Research Articles (Computer Science): Recent submissions
Now showing items 161-170 of 170
-
An Internet paradigm approach to policy-based network management of legacy kit for VoIP services in Next Generation Networks
(Telkom, 2000)With QoS available on IP-dominant NGNs, Policy-based Network Management (PBNM) is an effective mechanism for managing services as opposed to actual devices. IP is ubiquitous, and any NGN must contend with legacy devices ... -
Grafting an ATM network onto an existing ethernet network
(Telkom, 1998)Grafting an ATM network onto an existing Ethernet network is a non-trivial exercise in network configuration. The process of mating ATM technology to an Ethernet network without tampering the underlying backbone and network ... -
Preparation of Deaf end-users and the softbridge for semi-automated relay trials
(Telkom, 2004)Following on the development of several prototypes, we have built a semi-automated Deaf Telephony prototype on the SoftBridge platform. This prototype relays text and speech between Deaf users on the Internet and hearing ... -
An IP based multimodal semi-synchronous rural telehealth service: Adding video messaging and conferencing to MuTI
(Telkom, 2004)We intend adding video messaging and conferencing to Multimodal Telemedicine Intecommunicator (MuTI), a previous system that has already been in place in the target environment. This is to allow a semi-synchronous communication ... -
An Interoperable signaling solution for IP-based Next Generation Networks
(Telkom, 2000)Current VoIP signaling protocols are interoperable with the PSTN SS7 via H.323-to-SS7 or SIP-to-SS7 gateways. As we move toward the Next Generation Network, the PSTN falls away and we work toward carrier-grade VoIP ... -
FHMIPv6-based handover for wireless mesh networks
(Telkom, 2012)This paper shows that mobility management protocols for infrastructure Internet may be used in a wireless mesh network environment. Mesh topology tends to be an unplanned graph and routes change dynamically and in this ... -
Ensuring the security and privacy of information in mobile health-care communication systems
(Academy of Science of South Africa, 2011)The sensitivity of health-care information and its accessibility via the Internet and mobile technology systems is a cause for concern in these modern times. The privacy, integrity and confidentiality of a patient’s data ... -
Real-time gesture recognition using eigenvectors
(2009)This paper discusses an implementation for gesture recognition using eigenvectors under controlled conditions. This application of eigenvector recognition is trained on a set of defined hand images. Training images are ... -
A surface acoustic wave touchscreen-type device using two transducers
(2008)Current wireless human-computer interaction devices such as wireless mice and touchscreens, by and large, incorporate a sophisticated electronic architecture. The sophistication achieves wireless capabilities but carries ... -
KernTune: Self-tuning Linux kernel performance using support vector machines
(Association for Computing Machinery, 2007)Self-tuning has been an elusive goal for operating systems and is becoming a pressing issue for modern operating systems. Well-trained system administrators are able to tune an operating system to achieve better system ...