Cephas Mawere | Harare Institute Of Technology (original) (raw)

Papers by Cephas Mawere

Research paper thumbnail of Molecular Dynamics Simulation Studies of HYD1

The unique features of HYD1 protein and its primary involvement in fungal pathogenesis of Gibbere... more The unique features of HYD1 protein and its primary involvement in fungal pathogenesis of Gibberella moniliformis have drawn attention to in silico study of potential inhibitors. This destructive mold is also on the rise of causing cancer related diseases in
both humans and animals upon ingestion of the infected maize and/or rice grains. To date, currently used fungicides are ineffective against G. moniliformis as the fungus can grow and adapt to any environment. It has been realized that such behavior is attributed to class I hydrophobins where HYD1 belongs. These bio-surfactant macromolecules spontaneously self assemble at hydrophobic: hydrophilic interfaces into thin nanometric rodlet biofilms. For this reason, this paper focuses on refining a predicted HYD1 protein and studying its conformational and thermodynamic properties. Molecular dynamics simulation studies thus prove the protein to be thermally stable, compact, and results in a better quality model. This will help in understanding the self assembly mechanism of HYD1 and future docking studies.

Research paper thumbnail of The Impact and Application of 3D Printing  Technology

3D printing also known as Additive manufacturing technology has been dubbed the next big thing an... more 3D printing also known as Additive manufacturing technology has been dubbed the next big thing and be as equally wide spread as cellular telephone industry. 3D printers print objects from a digital template to a physical 3-dimensional physical object. The printing is done layer by layer (Additive manufacturing) using plastic, metal, nylon, and over a hundred other materials. 3D printing has been found to be useful in sectors such as manufacturing, industrial design, jewellery, footwear, architecture, engineering and construction, automotive, aerospace, dental and medical industries, education, geographic information systems, civil engineering, and many others. It has been found to be a fast and cost effective solution in whichever field of use. The applications of 3D printing are ever increasing and it’s proving to be a very exciting technology to look out for. In this paper we seek to explore how it works and the current and future applications of 3D printing.

Research paper thumbnail of ICONSEA Poster: Insilico Design and Analysis of G. moniliformis Class II Hydrophobin Inhibitor as a Potential Antifungal drug

Research paper thumbnail of Comparative Modeling, Quality Assessment and Validation of HYD1

HYD1 is a small secreted fungal protein that belongs to class I hydrophobins of G. moniliformis.... more HYD1 is a small secreted fungal protein that belongs to class I hydrophobins of G. moniliformis. It is
able to spontaneously self-assemble at hydrophilic: hydrophobic interfaces into a 10 nm amphipathic rodlet monolayer.
Based on this unique property, HYD1 is involved in signaling and attachment of aerial structures (like mycelia, hyphae,
and spores) to hydrophobic surfaces of host plant during fungal pathogenesis. This paper seeks to construct a 3D
structure of HYD1 based on multiple templates using the novel algorithm available on the M4T online server.
PROCHECK, ProSA, Verify3D and 3dss server are used to analyze the quality and consistency of the generated model.
The M4T_HYD1 model thus had a compatible DOPE score value of -5547.2 and showed 93.0% amino acid residues
under the most favored region [A, B, L]. Evaluation of the 3D model and two templates (2f26C and 2pl6A) with
ProSA revealed a compatible Z score value of -3.43, -4.31, and -4.10 respectively, indicating a comparable surface
energy affinity of M4T_HDY1 with the templates. A low RMSD value between the target and the template structures
upon superimposition reflects high structural connection. Hence, the predicted model proved to be well ratified in terms
of geometry and energy contours, indicating that the model is reasonable and reliable for future molecular docking
studies.

KEYWORDS: HYD1, Hydrophobins, Self-assemble, Amphipathic, M4T algorithm, DOPE, Superimposition"

Research paper thumbnail of An Introduction of the RIST Framework on  Information Security Awareness Practices in  the Current Information Age

Information Security awareness has been an important vehicle in the acknowledgement, ... more Information Security awareness has been an important vehicle in the acknowledgement, training and
exposure of Information threats, vulnerabilities and attacks. This has brought about a large number of training
programs and technical researches in order to make people aware of the dangers that haunt them in this computing
world. The emergence of new technologies has had a twofold effect on the people that use them. Most technologies
have brought a significant improvement as far as availability , processing and storage is concerned. However, the issue
of security has been an obstacle in the full acceptance of the technologies and also user appreciation. Therefore this
paper discusses the issues that are recently impacting Information Security Awareness in line with the current
technological trends. It also aims at providing the best ways of alerting people on how to implement Information
security measures in this current technological world and thereby building confidence in users. The paper will also
delve into issues like social engineering, email attacks, Smartphone/ mobile attacks and social networks confidentiality.

KEYWORDS: Information security awareness, RIST, threats, vulnerabilities, attacks, social engineering, smartphone,
social networks, confidentiality. ""

Research paper thumbnail of Profile Impostoring: A Use Case on the Rising  Social Engineering Attack on Facebook Users

Abstract:Social engineering attacks have taken a new twist as a growing number of people use onli... more Abstract:Social engineering attacks have taken a new twist as a growing number of people use online social networking sites to foster social relationships among each other and market products. Of interest is Facebook whose users have exponentially increased; some of these users are prominent individuals with high influence in various communities like celebrities, philanthropists, religious ministers and non- profit organizations. Data retrieval from Facebook profiles is thus becoming a major tool for business which has led to most unsuspecting users being victims of deception. Profile impostoring, also known as identity theft, is increasingly on the rise and becoming an underlying threat to information security. The cyber perpetrators are creating fake Facebook profiles of prominent individuals who have a large following. Ordinary individuals are also not at their mercy.With such high pending risk of identity theft
there is need to develop methods that help Facebook fans to automatically detect deception, identify imposters and get them arrested.

Keywords:Social engineering, social networking, profile impostoring,identity theft, information security, cyber perpetrators

Research paper thumbnail of Molecular Dynamics Simulation Studies of HYD1

The unique features of HYD1 protein and its primary involvement in fungal pathogenesis of Gibbere... more The unique features of HYD1 protein and its primary involvement in fungal pathogenesis of Gibberella moniliformis have drawn attention to in silico study of potential inhibitors. This destructive mold is also on the rise of causing cancer related diseases in
both humans and animals upon ingestion of the infected maize and/or rice grains. To date, currently used fungicides are ineffective against G. moniliformis as the fungus can grow and adapt to any environment. It has been realized that such behavior is attributed to class I hydrophobins where HYD1 belongs. These bio-surfactant macromolecules spontaneously self assemble at hydrophobic: hydrophilic interfaces into thin nanometric rodlet biofilms. For this reason, this paper focuses on refining a predicted HYD1 protein and studying its conformational and thermodynamic properties. Molecular dynamics simulation studies thus prove the protein to be thermally stable, compact, and results in a better quality model. This will help in understanding the self assembly mechanism of HYD1 and future docking studies.

Research paper thumbnail of The Impact and Application of 3D Printing  Technology

3D printing also known as Additive manufacturing technology has been dubbed the next big thing an... more 3D printing also known as Additive manufacturing technology has been dubbed the next big thing and be as equally wide spread as cellular telephone industry. 3D printers print objects from a digital template to a physical 3-dimensional physical object. The printing is done layer by layer (Additive manufacturing) using plastic, metal, nylon, and over a hundred other materials. 3D printing has been found to be useful in sectors such as manufacturing, industrial design, jewellery, footwear, architecture, engineering and construction, automotive, aerospace, dental and medical industries, education, geographic information systems, civil engineering, and many others. It has been found to be a fast and cost effective solution in whichever field of use. The applications of 3D printing are ever increasing and it’s proving to be a very exciting technology to look out for. In this paper we seek to explore how it works and the current and future applications of 3D printing.

Research paper thumbnail of ICONSEA Poster: Insilico Design and Analysis of G. moniliformis Class II Hydrophobin Inhibitor as a Potential Antifungal drug

Research paper thumbnail of Comparative Modeling, Quality Assessment and Validation of HYD1

HYD1 is a small secreted fungal protein that belongs to class I hydrophobins of G. moniliformis.... more HYD1 is a small secreted fungal protein that belongs to class I hydrophobins of G. moniliformis. It is
able to spontaneously self-assemble at hydrophilic: hydrophobic interfaces into a 10 nm amphipathic rodlet monolayer.
Based on this unique property, HYD1 is involved in signaling and attachment of aerial structures (like mycelia, hyphae,
and spores) to hydrophobic surfaces of host plant during fungal pathogenesis. This paper seeks to construct a 3D
structure of HYD1 based on multiple templates using the novel algorithm available on the M4T online server.
PROCHECK, ProSA, Verify3D and 3dss server are used to analyze the quality and consistency of the generated model.
The M4T_HYD1 model thus had a compatible DOPE score value of -5547.2 and showed 93.0% amino acid residues
under the most favored region [A, B, L]. Evaluation of the 3D model and two templates (2f26C and 2pl6A) with
ProSA revealed a compatible Z score value of -3.43, -4.31, and -4.10 respectively, indicating a comparable surface
energy affinity of M4T_HDY1 with the templates. A low RMSD value between the target and the template structures
upon superimposition reflects high structural connection. Hence, the predicted model proved to be well ratified in terms
of geometry and energy contours, indicating that the model is reasonable and reliable for future molecular docking
studies.

KEYWORDS: HYD1, Hydrophobins, Self-assemble, Amphipathic, M4T algorithm, DOPE, Superimposition"

Research paper thumbnail of An Introduction of the RIST Framework on  Information Security Awareness Practices in  the Current Information Age

Information Security awareness has been an important vehicle in the acknowledgement, ... more Information Security awareness has been an important vehicle in the acknowledgement, training and
exposure of Information threats, vulnerabilities and attacks. This has brought about a large number of training
programs and technical researches in order to make people aware of the dangers that haunt them in this computing
world. The emergence of new technologies has had a twofold effect on the people that use them. Most technologies
have brought a significant improvement as far as availability , processing and storage is concerned. However, the issue
of security has been an obstacle in the full acceptance of the technologies and also user appreciation. Therefore this
paper discusses the issues that are recently impacting Information Security Awareness in line with the current
technological trends. It also aims at providing the best ways of alerting people on how to implement Information
security measures in this current technological world and thereby building confidence in users. The paper will also
delve into issues like social engineering, email attacks, Smartphone/ mobile attacks and social networks confidentiality.

KEYWORDS: Information security awareness, RIST, threats, vulnerabilities, attacks, social engineering, smartphone,
social networks, confidentiality. ""

Research paper thumbnail of Profile Impostoring: A Use Case on the Rising  Social Engineering Attack on Facebook Users

Abstract:Social engineering attacks have taken a new twist as a growing number of people use onli... more Abstract:Social engineering attacks have taken a new twist as a growing number of people use online social networking sites to foster social relationships among each other and market products. Of interest is Facebook whose users have exponentially increased; some of these users are prominent individuals with high influence in various communities like celebrities, philanthropists, religious ministers and non- profit organizations. Data retrieval from Facebook profiles is thus becoming a major tool for business which has led to most unsuspecting users being victims of deception. Profile impostoring, also known as identity theft, is increasingly on the rise and becoming an underlying threat to information security. The cyber perpetrators are creating fake Facebook profiles of prominent individuals who have a large following. Ordinary individuals are also not at their mercy.With such high pending risk of identity theft
there is need to develop methods that help Facebook fans to automatically detect deception, identify imposters and get them arrested.

Keywords:Social engineering, social networking, profile impostoring,identity theft, information security, cyber perpetrators