Fitzroy Nembhard

Fitzroy Nembhard
Florida Institute of Technology · Department of Computer Science

Ph.D.

About

20
Publications
4,178
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
62
Citations
Introduction
An IEEE Senior Member, Fitzroy Nembhard received a PhD in Computer Science from Florida Institute of Technology under advisor Dr. Marco Carvalho. He also holds a M.Sc in Bioinformatics from Morgan State University in Baltimore, MD. Fitzroy's research interests include High Performance Computing, Secure Programming (Developing tools to help programmers write secure code), Data Mining, development of Bioinformatics tools and algorithms, and Computer Graphics.

Publications

Publications (20)
Conference Paper
Full-text available
Numerous agent-oriented methodologies that offer a rich pool of resources to support developers of agent-based systems have been proposed. However, the use of existing method-ologies in industrial settings is still limited due to the large volume of methodologies, diversity of covered scopes, ambiguity in concepts, and lack of maturity. This makes...
Conference Paper
Full-text available
There has been substantial focus on software metrics over the last few decades. However, many activities within software engineering are often qualitative and are not consonant with automated approaches. Consequently, there are few tools to measure software development quality or to assess teamwork contribution. This paper uses ideas from the Goal-...
Article
Full-text available
Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowledge of secure coding standards, negligence, and poor performance of and usability issues with existing code analysis tools. Therefor...
Article
Full-text available
The current and next generations of cellular networks produce a massive amount of data. With this vast parameter increase, cellular communication networks have grown incredibly complicated. In addition, these cellular networks are unmanaged with conventional techniques, and a more advanced design and optimization methodology that depends on Machine...
Chapter
Full-text available
As the field of software testing continues to advance, cooperative software testing and analysis has been proposed as a new methodology to help combat the challenges involved with performing highly effective software testing. Motivated by the understanding that auto-testing systems on their own are not powerful enough to address complications in te...
Conference Paper
Full-text available
Software maintenance and innovation are constant challenges across industries, especially as programming languages evolve with tech- nology. Similarly, poor lexicon quality degrades program compre- hension, increasing the effort required by developers to improve existing software products. To address these challenges, we propose a novel automated f...
Conference Paper
Full-text available
As the field of software testing continues to advance, cooperative software testing and analysis has been proposed as a new methodology to help combat the challenges involved with performing highly effective software testing. Motivated by the understanding that auto-testing systems on their own are not powerful enough to address complications in te...
Chapter
Full-text available
The use of virtual assistants has grown significantly in recent years. This growth can be attributed to the prevalence of mobile devices and advances in the Internet of Things (IoT). While virtual assistants are widely used for interpersonal and social purposes such as ordering items from restaurants, creating reminders, and communicating with peer...
Conference Paper
Full-text available
The use of virtual assistants has grown significantly in recent years. This growth can be attributed to the prevalence of mobile devices and advances in the Internet of Things (IoT). While virtual assistants are widely used for interpersonal and social purposes such as ordering items from restaurants, creating reminders, and communicating with peer...
Preprint
Full-text available
Static analysis remains one of the most popular approaches for detecting and correcting poor or vulnerable program code. It involves the examination of code listings, test results, or other documentation to identify errors, violations of development standards, or other problems, with the ultimate goal of fixing these errors so that systems and soft...
Chapter
Full-text available
The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilit...
Preprint
Full-text available
The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilit...
Chapter
Full-text available
Network motifs have been widely used in the analysis of various biological networks, including protein-protein interaction (PPI) networks, transcription regulation networks (TRNs), and metabolic networks. Counting network motif involves expensive enumeration of sub-patterns and graph isomorphism. Many protein-protein interaction data-bases are read...
Poster
Full-text available
This paper discusses a solution that deploys passive UHF RFID technology and wireless sensors on small farms to provide intelligence that will help mitigate some disparate socioeconomic conditions in farming communities. Starting with a collaborative effort with farmers in the community of Holopaw, Florida, in the United States, we first propose ex...
Poster
Full-text available
Classification of network traffic is an important problem in Cyber Security. Techniques in Data Mining and Machine Learning have been successfully applied to the classification problem. However, few benchmarks have been provided to give researchers some intuition on the performances of popular algorithms in network traffic classification. We addres...

Network

Cited By