Zobrazeno 1 - 10
of 272
pro vyhledávání: '"Fayez Gebali"'
Autor:
Mohammed Abdrabou, Fayez Gebali, Mahmoud A. Shawky, Ala S. Alluhaidan, Ahmed E. Mansour, Sahar A. El-Rahman, Ayman Al-ahwal, Tamer Shamseldin
Publikováno v:
EURASIP Journal on Wireless Communications and Networking, Vol 2024, Iss 1, Pp 1-21 (2024)
Abstract Recently, low Earth orbit (LEO) satellites have emerged as key players in space information network (SIN) due to their ability to provide global coverage. However, they remain susceptible to threats such as denial of service (DoS), man-in-th
Externí odkaz:
https://doaj.org/article/51b7f052aaa54c3382f8180b1cb94451
Publikováno v:
AI, Vol 5, Iss 3, Pp 1111-1131 (2024)
Managing access between large numbers of distributed medical devices has become a crucial aspect of modern healthcare systems, enabling the establishment of smart hospitals and telehealth infrastructure. However, as telehealth technology continues to
Externí odkaz:
https://doaj.org/article/eec08526b58c4038acbaebb98dd99ef0
Publikováno v:
Visual Computing for Industry, Biomedicine, and Art, Vol 6, Iss 1, Pp 1-28 (2023)
Abstract The vision transformer (ViT) is a state-of-the-art architecture for image recognition tasks that plays an important role in digital health applications. Medical images account for 90% of the data in digital medicine applications. This articl
Externí odkaz:
https://doaj.org/article/10d754bd2b79416ab24fe05b695c3dd9
Autor:
Atef Ibrahim, Fayez Gebali
Publikováno v:
Symmetry, Vol 16, Iss 6, p 715 (2024)
In today’s TEST interconnected world, the security of 5G Medical IoT networks is of paramount concern. The increasing number of connected devices and the transmission of vast amounts of data necessitate robust measures to protect information integr
Externí odkaz:
https://doaj.org/article/851a9c123612463a9762f46cce7c38df
Autor:
Atef Ibrahim, Fayez Gebali
Publikováno v:
Applied Sciences, Vol 14, Iss 10, p 4085 (2024)
Security and privacy concerns pose significant obstacles to the widespread adoption of IoT technology. One potential solution to address these concerns is the implementation of cryptographic protocols on resource-constrained IoT edge nodes. However,
Externí odkaz:
https://doaj.org/article/0c55be5b3581402fb61c7f027c67d9bc
Publikováno v:
IEEE Access, Vol 11, Pp 23462-23473 (2023)
Encounters between humans and wildlife often lead to injuries, especially in remote wilderness regions, and highways. Therefore, animal detection is a vital safety and wildlife conservation component that can mitigate the negative impacts of these en
Externí odkaz:
https://doaj.org/article/5760b98d78f240af8a7c14ab0573fa19
Autor:
Atef Ibrahim, Fayez Gebali
Publikováno v:
Alexandria Engineering Journal, Vol 61, Iss 12, Pp 13079-13087 (2022)
Adoption of IoT technology without considering its security implications may expose network systems to a variety of security breaches. In network systems, IoT edge devices are a major source of security risks. Implementing cryptographic algorithms on
Externí odkaz:
https://doaj.org/article/13ec1887c3c04228a9e582457a89bcba
Autor:
Fayez Gebali, Mohamed K. Elhadad
Publikováno v:
Computers, Vol 12, Iss 11, p 233 (2023)
Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introd
Externí odkaz:
https://doaj.org/article/ab5d37bd85514423bd2783eba06143e2
Publikováno v:
AI, Vol 2, Iss 4, Pp 552-577 (2021)
Object detection is one of the vital and challenging tasks of computer vision. It supports a wide range of applications in real life, such as surveillance, shipping, and medical diagnostics. Object detection techniques aim to detect objects of certai
Externí odkaz:
https://doaj.org/article/fb925e30808247efa42c5e0ba0a648cc
Ensemble Siamese Network (ESN) Using ECG Signals for Human Authentication in Smart Healthcare System
Publikováno v:
Sensors, Vol 23, Iss 10, p 4727 (2023)
Advancements in digital communications that permit remote patient visits and condition monitoring can be attributed to a revolution in digital healthcare systems. Continuous authentication based on contextual information offers a number of advantages
Externí odkaz:
https://doaj.org/article/c2dd40c04c4746eea4a9379da35f3c40