Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
17
result(s) for
"Daimi, Kevin"
Sort by:
Advances in security, networks, and internet of things : proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
This books presents the proceedings of four conferences. The conferences are part of the larger 2020 World Congress in computer science, computer engineering and applied computing. Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems. It features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.
Computer and Network Security Essentials
by
Francia, Guillermo
,
Ertaul, Levent
,
El-Sheikh, Eman
in
Communications Engineering, Networks
,
Computer Communication Networks
,
Data protection
2017,2018
The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics.
Implementing cryptography in LoRa based communication devices for unmanned ground vehicle applications
by
Manuel, Melvin P.
,
Daimi, Kevin
in
Applied and Technical Physics
,
Availability
,
Chemistry/Food Science
2021
In this study, a Long Range (LoRa) based bidirectional secured communication link for controlling and monitoring the robots from a remote location is proposed. The security features and structure of the LoRa is build upon the standard protocol called LoRa wide area networks (LoRaWAN). To take advantage of these features, LoRa devices/end modules need to be connected to a network server through a LoRa gateway. However, for certain military scenarios like war zones, terrorist attack sites, disaster sites etc., the availability of standard network cannot be guaranteed, and therefore, the security features available with LoRaWAN protocol cannot be guaranteed. To overcome this critical limitation, a LoRa based secured device for establishing a bidirectional communication link between the base station and the robots without relying on any network is proposed. To secure the exchanged data, a cryptographic protocol is developed, and confidentiality, authenticity and integrity of the transmitted data between the base station and the robot are ensured. The protocol is then implemented with a pair of LoRa devices and its functionality is tested from a remote location by controlling and monitoring a Pioneer-P3Dx robot from a distance of 1.2 miles. The test shows that the proposed cryptographic protocol can securely control and track the robot from a remote location.
Journal Article
Identifying Syntactic Ambiguities in Single-Parse Arabic Sentence
2001
The aim of this paper is to describe a technique for identifying the sources of several types of syntactic ambiguity in Arabic Sentences with a single parse only. Normally, any sentence with two or more structural representations is said to be syntactically ambiguous. However, Arabic sentences with only one structural representation may be ambiguous. Our technique for identifying Syntactic Ambiguity in Single-Parse Arabic Sentences (SASPAS) analyzes each sentence and verifies the conditions that govern the existence of certain types of syntactic ambiguities in Arabic sentences. SASPAS is integrated with the syntactic parser, which is based on Definite Clause Grammar (DCG) formalism. The system accepts Arabic sentences in their original script.
Journal Article
The Application of Software Engineering to Moving Goods Mobile App
2017
GoodTurn - the moving goods mobile system, is designed and implemented by the University of Detroit Mercy with a grant from Ford Motor Company. The app is intended to facilitate and manage Ford employees' donation of their time and vehicles to serve the community by moving goods and resources. This paper introduces the requirements, analysis, and design of the GoodTurn system for iPhone environment. The software tools needed for its development will be highlighted.
Conference Proceeding
A Minor in Computational Statistics
2013
Computational statistics methods enable statistical techniques, analysis, and interpretations through various computational techniques and processes. It helps in solving statistical problems both numerically and symbolically and automates various distributions and statistical procedures and inferences. The field of computational statistics is appealing to both statisticians and computer scientists. To contribute to the preparation of future computational statisticians, this paper proposes a minor in computational statistics. Curriculum design, objectives, outcomes, and assessment for this minor will be discussed in details. [PUBLICATION ABSTRACT]
Conference Proceeding
Alternative Two Sample Tests in Bioinformatics
2012
Bioinformatics is a multidisciplinary field. Statistics is getting immense popularity in bioinformatics research. The goal of this paper is to introduce a survey of two sample tests applied to bioinformatics. The vast majority of these methods do not follow the classical two sample test techniques, which require strict assumptions. Thus, unlike other classical surveys, this paper will emphasize the justifications behind the deviations from the standard approach, and the implementation of such deviations. [PUBLICATION ABSTRACT]
Conference Proceeding
Transforming Undergraduate Computer Science into Software Engineering
by
Daimi, Kevin
,
Snyder, Katy
2011
Conference Proceeding