Atef Elsayed AbouelazmMenoufia University, Faculty of Electronic Engineering · Electronics and Electrical Communications
Atef Elsayed Abouelazm
PhD
About
126
Publications
45,264
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
909
Citations
Introduction
I have the B.Sc. and M.Sc. from the Faculty of Electronic Engineering, Menoufia University, Egypt . I have the Ph.D from Warsaw University of Technology, Poland, 1990. My researches were in the areas of digital communications, with special emphasis on information theory, error control coding, and coded modulation. The main topics of my interests include the use of convolutional ,trellis codes, LDPC, and Turbo codes in the development of coding standards for high speed data modems, digital satellite communication, and deep space channels. I have many research papers in the field of line codes, channel codes and signal processing. Currently my research is in OFDM system, WIMAX system, cognitive radios, D2D Communication and WSN.
Additional affiliations
January 2012 - July 2015
Menoufia University, Faculty of Electronic Engineering
Position
- Professor , Former Deputy Prime Menoufia University for Community Service and Environmental Development, Faculty of Electronc Engineering Menoufia University
January 2012 - July 2015
Menoufia University, Faculty of Electronic Engineering
Position
- Vice President, Menoufia Univsersity
Education
September 1986 - December 1990
Publications
Publications (126)
The paper proposes a robust crypto-steganography approach that secures the data without affecting it and efficient anti-forgery tool. The proposed approach consists of main three security levels with n-round sub-levels. The hybridization of crypto-chaos based tools with various data hiding tools is performed perfectly. The paper carried out several...
Reinforcement of the Internet of Medical Things (IoMT) network security has become extremely significant as these networks enable both patients and healthcare providers to communicate with each other by exchanging medical signals, data, and vital reports in a safe way. To ensure the safe transmission of sensitive information, robust and secure acce...
The core premise of cancelable biometrics lies in the creation of a distinct biometric template for every individual, which can be either canceled or regenerated as needed. This process requires the use of a uniquely-defined key during the generation of such template. The generated templates are tailored to be key-specific. This ensures that each d...
Deep learning, machine learning and artificial intelligence have been proposed for enhancing the multimedia processing and security as well as the advanced security tools for 6G networks. The vision of 6G networks refers to linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data over th...
The vision of 6G networks refers to linking undersea, terrestrial, and space networks together. This vision involves transferring a massive amount of data over the network. 6G network requires very high levels of security. This paper presents the proposed vision of 6G security. This paper focuses on security levels on 6G network. The paper proposes...
Nowadays, technology is rapidly evolving. People become dependent on biometric traits in their daily life. Biometric traits are unique such as face, fingerprint, iris, palmprint, and voice. But biometrics-based systems suffer from weakness, if the system has been hacked, the biometric database will be lost forever. So, researchers have developed wa...
The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wire...
The proposed visions for the sixth generation wireless communications network indicate that it will have the ability to transmit massive amounts of data in a very short time. These visions require the sixth-generation network to have a high level of security. This paper focuses on the confidentiality and privacy of data on the sixth-generation wire...
Diabetes mellitus persons have an eye disease that is called Diabetic Retinopathy (DR). The early discovery of this disease is very useful to determine its degree. Fundus images can be used for the detection of DR, according to symptoms that are apparent in the retina. In this paper, a simple method based on Dynamic Piecewise Linear Transformation...
Security of Internet-of-Medical-Things (IoMT) networks has evolved as a vital issue in recent years. The IoMT networks are designed to link patients with caregivers. All reports, data, and medical signals are transferred over these networks. Hence, these networks require robust and secure access strategies for patients to send their vital data or r...
The security is important issue in wireless networks. This paper discusses audio watermarking as a tool to improve the security of image communication over the IEEE 802.15.4 ZigBee network. The adopted watermarking method implements the Singular-Value Decomposition (SVD) mathematical technique. This method is based on embedding a chaotic encrypted...
This paper studies a vital issue in wireless commu-nications, which is the transmission of images over wireless networks. IEEE ZigBee 802.15.4 is a short-range communi-cation standard that could be used for small distance multi-media transmissions. In fact, the ZigBee network is a wireless personal area network (WPAN), which needs a strong inter-le...
The videoscope (VS) images have poor quality and low contrast. Hence, in this paper, three proposed frameworks to improve the quality of VS images are presented. The first framework depends on contrast-limited adaptive histogram equalization (CLAHE) with adaptive gamma correction. The second framework depends on homomorphic processing. The third fr...
This paper is mainly concerned with video watermarking as a tool to secure the video transmission process over wireless channels. In addition, the relatability of the communication process is guaranteed through a hybrid error control scheme. The watermarking depends on applying a hybrid structure of Block-based Singular Value Decomposition (B-SVD)...
Artificial intelligence (AI) has recently been used in nanomedical applications, in which implanted intelligent nanosystems inside the human body were used to diagnose and treat a variety of ailments with the help of the Internet of biological Nano Things (IoBNT). Biological circuit engineering or nanomaterial-based architectures can be used to app...
Remote healthcare and telemedicine technology have witnessed a large and rapid development in the last decade with the large development of the Internet of Things (IoT) technology, where various types of medical sensors are aggregated for measuring medical parameters and transmitting them anywhere. Smart portable products can now be used to monitor...
Smart health surveillance technology has attracted wide attention between patients and professionals or specialists to provide early detection of critical abnormal situations without the need to be in direct contact with the patient. This paper presents a secure smart monitoring portable multivital signal system based on Internet-of-Things (IoT) te...
One of the known problems in security systems is to identify persons based on certain signatures. Biometrics have been adopted in security systems to identify persons based on some physiological or behavioral characteristics that they own. Photoplethysmography (PPG) is a physiological signal that is used to describe the volumetric change of blood f...
Human identification is considered as a serious challenge for several applications such as cybersecurity and access control. Recently, the trend of human identification has been directed to human biometrics, which can be used to recognize persons based on some physiological or behavioral characteristics that they own, such as fingerprint, iris, and...
A contact-free inexpensive measurement system with an algorithm based on the integral form of video frames is proposed to estimate the respiration rate from an extracted respiration pattern. The proposed algorithm is applied and tested on 28 videos of sleeping-simulated positions, and the results are compared with the manual visual inspection value...
In this Letter, the authors propose a novel approach to maximise the receiver response for molecular communication systems. The previously reported investigations for such systems are limited to a Dirac impulse and a rectangular pulse to transmit molecular information to a receiver nanomachine. Alternatively, they use a signal matched to the channe...
This paper presents a secure IoT-based health monitoring system that shortens the distance between a patient and the relevant medical organization. Vital signals captured from sensors are processed and encrypted using AES (Advanced Encryption Standard) algorithm before sending to the cloud for storage. A Node MCU microcontroller is utilized to carr...
Application of molecular communication
Keywords: Nanomachine, Molecular Communication, Diffusion, channel capacity
Abstract- The main application of molecular communication (MC) technology is the medical field wherein the communication medium is the blood vessel. This medium is flow-based diffusion MC and the channel capacity plays an important role. Unlike previous literature, we present the performance analysis of the channel capacity for flow based-diffusive...
Abstract: Device to Device communication system is considered one of the most effective technology directions for solving the spectrum scarcity problem in the 5G wireless communication. In this paper, an electronic relay is proposed to be utilized in D2D communication. The electronic relay is a hybrid cooperative relay consists of; compress and for...
In this paper the computational complexity of the image transmission over mobile communications channel is investigated. The computational complexity due to the amount of transmitted data and the utilized data protection schemes is analyzed over wireless channel with the different image transmission scenarios. The proposed secured and efficient pro...
Research works of Wireless Sensor Networks (WSNs) applications and its constraints solutions occupy wide area around the world and attract many researchers. In this paper, an important one of environmental WSN applications is presented that is the water monitoring applications. An efficient approach for monitoring and controlling water parameters i...
In this paper, the cooperative electronic relay in device to device (D2D) communication system will be used which is not clarified until now. A scenario in our work will be made by using three types of cooperative diversities together that are compressandforwardrelay,decodeandforwardrelay(DF)andamplifyandforwardrelay(AF).Numericalresultsshowthat, th...
Design efficient an interactive system for water pollution monitoring and quality control is proposed in this paper utilizing different sensors and employing Information Communication Technology (ICT). The presented system is built based on the pH and temperature water parameters. The system consists of sensors, Arduino controller and designed Grap...
Design efficient an interactive system for water pollution monitoring and quality control is proposed in this paper utilizing different sensors and employing Information Communication Technology (ICT). The presented system is built based on the pH and temperature water parameters. The system consists of sensors, Arduino controller and designed Grap...
This paper is devoted to introduce a special classes of (QC-LDPC) with very restricted code parameters based on planar difference families. Such difference families could be obtained by numerical analysis and computer programs. The resulting codes have parity check matrices with column-weight greater than three, at least no 4-cycle and approximatel...
Bluetooth is a wireless personal area network. This type of networks is widely used for image communication. This paper presents a study for the transmission of images over mobile Bluetooth networks. It presents a novel chaotic interleaving scheme for this purpose. In this scheme, the chaotic Baker map is used for bit interleaving and enhanced data...
We present an analytical model for hybrid multilayer light emitting device based on core–shell quantum dots as luminance centers. The model is based on different physical processes that govern the device performance. These physical processes are the electronic charge transport, the exciton formation, energy transfer and the out-coupling efficiency....
This paper is devoted to introduce a special classes of (QC-LDPC) with very restricted code parameters based on planar difference families. Such difference families could be obtained by numerical analysis and computer programs. The resulting codes have parity check matrices with column-weight greater than three, at least no 4-cycle and approximatel...
This article studies a vital issue in wireless communications, which is the transmission of audio signals over wireless networks. It presents a novel interleaver scheme for protection against error bursts and reduction the packet loss of the audio signals. The proposed technique in the article is the chaotic interleaver; it is based on chaotic Bake...
Cognitive Radio (CR) technology is one of the strong candidate technologies to solve the spectrum scarcity problems. In this paper, we tackle the problem of secure data transmission between a secondary user transmitter and receiver through a relay in the presence of an eavesdropper in a cognitive radio network. The proposed scheme selects the best...
In this study, the physical layer security for cognitive radio network (CRN) will be investigated in which a secondary user transmitter (SU-Tx) sends confidential information to a SU receiver (SU-Rx) on the same frequency band of a primary user (PU) in the presence of an eavesdropper receiver. Moreover, relay selection scheme is proposed for the se...
This article studies improving of coloured JPEG image transmission over mobile wireless personal area network through the Bluetooth networks. This article uses many types of enhanced data rate and asynchronous connectionless packets. It presents a proposed chaotic interleaving technique for improving a transmission of coloured images over burst err...
With increasing the applications fields of low-power short range wireless communication, especially Bluetooth, the most of these applications need transmitting image. This paper proposes improving the colored JPEG image transmission over mobile Bluetooth network using Enhanced Data Rate (EDR) packets with the 2DH3 and 2DM3 EDR Asynchronous Connecti...
With increasing the applications fields of low-power short range wireless communication, especially Bluetooth, the most of these applications need transmitting image. This paper proposes improving the colored JPEG image transmission over mobile Bluetooth network using Enhanced Data Rate (EDR) packets with the 2DH3 and 2DM3 EDR Asynchronous Connecti...
Turbo codes play a major role in channel error correction schemes used in wireless communications. Turbo codes emerged in 1993 and since that time they dominate the research in error control coding together with low-density parity-check codes. Due to their remarkable performances, turbo code and low density parity check code have been accepted to a...
Transmitted images may nave different applications, inch ai commercial, military and medical applications. So It Is necessary to encrypt Image data before transmission over the network to preserve its security and prevent unauthorized access. Applying the international data encryption algorithm (IDEA) over the whole image is time consuming and prov...
This paper presents a new approach for audio watermarking using the Singular Value Decomposition (SVD) mathematical technique. The proposed approach can be used for data hiding in the audio signals transmitted over wireless networks and for multi-level security systems as will be stated in the applications section. This approach is based on embeddi...
In this work we investigate the operation mechanism of hybrid organic/inorganic quantum dot light emitting devices (QD-LEDs). We employ a numerical method previously established to describe current-voltage characteristics, spatial distributions of charge, electric field, and recombination rate in organic light emitting devices (OLEDs). The numerica...
This paper studies a vital issue in wireless communications, which is the transmission of images over Wireless Personal Area Networks (WPANs) through the Bluetooth network. It presents a simple method to improve the efficiency of error control code of old Bluetooth versions over mobile WPANs through Interleaved Error Control Code (IECC) technique....
We present a detailed analysis and computations of the emitted radiation spectrum for quantum dots (QDs) microcavity light-emitting
device, where the total physical thickness of the cavity spacer was kept at 254nm which corresponds to the wavelength of
the mode number (m) = 1 resonant mode of the cavity. Our calculation gives good results for QD di...
will be investigated. This method is cooperative spectrum sensing which is based on energy detection in CR networks in order to overcome fading, noise and shadowing effects on individual CR user and increase the reliability and efficiency of spectrum sensing. The sensing information from CR users combines at the Fusion center (common receiver) by s...
In this paper two different Fast Block Matching Algorithms (FBMAs) are introduced and analyzed. They are One Point Pentagon Inner Search (OPPEN) and Predicted One Point Hexagon Inner Search (POPHEX) algorithms. The proposed algorithms are compared with other FBMAs like Diamond Search (DS), and Hexagonal based search (HEX) algorithms using MATLAB en...
With increasing utilization of the wireless devices in different fields such as medical devices and industrial fields, the paper presents a method for simplify the Bluetooth packets with throughput enhancing. The paper studies a vital issue in wireless communications, which is the throughput of data over wireless networks. In fact, the Bluetooth an...
With increasing the using of wireless technologies in essential fields such as the medical application, this paper proposes different scenarios for the transmission of images over wireless networks. The paper uses the IEEE ZigBee 802.15.4 for applying the proposed schemes. It is a Wireless Personal Area Network (WPAN). This paper presents a novel c...
We present an optical model based on Green function to investigate the effect of using Single Wall Carbon Nanotube (SWCNT) as anode for infrared light emitting devices (IR QD-LEDs). To the best of our knowledge there is no report in using SWCNT as anode in IR QD-LEDs. We have studied the emitted power distribution among the different optical modes...
The security is important issue in wireless networks. This paper discusses audio
watermarking as a tool to improve the security of image communication over the IEEE
802.15. 4 ZigBee network. The adopted watermarking method implements the Singular-
Value Decomposition (SVD) mathematical technique. This method is based on embedding a
chaotic encry...
Channel Quality Driven Data Rate (CQDDR) is employed to selects the packet size by Received Signal Strength Indicator (RSSI) over Bluetooth network according to channel conditions. This paper tries to improve the throughput over Bluetooth system in classic and Enhanced Data Rate (EDR) packets. The paper studies the adaptive Bluetooth packet format...
Motion Estimation (ME) is vital element in video coding as it reduces temporal redundancy. Given that the motion estimation stage is very complex in terms of computational effort, a hardware implementation on a reconfigurable circuit is crucial for the requirements of different real time multimedia applications. Hexagonal search algorithm is one of...
It is well known that an interleaver with random properties, quite often generated by pseudo-random algorithms, is one of the essential building blocks of turbo codes, however, randomly generated interleavers has a lack of a compact representation that leads to a simple implementation. Especially for satellite application, we avoid using memories t...
In this paper, we try to improve the image transmission over mobile Bluetooth network using Enhanced Data
Rate (EDR) packets. This paper uses the classic and EDR Asynchronous Connectionless (ACL) packets. This paper presents a proposed chaotic interleaving technique to improve a transmission of images over Bluetooth systems. Also, it proposes diffe...