Sensor-based assistive devices for visually-impaired people: Current status, challenges, and future directions W Elmannai, K Elleithy Sensors 17 (3), 565, 2017 | 314 | 2017 |
A robust and secure video steganography method in DWT-DCT domains based on multiple object tracking and ECC RJ Mstafa, KM Elleithy, E Abdelfattah IEEE access 5, 5354-5365, 2017 | 156 | 2017 |
Retinal vessels segmentation techniques and algorithms: a survey J Almotiri, K Elleithy, A Elleithy Applied Sciences 8 (2), 155, 2018 | 136 | 2018 |
Stages-based ECG signal analysis from traditional signal processing to machine learning approaches: A survey M Wasimuddin, K Elleithy, AS Abuzneid, M Faezipour, O Abuzaghleh IEEE Access 8, 177782-177803, 2020 | 131 | 2020 |
A video steganography algorithm based on Kanade-Lucas-Tomasi tracking algorithm and error correcting codes RJ Mstafa, KM Elleithy Multimedia Tools and Applications 75, 10311-10333, 2016 | 115 | 2016 |
Detection of obstructive sleep apnea through ECG signal features L Almazaydeh, K Elleithy, M Faezipour 2012 IEEE International Conference on Electro/Information Technology, 1-6, 2012 | 114 | 2012 |
Obstructive sleep apnea detection using SVM-based classification of ECG signal features L Almazaydeh, K Elleithy, M Faezipour 2012 annual international conference of the IEEE engineering in medicine and …, 2012 | 105 | 2012 |
A highly secure video steganography using Hamming code (7, 4) RJ Mstafa, KM Elleithy IEEE Long Island systems, applications and technology (LISAT) conference …, 2014 | 99 | 2014 |
Fast and flexible architectures for RNS arithmetic decoding KM Elleithy, MA Bayoumi IEEE Transactions on Circuits and Systems II Analog and Digital Signal …, 1992 | 92 | 1992 |
Energy-efficient boarder node medium access control protocol for wireless sensor networks A Razaque, KM Elleithy Sensors 14 (3), 5074-5117, 2014 | 91 | 2014 |
Denial of service attack techniques: analysis, implementation and comparison KM Elleithy, D Blagovic, WK Cheng, P Sideleau | 88 | 2005 |
Real-time QoS routing protocols in wireless multimedia sensor networks: study and analysis A Alanazi, K Elleithy Sensors 15 (9), 22209-22233, 2015 | 86 | 2015 |
Innovative techniques in instruction technology, e-learning, e-assessment and education M Iskander Springer Science & Business Media, 2008 | 84 | 2008 |
Compressed and raw video steganography techniques: a comprehensive survey and analysis RJ Mstafa, KM Elleithy Multimedia Tools and Applications 76, 21749-21786, 2017 | 79 | 2017 |
Trajectory planning and collision avoidance algorithm for mobile robotics system MM Almasri, AM Alajlan, KM Elleithy IEEE Sensors journal 16 (12), 5021-5028, 2016 | 78 | 2016 |
A neural network system for detection of obstructive sleep apnea through SpO2 signal features L Almazaydeh, M Faezipour, K Elleithy International Journal of Advanced Computer Science and Applications 3 (5), 2012 | 78 | 2012 |
Comparison of autoencoder and principal component analysis followed by neural network for e-learning using handwritten recognition J Almotiri, K Elleithy, A Elleithy 2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2017 | 75 | 2017 |
Apnea detection based on respiratory signal classification L Almazaydeh, K Elleithy, M Faezipour, A Abushakra Procedia Computer Science 21, 310-316, 2013 | 70 | 2013 |
A high payload video steganography algorithm in DWT domain based on BCH codes (15, 11) RJ Mstafa, KM Elleithy 2015 wireless telecommunications symposium (WTS), 1-8, 2015 | 69 | 2015 |
A highly accurate and reliable data fusion framework for guiding the visually impaired WM Elmannai, KM Elleithy Ieee Access 6, 33029-33054, 2018 | 67 | 2018 |