Mwenge Mulenga

Mwenge Mulenga
  • Doctor of Psychology
  • Head- Department of ICT Education at National Institute of Public Administration

About

20
Publications
9,602
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
224
Citations
Introduction
I am currently working on deep learning based colorectal cancer(CRC) detection using gut microbiome in human stool.
Current institution
National Institute of Public Administration
Current position
  • Head- Department of ICT Education

Publications

Publications (20)
Article
Full-text available
The emergence of Next Generation Sequencing (NGS) technology has catalyzed a paradigm shift in clinical diagnostics and personalized medicine, enabling unprecedented access to high-throughput microbiome data. However, the inherent high dimensionality, noise, and variability of microbiome data present substantial obstacles to conventional statistica...
Chapter
Colorectal cancer (CRC) ranks second highest in global mortality among nonsex-related cancers. Conventional machine learning (ML) algorithms applied to microbiome-based CRC detection often yield suboptimal accuracy. Conversely, deep neural network (DNN)-based methods encounter limitations due to scarce labeled samples, data imbalance, and dominant...
Conference Paper
Full-text available
The demand for clean and sustainable energy has increased the popularity of photovoltaic (PV) solar panels. PV solar panels are the most effective technology for transforming the sun's rays into a valuable energy source. To maximize the amount of energy captured, the rays of light from the sun must be at a 90-degree angle to the surface of the PV p...
Conference Paper
Full-text available
Colorectal Cancer (CRC) is among the top three cancers in world. The current clincal methods for CRC detection have several limitations which range from low accuracy, discomfort and high costs. Availability of next generation sequencing (NGS) technology has opend an opportunity for non invasive detection of CRC which uses gut-microbiome abundance i...
Preprint
Full-text available
In the field of disaster crisis management, the utilization of social media platforms has gained significant recognition. It helps in disseminating and gathering information during disasters, offering real-time updates on events, infrastructure damage reports, and casualty information. However, the information comes with a substantial amount of irr...
Article
Solar tracking systems have gained attention in recent years due to their potential to increase the efficiency of various solar energy applications. Both traditional machine learning (ML) and deep learning (DL) techniques have been employed in various solar tracking systems. However, traditional ML models have limitations in processing large datase...
Preprint
Full-text available
Although photovoltaic (PV) panels are extensively used to convert solar energy into electric energy, the continuous change in the sun's angle with reference to the earth's surface limits their capacity to collect sufficient energy. To improve efficiency, solar trackers are used to constantly adjust the PV panels towards the sun to maximize energy c...
Article
Full-text available
Bring your own device (BYOD) paradigm that permits employees to come with their own mobile devices to join the organizational network is rapidly changing the organizational operation method by enhancing flexibility, productivity, and efficiency. Despite these benefits, security issues remain a concern in organizational settings. A considerable numb...
Article
Full-text available
In the above article [1] , the acknowledgment for the research grant was referencing an incorrect grant reference number.
Article
Full-text available
In the above article [1] , the acknowledgment for the research grant was referencing an incorrect grant reference number.
Article
Full-text available
Solar tracking helps maximize the efficiency of solar applications, such as photovoltaic (PV) solar panels. In the recent past, machine learning (ML) techniques have been extensively used to implement automatic solar tracking. However, applying predictive models in solar trackers is a non-trivial task due to the randomness and non-linearity of mete...
Preprint
Full-text available
Bring your own device (BYOD) paradigm that permits employees to come with their own mobile devices to join the organizational network is rapidly changing the organizational operation method by enhancing flexibility, productivity, and efficiency. Despite these benefits, security issues remain a concern in organizational settings. A considerable numb...
Article
Full-text available
Machine learning (ML)-based detection of diseases using sequence based gut microbiome data has been of great interest within the artificial intelligence in medicine (AIM) community. The approach offers a non-invasive alternative in colorectal cancer detection, where data can be obtained from stool samples. Considering limitations of existing method...
Article
Full-text available
ABSTRACT Colorectal cancer (CRC) is the third most deadly cancer worldwide. The use of gut microbiome in early detection of the disease has attracted much attention from the research community, mainly because of its noninvasive nature. Recent achievements in next generation sequencing technology have led to increased availability of sequence data a...
Article
Full-text available
Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to...
Article
Crypto-mining attacks have emerged as a new generation of web-based attacks which have seen cybercriminals eschew the infamous crypto ransomware. The watering hole attack vector has by far been the most widely employed attack methodology but it faces the task of luring the victim to the infected web resources. However, cryptojacking injection prese...
Article
Full-text available
Ransomware has emerged as a resilient type of malware to reckon with which has inadvertently forced security researchers and companies into a game of cat and mouse. The media has not helped matters even as the inaccuracies and myths surrounding ransomware continue to deepen. In this paper, we endeavor to debunk WannaCry ransomware through its netwo...
Article
The popularity of cryptocurrencies has continued to grow drastically over the past decade and this has drawn significant attention to various threat actors. Cybercriminals are now employing unconventional means to acquire cryptocurrencies at the expense of benign Internet users. This paper investigates the state-of-the-art crypto mining attacks by...
Article
Full-text available
Agile development is a software development process that advocates adaptive planning, early delivery, evolutionary development and continuous betterment and supports rapid and flexible response to change. The purpose of Agile development is minimize project failure through customer interactions and responding to change. However, Agile development i...
Article
Full-text available
The paper focuses on security and performance concerns in mobile web development. The approach used in the study involved surveying journal publications to identify security and performance concerns. The paper highlights some of the contemporary issues currently being faced by application developers as they create, update and maintain mobile web ap...

Network

Cited By