Repository logo
 

Theses and dissertations (Accounting and Informatics)

Permanent URI for this collectionhttp://ir-dev.dut.ac.za/handle/10321/4

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    Item
    System architecture for secure mobile internet voting
    (2015) Thakur, Surendra; Olugbara, Oludayo O.; Millham, Richard C.
    This thesis focuses on the development of an enhanced innovative secure mobile Internet voting system architecture that offers desirable security requirements to theoretically mitigate some of the intrinsic administrative and logistical challenges of voting, inter alia lack of mobility support for voters, voter inconvenience, election misconduct, and possible voter coercion often associated with the conventional poll-site voting system. Systems in existence have tended to revolve around the need to provide ubiquitous voting, but lack adequate control mechanism to address, in particular, the important security requirement of controlling possible coercion in ubiquitous voting. The research work reported in this thesis improves upon a well-developed Sensus reference architecture. It does so by leveraging the auto-coupling capability of near field communication, as well as the intrinsic merits of global positioning system, voice biometric authentication, and computational intelligence techniques. The leveraging of the combination of these features provides a theoretical mitigation of some of the security challenges inherent in electoral systems previously alluded to. This leveraging also offers a more pragmatic approach to ensuring high level, secure, mobile Internet voting such as voter authentication. Experiments were performed using spectral features for realising the voice biometric based authentication of the system architecture developed. The spectral features investigated include Mel-frequency Cepstral Coefficients (MFCC), Mel-frequency Discrete Wavelet Coefficients (MFDWC), Linear Predictive Cepstral Coefficients (LPCC), and Spectral Histogram of Oriented Gradients (SHOG). The MFCC, MFDWC and LPCC usually have higher dimensions that oftentimes lead to high computational complexity of the pattern matching algorithms in automatic speaker authentication systems. In this study, higher dimensions of each of the features were reduced per speaker using Histogram of Oriented Gradients (HOG) algorithm, while neural network ensemble was utilised as the pattern-matching algorithm. Out of the four spectral features investigated, the LPCC-HOG gave the best statistical results with an R statistic of 0.9257 and Mean Square Error of 0.0361. These compact LPCC-HOG features are highly promising for implementing the authentication module of the secure mobile Internet voting system architecture reported in this thesis.
  • Thumbnail Image
    Item
    An investigation into the nature and extent of the adoption of RFID in the KwaZulu-Natal province of South Africa
    (2008) Thakur, Surendra
    Radio Frequency Identification (RFID) allows for the wireless transfer of data between a small electronic transmitting tag and a reader without the necessity of line-of-sight. A feature of RFID, is that this read operation may occur over long distances and that multiple reads may occur. The aim of this study is to analyse the nature and extent of RFID adoption in the KwaZulu-Natal Province of South Africa. The study fits within the theory of innovation diffusion and is concerned with issues around technology diffusion, adoption rates, and its associated critical success factors. The estimation of RFID diffusion rate in the study is based on a telephonic survey of 140 companies. The respondents were chosen from a marketing database that had extensive information on South African companies. Size was determined to be the selection criterion as the literature indicates that size is the most compelling concomitant to innovativeness. In this study, size was deemed to be companies that had more than 50 PC’s in one geographic unit, of the company, in KwaZulu-Natal. The key research result locates the RFID diffusion rate in KwaZulu-Natal to be around 19% which corresponds to points beyond the “chasm” as defined by innovation diffusion theory. The second phase of the study comprised the administration of a questionnaire to two groups of IT professionals with the aim of comparing perceptions and other characteristics between the two groups. The 140 respondents were asked to submit as many professional staff as they could for an in-depth interview. The result was that 21 companies submitted 30 candidates. This yielded the two groups: the Adopter sample with 14 respondents, and the non-adopter sample with 16 respondents. The analysis of results shows the two groups have similar views on many strategic factors such as privacy, security, cost and standards etc. Adopters perceive that the following factors impacts RFID adopting decisions more (than non-adopters): Turnover, Having labour cost savings, RFID ubiquity, It will take as long for my company to adopt RFID as it did for barcode, RFID cost awareness. On the other hand non-adopters felt that the following factor impacts non-adoption of RFID Technology unproven or immature, Human skills non-availability, Implementation costs, Corporate resistance, and, Support Concerns.