Khaled Elleithy
#167,851
Most Influential Person Now
Egyptian professor
Khaled Elleithy's AcademicInfluence.com Rankings
Khaled Elleithycomputer-science Degrees
Computer Science
#10387
World Rank
#10907
Historical Rank
Machine Learning
#4846
World Rank
#4903
Historical Rank
Artificial Intelligence
#5218
World Rank
#5289
Historical Rank
Database
#7613
World Rank
#7906
Historical Rank

Download Badge
Computer Science
Khaled Elleithy's Degrees
- PhD Computer Science University of Windsor
- Masters Computer Science University of Windsor
- Bachelors Computer Science Cairo University
Similar Degrees You Can Earn
Why Is Khaled Elleithy Influential?
(Suggest an Edit or Addition)According to Wikipedia, Khaled Elleithy is an Egyptian professor of Computer Science and Engineering. He is the current Dean of the College of Engineering, Business, and Education and he is also serving as Associate Vice President for Graduate Studies and Research at the University of Bridgeport.
Khaled Elleithy's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Sensor-Based Assistive Devices for Visually-Impaired People: Current Status, Challenges, and Future Directions (2017) (200)
- A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC (2017) (96)
- A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes (2016) (92)
- Retinal Vessels Segmentation Techniques and Algorithms: A Survey (2018) (85)
- Fast and flexible architectures for RNS arithmetic decoding (1992) (82)
- A highly secure video steganography using Hamming code (7, 4) (2014) (80)
- Detection of obstructive sleep apnea through ECG signal features (2012) (71)
- Obstructive sleep apnea detection using SVM-based classification of ECG signal features (2012) (71)
- A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11) (2015) (69)
- Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks (2014) (68)
- Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis (2015) (65)
- A Neural Network System for Detection of Obstructive Sleep Apnea Through SpO2 Signal Features (2012) (57)
- Novel Algorithms and Techniques In Telecommunications, Automation and Industrial Electronics (2008) (56)
- Compressed and raw video steganography techniques: a comprehensive survey and analysis (2017) (55)
- Innovative Algorithms and Techniques in Automation, Industrial Electronics and Telecommunications (2007) (52)
- A novel video steganography algorithm in the wavelet domain based on the KLT tracking algorithm and BCH codes (2015) (49)
- Stages-Based ECG Signal Analysis From Traditional Signal Processing to Machine Learning Approaches: A Survey (2020) (47)
- Apnea Detection based on Respiratory Signal Classification (2013) (47)
- Trajectory Planning and Collision Avoidance Algorithm for Mobile Robotics System (2016) (43)
- Comparison of autoencoder and Principal Component Analysis followed by neural network for e-learning using handwritten recognition (2017) (42)
- Sensor Fusion Based Model for Collision Free Mobile Robot Navigation (2015) (41)
- Denial of Service Attack Techniques: Analysis, Implementation and Comparison (2005) (40)
- LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks (2013) (38)
- SECURITY IN WIRELESS SENSOR NETWORKS : KEY MANAGEMENT MODULE IN SOOAWSN (2010) (38)
- A DCT-based robust video steganographic method using BCH error correcting codes (2016) (38)
- A Highly Accurate and Reliable Data Fusion Framework for Guiding the Visually Impaired (2018) (36)
- A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes (2015) (35)
- Steganography in Arabic text using Kashida variation algorithm (KVA) (2013) (34)
- Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks (2017) (34)
- Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions (2016) (34)
- Steganography by multipoint Arabic letters (2012) (33)
- A Highly Accurate Deep Learning Based Approach for Developing Wireless Sensor Network Middleware (2018) (33)
- A New MAC Address Spoofing Detection Technique Based on Random Forests (2016) (30)
- EM-SEP: An efficient modified stable election protocol (2014) (29)
- Video steganography techniques: Taxonomy, challenges, and future directions (2017) (29)
- Dynamic Clustering of Heterogeneous Wireless Sensor Networks using a Genetic Algorithm, Towards Balancing Energy Exhaustion (2015) (29)
- A systolic architecture for modulo multiplication (1995) (28)
- A majority voting technique for Wireless Intrusion Detection Systems (2016) (28)
- Underwater wireless sensor network communication using electromagnetic waves at resonance frequency 2.4 GHz (2012) (27)
- Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node—MAC Hybrid Protocol for Wireless Sensor Networks (2015) (27)
- Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees (2018) (27)
- A novel video steganography algorithm in DCT domain based on hamming and BCH codes (2016) (27)
- IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence (2009) (26)
- Investigating the performance of apodized Fiber Bragg gratings for sensing applications (2014) (26)
- Technological Developments in Networking, Education and Automation (2010) (26)
- Advances and Innovations in Systems, Computing Sciences and Software Engineering (2007) (25)
- Innovations and Advances in Computing, Informatics, Systems Sciences, Networking and Engineering (2015) (24)
- SECURITY IN WIRELESS SENSOR NETWORKS - IMPROVING THE LEAP PROTOCOL (2012) (23)
- Innovations and Advanced Techniques in Systems, Computing Sciences and Software Engineering (2008) (22)
- Epilepsy seizure detection using EEG signals (2017) (22)
- Android Malware Family Classification and Analysis: Current Status and Future Directions (2020) (22)
- Quantum key distribution by using public key algorithm(RSA) (2013) (21)
- Femto Cells: Current Status and Future Directions (2011) (21)
- Secure Intelligent Vehicular Network Using Fog Computing (2019) (21)
- An empirical fingerprint framework to detect Rogue Access Points (2015) (20)
- Multiclass ECG Signal Analysis Using Global Average-Based 2-D Convolutional Neural Network Modeling (2021) (20)
- The fringing and resonance frequency of cylindrical microstrip printed antenna as a function of curvature (2011) (19)
- An Efficient Video Steganography Algorithm Based on BCH Codes (2015) (19)
- Advances in Computer, Information, and Systems Sciences, and Engineering: Proceedings of IETA 2005, TeNe 2005 and EIAE 2005 (2006) (19)
- Steganography in text by using MS word symbols (2014) (19)
- Multi-sensor based collision avoidance algorithm for mobile robot (2015) (18)
- Input Impedance, VSWR and Return Loss of a Conformal Microstrip Printed Antenna for TM 01 Mode Using Two Different Substrates (2012) (17)
- Emerging Trends in Computing, Informatics, Systems Sciences, and Engineering (2013) (16)
- Least Distance Smart Neighboring Search (LDSNS) over Wireless Sensor Networks (WSNs) (2013) (16)
- A Passive Fingerprint Technique to Detect Fake Access Points (2015) (15)
- Real-Time Detection of DoS Attacks in IEEE 802.11p Using Fog Computing for a Secure Intelligent Vehicular Network (2019) (15)
- Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks (2015) (15)
- Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks (2015) (15)
- CMOS Image Sensors in Surveillance System Applications (2021) (15)
- Smart phone application development for monitoring epilepsy seizure detection based on EEG signal classification (2017) (14)
- Automated adaptive learning using smart shortest path algorithm for course units (2015) (14)
- Interference of 802.11B WLAN and Bluetooth: Analysis and Performance Evaluation (2010) (14)
- Development of efficient obstacle avoidance and line following mobile robot with the integration of fuzzy logic system in static and dynamic environments (2016) (14)
- The Performance of a Cylindrical Microstrip Printed Antenna for TM 10 Mode as a Function of Temperature for Different Substrates (2011) (14)
- Effect of Temperature on The Performance of a Cylindrical Microstrip Printed Antenna for Tm01 Mode Using Different Substrates (2011) (14)
- Effective M-learning design Strategies for computer science and Engineering courses (2012) (13)
- theta (logN) architectures for RNS arithmetic decoding (1989) (13)
- An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data Communication (2016) (12)
- TERP: A Trusted and Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs) (2013) (12)
- WIMAX BASICS FROM PHY LAYER TO SCHEDULING AND MULTICASTING APPROACHES (2011) (12)
- A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks (2009) (12)
- Innovations and Advances in Computer, Information, Systems Sciences, and Engineering (2013) (12)
- Performance Analysis of a Microstrip Printed Antenna Conformed on Cylindrical Body at Resonance Frequency 4.6 GHz for TM01 Mode (2012) (11)
- A highly accurate machine learning approach for developing wireless sensor network middleware (2018) (11)
- Network intrusion detection using hardware techniques: A review (2016) (11)
- Automated Energy Saving (AES) Paradigm to Support Pedagogical Activities over Wireless Sensor Networks (2012) (11)
- Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs) (2013) (11)
- Initiated decoy states in quantum key distribution protocol by 3 ways channel (2015) (11)
- A Multi-Anatomical Retinal Structure Segmentation System for Automatic Eye Screening Using Morphological Adaptive Fuzzy Thresholding (2018) (11)
- Data fusion models in WSNs: Comparison and analysis (2014) (11)
- QKDP's comparison based upon quantum cryptography rules (2016) (11)
- Comparative Analysis of Selective Forwarding Attacks over Wireless Sensor Networks (2015) (10)
- A theta (1) algorithm for modulo addition (1990) (10)
- Nomenclature of Medium Access Control Protocol over Wireless Sensor Networks (2016) (10)
- Advances in Systems, Computing Sciences and Software Engineering: Proceedings of SCSS 2005 (2006) (10)
- Novel Steganography over HTML Code (2015) (10)
- Sorting N elements using quantum entanglement sets (2013) (10)
- Text Steganography Using Language Remarks (2013) (10)
- A new algorithm for three-party Quantum key distribution (2013) (10)
- Minimizing the Null Message Exchange in Conservative Distributed Simulation (2007) (9)
- New Trends in Networking, Computing, E-learning, Systems Sciences, and Engineering (2015) (9)
- Classification and detection of fire on WSN using IMB400 multimedia sensor board (2013) (9)
- Modified LEACH - Energy Efficient Wireless Networks Communication (2008) (9)
- Selective Forwarding Attacks Detection in WSNs (2015) (9)
- TOPOLOGY MANAGEMENT IN WIRELESS SENSOR NETWORKS : MULTI -STATE ALGORITHMS (2012) (9)
- Pheromone termite (PT) model to provide robust routing over Wireless Sensor Networks (2014) (9)
- A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels (2017) (8)
- A new approach for detecting and monitoring of selective forwarding attack in wireless sensor networks (2016) (8)
- Optimized Node Selection Process for quality of service provisioning over wireless multimedia sensor networks (2016) (8)
- Cloud Computing: The Future of it Industry (2012) (8)
- Prevention of Wormhole Attacks in Wireless Sensor Networks (2014) (8)
- An Efficient Approach to Reduce the Energy Consumption in Wireless Sensor Networks through Active Nodes Optimization (2007) (8)
- Architecture based prototypes for mobile collaborative learning (MCL) to improve pedagogical activities (2011) (8)
- Using a Queuing Model to Analyze the Performance of Web Servers (2002) (8)
- Scalable and energy efficient medium access control protocol for wireless sensor networks (2015) (8)
- COMBINING PRIVATE AND PUBLIC KEY ENCRYPTION TECHNIQUES FOR PROVIDING EXTREME SECURE ENVIRONMENT FOR AN ACADEMIC INSTITUTION APPLICATION (2010) (8)
- An efficient automated technique for epilepsy seizure detection using EEG signals (2017) (8)
- A novel obstacle avoidance system for guiding the visually impaired through the use of fuzzy control logic (2018) (7)
- An Optimal and Energy Efficient Multi-Sensor Collision-Free Path Planning Algorithm for a Mobile Robot in Dynamic Environments (2017) (7)
- Automated Adaptive Mobile Learning System using Shortest Path Algorithm and Learning Style (2018) (7)
- ECG Signal Analysis Using 2-D Image Classification with Convolutional Neural Network (2019) (7)
- Multi-Layer Approach for the Detection of Selective Forwarding Attacks (2015) (7)
- A new algorithm based on discrete fourier transform to improve the lifetime of underwater Wireless Sensor Networks communications (2014) (7)
- Cost Analysis of 5th Generation Technology (2014) (7)
- TCP-UB: A New congestion aware transmission control protocolvariant (2012) (7)
- Network traffic characterization for high-speed networks supporting multimedia (2001) (7)
- Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks (2018) (7)
- Automation of the Baggage Check-in Process Using RFID System in Airports (2019) (7)
- Fast real-time hardware engine for Multipoint Text Steganography (2014) (6)
- Mobility-Aware Hybrid Medium Access Control Protocol for Wireless Sensor Network ( WSN ) (2014) (6)
- Data Fusion in WSNs: Architecture, Taxonomy, Evaluation of Techniques, and Challenges (2015) (6)
- Highly efficient novel text steganography algorithms (2015) (6)
- Group signature entanglement in e-voting system (2014) (6)
- Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, Bridgeport, Con (2010) (6)
- Transformation matrix algorithm for reducing the computational complexity of multiuser receivers for DS-CDMA wireless systems (2007) (6)
- Secure and efficient key management protocol (SEKMP) for wireless sensor networks (2014) (5)
- Simulation based Study of TCP Variants in Hybrid Network (2014) (5)
- Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks (2017) (5)
- Optimized Algorithm for Fire Detection over WSN using Micaz Motes (2012) (5)
- Detecting and Minimizing Bad Posture Using Postuino among Engineering Students (2014) (5)
- An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks (2016) (5)
- Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs) (2014) (5)
- Efficient key distribution protocol for wireless sensor networks (2018) (5)
- Mobile and Wi-Fi Geo location using Google Latitude (2013) (5)
- Selective forwarding detection (SFD) in wireless sensor networks (2015) (5)
- AN EFFICIENT OPTIMISTIC TIME MANAGEMENT ALGORITHM FOR DISCRETE-EVENT SIMULATION SYSTEM (2010) (5)
- Authenticated multiparty secret key sharing using quantum entanglement swapping (2014) (5)
- A closed-form expression for BER to quantify MAI for synchronous DS-CDMA multi-user detector (2008) (5)
- Quantum security using property of a quantum wave function (2014) (4)
- Directed diffusion based on weighted Grover's quantum algorithm (DWGQ) (2015) (4)
- QKD protocol based on entangled states by trusted third party (2017) (4)
- Human Body-Related Disease Diagnosis Systems Using CMOS Image Sensors: A Systematic Review (2021) (4)
- A new mathematical model for optimizing the performance of parallel and discrete event simulation systems (2008) (4)
- Reducing null message traffic in large parallel and distributed systems (2008) (4)
- Trees and Butterflies Barriers in Distributed Simulation System: A Better Approach to Improve Latency and the Processor Idle Time (2007) (4)
- A Hybrid Model for Driver Emotion Detection Using Feature Fusion Approach (2022) (4)
- Virtual Wireless and Mobile Communication Laboratory (2012) (4)
- Quantum Entanglement Distribution for Secret Key Establishment in Metropolitan Optical Networks (2016) (4)
- A Novel Vision-Based Classification System for Explosion Phenomena (2017) (4)
- A genetic algorithm for register allocation (1999) (4)
- Interactive Prototypes to Foster Pedagogical Activities for Mobile Collaborative Learning Environment (MCLE) (2012) (4)
- A generic optimized time management algorithms (OTMA) framework for simulating large-scale overlay networks (2011) (4)
- Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL) (2012) (4)
- A framework for high level synthesis of digital architectures from u-recursive algorithms (1990) (4)
- High-Efficiency Crystalline Silicon-Based Solar Cells Using Textured TiO2 Layer and Plasmonic Nanoparticles (2022) (4)
- A Panoramic Study of Fall Detection Technologies (2016) (4)
- A High Performance and Efficient TCP Variant (2012) (3)
- Battery independence: Reducing the dependence on batteries in wearable computing through energy harvesting techniques (2017) (3)
- Secret key sharing using entanglement swapping and remote preparation of quantum state (2014) (3)
- A novel secure quantum key distribution algorithm (2014) (3)
- A formal framework for high level synthesis of digital designs (1990) (3)
- Cloud Computing Algebra Homomorphic Encryption Scheme Based on Fermat's Little Theorem (2013) (3)
- Quantum observable (2013) (3)
- An efficient message authentication and source privacy with a hidden generator point based on ECC (2015) (3)
- A theta (log n) algorithm for modulo multiplication (1989) (3)
- High-level abstractions in wireless sensor networks: Status, taxonomy, challenges, and future directions (2014) (3)
- Stability and Performance of Interconnected DC/DC Converter Systems (2006) (3)
- Formal Synthesis of a Parallel Architectures from Recursive Equations (1990) (3)
- Optimization and Job Scheduling in Heterogeneous Networks (2008) (3)
- A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes (2015) (3)
- An Interactive and Self-instructional Virtual Chemistry Laboratory (2016) (3)
- Reducing null messages using grouping and status retrieval for a conservative discrete-event simulation system (2009) (3)
- Performance Advancement of Wireless Sensor Networks using Low Power Techniques and Efficient Placement of Nodes (2014) (3)
- Resonance Frequency , Gain , Efficiency and Quality Factor of a Microstrip Printed Antenna as a Function of Curvature for TM 01 mode Using Different Substrates (2012) (3)
- An opportunistic frequency channels selection scheme for interference minimization (2014) (3)
- An automated region-of-interest segmentation for optic disc extraction (2018) (3)
- Improved monostatic pulse radar design using ultra wide band for range estimation (2016) (3)
- A Reliable and Fast Real-Time Hardware Engine for Text Steganography (2014) (3)
- Random word retrieval for automatic story generation (2014) (3)
- Design, Analysis and Implementation of a Cyber Vote System (2007) (3)
- Performance analysis of WDM-PON FTTH using different pulse shapes at 10 Gbps and 20 Gbps (2014) (3)
- Quantum mutual authentication scheme based on Bell state measurement (2016) (3)
- Fast real-time hardware engine for ZWC text steganography (2014) (3)
- Effect of Curvature on the Performance of Cylindrical Microstrip Printed Antenna for TM01 mode (2012) (3)
- Conformal microstrip printed antenna (2012) (3)
- Simultaneous Initiating EPR and Quantum Channel by Quantum Key Distribution Protocol (2016) (3)
- Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits (2017) (2)
- A QUANTITATIVE ANALYSIS OF HANDOVER TIME AT MAC LAYER FOR WIRELESS MOBILE NETWORKS (2009) (2)
- Hierarchically Segmented Routing Protocol for MANETs (2008) (2)
- Controlling Attacks of Rogue Dynamic Host Configuration Protocol (DHCP) to Improve Pedagogical Activities in Mobile Collaborative Learning (MCL) Environment (2012) (2)
- A formal design methodology for parallel architectures (1990) (2)
- High Performance Polymer Solar Cells Using Grating Nanostructure and Plasmonic Nanoparticles (2022) (2)
- Malicious behavior monitoring of embedded medical devices (2017) (2)
- An Efficient Routing Algorithm for Mesh-Hypercube (M-H) Networks (2008) (2)
- A Dynamic Clustering Algorithm for Object Tracking and Localization in WSN Title (Conference/Workshop paper) (2014) (2)
- Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities (2012) (2)
- Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network (2013) (2)
- Analytical Study of Pre-congestion notification (PCN) techniques (2012) (2)
- Energy efficient hidden node detection for improving Quality of Service in wireless multimedia sensor networks (2016) (2)
- A highly Reliable and Fully Automated Classification System for Sleep Apnea Detection (2016) (2)
- Security in wireless sensor networks: key intrusion detection module in SOOAWSN (2011) (2)
- Automated Adaptive Mobile Learning System using the Semantic Web (2016) (2)
- Robust Sink Failure Avoidance Protocol for Wireless Sensor Networks (2014) (2)
- VLSI implementation of a systolic database machine for relational algebra and hashing (1991) (2)
- Parallel Processing for Multi Face Detection and Recognition (2012) (2)
- Research Learning Theories that Entail M-Learning Education Related to Computer Science and Engineering Courses - TI Journals (2013) (2)
- A Mathematical Model for Evaluating the Performance of Multicast Systems (2008) (2)
- A Panoramic Study of Obstructive Sleep Apnea Detection Technologies (2013) (2)
- Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network (2012) (2)
- Buffer-overflow and Noise-handling Model: Guaranteeing Quality of Service Routing for Wireless Multimedia Sensor Networks (2016) (2)
- Deep Neural Network Approach for Pose, Illumination, and Occlusion Invariant Driver Emotion Detection (2022) (2)
- A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) (2008) (2)
- Restoring privacy of users to foster Mobile Collaborative learning ( MCL ) 1 (2012) (2)
- Investigating the Effects of Encoder Schemes, WFQ & SAD on VoIP QoS (2008) (2)
- Clustered Hierarchy in Sensor Networks: Performance and Security (2009) (2)
- Parallel, True Random Number Generator (P-TRNG): Using Parallelism for Fast True Random Number Generation in Hardware (2021) (1)
- Hierarchical Cluster-Based FIFO Asynchronous Data Transfer Technique for Reducing Congestion for Energy Efficient State Wireless Sensor Network-HAEEW (2015) (1)
- Computer Vision-Based Framework for Supporting the Mobility of the Visually Impaired (2018) (1)
- A new analytical performance model for cylindrical microstrip printed antenna (2012) (1)
- The Use of Orthogonal Frequency Code Division (OFCD) Multiplexing in Wireless Mesh Network (WMN) (2010) (1)
- Efficient and Robust Optical Character Recognition Algorithm for Signature Recognition (2012) (1)
- Systolic Arithmetic Architectures (1992) (1)
- An energy efficient wireless sensor network based on human neurons communication (2015) (1)
- Implementation and Comparison Of Denial of Service Attack Techniques (2004) (1)
- I NTERFERENCE OF 802 . 11 B WLAN AND B LUETOOTH : A NALYSIS AND P ERFORMANCE E VALUATION (2010) (1)
- A New Model for Diagnosing Sleep Apnea through Features Extraction of the SpO2 Signal (2012) (1)
- Outcome report (2016) (1)
- Hybrid Quantum Approximate Optimization Using Enhanced Ant Colony Optimization to Solve Large-Scale Combinatorial Optimization Problems (2021) (1)
- Analysis and implementation of proficient Rijndael algorithm with optimized computation (2017) (1)
- A Multi-layer Framework for Detection Selective Forwarding Attacks in WSNs (2016) (1)
- Runtime support for Self-Evolving Software (2006) (1)
- Comparison of Personal Firewalls Security and Performance Issues (2002) (1)
- Area estimation for DSP algorithms (2000) (1)
- A new hardware quantum-based encryption algorithm (2014) (1)
- Energy Efficient Military Mobile Base Station Placement (2010) (1)
- Computer Vision Based Method for Shadow Detection (2022) (1)
- Supportive framework and innovative mobile application to augment mobile collaborative learning (MCL) activities (2012) (1)
- Programming Models for Wireless Sensor Networks: Status, Taxonomy, Challenges, and Future Directions (2015) (1)
- Intrusion Detection System in Self-Organizing Networks: A Survey (2017) (1)
- A new Quantum Processor Architecture (2019) (1)
- Deployment of TCP University of Bridgeport (UB) to Control Law Enforcement Department over Wireless Mesh Network (2012) (1)
- Reducing Power Consumption in Sensor Network Using Sensor MAC Protocol (2009) (1)
- An Energy Efficient Algorithm for Object-Tracking Wireless Sensor Networks (2014) (1)
- Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL) (2012) (1)
- Explaining Dopamine Deficiency of Spiking Neurons Based on Quantum Superposition Theory (2015) (1)
- Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT Algorithm (2008) (1)
- From algorithms to parallel architectures: a formal approach (1991) (1)
- Proportional Study of TCP Variants over Heterogeneous Wireless Networks (2014) (1)
- Deployment of Handwriting Recognition System Using Artificial Neural Network (ANN) (2013) (1)
- ARCHITECTURES FOR RNS ARITHMETIC DECODING (2004) (1)
- SSL proxy attacks on mobile devices and their prevention (2016) (1)
- Design and Implementation of Wireless Camera, Communication, and Control Modules for a Transformable Unmanned Aerial Vehicle (2012) (1)
- A Multi-Layered Defense Approach to Safeguard Against Ransomware (2021) (1)
- Quantum Computing Hardware Implementation Methods : A Survey over Categories (2013) (1)
- Innovative prototypes for mobile collaborative learning (MCL)to substantiate pedagogical activities (2012) (1)
- The Effect of Mutual Coupling on a Microstrip Printed Antenna Array Operates at 5 GHz Using Three Different Substrates (2015) (1)
- A New Analytical Performance Model for a Microstrip Printed Antenna (2012) (1)
- Mapping CIRCAL based Algorithms to Event Logic (1996) (1)
- An Event Logic Architecture for CIRCAL Algorithms (1995) (1)
- Choosing the system moduli of RNS arithmetic processors (1996) (1)
- A New Programming Model to Simulate Wireless Sensor Networks : Finding The Best Routing Path (2013) (1)
- Approximate Algorithms in Mobile Telephone Network Projects (2006) (1)
- Effect of Curvature of the Conformal Microstrip Antenna (2011) (1)
- Implementation of Fault Tolerance Algorithm to Restore Affected Nodes in Scheduling Clusters (2012) (1)
- Combinaorial Multi-attribute Auction (CMOA) Framework for e-auction (2006) (1)
- A Framework for Reverse Engineering VLSI Chips (2003) (1)
- Novel Location Tracking Energy Efficient Model for Robust Routing over Wireless Sensor Networks (2014) (1)
- New Quantum Key Distribution Algorithm Using Public Key Algorithm (2013) (0)
- A Mobile Web Content Manager (2001) (0)
- The Worst and Best Case Capacity Analysis of Mobile Ad Hoc Networks (MANET) Using a 3-Phase Algorithm (2008) (0)
- Algorithm for Modulo Addition (2004) (0)
- AN OVERVIEW OF PCN ARCHITECTURE AND EXISTING WELL KNOWN TECHNIQUE (2012) (0)
- Digit Recognition Based on Specialization, Decomposition and Holistic Processing (2020) (0)
- Variable Delay Optical Buffer Using Tunable Fiber Bragg Gratings (2015) (0)
- QKD initiated by Authentication of EPR in 3 way channel (2015) (0)
- Secure Cloud WLAN using Dynamic Placement with a Cloud Name Resolution Protocol (2015) (0)
- Abstract-a Closed-form Expression to Determine an Average (0)
- A New Approach to Avoid Deadlock in Parallel Discrete Event Simulation ( PDES ) System (2009) (0)
- A Low-Complexity Algorithm for Improving Computing Power of Multiuser Receivers for Next Generation Wireless Systems (2009) (0)
- Updating Student Profiles in Adaptive Mobile Learning using ASP.net MVC, dotNetRDF, Turtle, and the Semantic Web (2017) (0)
- iii A MULTI-LAYER APPROACH FOR DETECTION OF SELECTIVE FORWARIDNG ATTACKS IN WIRELESS SENSOR NETWORKS (2016) (0)
- A new technique of switch & feedback job scheduling mechanism in a distributed system (2009) (0)
- Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-User Receivers for DS-CDMA Systems (2008) (0)
- Implementations of location awareness technologies and their applications (2007) (0)
- Using Available Wireless/Wired Network Infrastructure for Public Safety and Emergency Early Response (2008) (0)
- A Hierarchical framework of Cloud Computing using Heart beat as Biometric (2016) (0)
- Efficient Implementation of Pseudo Random Numbers (2016) (0)
- Multi-frame Signature-cum (2012) (0)
- WSNs System within the Passive Radio-Triggered Wake-Up Circuit : (2016) (0)
- OR M ULTICAST S YSTEMS (2010) (0)
- Detecting Malicious Behavior for the Sensors and Actuators Embedded in Medical Devices: A Hardware Approach (2017) (0)
- Enhanced Epilepsy Seizure Detection and Smart Phone APP for Monitoring Seizures Based on EEG Classification (2018) (0)
- Optimized Algorithm for Face Detection Integrating Different Illuminating Conditions (2012) (0)
- Return Loss and Mutual Coupling Cofficient of a Microstrip Printed Antenna Array Conformed on a Cylindrical Body for TM 01 Mode (2012) (0)
- Speed-limit Signs Detection and Recognition Based on HSV Color Model (2016) (0)
- DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION (2017) (0)
- Cost Analysis of 5 th Generation Technology (2016) (0)
- A new proposed peak-to-average power reduction parameter to evaluate SLM and PTS as OFDM PAPR reduction schemes (2013) (0)
- Deterministic Formalization of the Processing Gain for Reducing MAI in Multi-Channel Communications System (2008) (0)
- Design and Implementation of Wireless Camera, Communication, and Control Modules for a Transformable Unmanned Aerial Vehicle (2011) (0)
- Investigation of Countermeasures to Anti-Forensic Methods (2019) (0)
- Location-based security for ID document and ID card enrollment stations (2011) (0)
- SPECIAL ISSUE ON ADVANCES IN COMPUTER, INFORMATION, AND SYSTEMS SCIENCES, AND ENGINEERING PREFACE GU (2007) (0)
- Iris Print Biometric Identification Using Perceptual Image Hashing Algorithms (2018) (0)
- An Efficient Scheme for Traffic Management in ATM Networks (2008) (0)
- Analyzing SNR performance of a low-complexity wireless Multiuser receiver for DS-CDMA systems (2009) (0)
- A Low--Algorithm for Improving Computing Complexity Algorithm for Improving Computing Complexity Algorithm for Improving Computing Complexity Algorithm for Improving Computing Power of Multiuser Receivers for Next Generation Wireless Power of Multiuser Receivers for Next Generation Wireless Power of (2009) (0)
- The Art of Reading Explosion Phenomena: Science and Algorithms (2018) (0)
- ? All communications between the authors, reviewers, and conference organizing committee were done o (2010) (0)
- A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems (2008) (0)
- Simultaneous Initiating EPR and Quantum Channel by AK15 Protocol (2016) (0)
- An Optimal Algorithm for IMT2000 Fast Power Control (2003) (0)
- Object-Tracking in Wireless Sensor Networks with A novel Energy Efficient Algorithm (2015) (0)
- Technological Developments in Networking, Education and Automation ? Collects papers presented at a (2010) (0)
- Implementing and Testing of Anchor Point Node ( APN ) Hybrid Network Architecture for Remote Areas with Simulation of Transmission Control Protocol ( TCP ) 1 (2012) (0)
- Parallel and distributed algorithms and implementations: time based mutual exclusion (2009) (0)
- Clinical Text Classification with Word Representation Features and Machine Learning Algorithms (2023) (0)
- A e(logn) ALGORITHM FOR MODULO MULTIPLICATION (2010) (0)
- Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node—MAC Hybrid Protocol for Wireless Sensor Networks (2014) (0)
- PROPOSED FRAMEWORK FOR IMPROVING PERFORMANCE OF FAMILIAL CLASSIFICATION IN ANDROID MALWARE (2020) (0)
- The Performance of a Cylindrical Microstrip Printed Antenna for TM 10 Mode Using Two Different Substrates at 5 GHz Range (2012) (0)
- A Novel Approach for Creating Consistent Trust and Cooperation (CTC) among Mobile Nodes of Ad Hoc Network (2008) (0)
- Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks (2009) (0)
- ARABIC TEXT USING ZERO W IDTH AND KASHIDHA LETTERS (2012) (0)
- Entanglement Distribution and Secret Key Sharing In Optical Networks (2015) (0)
- Beyond Frontal Face Recognition (2023) (0)
- Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions (2016) (0)
- Proceedings of the International Conference on Industrial Electronics, Technology and Automation (IETA 2001). (2001) (0)
- Implementation and Comparison of a Rules-Based Approach and a Statistical Approach Intrusion Detection Systems (0)
- Implementation and Performance Evaluation of Overlay End System Multicast (ESM) for Stable and Fast Streaming of Multimedia Applications over Satellite Networks (2020) (0)
- Information Technology Students' Perceptions Toward Using Virtual Reality Technology for Educational Purposes (2023) (0)
- A highly secure quantum communication scheme for Blind Signature using qubits and qutrits (2014) (0)
- A highly efficient and secure shared key for direct communications based on quantum channel (2015) (0)
- Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment (2013) (0)
- Development of OSA Event Detection Using Threshold Based Automatic Classification (2012) (0)
- Advancing Wireless Sensor Networks Performance over Radio Trigger Wake-up Capabilities (2014) (0)
- Fault Tolerance Model for Efficient Actor Recovery Paradigm in WSAN (2019) (0)
- Controlling Myocarditis Attack of Heart using Anomaly Based Interusion Detections Algorithms (2013) (0)
- Steganography Using Language Remarks (2013) (0)
- Bandwidth Problem in High Performance Packet Switching Network (2008) (0)
- Blind Digital Signature schemes with four particle entanglement states (2017) (0)
- An Efficient Automated Technique and Smartphone Application for Epilepsy Seizure Detection Using EEG signals (2017) (0)
- A low complexity optimum multi-user receiver for maximizing the BER performance for DS-CDMA systems (2009) (0)
- Grid-based Model for Recovery of Lost Connectivity in Wireless Sensor and Actor Network (2017) (0)
- A Multiple Retinal Normal and Abnormal Anatomical Structures Segmentation Using Hybrid Morphological and Fuzzy Local Adaptive Thresholding (2018) (0)
- The Giza Pyramids: A History of Wireless Electricity Transmission Validated by Today’s Science (2014) (0)
- The Impact of Reduced Computational Complexity of Multiuser Detectors on the Processing Gain in a Wireless DS-CDMA Multiuser System (2007) (0)
- Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL) (2014) (0)
- Ultra-High Density Decoding of 2D Matrix Barcodes (2018) (0)
- HOOVER: hardware object-oriented verification (1998) (0)
- A Novel Reversible Four Bit One’s Complement Quantum Gate (OCQG-4B) (2018) (0)
- Formal Verifications of Systems on Chips: Current and Future Directions (2003) (0)
- A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems (2010) (0)
- A use of matrix with GVT computation in optimistic time warp algorithm for parallel simulation (2012) (0)
- Vulnerability Analysis and Modeling (2019) (0)
- Entanglement measurement-device-independent Quantum Key Distribution (2017) (0)
- Artificial Neural Fuzzy Inference in Task-Based Learning Support System for Distance Education (2015) (0)
- STEGANOGRAPHY ALGORITHMS FOR SECURE DATA COMMUNICATIONS (2015) (0)
- An Enhanced Piezoelectric-Generated Power Technique for Qi Wireless Charging (2023) (0)
- Secure cloud WLAN using dynamic placement and migration with a cloud name resolution protocol (2015) (0)
- Proposed New PAPR Reduction Parameter to Compare Selected Mapping and Partial Transmit Sequences As OFDM PAPR Reduction Schemes (2013) (0)
- Wireless Distance-Verifying Security System for ID Card/Document Enrollment Stations (2011) (0)
- Formal synthesis of VLSI layouts from algorithmic specifications (1996) (0)
- A New Improved Storage Model of Wireless Devices using the Cloud (2013) (0)
- OMPUTER S CIENCE AND E NGINEERING C OURSES (2012) (0)
- A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution (2008) (0)
- Arabic Music Genre Classification Using Deep Convolutional Neural Networks (CNNs) (2022) (0)
- A Novel Simulation Based Methodology for the Congestion Control in ATM Networks (2009) (0)
- A Novel Fault Self-Detectable Universal Quantum Reversible Circuits Array Design (2018) (0)
- Routing in Sensor Networks: Performance and Security in clustered networks (2008) (0)
- SOOAWSN: A complete framework for Wireless Sensor Networks Graduate Student Paper (2011) (0)
- KMSAFE APP: Campus Safety Mobile App (2021) (0)
- Leveraging Discrete Fourier Transform to Reduce Power Consumption in Underwater Wireless Sensor Network Communications (2014) (0)
- Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions (2017) (0)
- Compressed and raw video steganography techniques: a comprehensive survey and analysis (2016) (0)
- Design of a cell library for formal high level synthesis (1994) (0)
- Sooawsn: a secure object oriented architecture for wireless sensor networks (2011) (0)
- Robust Heterogeneous Network to Support Multitasking (2013) (0)
- Ultra-Sensitive Si-Based Optical Sensor for Nanoparticle-Size Traditional Water Pollutant Detection (2022) (0)
- MACHINE LEARNING APPLICATIONS TO MOBILE NETWORK PERFORMANCE MODELING (2021) (0)
- Minimizing Common Mode Interferences in the Measurement of Bio-Signals (2011) (0)
- Text by Using MS Word (2014) (0)
- Efficient Approaches to Ensure Certificate Authenticity for Public Key Infrastructure (2017) (0)
- Developing the Compiler to Upgrade Features of Object Oriented Programming (OO) C (2011) (0)
- A Quantum Fuzzy Logic for a Secure and Safe Wireless Network Communication (2014) (0)
- BASED UPON AUTHENTICATION BY EPR ENTANGLEMENT STATE (2018) (0)
- A High Payload V DWT Domain (2015) (0)
- Advances in Systems, Computing Sciences and Software Engineering, (Proceedings of the International Conference on Systems, Computing Sciences and Software Engineering 2007) (2008) (0)
- Approaching secure protocol from quantum perspective (2016) (0)
- BlueDart: Radiation Data Collection and Warning System (2003) (0)
This paper list is powered by the following services:
Other Resources About Khaled Elleithy
What Schools Are Affiliated With Khaled Elleithy?
Khaled Elleithy is affiliated with the following schools: