Mr. Munyaradzi Magomelo

  • MSc in Information Systems Management, MSU
  • BSc (Hons) degree in Computer Science, BUSE.
Research Interest:
  • Cyber Security
  • IT Governance
  • Neural Networks
  • Mobile Computing
  1. Mavhemwa, P., Jekanyika, A. and Magomelo, M., 2017. An Investigation into whether access to quality education can be better met with the use of e-learning, analysing rural and urban schools. A Case of Zimbabwe
  2. David Ndumiyana, Munyaradzi Magomelo, ‘Image Steganography Recognition using Artificial Neural Networks.’ International Journal of Research in Information Technology (IJRIT), Volume 3, Issue 6, June 2015, Pg.288-294
  3. Munyaradzi Magomelo, Patrick Mamboko, Theo Tsokota, “The Status of Information Security Governance within State Universities in Zimbabwe”, Journal of Emerging Trends in Computing and Information Sciences, Vol. 5 No. 9, September 2014
  4. Magomelo Munyaradzi, Mavhemwa Prudence & Mukabeta Tarirayi, “Use of Facial Recognition for Data Personalization in Customer Relationship Management (CRM): Case of Great Zimbabwe Hotel.” International Journal of Engineering Trends and Technology (IJETT), Volume 14, Number 1, Aug  2014, Pg. 40 – 47
  5. Munyaradzi Magomelo, Hilton Chikwiriro & Clive Gurure, “An Implementation of Early Warning of Floods along Zambezi Basin Through the Use of Context-Awareness”, International Journal of Computer Science and Mobile Computing, Vol. 3, Issue. 8, August 2014, pg.679 – 693
  6. Mukabeta Tarirayi, Tunjera Nyarai, Magomelo Munyaradzi, Ndumiyana David. ‘Enhancing learning through collaboration in an online discussion forum: Students’ perceptions in a Computer Architecture Course.’ Greener Journals of Education and Training Studies. Volume 2, Issue 1, March 2014.
  7. Munyaradzi Magomelo, Munyaradzi Prudence Mavhemwa and David Ndumiyana. ‘Effectiveness of mobile voting as a supplementary method to ballot casting: Case of Bindura University of Science Education.’ International Journal of Emerging Trends & Technology in Computer Science (IJETTCS). Volume 2, Issue 6, November – December 2013.
  8. Mukabeta, T., Tunjere, N., Magomelo, M. (2013). Use of mobile phones to encourage cooperative learning in an Introduction to Computers courses at Bindura University: A critical discourse analysis perspective. International Journal of Engineering Research and Technology, 2(3).
  9. Mavhemwa, P.M., Muzurura, O., Magomelo, M.(2013). Implementation of mobile based social and collaborative learning in improving the level of performance of students using web 2.0 tools. A case of Bindura University of Science Education. International Journal of Engineering Research and Technology, 2(8).
  10. Ndumiyana, D., Magomelo, M., Sakala, L. (2013). Spam detection using a neural network classier. Journal of Physical and Environmental Research, 2(2), 28-37.
  11. Mavhemwa, P.M., Chaka, P., Magomelo, M.,Chikwiriro, H. (2013). Effectiveness of an integrated m-health platform for Malaria control. A case study of Bindura, Zimbabwe. International Journal of Engineering Research and Technology, 1(3).
  12. Chikwiriro, H., Mavhemwa, P.M., Chaka, P., Magomelo, M. (2013). Use of artificial intelligence in highly adaptive examination e-revision systems. International Journal of Engineering Research and Technology 2(3).

Teaching: Intelligent Systems, Theory of Computations, Data Communications and Networking, Mathematical Foundations of Computer Science, E-Commerce, Management of Information Systems.

Summary of major research projects

1. Area/ Focus: Neural Networks
The problem of protecting information from unauthorised and undesired use is becoming more complex since the  production,  storage  and  exchange  have  become  an important  function  of  most  modern  societies.  People graduating  from  learning  institutions,  celebrating  birthdays,  marriages  and  other  achievements  in  life are photographed and later exchange these photos with families and friends all over the globe. These photo images can  be  exploited  to  conceal  the  existence  of  embedded  malicious  messages  between  communicating  parties. Image files are usually stored with the highest degree of precision thereby providing a fertile environment for steganography. In  this  paper,  we  propose  a  supervised  machine  learning  technique  to  steganalysis  for  images  using  lossy compression formats such as JPEG/MPEG and lossless  representation, among them GIF. Images used in this investigation  are  represented  as  a  canvas,  the  available  space  inside  the  picture  that  can  be  used  to  hide messages.  We  then  classify  features  into  clean  and  stego-containing  files  before  applying  machine  learning (ML) algorithms to distinguish clean from stego-infected files. The results obtained and reported showed that our ML algorithms are a solution to steganography in both content and compressed image formats.

2. Area/Focus: IT Governance
This  research  focused  on  the  identification  and  evaluation  of  information  security  governance  practices  that  are  being implemented in  Zimbabwean universities. The rapid technological change and the  systems interconnectivity has paused new threats to the information systems that can have a significant impact on the business operations of  an organization making information security governance a hot topic motivating this study to be done in order to have clear picture of the current status of information security governance in the Zimbabwean universities. The research approach adopted in this paper was  a  case  study  with  one  of  the  Zimbabwean  state  universities.  A  combination  of  self-administered questionnaire  and  semi  structured interviews  with  the  university  council  members,  executive  management  and  IT personnel were conducted to collect data. The findings from this research provided evidence that though the management and the university council do understand the importance of information security, they do not give adequate support to the function.  The  results  also  showed  that  no  acceptable  code  of  best  practices  is  being  implemented.  A  number  of  ISG practices  which  includes  risk  management,  strategic  alignment  and  resource  management  are  being  implemented.  The main  conclusion  drawn  from  this  study  was  that  appropriate  measures  should  be  taken  to  improve  implementation  and
measure  of  ISG  performance  in  Zimbabwean  universities.  This  study  recommended  that  the  management  and  the university councils in Zimbabwe should give adequate support to information security governance function.


STEM Club with pupils from Chipindura, and Hermann Gmeiner High Schools
Partnering E-Learning Solutions in the rolling out of the Digital Skills Passport
Participant in offering ICDL to the Bindura community