Anthony Luvanda - Academia.edu (original) (raw)

Papers by Anthony Luvanda

Research paper thumbnail of Effective approaches for enhancing data management and semantic interoperability within the healthcare sector

International journal of applied research, Dec 31, 2022

In a variety of contexts, Big Data is widely used. In healthcare Big Data has its own characteris... more In a variety of contexts, Big Data is widely used. In healthcare Big Data has its own characteristics, including heterogeneity, incompleteness, timeliness and durability, privacy, and ownership. To enhance health-related science, these features present a number of challenges for data storage, mining, and sharing. Big Data helps to understand electronic health records, gather demographic and medical data such as clinical data, medical conditions and diagnosis, allow doctors to provide a wide variety of patients with quality health care and also to make informative decisions. The large volume of data also provides researchers in the fields of medicine and healthcare with the ability to use tools and techniques to unlock hidden solutions. This study sought to investigate the effects that the existing approaches have on enhancing data management and semantic interoperability in healthcare sector. 180 respondents who took part of the survey were chosen from the Kenyatta University Teaching, Referral & Research Hospital. It was discovered that implementing health standards and tools can help healthcare companies in a number of ways by eliminating compatibility concerns and assuring accurate data representation. Consequently, encouraging successful adoption boosts decision-making processes, encourages sustainability, improves data quality, allows for interoperability, and makes it easier to comply with regulations. These implications help improve patient care, healthcare systems, and overall health outcomes.

Research paper thumbnail of A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county

International Journal of Applied Research

The education sector over time had experienced numerous computer cybersecurity challenges. These ... more The education sector over time had experienced numerous computer cybersecurity challenges. These challenges made them became an easy target for the cybersecurity criminals. Nowadays, most of the secondary schools in Kenya had been equipped with computers and computing devices. Most of these schools had internet connectivity too making them vulnerable to cyber-attack. The vulnerability was also as a result of them lacking resources and attention to cybersecurity due to cybersecurity challenges they experienced. They had weak application security systems, weak endpoint security systems, and weak patch cadence. The study aimed at establishing the computer systems cybersecurity challenges in secondary schools in Kenya. The study was done in West Pokot County. From the finindgs-staffs were allowed to carry their computing devices to the schools, and they connected them to the schools' network in order to access internet; there was no segmentation of network to allow staffs have their own separate network access; some schools had IoT devices with no network segmentations; most schools lack data recovery plan, means to provide endpoint security, means to provide mobile security and means to provide website security. Lack of finance and budget, IT personnel, and user awareness contributed largely to these challenges. By establishing the computer systems cybersecurity challenges encountered, the secondary schools therefore, will find a solution to address them especially by looking at the contributors to the aforementioned challenges.

Research paper thumbnail of Architectural Health Data Standards and Semantic Interoperability: A Comprehensive Review in the Context of Integrating Medical Data Into Big Data Analytics

International Journal of Engineering Applied Sciences and Technology

The integration of medical data into Big Data analytics holds significant potential for advancing... more The integration of medical data into Big Data analytics holds significant potential for advancing healthcare practices and research. However, achieving semantics interoperability, wherein data is exchanged and interpreted accurately among diverse systems, is a critical challenge. This study explores the impact of existing architectures on semantics interoperability in the context of integrating medical data into Big Data analytics. The study highlights the complexities involved in integrating medical data from various sources, each using different formats, data models, and vocabularies. Without a strong emphasis on semantic interoperability, data integration efforts can result in misinterpretations, inconsistencies, and errors, adversely affecting patient care and research outcomes. The significance of data standards and ontologies in establishing a common vocabulary and structure for medical data integration is underscored. Additionally, the importance of data mapping and transform...

Research paper thumbnail of A policy framework for bridging the gender devide in digital technology courses and careers in Kenya

Brookings Institution , 2023

Kenya’s digital technology advancements—chief among them the mobile money transfer application re... more Kenya’s digital technology advancements—chief among them the mobile money transfer application referred to as Mpesa—has led to the country’s status as an emerging digital economy. However, the long strides in the move toward a fully-fledged digital economy are not reflected in the digital
technology workforce with regard to gender balance. While digital technology careers are highly touted as the jobs of the future, women occupy less than 30 percent of digital technology positions in Kenya. The root cause of the problem can be traced to disadvantages that girls and young
women accumulate throughout their years in education.
This study takes a qualitative approach in trying to identify the root causes for the exclusion of girls and young women from digital technology courses at all levels of education—namely lower primary, upper primary, junior high school, senior high school, and tertiary level in both rural and urban communities. The study identifies various cumulative factors that contribute to fewer women taking up digital technology courses, such as: inadequate infrastructure; insufficient staffing and training of digital technology personnel at learning institutions; the negative impact of gendered social norms; poor advocacy of digital technology careers and the absence of vocational counseling; and the lack of women role models.
To increase the number of women in digital technology careers, we must improve institutional digital technology infrastructure at all levels of education, enhance the training of digital technology personnel within all levels of education, build girls’ interest in digital technology-related courses
from the earliest years, increase digital technology advocacy and awareness among girls, and enhance vocational counseling on digital technology careers

Research paper thumbnail of A Knowledgebase Model for Islamic Inheritance

Information and Knowledge Management, 2014

The dotcom generation has dramatically amplified the pitch of information gathering as well as di... more The dotcom generation has dramatically amplified the pitch of information gathering as well as dissemination. However, not all areas are experiencing the same breeze of efficacy. For instance, in this thesis we looked at the section of Inheritance distribution among the heirs.Seeking an expert opinion on inheritance is as common and natural as death itself. The law is set by human beings who use a broad range of skills and experience to make it fair, justified and acceptable to the people it governs. Nevertheless, the future is unknown to all of us and as times change so do situations, hence the law setters update the law by adding or subtracting articles according to the direction of wave. Even so, some level of biasness is usually inevitable especially when a quick and serious decision has to be made. To err is human, plays a major role here. In case of inheritance, people will initially turn to references and citations which may be inconclusive. This then calls for rationality, something that is more often accompanied by mood changes and influences which eventually deter the authenticity of a sound verdict.

Research paper thumbnail of An Appropriate Feature Selection Technique for Use on Socio-Demographic Predictor Variables to Enable Early Detection of Preeclampsia: A Review of Literature

Computer Engineering and Intelligent Systems

Preeclampsia is categorized by the World Health Organization as one of the leading causes of high... more Preeclampsia is categorized by the World Health Organization as one of the leading causes of high morbidity and mortality in infant and mothers around the world. It accounts for between 3% to 5% of all pregnancy related complications reported worldwide. This condition is much higher among women aged between 30 and 40 years in developing nations especially those in the sub-Saharan region, where the figures range between 5.6% to 6.5% of all reported pregnancies. Preeclampsia is a condition normally detected in the third trimester of pregnancy that is characterized by high risk factors such as sudden High Blood Pressure, High levels of protein in Urine, Chronic kidney disease and Type 1 or 2 diabetes. If preeclampsia is not detected early, it can advance to eclampsia or result to maternal and fetal death. This study sought to identify the optimal features as predictors to enable early detection of preeclampsia through a systematic review of relevant literature.

Research paper thumbnail of An Appropriate Feature Selection Technique for Use on Socio-Demographic Predictor Variables to Enable Early Detection of Preeclampsia: A Review of Literature

Computer Engineering and Intelligent Systems, 2022

Preeclampsia is categorized by the World Health Organization as one of the leading causes of high... more Preeclampsia is categorized by the World Health Organization as one of the leading causes of high morbidity and mortality in infant and mothers around the world. It accounts for between 3% to 5% of all pregnancy related complications reported worldwide. This condition is much higher among women aged between 30 and 40 years in developing nations especially those in the sub-Saharan region, where the figures range between 5.6% to 6.5% of all reported pregnancies. Preeclampsia is a condition normally detected in the third trimester of pregnancy that is characterized by high risk factors such as sudden High Blood Pressure, High levels of protein in Urine, Chronic kidney disease and Type 1 or 2 diabetes. If preeclampsia is not detected early, it can advance to eclampsia or result to maternal and fetal death. This study sought to identify the optimal features as predictors to enable early detection of preeclampsia through a systematic review of relevant literature.

Research paper thumbnail of Deep Learning Algorithm for Identifying Microplastics in Open Sewer Systems: A Systematic Review

The International Journal of Engineering and Science, 2022

Microplastics (MPs) are small and tiny particles of plastics. They originate from macroplastics t... more Microplastics (MPs) are small and tiny particles of plastics. They originate from macroplastics that have broken apart in the ocean. Plastic could also be broken apart due to weathering from the sun, wind, or other causes. The microbeads in many personal care products, such as toothpaste and facial scrubs also count as Microplastics. These Microplastics are destructive to marine habitats. MPs have been known to kill fish and other organisms that fish feed on. Blue economy management has attempted to control the spread of MPs in water bodies. This research was conducted to find out the work that has been done towards Deep Learning algorithms that identify features in pictorial images and which best Deep Learning algorithm can be used in identification of Microplastics. We used secondary data and a total of 1200 articles were reviewed, which, among these, ranged from medical science, environmental science and computer science. Only 23 articles proved relevant to our study. Our findings revealed that most techniques used in other fields cannot be employed in large scale detection, while in computing and IT, Deep Learning has been used, and that CNN is the best algorithm for feature extraction in pictorial images. We could not find any work that has fully employed one of the deep learning methods that used image photos taken from open sewer system to detect presence of Microplastics. We concluded that further research work could be done that will use photos with CNN's Deep Learning to identify Microplastics features in photographic images taken from open sewer systems.

Research paper thumbnail of A hybrid approach to Enhancing Process Scheduling in multiple core Systems

Process scheduling within computer systems and with regards to the CPU always encounters bottle n... more Process scheduling within computer systems and with regards to the CPU always encounters bottle necks due to over reliance on single processor scheduling techniques. The presence of multicore processor systems attempts to increase throughput without however operating at full optimum capacity, hence the need for the proposal of a more efficient scheduling approach for use in multiple core systems. This paper conducted a comparative analysis of the rate of efficiency of existing scheduling algorithms with the aid of secondary data. It then employed CPU user benchmark analysis to asses the effectiveness of the proposed approach. Quad-core processor systems are most suitable for the proposed approach which basically implements two approaches one where scheduling decisions are handled by a master processor while other processors execute the user code thus always ensuring that all processors are busy and always utilized.

Research paper thumbnail of Combining Agile and Human-Centered Design approaches for improving usability in development process from Commercial-Off-The Shelf ( COTS ) software

Commercial off-the-shelf (COTS) products are becoming increasingly popular in large systems. Howe... more Commercial off-the-shelf (COTS) products are becoming increasingly popular in large systems. However, the COTS projects face a number of challenges in software development processes and in usability of theirs products. Moreover, the end users have as well the challenges for understanding how to use the products in order to meet their expectations, this is due to lack of software requirement. Consequently, COTS solutions do not meet the user’s requirements. In COTS, the developers did not have the benefits documents that specify user’s need for building software. Some COTS applications presented a lot of unnecessary or rarely used functions and data entry fields that make interfaces unnecessarily cluttered and confusing. The paper sought to have a good understanding of reasons why the implementation of some popular types of COTS project fail, identify critical factors for successful implementation, and determine how to help the usability specialist align skills previously combining w...

Research paper thumbnail of Software Defects Detection and Prevention Through Virtualization

2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2021

Software defects detection and prevention is an important practice which needs to be adopted by s... more Software defects detection and prevention is an important practice which needs to be adopted by software developers as it is an important indicator for software quality and efficiency. In this thesis, we have investigated the existing approaches for memory leak detection, both automatic and manual, and proposes a novel lightweight approach for automatic memory leak detection, utilizing monitoring capabilities and programming interfaces of modern Java Virtual Machines using application virtualization technology. The results of test on multiple applications showed that a considerable part of them presented different level of memory leak problems. Our work has extended to analyzing the root cause of the memory leaks. In the taken sample projects, we had discovered the causes which was the root problem of memory leak. These cause was related to loaded Drivers which kept in memory unused open connection, DriverManager which was not unloaded on redeploys and other unnecessary resource references. Using the developed pattern, we came on eliminating the memory leak problem and the application was smoothly running with the minimal assigned heap.

Research paper thumbnail of A review of cyber security attack trends in Kenya

Journal of Information Engineering and Applications, 2021

Research paper thumbnail of A Survey of Risk Factors in the Strategic Planning Process of Parastatals in Kenya

A common challenge faced by all organizations, whether private or public, is how to successfully ... more A common challenge faced by all organizations, whether private or public, is how to successfully they manage strategic planning process for attainment of organizational objectives. Some researchers have noted that organizations fail to implement up to 70 per cent of their strategic plans. This study sought to determine the challenges faced by the Kenya Bureau of Standard in its efforts to implement its strategic plans. Specifically, the study tried to find out how organization structure, leadership style, top management, staff involvement and organizational change affect implementation of strategic plans in the Organization. It also tried to identify the role of funds in strategic plan implementation. The study was explanatory in nature since its main purpose was to explain the factors that affect implementation of strategic plans in the public sector and especially in the Kenya Bureau of Standard. It adopted a stratified random sampling technique to get a sample of 27 respondents b...

Research paper thumbnail of Application of Fuzzy Sets Theory in Students ’ Performance Appraisal

This paper presents a method for evaluating students’ performance based on fuzzy sets theory. Thi... more This paper presents a method for evaluating students’ performance based on fuzzy sets theory. This evaluation approach takes into account two major factors: Continuous Assessment Tests (CATs) and Final Exam. The results achieved by this method are compared to the results of the existing arithmetical method of evaluating students’ performance. This paper also describes the fuzzy logic basic concepts applied in evaluating students’ performance.

Research paper thumbnail of Impersonation Challenges Associated With E-Assessment of University Students

Online examination (E-assessment) is an increasingly important component of online courses, and s... more Online examination (E-assessment) is an increasingly important component of online courses, and student authentication is widely seen as one of the major concerns for online examinations. Due to the inherent anonymity of being online, compared to taking an examination in a classroom environment, students may attempt to artificially boost their scores in online examination. This may occur by having another individual take the exam for them, which a typical user/password authentication scheme cannot detect. This research aims to investigate authentication challenges to online examinations, review benefits, constraints of existing authentication traits, and discuss alternative techniques. This will lead to the use of a profile based authentication framework (PBAF) together with user-id and password for the authentication of students during online examinations. The proposed –solution will utilize profile based challenge questions, user-id and password, which will be verified by developm...

Research paper thumbnail of Lack of Awareness by End Users on Security Issues Affecting Mobile Banking: A Case Study of Kenyan Mobile Phone End Users

Journal of Information Engineering and Applications, 2014

The use of mobile phones in African has seen a formidable growth. The use of mobile phones to per... more The use of mobile phones in African has seen a formidable growth. The use of mobile phones to perform business and financial transactions seems to be on the increase as well. The rise in use of mobile phones to perform financial transactions also increases the risks associated with such transactions and especially man in the middle attacks. These compounded with lack of awareness among users means that they (the users) are highly exposed to such attacks. Due to the popular use of mobile banking in Kenya and the third world in particular, securing communication between the mobile device and the back end server has become a fundamental issue. This is due to the fact that hackers have the ability to steal banking information using various techniques, particularly the duping of mobile phone users to believe that they are communicating with a genuine program from their bank while in reality a user is simple giving away sensitive information to the hacker. This paper aims to investigate t...

Research paper thumbnail of Proposed Framework for Securing Mobile Banking Applications from Man in the Middle Attacks

Journal of Information Engineering and Applications, 2014

Mobile phone banking and payments continues to not only be a popular way of transacting business ... more Mobile phone banking and payments continues to not only be a popular way of transacting business but it also seems to evolve rapidly. Despite its popularity however there seem to be some very genuine concerns on the security issues revolving around it, particularly in regard to man in the middle attacks. This paper seeks to propose a secure framework for communication between a mobile device and the back end server for protecting mobile banking applications from man-in-the-middle attacks without introducing further threats to the communication channel.

Research paper thumbnail of Assessment of the Causes and Effects of Packet Loss in Wireless Sensor Networks

Journal of Information Engineering and Applications, 2018

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonom... more A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. A WSN system incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes. [i] Like any other wireless network, loss of packets is a common occurrence in WSNs. This may be caused by a variety of events and occurrences on the network which may in the long run affect the performance of the network. This paper therefore studied the connection between the causes of packet loss in wireless sensor networks and their net effect on the outcome and performance of the said WSN in the monitoring of physical and environmental conditions.Primarily the paper relied on secondary data and review of past literature and research and in the process was able to observe that weak signals and malicious attacks such as the black hole attack, selective forwarding attack and radio interferences ...

Research paper thumbnail of Securing Online Banking Services against Man in the Middle Attacks by use of two Factor Authentication

In this paper, enhanced security of online banking transactions against man in the middle is pres... more In this paper, enhanced security of online banking transactions against man in the middle is presented basing on two factor authentications by use of one time password and single password. Online banking is a system allowing individuals to perform banking activities at home via the internet. Online banking through traditional banks enable customers to perform all routine transactions, such as account transfers, balance inquiries, bill payments, Account information can be accessed anytime, day or night, and can be done from anywhere. Online transactions are considered most sensitive. Doing such online transactions via a public network consequently introduces new challenges for security and trustworthiness, They are two types of common attacks in online banking which are offline credential stealing attacks and online channel breaking attacks. This paper provide a solution to the problem encountered in online channel-breaking attacks. The intruder unnoticeably interrupts messages betwe...

Research paper thumbnail of Use of Bayesian Network to Assess Security Requirements of Mobile Banking Transactions

To ensure secure mobile banking various measures and protocols need to be put in place by the var... more To ensure secure mobile banking various measures and protocols need to be put in place by the various mobile banking stakeholders so as to ensure secure communication from various attacks. For these measures and protocols to be effective, there needs to be a model in place that can effectively determine the threat levels of the potential attacks and the varying effects. This paper aims to employ the use of Bayesian Networks to model security measures that need to be put in place by stakeholders and mobile banking service providers and the influence of those measures on the potential threats.

Research paper thumbnail of Effective approaches for enhancing data management and semantic interoperability within the healthcare sector

International journal of applied research, Dec 31, 2022

In a variety of contexts, Big Data is widely used. In healthcare Big Data has its own characteris... more In a variety of contexts, Big Data is widely used. In healthcare Big Data has its own characteristics, including heterogeneity, incompleteness, timeliness and durability, privacy, and ownership. To enhance health-related science, these features present a number of challenges for data storage, mining, and sharing. Big Data helps to understand electronic health records, gather demographic and medical data such as clinical data, medical conditions and diagnosis, allow doctors to provide a wide variety of patients with quality health care and also to make informative decisions. The large volume of data also provides researchers in the fields of medicine and healthcare with the ability to use tools and techniques to unlock hidden solutions. This study sought to investigate the effects that the existing approaches have on enhancing data management and semantic interoperability in healthcare sector. 180 respondents who took part of the survey were chosen from the Kenyatta University Teaching, Referral & Research Hospital. It was discovered that implementing health standards and tools can help healthcare companies in a number of ways by eliminating compatibility concerns and assuring accurate data representation. Consequently, encouraging successful adoption boosts decision-making processes, encourages sustainability, improves data quality, allows for interoperability, and makes it easier to comply with regulations. These implications help improve patient care, healthcare systems, and overall health outcomes.

Research paper thumbnail of A computer systems cybersecurity challenges encountered by secondary schools in Kenya, a case study of west Pokot county

International Journal of Applied Research

The education sector over time had experienced numerous computer cybersecurity challenges. These ... more The education sector over time had experienced numerous computer cybersecurity challenges. These challenges made them became an easy target for the cybersecurity criminals. Nowadays, most of the secondary schools in Kenya had been equipped with computers and computing devices. Most of these schools had internet connectivity too making them vulnerable to cyber-attack. The vulnerability was also as a result of them lacking resources and attention to cybersecurity due to cybersecurity challenges they experienced. They had weak application security systems, weak endpoint security systems, and weak patch cadence. The study aimed at establishing the computer systems cybersecurity challenges in secondary schools in Kenya. The study was done in West Pokot County. From the finindgs-staffs were allowed to carry their computing devices to the schools, and they connected them to the schools' network in order to access internet; there was no segmentation of network to allow staffs have their own separate network access; some schools had IoT devices with no network segmentations; most schools lack data recovery plan, means to provide endpoint security, means to provide mobile security and means to provide website security. Lack of finance and budget, IT personnel, and user awareness contributed largely to these challenges. By establishing the computer systems cybersecurity challenges encountered, the secondary schools therefore, will find a solution to address them especially by looking at the contributors to the aforementioned challenges.

Research paper thumbnail of Architectural Health Data Standards and Semantic Interoperability: A Comprehensive Review in the Context of Integrating Medical Data Into Big Data Analytics

International Journal of Engineering Applied Sciences and Technology

The integration of medical data into Big Data analytics holds significant potential for advancing... more The integration of medical data into Big Data analytics holds significant potential for advancing healthcare practices and research. However, achieving semantics interoperability, wherein data is exchanged and interpreted accurately among diverse systems, is a critical challenge. This study explores the impact of existing architectures on semantics interoperability in the context of integrating medical data into Big Data analytics. The study highlights the complexities involved in integrating medical data from various sources, each using different formats, data models, and vocabularies. Without a strong emphasis on semantic interoperability, data integration efforts can result in misinterpretations, inconsistencies, and errors, adversely affecting patient care and research outcomes. The significance of data standards and ontologies in establishing a common vocabulary and structure for medical data integration is underscored. Additionally, the importance of data mapping and transform...

Research paper thumbnail of A policy framework for bridging the gender devide in digital technology courses and careers in Kenya

Brookings Institution , 2023

Kenya’s digital technology advancements—chief among them the mobile money transfer application re... more Kenya’s digital technology advancements—chief among them the mobile money transfer application referred to as Mpesa—has led to the country’s status as an emerging digital economy. However, the long strides in the move toward a fully-fledged digital economy are not reflected in the digital
technology workforce with regard to gender balance. While digital technology careers are highly touted as the jobs of the future, women occupy less than 30 percent of digital technology positions in Kenya. The root cause of the problem can be traced to disadvantages that girls and young
women accumulate throughout their years in education.
This study takes a qualitative approach in trying to identify the root causes for the exclusion of girls and young women from digital technology courses at all levels of education—namely lower primary, upper primary, junior high school, senior high school, and tertiary level in both rural and urban communities. The study identifies various cumulative factors that contribute to fewer women taking up digital technology courses, such as: inadequate infrastructure; insufficient staffing and training of digital technology personnel at learning institutions; the negative impact of gendered social norms; poor advocacy of digital technology careers and the absence of vocational counseling; and the lack of women role models.
To increase the number of women in digital technology careers, we must improve institutional digital technology infrastructure at all levels of education, enhance the training of digital technology personnel within all levels of education, build girls’ interest in digital technology-related courses
from the earliest years, increase digital technology advocacy and awareness among girls, and enhance vocational counseling on digital technology careers

Research paper thumbnail of A Knowledgebase Model for Islamic Inheritance

Information and Knowledge Management, 2014

The dotcom generation has dramatically amplified the pitch of information gathering as well as di... more The dotcom generation has dramatically amplified the pitch of information gathering as well as dissemination. However, not all areas are experiencing the same breeze of efficacy. For instance, in this thesis we looked at the section of Inheritance distribution among the heirs.Seeking an expert opinion on inheritance is as common and natural as death itself. The law is set by human beings who use a broad range of skills and experience to make it fair, justified and acceptable to the people it governs. Nevertheless, the future is unknown to all of us and as times change so do situations, hence the law setters update the law by adding or subtracting articles according to the direction of wave. Even so, some level of biasness is usually inevitable especially when a quick and serious decision has to be made. To err is human, plays a major role here. In case of inheritance, people will initially turn to references and citations which may be inconclusive. This then calls for rationality, something that is more often accompanied by mood changes and influences which eventually deter the authenticity of a sound verdict.

Research paper thumbnail of An Appropriate Feature Selection Technique for Use on Socio-Demographic Predictor Variables to Enable Early Detection of Preeclampsia: A Review of Literature

Computer Engineering and Intelligent Systems

Preeclampsia is categorized by the World Health Organization as one of the leading causes of high... more Preeclampsia is categorized by the World Health Organization as one of the leading causes of high morbidity and mortality in infant and mothers around the world. It accounts for between 3% to 5% of all pregnancy related complications reported worldwide. This condition is much higher among women aged between 30 and 40 years in developing nations especially those in the sub-Saharan region, where the figures range between 5.6% to 6.5% of all reported pregnancies. Preeclampsia is a condition normally detected in the third trimester of pregnancy that is characterized by high risk factors such as sudden High Blood Pressure, High levels of protein in Urine, Chronic kidney disease and Type 1 or 2 diabetes. If preeclampsia is not detected early, it can advance to eclampsia or result to maternal and fetal death. This study sought to identify the optimal features as predictors to enable early detection of preeclampsia through a systematic review of relevant literature.

Research paper thumbnail of An Appropriate Feature Selection Technique for Use on Socio-Demographic Predictor Variables to Enable Early Detection of Preeclampsia: A Review of Literature

Computer Engineering and Intelligent Systems, 2022

Preeclampsia is categorized by the World Health Organization as one of the leading causes of high... more Preeclampsia is categorized by the World Health Organization as one of the leading causes of high morbidity and mortality in infant and mothers around the world. It accounts for between 3% to 5% of all pregnancy related complications reported worldwide. This condition is much higher among women aged between 30 and 40 years in developing nations especially those in the sub-Saharan region, where the figures range between 5.6% to 6.5% of all reported pregnancies. Preeclampsia is a condition normally detected in the third trimester of pregnancy that is characterized by high risk factors such as sudden High Blood Pressure, High levels of protein in Urine, Chronic kidney disease and Type 1 or 2 diabetes. If preeclampsia is not detected early, it can advance to eclampsia or result to maternal and fetal death. This study sought to identify the optimal features as predictors to enable early detection of preeclampsia through a systematic review of relevant literature.

Research paper thumbnail of Deep Learning Algorithm for Identifying Microplastics in Open Sewer Systems: A Systematic Review

The International Journal of Engineering and Science, 2022

Microplastics (MPs) are small and tiny particles of plastics. They originate from macroplastics t... more Microplastics (MPs) are small and tiny particles of plastics. They originate from macroplastics that have broken apart in the ocean. Plastic could also be broken apart due to weathering from the sun, wind, or other causes. The microbeads in many personal care products, such as toothpaste and facial scrubs also count as Microplastics. These Microplastics are destructive to marine habitats. MPs have been known to kill fish and other organisms that fish feed on. Blue economy management has attempted to control the spread of MPs in water bodies. This research was conducted to find out the work that has been done towards Deep Learning algorithms that identify features in pictorial images and which best Deep Learning algorithm can be used in identification of Microplastics. We used secondary data and a total of 1200 articles were reviewed, which, among these, ranged from medical science, environmental science and computer science. Only 23 articles proved relevant to our study. Our findings revealed that most techniques used in other fields cannot be employed in large scale detection, while in computing and IT, Deep Learning has been used, and that CNN is the best algorithm for feature extraction in pictorial images. We could not find any work that has fully employed one of the deep learning methods that used image photos taken from open sewer system to detect presence of Microplastics. We concluded that further research work could be done that will use photos with CNN's Deep Learning to identify Microplastics features in photographic images taken from open sewer systems.

Research paper thumbnail of A hybrid approach to Enhancing Process Scheduling in multiple core Systems

Process scheduling within computer systems and with regards to the CPU always encounters bottle n... more Process scheduling within computer systems and with regards to the CPU always encounters bottle necks due to over reliance on single processor scheduling techniques. The presence of multicore processor systems attempts to increase throughput without however operating at full optimum capacity, hence the need for the proposal of a more efficient scheduling approach for use in multiple core systems. This paper conducted a comparative analysis of the rate of efficiency of existing scheduling algorithms with the aid of secondary data. It then employed CPU user benchmark analysis to asses the effectiveness of the proposed approach. Quad-core processor systems are most suitable for the proposed approach which basically implements two approaches one where scheduling decisions are handled by a master processor while other processors execute the user code thus always ensuring that all processors are busy and always utilized.

Research paper thumbnail of Combining Agile and Human-Centered Design approaches for improving usability in development process from Commercial-Off-The Shelf ( COTS ) software

Commercial off-the-shelf (COTS) products are becoming increasingly popular in large systems. Howe... more Commercial off-the-shelf (COTS) products are becoming increasingly popular in large systems. However, the COTS projects face a number of challenges in software development processes and in usability of theirs products. Moreover, the end users have as well the challenges for understanding how to use the products in order to meet their expectations, this is due to lack of software requirement. Consequently, COTS solutions do not meet the user’s requirements. In COTS, the developers did not have the benefits documents that specify user’s need for building software. Some COTS applications presented a lot of unnecessary or rarely used functions and data entry fields that make interfaces unnecessarily cluttered and confusing. The paper sought to have a good understanding of reasons why the implementation of some popular types of COTS project fail, identify critical factors for successful implementation, and determine how to help the usability specialist align skills previously combining w...

Research paper thumbnail of Software Defects Detection and Prevention Through Virtualization

2021 Fourth International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2021

Software defects detection and prevention is an important practice which needs to be adopted by s... more Software defects detection and prevention is an important practice which needs to be adopted by software developers as it is an important indicator for software quality and efficiency. In this thesis, we have investigated the existing approaches for memory leak detection, both automatic and manual, and proposes a novel lightweight approach for automatic memory leak detection, utilizing monitoring capabilities and programming interfaces of modern Java Virtual Machines using application virtualization technology. The results of test on multiple applications showed that a considerable part of them presented different level of memory leak problems. Our work has extended to analyzing the root cause of the memory leaks. In the taken sample projects, we had discovered the causes which was the root problem of memory leak. These cause was related to loaded Drivers which kept in memory unused open connection, DriverManager which was not unloaded on redeploys and other unnecessary resource references. Using the developed pattern, we came on eliminating the memory leak problem and the application was smoothly running with the minimal assigned heap.

Research paper thumbnail of A review of cyber security attack trends in Kenya

Journal of Information Engineering and Applications, 2021

Research paper thumbnail of A Survey of Risk Factors in the Strategic Planning Process of Parastatals in Kenya

A common challenge faced by all organizations, whether private or public, is how to successfully ... more A common challenge faced by all organizations, whether private or public, is how to successfully they manage strategic planning process for attainment of organizational objectives. Some researchers have noted that organizations fail to implement up to 70 per cent of their strategic plans. This study sought to determine the challenges faced by the Kenya Bureau of Standard in its efforts to implement its strategic plans. Specifically, the study tried to find out how organization structure, leadership style, top management, staff involvement and organizational change affect implementation of strategic plans in the Organization. It also tried to identify the role of funds in strategic plan implementation. The study was explanatory in nature since its main purpose was to explain the factors that affect implementation of strategic plans in the public sector and especially in the Kenya Bureau of Standard. It adopted a stratified random sampling technique to get a sample of 27 respondents b...

Research paper thumbnail of Application of Fuzzy Sets Theory in Students ’ Performance Appraisal

This paper presents a method for evaluating students’ performance based on fuzzy sets theory. Thi... more This paper presents a method for evaluating students’ performance based on fuzzy sets theory. This evaluation approach takes into account two major factors: Continuous Assessment Tests (CATs) and Final Exam. The results achieved by this method are compared to the results of the existing arithmetical method of evaluating students’ performance. This paper also describes the fuzzy logic basic concepts applied in evaluating students’ performance.

Research paper thumbnail of Impersonation Challenges Associated With E-Assessment of University Students

Online examination (E-assessment) is an increasingly important component of online courses, and s... more Online examination (E-assessment) is an increasingly important component of online courses, and student authentication is widely seen as one of the major concerns for online examinations. Due to the inherent anonymity of being online, compared to taking an examination in a classroom environment, students may attempt to artificially boost their scores in online examination. This may occur by having another individual take the exam for them, which a typical user/password authentication scheme cannot detect. This research aims to investigate authentication challenges to online examinations, review benefits, constraints of existing authentication traits, and discuss alternative techniques. This will lead to the use of a profile based authentication framework (PBAF) together with user-id and password for the authentication of students during online examinations. The proposed –solution will utilize profile based challenge questions, user-id and password, which will be verified by developm...

Research paper thumbnail of Lack of Awareness by End Users on Security Issues Affecting Mobile Banking: A Case Study of Kenyan Mobile Phone End Users

Journal of Information Engineering and Applications, 2014

The use of mobile phones in African has seen a formidable growth. The use of mobile phones to per... more The use of mobile phones in African has seen a formidable growth. The use of mobile phones to perform business and financial transactions seems to be on the increase as well. The rise in use of mobile phones to perform financial transactions also increases the risks associated with such transactions and especially man in the middle attacks. These compounded with lack of awareness among users means that they (the users) are highly exposed to such attacks. Due to the popular use of mobile banking in Kenya and the third world in particular, securing communication between the mobile device and the back end server has become a fundamental issue. This is due to the fact that hackers have the ability to steal banking information using various techniques, particularly the duping of mobile phone users to believe that they are communicating with a genuine program from their bank while in reality a user is simple giving away sensitive information to the hacker. This paper aims to investigate t...

Research paper thumbnail of Proposed Framework for Securing Mobile Banking Applications from Man in the Middle Attacks

Journal of Information Engineering and Applications, 2014

Mobile phone banking and payments continues to not only be a popular way of transacting business ... more Mobile phone banking and payments continues to not only be a popular way of transacting business but it also seems to evolve rapidly. Despite its popularity however there seem to be some very genuine concerns on the security issues revolving around it, particularly in regard to man in the middle attacks. This paper seeks to propose a secure framework for communication between a mobile device and the back end server for protecting mobile banking applications from man-in-the-middle attacks without introducing further threats to the communication channel.

Research paper thumbnail of Assessment of the Causes and Effects of Packet Loss in Wireless Sensor Networks

Journal of Information Engineering and Applications, 2018

A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonom... more A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions. A WSN system incorporates a gateway that provides wireless connectivity back to the wired world and distributed nodes. [i] Like any other wireless network, loss of packets is a common occurrence in WSNs. This may be caused by a variety of events and occurrences on the network which may in the long run affect the performance of the network. This paper therefore studied the connection between the causes of packet loss in wireless sensor networks and their net effect on the outcome and performance of the said WSN in the monitoring of physical and environmental conditions.Primarily the paper relied on secondary data and review of past literature and research and in the process was able to observe that weak signals and malicious attacks such as the black hole attack, selective forwarding attack and radio interferences ...

Research paper thumbnail of Securing Online Banking Services against Man in the Middle Attacks by use of two Factor Authentication

In this paper, enhanced security of online banking transactions against man in the middle is pres... more In this paper, enhanced security of online banking transactions against man in the middle is presented basing on two factor authentications by use of one time password and single password. Online banking is a system allowing individuals to perform banking activities at home via the internet. Online banking through traditional banks enable customers to perform all routine transactions, such as account transfers, balance inquiries, bill payments, Account information can be accessed anytime, day or night, and can be done from anywhere. Online transactions are considered most sensitive. Doing such online transactions via a public network consequently introduces new challenges for security and trustworthiness, They are two types of common attacks in online banking which are offline credential stealing attacks and online channel breaking attacks. This paper provide a solution to the problem encountered in online channel-breaking attacks. The intruder unnoticeably interrupts messages betwe...

Research paper thumbnail of Use of Bayesian Network to Assess Security Requirements of Mobile Banking Transactions

To ensure secure mobile banking various measures and protocols need to be put in place by the var... more To ensure secure mobile banking various measures and protocols need to be put in place by the various mobile banking stakeholders so as to ensure secure communication from various attacks. For these measures and protocols to be effective, there needs to be a model in place that can effectively determine the threat levels of the potential attacks and the varying effects. This paper aims to employ the use of Bayesian Networks to model security measures that need to be put in place by stakeholders and mobile banking service providers and the influence of those measures on the potential threats.