GithubHelp home page GithubHelp logo

Monei Bakang Mothuti [NeizaTheeDev]

🎓 Education

  • Masters Of Sciences in Computer Science (Artificial Intelligence & Machine Learning) Student @UniversityOfBotswana
  • [Cum Laude] Bachelor of Sciences (Hons) Computer Systems Engineering @Sunderland University

🚀 About Me Bakang Monei [Software Engineer (Solutions Architect & Mobile Developer)]

  • Passionate computing geek who loves diving deep into coding(programming) and creating impactful solutions. My journey in the world of tech has been an exciting ride filled with endless lines of code and a quest for innovation.

  • Masters Of Sciences in Computer Science (Artficial Intelligence & Machine Learning) Student | [Cum Laude] Bachelor of Sciences (Hons) Computer Systems Engineering | DevOps & CyberOps | Android Developer | Machine Learning | Artificial Intelligence | Intelligent Systems | AWS Cloud Practitioner | Web Application Developer | CCNA & CCNP | Firebase | Google Developer | Server Administrator | Data Science | Cloud Computing Enthusiast | Linux (Kali & Parrot OS) | Mobile Technology | Tech-Entrepreneur | System Analyst | Cybersecurity Specialist | Database Administrator | UI/UX Designer | Experienced in Spring Boot (ThymeLeave) | React Native | Software Consultant | Open-Source Intelligence (OSInt) | Network Security | Project Management (PRINCE 2) | Agile & Scrum Master

📝 Published Researches

1. Improving Brain Tumor Detection Using Convolutional Neural Networks

  • Objective: Enhance the accuracy and efficiency of brain tumor detection using advanced convolutional neural networks (CNNs).
  • Approach: Developed a CNN-based model to analyze medical imaging data, specifically MRI scans, to identify and classify brain tumors.
  • Results: Achieved higher accuracy rates in detecting and categorizing various types of brain tumors, outperforming traditional detection methods.
  • Impact: This research contributes to the field of medical diagnostics by providing a reliable and automated tool for early detection of brain tumors, potentially improving patient outcomes through timely intervention.

2. Android Mobile Development

  • Objective: Explore the latest trends, tools, and techniques in Android mobile development.
  • Approach: Conducted an in-depth analysis of Android development frameworks, libraries, and best practices to create robust and user-friendly mobile applications.
  • Results: Published guidelines and case studies on effective Android development strategies, covering areas such as UI/UX design, performance optimization, and security practices.
  • Impact: This research aids developers in building high-quality Android applications, enhancing user experiences, and ensuring application security and performance.

3. Improving Cyber Security Posture for University Communities by Establishment of Cyber Clinic

  • Objective: Strengthen cybersecurity within university communities by establishing dedicated cyber clinics.
  • Approach: Designed a comprehensive cybersecurity program that includes regular security assessments, incident response training, and awareness campaigns for students and staff.
  • Results: Implemented cyber clinics that provided hands-on support, resources, and training to university members, significantly reducing security incidents and enhancing overall cybersecurity awareness.
  • Impact: This initiative improves the cybersecurity posture of universities by fostering a culture of security awareness and proactive risk management, protecting sensitive academic and personal data.

4. The Comprehensive Approach to Cybersecurity: Strategies for Individuals and Organizations

  • Objective: Provide a holistic approach to cybersecurity by outlining strategies for both individuals and organizations.
  • Approach: Analyzed various cybersecurity frameworks, threat landscapes, and defense mechanisms to develop a set of best practices and actionable strategies.
  • Results: Published a comprehensive guide that includes personal cybersecurity tips, organizational security policies, and incident response plans.
  • Impact: This research empowers individuals and organizations to enhance their cybersecurity defenses, mitigate risks, and respond effectively to cyber threats.

5. Critical Evaluation of Sentiment-Driven Risk Assessment Models in Security Architecture: Leveraging Sentiment Analysis Algorithms for Enhanced Cybersecurity

  • Objective: Evaluate the effectiveness of sentiment-driven risk assessment models in enhancing cybersecurity.
  • Approach: Developed and tested sentiment analysis algorithms to assess risks based on sentiment data from various sources, including social media and threat reports.
  • Results: Demonstrated that sentiment-driven models can provide valuable insights into potential security threats, complementing traditional risk assessment methods.
  • Impact: This research introduces an innovative approach to risk assessment, leveraging sentiment analysis to predict and mitigate cybersecurity threats more effectively.

6. Improving the Efficacy of Biometric Authentication in Detecting Account Takeover Fraud in Mobile Banking

  • Objective: Enhance the reliability of biometric authentication methods in preventing account takeover fraud in mobile banking.
  • Approach: Investigated the limitations of existing biometric systems and proposed improvements using advanced algorithms and multi-factor authentication techniques.
  • Results: Developed a more secure and efficient biometric authentication framework that significantly reduces the likelihood of account takeover fraud.
  • Impact: This research contributes to the field of mobile banking security by providing more robust authentication methods, protecting users' financial information from fraudulent activities.

7. Utilizing Blockchain to Ensure the Integrity of Data in Mechanical Designs

  • Objective: Ensure the integrity and authenticity of data in mechanical designs using blockchain technology.
  • Approach: Designed a blockchain-based system to securely store and verify mechanical design data, preventing unauthorized modifications and ensuring data traceability.
  • Results: Implemented a prototype that demonstrated the effectiveness of blockchain in maintaining the integrity of mechanical design data throughout its lifecycle.
  • Impact: This research offers a novel solution for protecting intellectual property in mechanical engineering, ensuring the reliability and accuracy of design data.

🔐 Cybersecurity in Mobile Development (Native)

  • 🛡️ As a mobile developer, I prioritize security in every stage of app development.
  • 📱 I focus on implementing secure coding practices to fortify mobile applications against potential vulnerabilities.
  • 🚨 Actively learning and implementing encryption techniques and authentication mechanisms to safeguard user data and enhance app security.
  • 🛠️ Exploring techniques to prevent common security threats such as data breaches, injection attacks, and unauthorized access.
  • 🌐 Ensuring secure communication between the mobile app and servers using industry-standard protocols and encryption methods.

🌟 Interests

EdTech (Educational Technology)

  • Utilizing Machine Learning, Artificial Intelligence, and Intelligent Systems to revolutionize education.
  • Developing adaptive learning systems that personalize educational content to suit individual learning paces and styles.
  • Creating intelligent tutoring systems that provide real-time feedback and support to students.
  • Implementing AI-driven analytics to monitor and improve student engagement and performance.
  • Designing interactive learning tools and platforms that enhance the educational experience for both teachers and students.

FinTech (Financial Technology)

  • Applying Machine Learning and AI to create innovative financial solutions.
  • Developing predictive models for risk assessment, fraud detection, and financial forecasting.
  • Creating intelligent personal finance management systems that help users make informed financial decisions.
  • Building AI-driven trading algorithms and investment platforms that optimize returns and minimize risks.
  • Implementing blockchain and cryptocurrency technologies to enhance security and transparency in financial transactions.

eHealth (Electronic Health)

  • Leveraging Machine Learning and AI to improve healthcare delivery and outcomes.
  • Developing intelligent diagnostic systems that assist medical professionals in early detection and treatment of diseases.
  • Creating personalized healthcare solutions that tailor treatments and wellness plans to individual needs.
  • Implementing AI-driven analytics to monitor patient health and predict potential health issues.
  • Designing telemedicine platforms that provide remote healthcare services and support.

Accessibility Solutions for the Handicapped

  • Using Machine Learning Algorithms to develop solutions that improve the quality of life for the handicapped.
  • Creating intelligent systems that assist the blind in navigating and interacting with their environment.
  • Developing speech recognition and synthesis systems to aid communication for the deaf.
  • Designing color-blind friendly interfaces and tools that enhance visual accessibility.
  • Implementing AI-driven technologies that provide real-time assistance and support for individuals with disabilities.

🛡️ Security and Networking Expertise

Security Focus Areas

  • Network Security: Proficient in designing and implementing secure network architectures. Capable of configuring and managing firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and ensuring network traffic security.
  • Cybersecurity Practices: Experienced in employing advanced cybersecurity practices, including threat analysis, risk assessment, incident response, and security auditing to fortify systems against potential threats.
  • Penetration Testing: Skilled in conducting penetration testing using a variety of tools and techniques to identify vulnerabilities and enhance the security posture of applications and systems.
  • Secure Coding: Adept at implementing secure coding practices and standards to mitigate common vulnerabilities such as injection attacks, cross-site scripting (XSS), and other security loopholes.
  • Encryption and Authentication: Proficient in implementing encryption algorithms, secure data storage mechanisms, and robust authentication methods to protect sensitive data and ensure secure communication between systems.
  • Security Tools and Technologies: Extensive knowledge and hands-on experience with a wide array of security tools like Wireshark, Nmap, Metasploit, Burp Suite, Nessus, Snort, and various penetration testing tools.

Networking Skills

  • Cisco Networking: Certified in CCNA 3, skilled in configuring and troubleshooting networks, including routers, switches, and other networking devices.
  • Network Administration: Proficient in network administration tasks, including configuration, monitoring, and maintenance of network infrastructure to ensure optimal performance and security.
  • Cloud Networking: Hands-on experience with cloud networking services like AWS, Azure, Google Cloud, and IBM Cloud, including setting up secure and scalable network architectures in cloud environments.
  • Protocols and Technologies: In-depth knowledge of network protocols (TCP/IP, UDP, HTTP/S, SSH) and networking technologies ensuring effective communication and secure data transfer across networks.

🗃️ Database Expertise

Database Management Systems

  • Relational Databases: Proficient in MySQL, PostgreSQL, and SQLite for designing, implementing, and managing relational database systems, ensuring efficient data storage and retrieval.
  • NoSQL Databases: Experienced in NoSQL databases like MongoDB, and Firebase, proficient in designing flexible and scalable database structures for diverse data needs.

Database Administration and Optimization

  • Database Administration: Skilled in performing database administration tasks, including schema design, query optimization, performance tuning, backup and recovery, and ensuring data integrity and security.
  • Data Modeling: Capable of creating effective data models that cater to specific application requirements and ensure efficient data organization and retrieval.

Integration with Applications

  • Seamless Integration: Expertise in integrating databases seamlessly with mobile and web applications using appropriate ORM (Object-Relational Mapping) techniques and APIs to facilitate efficient data flow and management.
  • Data Security Measures: Implementing robust access control, encryption, and other security measures within the database to safeguard sensitive information and comply with data protection regulations.

💻 What I'm Working On

  • 🔭 I am currently immersed in Education In Technology, where I am creating interactive learning for handicapped students using Artificial Intelligence.

  • 🌱 I am currently delving deeper into Mobile Application Security by exploring advanced techniques in secure mobile app development, focusing on encryption algorithms, secure data storage, and penetration testing to fortify applications against potential threats.

  • 🧠 Additionally, I'm advancing my knowledge in AI-powered Mobile Solutions, diving into topics like Machine Learning models for mobile, Natural Language Processing (NLP), and computer vision to develop intelligent and adaptive mobile applications.

👨‍💻 Tech Stack

Languages

  • Mobile Development: Kotlin, Java, Swift, JavaScript, TypeScript, Go, Rust
  • Network Security & Cybersecurity: C, C++, C#, Python
  • Legacy Systems & Security Analysis: Fortran

Databases

  • MySQL, SQLite, Firebase, MongoDB, PostgreSQL
  • Room, Turso (Custom database), PocketBase, Prisma

Frameworks

  • Mobile Development: React Native, Android (Java & Kotlin)
  • Web & Application Security: JavaFX, Spring Boot, Laravel, Cordova, React Native, Bootstrap 5, Tailwind CSS, Material Themes

Cloud Services

  • AWS (Amazon Web Services), Azure, Google Cloud Services, IBM Cloud, Oracle Cloud

Tools & Technologies

  • Version Control: Git, GitLab
  • CI/CD: Jenkins, Travis CI
  • Network Administration & Cybersecurity:
    • Wireshark, Nmap, Metasploit, Snort, Burp Suite,OpenVAS,OSSEC,Zeek (formerly Bro), tcpdump,Aircrack-ng, Nessus,Nikto, Hashcat,tcpdump, IDS/IPS Systems (Intrusion Detection/Prevention Systems), SIEM (Security Information and Event Management), Penetration Testing Tools (various), Threat Intelligence Platforms

Prototyping (UI/UX)

  • Figma, Adobe XD

Operating Systems

  • Linux (various distributions such as Kali, ParrotOS, Ubuntu)
  • Windows (for development and testing)
  • MacOS

🎯 Other Expertise and Interests:

  • Proficient in Networking fundamentals and administration with CCNA3 certification.
  • Specialized in Cybersecurity, employing tools and techniques for secure system implementations.
  • Experienced in Data Science methodologies and applications, leveraging data for actionable insights.
  • Skilled in server administration, especially with cloud-based solutions like AWS, Azure, Google Cloud, etc.
  • Adept in various programming languages and frameworks for web, mobile, and system development.
  • Strong skills in UI/UX design, providing visually appealing and user-friendly interfaces.
  • Actively engaged in tutoring and mentoring for Java, Python, and C++.
  • Familiarity with financial markets and Foreign Exchange dynamics.
  • Proficiency in database management systems like mySQL, MongoDB, PostgreSQL, etc.
  • Extensive experience in mobile technologies, including Android development (Native).
  • Entrepreneurial mindset with experience in technology-driven entrepreneurship and consulting.

📫 Let's Connect!

🚀 Check Out My Repositories!

Feel free to explore my repositories to discover some interesting projects I've been working on lately. Don't forget to star any repositories that catch your eye!

🌟 Fun Fact

  • I write code while listening to Gospel and next to my Holy Bible, not forgetting my coffeee...

🤝 Let's Collaborate!

  • I'm always open to collaborations, discussions, and new opportunities. Reach out if you'd like to collaborate on a project or simply have a chat about tech!

Ongoing Learning and Contributions

  • Continuously exploring the evolving landscape of security practices and networking technologies, actively engaging in forums, communities, and contributing to open-source projects related to cybersecurity and network administration.

Let's Discuss Security and Networking!

  • I'm passionate about security and networking and always excited to engage in discussions, share knowledge, or collaborate on projects related to these areas. Feel free to connect for any discussions, collaborations, or inquiries related to security or networking!

BuyMeACoffee

Support:


devalphaspZ

Languages and Tools:

javascript typescript python nodejs aws aws react sql mongodb git terminal

📊 GitHub Stats:



✍️ Random Dev Quote

🔝 Top Contributed Repo

Monei Bakang's Projects

krypt icon krypt

Krypt is a native android application to help users encrypt and decrypt sensitive videos on their devices.

lansoeditor_advance icon lansoeditor_advance

android video editor advance sdk .include functions: cut, crop picture in picture; Animation, Filter, Effect, Transition, audioLayer , videoLayer, stick, add logo, delogo, overlay, video composition, gif layer scale, move, rotate, opacity, like tiktok video editor.

libsql icon libsql

libSQL is a fork of SQLite that is both Open Source, and Open Contributions.

maybe icon maybe

Personal finance and wealth management app

medmanager icon medmanager

Med-Manager is a simple android app that helps patients remember to take their medication and provides tracking for the intake of the prescribed medication intake.

mobile-security-framework-mobsf icon mobile-security-framework-mobsf

Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework capable of performing static and dynamic analysis.

moithutiapp icon moithutiapp

Year2Semester2 project with Melissa Tshipietsile, Refilwe Dianna Jack, Phindile Molefe. Developer: Bakang Monei Motshegwe

moneifunnydashboard icon moneifunnydashboard

React Platform: Next.js, UI Framework: Mantime, Backend: REST API, Authentication: Custom Auth

moodle icon moodle

Moodle - the world's open source learning platform

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.