Khaled Elleithy

Khaled Elleithy
University of Bridgeport · Department of Computer Science & Engineering

Ph.D.

About

515
Publications
400,900
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,897
Citations
Introduction
Dr. Elleithy has worked in academia for 35 years in various administrative and teaching roles, including Ph.D. Program Director, Associate Dean for Engineering, Associate Vice President for Graduate Studies and Research, Associate Dean of the College of Engineering, Business, and Education, and Dean of the College of Engineering, Business, and Education. Dr. Elleithy is the editor / co-editor of 14 books published by Springer for advances in Systems, Computing Sciences and Software.

Publications

Publications (515)
Article
Full-text available
In WSNs, the most critical issue is energy consumption as sensor nodes have limited resources. The sensors collect data from the environment where they can fail due to variations in pressure, temperature, and electromagnetic noise. All these can result in misleading readings and measurements where a lot of energy is consumed. Therefore, data fusion...
Article
Full-text available
The applications of WSN can be quiet numerous. In applications like battlefield monitoring, grid power generation, health systems, sensors are deployed on large scale. During such deployment, energy efficiency must be proficient, which requires clustering, in the WSN architecture. Clustering architecture requires maintenance of sensor nodes due to...
Conference Paper
Full-text available
The aim of this paper is to detect Rogue Access Points (RAPs) that clone legitimate Access Points (APs) characteristics. A novel passive approach that takes advantage of the characteristics of physical layer fields via the Radiotap length is proposed. This approach is a general fingerprint, thus, it can be used for different purposes such as identi...
Conference Paper
Full-text available
the reported research in literature for message transformation by a third party does not provide the necessary efficiency and security against different attacks. The data transmitted through the computer network must be confidential and authenticated in advance. In this paper, we develop and improve security of the braided single stage quantum cryp...
Article
Full-text available
Quantum machine learning holds the potential to revolutionize cancer treatment and diagnostic imaging by uncovering complex patterns beyond the reach of classical methods. This study explores the effectiveness of quantum convolutional layers in classifying ultrasound breast images for cancer detection. By encoding classical data into quantum states...
Article
Full-text available
Current AI detection systems often struggle to distinguish between Arabic human-written text (HWT) and AI-generated text (AIGT) due to the small marks present above and below the Arabic text called diacritics. This study introduces robust Arabic text detection models using Transformer-based pre-trained models, specifically AraELECTRA, AraBERT, XLM-...
Article
Full-text available
The effectiveness of existing AI detectors is notably hampered when processing Arabic texts. This study introduces a novel AI text classifier designed specifically for Arabic, tackling the distinct challenges inherent in processing this language. A particular focus is placed on accurately recognizing human-written texts (HWTs), an area where existi...
Article
Full-text available
This research presents a novel approach to detecting epileptic seizures leveraging the strengths of Machine Learning (ML) and Deep Learning (DL) algorithms in EEG signals. Epileptic seizures are neurological events with distinctive features found in Electroencephalography (EEG) that lend considerable credibility to researchers. Machine Learning (ML...
Article
Full-text available
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information, a practice known as phishing. This study utilizes three distinct methodologies, Term Frequency-Inverse Document Frequency, Word2Vec, and Bidirectional Encoder Representations from Transformers, to evaluate the ef...
Article
Full-text available
Quantum computing is a promising technology that may provide breakthrough solutions to today’s difficult problems such as breaking encryption and solving large-scale combinatorial optimization problems. An algorithm referred to as Quantum Approximate Optimization Algorithm (QAOA) has been recently proposed to approximately solve hard problems using...
Conference Paper
Quantum Machine Learning (QML) is an interdisciplinary field combining Quantum Computing (QC) and Machine Learning (ML). It has gained increased attention due to advances in near-term hardware implementations of quantum devices. The use of QML has proven to result in a significant improvement in performance and computational speed. Consequently, QM...
Article
Full-text available
Epileptic seizure detection classification distinguishes between epileptic and non-epileptic signals and is an important step that can aid doctors in diagnosing and treating epileptic seizures. In this paper, we studied the existing epileptic seizure detection methods in terms of challenges and processes developed based on electroencephalograph (EE...
Conference Paper
Full-text available
In this paper, we present an overview of quantum neural network (QNN) and quantum computing benefits in the Artificial Intelligence field with methods used to enhance the application of machine learning. The approach uses quantum computers to enhance Convolutional Neural Network (CNN) with Hybrid QNNs using IBM Qiskit called the Convolutional Neura...
Article
Full-text available
This study aims to examine information technology students' perceptions toward the use of virtual reality technology, their behavioral intention to use such technology for educational purposes, and the relationship between their perceptions toward the use of virtual reality technology and their behavioral intention to use virtual reality technology...
Article
Full-text available
Clinical text classification of electronic medical records is a challenging task. Existing electronic records suffer from irrelevant text, misspellings, semantic ambiguity, and abbreviations. The approach reported in this paper elaborates on machine learning techniques to develop an intelligent framework for classification of the medical transcript...
Article
Full-text available
This paper aims to design and implement a robust wireless charging system that utilizes affordable materials and the principle of piezoelectricity to generate clean energy to allow the user to store the energy for later use. A wireless charging system that utilizes the piezoelectricity generated as a power source and integrated with Qi-standard wir...
Article
Full-text available
Face recognition is one of the most researched subjects in computer vision. The attention it receives is due to the complexity of the problem. Face recognition models have to deal with a wide variety of intraclass variations such as pose variations, facial expressions, the effect of aging, and natural occlusion due to different illumination. This c...
Article
Full-text available
This paper introduces a novel approach to enhance the efficiency of compressing Arabic Unicode text using the Lempel-Ziv-Welch (LZW) technique. This method includes two stages: transformation and compression. During the first phase, a multi-level scheme that works according to the level of words, syllables, and characters replaces multi-byte symbol...
Conference Paper
Full-text available
This paper addresses aspects related to quantum machine-based classification such as data encoding into quantum states, Barren plateau, robustness, and effectiveness with developing a classical artificial neural versus fully and hybrid quantum neural network approach. The two approaches were compared with a classical artificial neural network using...
Article
Full-text available
The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selec...
Article
Shadows in images and videos can cause the failure of computer vision techniques’ performance, such as segmentation, tracking, object detection, and recognition. Therefore, we propose a unique shadow detection for images and videos using artificial intelligence techniques. Our system is effective and can process real-time frames with different text...
Article
Full-text available
Recent rapid technological advancements in pattern recognition and computer vision have led to great results on a wide range of applications. One of these applications is herbal plant species identification, as the proper automated system for the recognition of herbal plants is required for botanists to study therapeutic and nutritional uses of her...
Article
Full-text available
A high-efficiency crystalline silicon-based solar cell in the visible and near-infrared regions is introduced in this paper. A textured TiO2 layer grown on top of the active silicon layer and a back reflector with gratings are used to enhance the solar cell performance. The given structure is simulated using the finite difference time domain (FDTD)...
Article
Full-text available
A low-cost Si-based optical nano-sensor that monitors traditional water pollutants is introduced in this paper. The introduced sensor works in the near-infrared region, 900 nm to 2500 nm spectral range. The proposed structure consists of a Si layer with an optimized thickness of 300 nm on the top of the Al layer acting as a back reflector. On the t...
Article
Full-text available
Genres are one of the key features that categorize music based on specific series of patterns. However, the Arabic music content on the web is poorly defined into its genres, making the automatic classification of Arabic audio genres challenging. For this reason, in this research, our objective is first to construct a well-annotated dataset of five...
Article
Full-text available
Machine and deep learning techniques are two branches of artificial intelligence that have proven very efficient in solving advanced human problems. The automotive industry is currently using this technology to support drivers with advanced driver assistance systems. These systems can assist various functions for proper driving and estimate drivers...
Article
Full-text available
This work introduces a high-efficiency organic solar cell with grating nanostructure in both hole and electron transport layers and plasmonic gold nanoparticles (Au NPs) distributed on the zinc oxide (ZnO) layer. The periods of the grating structure in both hole and electro transport layers were optimized using Lumerical finite difference time doma...
Article
Full-text available
Monitoring drivers’ emotions is the key aspect of designing advanced driver assistance systems (ADAS) in intelligent vehicles. To ensure safety and track the possibility of vehicles’ road accidents, emotional monitoring will play a key role in justifying the mental status of the driver while driving the vehicle. However, the pose variations, illumi...
Article
Full-text available
Network optimization is a highly relevant solution to the growing demands of mobile communications. Increasing the efficiency of the existing spectrum and infrastructure drives down costs and improves provider networks' usability. This paper focuses on applying data mining to the evaluation of network performance as a viable tool for resource alloc...
Article
Full-text available
According to the Center for Disease Control and Prevention (CDC), the average human life expectancy is 78.8 years. Specifically, 3.2 million deaths are reported yearly due to heart disease, cancer, Alzheimer’s disease, diabetes, and COVID-19. Diagnosing the disease is mandatory in the current way of living to avoid unfortunate deaths and maintain a...
Article
Full-text available
Cardiovascular diseases have been reported to be the leading cause of mortality across the globe. Among such diseases, Myocardial Infarction (MI), also known as “heart attack”, is of main interest among researchers, as its early diagnosis can prevent life threatening cardiac conditions and potentially save human lives. Analyzing the Electrocardiogr...
Article
Full-text available
Recent technology advances in CMOS image sensors (CIS) enable their utilization in the most demanding of surveillance fields, especially visual surveillance and intrusion detection in intelligent surveillance systems, aerial surveillance in war zones, Earth environmental surveillance by satellites in space monitoring, agricultural monitoring using...
Chapter
Wireless sensor and actor networks (WSAN) is an area where sensors and actors collaborate to sense, handle and perform tasks in real-time. Thus, reliability is an important factor. Due to the natural of WSAN, actor nodes are open to failure. Failure of actor nodes degrades the network performance and may lead to network disjoint. Thus, fault tolera...
Article
Full-text available
Electrocardiogram (ECG) gives essential information about different cardiac conditions of the human heart. Its analysis has been the main objective among the research community to detect and prevent life threatening cardiac circumstances. Traditional signal processing methods, machine learning and its subbranches, such as deep learning, are popular...
Article
Full-text available
With the introduction of the Convolutional Neural Network (CNN) and other classical algorithms, facial and object recognition have made significant progress. However, in a situation where there are few label examples or the environment is not ideal, such as lighting conditions, orientations, and so on, performance is disappointing. Various methods,...
Article
Full-text available
Android receives major attention from security practitioners and researchers due to the influx number of malicious applications. For the past twelve years, Android malicious applications have been grouped into families. In the research community, detecting new malware families is a challenge. As we investigate, most of the literature reviews focus...
Article
Full-text available
The vehicular ad hoc network (VANET) is a method through which Intelligent Transportation Systems (ITS) have become important for the benefit of daily life. Real-time detection of all forms of attacks, including hybrid DoS attacks in IEEE 802.11p, has become an urgent issue for VANET. This is due to sporadic real-time exchange of safety and road em...
Article
Full-text available
The vehicular ad hoc network (VANET) is a method through which Intelligent Transportation Systems (ITS) have become important for the benefit of daily life. Real-time detection of all forms of attacks, including hybrid DoS attacks in IEEE 802.11p, has become an urgent issue for VANET. This is due to sporadic real-time exchange of safety and road em...
Conference Paper
Full-text available
Internet of things has become integrated in all aspects of life. Data and devices are interconnected to provide fast, efficient, and low-cost services. Radio Frequency Identification (RFID) is a wireless sensor network technology that is implemented with the Internet of Things (IoT) in many fields such as inventory management, product identificatio...
Article
Full-text available
VANET (vehicular ad hoc network) has a main objective to improve driver safety and traffic efficiency. The intermittent exchange of real-time safety message delivery in VANET has become an urgent concern due to DoS (denial of service) and smart and normal intrusions (SNI) attacks. The intermittent communication of VANET generates huge amount of dat...
Preprint
Full-text available
VANET (vehicular ad hoc network) has a main objective to improve driver safety and traffic efficiency. The intermittent exchange of real-time safety message delivery in VANET has become an urgent concern due to DoS (denial of service) and smart and normal intrusions (SNI) attacks. The intermittent communication of VANET generates huge amount of dat...
Conference Paper
Full-text available
As more devices become internet-connected, there is a greater need for secure and discrete device-to-device communication. Data shows that at the time of this writing the number of internet-connected devices is around 20 billion and is expected to increase to 29 billion by the end of 2022. In the early days of IoT the majority of the market was com...
Article
Wireless sensor and actor networks (WSAN) is an area where sensors and actors collaborate to sense, handle and perform tasks in real-time. Thus, reliability is an important factor. Due to the natural of WSAN, actor nodes are open to failure. Failure of actor nodes degrades the network performance and may lead to network disjoint. Thus, fault tolera...
Article
Full-text available
Due to recent developments in hardware and software technologies for mobile phones, people depend on their smartphones more than ever before. Today, people conduct a variety of business, health, and financial transactions on their mobile devices. This trend has caused an influx of mobile applications that require users’ sensitive information. As th...
Article
Full-text available
Modern wireless sensor networks have adopted the IEEE 802.15.4 standard. This standard defines the first two layers, the physical and medium access control layers; determines the radio wave used for communication; and defines the 128-bit advanced encryption standard (AES-128) for encrypting and validating the transmitted data. However, the standard...
Article
Full-text available
p class="Abstract"> A directed graph represents an accurate picture of course descriptions for online courses through computer-based implementation of various educational systems. E-learning and m-learning systems are modeled as a weighted, directed graph where each node represents a course unit. The Learning Path Graph (LPG) represents and describ...
Article
Full-text available
Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, security problems associated with them have not been completely resolved. Middleware is generally introduced as an intermediate layer between WSNs and the end user to resolve some limitations, but most of the existing middleware is unable to protect data from...
Article
Full-text available
Eye exam can be as efficacious as physical one in determining health concerns. Retina screening can be the very first clue to detecting a variety of hidden health issues including pre-diabetes and diabetes. Through the process of clinical diagnosis and prognosis; ophthalmologists rely heavily on the binary segmented version of retina fundus image;...
Conference Paper
Full-text available
Optic disc segmentation in retinal fundus images plays a critical rule in diagnosing a variety of pathologies and abnormalities related to eye retina. Most of the abnormalities that are related to optic disc lead to structural changes in the inner and outer zones of optic disc. Optic disc segmentation on the level of whole retina image degrades the...
Poster
Our research currently focusing on image sensors predominantly the sensors implemented using CMOS (Complementary Metal Oxide Semiconductor) technology. These sensors designated as CMOS sensors which were introduced after CCD (Charge-coupled Devices) sensors since CCDs having some drawbacks in terms of its power and making cost compared to CMOS sens...
Conference Paper
Full-text available
Wireless Sensor and Actor Networks (WSAN) is an area where sensors and actors collaborate to sense, handle and perform tasks in real-time. Thus, reliability is an important factor. Due to the natural of WSAN, actor nodes are variable to failure. Failure of actor nodes degrades the network performance and may leads to network disjoint. Thus, Fault t...
Conference Paper
Full-text available
Wireless sensor networks (WSNs) are deployed in many applications such as those used in monitoring, by the military, in healthcare, etc. Since these applications deal with the transfer of sensitive data, they need protection from various attacks and intrusions. From the current literature, we observed that existing security algorithms are not suita...
Conference Paper
Full-text available
Despite the popularity of wireless sensor networks (WSNs) in a wide range of applications, security problems associated with them have not been completely resolved. Middleware is generally introduced as an intermediate layer between WSNs and the end user to resolve some limitations, but most of the existing middleware is unable to protect data from...