Khaled M. Elleithy

Orcid: 0000-0001-9239-5035

Affiliations:
  • University of Bridgeport, CT, USA


According to our database1, Khaled M. Elleithy authored at least 133 papers between 1989 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
AI-Generated Text Detector for Arabic Language Using Encoder-Based Transformer Architecture.
Big Data Cogn. Comput., March, 2024

2023
Clinical Text Classification with Word Representation Features and Machine Learning Algorithms.
Int. J. Online Biomed. Eng., April, 2023

Information Technology Students' Perceptions Toward Using Virtual Reality Technology for Educational Purposes.
Int. J. Interact. Mob. Technol., April, 2023

Improving LZW Compression of Unicode Arabic Text Using Multi-Level Encoding and a Variable-Length Phrase Code.
IEEE Access, 2023

Beyond Frontal Face Recognition.
IEEE Access, 2023

Deep Fake and Digital Forensics.
Proceedings of the 14th IEEE Annual Ubiquitous Computing, 2023

Advances in Quantum Medical Image Analysis Using Machine Learning: Current Status and Future Directions.
Proceedings of the IEEE International Conference on Quantum Computing and Engineering, 2023

DDoS Attack Forecasting Using Transformers.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2021
Human Body-Related Disease Diagnosis Systems Using CMOS Image Sensors: A Systematic Review.
Sensors, 2021

CMOS Image Sensors in Surveillance System Applications.
Sensors, 2021

A Multi-Layered Defense Approach to Safeguard Against Ransomware.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

Parallel, True Random Number Generator (P-TRNG): Using Parallelism for Fast True Random Number Generation in Hardware.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Digit Recognition Based on Specialization, Decomposition and Holistic Processing.
Mach. Learn. Knowl. Extr., 2020

Stages-Based ECG Signal Analysis From Traditional Signal Processing to Machine Learning Approaches: A Survey.
IEEE Access, 2020

Implementation and Performance Evaluation of Overlay End System Multicast (ESM) for Stable and Fast Streaming of Multimedia Applications over Satellite Networks.
Proceedings of the 11th IEEE Annual Ubiquitous Computing, 2020

2019
Fault Tolerance Model for Efficient Actor Recovery Paradigm in WSAN.
Int. J. Interdiscip. Telecommun. Netw., 2019

A new Quantum Processor Architecture.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

Vulnerability Analysis and Modeling.
Proceedings of the 10th IEEE Annual Ubiquitous Computing, 2019

2018
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks.
Sensors, 2018

Automated Adaptive Mobile Learning System using Shortest Path Algorithm and Learning Style.
Int. J. Interact. Mob. Technol., 2018

Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions.
Comput. Inf. Sci., 2018

A Highly Accurate and Reliable Data Fusion Framework for Guiding the Visually Impaired.
IEEE Access, 2018

Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees.
IEEE Access, 2018

A Highly Accurate Deep Learning Based Approach for Developing Wireless Sensor Network Middleware.
IEEE Access, 2018

The Art of Reading Explosion Phenomena: Science and Algorithms.
IEEE Access, 2018

A highly accurate machine learning approach for developing wireless sensor network middleware.
Proceedings of the 2018 Wireless Telecommunications Symposium, 2018

A Novel Fault Self-Detectable Universal Quantum Reversible Circuits Array Design.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

A Novel Reversible Four Bit One's Complement Quantum Gate (OCQG-4B).
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Iris Print Biometric Identification Using Perceptual Image Hashing Algorithms.
Proceedings of the 9th IEEE Annual Ubiquitous Computing, 2018

Efficient key distribution protocol for wireless sensor networks.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

A novel obstacle avoidance system for guiding the visually impaired through the use of fuzzy control logic.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks.
Sensors, 2017

Sensor-Based Assistive Devices for Visually-Impaired People: Current Status, Challenges, and Future Directions.
Sensors, 2017

Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks.
Sensors, 2017

An Optimal and Energy Efficient Multi-Sensor Collision-Free Path Planning Algorithm for a Mobile Robot in Dynamic Environments.
Robotics, 2017

Compressed and raw video steganography techniques: a comprehensive survey and analysis.
Multim. Tools Appl., 2017

A Novel Vision-Based Classification System for Explosion Phenomena.
J. Imaging, 2017

Updating Student Profiles in Adaptive Mobile Learning using ASP.net MVC, dotNetRDF, Turtle, and the Semantic Web.
Int. J. Interact. Mob. Technol., 2017

A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC.
IEEE Access, 2017

Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits.
IEEE Access, 2017

A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels.
IEEE Access, 2017

Battery independence: Reducing the dependence on batteries in wearable computing through energy harvesting techniques.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Smart phone application development for monitoring epilepsy seizure detection based on EEG signal classification.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

Epilepsy seizure detection using EEG signals.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

An efficient automated technique for epilepsy seizure detection using EEG signals.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017

2016
Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions.
Wirel. Pers. Commun., 2016

A New MAC Address Spoofing Detection Technique Based on Random Forests.
Sensors, 2016

Sensor Fusion Based Model for Collision Free Mobile Robot Navigation.
Sensors, 2016

An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks.
Sensors, 2016

A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes.
Multim. Tools Appl., 2016

An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data Communication.
J. Cyber Secur. Mobil., 2016

An Interactive and Self-instructional Virtual Chemistry Laboratory.
Int. J. Emerg. Technol. Learn., 2016

A novel video steganography algorithm in DCT domain based on hamming and BCH codes.
Proceedings of the 37th IEEE Sarnoff Symposium 2016, Newark, NJ, USA, 2016

Quantum Entanglement Distribution for Secret Key Establishment in Metropolitan Optical Networks.
Proceedings of the IEEE International Conference on Networking, 2016

SSL proxy attacks on mobile devices and their prevention.
Proceedings of the 8th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2016

2015
Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node - MAC Hybrid Protocol for Wireless Sensor Networks.
J. Signal Process. Syst., 2015

Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks.
Sensors, 2015

Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis.
Sensors, 2015

Multi-Layer Approach for the Detection of Selective Forwarding Attacks.
Sensors, 2015

A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11).
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

A highly efficient and secure shared key for direct communications based on quantum channel.
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

An energy efficient wireless sensor network based on human neurons communication.
Proceedings of the 2015 IEEE International Conference on Multisensor Fusion and Integration for Intelligent Systems, 2015

A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks.
Proceedings of the 14th IEEE International Conference on Machine Learning and Applications, 2015

2014
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks.
Sensors, 2014

Simulation based Study of TCP Variants in Hybrid Network.
CoRR, 2014

Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL).
CoRR, 2014

Performance Advancement of Wireless Sensor Networks using Low Power Techniques and Efficient Placement of Nodes.
CoRR, 2014

Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs).
CoRR, 2014

Fast real-time hardware engine for ZWC text steganography.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Secure and efficient key management protocol (SEKMP) for wireless sensor networks.
Proceedings of the tenth ACM/IEEE symposium on Architectures for networking and communications systems, 2014

2013
Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network.
CoRR, 2013

Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs).
CoRR, 2013

Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment.
CoRR, 2013

Robust Heterogeneous Network to Support Multitasking.
CoRR, 2013

Apnea Detection based on Respiratory Signal Classification.
Proceedings of the 4th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013) and the 3rd International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH), 2013

Least Distance Smart Neighboring Search (LDSNS) over Wireless Sensor Networks (WSNs).
Proceedings of the Seventh UKSim/AMSS European Modelling Symposium, 2013

LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks.
Proceedings of the 17th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2013

TERP: A Trusted and Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs).
Proceedings of the 17th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2013

2012
Performance Analysis of a Microstrip Printed Antenna Conformed on Cylindrical Body at Resonance Frequency 4.6 GHz for TM01 Mode.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Design and Implementation of Wireless Camera, Communication, and Control Modules for a Transformable Unmanned Aerial Vehicle.
J. Intell. Robotic Syst., 2012

Interactive Prototypes to Foster Pedagogical Activities for Mobile Collaborative Learning Environment (MCLE).
Int. J. Interact. Mob. Technol., 2012

Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL).
CoRR, 2012

TCP-UB: A New congestion aware transmission control protocolvariant
CoRR, 2012

Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities
CoRR, 2012

Analytical Study of Pre-congestion notification (PCN) techniques
CoRR, 2012

Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL)
CoRR, 2012

Effective M-learning design Strategies for computer science and Engineering courses
CoRR, 2012

Automated Energy Saving (AES) Paradigm to Support Pedagogical Activities over Wireless Sensor Networks.
Proceedings of the Ubiquitous Computing and Ambient Intelligence, 2012

A use of matrix with GVT computation in optimistic time warp algorithm for parallel simulation.
Proceedings of the 2012 Spring Simulation Multiconference, 2012

Underwater wireless sensor network communication using electromagnetic waves at resonance frequency 2.4 GHz.
Proceedings of the 2012 Spring Simulation Multiconference, 2012

Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

Obstructive sleep apnea detection using SVM-based classification of ECG signal features.
Proceedings of the Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2012

Detection of obstructive sleep apnea through ECG signal features.
Proceedings of the 2012 IEEE International Conference on Electro/Information Technology, 2012

2011
A generic optimized time management algorithms (OTMA) framework for simulating large-scale overlay networks.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Location-based security for ID document and ID card enrollment stations.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Security in wireless sensor networks: key intrusion detection module in SOOAWSN.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

2010
A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems.
J. Commun., 2010

Clustered Hierarchy in Sensor Networks: Performance and Security
CoRR, 2010

2009
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks
CoRR, 2009

Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks
CoRR, 2009

Reducing null messages using grouping and status retrieval for a conservative discrete-event simulation system.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A new technique of switch & feedback job scheduling mechanism in a distributed system.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Parallel and distributed algorithms and implementations: time based mutual exclusion.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

2008
A closed-form expression for BER to quantify MAI for synchronous DS-CDMA multi-user detector.
Proceedings of the Wireless Telecommunications Symposium, 2008

A new mathematical model for optimizing the performance of parallel and discrete event simulation systems.
Proceedings of the 2008 Spring Simulation Multiconference, 2008

The Worst and Best Case Capacity Analysis of Mobile Ad Hoc Networks (MANET) Using a 3-Phase Algorithm.
Proceedings of the Fifth Annual IEEE Communications Society Conference on Sensor, 2008

An Efficient Routing Algorithm for Mesh-Hypercube (M-H) Networks.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-User Receivers for DS-CDMA Systems.
Proceedings of the Fifth International Conference on Information Technology: New Generations (ITNG 2008), 2008

Reducing null message traffic in large parallel and distributed systems.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems.
Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering, 2008

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET).
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

Optimization and Job Scheduling in Heterogeneous Networks.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT Algorithm.
Proceedings of the Advanced Techniques in Computing Sciences and Software Engineering, 2008

Modified LEACH - Energy Efficient Wireless Networks Communication.
Proceedings of the Novel Algorithms and Techniques in Telecommunications and Networking, 2008

Deterministic Formalization of the Processing Gain for Reducing MAI in Multi-Channel Communications System.
Proceedings of the 5th IEEE Consumer Communications and Networking Conference, 2008

2007
Transformation matrix algorithm for reducing the computational complexity of multiuser receivers for DS-CDMA wireless systems.
Proceedings of the Wireless Telecommunications Symposium, 2007

Implementations of location awareness technologies and their applications.
Proceedings of the Wireless Telecommunications Symposium, 2007

The Impact of Reduced Computational Complexity of Multiuser Detectors on the Processing Gain in a Wireless DS-CDMA Multiuser System.
Proceedings of the 2007 International Conference on Wireless Networks, 2007

2001
Network Traffic Characterization for High-Speed Networks Supporting Multimedia.
Proceedings of the Proceedings 34th Annual Simulation Symposium (SS 2001), 2001

1999
A Genetic Algorithm for Register Allocation.
Proceedings of the 9th Great Lakes Symposium on VLSI (GLS-VLSI '99), 1999

1998
HOOVER: Hardware Object-Oriented Verification.
Proceedings of the 8th Great Lakes Symposium on VLSI (GLS-VLSI '98), 1998

1995
An Event Logic Architecture for CIRCAL Algorithms.
Proceedings of the Seventh IASTED/ISMM International Conference on Parallel and Distributed Computing and Systems, 1995

1992
Systolic Arithmetic Architectures.
Proceedings of the Fifth International Conference on VLSI Design, 1992

1991
VLSI implementation of a systolic database machine for relational algebra and hashing.
Integr., 1991

From Algorithms to Parallel Architectures: A Formal Approach.
Proceedings of the Fifth International Parallel Processing Symposium, Proceedings, Anaheim, California, USA, April 30, 1991

1990
Formal Synthesis of a Parallel Architectures from Recursive Equations.
Proceedings of the 1990 International Conference on Parallel Processing, 1990

A formal high level synthesis approach for DSP architectures.
Proceedings of the 1990 International Conference on Acoustics, 1990

A formal design methodology for parallel architectures.
Proceedings of the Application Specific Array Processors, 1990

A Framework for High Level Synthesis of Digital Architectures from U-Recursive Algorithms.
Proceedings of the ACM 18th Annual Computer Science Conference on Cooperation, 1990

1989
θ(logN) architectures for RNS arithmetic decoding.
Proceedings of the 9th Symposium on Computer Arithmetic, 1989


  Loading...