Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
 
Soliman, Hamdy
New Mexico Tech
Socorro, New Mexico
 
   Featured Reviewer
Follow this Reviewer
 
 
 

Hamdy Soliman has been a computer science teacher and researcher at New Mexico Tech since 1989. He has chaired the department, served as a graduate advisor for 18 years, is an active member of many committees (tenure, promotion, professorship, assessment, accreditation, advising, search), and is coordinator of the Sensor Network and Cyber Security Labs. He is also the author of six US patents and 82 journal and conference papers.

Hamdy’s research covers many areas, including all-fiber-optic network topologies and protocols, data-driven/task-flow computer systems, and soft computing applications. His current primary foci are computer/sensor network security, neural networks, and sensor network applications. He has several publications related to network communication protocols, mobile network security, ad hoc networks, and wireless sensor network event-detection systems.

One of his biggest contributions to server/cellphone security is a novel encryption algorithm, synchronous dynamic encryption system (SDES), which has shown better performance than AES, is secure against insiders, and is resistant to quantum computing attacks. This security research resulted in the development of five security patents.

Hamdy’s work in the machine learning field is focused on artificial neural network modeling. Specifically, he applied machine learning models to construct smart big data and cloud computing managers, asynchronous event-detection sensor networks, and his patented image compression technique, which utilizes neural network modeling to provide better performance than the well-known wavelet image compression (discrete-cosine) technology.

Hamdy’s most recent research is on designing a general smart and secure sensory system for very early prediction of asynchronous critical events (with many applications in civil/military domains). Such a warning system would help in preemptively dealing with a wide spectrum of critical events before their occurrence, through sensor networks and machine learning. Some example applications include body area networks, computing systems security, and environmental disasters (for example, forest fires, tsunamis, earthquakes, eruptions, borders intrusion, and military battlefield operations).

Hamdy has been a reviewer for Computing Reviews since 2011.

 
 
Options:
Date Reviewed  
 
1
- 10 of 10 reviews

   
  Securing Communication Data in Pervasive Social Networking Based on Trust with KP-ABE
Li N., Yan Z., Wang M., Yang L. ACM Transactions on Cyber-Physical Systems 3(1): 1-23, 2018.  Type: Article

This paper looks at the crucial issues of security, user privacy, and communication integrity, inherent to the pervasive social networking (PSN) (a cyber-physical social system for nearby strangers) that spans self-organized heterogene...

Apr 28 2022  
  NV-clustering: normally-off computing using non-volatile datapaths
Roohi A., DeMara R. IEEE Transactions on Computers 67(7): 949-959, 2018.  Type: Article

The much-needed downscaling of different core system architectures is significantly challenged by static power dissipation. The authors present a solution via middleware-transparent intermittent computing, utilizing a newly developed n...

Jun 19 2019  
  Global mobile satellite communications theory: for maritime, land and aeronautical applications (2nd ed.)
Ilcev S., Springer International Publishing, New York, NY, 2017. 599 pp.  Type: Book (978-3-319391-69-4)

At the core of recent world dynamics involving civil economic and military applications is global mobile satellite communications (GMSC), a vital component of the modern Internet. A very experienced author presents a comprehensive yet ...

Jul 26 2017  
  Radio frequency modulation made easy
Faruque S., Springer International Publishing, New York, NY, 2016. 104 pp.  Type: Book (978-3-319412-00-9)

At the core of modern computer networking is wireless communication. The modulation of transmitted information is the noise-immune and powerful vehicle that safely carries the weak source analog/digital information for long distances o...

May 12 2017  
  Betweenness centrality in delay tolerant networks
Magaia N., Francisco A., Pereira P., Correia M. Ad Hoc Networks 33(C): 284-305, 2015.  Type: Article

The need for larger, mobile, and dynamic networks--such as modern mobile ad hoc networks (MANETs)--is growing. Maintaining MANETs’ end-to-end routes at all times is not always guaranteed, due to node mobilit...

Jun 13 2016  
  Rule-based approaches for energy savings in an ambient intelligence environment
Stavropoulos T., Kontopoulos E., Bassiliades N., Argyriou J., Bikakis A., Vrakas D., Vlahavas I. Pervasive and Mobile Computing 19(C): 1-23, 2015.  Type: Article

Energy saving is essential for life on Earth. Hence, it is fundamental in developing new important ambient intelligence (AmI) systems, for example, applications in smart homes, health, transportation, emergency, education, and the work...

Dec 18 2015  
  Towards fast rerouting-based energy efficient routing
Yang Y., Xu M., Li Q. Computer Networks 701-15, 2014.  Type: Article

In this era of massive cyber traffic, there is a corresponding number of Internet devices consuming billions of watts, independent of traffic loads. Proposed solutions to this energy problem include aggregating traffic to improve routi...

Feb 6 2015  
  Wireless sensor network lifetime maximization by optimal sensor deployment, activity scheduling, data routing and sink mobility
Keskin M., Altınel İ., Aras N., Ersoy C. Ad Hoc Networks 1718-36, 2014.  Type: Article

Energy conservation is vital to wireless sensor networks (WSNs) in light of the inherently limited sensor power budget and the need for massive deployment of low-cost sensor nodes. One major source of power consumption is the challengi...

Nov 3 2014  
  SenSmart: adaptive stack management for multitasking sensor networks
Chu R., Gu L., Liu Y., Li M., Lu X. IEEE Transactions on Computers 62(1): 137-150, 2013.  Type: Article

The ever-growing field of sensor network technology will continue to play a profound role in our lives. These sensors are our hands, eyes, and ears for investigating places ranging from our own bodies (bloodstream, organs, and limbs) t...

Jul 29 2013  
  The balance of routing energy consumption in wireless sensor networks
Zhang X., Wu Z. Journal of Parallel and Distributed Computing 71(7): 1024-1033, 2011.  Type: Article

Energy conservation is vital to wireless sensor networks (WSNs) due to the inherently limited sensor power budget. WSN routing consumes a lot of power, ergo sensor deployment density in the field is critical to routing and power effici...

Sep 30 2011  
 
 
 
Display per column
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy