Antoine B. Bagula

Antoine B. Bagula
University of the Western Cape | uwc · Department of Computer Science

Phd

About

101
Publications
29,768
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
891
Citations
Additional affiliations
January 2014 - April 2016
University of the Western Cape
Position
  • Head of Department
January 2007 - December 2013
University of Cape Town
Position
  • Professor (Associate)

Publications

Publications (101)
Article
Full-text available
While professional pollution monitoring stations are used worldwide to measure levels of pollution, they are usually costly and sparsely deployed in cities, hence leading to a visibility gap in pollution maps that need to be filled through alternative solutions. This paper proposes a pollution monitoring model designed within the "Environment 4.0"...
Article
Full-text available
Online money lending platforms also referred to as peer-to-peer lending platforms are a mean of lending and borrowing money between private individuals mostly via an online web-based platform. Transactions are often done without the direct arbitration of financial institutions, such as banks or other financial agencies. In 2005 the first money lend...
Research Proposal
Full-text available
https://www.frontiersin.org/research-topics/16899/bridging-global-broadband-divides-concepts-understanding-and-network-solutions
Article
Full-text available
Intelligent sociotechnical systems are gaining momentum in today’s information-rich society, where different technologies are used to collect data from such systems and mine this data to make useful insights about our daily activities [...]
Article
Full-text available
Building around innovative services related to different modes of transport and traffic management, intelligent transport systems (ITSs) are being widely adopted worldwide to improve the efficiency and safety of the transportation system [...]
Chapter
The work presented in this paper is an implementation of a design of a DDoS simulation testbed that uses parameter estimation and probability fitting of source IP address features of a network. We explored the issue of lack of adequate and recent evaluation datasets, we therefore designed a way that can be used to generate synthetic data that simul...
Article
Full-text available
Big data analytics (BDA) is a novel concept focusing on leveraging large volumes of heterogeneous data through advanced analytics to drive information discovery. This paper aims to highlight the potential role BDA can play to improve groundwater management in the Southern African Development Community (SADC) region in Africa. Through a review of th...
Chapter
Predictive policing (Pp) relates to identifying potentially related offences, similar criminal attributes and potential criminal activity, in order to take actionable measures in deterring crime. Similarly, Legal Decision Making Process (LDMP) considers some level of probabilistic reasoning in deriving logical evidence from crime incidents. Bayesia...
Conference Paper
Full-text available
At a time when the opportunistic access to white spaces is a big opportunity for boosting innovation in broadband Internet services , many countries of the developing world are still lagging behind. In the Democratic Republic of Congo (DRC), for example, the TV White Space concept has not yet been tabulated in the operational plan of the national r...
Conference Paper
Full-text available
Cyber-healthcare can be described to be virtual medicine applied in reality. It involves the use of healthcare professionals consulting and treating patients via the internet and other modern communication platforms and using different techniques and devices of the Internet-of-Things (IoT) to automate manual processes. This paper aims to revisit cy...
Conference Paper
Full-text available
The emergence of cloud computing has reduced the cost of deployment and storage dramatically, but only if data can be distributed across multiple servers easily without disruption. In a complex SQL database, this is difficult because many queries require multiple large tables to be joined together to provide a response. Executing distributed joins...
Article
Full-text available
Unmanned aerial vehicles (UAVs) or drones are increasingly used in cities to provide service tasks that are too dangerous, expensive or difficult for human beings. Drones are also used in cases where a task can be performed more economically and or more efficiently than if done by humans. These include remote sensing tasks where drones can be requi...
Article
Cyber-Healthcare is an emerging field of the healthcare domain that builds upon cyber physical health systems (CPHSs) to provide pervasive access to medical services any time and from anywhere in the world where medical expertise is available. It is expected to change the way healthcare is delivered in the developing world and enable both its rural...
Conference Paper
Full-text available
It is widely recognized that, due to its toxicological impact on human health and the environment, air pollution is becoming a big threat to the world as a major environmental risk in the incidence and progression of many diseases, especially respiratory diseases. Air pollution has been traditionally monitored using professional, complex, and expan...
Conference Paper
Full-text available
The digital divide refers to the gap between those who have access to modern information and communications technology (ICT) and those who do not or who have constrained access. This technology could include telephones, television, computers and the Internet. The arrival of high-speed Internet connectivity to the Kingdom of Tonga continues to bring...
Conference Paper
Full-text available
The New Zealand Government has set the goals of having 99% of Kiwis able to access broadband with peak speeds of at least 50 Megabits per second (Mbps) by 2025, and with the remaining 1% able to access broadband with rates of at least 10 Mbps. There is an interesting question to be raised: is it possible to achieve these goals earlier? Inspired by...
Article
Full-text available
Nowadays, at least two billion people are experiencing a complete lack of wireless cellular network coverage. These users live in rural areas and low-income regions, where network operators are not keen to invest, mainly due to high Capital Expenditure (CapEx) and Operational Expenditure (OpEx) costs, as well as the scarcity of electricity from the...
Conference Paper
Access to electricity is recognized as a primary and natural need, which is lacking in the Democratic Republic of the Congo (DRC), where more than 95% of the population live in the dark or have intermittent access to the electricity due lo a very dysfunctional power grid. This creates a complex societal problem, which can be addressed by a clear un...
Conference Paper
Full-text available
In cloud computing, the allocation of resources plays a key role in determining the performance, resource utilization and power consumption of the data center. The appropriate allocation of virtual machines in cloud data centers is also one of the important optimization problems in cloud computing, especially when the cloud infrastructure is made o...
Article
Being connected anytime and anywhere with access to any requested content from any device is a current societal challenge known as ATAWADAC (AnyTime AnyWhere AnyDevice AnyContent). This paper raises the issue of the synergetic potential that mobile access offers to ATAWADAC services and its integration with Personal Knowledge Management (PKM) in a...
Article
Full-text available
Being connected anytime and anywhere with access to any requested content from any device is a current societal challenge known as ATAWADAC (AnyTime AnyWhere AnyDevice AnyContent). This paper raises the issue of the synergetic potential that mobile access offers to ATAWADAC services and its integration with Personal Knowledge Management (PKM) in a...
Article
Being connected anytime and anywhere with access to any requested content from any device is a current societal challenge known as ATAWADAC (AnyTime AnyWhere AnyDevice AnyContent). This paper raises the issue of the synergetic potential that mobile access offers to ATAWADAC services and its integration with Personal Knowledge Management (PKM) in a...
Article
Being connected anytime and anywhere with access to any requested content from any device is a current societal challenge known as ATAWADAC (AnyTime AnyWhere AnyDevice AnyContent). This paper raises the issue of the synergetic potential that mobile access offers to ATAWADAC services and its integration with Personal Knowledge Management (PKM) in a...
Presentation
Full-text available
Unmanned aerial vehicles (UAVs) have recently offered significant technological achievements. The advance in related applications predicts wide needs of automated data muling by UAVs, to explore hight risk places, insure efficiency and reduce the cost of different products and services. Due to advance in Technology, the actual UAvs are not so expen...
Conference Paper
Data muling using UAVs/drones is currently emerging as an alternative to the traditional traffic engineering techniques used in wireless sensor networks, when wireless communication is not an option or the least cost-efficient solution. This paper revisits the issue of traffic engineering in Internet-of-Things (IoT) settings, to assess the relevanc...
Conference Paper
The HL7 standard was initially designed to enable interoperability of healthcare information within large hospitals. HL7's focus has recently been extended to regional healthcare cloud infrastructures but not yet reached the lightweight fog infrastructures emerging from niche healthcare areas such as body area networks (BANs) and the massive flow o...
Conference Paper
Full-text available
Developing countries can widely benefit from adopting renewable energy systems. As a means to enhance the adoption, smart energy systems can introduce assistance to users lacking the necessary knowledge of the installation of solar, wind or generator based systems. It is within this field, that architectural implementations and dimensioning of rene...
Conference Paper
Full-text available
The developing countries can leverage the potential provided by cloud computing to leapfrog from poorly equipped to ICT enabled nations if the widely known issues related to power supply, limited communication infrastructures, security and privacy usually experienced by the ICT field in the developing countries are addressed. Lightweight cloud comp...
Conference Paper
Full-text available
The developing countries can leverage the potential provided by cloud computing to leapfrog from poorly equipped to ICT enabled nations if the widely known issues related to power supply, limited communication infrastructures, security and privacy usually experienced by the ICT field in the developing countries are addressed. Lightweight cloud comp...
Conference Paper
This paper proposes and evaluates the performance of a Cyber-healthcare system which is aimed at providing patient prioritization over the cloud as a public health service for the rural and urban communities of the developing world. The underlying cloud-based Internet-of-Things (IoT-Cloud) infrastructure is aimed to be implemented in the city of Lu...
Conference Paper
This paper seeks to investigate the performance of the Exponentially Weighted Moving Average (EWMA) for mining big data and detection of DDoS attacks in Internet of Things (IoT) infrastructure. The paper will investigate the trade­off between the algorithm's detection rate, false alarm and detection delay. The paper seeks to further investigate how...
Conference Paper
This work considers a case where a team of Un-manned Aerial Vehicles (UAVs) is to successively and persistently fly over a given area of interest, coming from different locations with the mission of collecting sensor readings from these locations and delivering/muling these readings to a fixed location, where a relevant data infrastructure is avail...
Conference Paper
This work considers a case where a team of Un-manned Aerial Vehicles (UAVs) is to successively and persistently fly over a given area of interest, coming from different locations with the mission of collecting sensor readings from these locations and delivering/muling these readings to a fixed location, where a relevant data infrastructure is avail...
Conference Paper
The recent advances in sensor/actuator and RFID technologies have spun out a new healthcare model enabling capture and dissemination of patient vital signs over the Internet for ubiquitous monitoring of these patients anytime and from anywhere. This provides new opportunities for enhancing healthcare through participatory consultation, medical diag...
Chapter
Current generation criminal justice relies mostly on manual procedures and processes which are time-consuming and error-prone. A polygraph test consists of only "yes" or "no" questions and depends several physiological responses in subjects. It's effectiveness and accuracy have been questioned due to the possibility of swaying the examiner by indiv...
Conference Paper
Full-text available
Service provision in low power network environments remains a very difficult task due to the lightweight nature of the devices involved. This paper explores and demonstrates the efficacy of the light weight resource allocation protocol (LRAP) in allocating services in a heterogeneous network environment consisting of primarily low power nodes. We s...
Conference Paper
The adoption of solar technology and subsequent investments in solar installations is a low-polluting power source alternative that can mitigate the dangers raised by greenhouse gas emissions and increase universal electricity access in a modern world where power generation plays a vital role in the world countries’ economies. This paper presents a...
Conference Paper
The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS attack originating from an IoT system, and how the performance of the algorithm is affected by its tuning p...
Article
Full-text available
Current generation wireless sensor routing algorithms and protocols have been designed based on a myopic routing approach, where the motes are assumed to have the same sensing and communication capabilities. Myopic routing is not a natural fit for the IoT, as it may lead to energy imbalance and subsequent short-lived sensor networks, routing the se...
Conference Paper
Currently, use of geo-location databases is the preferred method for detecting TV white spaces by white space devices in the US. The approach protects TV transmitters and receivers from interference sufficiently by keeping a record of the TV transmitters’ information, and relying on propagation models to determine the protection area of the TV tran...
Article
Full-text available
Sub-Saharan Africa contains the highest number of people affected by droughts. Although this can easily be mitigated through the provision of timely, reliable and relevant weather forecasts, the sparse network of weather stations in most of these countries makes this difficult. Rapid development in wireless sensor networks has resulted in weatherbo...
Article
The drop in cost and reduction in size of sensor nodes has eased the development of wireless sensor networks (WSNs) applications. However, the noise and disturbing nature of most sensing environments require accurate algorithms that can overcome these difficulties. Nodes' localization is one of the basic activity a WSN can perform to make other net...
Conference Paper
Despite an increase in the number of Internet eXchange Points (IXP) in Africa, as well as proliferation of submarine and terrestrial fibre optic cable systems, the level of peering among Africa’s Internet service providers remains low. Using active network measurements, this work characterizes the level of interconnectivity and peering among Africa...
Conference Paper
Full-text available
This paper presents a frugal protocol for sensor readings dissemination in the Internet-of-Things (IoT). The protocol called Least Path Interference Beaconing (LIBP) is based on a lightweight path selection model that builds a routing spanning tree rooted at the sink node based on information disseminated through a periodic beaconing process. LIBPs...
Conference Paper
Full-text available
Like most other developing countries of Africa, Kenya’s rain-fed agriculture is the backbone of the economy. As such, the Country’s economy and weather are so intertwined that a good season means healthy economy and famine, and death otherwise. The status of weather forecasting in Kenya is rather wanting partly because the data used is collected fr...
Conference Paper
Full-text available
Mbeere is in Eastern Kenya and it has an average of 550 mm annual rainfall and therefore classified under Arid and Semi-Arid Lands. It has fragile ecosystems, unfavorable climate, poor infrastructure and historical marginalization; the perennial natural disasters here are droughts. Of importance to this paper is the fact that despite its vast area...
Conference Paper
Full-text available
With the accelerated proliferation wireless networks ranging from GPRS and EDGE to high speed networks such as HSPDA and Mobile Wi-Fi, network selection by mobile nodes will benefit more from knowledge of Network Capability of candidate networks. Network selection is important for handover in heterogeneous wireless environment. User Profiles/Needs...
Article
Despite global advancements in technology and inter-trade volumes, Sub-Saharan Africa is the only Region where cases of hunger have increased since 1990. Rampant and frequent droughts are one of the major causes of this. Monumental and mostly donor-funded projects have been mounted to counter this but with little success. One of the latest strategi...
Conference Paper
n 2009, only 3.6% of Kenya’s households owned at least one computer; conversely, 63.2% of households owned at least one mobile phone; this is true for many developing countries of Africa. This implies that computing solutions that target mobile phone environments are bound to have greater impact in these countries. However, the inherent constraints...
Article
Most of the Business Intelligence tools available on the market today have either been developed and industrially operationalised as one size fits all solutions or offered with multiple options leaving the business to decide on the best technology to use. We infer that this approach is likely to result in various analysis inaccuracies; hence render...
Article
This paper addresses the problem of network monitoring by investigating the performance of three soft computing techniques, the Artificial Neural Network, Bayesian Network and the Artificial Immune System. The techniques were used for achieving situation recognition and monitoring in a large network of Wi-Fi hotspots as part of a highly scalable pr...
Article
The interworking of multi-hop wireless networks conveniently provide ubiquitous service access and continuity. In such networks, multi-technology mobile terminals (nodes) relay traffic for each other. However, it is desirable to have appropriate traffic engineering (TE) mechanisms so that nodes can identify links that optimizes network parameters a...
Article
Droughts are the most common type of natural disaster in Africa and the problem is compounded by their complexity. The agriculture sector still forms the backbone of most economies in Africa, with 70% of output being derived from rain-fed small-scale farming; this sector is the first casualty of droughts. Accurate, timely and relevant drought predi...
Conference Paper
This paper proposes an integration architecture that combines conventional wireless sensor nodes, sensor-tags, hybrid sensor nodes and a base station into a smart network named Hybrid RFID-Sensor Network (HRSN). The HRSN as built presents an energy imbalance problem among nodes. This is due to the hybrid nodes sensing energy consumption, which cons...
Conference Paper
This paper addresses the problem of network monitoring by proposing an Artificial Immune System (AIS) system to achieve situation recognition and monitoring in a large network of Wi-Fi hotspots as part of a highly scalable preemptive monitoring tool for wireless networks. Using a set of data extracted from a live network of Wi-Fi hotspots managed b...
Conference Paper
The advances of modern technology and learning on educational focus are shifting gradually from electronic learning to ubiquitous learning. Ubiquitous learning (Ulearning) seeks to embed small computing devices such as sensors, actuators, RFID tags, cell phones and PDAs into our daily learning so as to provide learners with learning contents and se...
Article
Full-text available
For the last 2 decades, Kenya has consistently contributed the highest number of people affected by natural disasters in Africa. This is especially so for disasters triggered by climatic variations. The Kenya Meteorological Department has provided regular weather forecasts since the 60s. One of the shortcomings of this Department's approach is the...
Article
Full-text available
This paper revisits the problem of Quality of Service (QoS) provisioning to assess the relevance of using multipath routing to improve the reliability and packet delivery in wireless sensor networks while maintaining lower power consumption levels. Building upon a previous benchmark, we propose a traffic engineering model that relies on delay, reli...
Book
Full-text available
Global Information Society Watch 2010 investigates the impact that information and communications technologies (ICTs) have on the environment – both good and bad. Written from a civil society perspective, GISWatch 2010 covers some 50 countries and six regions, with the key issues of ICTs and environmental sustainability, including climate change re...
Article
Full-text available
The consequence of simultaneous transmissions by nodes in inter-working multi-hop wireless networks is inter-node interference. Inter-node interference is a metric that is important for the performance evaluation of inter-working wireless networks. Several interference models exist in literature, however, these models are for specific wireless netw...
Conference Paper
Open Wireless Sensors are based on the Open Source Software and Open Source Hardware paradigms. The code used to program them and the information about the hardware design are freely released. We present the main characteristics of Open Wireless Sensor Networks (OWSNs) and report on two examples with the experimental results revealing the performan...
Article
Full-text available
38th International Conference on Parallel Processing (ICPP 2009), Vienna, Austria, 22-25 September, 2009 In inter-working multi-hop wireless networks, establishing resilient connectivity between source-destination node pairs is a major issue. The issue of connectivity in multi-hop wireless networks have been studied. However, these analyses focused...
Conference Paper
Full-text available
Copyright: Springer-Verlag Berlin Heidelberg 2009. This is the authors version of the it is posted here by permission granted by Springer-Verlag. The article is published in the Lecture Notes in Computer Science, Vol.5495(2009), pp 323-332 The authors propose a generalized model with configurable discretizer actuators as a solution to the problem o...