- Masters Of Science in Computer Science(Mobile Security, Cybersecurity, Research, Data Warehousing, Thessis, Operating Systems [Linux], Object-Oriented Software Engineering, Dissertation, Open-Source Intelligence, Artificial Intelligence & Machine Learning) Student @UniversityOfBotswana
- [Summa Cum Laude] Bachelor of Sciences (Hons) Computer Systems Engineering @UniversityOfSunderland
- Executive-Masters in Business Administration (MBA) @SheffieldHallamUniversity
- Road to Professorship
-
Passionate software engineering geek who loves diving deep into Software Engineering and creating impactful solutions. My journey in the world of tech has been an exciting ride filled with endless lines of code and a quest for innovation.
-
Masters Of Science in Computer Science (Artficial Intelligence & Machine Learning) Student | [Cum Laude] Bachelor of Sciences (Hons) Computer Systems Engineering | DevOps & CyberOps & SecOps | Android Developer | Machine Learning | Artificial Intelligence | AWS Certified Solutions Architect - Associate SAA-C03 | Google Developer | Server Administrator [Ubuntu & Microsoft & MacOs] | Linux [Kali & Parrot OS] | Tech-Entrepreneur | Cybersecurity | Database Administrator | UI/UX Designer | SpringBoot (ThymeLeave) | React Native | Software Consultant | Open-Source Intelligence (OSInt) | Network Security | Project Management (PRINCE 2) | Agile & Scrum Master | Bitcoin Miner
- Objective: Enhance the accuracy and efficiency of brain tumor detection using advanced convolutional neural networks (CNNs).
- Approach: Developed a CNN-based model to analyze medical imaging data, specifically MRI scans, to identify and classify brain tumors.
- Results: Achieved higher accuracy rates in detecting and categorizing various types of brain tumors, outperforming traditional detection methods.
- Impact: This research contributes to the field of medical diagnostics by providing a reliable and automated tool for early detection of brain tumors, potentially improving patient outcomes through timely intervention.
- Objective: Explore the latest trends, tools, and techniques in Android mobile development.
- Approach: Conducted an in-depth analysis of Android development frameworks, libraries, and best practices to create robust and user-friendly mobile applications.
- Results: Published guidelines and case studies on effective Android development strategies, covering areas such as UI/UX design, performance optimization, and security practices.
- Impact: This research aids developers in building high-quality Android applications, enhancing user experiences, and ensuring application security and performance.
- Objective: Strengthen cybersecurity within university communities by establishing dedicated cyber clinics.
- Approach: Designed a comprehensive cybersecurity program that includes regular security assessments, incident response training, and awareness campaigns for students and staff.
- Results: Implemented cyber clinics that provided hands-on support, resources, and training to university members, significantly reducing security incidents and enhancing overall cybersecurity awareness.
- Impact: This initiative improves the cybersecurity posture of universities by fostering a culture of security awareness and proactive risk management, protecting sensitive academic and personal data.
- Objective: Provide a holistic approach to cybersecurity by outlining strategies for both individuals and organizations.
- Approach: Analyzed various cybersecurity frameworks, threat landscapes, and defense mechanisms to develop a set of best practices and actionable strategies.
- Results: Published a comprehensive guide that includes personal cybersecurity tips, organizational security policies, and incident response plans.
- Impact: This research empowers individuals and organizations to enhance their cybersecurity defenses, mitigate risks, and respond effectively to cyber threats.
5. Critical Evaluation of Sentiment-Driven Risk Assessment Models in Security Architecture: Leveraging Sentiment Analysis Algorithms for Enhanced Cybersecurity
- Objective: Evaluate the effectiveness of sentiment-driven risk assessment models in enhancing cybersecurity.
- Approach: Developed and tested sentiment analysis algorithms to assess risks based on sentiment data from various sources, including social media and threat reports.
- Results: Demonstrated that sentiment-driven models can provide valuable insights into potential security threats, complementing traditional risk assessment methods.
- Impact: This research introduces an innovative approach to risk assessment, leveraging sentiment analysis to predict and mitigate cybersecurity threats more effectively.
6. Improving the Efficacy of Biometric Authentication in Detecting Account Takeover Fraud in Mobile Banking
- Objective: Enhance the reliability of biometric authentication methods in preventing account takeover fraud in mobile banking.
- Approach: Investigated the limitations of existing biometric systems and proposed improvements using advanced algorithms and multi-factor authentication techniques.
- Results: Developed a more secure and efficient biometric authentication framework that significantly reduces the likelihood of account takeover fraud.
- Impact: This research contributes to the field of mobile banking security by providing more robust authentication methods, protecting users' financial information from fraudulent activities.
- Objective: Ensure the integrity and authenticity of data in mechanical designs using blockchain technology.
- Approach: Designed a blockchain-based system to securely store and verify mechanical design data, preventing unauthorized modifications and ensuring data traceability.
- Results: Implemented a prototype that demonstrated the effectiveness of blockchain in maintaining the integrity of mechanical design data throughout its lifecycle.
- Impact: This research offers a novel solution for protecting intellectual property in mechanical engineering, ensuring the reliability and accuracy of design data.
8. Comparative Analysis of Deadlock Prevention and Avoidance Strategies in Concurrent Programming Languages and Paradigms
- Objective: Evaluate the effectiveness of deadlock prevention and avoidance strategies across concurrent programming languages.
- Approach: Analyzed Erlang, Go, and Rust alongside traditional languages, assessing unique features like Go's channels, Rust's ownership model, and Erlang's actor-based concurrency.
- Results: Showed modern languages provide robust deadlock solutions, with each model having distinct strengths in specific scenarios.
- Impact: Offers a strategic guide for developers on selecting languages based on deadlock handling capabilities, thus optimizing concurrent application reliability.
- Objective: Summarize and evaluate real-time scheduling algorithms across various system types and requirements.
- Approach: Conducted a comprehensive survey of classic and recent algorithms, including Rate Monotonic and Earliest Deadline First, with a focus on schedulability, energy efficiency, and adaptability.
- Results: Identified gaps in current scheduling algorithms, particularly for energy efficiency and scalability in complex real-time systems.
- Impact: Provides a foundation for future research into adaptive scheduling algorithms, addressing the growing complexity in real-time system demands.
10. The Dining Philosophers Problem: A Historical and Contemporary Review with Future Research Directions
- Objective: Reevaluate the Dining Philosophers Problem, exploring its applicability in modern computing systems.
- Approach: Analyzed classic and modern solutions to the problem, examining semaphore-based methods, token-based approaches, and emerging machine learning applications.
- Results: Demonstrated that while classic solutions prevent deadlock, newer adaptations improve resource utilization and adaptability.
- Impact: Highlights future research directions in concurrency control, including dynamic resource management for distributed and cloud systems, making the Dining Philosophers Problem relevant for modern computing environmentsβ
11. Leveraging Open-Source Intelligence, Machine Learning, and Artificial Intelligence to Mitigate Problematic Gambling Behavior
- Objective: Utilize OSINT, ML, and AI to predict, detect, and reduce problematic gambling behavior.
- Approach: Developed predictive models using ML to identify potential problem gamblers and AI-driven interventions for real-time support.
- Results: Created a model that effectively identifies at-risk individuals and designed interventions to provide support.
- Impact: This research aids in mitigating gambling-related issues by providing tools for early intervention and support, contributing to public healthβ.
12. An Investigation on the Impact of Leadership Practices on Employee Engagement and Overall Branch Performance at Stanbic Bank
- Objective: Examine how leadership practices influence employee engagement and branch performance.
- Approach: Conducted a quantitative study across Stanbic Bank branches, analyzing employee engagement and performance data.
- Results: Found a positive correlation between effective leadership and higher engagement, enhancing branch performance.
- Impact: Provides insights for improving leadership practices within banking, promoting a more motivated and productive workforce
13. Enhancing Satellite Technology and Open-Source Intelligence Through Machine Learning and Artificial Intelligence
- Objective: Advance satellite technology by integrating ML and AI to process hyperspectral data and improve OSINT applications.
- Approach: Developed ML and AI models for satellite data preprocessing, feature extraction, and pattern recognition, enhancing OSINT.
- Results: Improved data analysis capabilities in environmental and urban planning applications.
- Impact: Enhances satellite technologyβs utility in critical areas, promoting better decision-making through integrated, actionable intelligence
- π‘οΈ As a mobile developer, I prioritize security in every stage of app development.
- π± I focus on implementing secure coding practices to fortify mobile applications against potential vulnerabilities.
- π¨ Actively learning and implementing encryption techniques and authentication mechanisms to safeguard user data and enhance app security.
- π οΈ Exploring techniques to prevent common security threats such as data breaches, injection attacks, and unauthorized access.
- π Ensuring secure communication between the mobile app and servers using industry-standard protocols and encryption methods.
- Utilizing Machine Learning, Artificial Intelligence, and Intelligent Systems to revolutionize education.
- Developing adaptive learning systems that personalize educational content to suit individual learning paces and styles.
- Creating intelligent tutoring systems that provide real-time feedback and support to students.
- Implementing AI-driven analytics to monitor and improve student engagement and performance.
- Designing interactive learning tools and platforms that enhance the educational experience for both teachers and students.
- Applying Machine Learning and AI to create innovative financial solutions.
- Developing predictive models for risk assessment, fraud detection, and financial forecasting.
- Creating intelligent personal finance management systems that help users make informed financial decisions.
- Building AI-driven trading algorithms and investment platforms that optimize returns and minimize risks.
- Implementing blockchain algorithms and cryptocurrency technologies to enhance security and transparency in financial transactions.
- Leveraging Machine Learning and AI to improve healthcare delivery and outcomes.
- Developing intelligent diagnostic systems that assist medical professionals in early detection and treatment of diseases.
- Creating personalized healthcare solutions that tailor treatments and wellness plans to individual needs.
- Implementing AI-driven analytics to monitor patient health and predict potential health issues.
- Designing telemedicine platforms that provide remote healthcare services and support.
- Using Machine Learning Algorithms to develop solutions that improve the quality of life for the handicapped.
- Creating intelligent systems that assist the blind in navigating and interacting with their environment.
- Developing speech recognition and synthesis systems to aid communication for the deaf.
- Designing color-blind friendly interfaces and tools that enhance visual accessibility.
- Implementing AI-driven technologies that provide real-time assistance and support for individuals with disabilities.
- Network Security: Proficient in designing and implementing secure network architectures. Capable of configuring and managing firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and ensuring network traffic security.
- Cybersecurity Practices: Experienced in employing advanced cybersecurity practices, including threat analysis, risk assessment, incident response, and security auditing to fortify systems against potential threats.
- Penetration Testing: Skilled in conducting penetration testing using a variety of tools and techniques to identify vulnerabilities and enhance the security posture of applications and systems.
- Secure Coding: Adept at implementing secure coding practices and standards to mitigate common vulnerabilities such as injection attacks, cross-site scripting (XSS), and other security loopholes.
- Encryption and Authentication: Proficient in implementing encryption algorithms, secure data storage mechanisms, and robust authentication methods to protect sensitive data and ensure secure communication between systems.
- Security Tools and Technologies: Extensive knowledge and hands-on experience with a wide array of security tools like Wireshark, Nmap, Metasploit, Burp Suite, Nessus, Snort, and various penetration testing tools.
- Cisco Networking: Certified in CCNA 3, skilled in configuring and troubleshooting networks, including routers, switches, and other networking devices.
- Network Administration: Proficient in network administration tasks, including configuration, monitoring, and maintenance of network infrastructure to ensure optimal performance and security.
- Cloud Networking: Hands-on experience with cloud networking services like AWS, Azure, Google Cloud, and IBM Cloud, including setting up secure and scalable network architectures in cloud environments.
- Protocols and Technologies: In-depth knowledge of network protocols (TCP/IP, UDP, HTTP/S, SSH) and networking technologies ensuring effective communication and secure data transfer across networks.
- Relational Databases: Proficient in MySQL, PostgreSQL, and SQLite for designing, implementing, and managing relational database systems, ensuring efficient data storage and retrieval.
- NoSQL Databases: Experienced in NoSQL databases like MongoDB, and Firebase, proficient in designing flexible and scalable database structures for diverse data needs.
- Database Administration: Skilled in performing database administration tasks, including schema design, query optimization, performance tuning, backup and recovery, and ensuring data integrity and security.
- Data Modeling: Capable of creating effective data models that cater to specific application requirements and ensure efficient data organization and retrieval.
- Seamless Integration: Expertise in integrating databases seamlessly with mobile and web applications using appropriate ORM (Object-Relational Mapping) techniques and APIs to facilitate efficient data flow and management.
- Data Security Measures: Implementing robust access control, encryption, and other security measures within the database to safeguard sensitive information and comply with data protection regulations.
-
π I am currently immersed in Education In Technology, where I am creating interactive learning for handicapped students using Artificial Intelligence.
-
π± I am currently delving deeper into Mobile Application Security by exploring advanced techniques in secure mobile app development, focusing on encryption algorithms, secure data storage, and penetration testing to fortify applications against potential threats.
-
π§ Additionally, I'm advancing my knowledge in AI-powered Mobile Solutions, diving into topics like Machine Learning models for mobile, Natural Language Processing (NLP), and computer vision to develop intelligent and adaptive mobile applications.
- Mobile Development: Kotlin, Java, Swift, JavaScript, TypeScript, Go, Rust
- Network Security & Cybersecurity: C, C++, C#, Python
- Legacy Systems & Security Analysis: Fortran, GoLang, Bash
- MySQL, SQLite, Firebase, MongoDB, PostgreSQL
- Room, Turso (Custom database), PocketBase, Prisma
- Mobile Development: React Native, Android (Java & Kotlin)
- Web & Application Security: JavaFX, Spring Boot, Laravel, Cordova, React Native, Bootstrap 5, Tailwind CSS, Material Themes.
- AWS (Amazon Web Services), Azure, Google Cloud Services, IBM Cloud, Oracle Cloud.
- Version Control: Git, GitLab, GitHub
- CI/CD: Jenkins, Travis CI
- Network Administration & Cybersecurity:
- Wireshark, Nmap, Metasploit, Snort, Burp Suite,OpenVAS,OSSEC,Zeek (formerly Bro), tcpdump,Aircrack-ng, Nessus,Nikto, Hashcat,tcpdump, IDS/IPS Systems (Intrusion Detection/Prevention Systems), SIEM (Security Information and Event Management), Penetration Testing Tools (various), Threat Intelligence Platforms
- Figma, Adobe XD
- Linux (various distributions such as Kali, ParrotOS, Ubuntu)
- Windows (for development and testing)
- MacOS
- Proficient in Networking fundamentals and administration with CCNA3 certification.
- Specialized in Cybersecurity, employing tools and techniques for secure system implementations.
- Experienced in Data Science methodologies and applications, leveraging data for actionable insights.
- Skilled in server administration, especially with cloud-based solutions like AWS, Azure, Google Cloud, etc.
- Adept in various programming languages and frameworks for web, mobile, and system development.
- Strong skills in UI/UX design, providing visually appealing and user-friendly interfaces.
- Actively engaged in tutoring and mentoring for Java, Python, and C++.
- Familiarity with financial markets and Foreign Exchange dynamics.
- Proficiency in database management systems like mySQL, MongoDB, PostgreSQL, etc.
- Extensive experience in mobile technologies, including Android development (Native).
- Entrepreneurial mindset with experience in technology-driven entrepreneurship and consulting.
- LinkedIn: Monei Bakang Mothuti
- Twitter: BakangMonei
- Instagram: @bakangmoneimothuti
- Facebook: Monei Bakang Mothuti
- Email: bakangmonei@swiftiq.co.bw
- TikTok: @moneibakangmothuti
Feel free to explore my repositories to discover some interesting projects I've been working on lately. Don't forget to star any repositories that catch your eye!
- I write code while listening to Gospel and next to my Holy Bible, not forgetting my coffeee...
- I'm always open to collaborations, discussions, and new opportunities. Reach out if you'd like to collaborate on a project or simply have a chat about tech!
- Continuously exploring the evolving landscape of security practices and networking technologies, actively engaging in forums, communities, and contributing to open-source projects related to cybersecurity and network administration.
- I'm passionate about security and networking and always excited to engage in discussions, share knowledge, or collaborate on projects related to these areas. Feel free to connect for any discussions, collaborations, or inquiries related to security or networking!