Geoffrey Mariga Wambugu

ORCID: 0000-0002-0250-0135
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Software Engineering Research
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Software Engineering Methodologies
  • Software Reliability and Analysis Research
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • Smart Agriculture and AI
  • Software System Performance and Reliability
  • AI in cancer detection
  • Software Engineering Techniques and Practices
  • Advanced Text Analysis Techniques
  • Brain Tumor Detection and Classification
  • Spam and Phishing Detection
  • Genetics, Bioinformatics, and Biomedical Research
  • Electronic Health Records Systems
  • Privacy, Security, and Data Protection
  • Computational and Text Analysis Methods
  • Artificial Intelligence in Healthcare
  • Technology Adoption and User Behaviour
  • Software Testing and Debugging Techniques
  • Topic Modeling
  • Retinal Imaging and Analysis
  • Hydropower, Displacement, Environmental Impact
  • ICT in Developing Communities

Daystar University
2023

Murang'a University of Technology
2021-2023

The rising number of malicious threats on computer networks and Internet services owing to a large attacks makes the network security be at incessant risk. One predominant that poses distressing are brute force attacks. A attack uses trial error algorithm decode encrypted data such as passwords or Data Encryption Standard keys, through exhaustive effort (using force) rather than using intellectual strategies. Brute resemble legitimate traffic, making it difficult defend an organization rely...

10.7753/ijcatr1001.1008 article EN International Journal of Computer Applications Technology and Research 2021-01-01

Network Intrusion Detection Systems (NIDSs) have become standard security solutions that endeavours to discover unauthorized access an organizational computer network by scrutinizing incoming and outgoing traffic for signs of malicious activity. In recent years, deep learning based NIDSs emerged as active area research in cybersecurity several surveys been done on these systems. Although a plethora exists covering this burgeoning body research, there lacks the literature empirical analysis...

10.35940/ijese.f2530.0610722 article EN cc-by-nc-nd International Journal of Emerging Science and Engineering 2022-05-21

U-Net convolutional neural networks have become a cornerstone in medical image processing, particularly for complex segmentation tasks. However, with the proliferation of various variants, it is imperative to evaluate their performance across diverse datasets determine most suitable architecture specific applications. This study presents comprehensive empirical analysis six variants namely; U-Net, U-Net++, ResU-Net, TransU-Net, V-Net, and 3+, focusing on effectiveness segmentation. The...

10.26438/ijsrcse.v13i1.610 article EN International Journal of Scientific Research in Computer Sciences and Engineering 2025-02-28

The deep learning model for crop diseases and pest classification research examined how might improve farming methods, particularly the purpose of accurately classifying pests illnesses that affect crops. importance to world food security was highlighted in introduction, along with need new approaches, such as models, accuracy effectiveness disease control farming. In order evaluate accuracy, secondary datasets obtained from kaggle website were used train test various one which being...

10.24203/7k0f4a58 article EN International Journal of Computer and Information Technology(2279-0764) 2025-01-27

Increasing interest and advancement of internet communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) developed indispensable defense mechanisms in cybersecurity that are employed discovery prevention malicious activities. In the recent years, researchers proposed deep learning approaches development NIDSs owing to their ability extract better representations from large corpus data. literature, convolutional...

10.3233/jcs-220031 article EN Journal of Computer Security 2023-02-28

Regression testing is carried out to ensure that software modifications do not introduce new potential bugs the existing software. Existing test cases are applied in testing, such can run into thousands, and there much time execute all of them. Test Case Prioritization (TCP) a technique order so potentially revealing more faults performed first. With TCP being deemed an optimization problem, several metaheuristic nature-inspired algorithms as Bat, Genetic, Ant colony, Firefly have been...

10.5815/ijisa.2023.01.02 article EN International Journal of Intelligent Systems and Applications 2023-02-08

Deep learning has proven to be a landmark computing approach the computer vision domain. Hence, it been widely applied solve complex cognitive tasks like detection of anomalies in surveillance videos. Anomaly this case is identification abnormal events videos which can deemed as security incidents or threats. solutions for anomaly outperformed other traditional machine solutions. This review attempts provide holistic benchmarking published deep since 2016. The paper identifies, technique,...

10.24203/ijcit.v10i5.166 article EN International Journal of Computer and Information Technology(2279-0764) 2021-10-22

Object-Oriented Programming (OOP) has been promoted as a way to produce high-quality software while increasing developer productivity through code reuse. Software systems and underlying designs get more extensive complicated maintaining high degree of quality. One the widely accepted standards for describing architectures is UML Sequence Diagram. A sequence diagram depicts interaction two-dimensional chart players by showing messages delivered received between them. This research aims...

10.5121/ijsea.2023.14102 article EN International Journal of Software Engineering & Applications 2023-01-30

Dimensionality reduction is an essential ingredient of machine learning modelling that seeks to improve the performance such models by extracting better quality features from data while removing irrelevant and redundant ones.The technique aids reduce computational load, avoiding over-fitting, increasing model interpretability.Recent studies have revealed dimensionality can benefit labeled information, through joint approximation predictors target variables a low-rank representation.A...

10.5815/ijwmt.2023.04.05 article EN International Journal of Wireless and Microwave Technologies 2023-08-08

This paper outlines the guidelines and requirements for students undertaking a computing project as part of their academic program. The is critical component most undergraduate programs designed to provide with opportunity apply theoretical knowledge practical scenarios, demonstrating ability plan, execute, present complex piece work. Unfortunately, there currently lack clear helpful guidance on how conduct elementary research at this level, differentiate from other types projects, report it...

10.18535/ijecs/v13i09.4890 article EN International Journal Of Engineering And Computer Science 2024-09-13

Software complexity refers to the factors that determine level of a software project. High is caused by many attributes used in system and complex logic relationships among these features. The increased undesirable affects maintenance. Over years, Engineering scholars recommended several metrics like Halstead metric, cyclomatic complexity, line code deal with complexity. With increasing as time goes by, there need for better can evaluate more effectively. This research aims develop model...

10.7753/ijsea1105.1003 article EN International Journal of Science and Engineering Applications 2022-05-01

The paper presents feature extraction methods and classification algorithms used to classify maize leaf disease images. From images, features are extracted passed the machine learning algorithm identify possible based on detected using method. images include of common rust, spot, northern blight healthy An evaluation was done for method see which performs best with image algorithms. Based evaluation, outcomes revealed Histogram Oriented Gradients performed classifiers compared KAZE FAST...

10.24203/ijcit.v11i2.204 article EN International Journal of Computer and Information Technology(2279-0764) 2022-06-11

Computer vision has gained momentum in medical imaging tasks. Deep learning and Transfer are some of the approaches used computer vision. The aim this research was to do a comparative study deep transfer detection diabetic retinopathy. To achieve objective, experiments were conducted that involved training four state-of-the-art neural network architectures namely; EfficientNetB0, DenseNet169, VGG16, ResNet50. from scratch. using which pre-trained ImageNet dataset then fine-tuning them solve...

10.7753/ijcatr1107.1001 article EN International Journal of Computer Applications Technology and Research 2022-06-21

The paper presents feature extraction methods and classification algorithms used to classify maize leaf disease images. From images, features are extracted passed the machine learning algorithm identify possible based on detected using method. images include of common rust, spot, northern blight healthy An evaluation was done for method see which performs best with image algorithms. Based evaluation, outcomes revealed Histogram Oriented Gradients performed classifiers compared KAZE FAST...

10.24203/ijcit.v11i4.244 article EN International Journal of Computer and Information Technology(2279-0764) 2022-12-01

In response to the increased demand for more effective authentication methods, usage of biometric secure systems against unwanted access has grown. Because recent COVID-19 pandemic outbreak, any direct physical contact with system should be avoided. Furthermore, current lack necessary security features, making them vulnerable cyber risks such as forgery by unethical employees and unauthorized users. The goal this paper is investigate existing propose best models overcome weaknesses...

10.5539/cis.v15n2p43 article EN Computer and Information Science 2022-03-17

10.5281/zenodo.7668794 article EN cc-by Zenodo (CERN European Organization for Nuclear Research) 2023-02-23

Software project management includes a substantial area for estimating software maintenance effort. Estimation of effort improves the overall performance and efficiency software. The Constructive Cost Model (COCOMO) other estimation models are mentioned in literature but inappropriate Python programming language. This research aimed to modify (COCOMO II) by considering range influencing factors get estimations incorporated size complexity metrics estimate A within-subjects experimental...

10.5121/ijsea.2023.14302 article EN International Journal of Software Engineering & Applications 2023-05-26

The purpose of this article sought to design a secure framework that can be used in M-Health systems development. researcher the integrated information theory as for enforcing system security holistic approach. To actualize study, objectives were meant guide carrying out research were: evaluate significance Confidentiality, Integrity and availability on M-health develop integration systems. University Nairobi Hospital because ease accessibility financial resources available conduct research....

10.5539/cis.v16n4p21 article EN Computer and Information Science 2023-11-20

This paper provides an Extended Client Based Technique (ECBT) that performs classification on emails using the Bayessian classifier attain in-depth defense by performing textual analysis email messages and attachment extensions to detect flag snooping emails. The technique was implemented python 3.6 in a jupyter notebook. An experimental research method personal computer used validate developed different metrics. validation results produced high acceptable percentage rate based four...

10.35940/ijeat.d2296.0410421 article EN International Journal of Engineering and Advanced Technology 2021-04-30
Coming Soon ...