School of Computing and Informatics (SCAI)
Permanent URI for this communityhttp://erepository.kibu.ac.ke/handle/123456789/167
Browse
Browsing School of Computing and Informatics (SCAI) by Issue Date
Now showing 1 - 20 of 64
- Results Per Page
- Sort Options
Item The digital board in a university setting: two real cases in Europe and East Africa(Springer, Berlin, Heidelberg, 2010-05-19) Bertarelli, Fabio; Corradini, Matteo; Guaraldi, Giacomo; Genovese, Elisabetta; Kilwake, Juma; Mutua, StephenUsually the digital board is thought of as a tool that can only be used beneficially in the context of primary school, secondary school or in a situation of learning handicap. In this case study we want to highlight how the new tools can be used in more broad settings such as teaching in scientific and technical universities. The easy adoption of all useful software on the market to the use of these tools makes them an innovative element in the teaching techniques of the futureItem Use of low cost wireless communication technology for education in rural Kenya(ACM, 2010-06-15) Mayeku, Betty; Kilwake, Juma; Bertarelli, FabioWith the advent of mobile revolution, the emerging mobile technologies can support a broad range of learning activities on a variety of mobile devices, a concept referred to as mobile learning. The combination of wireless communication technology and mobile computing is resulting in rapid transformations of the educational world. This paper explores the use of low cost wireless technology in combination with other existing technologies to bring education to rural and pastoralist tribes in Kenya who would otherwise not have access to education.Item The role of wireless technologies in taking education to rural villages in developing countries(International Journal of Information and Communication Technology Research, 2011) Wabwoba, Franklin; Omieno, Kelvin K.; Simiyu, Carolyne N.; Sisungo, Zipporah W.The development of wireless technologies has generated a considerable amount of excitement among practitioners and academics because it results in shifting the academic environment from traditional classroom restricted setting to open schools. The use of wireless technologies may be very important in provision of improved quality education for rural parts of the developing nations that lack a number of necessary facilities. The study conducted a survey among teachers in primary schools with specific focus on the challenges of the conventional classroom setting in rural Kenya. From the findings of the study a framework of utilization of wireless technologies is proposed to help overcome some of the challenges. The paper highlights the possibilities and potentials of the wireless technologies for various functions in the rural schools through the use of short message service (SMS), podcasting, video and mobile Web services among other approaches. The paper aims at providing a reference point for decision-makers, planners, teachers and administrators of developing nations to guide them to the world of wireless technologies.Item Students selection for university course admission at the joint admissions board (Kenya) using trained neural networks(Journal of Information Technology Education, 2011) Wabwoba, Franklin; Mwakondo, Fullgence M.Every year, the Joint Admission Board (JAB) is tasked to determine those students who are ex-pected to join various Kenyan public universities under the government sponsorship scheme. This exercise is usually extensive because of the large number of qualified students compared to the very limited number of slots at various institutions and the shortage of funding from the govern-ment. Further, this is made complex by the fact that the selections are done against a predefined cluster subjects vis a vis the student’s preferred and applied for academic courses. Minimum re-quirements exist for each course and only students having the prescribed grades in specific sub-jects are eligible to join that course. Due to this, students are often admitted to courses they con-sider irrelevant to their career prospects and not their preferred choices. This process is tiresome, costly, and prone to bias, errors, or favour, leading to disadvantaging innocent students. This paper examines the potential use of artificial neural networks at the JAB for the process of selecting students for university courses. Based on the fact that Artificial Neural Networks (ANNs) have been tested and used in classification, the paper explains how a trained neural network can be used to perform the students’ placement effectively and efficiently. JAB will be able, therefore, to undertake the students’ placement thoroughly and be able to accomplish it with minimal wastage of time and resources respectively without having to utilise unnecessary effort. The paper outlines how the various metrics can be coded and used as input to the ANNs. Ultimately, the paper underscores the various merits that would accompany the adoption of this technique. By making use of neural networks in the university career choices, student placement at JAB will enhance the chances of students being placed into courses they prefer as part of their career choice. This is likely to motivate the students, making them work harder and leading to improved performance and improved completion rate. The ANN application may also reduce the cost spend on the application processing and the time the applicants have to wait for the outcome. The ANN application could further increase the chances of high quality applicants getting admis-sion to career courses for which they qualify.Item Information technology research in developing nations: major research methods and publication outlets(International Journal of Information and Communication Technology Research, 2011) Wabwoba, Franklin; Ikoha, Anselimo PetersThe multi-disciplinary nature of Information Technology has brought many methods of research with it. This has left many Information Technology specialists whose background is from the rigid scientific disciplines in a dilemma. The paper distinguishes Information Technology research from computer science research. It highlights where emphasis of research in Information Technology needs to be placed. There has been a general shift in Information Technology from focus being strictly technological to social, managerial and organizational in nature that have put demand on Information Technology researcher to acquire knew skills. The paper differentiates the emphasis between Information Technology research and computer science researcher. Both quantitative and qualitative approaches have become handy in this field of study. The most common research methods action research, case study, Ethnography, experimentation, Grounded theory, secondary method, and survey are discussed in this paper clearly giving the applicability. Important consideration and weakness of each method from the information technology perspective are discussed in this paper. The findings outlets for the field are also mentioned.Item Teaching computer programming in the 21st century(International Journal of Science and Technology, 2011) Mutua, Stephen; Wabwoba, Franklin; Abenga, Elizabeth; Kilwake, Juma; Ogao, PatrickOver the years, research has shown that programming has proved to be a challenging task to many. Due to this, several program visualization tools have been developed to aid in teaching programming. This study aimed at assessing the impact of using programming visualization tools in the teaching and learning of computer Programming. An overview of the tools that were used during the study is given followed by review of literature on the benefits of PV tools in teaching Programming. The study is based on Edga Dale’s (1954) Cone of Experience, which forms the foundation of resource based learning theories. Literature reveals that the use of program visualization tools in teaching and learning Programming have posted positive results in various institutions. This is followed by a report of a study conducted using experimental research design approach. The same class was taught two programming introductory courses using BlueJ and Jeliot3 tools; and the performance of the students in the two courses was compared. In addition, during the classes, the covert-direct observation method was used to observe student interactions’ and behaviors as they programmed and solved problems during the lessons. Results revealed that these tools if effectively used can improve on the alertness of students, interest in the subject and ultimately positive results.Item Trends in adoption of open source software in Africa(Journal of Emerging Trends in Computing and Information Sciences, 2012) Karume, Simon M; Mbuguah, Samuel MungaiIn the context of limited financial resources and capacities, Africa can examine how to better use the opportunities presented by the emergence of free and open source software (FOSS) to leapfrog into the information age and bridge the digital divide through reduced costs and less dependency on imported technology. This paper examines the adoption trends of open source software in Africa and seeks to establish the current global placing of the continent in adoption and use of FOSS. To get a better view of the current FOSS situation in Africa, the study explores the penetration of FOSS into Africa software market and how various Governments react to the use of FOSS. Through scrutiny of literature on adoption and use of open source software in Africa as well as previous and emerging initiatives to promote the use of open source software in the region, the paper presents preliminary findings of the trends observed. Further using the data gathered the paper attempts to forecast the future of FOSS in Africa and the probable implications on the development agenda of the continent.Item A conceptual model for a holistic predictive attack ability metric for secure service oriented architecture software(International Journal of Information and Communication Technology Research, 2012) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song', Pang Chol; Muchiri, Geoffrey MukethaSoftware based systems are ubiquitous in modern day operations. There has been an increase in software based system attacks; leading to the need to equip the project managers, software designers and software developers with a better predictive attackability model at the architectural design stage. Attackability is a concept proposed recently in research literature to measure the extent that a software system or service could be the target of a successful attack. A literature survey of existing technical models was carried out to identify gaps in them. Also, a literature survey on, human traits that lead to human beings and the software system they man being subject to social engineering attacks was undertaken. Then a conceptual model has been proposed to extend the existing technical model and incorporate a social attackability model to produce a holistic predictive attackability model.Item Integrating virtual worlds and virtual learning environments in schools in developing economies(International Journal of Information and Communication Technology Research, 2012) Omieno, Kelvin K.; Wanyembi, Gregory; Mbuguah, Samuel MungaiIn recent years there has been significant growth in the use of 3D virtual worlds for e-learning and distance education. Virtual learning environment (VLE) has achieved an adequate level of development and supports teaching and learning in an educational context, offering the functionality to manage the presentation, administration and assessment of coursework. This paper’s main philosophical claims are that virtuality is itself a bonafide mode of reality and that VLEs must be understood as a possible platform for effective and quality teaching, learning and training. The paper investigates the suitability of virtual learning in Higher Education Institutions in Africa. It also explains virtual reality principle, describes the interactive educational environment, highlights the challenges HEIs face in the traditional mode of delivery and discusses educational benefits of implementing virtual reality. A number of demonstrative examples showing how virtual world/virtual learning environments can be integrated will be shown and the potential opportunities that exist in this area discussed. The paper then proposes a model for integrating virtual world tools with the existing learning environments.Item Barriers to implementation of green ICT in Kenya(International Journal of Science and Technology, 2012) Wabwoba, Franklin; Wanyembi, Gregory W.; Omuterema, StanleyInformation and Communication Technology (ICT) is playing an increasingly important role in both business and private undertakings. Its use in several areas in the world economy has brought about increased demand for electronic equipment. The rapid pace of technology advancement and the drop in hardware prices has led to increased demand and acquisition resulting in increased production and use of hardware. However, the increased ICT uptake has increased costs and demand for energy where electricity is the main power source. Electricity notably is a major contributor to climatic change because the coal or oil that helps generate it does releases carbon dioxide, pollutants, and sulphur into the atmosphere. With environmental degradation, rising costs of doing business and power demand and demand for social responsibility, going green is no longer an option. There are green ICT technologies in the market to mitigate the concerns but unfortunately they are not bearing fruit that calls for an understanding of barriers to implementation of the same in developing nations like Kenya. The study used multiple case study approach. The study population included ICT managerial, technical and end user human resource and public university ICT graduate students. The multiple study was conducted in one leading sugar manufacturing industry, a communication commission regulatory body and one public university offering ICT from certificate to PhD level. Respondents were either interviewed or responded to a questionnaire. The study established that green ICT technologies are available in Kenya and are not barriers to its implementation. The paper highlights the barriers to implementing green ICT in Kenya. The paper recommends alignment of ICT personnel towards enhancing green ICT implementation in the light of the barriers.Item Evaluating the role of information and communication technology (ICT) support towards processes of management in institutions of higher learning(International Journal of Advanced Computer Science and Applications, 2012) Ujunju, Michael Okumu; Wanyembi, G.; Wabwoba, FranklinThe role of Information and Communication Technology in achieving organization’s strategic development goals has been an area of constant debate, and as well perceived in different management dimensions. Most universities are therefore employing it (ICT) as a tool for competitive advantage to support the accomplishment of their objectives. Universities are also known to have branches or campuses that need strong and steady strategic plans to facilitate their steady expansion and growth. Besides, production of quality services from the various levels of management in these universities requires quality strategic plans and decisions. In addition, to realize the steady growth and competitive advantage, ICT not only has to be an additive but a critical component towards supporting management processes in the universities. This research sought to determine the role of ICT in supporting management processes in institutions of higher learning in Kenya. The research investigated how the different levels of management used ICT in their management processes and whether the use had any effect on management processes. The research further made recommendations to the universities on better use of ICTs in their management processes. A public university in Kenya was used as a case study in this research.Item Classifying program visualization tools to facilitate informed choices: teaching and learning computer programming(International Journal of Computer Science and Telecommunications, 2012) Mutua, Stephen; Wabwoba, Franklin; Ogao, Patrick; Anselmo, Peter; Abenga, ElizabethProgram Visualization (PV) is a technique that has been found useful in teaching computing programming. This has seen proliferation in development of PV tools with an aim of enhancing teaching/learning programming over the last two decades. However, the tools usage has remained minimal. Perhaps because it becomes challenging to ascertain the appropriate tool for the right task. This paper presents a classification of program visualization tools with the focus of aiding teachers and students in choosing the most appropriate tool for an interesting experience in the classroom. The paper is based on six various PV tools evaluated over a period of two consecutive academic years in a Kenyan public University. The classification augments the Price’s taxonomy of software visualization arm of PV by presenting four basic levels which are further subdivided into lower levels.Item Choosing tools of pedagogy (case of program visualization)(International Journal of Application or Innovation in Engineering & Management, 2012) Mutua, Stephen; Abenga, Elizabeth; Ogao, Patrick; Wabwoba, Franklin; Ikoha, AnselmoComputer aided learning has over time been integrated in traditional pedagogical approaches in order to improve the quality of education as well as skillful content acquisition. Several programs have been developed over time to be used in the classroom with the aim of improving on the mode of instruction. Program Visualization (PV) tools are an example of such developments with the desire of improving classroom experience during teaching/learning computer programming. Despite that the tools have posted positive results in various universities, teachers seem not to have widely accepted them. This paper seeks to establish the factors that influence the choice of a PV tool for teaching computer programming. The established list of factors indicates that they range from system based issues to other features beyond the system. From the results, it emerges that most teachers are not using emerging contemporary approaches but instead are making use of the traditional approach whose impact is less felt especially for technical courses like programming. These factors form part of taxonomy of PV tools for pedagogy.Item Ict and education: enabling two rural western Kenyan schools to exploit information technology(2012) Boit, John; Menjo, David; Kimutai, JamesThe study was undertaken to evaluate the implementation of ICT to support learning, teaching, school administration and use of E-communication between cooperating rural secondary schools in Western Kenya under the Rotary project, Forssa Rotary Club of Finland District 1410. The study was conducted in two selected rural schools namely: Anin secondary school (Keiyo County) and Cheplaskei secondary school (UasinGishu County) under a Finnish project “Enabling rural Western Kenyan schools to exploit information technology” funded by the Suomen Rotaryn between May 2007-December 2009. A case study research design was adopted for this study where interviews, observation and open-ended questionnaires including document analysis were used to collect qualitative data. The respondents interviewed in each school were mainly head teachers, ICT instructors, ICT technicians, teachers (4), students (7), and Board of Governors (BOG) and Parents Teachers Association (PTA) members (2).The findings indicate that largely the initial objectives of the project had been realized. Teachers, students and the school administrators were now using computers to access educational resource material from the Internet, prepare and process examination results, manage, monitor and process financial reports, and communicate using email. There was also evidence that quality of teaching, learning and students’ level of interaction, reasoning, recall, synthesis and evaluation had improved tremendously. School discipline and student sense of self-esteem and pride had significantly been enhanced.Item Current status of e-health in Kenya and emerging global research trends 1(2012) Juma, Kilwake; Nahason, Matoke; Apollo, Waliaro; Gregory, Wanyembi; Patrick, OgaoHealthcare delivery is being transformed by advances in e-Health which is now recognized as an essential enabler for support of health systems across the world, acting not only as an agent for reforming healthcare systems, but also as an enabling tool to share resources among countries with similar challenges without having to duplicate efforts. Lack of interoperable health systems and consensus on data standards is one of the major barriers to the use of health information. Mobile phone use has seen tremendous growth across the developing world offering opportunities to engage e-Health applications. This paper looks at the status of e-Health in Kenya exploring the efforts the government has put in place to create a conducive environment for e-Health and also explores the global research trends in e-Health. The study is carried out through an examination of scientific research papers in journals and conference proceedings. Additionally, telephone interviews with the Ministries of Health, and Public Health and Sanitation is carried out to gauge the level of adoption. The study seems to reveal that though e-Health in Kenya is still in its infancy, the potential for its growth is enormous. This is fuelled by the rapid penetration of mobile phone use, an educated and entrepreneurial populace, and conducive legal, regulatory, and infrastructural environments.Item Trends in electronic money transfer in Kenya(Journal of Emerging Trends in Computing and Information Sciences, 2013) Mbuguah, Samuel Mungai; Karume, SimonThe paper looks at trends in Electronic money transfer in Kenya, based on literature survey of prior research done in this area. The Central Bank of Kenya was a key source of data because of its significance in financial transactions and regulations. Others were financial institutions, banks, Posta corporations, and telecommunication companies. Websites of particular organization such as Safaricom and Posta were visited to collect data. Information on mobile trend in USA, Europe and India was reviewed. The information so gathered was analyzed for trends. The authors infer that since 1990’s there has been an increased use of electronics money transfer in Kenya. The clearing house has been automated; the Central bank of Kenya has enforced a rule that requires banks to transfer funds over one million Kenya shilling via electronics means. All banks have automated telly machines, while telecommunication companies are involved mobile money transfer. This has resulted in a trend mobile money transfer is increasing been used.Item Experimental validation of the technical attack ability metrics model(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muchiri, Geoffrey MukethaComputer systems have become gradually and fully embedded into our daily activities. Software based systems attackers have noted these dependency, and have increased the number of attacks of such systems. Software managers and designers require a means of predicting the Attackability of system at the design state. Attackability is a concept proposed recently in literature to measure the extent that a software system or service could be the target of a successful attack. These authors have published such a conceptual model called the Holistic predictive attackability metric model for secure service oriented software. Holistic in that it comprises of a social and technical aspect. This paper is considers experimental validation of the technical metrics part of model only. The technical part uses internal software attributes; complexity cohesion and coupling (3C’s) to predict attackability an external attribute. Pilot experiments were conducted with selected objects from which relationship between Attackability and the corresponding attribute was established. A model was generated for each after carrying out Kendall Tau-b correlation, performing regression testing and curve estimation using SPSS software package. The results were then combined to generate Mean Technical attackability model metrics, which was validated through sample 12 software. Jhawk tool was used measure the 3C’s for each software. The data were to used to generate Calculated mean Technical attackability metrics. The results were tabulated against the measured mean attackability. Pearson correlation and regression testing analysis were performed. The results indicates the model and the corresponding metrics could be used in predicting the mean Technical attackability of a software system.Item Social attackability metrics for software systems(International Journal of Information and Communication Technology Research, 2013) Mbuguah, Samuel Mungai; Mwangi, Waweru; Song, Pang Chol; Muketha, Geoffrey MuchiriSoftware based system have become ubiquitous in modern day activities. Software system based system are being increasing attacked, leading to the need for software system administrators, and managers to have some metrics at predicting the social engineering attackability of a such system. Researchers have identified seven human traits/attributes that make human susceptible to social engineering attacks. Yet they did not model nor come up metrics. The author has published a conceptual a holistic predictive attackability metric model and corresponding metrics to assist the system designers. The model considers the technical metrics based on cohesion, coupling and complexity as used to predict attackability. It also consider the social metrics based on human traits that make the human operators become susceptible to social engineering attacks. The identified human traits are dishonesty, social compliance, Kindness,Time pressure, Herd mentality, greed/need and distraction. This paper considers only the social metrics part of the model.To measure human traits the authors relies on the HEXACO model and Big Five personality trait models. In these model the personality trait are measured using a ranking scale based on Lickert scale. Hence each trait is measured as a percentile. However, for purpose of this paper, to postulate the metric the author considered the discrete case. Why the value of trait take either a value of “1” or “0”. To determine the relationship between traits between and attackability experts were asked to assess the trait versus attackability from which after aggregating for all traits a social attackability metrics was determined. To determine the predictive social attackability metrics each trait was considered to be equally likely to occur and hence a probability of 1/7 and this acts as factor to transform the social attackability metric into predictive attackability metrics.Item Green ICT readiness model for developing economies: case of Kenya(International Journal of Advanced Computer Science and Applications, 2013) Wabwoba, Franklin; Omuterema, Stanley; Wanyembi, Gregory W.; Omieno, Kelvin KebatiThere has been growing concerns about the rising costs of doing business and environmental degradation world over. Green ICT has been proposed to provide solutions to the two issues yet it is not being implemented fully in developing economies like Kenya. For its implementation, it is critical to establish the level of green ICT readiness of organisations to inform where to start and where to put more emphasis. Over the past few years this has been done using Molla’s G-readiness model. However this model assumes the basic level of G-readiness to be same for both developed and developing economies to be the same with regard to ICT personnel preparedness. Based on green ICT readiness in Kenya, the relationship between ICT personnel’s gender, age and training with the G-readiness variables as proposed in Molla’s G-readiness model was investigated. The study surveyed ICT personnel in four cases using a questionnaire on a seven scale likert scale. It established that there exists a significant relationship between the ICT personnel related variables and the G-readiness variables. Based on the findings on the relationship, the study extended Molla’s G-readiness model to include a sixth dimension of personnel readiness.Item Virtual reality in education: trends and issues(International Journal of Computers & Technology, 2013) Omieno, Kelvin; Wabwoba, Franklin; Matoke, NahasonComputer-mediated learning is becoming an increasingly common form of education in institutions of higher learning (IHL). Many IHL in developing nations, such as Kenya, have greatly experienced an increase in demand for higher education. On the other hand, the ability to connect people with required sets of skills, regardless of their location in the world has been enabled by advances in information technology over the past 20 years. Use of virtual learning systems (VLS) has rapidly emerged as a very promising technology that will probably match the innovation of technologies such as multimedia/hypermedia. These VLS have the potential to provide opportunities for active, flexible, and increasingly individualized learning experiences. It also explains virtual reality principle, describes the interactive educational environment, highlights the challenges higher education face in the traditional mode of delivery and discusses educational benefits of implementing virtual learning environments in IHL. The paper makes a number of recommendations for successful adoption of VLS in higher education