• No results found

CURRICULUM VITAE. Dr. Felix Musau N, Ph.D.

N/A
N/A
Protected

Academic year: 2021

Share "CURRICULUM VITAE. Dr. Felix Musau N, Ph.D."

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

CURRICULUM VITAE

Dr. Felix Musau N, Ph.D.

PhD(Comp Science and Tech), M.Eng (Computer Science and Tech), P.G.D.Comp Sc, BED(Sc) (Hons), CCNA Professional, CCNA Instructor, MCSE, MCSA, MCSD, MCDBA, MCP, Siemon Distributor Listed Installer for Copper and Fiber.

.

Communication and Information Technology Department, School of Engineering and Technology

Kenyatta University, Kenya. P.o Box 43844-00100, Nairobi, Kenya.

Phone:+254736436544,

Personal Information

Nationality : Kenyan

Languages : English, Swahili, Chinese. Home Address : P.O Box 19758,00100, Kenya.

E-mail Address : musaunf@gmail.com , musaunf@yahoo.com, musau.felix@ku.ac.ke

Education

2012, August -Ph.D graduate (Computer Science and Technology)

Title of Ph.D. Thesis: Trust Management against Risks in Peer to Peer Networks 2008-2012

Central South University, Hunan, China,

Ph.D. (Computer Science and Technology) Student

Research area of interest: Trust Management in Peer to Peer Networks, Mobile Ad Hoc Networks, Security of Wireless Sensor Networks and semantic web technology, Internet of Things,

2001-2003

Central South University, Hunan, China. MSc. (Computer Science and Technology.)

Masters Research Title: Online Digital Library, Case study of Central South University Library.

2000–2001

Central South University (CSU), Hunan, China.

(2)

P.G.D Research: Design of an Artificial intelligent Taxi in urban Areas.

1990-1994

Kenyatta University, Kenya.

B.ED Sc (Hons), Specialization: Mathematics, Computer Science, and Education

Research Interest

Computer and network security Trust in Mobile Ad Hoc Networks, Security of Wireless Sensor Networks and semantic web technology, Internet of Things, Digital Image processing and Image Recognition, ICT for development.

Work Experience

2010-Todate: Lecturer, Communication and Information Technology Department ,school of Engineering ,Kenyatta University ,Kenya

2005 to 2010:

Assistant Lecturer, Information and Communication Technology Department ,school of Engineering ,Kenyatta University ,Kenya

Responsibilities:

Teaching computer science and computer Engineering courses to students on Undergraduate and Postgraduate students and Supervision of Undergraduate Research projects.

2007-2008

Kenyatta University Cisco Academy coordinator Responsibilities

Managing and coordinating all functions, Configuring Cisco systems at the University, University advisor on cisco matters, Link to the cisco headquarters.

2003-2006:Part Time Lecturer, School of computing and Informatics, University of Nairobi

Courses Taught: Artificial Intelligence, Computer networks, Programming methodology, Informatics, C Programming Language

2005-2008:Part Time lecturer, Institute of computer Science and Information technology , Department of Human recourse and Development, Department of Geomatic Engineering and Mechanical Engineering, Jomo Kenyatta University of Agriculture and Technology.

Course Taught: Neural Networks, Digital Image processing, Database management, Foundations of Computing and knowledge based systems, Artificial Intelligence. 2004-2005

Systems Engineer, POLYICT, Kenya Polytechnic University College, Nairobi, Project funded by the Belgium government in conjunction with Ministry of Education Science and Technology, Kenya.

Was under Dr Paul Van Otten of VVOB Flemish International. Responsibilities

Adviser on the Polytechnic ICT systems, setting infrastructure ,procurement and maintenance 2005-Tutorial Fellow, School of Computing and Information Technology-Jomo Kenyatta University College of Agriculture and Technology.

2003-2004

(3)

University of Nairobi Campus)

1995-1999:

Teacher, Teachers Service Commission of Kenya.

Head of Mathematics Department (Graduate Teacher 1) and Head of Games Department.

Technical Experience

Consultancy And Training

CCNA-Cisco Certified Network Associate

apprentice knowledge of networking.- installing, configuring, and operating LAN, WAN, and dial access services for networks.-

Bridging and switching Networks-OSI Reference model and Layered Communication.-Network Protocols.-Routing.-Network

management.

MCSA-Microsoft Certified Systems administrator.

-Implement, manage, and troubleshoot existing network and system environments based on the Microsoft Windows® 2000 and Windows .NET Server platforms.

MCSE-Microsoft Certified Systems Engineer.

-Implementing, Administering and Trouble shooting a Microsoft Windows Network infrastructure.

-Designing Security for Microsoft Windows Network.

-Installing, configuring and Administering Microsoft Windows Systems

-Implementing and Administering a Microsoft Windows Directory Services.

MCDBA-Microsoft Certified Database Administrator

-Designing and Implementing Database with Microsoft SQL Server 200

-Installing, configuring and administering MS SQL 2000. -Implementing security on MS SQL Server 2000 RDBMS -Designing Databases with Microsoft Access.

MCSD- Microsoft Certified Solution Developer

-Designing and implementing Distributed Applications with Microsoft Visual Basic.

-Designing and implementing Desktop Applications with Microsoft Visual Basic.

-Analyzing Requirements and defining Solution Architectures -Designing and implementing Web Applications with Active Server Pages.

Siemon Distributor Listed Installer for Copper and Fiber.

Licensed installer of fiber systems, trouble shooting and configuration February 2008:

(4)

2007:Hardware Training

Training as an hardware maintenance in the Computer international Workshop, United Kingdom.

2007: Visiting hardware maintenance specialist in the University of East London, United Kingdom.

2007:Visiting trainer and solution development of e-learning modules at University of Worcester, United Kingdom

2004-2005: Involved in Consultancy for IT systems in the ministry of health. May 2005 –December 2005:

Development and revision of Kenyatta University ICT programmes in computer science ,software Engineering and Computer Engineering

Duties And Responsibilities.

2007-2008: Member of Kenyatta UniversityICT Board. 2006-2008:

Industrial Attachment Supervisor, Information communication and Technology, Kenyatta University

Responsibilities: assisting students secure industrial attachment positions Coordinating Attachment Exercise and supervising students on attachment

In the Industries.

2005-2008:Project Supervisor for Masters and undergraduate students in Computer Science and Software Engineering

2005-2008:

Academic Advisor- BSc. Computer Science ,Software and Computer Engineering Students. April 2007 - May 2007.

Acting Chairman, Information and communication Technology Department

Responsibilities: -Coordinating the activities of the busy ICT department 2007-2008:

Chief Examinations officer, Information and communication Technology department, Kenyatta University

Responsibilities: Coordinating: Processing of Drafts, External moderation, Administration s, Results processing and Analysis.

Courses I teach at Kenyatta University (a) Undergraduate Courses

 Operating systems  Artificial intelligence

 Database management systems  Distributed Systems

 Computer Networks and Security  Digital Image Processing

(b) Graduate Courses  Artificial Intelligence

(5)

Professional Body.

2001 to Date: Microsoft Certified professionals

2003 to date: Cisco Certified networking professionals 2007 to date: Cisco Certified Trainers body

2005-2007; Association of Computing machinery(ACM) 2008-2012, IEEE student membership

Research, Publications

And Conference

Research and Publications

1. Felix Musau, Guojun Wang, Shui Yu, and Muhammad Bashir Abdullahi, “Securing Recommendations in Grouped P2P E-Commerce Trust Model,” IEEE Transactions on Network and Service Management, 14 pages (Accepted, September 2012).

2. Felix Musau, Guojun Wang, and Muhammad Bashir Abdullahi, “Group Formation with Neighbor Similarity Trust in P2P E-Commerce,” Peer-to-Peer Networking and Applications (Springer), Published online on November 10, 2011, DOI: 10.1007/s12083-011-0116-4.

3. Felix Musau, Guojun Wang, and Muhammad Bashir Abdullahi, “Group Formation with Neighbor Similarity Trust in P2P E-Commerce,” Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), pp. 835-840, November 16-18, 2011, Changsha, China.

4. Felix Musau, Guojun Wang, Song Guo, and Muhammad Bashir Abdullahi, “Neighbor Similarity Trust against Sybil Attack in P2P E-Commerce,” 9th IEEE International Conference on Autonomic and Trusted Computing (ATC 2012), Japan, pp. 1-8.

5. Felix Musau and Muhammad Bashir Abdullahi, “Similarity Formation of Groups and Key Management in Dynamic Peer to Peer E-commerce,” Proc. of CiSE, IEEE, 2010, ISBN:978-1-4244-5391-7, pp.1 – 4.

6. Felix Musau, Cheruiyot Wilson, and Joseph Mushi, “Trust and its challenges facing E-Government programs in Kenya,” Proc. of CAMAN, IEEEE, 2010. 7. Felix Musau, Cheruiyot Wilson, and Jospeh Cosmas Mushi, “Principles of

trust in internet security and webscure environment,”Proc. of CAMAN, IEEE, 2010.

8. Felix Musau, Walugembe Hussein, Frans David, and Wilson Cheruiyot, “Trust Transaction Algorithm in Dynamic P2P E-commerce Environments,”Proc. of CAMAN, IEEE, 2012, pp. 4231-4234.

9. Felix Musau, Shenbing Ren, Shouyi Yu. Security of Internet transactions , National Chinese Computer Engineering Journal, 2003.

10. Muhammad Bashir Abdullahi, Guojun Wang, and Felix Musau, “A Reliable

and Secure Distributed In-Network Data Storage Scheme in Wireless Sensor Networks,” Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011), pp. 548-555, November 16-18, 2011, Changsha, China.

(6)

quality refinement in singular value decomposition to improve genetic algorithms for multimedia data retrieval,” Multimedia Systems, vol.17, No.6, 507-521, DOI: 10.1007/s00530-011-0231-3

12. Cheruiyot Wilson, Guan-Zheng Tan, Joseph Cosmas Mushi, and Felix Musau, “Genetic Algorithm-Enhanced Retrieval process for Multimedia

Data,” International journal of Advancements in Computing Technology, Vol. 3, No. 3, 2011.

13. Cheruiyot W.Kipruto, Guan-Zheng Tan, Felix Musau, and Joseph C.Mushi, “Using Genetic Algorithms to Optimize Web Caching in Multimedia-Integrated e-Learning Content,” International Journal of Digital Content Technology and its Applications. Volume 5, Number 8, August 2011

14. Joseph Cosmas Mushi, Guan-zheng Tan, Felix Musau, and Cheruiyot Wilson, “Performance Analysis of Recharging Scheme of SaaS through M-banking,” JCIT, Vol. 6, No. 7, pp. 140-153, 2011

15. Joseph Cosmas Mushi, Guan-zheng Tan, Felix Musau, and Cheruiyot Wilson, “Modeling M-SaaS delivery model for threshold-based credit recharging using M-banking,” IEEE 2011, pp. 307-311.

16. Mohamed Lamine Toure, Zou Beiji, and Felix Musau, “Novel robust and fast

Segmentation of the Color Images using Fuzzy Classification C-means,”Proc. of ICETC, IEEE, 2010

17. Mohamed Lamine Toure, Zou Beiji, anf Felix Musau, “Advanced Algorithm

Partitioning of Markov and Color Image Segmentation,”Proc. of ICCSIT, IEEE, 2010, pp. 719-723.

18. Mohamed Lamine Toure, Zou Beiji, Felix Musau, and Aboubacar Damaye Camara (2010), “Advanced Algorithm for Brain Segmentation using Fuzzy to localize Cancer and Epilespy region,” Proc. of ICEIE, IEEE, 2010.

19. Joseph Cosmas Mushi, Guan-zheng Tan, Felix Musau, and Cheruiyot Wilson, “Modeling M-SaaS Delivery Model for Threshold-based Credit Recharging Using Mbanking,” Proc. of IEEE, 2011, pp. 307-311.

20. Joseph Cosmas Mushi, Guan-zheng Tan, Cheruiyot Wilson, Felix Musau, “Analysis of MS Power Saving Scheme to BS with Finite Buffer in IEEE 802.16e networks,” Proc. of IEEE, 2011, pp. 114-119.

21. Juma Modie Mwamafundo, Wang Jian Xin, Sang Kipkorir, and Felix Musau, “An Enhanced QoS Service Flow Management Scheme for IEEE 802.16 Broadband Wireless Access Systems,” Proc. of ICFN, IEEE, 2011, pp. 1-5. 22. Juma Modie Mwamafundo, Sang Kipkorir, and Felix Musau, “An Enhanced

Service Flow Management Scheme for IEEE 802.16 Broadband Wireless Access Systems,” International Journal of Computer Theory and Engineering, Vol. 4, No. 4, August 2012, pp.484-489.

23. Charity Gichuki, Stephen Nyaga, George Vikiru, David Nzuki, Felix Musau, Harrison Njoroge, Caleb Ogot, Gideon Nzuki, J Osoro and Donald Ngure, Using

(7)

ICT Innovations to Enhance the Development of Peri-urban Communities in Informal Settlements in Nairobi,2008.

References

Related documents

Threats or other forms of intimidation and/or retaliation against a student or employee for bringing a complaint of any alleged discrimination, harassment (including intimate partner

Interestingly, among the 11 epitopes identified, only gp51N11 was capable of inducing CD8 + T cell-mediated cytotoxicity in all four calves, but it is not a suitable vaccine

The network consisted of four Windows XP virtual workstations with different security configurations to represent various scenarios of real computers, the host computer running

Explanation: Breadth-first search always expands the shallowest node in the current fringe of the search tree. Traversal is performed level wise. What is the other name of

To ensure that the plan incorporated the perspectives of the entire campus, we formed 11 work teams to analyze key components of the HR system. Each team was charged with

If every non-key attribute is functionally dependent primary key, then the relation will

Among the different land uses, the MMF model predicted the highest monthly splash detachment rates for barley fields with a total annual rate of 93.8 Mg ha -1 y -1 and a maximum

 The goals ofthe Gigabit Ethernet were to upgrade the data rate to 1 Gbps, but keep the addresslength, the frame format, and the maximum and minimum frame length the