Dennis Mwighusa
Centre for Policy Research, Science, Technology and Innovation, Department Member
- noneedit
- Experienced Consulting Engineer with a demonstrated history of working in the Information Technology and Services Industry. Skilled in Artificial Intelligence, Biometric Technology, Business Analysis, ICT Training & Consultancy, Image Pro... moreExperienced Consulting Engineer with a demonstrated history of working in the Information Technology and Services Industry. Skilled in Artificial Intelligence, Biometric Technology, Business Analysis, ICT Training & Consultancy, Image Processing, Knowledge Management, Project Design, Management & Execution, Quality Assurance, Research, Software Development, Systems Audits, Usability Engineering. Strong Business Development Professional and a Philanthropist.edit
Research Interests: Artificial Intelligence, Pattern Recognition, Biometrics, Image Features Extraction, Neural Networks, and 15 moreWavelet Analysis and Subdivision Algorithms, Biometrics And Identity, Image segmentation, Image Registration, Biometrics Authentication Technologies, Signal and Image Processing, Segmentation Techniques for Iris Recognition System, Pattern Matching, Electrical electronics, Image Enhancement, Iris Recognition by Using Dual Tree Complex Wavelet, Computer Vision and Machine Learning, Electronic security, IRIS RECOGNITION, and Hamming Distance
Voter registration is very important towards election processes especially in most of developing countries such as Tanzania. Electioneering process normally leads to election fraud such as double registration and other forms of election... more
Voter registration is very important towards election processes especially in most of developing countries such as Tanzania. Electioneering process normally leads to election fraud such as double registration and other forms of election drawbacks during registration of voters and casting of votes by eligible voters. For the election to be fair in both contesting parties and accurate then needs to have a known number of voters eligible to cast their votes. The electoral roll is usually constructed by means of a voter registration system that compiles voter’s data. In the past ended Tanzanian elections, Optical Mark Recognition registration and verification system was introduced during the registration and verification of voters. It was observed on the elections day that some of the genuine registered voters were not recognized by the electoral officers hence they were disfranchised from voting which is against the constitutional rights of every Tanzanian who had reached the age of ei...
Research Interests: Image Processing, Digital Signature, Pattern Recognition, Digital Signal Processing, Biometrics, and 13 moreBiometrics And Identity, Image Registration, Digital Image Processing, Digital Signal and Image Processing, Signal and Image Processing, Biometrics - Iris Recognition, Fingerprint, Fingerprint Recognition, Behavioral Biometrics, Fingerprints, OMR, Biometric Security, and Fingerprint Matching
Many SACCOS in Tanzania face problems of poor management, embezzlement, lack of working capital, high loan delinquency rates and poor business practices. Poor management and lack of commitment has resulted in many SACCOS having high... more
Many SACCOS in Tanzania face problems of poor management, embezzlement, lack of working capital, high loan delinquency rates and poor business practices. Poor management and lack of commitment has resulted in many SACCOS having high levels of Non-Performing Loans (NPL) hence threatening their survival.The challenges facing MFIs and SACCOS in managing their credit portfolio prompted us to develop a web based financial and credit management system called SACCO MIS in 2014. The system developed was built on open source core, is capable of managing SACCOS and MFI revenue, expenditure, members’ contributions, shares as well as bookkeeping and loan processing.
Research Interests:
A poor E-Security can result in the corruption of files and can enable criminals and others to access personal and financial information; the loss of trust, confidence and respect exact a far higher financial toll. In this paper the Iris... more
A poor E-Security can result in the corruption of files and can enable criminals and others to access personal and financial information; the loss of trust, confidence and respect exact a far higher financial toll. In this paper the Iris recognition techniques is applied to access control and provide strong e-security. The iris is a portion of the inner eye of an individual and contains an abstract and randomly generated texture pattern arising from orientation of complex tissues within the region. The complexity and randomness of the iris also its genetic properties-no two eyes are the same, the characteristic that is dependent on genetics is the pigmentation of the iris, which determines its color and determines the gross anatomy. Details of development, that are unique to each case, determine the detailed morphology amongst various other factors, ensure that this biometric system is inarguably an exact and reliable method of identification. We shall focus on an efficient methodology of which wavelet transform is the algorithm responsible for image extraction.
Research Interests: Biometrics, Biometrics And Identity, Wavelets, Biometrics Authentication Technologies, Wavelet Transforms, and 6 moreBiometrics - Iris Recognition, Segmentation Techniques for Iris Recognition System, Iris Recognition by Using Dual Tree Complex Wavelet, Electronic security, IRIS RECOGNITION, and Hamming Distance
We present "NITAFUTE", The Unstructured Supplementary Service Data (USSD) and Mobile crowdsourcing system for helping mobile phone users to continue having the basic services and access to their mobile phone data in case of emergency... more
We present "NITAFUTE", The Unstructured Supplementary Service Data (USSD) and Mobile crowdsourcing system for helping mobile phone users to continue having the basic services and access to their mobile phone data in case of emergency which involves their SIM card or phone being unavailable or inability to work. This can be due to theft, misplacement or low battery charge with their devices. Through the same service one will be able to trace his/her lost Identification Card (ID card), Automated Teller Machine card (ATM card), School certificates etc. NITAFUTE is an innovative telecom service referred as VALUE ADDED SERVICE to Mobile Network Operators (MNOs). The service is aiming to bring different solutions on the current ongoing challenges facing mobile users associated with global Information and Communication Technology (ICT) development. The system will allow users to input lost items but also for the phone owner to find his/her stolen/lost ID cards, ATM cards, Certificates etc. But also one will be able to post the found items that were lost by the other person and then sends notifications to the owner of the lost items. This research builds our understanding of physical crowdsourcing as a tool for solving societal problems and suggests broader implications for utilizing mobile crowds. In another way the service is a VISUAL ACCESS PLATFORM of some of basic services through MNOs.