• Estimating the number of sources in white Gaussian noise: Simple eigenvalues based approaches 

      Badawy, Ahmed; Salman, Tara; Elfouly, Tarek; Khattab, Tamer; Mohamed, Amr; ... more authors ( Institution of Engineering and Technology , 2017 , Article)
      Estimating the number of sources is a key task in many array signal processing applications. Conventional algorithms such as Akaike's information criterion (AIC) and minimum description length (MDL) suffer from underestimation ...
    • Exploiting spectrum sensing data for key management 

      Badawy, Ahmed; Elfouly, Tarek; Chiasserini, Carla-Fabiana; Khattab, Tamer; Trinchero, Daniele ( Elsevier B.V. , 2017 , Article)
      In cognitive radio networks, secondary users (SUs) communicate on unused spectrum slots in the frequency bands assigned to primary users (PUs). Like any other wireless communication system, cognitive radio networks are ...
    • FPGA implementation of DWT EEG data compression for wireless body sensor networks 

      Elsayed, Mohamed; Badawy, Ahmed; Mahmuddin, Massudi; Elfouly, Tarek; Mohamed, Amr; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Wireless body sensor networks (WBSN) provide an appreciable aid to patients who require continuous care and monitoring. One key application of WBSN is mobile health (mHealth) for continuous patient monitoring, acquiring ...
    • On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks 

      Badawy, Ahmed; Khattab, Tamer; Elfouly, Tarek; Chiasserini, Carla-Fabiana; Trinchero, Daniele ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      In cognitive radio networks, secondary users (SUs) utilize the unused spectrum slots in the assigned band for the primary users (PUs). Conventional cognitive radio networks operate in half-duplex (HD) mode. Recently, ...
    • Order Statistics-Based Design of UWB Receivers 

      Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Chiasserini, Carla Fabiana; Trinchero, Daniele ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Article)
      We propose a non-coherent ultra-wideband (UWB) receiver that leverages a single-sample-per-pulse threshold approach to detect the transmitted symbol and is capable of mitigating the impact of impulse noise. Unlike classical ...
    • Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks 

      Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Chiasserini, Carla-Fabiana; Trinchero, Daniele ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      Spectrum sensing is a key component in any cognitive radio network. Recently full-duplex communication, i.e., the ability to transmit and receive at the same time at the same frequency, has become feasible. Residual self ...
    • Secure multiple-users transmission using multi-path directional modulation 

      Hafez, Mohammed; Khattab, Tamer; Elfouly, Tarek; Arslan, Huseyin ( Institute of Electrical and Electronics Engineers Inc. , 2016 , Conference Paper)
      This work introduces a physical-layer secure multiple-users communication scheme. Our scheme employs the multi-path nature of the wireless channel to provide a different secure communication link for each of the legitimate ...
    • Secure Spatial Multiple Access Using Directional Modulation 

      Hafez, Mohammed; Yusuf, Marwan; Khattab, Tamer; Elfouly, Tarek; Arslan, Hüseyin ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)
      In this paper, we introduce a secure multiple access scheme, which exploits the multipath structure of the channel to create a multi-user interference environment. The generated interference enables legitimate users to ...
    • The Secure Degrees of Freedom of the MIMO BC and MIMO MAC with Multiple Unknown Eavesdroppers 

      Khalil, Mohamed; Khattab, Tamer; Elfouly, Tarek; Mohamed, Amr ( Hamad bin Khalifa University Press (HBKU Press) , 2016 , Conference Paper)
      We investigate the secure degrees of freedom (SDoF) of a two-transmitter Gaussian multiple access channel with multiple antennas at the transmitters, a legitimate receiver and an unknown number of eavesdroppers each with ...
    • Towards Information Theoretic Interpretation of Practical Ciphers 

      Abdellatif, Basem; Elfouly, Tarek; Abualsaud, Khalid; Gouissem, Ala; Yaacoub, Elias; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2021 , Conference Paper)
      In spite of the wide spread of practical crypto- systems and ciphers nowadays, they still lack a unique metric to measure the secrecy level they provide. Their strength is measured in an ad-hoc way by exposing them to ...
    • Unleashing the secure potential of the wireless physical layer: Secret key generation methods 

      Badawy, Ahmed; Elfouly, Tarek; Khattab, Tamer; Mohamed, Amr; Guizani, Mohsen ( Elsevier B.V. , 2016 , Report)
      Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
    • Walsh transform with moving average filtering for data compression in wireless sensor networks 

      Elsayed, Mohamed; Mahmuddin, Massudi; Badawy, Ahmed; Elfouly, Tarek; Mohamed, Amr; ... more authors ( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)
      Due to the peculiarity of wireless sensor networks (WSNs), where a group of sensors continuously transmit data to other sensors or to the fusion center, it is crucial to compress the transmitted data in order to save the ...