default search action
Khaled M. Elleithy
Person information
- affiliation: University of Bridgeport, CT, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j46]Hepseeba Kode, Khaled Elleithy, Laiali Almazaydeh:
Epileptic Seizure Detection in EEG Signals Using Machine Learning and Deep Learning Techniques. IEEE Access 12: 80657-80668 (2024) - [j45]Hamed Alshammari, Ahmed ElSayed, Khaled Elleithy:
AI-Generated Text Detector for Arabic Language Using Encoder-Based Transformer Architecture. Big Data Cogn. Comput. 8(3): 32 (2024) - [j44]Nadine Matondo-Mvula, Khaled Elleithy:
Breast Cancer Detection with Quanvolutional Neural Networks. Entropy 26(8): 630 (2024) - [j43]Hamed Alshammari, Khaled Elleithy:
Toward Robust Arabic AI-Generated Text Detection: Tackling Diacritics Challenges. Inf. 15(7): 419 (2024) - 2023
- [j42]Michael Joseph, Khaled Elleithy:
Beyond Frontal Face Recognition. IEEE Access 11: 26850-26861 (2023) - [j41]Enas Abu Jrai, Shoroq Alsharari, Laiali Almazaydeh, Khaled Elleithy, Osama Abu Hamdan:
Improving LZW Compression of Unicode Arabic Text Using Multi-Level Encoding and a Variable-Length Phrase Code. IEEE Access 11: 51915-51929 (2023) - [j40]Reyad Alsalameen, Laiali Almazaydeh, Bilal Alqudah, Khaled Elleithy:
Information Technology Students' Perceptions Toward Using Virtual Reality Technology for Educational Purposes. Int. J. Interact. Mob. Technol. 17(7): 148-166 (2023) - [j39]Laiali Almazaydeh, Mohammed A. Abuhelaleh, Arar Al Tawil, Khaled Elleithy:
Clinical Text Classification with Word Representation Features and Machine Learning Algorithms. Int. J. Online Biomed. Eng. 19(4): 65-76 (2023) - [c73]Zain Ahmed Alrahmani, Khaled Elleithy:
DDoS Attack Forecasting Using Transformers. DASC/PiCom/CBDCom/CyberSciTech 2023: 911-915 - [c72]Nadine Matondo-Mvula, Khaled Elleithy:
Advances in Quantum Medical Image Analysis Using Machine Learning: Current Status and Future Directions. QCE 2023: 367-377 - [c71]Hamed Alshammari, Khaled Elleithy:
Deep Fake and Digital Forensics. UEMCON 2023: 283-288 - 2021
- [j38]Susrutha Babu Sukhavasi, Suparshya Babu Sukhavasi, Khaled Elleithy, Shakour Abuzneid, Abdelrahman Elleithy:
CMOS Image Sensors in Surveillance System Applications. Sensors 21(2): 488 (2021) - [j37]Suparshya Babu Sukhavasi, Susrutha Babu Sukhavasi, Khaled Elleithy, Shakour Abuzneid, Abdelrahman Elleithy:
Human Body-Related Disease Diagnosis Systems Using CMOS Image Sensors: A Systematic Review. Sensors 21(6): 2098 (2021) - [c70]Alexander Pagan, Khaled Elleithy:
A Multi-Layered Defense Approach to Safeguard Against Ransomware. CCWC 2021: 942-947 - [c69]Thomas Arciuolo, Khaled M. Elleithy:
Parallel, True Random Number Generator (P-TRNG): Using Parallelism for Fast True Random Number Generation in Hardware. CCWC 2021: 987-992 - 2020
- [j36]Muhammad Wasimuddin, Khaled Elleithy, Abdelshakour A. Abuzneid, Miad Faezipour, Omar Abuzaghleh:
Stages-Based ECG Signal Analysis From Traditional Signal Processing to Machine Learning Approaches: A Survey. IEEE Access 8: 177782-177803 (2020) - [j35]Michael Joseph, Khaled Elleithy:
Digit Recognition Based on Specialization, Decomposition and Holistic Processing. Mach. Learn. Knowl. Extr. 2(3): 271-282 (2020) - [c68]Khaled Elleithy, Thomas Arciuolo, Akram Abu-aisheh:
Implementation and Performance Evaluation of Overlay End System Multicast (ESM) for Stable and Fast Streaming of Multimedia Applications over Satellite Networks. UEMCON 2020: 662-667
2010 – 2019
- 2019
- [j34]Reem Khalid Mahjoub, Khaled Elleithy:
Fault Tolerance Model for Efficient Actor Recovery Paradigm in WSAN. Int. J. Interdiscip. Telecommun. Netw. 11(1): 71-86 (2019) - [c67]Mikeera Brown, Shawnoah Pollock, Wafa Elmannai, Michael Joseph, Khaled Elleithy:
Vulnerability Analysis and Modeling. UEMCON 2019: 455-461 - [c66]Michael Joseph, Khaled Elleithy, Mohamed Mohamed:
A new Quantum Processor Architecture. UEMCON 2019: 483-487 - 2018
- [j33]Sumaya Abusaleh, Ausif Mahmood, Khaled M. Elleithy:
The Art of Reading Explosion Phenomena: Science and Algorithms. IEEE Access 6: 3280-3299 (2018) - [j32]Remah Alshinina, Khaled M. Elleithy:
A Highly Accurate Deep Learning Based Approach for Developing Wireless Sensor Network Middleware. IEEE Access 6: 29885-29898 (2018) - [j31]Wafa Elmannai, Khaled M. Elleithy:
A Highly Accurate and Reliable Data Fusion Framework for Guiding the Visually Impaired. IEEE Access 6: 33029-33054 (2018) - [j30]Fahad Alswaina, Khaled Elleithy:
Android Malware Permission-Based Multi-Class Classification Using Extremely Randomized Trees. IEEE Access 6: 76217-76227 (2018) - [j29]Laiali Almazaydeh, Jun Zhang, Peiqiao Wu, Ruoqi Wei, Yisheng Cheng, Khaled M. Elleithy:
Bad USB MITM: A Network Attack Based on Physical Access and Its Practical Security Solutions. Comput. Inf. Sci. 11(1): 1-7 (2018) - [j28]Ibrahim Alkore Alshalabi, Samir E. Hamada, Khaled M. Elleithy, Ioana A. Badara, Saeid Moslehpour:
Automated Adaptive Mobile Learning System using Shortest Path Algorithm and Learning Style. Int. J. Interact. Mob. Technol. 12(5): 4-27 (2018) - [j27]Majid Alshammari, Khaled M. Elleithy:
Efficient and Secure Key Distribution Protocol for Wireless Sensor Networks. Sensors 18(10): 3569 (2018) - [c65]Wafa Elmannai, Khaled M. Elleithy:
A novel obstacle avoidance system for guiding the visually impaired through the use of fuzzy control logic. CCNC 2018: 1-9 - [c64]Majid Alshammari, Khaled M. Elleithy:
Efficient key distribution protocol for wireless sensor networks. CCWC 2018: 980-985 - [c63]Peiqiao Wu, Ruoqi Wei, Khaled M. Elleithy:
A Novel Fault Self-Detectable Universal Quantum Reversible Circuits Array Design. UEMCON 2018: 429-437 - [c62]Thomas Arciuolo, Muhammad Wasimuddin, Sushant Singh, Khaled Elleithy:
Iris Print Biometric Identification Using Perceptual Image Hashing Algorithms. UEMCON 2018: 445-450 - [c61]Thomas Arciuolo, Muhammad Wasimuddin, Sushant Singh, Khaled Elleithy:
A Novel Reversible Four Bit One's Complement Quantum Gate (OCQG-4B). UEMCON 2018: 590-597 - [c60]Remah Alshinina, Khaled M. Elleithy:
A highly accurate machine learning approach for developing wireless sensor network middleware. WTS 2018: 1-7 - 2017
- [j26]Ramadhan J. Mstafa, Khaled M. Elleithy, Eman Abdelfattah:
A Robust and Secure Video Steganography Method in DWT-DCT Domains Based on Multiple Object Tracking and ECC. IEEE Access 5: 5354-5365 (2017) - [j25]Abdulbast A. Abushgra, Khaled M. Elleithy:
A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels. IEEE Access 5: 17753-17763 (2017) - [j24]Muneer Alshowkan, Khaled M. Elleithy:
Deterministic and Efficient Quantum Key Distribution Using Entanglement Parity Bits and Ancillary Qubits. IEEE Access 5: 25565-25575 (2017) - [j23]Samir E. Hamada, Ibrahim Alkore Alshalabi, Khaled M. Elleithy, Ioana A. Badara, Saeid Moslehpour:
Updating Student Profiles in Adaptive Mobile Learning using ASP.net MVC, dotNetRDF, Turtle, and the Semantic Web. Int. J. Interact. Mob. Technol. 11(3): 16-38 (2017) - [j22]Sumaya Abusaleh, Ausif Mahmood, Khaled M. Elleithy, Sarosh H. Patel:
A Novel Vision-Based Classification System for Explosion Phenomena. J. Imaging 3(2): 14 (2017) - [j21]Ramadhan J. Mstafa, Khaled M. Elleithy:
Compressed and raw video steganography techniques: a comprehensive survey and analysis. Multim. Tools Appl. 76(20): 21749-21786 (2017) - [j20]Abrar Alajlan, Khaled M. Elleithy, Marwah Almasri, Tarek M. Sobh:
An Optimal and Energy Efficient Multi-Sensor Collision-Free Path Planning Algorithm for a Mobile Robot in Dynamic Environments. Robotics 6(2): 7 (2017) - [j19]Remah Alshinina, Khaled M. Elleithy:
Performance and Challenges of Service-Oriented Architecture for Wireless Sensor Networks. Sensors 17(3): 536 (2017) - [j18]Wafa Elmannai, Khaled M. Elleithy:
Sensor-Based Assistive Devices for Visually-Impaired People: Current Status, Challenges, and Future Directions. Sensors 17(3): 565 (2017) - [j17]Reem Khalid Mahjoub, Khaled Elleithy:
Efficient Actor Recovery Paradigm for Wireless Sensor and Actor Networks. Sensors 17(4): 858 (2017) - [c59]David Pasko, Michael Mrazik, Khaled Elleithy:
Battery independence: Reducing the dependence on batteries in wearable computing through energy harvesting techniques. UEMCON 2017: 37-46 - [c58]Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, Khaled Elleithy:
An efficient automated technique for epilepsy seizure detection using EEG signals. UEMCON 2017: 76-82 - [c57]Zakareya Lasefr, Ramasani Rakesh Reddy, Khaled Elleithy:
Smart phone application development for monitoring epilepsy seizure detection based on EEG signal classification. UEMCON 2017: 83-87 - [c56]Zakareya Lasefr, Sai Shiva V. N. R. Ayyalasomayajula, Khaled Elleithy:
Epilepsy seizure detection using EEG signals. UEMCON 2017: 162-167 - 2016
- [j16]Laiali Almazaydeh, Ismail Younes, Khaled M. Elleithy:
An Interactive and Self-instructional Virtual Chemistry Laboratory. Int. J. Emerg. Technol. Learn. 11(7): 70-73 (2016) - [j15]Ramadhan J. Mstafa, Khaled M. Elleithy:
An ECC/DCT-Based Robust Video Steganography Algorithm for Secure Data Communication. J. Cyber Secur. Mobil. 5(3): 167-194 (2016) - [j14]Ramadhan J. Mstafa, Khaled M. Elleithy:
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes. Multim. Tools Appl. 75(17): 10311-10333 (2016) - [j13]Marwah Almasri, Khaled M. Elleithy, Abrar Alajlan:
Sensor Fusion Based Model for Collision Free Mobile Robot Navigation. Sensors 16(1): 24 (2016) - [j12]Bandar Alotaibi, Khaled Elleithy:
A New MAC Address Spoofing Detection Technique Based on Random Forests. Sensors 16(3): 281 (2016) - [j11]Adwan Alanazi, Khaled Elleithy:
An Optimized Hidden Node Detection Paradigm for Improving the Coverage and Network Efficiency in Wireless Multimedia Sensor Networks. Sensors 16(9): 1438 (2016) - [j10]Bandar Alotaibi, Khaled Elleithy:
Rogue Access Point Detection: Taxonomy, Challenges, and Future Directions. Wirel. Pers. Commun. 90(3): 1261-1290 (2016) - [c55]Syed Salman Khatai, Benjamin Selormey, Khaled M. Elleithy, Laiali Almazaydeh:
SSL proxy attacks on mobile devices and their prevention. ICUMT 2016: 326-329 - [c54]Muneer Alshowkan, Khaled M. Elleithy:
Quantum Entanglement Distribution for Secret Key Establishment in Metropolitan Optical Networks. NAS 2016: 1-8 - [c53]Ramadhan J. Mstafa, Khaled M. Elleithy:
A novel video steganography algorithm in DCT domain based on hamming and BCH codes. Sarnoff Symposium 2016: 208-213 - 2015
- [j9]Abdul Razaque, Khaled M. Elleithy:
Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks. Sensors 15(7): 16162-16195 (2015) - [j8]Adwan Alanazi, Khaled Elleithy:
Real-Time QoS Routing Protocols in Wireless Multimedia Sensor Networks: Study and Analysis. Sensors 15(9): 22209-22233 (2015) - [j7]Naser K. A. Alajmi, Khaled Elleithy:
Multi-Layer Approach for the Detection of Selective Forwarding Attacks. Sensors 15(11): 29332-29345 (2015) - [j6]Abdul Razaque, Khaled M. Elleithy:
Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node - MAC Hybrid Protocol for Wireless Sensor Networks. J. Signal Process. Syst. 81(2): 265-284 (2015) - [c52]Mohamed Ben Haj Frej, Khaled Elleithy:
Secure Data Aggregation Model (SDAM) in Wireless Sensor Networks. ICMLA 2015: 330-334 - [c51]Ramadhan J. Mstafa, Khaled M. Elleithy:
A New Video Steganography Algorithm Based on the Multiple Object Tracking and Hamming Codes. ICMLA 2015: 335-340 - [c50]Mohammad Daneshzand, Devon Thomas, Khaled Elleithy, Miad Faezipour:
An energy efficient wireless sensor network based on human neurons communication. MFI 2015: 339-344 - [c49]Remah Alshinina, Khaled M. Elleithy, Fatima Aljanobi:
A highly efficient and secure shared key for direct communications based on quantum channel. WTS 2015: 1-6 - [c48]Ramadhan J. Mstafa, Khaled M. Elleithy:
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11). WTS 2015: 1-8 - 2014
- [j5]Abdul Razaque, Khaled M. Elleithy:
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks. Sensors 14(3): 5074-5117 (2014) - [c47]Majid Alshammari, Khaled Elleithy:
Secure and efficient key management protocol (SEKMP) for wireless sensor networks. ANCS 2014: 253-254 - [c46]Ammar Jamil Odeh, Khaled Elleithy, Miad Faezipour:
Fast real-time hardware engine for ZWC text steganography. VITAE 2014: 1-5 - [i17]Fatma Almajadub, Khaled Elleithy:
Performance Advancement of Wireless Sensor Networks using Low Power Techniques and Efficient Placement of Nodes. CoRR abs/1407.0091 (2014) - [i16]Wafa Elmannai, Abdul Razaque, Khaled M. Elleithy:
Simulation based Study of TCP Variants in Hybrid Network. CoRR abs/1410.5127 (2014) - [i15]Abeer Alabass, Khaled M. Elleithy, Abdul Razaque:
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs). CoRR abs/1410.5128 (2014) - [i14]Khaled M. Elleithy, Abdul Razaque:
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL). CoRR abs/1410.5129 (2014) - 2013
- [c45]Marwah Almasri, Khaled M. Elleithy, Anas Bushnag, Remah Alshinina:
TERP: A Trusted and Energy Efficient Routing Protocol for Wireless Sensor Networks (WSNs). DS-RT 2013: 207-214 - [c44]Muneer Alshowkan, Khaled M. Elleithy, Hussain Alhassan:
LS-LEACH: A New Secure and Energy Efficient Routing Protocol for Wireless Sensor Networks. DS-RT 2013: 215-220 - [c43]Abdul Razaque, Khaled M. Elleithy:
Least Distance Smart Neighboring Search (LDSNS) over Wireless Sensor Networks (WSNs). EMS 2013: 549-554 - [c42]Laiali Almazaydeh, Khaled Elleithy, Miad Faezipour, Ahmad Abushakra:
Apnea Detection based on Respiratory Signal Classification. EUSPN/ICTH 2013: 310-316 - [i13]Abdul Razaque, Khaled M. Elleithy:
Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment. CoRR abs/1309.4499 (2013) - [i12]Abdul Razaque, Khaled M. Elleithy:
Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs). CoRR abs/1309.4504 (2013) - [i11]Muhammad Shoaib Khan, Khaled M. Elleithy:
Robust Heterogeneous Network to Support Multitasking. CoRR abs/1309.4511 (2013) - [i10]Abdul Razaque, Khaled M. Elleithy:
Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network. CoRR abs/1310.1129 (2013) - 2012
- [j4]Abdul Razaque, Khaled M. Elleithy:
Interactive Prototypes to Foster Pedagogical Activities for Mobile Collaborative Learning Environment (MCLE). Int. J. Interact. Mob. Technol. 6(1): 16-24 (2012) - [j3]Tarek M. Sobh, Khaled M. Elleithy, Jeongkyu Lee, Ali El-Rashedy, Jovin Joy, Leon Manole:
Design and Implementation of Wireless Camera, Communication, and Control Modules for a Transformable Unmanned Aerial Vehicle. J. Intell. Robotic Syst. 66(3): 401-414 (2012) - [c41]Laiali Almazaydeh, Khaled Elleithy, Miad Faezipour:
Detection of obstructive sleep apnea through ECG signal features. EIT 2012: 1-6 - [c40]Laiali Almazaydeh, Khaled Elleithy, Miad Faezipour:
Obstructive sleep apnea detection using SVM-based classification of ECG signal features. EMBC 2012: 4938-4941 - [c39]Abdul Razaque, Khaled M. Elleithy:
Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network. NDT (2) 2012: 201-216 - [c38]Ali Elrashidi, Abdelrahman Elleithy, Majed Albogame, Khaled M. Elleithy:
Underwater wireless sensor network communication using electromagnetic waves at resonance frequency 2.4 GHz. SpringSim (CNS) 2012: 13 - [c37]Shalini Potham, Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
A use of matrix with GVT computation in optimistic time warp algorithm for parallel simulation. SpringSim (CNS) 2012: 14 - [c36]Abdul Razaque, Khaled M. Elleithy:
Automated Energy Saving (AES) Paradigm to Support Pedagogical Activities over Wireless Sensor Networks. UCAmI 2012: 512-519 - [c35]Ali Elrashidi, Khaled M. Elleithy, Hassan Bajwa:
Performance Analysis of a Microstrip Printed Antenna Conformed on Cylindrical Body at Resonance Frequency 4.6 GHz for TM01 Mode. ANT/MobiWIS 2012: 775-784 - [i9]Ibrahim Alkore Alshalabi, Khaled M. Elleithy:
Effective M-learning design Strategies for computer science and Engineering courses. CoRR abs/1203.1897 (2012) - [i8]Abdul Razaque, Khaled M. Elleithy:
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL). CoRR abs/1208.2073 (2012) - [i7]Marwah Almasri, Khaled M. Elleithy, Abdul Razaque:
Analytical Study of Pre-congestion notification (PCN) techniques. CoRR abs/1208.2314 (2012) - [i6]Abdul Razaque, Khaled M. Elleithy, Nyembo Salama:
Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities. CoRR abs/1210.2023 (2012) - [i5]Wafa Elmannai, Abdul Razaque, Khaled M. Elleithy:
TCP-UB: A New congestion aware transmission control protocolvariant. CoRR abs/1210.2025 (2012) - [i4]Abdul Razaque, Khaled M. Elleithy:
Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL). CoRR abs/1210.2030 (2012) - 2011
- [c34]Syed Sajjad Rizvi, Khaled M. Elleithy:
A generic optimized time management algorithms (OTMA) framework for simulating large-scale overlay networks. SpringSim (CNS) 2011: 27-34 - [c33]Eugene P. Gerety, Khaled M. Elleithy:
Location-based security for ID document and ID card enrollment stations. SpringSim (CNS) 2011: 35-42 - [c32]Mohammed A. Abuhelaleh, Khaled M. Elleithy:
Security in wireless sensor networks: key intrusion detection module in SOOAWSN. SpringSim (CNS) 2011: 56-61 - 2010
- [j2]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat, Min Song:
A Low-Complexity Optimum Multiuser Receiver for DS-CDMA Wireless Systems. J. Commun. 5(6): 455-466 (2010) - [e3]Khaled M. Elleithy:
Advanced Techniques in Computing Sciences and Software Engineering, Volume II of the proceedings of the 2008 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, Bridgeport, Connecticut, USA. Springer 2010, ISBN 978-90-481-3659-9 [contents] - [e2]Tarek M. Sobh, Khaled M. Elleithy, Ausif Mahmood:
Novel Algorithms and Techniques in Telecommunications and Networking, proceedings of the 2008 International Conference on Telecommunications and Networking (TeNe), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering, CISSE 2008, Bridgeport, Connecticut, USA. Springer 2010, ISBN 978-90-481-3661-2 [contents] - [e1]Tarek M. Sobh, Khaled M. Elleithy:
Innovations in Computing Sciences and Software Engineering, Proceedings of the 2009 International Conference on Systems, Computing Sciences and Software Engineering (SCSS), part of the International Joint Conferences on Computer, Information, and Systems Sciences, and Engineering (CISSE 09), Bridgeport, Connecticut, USA, December 4-12, 2009. Springer 2010, ISBN 978-90-481-9111-6 [contents] - [i3]Mohammed A. Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar:
Clustered Hierarchy in Sensor Networks: Performance and Security. CoRR abs/1004.0598 (2010)
2000 – 2009
- 2009
- [c31]Anil Mathew, Nithin Chandrababu, Khaled M. Elleithy, Syed Sajjad Rizvi:
IEEE 802.11 & Bluetooth Interference: Simulation and Coexistence. CNSR 2009: 217-223 - [c30]Syed Sajjad Rizvi, Hemen Patel, Khaled M. Elleithy:
Parallel and distributed algorithms and implementations: time based mutual exclusion. SpringSim 2009 - [c29]Syed Sajjad Rizvi, Bevin Thomas, Khaled M. Elleithy, Aasia Riasat:
A new technique of switch & feedback job scheduling mechanism in a distributed system. SpringSim 2009 - [c28]Bevin Thomas, Syed Sajjad Rizvi, Khaled M. Elleithy:
Reducing null messages using grouping and status retrieval for a conservative discrete-event simulation system. SpringSim 2009 - [i2]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
Deterministic Formulization of SNR for Wireless Multiuser DS-CDMA Networks. CoRR abs/0908.0980 (2009) - [i1]Syed Sajjad Rizvi, Khaled M. Elleithy:
A New Scheme for Minimizing Malicious Behavior of Mobile Nodes in Mobile Ad Hoc Networks. CoRR abs/0908.0981 (2009) - 2008
- [c27]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
Deterministic Formalization of the Processing Gain for Reducing MAI in Multi-Channel Communications System. CCNC 2008: 859-860 - [c26]Mohammed A. Abuhelaleh, Khaled M. Elleithy, Thabet M. Mismar:
Modified LEACH - Energy Efficient Wireless Networks Communication. TeNe 2008: 123-127 - [c25]Abdelrahman Elleithy, Syed Sajjad Rizvi, Khaled M. Elleithy:
Optimization and Job Scheduling in Heterogeneous Networks. TeNe 2008: 257-262 - [c24]Syed Sajjad Rizvi, Majid A. Jafri, Khaled M. Elleithy, Aasia Riasat:
A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET). TeNe 2008: 269-274 - [c23]Syed Sajjad Rizvi, Aasia Riasat, Mustafa A. Khan, Khaled M. Elleithy:
A Novel Encrypted Database Technique to Develop a Secure Application for an Academic Institution. TeNe 2008: 293-298 - [c22]Abdelrahman Elleithy, Syed Sajjad Rizvi, Khaled M. Elleithy:
Investigating the Effects of Trees and Butterfly Barriers on the Performance of Optimistic GVT Algorithm. SCSS (2) 2008: 449-453 - [c21]Syed Sajjad Rizvi, Shalini Potham, Khaled M. Elleithy:
A GVT Based Algorithm for Butterfly Barrier in Parallel and Distributed Systems. SCSS (2) 2008: 589-593 - [c20]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
Reducing null message traffic in large parallel and distributed systems. ISCC 2008: 1115-1121 - [c19]Syed Sajjad Rizvi, Aasia Riasat, Khaled M. Elleithy:
Transformation Matrix System for Reducing the Computational Complexity of Wireless Multi-User Receivers for DS-CDMA Systems. ITNG 2008: 1251-1252 - [c18]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
An Efficient Routing Algorithm for Mesh-Hypercube (M-H) Networks. PDPTA 2008: 69-75 - [c17]Syed Sajjad Rizvi, Aasia Riasat, Mustafa A. Khan, Khaled M. Elleithy:
The Worst and Best Case Capacity Analysis of Mobile Ad Hoc Networks (MANET) Using a 3-Phase Algorithm. SECON 2008: 594-596 - [c16]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
A new mathematical model for optimizing the performance of parallel and discrete event simulation systems. SpringSim 2008: 2 - [c15]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
A closed-form expression for BER to quantify MAI for synchronous DS-CDMA multi-user detector. WTS 2008: 110-114 - 2007
- [c14]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
The Impact of Reduced Computational Complexity of Multiuser Detectors on the Processing Gain in a Wireless DS-CDMA Multiuser System. ICWN 2007: 70-76 - [c13]Khaled M. Elleithy, Arif Maqbool:
Implementations of location awareness technologies and their applications. WTS 2007: 1-5 - [c12]Syed Sajjad Rizvi, Khaled M. Elleithy, Aasia Riasat:
Transformation matrix algorithm for reducing the computational complexity of multiuser receivers for DS-CDMA wireless systems. WTS 2007: 1-8 - 2001
- [c11]Khaled M. Elleithy, Ali S. Al-Suwaiya:
Network Traffic Characterization for High-Speed Networks Supporting Multimedia. Annual Simulation Symposium 2001: 200-
1990 – 1999
- 1999
- [c10]Khaled M. Elleithy, E. G. Abd-El-Fattah:
A Genetic Algorithm for Register Allocation. Great Lakes Symposium on VLSI 1999: 226-227 - 1998
- [c9]Mostafa M. Aref, Khaled M. Elleithy:
HOOVER: Hardware Object-Oriented Verification. Great Lakes Symposium on VLSI 1998: 351-355 - 1995
- [c8]Khaled M. Elleithy, Alaaeldin A. M. Amin:
An Event Logic Architecture for CIRCAL Algorithms. Parallel and Distributed Computing and Systems 1995: 311-316 - 1992
- [c7]Khaled M. Elleithy:
Systolic Arithmetic Architectures. VLSI Design 1992: 364-365 - 1991
- [j1]Khaled M. Elleithy, Magdy A. Bayoumi, Lois M. L. Delcambre:
VLSI implementation of a systolic database machine for relational algebra and hashing. Integr. 11(2): 169-190 (1991) - [c6]Khaled M. Elleithy, Magdy A. Bayoumi:
From Algorithms to Parallel Architectures: A Formal Approach. IPPS 1991: 358-363 - 1990
- [c5]Khaled M. Elleithy, Magdy A. Bayoumi:
A Framework for High Level Synthesis of Digital Architectures from U-Recursive Algorithms. ACM Conference on Computer Science 1990: 305-311 - [c4]Khaled M. Elleithy, Magdy A. Bayoumi:
A formal design methodology for parallel architectures. ASAP 1990: 603-614 - [c3]Khaled M. Elleithy, Magdy A. Bayoumi:
A formal high level synthesis approach for DSP architectures. ICASSP 1990: 897-990 - [c2]Khaled M. Elleithy, Magdy A. Bayoumi:
Formal Synthesis of a Parallel Architectures from Recursive Equations. ICPP (1) 1990: 145-148
1980 – 1989
- 1989
- [c1]Khaled M. Elleithy, Magdy A. Bayoumi, K. P. Lee:
θ(logN) architectures for RNS arithmetic decoding. IEEE Symposium on Computer Arithmetic 1989: 202-209
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint