Fitzroy NembhardFlorida Institute of Technology · Department of Computer Science
Fitzroy Nembhard
Ph.D.
About
20
Publications
4,178
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
62
Citations
Introduction
An IEEE Senior Member, Fitzroy Nembhard received a PhD in Computer Science from Florida Institute of Technology under advisor Dr. Marco Carvalho. He also holds a M.Sc in Bioinformatics from Morgan State University in Baltimore, MD. Fitzroy's research interests include High Performance Computing, Secure Programming (Developing tools to help programmers write secure code), Data Mining, development of Bioinformatics tools and algorithms, and Computer Graphics.
Publications
Publications (20)
Numerous agent-oriented methodologies that offer a rich pool of resources to support developers of agent-based systems have been proposed. However, the use of existing method-ologies in industrial settings is still limited due to the large volume of methodologies, diversity of covered scopes, ambiguity in concepts, and lack of maturity. This makes...
There has been substantial focus on software metrics over the last few decades. However, many activities within software engineering are often qualitative and are not consonant with automated approaches. Consequently, there are few tools to measure software development quality or to assess teamwork contribution. This paper uses ideas from the Goal-...
Secure coding is crucial for the design of secure and efficient software and computing systems. However, many programmers avoid secure coding practices for a variety of reasons. Some of these reasons are lack of knowledge of secure coding standards, negligence, and poor performance of and usability issues with existing code analysis tools. Therefor...
The current and next generations of cellular networks produce a massive amount of data. With this vast parameter increase, cellular communication networks have grown incredibly complicated. In addition, these cellular networks are unmanaged with conventional techniques, and a more advanced design and optimization methodology that depends on Machine...
As the field of software testing continues to advance, cooperative software testing and analysis has been proposed as a new methodology to help combat the challenges involved with performing highly effective software testing. Motivated by the understanding that auto-testing systems on their own are not powerful enough to address complications in te...
Software maintenance and innovation are constant challenges across industries, especially as programming languages evolve with tech- nology. Similarly, poor lexicon quality degrades program compre- hension, increasing the effort required by developers to improve existing software products. To address these challenges, we propose a novel automated f...
As the field of software testing continues to advance, cooperative software testing and analysis has been proposed as a new methodology to help combat the challenges involved with performing highly effective software testing. Motivated by the understanding that auto-testing systems on their own are not powerful enough to address complications in te...
The use of virtual assistants has grown significantly in recent years. This growth can be attributed to the prevalence of mobile devices and advances in the Internet of Things (IoT). While virtual assistants are widely used for interpersonal and social purposes such as ordering items from restaurants, creating reminders, and communicating with peer...
The use of virtual assistants has grown significantly in recent years.
This growth can be attributed to the prevalence of mobile devices and advances in the Internet of Things (IoT). While virtual assistants are widely used for interpersonal and social purposes such as ordering items from restaurants, creating reminders, and communicating with peer...
Static analysis remains one of the most popular approaches for detecting and correcting poor or vulnerable program code. It involves the examination of code listings, test results, or other documentation to identify errors, violations of development standards, or other problems, with the ultimate goal of fixing these errors so that systems and soft...
The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilit...
The area of software development and secure coding can benefit significantly from advancements in virtual assistants. Research has shown that many coders neglect security in favor of meeting deadlines. This shortcoming leaves systems vulnerable to attackers. While a plethora of tools are available for programmers to scan their code for vulnerabilit...
Network motifs have been widely used in the analysis of various biological networks, including protein-protein interaction (PPI) networks, transcription regulation networks (TRNs), and metabolic networks. Counting network motif involves expensive enumeration of sub-patterns and graph isomorphism. Many protein-protein interaction data-bases are read...
This paper discusses a solution that deploys passive UHF RFID technology and wireless sensors on small farms to provide intelligence that will help mitigate some disparate socioeconomic conditions in farming communities. Starting with a collaborative effort with farmers in the community of Holopaw, Florida, in the United States, we first propose ex...
Classification of network traffic is an important problem in Cyber Security. Techniques in Data Mining and Machine Learning have been successfully applied to the classification problem. However, few benchmarks have been provided to give researchers some intuition on the performances of popular algorithms in network traffic classification. We addres...