Browsing Electrical Engineering by Author "Badawy, Ahmed"
Now showing items 1-6 of 6
-
Estimating the number of sources in white Gaussian noise: Simple eigenvalues based approaches
Badawy, Ahmed; Salman, Tara; Elfouly, Tarek; Khattab, Tamer; Mohamed, Amr; Guizani, Mohsen... more authors ... less authors ( Institution of Engineering and Technology , 2017 , Article)Estimating the number of sources is a key task in many array signal processing applications. Conventional algorithms such as Akaike's information criterion (AIC) and minimum description length (MDL) suffer from underestimation ... -
FPGA implementation of DWT EEG data compression for wireless body sensor networks
Elsayed, Mohamed; Badawy, Ahmed; Mahmuddin, Massudi; Elfouly, Tarek; Mohamed, Amr; Abualsaud, Khalid... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Wireless body sensor networks (WBSN) provide an appreciable aid to patients who require continuous care and monitoring. One key application of WBSN is mobile health (mHealth) for continuous patient monitoring, acquiring ... -
On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks
Badawy, Ahmed; Khattab, Tamer; Elfouly, Tarek; Chiasserini, Carla-Fabiana; Trinchero, Daniele ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)In cognitive radio networks, secondary users (SUs) utilize the unused spectrum slots in the assigned band for the primary users (PUs). Conventional cognitive radio networks operate in half-duplex (HD) mode. Recently, ... -
Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks
Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Chiasserini, Carla-Fabiana; Trinchero, Daniele ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)Spectrum sensing is a key component in any cognitive radio network. Recently full-duplex communication, i.e., the ability to transmit and receive at the same time at the same frequency, has become feasible. Residual self ... -
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Mohamed, Amr; Guizani, Mohsen ( Elsevier B.V. , 2016 , Report)Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ... -
Walsh transform with moving average filtering for data compression in wireless sensor networks
Elsayed, Mohamed; Mahmuddin, Massudi; Badawy, Ahmed; Elfouly, Tarek; Mohamed, Amr; Abualsaud, Khalid... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Due to the peculiarity of wireless sensor networks (WSNs), where a group of sensors continuously transmit data to other sensors or to the fusion center, it is crucial to compress the transmitted data in order to save the ...