Papers by Andrew M. Kahonge

African Journal of Education,Science and Technology, Mar 20, 2020
Clustering is a data mining problem of dividing documents into groups, such that documents in one... more Clustering is a data mining problem of dividing documents into groups, such that documents in one group are more similar than those in other groups. The aim of this study is to propose a framework for comparing the accuracy of clustering algorithms. The study applies qualitative research through document analysis to review previous clustering algorithms' comparisons so as to obtain the issues/problems with such previous comparisons. We then deduce appropriate comparisons framework that addresses the problems. The study obtained the following comparison issues: Nature of comparison, nature of data, size of data, source of data, evaluation metrics, and parameter settings. Consequently, the study proposed the rules, formulae, and procedures needed to be used in a comparison. It is recommended that applying this framework will ensure that such evaluations and comparisons are done using formal procedures that will yield dependable results. This study suggests a further study to be done to apply this framework and do a comprehensive comparison of some clustering algorithms.
simulation runs results showed that the adaptive algorithms can strongly reduce average waiting t... more simulation runs results showed that the adaptive algorithms can strongly reduce average waiting times of cars compared to the conventional traffic controllers.

With increase in amount of information being stored in remote locations, there is a need to have ... more With increase in amount of information being stored in remote locations, there is a need to have an efficient method that facilitates information retrieval. Most information retrieval operations use client server architecture which ends up taking much of bandwidth. Client server architecture moves data during operation and this takes too much bandwidth. This paper discusses mobile agents which present an ideal method that can be used in information retrieval due their ability to move the code instead of data and this property makes them suitable in saving bandwidth. Mobile agent is a technology generating a lot of interest due to its benefits in areas such as ecommerce, information retrieval. Mobile agent is a program that acts on behalf of the user and it is capable of moving from one location to another and performs action. The experiment was carried out to compare the performance of mobile agents and client server method in which it was found that mobile agents formed better that...

All migration projects require careful planning and good methodology to ensure proper execution. ... more All migration projects require careful planning and good methodology to ensure proper execution. Migrating enterprise data to cloud is a difficult task. Efforts to standardize cloud data migration has been going on and several frameworks have been proposed; most of them are technology-dependent and vendor-dependent frameworks. In an attempt to tackle this problem a technology-vendor-independent database migration is presented. It is achieved by adapting and revising several migration methodologies. To realize the framework, dummy MySQL database and a web-based data migration tool was used to migrate data to Google public cloud. It emerges that the framework is worth pursuing, because ensures most critical aspects of cloud migration are put into consideration. The framework will be of significant contribution to cloud data migration maturity and standardization and will help educational establishments in migrating their database to cloud because all security aspects are put into cons...
International Journal of Computer Applications, 2018
Electronic banking is replacing traditional banking due to technological innovations. In Kenya, S... more Electronic banking is replacing traditional banking due to technological innovations. In Kenya, SACCOs have not adopted technology at a high rate as compared to commercial banks, leading to a technological lag. The study aimed to establish how technology, organization and environment affect technology adoption in SACCOs.
International Journal of Computer Applications, 2015
Mobile agents are increasingly becoming popular in the development of current distributed applica... more Mobile agents are increasingly becoming popular in the development of current distributed applications. However, the mobility and autonomy factors of mobile agents present a host of security challenges in a distributed environment. In an attempt to ensure security of the mobile agent against a malicious host, a security framework is proposed. Our security mechanism uses a multi-faceted approach to protect mobile agents and must be incorporated from the design stage of agent systems. We identify major security threats against mobile agents by a malicious platform and propose algorithms to counter them. We then test a multi-agent system that incorporates these algorithms against one that doesn't and compare the results.
International Journal of Computer Applications Technology and Research, 2015
Being out of touch with a loved one is concerning and not hearing from someone you care about is ... more Being out of touch with a loved one is concerning and not hearing from someone you care about is terrifying. Several cases of missing people have been reported for many years, where most of the searches turn out unsuccessful. In order to quickly reunite families and friends with their missing loved ones, a solution for effectively searching for the missing people is presented. In evaluation of this solution, an F1 score test was simulated using 20 scenarios, out of which an impressive score of 0.72 was attained. The study concludes that we need to leverage on mobile based technology to device a more efficient method of finding missing persons more easily and quickly.

International Journal of Computer Applications, 2021
Based on security best practices for passwords, the credential is a confidential pin for authenti... more Based on security best practices for passwords, the credential is a confidential pin for authenticating system users. Still, there are instances where users share a common password for resources. Credentials sharing necessitates the passing of sensitive private information between individuals, thus creating a litter of sensitive data across email boxes and other forms of communication.Information security experts recommend using password management applications to mitigate security vulnerabilities resulting from the transmission of passwords from one person to another. On the contrary, there have been researched studies revealing vulnerabilities in password management applications. The main objective of the research was to develop a process model for password sharing using asymmetric cryptography. Also, part of the objectives was to build and test a prototype that facilitates the secure sharing of passwords over the internet using the redefined process model.The research was an exploratory study consisting of system development and focus group discussion. The result was a prototype that facilitated the secure sharing of passwords over the internet using asymmetric cryptography.

International Journal of Computer Applications, 2021
Digitization and changes in technological trends have necessitated the need for enterprises to st... more Digitization and changes in technological trends have necessitated the need for enterprises to start or have plans to migrate their services to cloud computing environments. Therefore, benefiting from the many advantages that come with cloud computing. When a service level agreement is made between a cloud consumer and the cloud provider, the consumer usually is left with no choice but to trust the provider will deliver their bit. They have faith but lack a way of verifying or even doing QoS monitoring on their own. To solve this problem, we propose a multi-tenancy cloud trust model that uses QoS monitoring. It focuses on Infrastructure as a Service and, as seen in the results, assists cloud consumers in evaluating cloud service providers well before they purchase services. This prevents them from leasing already congested clouds or which do not meet their specifications. Cloud providers also stand to gain. A provider that honors their SLAs will tend to be more trusted than one who does not, leading to a better reputation.
The P Vs NP Problem: A Method for Solving NP-Complete Problems by use of Graph Embodiment on a Quantum Computation Paradigm using a Relational Database Query
The relationship between the complexity class P and NP is one of the most fascinating and unresol... more The relationship between the complexity class P and NP is one of the most fascinating and unresolved question in theoretical Computer Science. The classical computational paradigm, hedged on Turing thesis may be by itself the limiting factor. To investigate this relationship, a method for solving a query problem on a relational database on the classical and the quantum computational paradigm has been developed. The method solves queries or database problems through the use of graphs. The results indicate that the solution to the P vs NP cannot be resolved under the current computation paradigms and may requires a new computation paradigm to resolve it.
E-Verification: The Missing component in E-Recruitment Systems
International Journal of Computer Applications, 2012
Organizations of all sizes are now significantly reliant upon information and communication techn... more Organizations of all sizes are now significantly reliant upon information and communication technology for the performance of their business activities. They therefore need to ensure that their systems and data are appropriately protected against security threats. Unfortunately, however, there is evidence to suggest that security practices are not strongly upheld within small and medium enterprise environments.

This paper provides a different perspective on information security management by investigating i... more This paper provides a different perspective on information security management by investigating information security policy compliance culture. The results in this paper are drawn from the thesis in which the researchers sought to address the gap by employing a mixed method in developing a theoretical model. The resulting theoretical model was then subjected to a validation process through Confirmatory Factor Analysis using JASP-analytical software. Hypotheses were derived from the emergent model that formed the basis of developing the questionnaire instrument. This paper, therefore, presents the results of the validation process and synthesizes the final theoretical model constructs that explain information security policy compliance culture. The results validated the theoretical model with factor loading all above (0.5) thresholds and significance of (p < 0.001). The resulting model showed that information security managers should consider organizational, behavioral, and extern...
As more services become web based and open to a larger audience, security is become a key concern... more As more services become web based and open to a larger audience, security is become a key concern. We discuss the idea of auditability of a transaction in the web application environment and how current logs may not capture minimum information required to have a complete audit record. We then propose a solution to this that involves a design as well as a tool that can be integrated into an existing web application to generate supplementary logs of database activity and user profile information with a focus on auditability of transactions. Finally we talk about results of tests that we conducted of this tool on an actual web application. Keywords— Auditability, Web Security, Internet, Audit Trails, Log Management, Supplementary Logs

With rapid development and adoption of virtualization technology, security concerns have become m... more With rapid development and adoption of virtualization technology, security concerns have become more prominent. Access control is the focal point when it comes to security. Since, it determines if a user can access a system and perform the action they intend to. Containers provide an all or nothing access control mechanism. Where if a host machine user has privileged access then they can access the containers as root user, with all privileges and perform any desired action. All unprivileged users on the host machine are denied access to the container environment. This research focuses on the concept of access control in container environment. It is geared more towards Docker container environment since it is the most widely adopted containerization technology. The study also analyses existing container authorization plugins to determine how they make access decisions. Additionally, this study led to the design and development of an effective access control plugin that makes access d...

A Mobile-Phone Tele-Medicine System That Promotes Self-Management of Blood Pressure among Hypertensive Patients in Kirinyaga Sub County
The current practice adopted by hypertensive patients in managing hypertension is making frequent... more The current practice adopted by hypertensive patients in managing hypertension is making frequent visits to a health center as recommended by medical specialists. However, very few patients adhere to this practice as it is time consuming and tiresome especially if they have to travel for long distances to have their BP checked. This practice is also not practical for critically-ill patients. Consequently, most patients neglect BP check-ups and therefore focus on medication alone. This puts the patients’ at risk as uncontrolled BP can lead to fatal complications. The overall objective of this research was to design, develop and pilot-test a mobile telemedicine system that helps patients’ to self-manage their BP condition from the comfort of their homes. Participatory action research design was used in this study. Testing for performance, usability and utilityof the tele-medicine system was conducted.

Open government data publishing is considered complete when the data is machine-readable, which i... more Open government data publishing is considered complete when the data is machine-readable, which is achieved through the Linked Open Data Standards. Although most governments around the world are launching e-government systems for better service delivery, most developing countries are yet to implement the use of the semantic web in their knowledge sharing approaches and Kenyan isn't an exception. This research presents an approach that employs Resource Description Framework to generate structured data from open government data. This paper details the systematic steps followed from data selection to the development of an ontology and user interfacing modes of access using a case study of the Kenyan government open data portal. The approach makes use of ontology to structure some domain of the government data in the open data portal for easy, access and retrieval. Software evaluation metrics (precision, recall, and f-measure) for retrieval systems was employed as the evaluation approach. A set of sample queries are designed together with their expected outputs, then the queries are run and the outcomes are compared. Results of the evaluation indicate that the

Exploring the Factors That Contribute Towards Information Security Policy Compliance Culture
Information and Knowledge Management
There is over-reliance on information systems to run virtually all aspects of modern institutions... more There is over-reliance on information systems to run virtually all aspects of modern institutions. This has put more burden on information security managers to come up with more robust and efficient ways to enhance information security policy compliance. Therefore, despite existing efforts in the area of information security management, there remains a critical need for more research to be done. The existing research has also concentrated on hypothesis testing rather than a qualitative approach. So, there is an existential methodology gap that can give another alternative result that still needs to be covered. That is why we embarked on exploring the factors that influence information security compliance in organizations. The research was conducted in two universities with a diverse population. The research design was exploratory, encompassing qualitative in-depth case interviews with grounded theory as the analysis strategy. A total of 20 interviews were conducted and each analysis was done after every few batches of interviews in line with grounded theory principles. A theoretical model was generated and discussed. Implications for the research were also discussed and recommendations made. The study found individual factors, organizational factors, and external influence to be important factors in strategizing how to increase compliance with policies. The results also showed that practitioners need to factor in a combination of elements in their strategies in order to enhance compliance with information security policies. Keywords: Information Security Policy Compliance Culture, Theoretical Model, Grounded Theory, Information systems security DOI: 10.7176/IKM/10-5-05 Publication date: August 31 st 2020

Migrating University's Database to the Cloud - Framework and Validation
All migration projects require careful planning and good methodology to ensure proper execution. ... more All migration projects require careful planning and good methodology to ensure proper execution. Migrating enterprise data to cloud is a difficult task. Efforts to standardize cloud data migration has been going on and several frameworks have been proposed; most of them are technology-dependent and vendor-dependent frameworks. In an attempt to tackle this problem a technology-vendor-independent database migration is presented. It is achieved by adapting and revising several migration methodologies. To realize the framework, dummy MySQL database and a web-based data migration tool was used to migrate data to Google public cloud. It emerges that the framework is worth pursuing, because ensures most critical aspects of cloud migration are put into consideration. The framework will be of significant contribution to cloud data migration maturity and standardization and will help educational establishments in migrating their database to cloud because all security aspects are put into cons...
International Journal of Computer Applications
Smartphone ad-hoc networks have been deployed for communication where infrastructure based commun... more Smartphone ad-hoc networks have been deployed for communication where infrastructure based communications are not available (or desirable). Android OS ad-hoc networks can be employed in development of collaborative applications such as entertainment systems and mobile gaming. In addition, they facilitate ubiquitous computing in areas such as home applications where wireless sensors and actuators are embedded in consumer electronics.
Uploads
Papers by Andrew M. Kahonge