Geoffrey Muchiri Muketha

ORCID: 0000-0003-0037-3619
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software Engineering Research
  • Business Process Modeling and Analysis
  • Service-Oriented Architecture and Web Services
  • Advanced Software Engineering Methodologies
  • Energy Efficient Wireless Sensor Networks
  • Information and Cyber Security
  • Software Engineering Techniques and Practices
  • Software Reliability and Analysis Research
  • Mobile Ad Hoc Networks
  • ICT Impact and Policies
  • Network Security and Intrusion Detection
  • Technology Adoption and User Behaviour
  • Security in Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • ERP Systems Implementation and Impact
  • Opportunistic and Delay-Tolerant Networks
  • Software System Performance and Reliability
  • Advanced Malware Detection Techniques
  • Innovation and Socioeconomic Development
  • Internet Traffic Analysis and Secure E-voting
  • Big Data and Business Intelligence
  • Mathematics and Applications
  • Cloud Data Security Solutions
  • Software Testing and Debugging Techniques
  • Text and Document Classification Technologies

Murang'a University of Technology
2016-2024

Kibabii University
2023

Technical University of Kenya
2020

Meru University of Science and Technology
2016

Masinde Muliro University of Science and Technology
2013-2014

Business processes have an inherent complexity which if not controlled can keep on increasing with time, thus making the error-prone, difficult to understand and maintain. In last few years, several researchers proposed a number of metrics be used measure therefore control business processes. this study, survey process is conducted goal investigating there are any gaps in literature. Initially, description definition validation presented, followed by analysis that appeared literature 5...

10.3923/itj.2010.1336.1344 article EN Information Technology Journal 2010-09-15

The burden of preeclampsia has been a major concern worldwide both in developed and developing countries, making its prevention management concern. Although motherhood is fulfilling experience society, it connected to ill-health some women, leading maternal morbidity mortality. United Nations' Sustainable Development Goal (SDG) 3 aims reduce the global mortality ratio less than 70 per 100,000 live births. These deaths are caused by among other things, emergence conditions such as during...

10.1016/j.imu.2019.100199 article EN cc-by-nc-nd Informatics in Medicine Unlocked 2019-01-01

Wireless Sensor Networks (WSNs) have emerged as a critical technology in diverse applications, ranging from environmental monitoring to precision agriculture. However, the inherent limitations of WSNs, such constrained energy resources and limited bandwidth, pose significant challenges for reliable data transmission. Furthermore, increasing vulnerability WSNs security threats, malicious node attacks breaches, necessitates robust mechanisms. This paper proposes novel composite routing...

10.5121/ijnsa.2025.17101 article EN International Journal of Network Security & Its Applications 2025-02-10

The Aspect Oriented Software (AOS) paradigm emerged as a response to the limitations of ObjectOriented Programming, specifically its inability modularize cross-cutting concerns effectively. However, AOS have inherent complexity that keeps increasing software is modified and most existing metrics not been theoretically or empirically validated. This means we cannot rely on them for measurement complexity. paper proposes four base two composite coupling analyzing AOS. were derived using...

10.5121/ijsea.2025.16102 article EN International Journal of Software Engineering & Applications 2025-01-28

Increasing interest and advancement of internet communication technologies have made network security rise as a vibrant research domain. Network intrusion detection systems (NIDSs) developed indispensable defense mechanisms in cybersecurity that are employed discovery prevention malicious activities. In the recent years, researchers proposed deep learning approaches development NIDSs owing to their ability extract better representations from large corpus data. literature, convolutional...

10.3233/jcs-220031 article EN Journal of Computer Security 2023-02-28

With an emphasis on maize and tomato crops specifically, this research explores the creative fusion of computer vision (CV) machine learning (ML) to address enduring problem pests crop diseases impacting Kenya's crucial agricultural industry. This study aims provide farmers with a reliable accurate tool for identifying diagnosing by using MobileNetV2-based model. An extensive dataset including photos both healthy sick was gathered, preprocessing approaches, such as data augmentation, were...

10.62049/jkncu.v4i1.46 article EN cc-by-nc-nd Journal of the Kenya National Commission for UNESCO 2024-01-15

In this study, seven metrics are proposed for measuring the complexity of Executable Business Processes (EBP). The either derived from existing business process or adapted software metrics. Evaluation was carried out in three case studies with goal finding if theoretically sound and at same time intuitional. 1, values were computed processes then analyzed to check whether they agree reality. 2, grouped into two categories length separately checked their conformance Briand’s framework. 3, all...

10.3923/itj.2010.1317.1326 article EN Information Technology Journal 2010-09-15

In the recent years, data mining has been utilized in education settings for extracting and manipulating data, establishing patterns order to produce useful information decision making.There is a growing need higher institutions be more informed knowledgeable about their students, them understand some of reasons behind students' choice enroll pursue careers.One ways which this can done such obtain knowledge students by mining, processing analyzing they accumulate them.In paper, we propose...

10.7753/ijcatr0703.1003 article EN International Journal of Computer Applications Technology and Research 2018-03-25

The integration of powerful technologies such as Internet Things (IoT) and Multi-Agent Systems (MAS) in healthcare addresses the complex nature industry, facilitating communication, coordination, decision-making among various departments.This becomes particularly crucial context COVID-19 pandemic, where developing countries faced increased demand for services, limited resources, a lack robust health systems.Through utilization IoT agent-based systems, remote consultations virtual doctors can...

10.17148/ijarcce.2023.12817 article EN IJARCCE 2023-08-30

Network intrusions compromise the network’s confidentiality, integrity and availability of resources. Intrusion detection systems (IDSs) have been implemented to prevent problem. Although IDS technologies are promising, their ability detecting true alerts is far from being perfect. One problem that producing large numbers false alerts, which termed as malicious by IDS. In this paper we propose a set metrics for evaluating alerts. The will identify false, low-level redundant mapping on...

10.5121/ijnsa.2023.15102 article EN International Journal of Network Security & Its Applications 2023-01-30

Cascading style sheets (CSS) is a Web-based sheet language that used for the presentation of Web documents.CSS has advanced from CSS1 to CSS3.and extensions CSS known as pre-processors have also emerged in last few years.As case with regular software, inherent complexity keeps on increasing age which undesirable, and metrics are needed measure aim controlling it.Although several been proposed literature, area stylesheets still lagging.Findings show CSS-related exist, there no evidence proof...

10.5121/ijsea.2019.10303 article EN International Journal of Software Engineering & Applications 2019-05-31

Determining the size, effort and cost of Service-oriented Architecture (SOA) systems is important to facilitate project planning eventually successful implementation a software project.SOA approach one recent architectures that allow integration applications within outside organization regardless heterogeneous technology over distributed network.A number research studies have been done measure SOA size.However, these are not based on metrics rendering them be ineffective in their...

10.5121/ijsea.2019.10206 article EN International Journal of Software Engineering & Applications 2019-03-31
Coming Soon ...