Khaled Elleithy
Cited by
Cited by
Sensor-based assistive devices for visually-impaired people: Current status, challenges, and future directions
W Elmannai, K Elleithy
Sensors 17 (3), 565, 2017
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC
RJ Mstafa, KM Elleithy, E Abdelfattah
IEEE access 5, 5354-5365, 2017
Retinal vessels segmentation techniques and algorithms: a survey
J Almotiri, K Elleithy, A Elleithy
Applied Sciences 8 (2), 155, 2018
Stages-based ECG signal analysis from traditional signal processing to machine learning approaches: A survey
M Wasimuddin, K Elleithy, AS Abuzneid, M Faezipour, O Abuzaghleh
IEEE Access 8, 177782-177803, 2020
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 75, 10311-10333, 2016
Detection of obstructive sleep apnea through ECG signal features
L Almazaydeh, K Elleithy, M Faezipour
2012 IEEE International Conference on Electro/Information Technology, 1-6, 2012
Obstructive sleep apnea detection using SVM-based classification of ECG signal features
L Almazaydeh, K Elleithy, M Faezipour
2012 annual international conference of the IEEE engineering in medicine and …, 2012
A highly secure video steganography using Hamming code (7, 4)
RJ Mstafa, KM Elleithy
IEEE Long Island systems, applications and technology (LISAT) conference …, 2014
Fast and flexible architectures for RNS arithmetic decoding
KM Elleithy, MA Bayoumi
IEEE Transactions on Circuits and Systems II Analog and Digital Signal …, 1992
Energy-efficient boarder node medium access control protocol for wireless sensor networks
A Razaque, KM Elleithy
Sensors 14 (3), 5074-5117, 2014
Denial of service attack techniques: analysis, implementation and comparison
KM Elleithy, D Blagovic, WK Cheng, P Sideleau
Real-time QoS routing protocols in wireless multimedia sensor networks: study and analysis
A Alanazi, K Elleithy
Sensors 15 (9), 22209-22233, 2015
Innovative techniques in instruction technology, e-learning, e-assessment and education
M Iskander
Springer Science & Business Media, 2008
Compressed and raw video steganography techniques: a comprehensive survey and analysis
RJ Mstafa, KM Elleithy
Multimedia Tools and Applications 76, 21749-21786, 2017
Trajectory planning and collision avoidance algorithm for mobile robotics system
MM Almasri, AM Alajlan, KM Elleithy
IEEE Sensors journal 16 (12), 5021-5028, 2016
A neural network system for detection of obstructive sleep apnea through SpO2 signal features
L Almazaydeh, M Faezipour, K Elleithy
International Journal of Advanced Computer Science and Applications 3 (5), 2012
Comparison of autoencoder and principal component analysis followed by neural network for e-learning using handwritten recognition
J Almotiri, K Elleithy, A Elleithy
2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017
Apnea detection based on respiratory signal classification
L Almazaydeh, K Elleithy, M Faezipour, A Abushakra
Procedia Computer Science 21, 310-316, 2013
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11)
RJ Mstafa, KM Elleithy
2015 wireless telecommunications symposium (WTS), 1-8, 2015
A highly accurate and reliable data fusion framework for guiding the visually impaired
WM Elmannai, KM Elleithy
Ieee Access 6, 33029-33054, 2018
The system can't perform the operation now. Try again later.
Articles 1–20