Kevin Daimi’s research while affiliated with University of Detroit Mercy and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (22)


Figure 1: The proposed Test Selection Approach. 
Table 1 : Description of Metrics
Table 4 : Top Three Classes for Commons Math
Table 5 : Results of the proposed approach
Test Case Selection using Software Complexity and Volume Metrics
  • Conference Paper
  • Full-text available

October 2015

·

415 Reads

·

3 Citations

·

Kevin Daimi

·

Yujun Wang

·

Many software systems contain large number of classes which make software testing very difficult. As software systems evolve, test suites become very large. It is usually very expensive to execute the entire test suites. Therefore, focusing the testing on the more error-prone classes helps in reducing the testing cost. In this work, we propose an approach for test case selection using software metrics. We examine the ability of several complexity and volume metrics to find the most complex and error-prone classes. Testers can then run test cases that are associated with the complex classes only. We focus our experiments on systems written in Java and tested with the JUnit testing framework. The results reveal that the proposed approach significantly reduce the number of test cases needed while detecting most of seeded errors.

Download

Figure 1. Training outcome 
Figure 3. WEKA output on unseen instances 
Attributes Set
Using Data Mining to Predict Possible Future Depression Cases

December 2014

·

297 Reads

·

10 Citations

International Journal of Public Health Science (IJPHS)

Depression is a disorder characterized by misery and gloominess felt over a period of time. Some symptoms of depression overlap with somatic illnesses implying considerable difficulty in diagnosing it. This paper contributes to its diagnosis through the application of data mining, namely classification, to predict patients who will most likely develop depression or are currently suffering from depression. Synthetic data is used for this study. To acquire the results, the popular suite of machine learning software, WEKA, is used.


Figure 1. Training outcome 
Table 1 . Attributes Set 
Figure 3. WEKA output on unseen instances 
Using Data Mining to Predict Possible Future Depression Cases

December 2014

·

3,819 Reads

·

21 Citations

International Journal of Public Health Science (IJPHS)

Depression is a disorder characterized by misery and gloominess felt over a period of time. Some symptoms of depression overlap with somatic illnesses implying considerable difficulty in diagnosing it. This paper contributes to its diagnosis through the application of data mining, namely classification, to predict patients who will most likely develop depression or are currently suffering from depression. Synthetic data is used for this study. To acquire the results, the popular suite of machine learning software, WEKA, is used.


Using Data Mining to Predict Possible Future Depression Cases

December 2014

·

49 Reads

·

16 Citations

International Journal of Public Health Science (IJPHS)

Depression is a disorder characterized by misery and gloominess felt over a period of time. Some symptoms of depression overlap with somatic illnesses implying considerable difficulty in diagnosing it. This paper contributes to its diagnosis through the application of data mining, namely classification, to predict patients who will most likely develop depression or are currently suffering from depression. Synthetic data is used for this study. To acquire the results, the popular suite of machine learning software, WEKA, is used.


Security Challenges in Cognitive Radio Networks

July 2014

·

157 Reads

·

19 Citations

Cognitive radio network (CRN) is an evolving concept aiming at more efficiently exploiting the available spectrum for opportunistic network usage. Deploying Cognitive Radio Networks raises several open issues and security concerns. CRNs suffer from both classical wireless networks vulnerabilities and threats, and new threats related to their inherent functionalities. In this paper, an overview of the cognitive radio networks and their security challenges will be provided. Both, the traditional and new security threats that emerged from these promising networks are addressed. The paper will also focus on the Primary User Emulation (PUE) attack as one of the main specific attacks targeting CRNs and analyze some proposed countermeasure. Furthermore, CRN security requirements are introduced.


A Multi-Level Security Architecture for Vehicular Ad Hoc Network

July 2014

·

10 Reads

·

3 Citations

Within few years, vehicles communicating with other vehicles to provide information about road conditions, accidents, fires, or emergency cases, will be a reality. Vehicles will also have access to the internet. As a result, future vehicles networks security should be designed to cope with various kinds of attacks. Furthermore, security requirements including confidentiality, integrity, privacy, and nonrepudiation should be enforced. This paper introduces multi-level security architecture for vehicular ad hoc networks (VANETs). Based on this architecture, the security protocols for Vehicle-to-Vehicle (V2V), Vehicle-to-Roadside Unit (V2R), and Roadside-to-Roadside Unit (R2R) will be presented.


Centralized Smart Meter-to-Collector Communications Security

June 2014

·

42 Reads

·

2 Citations

The Traditional Power utilities are gradually moving towards the Smart Grids. These Grids deploy a very large number of smart meters at the consumers' sites using bi-directional communication networks based on Internet protocols. With the reliance on these protocols, the Smart Grids become vulnerable to various cyber-attacks. Smart meters collect consumption data and allow customers other useful functions. Consumers are worried about the privacy, integrity, availability, and confidentiality when managing their future power consumption. In an attempt to contribute to the protection of these smart meters from attacks, two approaches based on cryptographic protocols are proposed for securing the direct connection of smart meters to collectors.





Citations (12)


... Mahdi Mohammadi et al. [4] attempt to use a data extraction technique to identify the EEG of patients with MDD and VHS. It includes (A) Data pre-processing and application of linear discriminant analysis (LDA) for mapping characteristics in a new space of features through the application of genetic algorithms (GAs) for the classification of essential characteristics. ...

Reference:

Predicting Mental Disorders Using Data Mining Techniques
Using Data Mining to Predict Possible Future Depression Cases
  • Citing Article
  • December 2014

International Journal of Public Health Science (IJPHS)

... The exponential increase of health digital data allows the application of ML to extract patterns and rules that have been used to support medical diagnosis [38]. Recently, ML techniques have been used in psychiatry to analyze medical electronic health records (EHR) from patients with mental disorders [39] as a way to predict results in clinical decision-making processes [40,41], and to support identifying patients "at risk of developing depression" [42]. ...

Using Data Mining to Predict Possible Future Depression Cases

International Journal of Public Health Science (IJPHS)

... A. Nikolaos et al [40] utilized tickets as cryptographic tokens to comply with vehicular communication standards yet preserve the privacy of the vehicle. D. Kevin et al [42] proposed the use of a tree like structure and called multi-level security architecture for VANETs. In this work when a node is attacked the parent node will deactivate the attacked node and redistribute the keys in that area. ...

A Multi-Level Security Architecture for Vehicular Ad Hoc Network
  • Citing Article
  • July 2014

... These models utilize diverse features, including demographic, behavioral, and physiological data, to enhance mental health predictions [36][37][38]. For instance, a study [39] used DT to predict future depression cases based on various data features, including behavioral and demographic information, achieving high classification accuracy. Similarly, another study [40] demonstrated the effectiveness of ensemble learning techniques for early diagnosis of anxiety and depression, utilizing electronic health records (EHRs) and self-reported survey data to improve predictive performance. ...

Using Data Mining to Predict Possible Future Depression Cases

International Journal of Public Health Science (IJPHS)

... In order to predict the number of test cases, an approach was developed in [12]; it suppose that complex methods comprise more errors, which needs executing more test cases, [14] and [23] examined the ability of complexity and size metrics to determine the most complex and error-prone classes. [18] suggested a concept; it consists of combining different testing patterns into similar test suite to test various aspects through running one single test exactly once. ...

Test Case Selection using Software Complexity and Volume Metrics

... The goal of this study is to stimulate research activities aimed at laying the groundwork for new advanced communication systems for efficient underwater communication and networking for improved ocean monitoring and exploration applications [2]. In [6], a quick introduction of cognitive radio networks and their security concerns are discussed. Then, they analysed some possible countermeasures for the Primary User Emulation attack. ...

Security Challenges in Cognitive Radio Networks

... Notably, most respondents gave good feedback towards the system usage where 96.4% 'strongly agreed' and 'agreed' with the statement (I will vote in the same way in the upcoming campus elections represented), which gives an indication that they will reuse the same platform in the future. In the words of Daimi, Snyder and James (2006), any errors in using the voting system will result in failure of the egalitarianism in choosing the right candidate, which will affect the integrity and disappointment of voters. The voting process was conducted in a transparent and fair manner. ...

Requirements Engineering for E-Voting Systems.
  • Citing Conference Paper
  • January 2006

... Some of these features are common skills with CT, such as problem-solving, creative thinking, and collaborative thinking (Korkmaz et al., 2017). Daimi and Rayess (2008) point out the relationship between CT and entrepreneurship, emphasizing that CT paves the way for entrepreneurial thinking. According to the literature, CT can contribute to the development of entrepreneurial characteristics (Kang & Lee, 2020;Sarı et al., 2022a). ...

The Role of Software Entrepreneurship in Computer Science Curriculum.