• Home
  • Geoffrey Muketha
Geoffrey Muketha

Geoffrey Muketha
Murang'a University of Technology · Computer Science

Professor

About

47
Publications
15,534
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
288
Citations
Introduction
My current research focus is on developing software metrics and tools that can be used for analyzing and therefore controlling the complexity and quality of Web-based software.
Additional affiliations
January 2013 - July 2015
Meru University of Science and Technology
Position
  • Head of Faculty
June 2005 - December 2012
Masinde Muliro University of Science and Technology
Position
  • Lecturer
Education
December 2006 - November 2011
Universiti Putra Malaysia
Field of study
  • Software Engineering
July 2002 - April 2004
Periyar University
Field of study
  • Computer Science
October 1990 - December 1995
Moi University
Field of study
  • Information Science

Publications

Publications (47)
Article
Full-text available
Existing software complexity metrics do not adequately address the unique architectural patterns of Laravel. This research, therefore, solves this problem by proposing a suite of novel complexity metrics for Laravel software. The metric definition employs the Entity-Attribute-Metric-Tooling (EAMT) model. These proposed metrics are designed to asses...
Article
An alert correlation is a high-level alert evaluation technique for managing large volumes of irrelevant and redundant intrusion alerts raised by Intrusion Detection Systems (IDSs).Recent trends show that pure intrusion detection no longer can satisfy the security needs of organizations. One problem with existing alert correlation techniques is tha...
Article
Effective use of sensor nodes’ batteries in wireless sensor networks is critical since the batteries are difficult to recharge or replace. This is closely connected to the networks’ lifespan since once the battery is used up, the node is no longer useful. The entire network will not function if 60 to 80% of the nodes in it have completely depleted...
Article
Full-text available
In software engineering, software complexity measures how complicated it is to design, test, maintain, and comprehend a system or a program. Metrics have been appreciated over time as a measure of various attributes of software products. Some of the most well-known languages for scientific, object-oriented, and imperative programming are Python, Ja...
Chapter
Diabetic retinopathy is one of the most frightening complications of diabetes mellitus affecting the working-age population worldwide leading to irreversible blindness if left untreated. A major challenge is early detection, which is very important for treatment success. Presently, detecting diabetic retinopathy is a time-, effort-, and cost-consum...
Article
Full-text available
Modern organizations are adopting new ways of measuring their level of security for compliance and justification of security investments. The highly interconnected environment has seen organizations generate lots of personal information and sensitive organizational data. Easiness in automation provided by open-source enterprise resource planning (E...
Article
Full-text available
The extension of the sensor node's life span is an essential requirement in a Wireless Sensor Network. Cluster head selection algorithms undertake the task of cluster head election and rotation among nodes, and this has significant effects on the network's energy consumption. The objective of this paper is to analyze existing cluster head selection...
Article
Model-Driven Development and the Model-Driven Architecture paradigm have in the recent past been emphasizing on the importance of good models. In the Object-Oriented paradigm one of the key artefacts are the Statechart diagrams. Statechart diagrams have inherent complexity which keeps increasing every time the diagrams are modified, and this comple...
Article
Full-text available
Open-source enterprise resource planning (ERP) software has become a preferred alternative for modern organizations due to its affordable cost, availability and ease of access. Open-source software allows access to customizable code which in most instances may have security loop holes due to the nature of its releases. The study is motivated by nee...
Article
Full-text available
Mobile Ad-hoc networks (MANETs) are unique type of wireless networks that are infrastructureless and with no centralised management. Nodes in MANETs act as both routers and hosts. The nodes are free to join and leave the network. Routes are established by use of special routing protocols. Mobility of nodes makes the network topology constantly dyna...
Article
Full-text available
MANETs Communication relies on special routing protocols that make security a challenging endeavor. MANETs are open to a range of active and passive attacks; black hole attack is an active attack affects the network layer. Cooperative black hole attack is a form of denial of service attack comprised of more than one black hole nodes that collaborat...
Article
Full-text available
The advent of mobile technology led to the emergence of Mobile Ad-hoc networks (MANETs). These networks have no infrastructure and central authority. Nodes in MANETs act as both routers and hosts. MANET nodes join and leave the network at will making the network topology dynamic. MANETs are prone to both passive and active security attacks. Blackho...
Article
Full-text available
With cloud computing (CC) becoming popular in recent years, variety of institutions, organizations, businesses and individual users are creating interest. They are adopting the technology in order to take advantage of shared web applications, low infrastructure cost, utility and distributed computing, cluster computing as well as reliable IT archit...
Article
Full-text available
Abstract: Software reusability facilitates the engineering of new software or systems functionalities without having to start coding from scratch. This software quality provides numerous merits to the software developers including coming up with larger systems within a short time, with reduced development cost and reduced developer effort. However,...
Article
: Software reusability facilitates the engineering of new software or systems functionalities without having to start coding from scratch. This software quality provides numerous merits to the software developers including coming up with larger systems within a short time, with reduced development cost and reduced developer effort. However, softwar...
Article
Full-text available
Enormous development has been experiences in the field of text and image extraction and classification. This is due to large amount of image data that is generated as a result of document sharing for collaborative software development and electronic storage of design documents. One of the recent technique for analyzing large dataset and discover un...
Article
Full-text available
With the rapid development of mobile technology and subsequent mass adoption of mobile devices, mobile crowdsensing (MCS) has gained a lot of research attention. In MCS systems, trust is a key focus in the overall improvement in the participant uptake of the sensing tasks. The trust-based scheme of MCS is studied to predict the damage level, the sc...
Chapter
Even though most organizations are using enterprise resource planning applications, very few people understand the underlying interoperability nature within them. Interoperability is the ability of systems to provide services to and accept services from other systems, and to use the services exchanged so as to operate together in a more effective m...
Book
Enterprise resource planning (ERP) is a class of integrated software that uses software technologies to implement real-time management of business processes in an organization. ERPs normally cut across organizations, making them large and complex. Software researchers have for many years established that complexity affects software quality negative...
Article
Full-text available
The burden of preeclampsia has been a major concern worldwide both in developed and developing countries, making its prevention and management a major concern. Although motherhood is a fulfilling experience in society, it is connected to ill-health in some women, leading to maternal morbidity and mortality. The United Nations' Sustainable Developme...
Article
Full-text available
__________________________________________________________________________________________ Abstract Blood pressure is one of the measurements that is taken during antenatal care visits. Though motherhood is a fulfilling experience in society, it is connected to ill-health and even death in some women leading to maternal morbidity and mortality due...
Article
Full-text available
Healthcare business processes are complex due to the many decisions and procedures captured, are highly dynamic, increasingly multidisciplinary and ad hoc which makes it difficult to achieve any meaningful improvement through control flow improvement. This study aims at developing and validating a method for healthcare business process improvement...
Article
Full-text available
In the recent years, data mining has been utilized in education settings for extracting and manipulating data, and for establishing patterns in order to produce useful information for decision making. There is a growing need for higher education institutions to be more informed and knowledgeable about their students, and for them to understand some...
Article
Full-text available
Electronic government (e-government) provides a common infrastructure and direction across the public sector. It enhances collaboration within and among public sector organizations between Government and the business community, and between government and their citizens. Successful e-government depends on how well the targeted users (citizens) make...
Article
Full-text available
There is a general consensus that governments, businesses and all individuals need to harness the power of Information and Communication Technology (ICT) and ICT enabled services for wider access and improved welfare standards. The requirements of MFI clients in regard to electronic banking (e- banking) have received limited attention in the review...
Article
Full-text available
The growing threat on the environment driven by an accelerated growth in economic activities has amplified the role of government in enhancing sustainability. To business and the industry leaders, the global economic challenges have compelled them to reconsider how they do business to gain an economic advantage and as a drive towards enabling a soc...
Article
Full-text available
In the last five years, research on the role of IT in managing the environment has been accelerated by Information Technology (IT) practitioners such as Google, IBM and Microsoft as well as by the academic community. Research in this field seems to have been narrowed down in two areas; Green Information Technology (Green IT) and Green Information S...
Chapter
While the hospitality industry in the Kenyan Coast has adopted Information and Communication Technology (ICT), application of the same is limited to internal operations and control. The industry’s e-business adoption lags behind similar industries such as tours and travel. Earlier research in e-business adoption does not suggest intervention for im...
Article
Full-text available
Statistics from Immigration Department of Malaysia has shown that the foreign workers have increased tremendously over the past 4 years. Different nationalities of foreign maids usually speak in their own mother languages from their home countries. A certain level of communication barrier between the Malaysia's employers and the foreign workers wer...
Article
While the hospitality industry in the Kenyan Coast has adopted Information and Communication Technology (ICT), application of the same is limited to internal operations and control. The industry's e-business adoption lags behind similar industries such as tours and travel. Earlier research in e-business adoptiondoes not suggest intervention for imp...
Conference Paper
Full-text available
A component-based development (CBD) is an integration centric system focuses on assembling individual components in order to build a software system. It has been widely reported that software structural has strong impacts on many software quality attributes such as maintainability, testability, reliability and usability. Due to a component's intern...
Article
Web service systems grow larger with age whenever organizations add new services to existing systems. As is the case with other types of software, very large Web service systems are difficult to understand and maintain and are therefore undesirable. A couple of measures have been proposed in literature that can be used to analyze the size attribute...
Article
Full-text available
In this study, seven metrics are proposed for measuring the complexity of Executable Business Processes (EBP). The metrics are either derived from existing business process metrics or adapted from software metrics. Evaluation was carried out in three case studies with the goal of finding out if the metrics are theoretically sound and at the same ti...
Article
Full-text available
Business processes have an inherent complexity which if not controlled can keep on increasing with time, thus making the processes error-prone, difficult to understand and maintain. In the last few years, several researchers have proposed a number of metrics which can be used to measure and therefore control the complexity of business processes. In...
Article
Full-text available
Summary Business Process Models (BPMs), often created using a modeling language such as UML activity diagrams, Event- Driven Process Chains Markup Language (EPML) and Yet Another Workflow Language (YAWL), serve as a base for communication between the stakeholders in the software development process. In order to fulfill this purpose, they should be...

Network

Cited By