Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Series Title
      Series Title
      Clear All
      Series Title
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Content Type
    • Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
17 result(s) for "Daimi, Kevin"
Sort by:
Advances in security, networks, and internet of things : proceedings from SAM'20, ICWN'20, ICOMP'20, and ESCS'20
This books presents the proceedings of four conferences. The conferences are part of the larger 2020 World Congress in computer science, computer engineering and applied computing. Includes the tracks on security & management, wireless networks, internet computing and IoT, and embedded systems as well as cyber-physical systems. It features papers from SAM'20, ICWN'20, ICOMP'20 and ESCS'20.
Computer and Network Security Essentials
The book covers a wide range of security topics including Cryptographic Technologies, Network Security, Security Management, Information Assurance, Security Applications, Computer Security, Hardware Security, and Biometrics and Forensics.
Implementing cryptography in LoRa based communication devices for unmanned ground vehicle applications
In this study, a Long Range (LoRa) based bidirectional secured communication link for controlling and monitoring the robots from a remote location is proposed. The security features and structure of the LoRa is build upon the standard protocol called LoRa wide area networks (LoRaWAN). To take advantage of these features, LoRa devices/end modules need to be connected to a network server through a LoRa gateway. However, for certain military scenarios like war zones, terrorist attack sites, disaster sites etc., the availability of standard network cannot be guaranteed, and therefore, the security features available with LoRaWAN protocol cannot be guaranteed. To overcome this critical limitation, a LoRa based secured device for establishing a bidirectional communication link between the base station and the robots without relying on any network is proposed. To secure the exchanged data, a cryptographic protocol is developed, and confidentiality, authenticity and integrity of the transmitted data between the base station and the robot are ensured. The protocol is then implemented with a pair of LoRa devices and its functionality is tested from a remote location by controlling and monitoring a Pioneer-P3Dx robot from a distance of 1.2 miles. The test shows that the proposed cryptographic protocol can securely control and track the robot from a remote location.
Identifying Syntactic Ambiguities in Single-Parse Arabic Sentence
The aim of this paper is to describe a technique for identifying the sources of several types of syntactic ambiguity in Arabic Sentences with a single parse only. Normally, any sentence with two or more structural representations is said to be syntactically ambiguous. However, Arabic sentences with only one structural representation may be ambiguous. Our technique for identifying Syntactic Ambiguity in Single-Parse Arabic Sentences (SASPAS) analyzes each sentence and verifies the conditions that govern the existence of certain types of syntactic ambiguities in Arabic sentences. SASPAS is integrated with the syntactic parser, which is based on Definite Clause Grammar (DCG) formalism. The system accepts Arabic sentences in their original script.
The Application of Software Engineering to Moving Goods Mobile App
GoodTurn - the moving goods mobile system, is designed and implemented by the University of Detroit Mercy with a grant from Ford Motor Company. The app is intended to facilitate and manage Ford employees' donation of their time and vehicles to serve the community by moving goods and resources. This paper introduces the requirements, analysis, and design of the GoodTurn system for iPhone environment. The software tools needed for its development will be highlighted.
A Minor in Computational Statistics
Computational statistics methods enable statistical techniques, analysis, and interpretations through various computational techniques and processes. It helps in solving statistical problems both numerically and symbolically and automates various distributions and statistical procedures and inferences. The field of computational statistics is appealing to both statisticians and computer scientists. To contribute to the preparation of future computational statisticians, this paper proposes a minor in computational statistics. Curriculum design, objectives, outcomes, and assessment for this minor will be discussed in details. [PUBLICATION ABSTRACT]
Alternative Two Sample Tests in Bioinformatics
Bioinformatics is a multidisciplinary field. Statistics is getting immense popularity in bioinformatics research. The goal of this paper is to introduce a survey of two sample tests applied to bioinformatics. The vast majority of these methods do not follow the classical two sample test techniques, which require strict assumptions. Thus, unlike other classical surveys, this paper will emphasize the justifications behind the deviations from the standard approach, and the implementation of such deviations. [PUBLICATION ABSTRACT]