Khaled Elleithy
Cited by
Cited by
Sensor-based assistive devices for visually-impaired people: Current status, challenges, and future directions
W Elmannai, K Elleithy
Sensors 17 (3), 565, 2017
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
RJ Mstafa, KM Elleithy, E Abdelfattah
IEEE access 5, 5354-5365, 2017
Retinal vessels segmentation techniques and algorithms: a survey
J Almotiri, K Elleithy, A Elleithy
Applied Sciences 8 (2), 155, 2018
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 75, 10311-10333, 2016
Detection of obstructive sleep apnea through ECG signal features
L Almazaydeh, K Elleithy, M Faezipour
2012 IEEE International Conference on Electro/Information Technology, 1-6, 2012
A highly secure video steganography using Hamming code (7, 4)
RJ Mstafa, KM Elleithy
IEEE Long Island systems, applications and technology (LISAT) conference …, 2014
Obstructive sleep apnea detection using SVM-based classification of ECG signal features
L Almazaydeh, K Elleithy, M Faezipour
2012 annual international conference of the IEEE engineering in medicine and …, 2012
Stages-based ECG signal analysis from traditional signal processing to machine learning approaches: A survey
M Wasimuddin, K Elleithy, AS Abuzneid, M Faezipour, O Abuzaghleh
IEEE Access 8, 177782-177803, 2020
Fast and flexible architectures for RNS arithmetic decoding
KM Elleithy, MA Bayoumi
IEEE Transactions on Circuits and Systems II Analog and Digital Signal …, 1992
Energy-efficient boarder node medium access control protocol for wireless sensor networks
A Razaque, KM Elleithy
Sensors 14 (3), 5074-5117, 2014
Real-time QoS routing protocols in wireless multimedia sensor networks: study and analysis
A Alanazi, K Elleithy
Sensors 15 (9), 22209-22233, 2015
Denial of service attack techniques: analysis, implementation and comparison
KM Elleithy, D Blagovic, WK Cheng, P Sideleau
Innovative techniques in instruction technology, e-learning, e-assessment and education
M Iskander
Springer Science & Business Media, 2008
Trajectory planning and collision avoidance algorithm for mobile robotics system
MM Almasri, AM Alajlan, KM Elleithy
IEEE Sensors journal 16 (12), 5021-5028, 2016
Compressed and raw video steganography techniques: a comprehensive survey and analysis
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 76, 21749-21786, 2017
A neural network system for detection of obstructive sleep apnea through SpO2 signal features
L Almazaydeh, M Faezipour, K Elleithy
International Journal of Advanced Computer Science and Applications 3 (5), 2012
Comparison of autoencoder and principal component analysis followed by neural network for e-learning using handwritten recognition
J Almotiri, K Elleithy, A Elleithy
2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)
RJ Mstafa, KM Elleithy
2015 wireless telecommunications symposium (WTS), 1-8, 2015
Apnea detection based on respiratory signal classification
L Almazaydeh, K Elleithy, M Faezipour, A Abushakra
Procedia Computer Science 21, 310-316, 2013
Sensor fusion based model for collision free mobile robot navigation
M Almasri, K Elleithy, A Alajlan
Sensors 16 (1), 24, 2016
The system can't perform the operation now. Try again later.
Articles 1–20