Browsing by Author "Muketha, Geoffrey Muchiri"
Now showing 1 - 10 of 10
- Results Per Page
- Sort Options
Item Advances in composite integer factorization(International Knowledge Sharing Platiform, 2013-01-01) Wanambisi, Adrin W.; Aywa, Shem; Maende, Cleophas; Muketha, Geoffrey MuchiriIn this research we propose a new method of integer factorization. Prime numbers are the building blocks of arithmetic. At the moment there are no efficient methods (algorithms) known that will determine whether a given integer is prime or and its prime factors[1]. This fact is the basis behind many of the cryptosystems currently in use.Item Algebraic approach to composite integer factorization(European Centre for Research, Training and Development : IJMSS, 2013-03-01) Wanambisi, Adrin W.; Aywa, Shem; Maende, cleophas; Muketha, Geoffrey MuchiriThere various algorithms that can factor large integers but very few of these algorithms run in polynomial time. This fact makes them inefficient. The apparent difficulty of factoring large integers is the basis of some modern cryptographic algorithms. In this paper we propose an algebraic approach to factoring composite integer. This approach reduces the number of steps to a finite number of possible differences between two primes.Item Interface features, program complexity and memorability as indicators of learnability of mobile social software(International Journal of Science and Research, 2017) Masese, Nelson Bogomba; Muketha, Geoffrey Muchiri; Mbuguah, Samuel MungaiSocial Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans and computational devices. Although latest developments in mobile phone technologies have opened the way for a new generation of mobile social applications that allow users to interact and share information, there is still very limited user support information on how to use different applications. This problem either increases the learning curve of the users, thereby adversely affects their overall efficiency. The main purpose of this paper is to analyze factors that affect the learnability of mobile social software. A sample of 361 respondents was selected, with 345 respondents returning feedback. Primary data was collected through the use of questionnaires and interviews targeting mobile social users in Nakuru County Kenya. Three social networks were used, namely, WhatsApp, Facebook and Twitter. Data analysis was done using descriptive statistics. Findings indicate that interface features affect learnability across the three social networks, with learnability of WhatsApp turning out to be higher than that of compared to Facebook and Twitter. Findings also indicate that more than 60% program supports compatibility with other applications while 59.4% of the respondents agreed that maintaining language is cheap across the three social networks. Other findings indicate that WhatsApp’s memorability is easy to execute compared to that of Facebook and Twitter.Item Interface Features, Program Complexity and Memorability as Indicators of Learnability of Mobile Social Software(International Journal of Science and Research, 2017-10-26) Masese, Nelson Bogomba; Muketha, Geoffrey Muchiri; Mbuguah, Samuel MungaiSocial Computing aims to support the tendency of humans to interact with mobile devices. Technology reinforces this interaction by producing appropriate responses that then lead to improved communication between humans and computational devices. Although latest in mobile phone technologies have opened the way for a new generation of mobile social applications that allow users to interact and share information, there is still very limited user support information on how to use different applications. This problem either increases the learning curve of the users, thereby adversely affects their overall efficiency. The main purpose of this paper is to analyze factors that affect the learnability of mobile social software. A sample of 361 respondents was selected, with 345 respondents returning feedback. Primary data was collected through the use of questionnaires and interviews targeting mobile social users in Nakuru County Kenya. Three social networks were used, namely, WhatsApp, Facebook and Twitter. Data analysis was done using descriptive statistics. Findings indicate that interface features affect learnability across the three social networks, with learnability of WhatsApp turning out to be higher than that of compared to Facebook and Twitter. Findings also indicate that more than 60% program supports compatibility with other applications while 59.4% of the respondents agreed that maintaining language is cheap across the three social networks. Other findings indicate that WhatsApp’s memorability is easy to execute compared to that of Facebook and Twitter.Item Multi-Agent Systems Requirements Analysis for Patient-centered Healthcare Consultancy Service(International Journal of Advanced Research in Computer Science, 2023-10-28) Muyobo, Daniel Khaoya; Wechuli, Alice Nambiro; Muketha, Geoffrey MuchiriAgents are currently being discussed in nearly every domain of science and engineering. Through the ut ilization of IoT and agentbased systems, remote consultations and virtual doctors can provide essential healthcare services by analyzing patient data and medical history. The purpose of this paper is provide an analysis the requirements for multi-agent systems in patient-centered health consultancy services in Kenya. It focuses on various agent types, including hardware, hospital, human, software, database/storage, and technological/ framework agents. For hardware, computers, laptops, and mobile devices need specific processing power, memory, network connectivity, storage, and security. Medical equipment must prioritize accuracy, reliability, integration with records, and regulatory compliance. Networking requires high-speed internet, security, and redundancy. Hospital agents offer comprehensive inpatient and outpatient care, categorized into general, mental health, and specialized hospitals. Human agents, like medical specialists, IT professionals, and administrators, play essential roles in healthcare consultancy. Software agents encompass Electronic Health Records (EHRs), Clinical Decision Support Systems (CDSS), Telemedicine platforms, and more. Database/storage agents include EHRs, Health Information Exchange (HIE) systems, and data encryption. Technological/framework agents involve health information systems, telemedicine platforms, decision support systems, and health data analytics frameworks. These agents enable efficient data management, remote care, evidence-based decisions, and secure data exchange.Item A probabilistic data encryption scheme(international journal sharing platiform ; Journal of Natural Sciences Research, 2013-01-01) Wanambisi, Adrin W.; Maende, cleophas; Muketha, Geoffrey Muchiri; Aywa, ShemIn this paper the author presents a probabilistic encryption scheme that is polynomially secure and has the efficiency of deterministic schemes. From the theoretical construction of Brands and Gill (1996), it is clear that the proof of Pseudo randomness of the quadratic residue generator is complete if it can be shown that there exists a one-way function under the possible assumption that it is infeasible to solve the quadratic residuacity problem provided the factorization of the composite integer is unknownItem A review of algorithms for determination of attackability metrics(Journal of Emerging Trends in Computing and Information Sciences, 2014) Mbuguah, Samuel Mungai; Muketha, Geoffrey Muchiri; Wabwoba, FranklinAttackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. A Holistic predictive attackability metrics model has been proposed in our previous study. Metrics derived from this model, their theoretical and empirical validation were proposed and evaluated. The method of measurement of these metrics is largely manual this paper illustrates algorithms that can be adopted with suitable tools to automate the collections of the attackability metrics.Item A review of mobile social software awareness and utilization(International Journal of Science and Research, 2016) Masese, Nelson; Mbuguah, Samuel Mungai; Muketha, Geoffrey MuchiriSocial software comprises a wide range of different types of activities, The most familiar are likely to be internet discussion forums, social networking and dating sites Mobile computing technologies and social software have given new challenges to technology enhanced awareness. Simple awareness system include knowing how the given system works. The objectives of the paper include To establish the level of awareness of mobile social systems, To identify commonly used tools in mobile social systems and To establish the level of utilization of using mobile social systems. This paper reviews the awarness of mobile social softare that includes Facebook,Whattapp, Twitter and linkedIn, Instagram. Primary data was used drawn from mobile social users in Nakuru County Kenya. The sample size was 361 respondents but 345 respodents returned the feed back , both descriptive and inferential statistics was used . It is evident from the study that out of More than 53.3% of respondents use WhatApp while 31.9% use facebook ,7.8% use twitter while Linkedin has lower ratings of 7.0%. The study also reveals that most of the respodents are aware of the services they utilize the service for chatting purpose with 80% followed by Messaging with 18.6 % while research work is the last one with 11%.Item Social attackability metrics for software systems(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muketha, Geoffrey MuchiriSoftware based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have identified seven human traits/attributes that make human susceptible to social engineering attacks. Yet they did not model nor come up metrics. The author has published a conceptual a holistic predictive attackability metric model and corresponding metrics to assist the system designers. The model considers the technical metrics based on cohesion, coupling and complexity as used to predict attackability. It also consider the social metrics based on human traits that make the human operators become susceptible to social engineering attacks. The identified human traits are dishonesty, social compliance, Kindness,Time pressure, Herd mentality, greed/need and distraction. This paper considers only the social metrics part of the model.To measure human traits the authors relies on the HEXACO model and Big Five personality trait models. In these model the personality trait are measured using a ranking scale based on Lickert scale. Hence each trait is measured as a percentile. However, for purpose of this paper, to postulate the metric the author considered the discrete case. Why the value of trait take either a value of “1” or “0”. To determine the relationship between traits between and attackability experts were asked to assess the trait versus attackability from which after aggregating for all traits a social attackability metrics was determined. To determine the predictive social attackability metrics each trait was considered to be equally likely to occur and hence a probability of 1/7 and this acts as factor to transform the social attackability metric into predictive attackability metrics.Item Survey of Cyber Security Frameworks(International Journal of Technology in Computer Science & Engineering, 2014-06-28) Wechuli, Alice Nambiro; Muketha, Geoffrey Muchiri; Matoke, NahasonIn a digital world, the national economy and welfare have grown critically dependent on the cyber infrastructure due to the capabilities and opportunities the Internet provides. This leaves organizations open to various forms of malicious attack by cybercriminals which has overwhelmed some current methodologies used for tracking cyber attacks and vulnerabilities. This paper presents a review of literature on cyber security status, challenges to cyber security, and existing cyber security frameworks. Findings indicate that though efforts are in place to bring about effective assessment of cyber security, there is no single accepted framework to offer a lasting solution to the cyber security assessment challenge.
