Abdelrahman Elleithy

Abdelrahman Elleithy
  • University of Bridgeport

About

39
Publications
18,247
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
408
Citations
Current institution
University of Bridgeport

Publications

Publications (39)
Article
Full-text available
Security is one of the major concerns while designing robust protocols for underwater sensor networks (UWSNs). The underwater sensor node (USN) is an example of medium access control (MAC) that should control underwater UWSN, and underwater vehicles (UV) combined. Therefore, our proposed method, in this research, investigates UWSN combined with UV...
Article
Full-text available
Machine and deep learning techniques are two branches of artificial intelligence that have proven very efficient in solving advanced human problems. The automotive industry is currently using this technology to support drivers with advanced driver assistance systems. These systems can assist various functions for proper driving and estimate drivers...
Article
Full-text available
Monitoring drivers’ emotions is the key aspect of designing advanced driver assistance systems (ADAS) in intelligent vehicles. To ensure safety and track the possibility of vehicles’ road accidents, emotional monitoring will play a key role in justifying the mental status of the driver while driving the vehicle. However, the pose variations, illumi...
Article
Full-text available
According to the Center for Disease Control and Prevention (CDC), the average human life expectancy is 78.8 years. Specifically, 3.2 million deaths are reported yearly due to heart disease, cancer, Alzheimer’s disease, diabetes, and COVID-19. Diagnosing the disease is mandatory in the current way of living to avoid unfortunate deaths and maintain a...
Article
The mass adoption of WiFi (IEEE 802.11) technology has increased numbers of devices simultaneously attempting to use high-bandwidth applications such as video streaming in a finite portion of the frequency spectrum. These increasing numbers can be seen in the deployment of highly-dense wireless environments in which performance can be affected due...
Article
Full-text available
Recent technology advances in CMOS image sensors (CIS) enable their utilization in the most demanding of surveillance fields, especially visual surveillance and intrusion detection in intelligent surveillance systems, aerial surveillance in war zones, Earth environmental surveillance by satellites in space monitoring, agricultural monitoring using...
Conference Paper
Full-text available
Optic disc segmentation in retinal fundus images plays a critical rule in diagnosing a variety of pathologies and abnormalities related to eye retina. Most of the abnormalities that are related to optic disc lead to structural changes in the inner and outer zones of optic disc. Optic disc segmentation on the level of whole retina image degrades the...
Poster
Full-text available
Eye exam can be as efficacious as physical one in determining health concerns. Retina screening can be the very first clue to detecting a variety of hidden health issues including pre-diabetes and diabetes. Through the process of clinical diagnosis and prognosis; ophthalmologists rely heavily on the binary segmented version of retina fundus image;...
Article
Full-text available
Retinal vessels identification and localization aim to separate the different retinal vasculature structure tissues, either wide or narrow ones, from the fundus image background and other retinal anatomical structures such as optic disc, macula, and abnormal lesions. Retinal vessels identification studies are attracting more and more attention in r...
Conference Paper
In this paper we implement a multiple search engine algorithm based on fusion. The following approaches are used in our implementation: 1. Creation of multiple threads for parallel requests 2. Developing an efficient algorithm to combine results The main challenge in enquiring search engines is that the results returned from different engines do no...
Conference Paper
This paper presents a highly secure data hiding system (a.k.a. Steganography) in a cover image using the low frequency Curvelet domain. The contribution of the suggested technique is its high security, because it is using four secret keys (encryption key, two shuffling keys, data hiding key) and using only the low frequency component of Curvelet do...
Conference Paper
In this paper we present an advanced model for power consumption in communications. The new model for power consumed in communications takes into consideration parameters power consumption for the active mode, power consumption for the sleep mode, power consumption for the transient mode, transmission period, transient mode duration, sleep mode dur...
Conference Paper
In this paper we present an advanced model for power consumption in communications and study its effect on the lifetime of the wireless sensor networks in underground communications for dry sand. The power communications model is incorporated in the life time model of wireless sensor networks. The life time model takes into consideration several pa...
Article
Full-text available
In this paper we present a new model for the lifetime of wireless sensor networks used for sea water communications. The new model for power communications takes into consideration parameters such as power consumption for the active mode, power consumption for the sleep mode, power consumption for the transient mode, transmission period, transient...
Conference Paper
Full-text available
A comprehensive study of electromagnetic waves underwater propagation for a wireless sensor network is introduced in this paper. A mathematical model for the path loss due to attenuation of electromagnetic waves propa-gates in sea and pure water is given. Reflection from the air-water and water-sand interfaces as a function of distance between sens...
Article
Full-text available
In this paper we present a model for the lifetime of wireless sensor networks. The model takes into consideration several parameters such as the total number of sensors, network size, percentage of sink nodes, location of sensors, the mobility of sensors, and power consumption. A definition of the life time of the network based on three different c...
Conference Paper
Full-text available
There is two approaches for handling timing constraints in a heterogeneous network; conservatives and optimistic algorithms. In optimistic algorithms, time constraints are allowed to be violated with the help of a time wrap algorithm. Global Virtue Time (GVT) is a necessary mechanism for implementing time wrap algorithm. Mattern [2] has introduced...
Conference Paper
Full-text available
A heterogeneous network is a connected network of different platforms and operating systems. Job scheduling is a problem of selecting a free resource for unexecuted task from a pool of submitted tasks. Furthermore, it is required to find for every resource the best order of the tasks assigned to it. The purpose of this paper is to develop an effici...
Article
Full-text available
Wi-Max (Worldwide) Interoperability for Microwave Access is a new technology that can provide broadband access at a high bandwidth. The availability of microwaves towers provides a very cost effective for delivering high bandwidth in metropolitan. Wi-Max is a multi-hop network where security is a major issue in designing such networks. Designing a...

Network

Cited By