Browsing by Author "Wambua, Anthony"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
Item Adopting Course Completion Tracking and Conditional Activities to Enhance Engagement in eLearning for University Students(IST-Africa Institute and IIMC, 2021-05) Wambua, Anthony; Maake, BenardStudent engagement is an overarching problem in the learning context that instructors continue to grapple with. Several attempts that utilize features within the Learning Management Systems (LMSs) have been made to increase student engagement and motivation for online courses. This paper presents the findings of the adoption of completion tracking and conditional activities to enhance engagement in Moodle, a leading LMS. To investigate the effectiveness and the potential of completion tracking and conditional activities in enhancing engagement, data was collected from 90 students across four courses, further Moodle logs were examined. The research findings indicate completion tracking and conditional activities significantly increase learner engagement in online classes. These findings have significant implications on instructors conducting online classes and the development of student engagement for online courses. The present research fulfills the need to study how completion tracking and conditional activities features can be used to enhance learner engagement in Moodle LMS.Item A Comparative Analysis of Bat and Genetic Algorithms for Test Case Prioritization in Regression Testing(I.J. Intelligent Systems and Applications, 2023-02) Wambua, Anthony; Wambugu, Geoffrey MarigaRegression testing is carried out to ensure that software modifications do not introduce new potential bugs to the existing software. Existing test cases are applied in the testing, such test cases can run into thousands, and there is not much time to execute all of them. Test Case Prioritization (TCP) is a technique to order test cases so that the test cases potentially revealing more faults are performed first. With TCP being deemed an optimization problem, several metaheuristic nature-inspired algorithms such as Bat, Genetic, Ant colony, and Firefly algorithms have been proposed for TCP. These algorithms have been compared theoretically or based on a single metric. This study employed an experimental design to offer an in-depth comparison of bat and genetic algorithms for TCP. Unprioritized test cases and a brute-force approach were used for comparison. Average Percentage Fault Detection (APFD)- a popular metric, execution time and memory usage were used to evaluate the algorithms’ performance. The study underscored the importance of test case prioritization and established the superiority of the Genetic algorithm over the bat algorithm for TCP in APFD. No stark differences were recorded regarding memory usage and execution time for the two algorithms. Both algorithms seemed to scale well with the growth of test cases.Item The Role of Educational Technology and Elearning During Covid-19 Pandemic and its Impact on the Higher Education Sector in Kenya(Lexington Books, MD, 2022) Ayiro, Laban Peter; Munyao, Martin; Wambua, AnthonyOnline Learning, Instruction, and Research in Post-Pandemic Higher Education in Africa, edited by Martin Munyao, argues that beyond survival, universities need to adapt to technology-mediated communication learning in order to thrive. Disruptive technologies have recently proved to be means of thriving for institutions of higher learning. This book reflects on how leveraging on education technology has transformed teaching, learning, and research Higher Education Institutions (HEI) impacting Africa through digital transformation. In particular, HEIs are collaborating more now than ever before. Finally, this book addresses the challenges of teaching STEM programs online in Africa.Item Role of Mobile Applications in Mitigating Challenges Faced by Informal Saving Groups(IST-Africa 2020 Conference Proceedings, 2020) Wambua, Anthony; Wamuyu, Patrick KanyiExisting literature shows that even though governments in developing countries have continued in their efforts with reforms and other actions to expand financial access and inclusion among citizens, a segment of the population remains excluded. This comprises of low income and middle-class people who end up relying on informal saving groups for their financial needs. Despite their prevalence and importance, the informal saving groups such as Rotating Saving and Credit Associations (ROSCAs) and Accumulating Savings and Credit Association (ASCAs) continue to face a myriad of challenges with many of them collapsing. The aim of this study is to explore the usage of mobile apps to overcome the challenges faced by the ROSCAs and ASCAs. Agile software methodology was used to develop a robust mobile application for use by informal saving groups. Adoption of mobile apps technologies is important to the informal financial sector and the formal financial sector that is linked to these informal saving groups such as banks and microfinance institutions. The study reveals that the use of mobile apps was a plausible solution to the challenges experienced by the members of the informal savings groups while handling monetary transactions.Item Security-aware Mobile Application Development Lifecycle (sMADLC)(I. J. Education and Management Engineering, 2023-04) Wambua, Anthony; Kamau, Gabriel Ndung’uWith the high mobile phone penetration and subsequent significant usage of mobile phone applications, mobile users have become prime targets of hackers. Secure Software Development (SSD) advocates incorporating security aspects at the initial stages of software development. This study proposes a novel Mobile Application Development Lifecycle by reviewing SSD concepts and incorporating these concepts into MADLC- a mobile-focused software development lifecycle to create a security-aware Mobile Application Development Lifecycle (sMADLC). The proposed development lifecycle, sMADLC, can potentially help mobile application developers create secure software that can withstand hacker aggression and assure mobile application users of the confidentiality, integrity and availability of their data and systems.