Zobrazeno 1 - 10
of 62
pro vyhledávání: '"Mohsen A. M. El‐Bendary"'
Publikováno v:
IET Communications, Vol 16, Iss 20, Pp 2479-2491 (2022)
Abstract Due to the importance of both rate‐less digital fountain codes and Multi‐Input Multi‐Output (MIMO) schemes in Fifth and Sixth Generation (5G/6G) wireless networks, this paper investigates enhancing the performance of MIMO‐Orthogonal
Externí odkaz:
https://doaj.org/article/5b07be84364b4a26b602e4439853e3f8
Autor:
Mohsen A. M. El-Bendary, Atef Abou El-Azm, Nawa El-Fishawy, Farid Shawki, Mostafa A. R. El-Tokhy, Fathi E. Abd El-Samie, H. B. Kazemian
Publikováno v:
Journal of Telecommunications and Information Technology, Iss 4 (2023)
The security is important issue in wireless networks. This paper discusses audio watermarking as a tool to improve the security of image communication over the IEEE 802.15.4 ZigBee network. The adopted watermarking method implements the Singular-Valu
Externí odkaz:
https://doaj.org/article/561fb3ef76c54e20a01a291e4992d43b
Autor:
Mohsen A. M. El-Bendary, O. El-Badry
Publikováno v:
International Journal of Electronics. :1-17
Publikováno v:
IETE Journal of Research. :1-14
Autor:
Mostafa A. R. Eltokhy, Mohamed Abdel-Hady, Ayman Haggag, Mohsen A. M. El-Bendary, Hisham Ali, Tarek Hosny
Publikováno v:
Multimedia Tools and Applications.
The necessity for access to a high data rate has been the motivation behind expanding new technologies. The increasing of wireless devices has caused the radio wave spectrum to become congested. Additionally, radio waves cannot be used in EMI-vulnera
Publikováno v:
International Journal of Speech Technology.
Autor:
Mohsen A. M. El-Bendary, F. Amer
Publikováno v:
International Journal of Electronics. 110:915-933
Autor:
Mohsen A. M. El-Bendary, M. Ayman
Publikováno v:
Circuits, Systems, and Signal Processing. 41:4671-4691
Publikováno v:
Multimedia Tools and Applications. 81:25707-25744
The confidentiality of highly-sensitive multimedia signals is considered in this paper, it can be enhanced by efficient secured model utilizing several-layer security algorithms. The hybrid data hiding and cryptographic techniques are merged for cons
Publikováno v:
Computers, Materials & Continua. 70:1603-1615