<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
<title>Journal Articles (CI)</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/57" rel="alternate"/>
<subtitle/>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/57</id>
<updated>2026-04-07T22:04:46Z</updated>
<dc:date>2026-04-07T22:04:46Z</dc:date>
<entry>
<title>Scaffold Extensions for Client Drift Mitigation in Federated Learning: A Synthesis of Approaches, Limitations, and Future Directions</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6911" rel="alternate"/>
<author>
<name>Muthii, James Mburu</name>
</author>
<author>
<name>Wanjau, Stephen K.</name>
</author>
<author>
<name>Njenga, Stephen</name>
</author>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6911</id>
<updated>2026-04-01T08:38:07Z</updated>
<published>2026-01-01T00:00:00Z</published>
<summary type="text">Scaffold Extensions for Client Drift Mitigation in Federated Learning: A Synthesis of Approaches, Limitations, and Future Directions
Muthii, James Mburu; Wanjau, Stephen K.; Njenga, Stephen
Client drift arising from non-independent and identically distributed (non-IID) data across participating clients remains one of the most critical obstacles to effective Federated Learning. The Scaffold algorithm, which introduces control variates to correct local gradient updates, has emerged as one of the most prominent variance reduction methods for mitigating this drift. Although numerous extensions to Scaffold have been proposed, no systematic review has exclusively examined the Scaffold algorithm and the control variate mechanism for client drift mitigation, leaving the research community without a consolidated understanding of how Scaffold has been extended, what limitations persist, and which characteristics remain underexplored. This study addresses that gap through a systematic literature review guided by PRISMA 2020 guidelines. Seven electronic databases were searched for publications from 2016 to 2026, yielding 1,847 records, from which 33 studies were included after duplicate removal, screening, and full-text eligibility assessment based on criteria requiring each study to address Scaffold or control variates for client drift in FL and cover at least two performance metrics. Data were synthesized thematically using frequency counts and tabular summaries. The review reveals nine distinct extension approaches: variance reduction via gradient estimation techniques was the most prevalent (11 studies, 34%), followed by integration with advanced optimization algorithms (8 studies, 25%), together accounting for 59% of the reviewed work. Twelve Scaffold characteristics were targeted for extension, with variance reduction the most commonly modified (37%, rising to 50% with combined categories), while communication mechanism, privacy budget allocation, and similarity-based approaches remained significantly underexplored. Recurring limitations across all approaches included communication and computational overhead, hyperparameter sensitivity, restrictive theoretical assumptions, performance degradation under extreme data heterogeneity, and limited large-scale empirical validation. A notable finding is that similarity-based approaches for client drift mitigation are largely absent from the literature, with only one study employing a similarity measure. The review, therefore, recommends future investigation of similarity-based methods as adaptive control variates within the Scaffold protocol, alongside prioritization of communication-efficient, privacy-preserving designs validated at scale. This research was self-sponsored with no external funding.
</summary>
<dc:date>2026-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>System Log Parameter Attributes for Predicting Software Failures: Systematic Literature Review</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6874" rel="alternate"/>
<author>
<name>Muchori, Juliet Gathoni</name>
</author>
<author>
<name>Kamau, Gabriel Ndung’u</name>
</author>
<author>
<name>Ndung’u, Rachael</name>
</author>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6874</id>
<updated>2026-03-26T09:25:30Z</updated>
<published>2025-01-01T00:00:00Z</published>
<summary type="text">System Log Parameter Attributes for Predicting Software Failures: Systematic Literature Review
Muchori, Juliet Gathoni; Kamau, Gabriel Ndung’u; Ndung’u, Rachael
The early prediction of software failure is important in the&#13;
field of software engineering since it leads to the&#13;
development of better quality software, along with a&#13;
reduction in maintenance cost and effort. However, even&#13;
though there is growing interest in early prediction of&#13;
software failure, the existing literature shows some gaps.&#13;
While many studies are quite reliant on static code metrics&#13;
or test case execution data, they tend to miss out on vital&#13;
dynamic and contextual information which can be obtained&#13;
by analyzing software system logs. Log data is regularly&#13;
created by computing systems during their runtime and&#13;
contains rich information including event sequences,&#13;
timestamps, error messages, and system states that can&#13;
potentially being utilized in the identification of anomalies&#13;
and predictions of failures on real-time. The objective of this&#13;
work is to categorize the existing literature on the use of&#13;
system logs for predicting software, through systematic&#13;
literature review, with the help of the guidelines from&#13;
Barbara Kitchenham. The review categorizes system logs&#13;
into four primary parameters: resource/hardware logs,&#13;
workload/performance logs, network logs, and security logs.&#13;
It also highlights the machine learning models. The findings&#13;
reveal that log attributes such as CPU usage, memory&#13;
utilization, disk space, transaction processing, and network&#13;
errors are consistently identified as key predictors of&#13;
software failure. This finding aligns with expert opinions,&#13;
demonstrating strong agreement on the relevance of these&#13;
attributes for predicting software failure. This study&#13;
contributes to the growing body of knowledge on software&#13;
failure prediction, emphasizing the importance of integrating&#13;
machine learning with systematic log monitoring to enhance&#13;
proactive system failure management. Future work should&#13;
focus on developing real-time monitoring tools that leverage&#13;
machine learning models to automate failure detection and&#13;
prediction across various system components.
</summary>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Security-aware Mobile Application Development Lifecycle (sMADLC)</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6873" rel="alternate"/>
<author>
<name>Wambua, Anthony Wambua</name>
</author>
<author>
<name>Kamau, Gabriel Ndung’u</name>
</author>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6873</id>
<updated>2026-03-26T09:18:35Z</updated>
<published>2023-01-01T00:00:00Z</published>
<summary type="text">Security-aware Mobile Application Development Lifecycle (sMADLC)
Wambua, Anthony Wambua; Kamau, Gabriel Ndung’u
With the high mobile phone penetration and subsequent significant usage of mobile phone applications,&#13;
mobile users have become prime targets of hackers. Secure Software Development (SSD) advocates incorporating&#13;
security aspects at the initial stages of software development. This study proposes a novel Mobile Application&#13;
Development Lifecycle by reviewing SSD concepts and incorporating these concepts into MADLC- a mobile-focused&#13;
software development lifecycle to create a security-aware Mobile Application Development Lifecycle (sMADLC). The&#13;
proposed development lifecycle, sMADLC, can potentially help mobile application developers create secure software&#13;
that can withstand hacker aggression and assure mobile application users of the confidentiality, integrity and availability&#13;
of their data and systems.
</summary>
<dc:date>2023-01-01T00:00:00Z</dc:date>
</entry>
<entry>
<title>Lightweight Proof-of-Stake Models for PrivacyPreserving Telemedicine Systems: A Systematic Review</title>
<link href="http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6872" rel="alternate"/>
<author>
<name>Walumbe, Denis Wapukha</name>
</author>
<author>
<name>Kamau, Gabriel Ndung’u</name>
</author>
<author>
<name>Njuki, Jane Wanjiru</name>
</author>
<id>http://repository.mut.ac.ke:8080/xmlui/handle/123456789/6872</id>
<updated>2026-03-26T09:13:59Z</updated>
<published>2025-01-01T00:00:00Z</published>
<summary type="text">Lightweight Proof-of-Stake Models for PrivacyPreserving Telemedicine Systems: A Systematic Review
Walumbe, Denis Wapukha; Kamau, Gabriel Ndung’u; Njuki, Jane Wanjiru
Proof of Stake (PoS) models are energy-efficient and&#13;
require limited computational power. These features are critical in&#13;
telemedicine environments, where resource-constrained devices&#13;
must handle sensitive data securely. The growing need for&#13;
auditable and privacy-preserving data storage in telemedicine&#13;
underscores the importance of PoS models optimized for&#13;
lightweight devices while complying with strict regulatory&#13;
requirements, such as the Health Insurance Portability and&#13;
Accountability Act (HIPAA).This study was guided by two&#13;
research questions: (i) Which PoS models are lightweight and&#13;
suitable for telemedicine? and (ii) What features make lightweight&#13;
PoS models effective for privacy and efficiency in telemedicine? To&#13;
address these questions, a systematic literature review (SLR)&#13;
guided by the PICOC framework was conducted to investigate&#13;
lightweight PoS models that can enhance privacy in telemedicine&#13;
systems. Out of 2,394 papers studies screened, 55 were included in&#13;
the analysis. The findings identified Algorand, Ouroboros Praos,&#13;
Tendermint, Nxt, and Casper CBC as promising candidates. Key&#13;
enabling features included lightweight voting mechanisms, such as&#13;
Byzantine Agreement protocols and Verifiable Random Functions,&#13;
as well as cryptographic techniques like symmetric encryption and&#13;
multiparty computation. Performance metrics evaluated included&#13;
latency, throughput, energy efficiency, and battery consumption,&#13;
with Grey Relational Analysis ranking Algorand highest due to its&#13;
low latency, high throughput, and minimal energy consumption
</summary>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</entry>
</feed>
