Khaled Elleithy
Cited by
Cited by
Sensor-based assistive devices for visually-impaired people: current status, challenges, and future directions
W Elmannai, K Elleithy
Sensors 17 (3), 565, 2017
Fast and flexible architectures for RNS arithmetic decoding
KM Elleithy, MA Bayoumi
IEEE Transactions on Circuits and Systems II Analog and Digital Signal …, 1992
A highly secure video steganography using Hamming code (7, 4)
RJ Mstafa, KM Elleithy
IEEE Long Island Systems, Applications and Technology (LISAT) Conference …, 2014
Detection of obstructive sleep apnea through ECG signal features
L Almazaydeh, K Elleithy, M Faezipour
2012 IEEE International Conference on Electro/Information Technology, 1-6, 2012
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
RJ Mstafa, KM Elleithy, E Abdelfattah
IEEE access 5, 5354-5365, 2017
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 75 (17), 10311-10333, 2016
Retinal vessels segmentation techniques and algorithms: a survey
J Almotiri, K Elleithy, A Elleithy
Applied Sciences 8 (2), 155, 2018
Real-time QoS routing protocols in wireless multimedia sensor networks: Study and analysis
A Alanazi, K Elleithy
Sensors 15 (9), 22209-22233, 2015
Energy-efficient boarder node medium access control protocol for wireless sensor networks
A Razaque, KM Elleithy
Sensors 14 (3), 5074-5117, 2014
Obstructive sleep apnea detection using SVM-based classification of ECG signal features
L Almazaydeh, K Elleithy, M Faezipour
2012 annual international conference of the IEEE engineering in medicine and …, 2012
Innovative techniques in instruction technology, e-learning, e-assessment and education
M Iskander
Springer Science & Business Media, 2008
A neural network system for detection of obstructive sleep apnea through spo2 signal
L Almazaydeh, M Faezipour, K Elleithy
Editorial Preface 3 (5), 2012
Trajectory planning and collision avoidance algorithm for mobile robotics system
MM Almasri, AM Alajlan, KM Elleithy
IEEE Sensors journal 16 (12), 5021-5028, 2016
LS-LEACH: a new secure and energy efficient routing protocol for wireless sensor networks
M Alshowkan, K Elleithy, H AlHassan
2013 IEEE/ACM 17th International Symposium on Distributed Simulation and …, 2013
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)
RJ Mstafa, KM Elleithy
2015 wireless telecommunications symposium (WTS), 1-8, 2015
Schema matching in the context of model driven engineering: From theory to practice
D Lopes, S Hammoudi, Z Abdelouahab
Advances in Systems, Computing Sciences and Software Engineering, 219-227, 2006
Denial of service attack techniques: analysis, implementation and comparison
KM Elleithy, D Blagovic, WK Cheng, P Sideleau
Apnea detection based on respiratory signal classification
L Almazaydeh, K Elleithy, M Faezipour, A Abushakra
Procedia Computer Science 21, 310-316, 2013
Compressed and raw video steganography techniques: a comprehensive survey and analysis
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 76 (20), 21749-21786, 2017
Dynamic clustering of heterogeneous wireless sensor networks using a genetic algorithm, towards balancing energy exhaustion
M Elhoseny, K Elleithy, H Elminir, X Yuan, A Riad
International Journal of Scientific & Engineering Research 6 (8), 1243-1252, 2015
The system can't perform the operation now. Try again later.
Articles 1–20