
Abdelrahman Elleithy- University of Bridgeport
Abdelrahman Elleithy
- University of Bridgeport
About
39
Publications
18,247
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
408
Citations
Introduction
Skills and Expertise
Current institution
Publications
Publications (39)
Security is one of the major concerns while designing robust protocols for underwater sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium access control (MAC) that should control underwater UWSN, and underwater vehicles (UV) combined. Therefore, our proposed method, in this research, investigates UWSN combined with UV...
Machine and deep learning techniques are two branches of artificial intelligence that have proven very efficient in solving advanced human problems. The automotive industry is currently using this technology to support drivers with advanced driver assistance systems. These systems can assist various functions for proper driving and estimate drivers...
Monitoring drivers’ emotions is the key aspect of designing advanced driver assistance systems (ADAS) in intelligent vehicles. To ensure safety and track the possibility of vehicles’ road accidents, emotional monitoring will play a key role in justifying the mental status of the driver while driving the vehicle. However, the pose variations, illumi...
According to the Center for Disease Control and Prevention (CDC), the average human life expectancy is 78.8 years. Specifically, 3.2 million deaths are reported yearly due to heart disease, cancer, Alzheimer’s disease, diabetes, and COVID-19. Diagnosing the disease is mandatory in the current way of living to avoid unfortunate deaths and maintain a...
The mass adoption of WiFi (IEEE 802.11) technology has increased numbers of devices simultaneously attempting to use high-bandwidth applications such as video streaming in a finite portion of the frequency spectrum. These increasing numbers can be seen in the deployment of highly-dense wireless environments in which performance can be affected due...
Recent technology advances in CMOS image sensors (CIS) enable their utilization in the most demanding of surveillance fields, especially visual surveillance and intrusion detection in intelligent surveillance systems, aerial surveillance in war zones, Earth environmental surveillance by satellites in space monitoring, agricultural monitoring using...
Optic disc segmentation in retinal fundus images plays a critical rule in diagnosing a variety of pathologies and abnormalities related to eye retina. Most of the abnormalities that are related to optic disc lead to structural changes in the inner and outer zones of optic disc. Optic disc segmentation on the level of whole retina image degrades the...
Eye exam can be as efficacious as physical one in determining health concerns. Retina screening can be the very first clue to detecting a variety of hidden health issues including pre-diabetes and diabetes. Through the process of clinical diagnosis and prognosis; ophthalmologists rely heavily on the binary segmented version of retina fundus image;...
Retinal vessels identification and localization aim to separate the different retinal vasculature structure tissues, either wide or narrow ones, from the fundus image background and other retinal anatomical structures such as optic disc, macula, and abnormal lesions. Retinal vessels identification studies are attracting more and more attention in r...
In this paper we implement a multiple search engine algorithm based on fusion. The following approaches are used in our implementation: 1. Creation of multiple threads for parallel requests 2. Developing an efficient algorithm to combine results The main challenge in enquiring search engines is that the results returned from different engines do no...
This paper presents a highly secure data hiding system (a.k.a. Steganography) in a cover image using the low frequency Curvelet domain. The contribution of the suggested technique is its high security, because it is using four secret keys (encryption key, two shuffling keys, data hiding key) and using only the low frequency component of Curvelet do...
In this paper we present an advanced model for power consumption in communications. The new model for power consumed in communications takes into consideration parameters power consumption for the active mode, power consumption for the sleep mode, power consumption for the transient mode, transmission period, transient mode duration, sleep mode dur...
In this paper we present an advanced model for power consumption in communications and study its effect on the lifetime of the wireless sensor networks in underground communications for dry sand. The power communications model is incorporated in the life time model of wireless sensor networks. The life time model takes into consideration several pa...
In this paper we present a new model for the lifetime of wireless sensor networks used for sea water communications. The new model for power communications takes into consideration parameters such as power consumption for the active mode, power consumption for the sleep mode, power consumption for the transient mode, transmission period, transient...
A comprehensive study of electromagnetic waves underwater propagation for a wireless sensor network is introduced in this paper. A mathematical model for the path loss due to attenuation of electromagnetic waves propa-gates in sea and pure water is given. Reflection from the air-water and water-sand interfaces as a function of distance between sens...
In this paper we present a model for the lifetime of wireless sensor
networks. The model takes into consideration several parameters such as the
total number of sensors, network size, percentage of sink nodes, location of
sensors, the mobility of sensors, and power consumption. A definition of the
life time of the network based on three different c...
There is two approaches for handling timing constraints in a heterogeneous network; conservatives and optimistic algorithms.
In optimistic algorithms, time constraints are allowed to be violated with the help of a time wrap algorithm. Global Virtue
Time (GVT) is a necessary mechanism for implementing time wrap algorithm. Mattern [2] has introduced...
A heterogeneous network is a connected network of different platforms and operating systems. Job scheduling is a problem of
selecting a free resource for unexecuted task from a pool of submitted tasks. Furthermore, it is required to find for every
resource the best order of the tasks assigned to it. The purpose of this paper is to develop an effici...
Wi-Max (Worldwide) Interoperability for Microwave Access is a new technology that can provide broadband access at a high bandwidth. The availability of microwaves towers provides a very cost effective for delivering high bandwidth in metropolitan. Wi-Max is a multi-hop network where security is a major issue in designing such networks. Designing a...