Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Search
 
Hamdy S. Soliman
New Mexico Tech
Socorro, New Mexico
 

Hamdy Soliman has been a computer science teacher and researcher at New Mexico Tech since 1989. He has chaired the department, served as a graduate advisor for 18 years, is an active member of many committees (tenure, promotion, professorship, assessment, accreditation, advising, search), and is coordinator of the Sensor Network and Cyber Security Labs. He is also the author of six US patents and 82 journal and conference papers.

Hamdy’s research covers many areas, including all-fiber-optic network topologies and protocols, data-driven/task-flow computer systems, and soft computing applications. His current primary foci are computer/sensor network security, neural networks, and sensor network applications. He has several publications related to network communication protocols, mobile network security, ad hoc networks, and wireless sensor network event-detection systems.

One of his biggest contributions to server/cellphone security is a novel encryption algorithm, synchronous dynamic encryption system (SDES), which has shown better performance than AES, is secure against insiders, and is resistant to quantum computing attacks. This security research resulted in the development of five security patents.

Hamdy’s work in the machine learning field is focused on artificial neural network modeling. Specifically, he applied machine learning models to construct smart big data and cloud computing managers, asynchronous event-detection sensor networks, and his patented image compression technique, which utilizes neural network modeling to provide better performance than the well-known wavelet image compression (discrete-cosine) technology.

Hamdy’s most recent research is on designing a general smart and secure sensory system for very early prediction of asynchronous critical events (with many applications in civil/military domains). Such a warning system would help in preemptively dealing with a wide spectrum of critical events before their occurrence, through sensor networks and machine learning. Some example applications include body area networks, computing systems security, and environmental disasters (for example, forest fires, tsunamis, earthquakes, eruptions, borders intrusion, and military battlefield operations).

Hamdy has been a reviewer for Computing Reviews since 2011.


     

Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE
Li N., Yan Z., Wang M., Yang L. ACM Transactions on Cyber-Physical Systems 3(1): 1-23, 2018.  Type: Article

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber-physical social system for nearby strangers) that spans self-organized heterogene...

 

NV-clustering: normally-off computing using non-volatile datapaths
Roohi A., DeMara R. IEEE Transactions on Computers 67(7): 949-959, 2018.  Type: Article

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent intermittent computing, utilizing a newly developed n...

 

Global mobile satellite communications theory: for maritime, land and aeronautical applications (2nd ed.)
Ilcev S., Springer International Publishing, New York, NY, 2017. 599 pp.  Type: Book (978-3-319391-69-4)

At the core of recent world dynamics involving civil economic and military applications is global mobile satellite communications (GMSC), a vital component of the modern Internet. A very experienced author presents a comprehensive yet ...

 

Radio frequency modulation made easy
Faruque S., Springer International Publishing, New York, NY, 2016. 104 pp.  Type: Book (978-3-319412-00-9)

At the core of modern computer networking is wireless communication. The modulation of transmitted information is the noise-immune and powerful vehicle that safely carries the weak source analog/digital information for long distances o...

 

Betweenness centrality in delay tolerant networks
Magaia N., Francisco A., Pereira P., Correia M. Ad Hoc Networks 33(C): 284-305, 2015.  Type: Article

The need for larger, mobile, and dynamic networks--such as modern mobile ad hoc networks (MANETs)--is growing. Maintaining MANETs’ end-to-end routes at all times is not always guaranteed, due to node mobilit...

 
  more...

 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy