Khaled Elleithy's research while affiliated with University of Bridgeport and other places

Publications (23)

Article
Full-text available
The Wireless Sensor Networks (WSNs) are characterized by their widespread deployment due to low cost, but the WSNs are vulnerable to various types of attacks. To defend against the attacks, an effective security solution is required. However, the limits of these networks’ battery-based energy to the sensor are the most critical impediments to selec...
Article
Full-text available
Genres are one of the key features that categorize music based on specific series of patterns. However, the Arabic music content on the web is poorly defined into its genres, making the automatic classification of Arabic audio genres challenging. For this reason, in this research, our objective is first to construct a well-annotated dataset of five...
Article
Full-text available
Network optimization is a highly relevant solution to the growing demands of mobile communications. Increasing the efficiency of the existing spectrum and infrastructure drives down costs and improves provider networks' usability. This paper focuses on applying data mining to the evaluation of network performance as a viable tool for resource alloc...
Article
Full-text available
Cardiovascular diseases have been reported to be the leading cause of mortality across the globe. Among such diseases, Myocardial Infarction (MI), also known as “heart attack”, is of main interest among researchers, as its early diagnosis can prevent life threatening cardiac conditions and potentially save human lives. Analyzing the Electrocardiogr...
Conference Paper
Full-text available
Internet of things has become integrated in all aspects of life. Data and devices are interconnected to provide fast, efficient, and low-cost services. Radio Frequency Identification (RFID) is a wireless sensor network technology that is implemented with the Internet of Things (IoT) in many fields such as inventory management, product identificatio...
Article
Full-text available
Due its universality, Universal Serial Bus (USB) has become the major connecting port of modern computers. Programmability provides convenience between hardware vendors and operating system vendors to develop their products and related firmware. However, it leads to high risk by opening a door for a potential vulnerability. In the past three years,...
Conference Paper
Most of mobile applications tend to function in an insecure manner whenever they are presented with SSL certificates which cannot be trusted. This is true for the applications which are not web browsers and need to connect/communicate with the internet as a part of their operation. This paper intends to research and show if proxy SSL based attacks...
Article
Full-text available
Road signs classification is becoming one of the most significant technologies in driver assistance systems due to the importance of recognizing speed-limit signs to inform and alert drivers when they have limited conscious awareness. In this study, a robust approach for Speed-Limit Signs (SLS) detection and recognition with different distances and...
Article
Full-text available
Virtual laboratory is becoming one of the most significant educational technologies due to financial challenges which often required construction of physical laboratories, particularly in educational institutions in developing countries. This paper presents an integrated virtual environment to help individual learners to enhance the practical learn...
Data
Full-text available
Obstructive sleep apnea (OSA) is the most common form of different types of sleep-related breathing disorders. It is characterized by repetitive cessations of respiratory flow during sleep, which occurs due to a collapse of the upper respiratory airway. OSA is majorly undiagnosed due to the inconvenient Polysomnography (PSG) testing procedure at sl...
Data
The need for secure communication methods has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper we propose a new steganography algorithm for Arabic text. The algorithm employs some letter...
Data
Full-text available
The need for secure communications has significantly increased with the explosive growth of the internet and mobile communications. The usage of text documents has doubled several times over the past years especially with mobile devices. In this paper, we propose a new steganography algorithm for Unicode language (Arabic). The algorithm employs som...
Data
Vast amount of data transfer over internet, raises different issues such as channel types, transmission time and data security. In this paper, we present a novel secure algorithm to hide data inside document files, where four symbols are used to embed data inside the carrier file. The main process depends on a key to produce a symbol table and matc...
Data
Full-text available
Secure communication is essential for data confidentiality and integrity especially with the massive growth of the internet and mobile communication. Steganography is an art for data hiding by embedding the data to different objects such as text, images, audio and video objects. In this paper we propose a new algorithm for data hiding using Text St...

Citations

... The disadvantage of this work is that considerable computational capacity is required if ECG segments ranging from hours to days are used, as the signals are first converted to a representation that the CNNs can understand, and then the CNN itself requires more computational resources. Other examples include [11][12][13]. Rajpurkar, P. et al. decomposed the signal into its frequency components to create images and then fed them to CNN. Other works focus on feature selection and feature extraction. ...
... In this study, we aim to detect Normal (N), ventricular ectopic (V), and ST-segment changes that contribute towards the diagnosis of MI. We build on top of our prior work [3] and present a three-layer model for the classification of ECG into three classes of Normal, ST-change, and V-change types. The model is based on a Convolutional Neural Network (CNN) that works at layer three of the model and trained on 2-D ECG images; a snapshot of the ECG wave between two consecutive R-peaks. ...
... Technologies which enable such a smart airport vision are based on the following three key ideas. Originally, a lot of research and testing had been performed on RFID technology, where a cellular network of passive RFID receivers, combined with far-field active RFID tags could be used for, e.g., luggage tracking (Shehieb et al., 2016;Baashirah and Elleithy, 2019) or security checks (McCoy et al., 2005). The major limitation of this technology is that there is still a need for physical hand-over process of these RFID tags. ...
... However, it leads to high risk by opening the door for a potential vulnerability because of its simple plug-n-play design. In one study [8], the researchers identified the high risk associated with BadUSB as a device that emulates the keyboard or network card. One such device can register as a flash drive and a keyboard at same time, which allows an invasion of malicious software. ...
... Thus, if the learner presses the power switch, the simulation software shows that the machine is in a working state. It also includes learning to operate and use laboratory equipment so that the learner can practice using the device and understand its mechanism in a virtual environment [18] before he starts using the actual device. ...
... For example, Varady et al. [19] conducted research on a set of 18 PSG recordings, but with an average recording time of only 4 h. The study of Almazaydeh et al. [53] had a sample of 50 subjects, but these were healthy individuals who consciously simulated respiratory pauses. In the study of Janbakhshi et al. [54], 35 records were used. ...
... Steganography is a method that keeps the existence of message secret in cover file and creates a covert communication. It camouflages secret message in the cover file in such a way that without a recipient, no one realizes the presence of concealed information [21,24]. Steganography techniques are widely applied to English texts [24]. ...
... As we pointed out above, the based algorithms are only efficient in data sources which consist of lots of repetitive data. These data sources could be text files if they include 33 multiple spaces for glorifying, but the line-art images which comprise large white or black zones are far more appropriate. Also, the has employed in fax machines. ...
... The work benefits from Kashida, as a unique Arabic text extension character, which is redundantly used for decoration and formatting purposes. This Kashida does not have any influence on the text content nor phrase meaning (Odeh et al., 2013). Interestingly, Kashida Arabic text steganography can be a valid stego technique for some Arabic related languages such as Urdu and Farsi (Gutub and Fattani, 2007). ...
... The proposed watermarking method made the task of an attack much harder compared to previous similar methods but less capacity than diacritic based methods. The researchers in[28] develop new algorithm for Arabic text based on the fact that both of the extension letter 'Kashida' and the Zero width character do not have any change in the word meaning when it connected to other letters. The new proposed algorithm used Zero Width and Kashida Letters (ZKS) to hide 2 bits per each connective character as shown infigure 12. ...