![Mathieu Kokoly Kourouma](https://i1.rgstatic.net/ii/profile.image/307906241597441-1450421976479_Q128/Mathieu-Kourouma.jpg)
Mathieu Kokoly KouroumaSouthern University and A&M College | SUBR · Department of Computer Science
Mathieu Kokoly Kourouma
PhD, SCJP, TestOut PC Pro, TestOut Network Pro, TestOut Security Pro
About
12
Publications
28,667
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
52
Citations
Introduction
Publications
Publications (12)
Traditionally, teaching has been centered around classroom delivery. However, the onslaught of the COVID-19 pandemic has cultivated usage of technology, teaching, and learning methodologies for course delivery. We investigate and describe different modes of course delivery that maintain the integrity of teaching and learning. This paper answers to...
Wireless and mobile devices are part of our lives. Wireless technology encompasses Internet of Things (IoT). Some key features of these devices are sensors, connectivity, and artificial intelligence and they can be found in health clinics, homes, buildings, vehicles, cities, wearables, etc. However, wireless and IoT technologies are sources of a va...
In this paper, we investigate the principles underlying one of the most common and fastest growing cyber threats called “Ransomware”, which impacts individuals and the operation of corporates, organizations, and businesses around the world. We explain what Ransomware is, how it is carried out, its impacts on corporates and businesses, and how to pr...
Selecting or choosing software, tools, or products to use for specific needs is not always an easy task. Online, for example, people will post a series of questions seeking for help in choosing among software, tools, or products for their needs. Instructors teaching program logic courses and would like to use tools or software for their classrooms...
Selecting or choosing software, tools, or products to use for specific needs is not always an easy task. Online, for example, people will post a series of questions seeking for help in choosing among software, tools, or products for their needs. Instructors teaching program logic courses and would like to use tools or software for their classrooms...
High external locus of control and readiness to conjure and believe in mystical powers has a potential in disrupting the growing small and medium enterprises in Uganda. If small business operators abdicate their responsibilities to mystical powers, it will worsen the current low survival rate of start-up businesses. In this study, we use a multilev...
Several models have been developed to evaluate the performance of Distributed Software Architecture (DSA) in order to avoid problems that may arise during system implementation. This paper presents a review of DSA performance evaluation models with the view of identifying the common properties of the models. It was established in this study that th...
A review of "social experiments" with adoption of multimedia-based technologies in Europe has been reported. But, there has been limited discussion on the value of multimedia instructional materials in technical disciplines. This study combines results from experiments carried out over a period of three years with multiple audiences--IT managers an...
The malaise of electronic spam mail that solicit illicit partnership using bogus business proposals (popularly called 419 mails) remained unabated on the internet despite concerted efforts. In addition to these are the emergence and prevalence of phishing scams that use social engineering tacticsto obtain online access codes such as credit card num...
This paper presents a prototype for an automated self-configuring driver system (ASDS) for the IEEE 802.11 WLANs. This software
system provides a new way of running multiple IEEE 802.11 wireless standards on laptops and other mobile devices on the fly
anywhere around the world.
Most current drivers for 802.11 standards are static; that is during t...
Thesis (Ph. D.)--University of Louisiana at Lafayette, 2005. Vita. Includes bibliographical references (leaves [101]-105). Microfilm.
Thesis (Ph. D.)--University of Louisiana at Lafayette, 2005. Vita. Includes bibliographical references (leaves [101]-105).