gesture mode on interface redesign as an input offering adaptation. This is done without a major physical reconstruction of handheld devices. This thesis presents a text only IM system built on Session Initiation Protocol (SIP) and SIP for Instant Messaging and Presence Leveraging Extensions (SIMPLE). It was developed with a novel user-defined hotkey implemented as a one-click context menu to "fast-track" text-gestures and emoticons. A hybrid quantitative and qualitative approach was taken to enable data triangulation. Results from experimental trials show that an Affective Gesture (AG) approach improved IM chat spontaneity/response. Feedback from the user trials affirms that AG hotkey improves chat responsiveness, thus enhancing chat spontaneity.Item Social and technical issues of IP-based multi-modal semi-synchronous communication: rural telehealth communication in South Africa(University of the Western Cape, 2005) Vuza, Xolisa; Tucker, William D.; Dept. of Computer Science; Faculty of ScienceMost rural areas of developing countries are faced with problems like shortage of doctors in hospitals, illiteracy and poor power supply. Because of these issues, Information and Communication Technology (ICT) is often sees as a useful solution for these areas. Unfortunately, the social environment is often ignored. This leads to inappropriate systems being developed for these areas. The aims of this thesis were firstly, to learn how a communication system can be built for a rural telehealth environment in a developing country, secondly to learn how users can be supported to use such a system.Item Guaranteed delivery of multimodal semi-synchronous IP-based communication.(University of the Western Cape, 2005) Julius, Elroy Peter; Tucker, William; Dept. of Computer Science; Faculty of ScienceA semi-synchronous environment consists of a combination of synchronous and asynchronous transport media used to transport messages from source to destination. This thesis explores an empirical solution for guaranteeing the delivery of messages in a multimodal semi-synchronous environment for a Deaf Telephony application. SoftBridge for Instant Messaging Bridging Application (SIMBA), is a communication platform that make use of a semi-synchronous framework to allow a hearing and Deaf person to communicate inside a single uniform space. SIMBA was modified to provide reliability for both synchronous and asynchronous transport media. In the process of modification, SIMBA was renamed to NaradaBrokering integrated in SIMBA (NIMBA). Within the literature various systems are analyzed and successes and failures are distilled to help formulate a good solution for the thesis question. To guarantee asynchronous messages sent, the Message Oriented Middleware (MOM) paradigm was used with Forward Error Correction (FEC) used to guarantee the delivery of synchronous messages sent. The work forms part of a social study conducted at the Deaf Community of Cape Town (DCCT) community centre. Ethnography was used to identify the requirements for a Deaf Telephony application. Thus, this thesis is based on a socio- technical environment where the system is developed in a laboratory and tested in an actual community. Results show that these solutions are cceptable for a semi-synchronous communication environment. However, interviews conducted with a select group of Deaf participants showed that cell phones are currently too popular to be replaced by NIMBA as a primary communication device and service. This is due to the immense popularity of Short Message Service (SMS) among the Deaf and cell phone devices mobile capabilities. The overall goal of the thesis is to guarantee delivery for a semisynchronous environment with broader implications of showing how multimodal semi-synchronous services like Deaf Telephony can be made attractive to service providers concerned with reliability in the new Internet Protocol (IP) world of telecommunications.Item Chereme-based recognition of isolated, dynamic gestures from South African sign language with Hidden Markov Models(University of the Western Cape, 2006) Rajah, Christopher; Omlin, Christian W.P.; Dept. of Computer Science; Faculty of ScienceMuch work has been done in building systems that can recognize gestures, e.g. as a component of sign language recognition systems. These systems typically use whole gestures as the smallest unit for recognition. Although high recognition rates have been reported, these systems do not scale well and are computationally intensive. The reason why these systems generally scale poorly is that they recognize gestures by building individual models for each separate gesture; as the number of gestures grows, so does the required number of models. Beyond a certain threshold number of gestures to be recognized, this approach become infeasible. This work proposed that similarly good recognition rates can be achieved by building models for subcomponents of whole gestures, so-called cheremes. Instead of building models for entire gestures, we build models for cheremes and recognize gestures as sequences of such cheremes. The assumption is that many gestures share cheremes and that the number of cheremes necessary to describe gestures is much smaller than the number of gestures. This small number of cheremes then makes it possible to recognized a large number of gestures with a small number of chereme models. This approach is akin to phoneme-based speech recognition systems where utterances are recognized as phonemes which in turn are combined into words.Item Chereme- Based Recognition of Isolated, Dynamic Gestures from South African Sign Language with Hidden Markov Models(University of the Western Cape, 2006) Rajah, Christopher; Omlin, ChristianMuch work has been done in building systems that can recognise gestures, e.g. as a component of sign language recognition systems. These systems typically use whole gestures as the smallest unit for recognition. Although high recognition rates have been reported, these systems do not scale well and are computationally intensive. The reason why these systems generally scale poorly is that they recognize gestures by building individual models for each separate gesture; as the number of gestures grows, so does the required number of models. Beyond a certain threshold number of gestures to be recognized, this approach becomes infeasible. This work proposes that similarly good recognition rates can be achieved by building models for subcomponents of whole gestures, so-called cheremes. Instead of building models for entire gestures, we build models for cheremes and recognize gestures as sequences of such cheremes. The assumption is that many gestures share cheremes and that the number of cheremes necessary to describe gestures is much smaller than the number of gestures. This small number of cheremes then makes it possible to recognize a large number of gestures with a small number of chereme models. This approach is akin to phoneme-based speech recognition systems where utterances are recognized as phonemes which in turn are combined into words. We attempt to recognise and classify cheremes found in South African Sign Language (SASL). We introduce a method for the automatic discovery of cheremes in dynamic signs. We design, train and use hidden Markov models (HMMs) for chereme recognition. Our results show that this approach is feasible in that it not only scales well, but it also generalizes well. We are able to recognize cheremes in signs that were not used for training HMMs; this generalization ability is a basic necessity for chemere-based gesture recognition. Our approach can thus lay the foundation for building a SASL dynamic gesture recognition system.Item Automatic real-time facial expression recognition for signed language translation(University of the Western Cape, 2006) Whitehill, Jacob Richard; Omlin, Christian WWe investigated two computer vision techniques designed to increase both the recognition accuracy and computational efficiency of automatic facial expression recognition. In particular, we compared a local segmentation of the face around the mouth, eyes, and brows to a global segmentation of the whole face. Our results indicated that, surprisingly, classifying features from the whole face yields greater accuracy despite the additional noise that the global data may contain. We attribute this in part to correlation effects within the Cohn-Kanade database. We also developed a system for detecting FACS action units based on Haar features and the Adaboost boosting algorithm. This method achieves equally high recognition accuracy for certain AUs but operates two orders of magnitude more quickly than the Gabor+SVM approach. Finally, we developed a software prototype of a real-time, automatic signed language recognition system using FACS as an intermediary framework.Item KernTune: self-tuning Linux kernel performance using support vector machines(University of the Western Cape, 2006) Yi, Long; Connan, James; Dept. of Computer Science; Faculty of ScienceSelf-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system performance for a specific system class. Unfortunately, the system class can change when the running applications change. The model for self-tuning operating system is based on a monitor-classify-adjust loop. The idea of this loop is to continuously monitor certain performance metrics, and whenever these change, the system determines the new system class and dynamically adjusts tuning parameters for this new class. This thesis described KernTune, a prototype tool that identifies the system class and improves system performance automatically. A key aspect of KernTune is the notion of Artificial Intelligence oriented performance tuning. Its uses a support vector machine to identify the system class, and tunes the operating system for that specific system class. This thesis presented design and implementation details for KernTune. It showed how KernTune identifies a system class and tunes the operating system for improved performance.Item SIP-based content development for wireless mobile devices with delay constraints(University of the Western Cape, 2006) Lakay, Elthea Trevolee; Agbinya, Johnson I.; Dept. of Computer Science; Faculty of ScienceSIP is receiving much attention these days and it seems to be the most promising candidate as a signaling protocol for the current and future IP telephony services. Realizing this, there is the obvious need to provide a certain level of quality comparable to the traditional telephone service signalling system. Thus, we identified the major costs of SIP, which were found to be delay and security. This thesis discusses the costs of SIP, the solutions for the major costs, and the development of a low cost SIP application. The literature review of the components used to develop such a service is discussed, the networks in which the SIP is used are outlined, and some SIP applications and services previously designed are discussed. A simulation environment is then designed and implemented for the instant messaging service for wireless devices. This environment simulates the average delay in LAN and WLAN in different scenarios, to analyze in which scenario the system has the lowest costs and delay constraints.Item Self-tuning Linux Kernel Performance Using Support Vector Machines(University of the Western Cape, 2006) Yi, Long; Connan, JamesIn this chapter, we provide the motivation and background behind the automatic optimisation of an operating system. We begin with a discussion of some of the difficulties of automatic operating system optimisation and the benefits of automatic optimisation technology which inspired our research. We then describe the research problem and aims. Thereafter, our approach and methodology are explained. Finally, the organisation of the thesis and summary are presented. 1.1 Background and Motivation In today's networking world, a mission-critical server requires consistently good performance [2] . To this end, almost all operating systems which run on such a critical server are managed by system administrators who should be skillful and experienced in tuning operating systems by adjusting system configuration and performance parameters of the operating system to run a specific system workload. This involves system capacity planning, performance metrics, workload characteristics, system settings, etc. Skillful system administrators are scarce and expensive. As computer hardware becomes cheaper and free critical computer software becomes more viable, e.g., Linux, Samba, Mysql, Apache, the total cost of ownership for building and maintaining a mission-critical server becomes more and more dominated by the cost of human resources. Furthermore, with the increasing number of new applications and services, a modern operating system offers more system parameters with larger ranges for more system classes than ever before. This situation serves as our motivation for a new generation of automatic optimisation technology for operating systems. The potential benefits of the automatic optimisation technology will be amplified as future applications and operating systems become more complex.Item Metric of trust for mobile ad hoc networks using source routing algorithms(University of the Western Cape, 2006) Umuhoza, Denise; Omlin, Christian W.P.; Dept. of Computer Science; Faculty of ScienceThis thesis proposed and presented technical details of new probabilistic metrics of trust in the links wireless ad hoc networks for unobservable communications. In covert communication networks, only the end nodes are aware of the communication characteristics of the overall path. The most widely used protocols of ad hoc networks was overviewed. The routing protocols of ad hoc networks with trust considerations and select Destination Sequence Routing, a protocol that can be used in distributed ad hoc network settings for path discovery, was also reviewed. It establishes a path through which all packets sent by a source must pass to the destination. The end nodes are responsible for examining the statistics of the received packets and deriving inferences on path feature variations which are used for computing new trust metrics. When a path is judged not trustworthy based on the metrics, the Destination Sequence Routing is informed to undertake a new trusted path discovery between the end points. The thesis added a new feature based on the quality of service parameters of the path to create trust in the links in recognition of attacks.Item KernTune: Self-tuning Linux Kernel Performance Using Support Vector Machines(University of the Western Cape, 2006) Yi, Long; Connan, JamesSelf-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system performance for a specific system class. Unfortunately, the system class can change when the running applications change. Our model for self-tuning operating system is based on a monitor-classify- adjust loop. The idea of this loop is to continuously monitor certain performance metrics, and whenever these change, the system determines the new system class and dynamically adjusts tuning parameters for this new class. This thesis describes KernTune, a prototype tool that identifies the system class and improves system performance automatically. A key aspect of KernTune is the notion of Artificial Intelligence (AI) oriented performance tuning. It uses a support vector machine (SVM) to identify the system class, and tunes the operating system for that specific system class. This thesis presents design and implementation details for KernTune. It shows how KernTune identifies a system class and tunes the operating system for improved performance.Item A Digital Identity Management System(University of the Western Cape, 2007) Phiri, Jackson; Agbinya, JohnsonThe recent years have seen an increase in the number of users accessing online services using communication devices such as computers, mobile phones and cards based credentials such as credit cards. This has prompted most governments and business organizations to change the way they do business and manage their identity information. The coming of the online services has however made most Internet users vulnerable to identity fraud and theft. This has resulted in a subsequent increase in the number of reported cases of identity theft and fraud, which is on the increase and costing the global industry excessive amounts. Today with more powerful and effective technologies such as artificial intelligence, wireless communication, mobile storage devices and biometrics, it should be possible to come up with a more effective multi-modal authentication system to help reduce the cases of identity fraud and theft. A multi-modal digital identity management system IS proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft seen on most online services today. The proposed system thus uses technologies such as artificial intelligence and biometrics on the current unsecured networks to maintain the security and privacy of users and service providers in a transparent, reliable and efficient way. In order to be authenticated in the proposed multi-modal authentication system, a user is required to submit more than one credential attribute. An artificial intelligent technology is used to implement a technique of information fusion to combine the user's credential attributes for optimum recognition. The information fusion engine is then used to implement the required multi-modal authentication system.