Feature selection for classification using principal component analysis and information gain EO Omuya, GO Okeyo, MW Kimwele Expert Systems with Applications 174, 114765, 2021 | 200 | 2021 |
Techniques for smart traffic control: An in-depth R Hawi, G Okeyo, M Kimwele International Journal of Computer Applications Technology and Research 4 (7 …, 2015 | 52 | 2015 |
A survey and comparative study of filter and wrapper feature selection techniques WC Mlambo, WK Cheruiyot, MW Kimwele Int. J. Eng. Sci 5 (8), 57-67, 2016 | 35 | 2016 |
A simple review of biometric template protection schemes used in preventing adversary attacks on biometric fingerprint templates J Mwema, M Kimwele, S Kimani International Journal of Computer Trends and Technology 20 (1), 12-18, 2015 | 35 | 2015 |
Certificateless pairing-free authentication scheme for wireless body area network in healthcare management system P Kasyoka, M Kimwele, S Mbandu Angolo Journal of medical engineering & technology 44 (1), 12-19, 2020 | 34 | 2020 |
Smart traffic light control using fuzzy logic and wireless sensor network R Hawi, G Okeyo, M Kimwele 2017 Computing Conference, 450-460, 2017 | 31 | 2017 |
Adoption of information technology security policies: Case study of Kenyan small and medium enterprises (SMEs) M Kimwele, W Mwangi, S Kimani Journal of Theoretical and Applied Information Technology, 2017 | 29 | 2017 |
Identifying threats associated with man-in-the middle attacks during communications between a mobile device and the back end server in mobile banking applications A Luvanda, S Kimani, M Kimwele IOSR Journal of Computer Engineering (IOSR-JCI) 12 (2), 35-42, 2014 | 22 | 2014 |
Information technology (IT) security framework for Kenyan small and medium enterprises (SMEs) M Kimwele, W Mwangi, S Kimani International Journal of Computer Science and Security (IJCSS) 5 (1), 39, 2011 | 17 | 2011 |
Factors affecting the adoption of mhealth in maternal health care in nakuru provincial general hospital S Munyua, G Rotich, M Kimwele Int J Sci Technol Res 4 (11), 1-14, 2015 | 16 | 2015 |
Sentiment analysis on social media tweets using dimensionality reduction and natural language processing EO Omuya, G Okeyo, M Kimwele Engineering Reports 5 (3), e12579, 2023 | 14 | 2023 |
Cryptanalysis of a pairing-free certificateless signcryption scheme P Kasyoka, M Kimwele, SM Angolo Ict Express 7 (2), 200-204, 2021 | 14 | 2021 |
The use of social networking sites for learning in institutions of higher learning MG Nkatha, M Kimwele, G Okeyo International Journal of Scientific and Technology Research 4 (12), 51-56, 2015 | 14 | 2015 |
Towards an efficient certificateless access control scheme for wireless body area networks P Kasyoka, M Kimwele, SM Angolo Wireless Personal Communications 115 (2), 1257-1275, 2020 | 12 | 2020 |
A location-based privacy-preserving m-learning model to enhance distance education in Kenya PB Obiria, MW Kimwele Journal of Computers in Education 4, 147-169, 2017 | 12 | 2017 |
Using particle swarm optimization (PSO) algorithm to protect vehicular ad hoc networks (VANETS) from denial of service (DOS) attack SM Nyabuga, W Cheruiyot, M Kimwele International Journal of Advanced Research in Computer Engineering …, 2016 | 11 | 2016 |
Strengths of a colored graphical password Scheme M Kimwele, W Mwangi, S Kimani International Journal of Reviews in Computing 2010, 2009 | 11 | 2009 |
Multi‐user broadcast authentication scheme for wireless sensor network based on elliptic curve cryptography P Kasyoka, M Kimwele, SM Angolo Engineering Reports 2 (7), e12176, 2020 | 10 | 2020 |
Influence of ICT on knowledge sharing in state corporations in Kenya: A case of the Kenya National Library Service PM Nguyo, MW Kimwele, W Guyo International academic journal of information systems and technology 1 (4), 1-21, 2015 | 10 | 2015 |
A study of approaches and measures aimed at securing biometric fingerprint templates in verification and identification systems J Mwema, S Kimani, M Kimwele International Journal of Computer Applications Technology and Research 4 (2 …, 2015 | 10 | 2015 |