- MSc in Information Systems Management, MSU
- BSc (Hons) degree in Computer Science, BUSE.
- Cyber Security
- IT Governance
- Neural Networks
- Mobile Computing
- Mavhemwa, P., Jekanyika, A. and Magomelo, M., 2017. An Investigation into whether access to quality education can be better met with the use of e-learning, analysing rural and urban schools. A Case of Zimbabwe
- David Ndumiyana, Munyaradzi Magomelo, ‘Image Steganography Recognition using Artificial Neural Networks.’ International Journal of Research in Information Technology (IJRIT), Volume 3, Issue 6, June 2015, Pg.288-294
- Munyaradzi Magomelo, Patrick Mamboko, Theo Tsokota, “The Status of Information Security Governance within State Universities in Zimbabwe”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 5 No. 9, September 2014
- Magomelo Munyaradzi, Mavhemwa Prudence & Mukabeta Tarirayi, “Use of Facial Recognition for Data Personalization in Customer Relationship Management (CRM): Case of Great Zimbabwe Hotel.” International Journal of Engineering Trends and Technology (IJETT), Volume 14, Number 1, Aug 2014, Pg. 40 – 47
- Munyaradzi Magomelo, Hilton Chikwiriro & Clive Gurure, “An Implementation of Early Warning of Floods along Zambezi Basin Through the Use of Context-Awareness”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 8, August 2014, pg.679 – 693
- Mukabeta Tarirayi, Tunjera Nyarai, Magomelo Munyaradzi, Ndumiyana David. ‘Enhancing learning through collaboration in an online discussion forum: Students’ perceptions in a Computer Architecture Course.’ Greener Journals of Education and Training Studies. Volume 2, Issue 1, March 2014.
- Munyaradzi Magomelo, Munyaradzi Prudence Mavhemwa and David Ndumiyana. ‘Effectiveness of mobile voting as a supplementary method to ballot casting: Case of Bindura University of Science Education.’ International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Volume 2, Issue 6, November – December 2013.
- Mukabeta, T., Tunjere, N., Magomelo, M. (2013). Use of mobile phones to encourage cooperative learning in an Introduction to Computers courses at Bindura University: A critical discourse analysis perspective. International Journal of Engineering Research and Technology, 2(3).
- Mavhemwa, P.M., Muzurura, O., Magomelo, M.(2013). Implementation of mobile based social and collaborative learning in improving the level of performance of students using web 2.0 tools. A case of Bindura University of Science Education. International Journal of Engineering Research and Technology, 2(8).
- Ndumiyana, D., Magomelo, M., Sakala, L. (2013). Spam detection using a neural network classier. Journal of Physical and Environmental Research, 2(2), 28-37.
- Mavhemwa, P.M., Chaka, P., Magomelo, M.,Chikwiriro, H. (2013). Effectiveness of an integrated m-health platform for Malaria control. A case study of Bindura, Zimbabwe. International Journal of Engineering Research and Technology, 1(3).
- Chikwiriro, H., Mavhemwa, P.M., Chaka, P., Magomelo, M. (2013). Use of artificial intelligence in highly adaptive examination e-revision systems. International Journal of Engineering Research and Technology 2(3).
Teaching: Intelligent Systems, Theory of Computations, Data Communications and Networking, Mathematical Foundations of Computer Science, E-Commerce, Management of Information Systems.
Summary of major research projects
1. Area/ Focus: Neural Networks
The problem of protecting information from unauthorised and undesired use is becoming more complex since the production, storage and exchange have become an important function of most modern societies. People graduating from learning institutions, celebrating birthdays, marriages and other achievements in life are photographed and later exchange these photos with families and friends all over the globe. These photo images can be exploited to conceal the existence of embedded malicious messages between communicating parties. Image files are usually stored with the highest degree of precision thereby providing a fertile environment for steganography. In this paper, we propose a supervised machine learning technique to steganalysis for images using lossy compression formats such as JPEG/MPEG and lossless representation, among them GIF. Images used in this investigation are represented as a canvas, the available space inside the picture that can be used to hide messages. We then classify features into clean and stego-containing files before applying machine learning (ML) algorithms to distinguish clean from stego-infected files. The results obtained and reported showed that our ML algorithms are a solution to steganography in both content and compressed image formats.
2. Area/Focus: IT Governance
This research focused on the identification and evaluation of information security governance practices that are being implemented in Zimbabwean universities. The rapid technological change and the systems interconnectivity has paused new threats to the information systems that can have a significant impact on the business operations of an organization making information security governance a hot topic motivating this study to be done in order to have clear picture of the current status of information security governance in the Zimbabwean universities. The research approach adopted in this paper was a case study with one of the Zimbabwean state universities. A combination of self-administered questionnaire and semi structured interviews with the university council members, executive management and IT personnel were conducted to collect data. The findings from this research provided evidence that though the management and the university council do understand the importance of information security, they do not give adequate support to the function. The results also showed that no acceptable code of best practices is being implemented. A number of ISG practices which includes risk management, strategic alignment and resource management are being implemented. The main conclusion drawn from this study was that appropriate measures should be taken to improve implementation and
measure of ISG performance in Zimbabwean universities. This study recommended that the management and the university councils in Zimbabwe should give adequate support to information security governance function.
LIST OF EXTENSION SERVICES
STEM Club with pupils from Chipindura, and Hermann Gmeiner High Schools
Partnering E-Learning Solutions in the rolling out of the Digital Skills Passport
Participant in offering ICDL to the Bindura community