- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Wireless Communication Security Techniques
- Advanced MIMO Systems Optimization
- Internet Traffic Analysis and Secure E-voting
- Cooperative Communication and Network Coding
- Advanced Wireless Communication Technologies
- Advanced Wireless Communication Techniques
- Advanced Wireless Network Optimization
- Error Correcting Code Techniques
- Antenna Design and Analysis
- Wireless Communication Networks Research
- Indoor and Outdoor Localization Technologies
- Direction-of-Arrival Estimation Techniques
- Energy Harvesting in Wireless Networks
- Digital Media Forensic Detection
- PAPR reduction in OFDM
- Radar Systems and Signal Processing
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Authentication Protocols Security
- Gene expression and cancer classification
- Data-Driven Disease Surveillance
- Video Analysis and Summarization
- Power Line Communications and Noise
- Cellular Automata and Applications
Military Technical College
2018-2024
Benha University
2024
Arab Academy for Science, Technology, and Maritime Transport
2019-2023
Zewail City of Science and Technology
2023
Beni-Suef University
2021-2022
Umm al-Qura University
2022
University of Rhode Island
2022
Electronics Research Institute
2019
Port Said University
2019
The Ohio State University
2016-2019
Fundamental limits of covert communication have been studied for different models scalar channels. It was shown that, over n independent channel uses, O(√n) bits can transmitted reliably a public while achieving an arbitrarily low probability detection (LPD) by other stations. This result is well known as the square-root law and even to achieve this diminishing rate communication, all existing studies utilized some form secret shared between transmitter receiver. In paper, we establish LPD...
In recent years, many attempts have been made to enhance Orthogonal Frequency Multiplexing with Index Modulation (OFDM-IM) in terms of spectral efficiency and error performance. Two challenges typically erupt when using OFDM-IM. First, the degradation due subcarrier's deactivation, especially higher order modulation (M-ary) where every inactive subcarrier will cost $Log_2(M)$ bits loss. Second, a fixed number active subcarriers within sub-block forces be localized sub-block. Yet, it loses...
We consider covert communication, i.e., hiding the presence of communication from an adversary for multiple-input multiple-output (MIMO) additive white Gaussian noise (AWGN) channels. characterize maximum coding rate under a variety settings, including different regimes where either number transmit antennas or blocklength is scaled up. show that non-zero capacity can be achieved in massive MIMO regime which scales up but specific conditions. Under such conditions, we AWGN channels converges...
Abstract This paper introduces a novel steganographic technique for H.264 video that achieves an outstanding performance against state-of-the-art steganalysis techniques while maintaining real-time encoding constraints. The proposed embeds the secret message by altering motion vectors (MVs) preserving their local optimality and consistency feature to withstand recently emerged methods. Thanks its macro-block (MB) basis architecture, satisfies constraints, eliminating need wait whole frame or...
In the scope of vehicular communication networks, nature exchanged safety/warning messages renders itself highly location dependent, as it is usually for incident reporting. Vehicles are required to periodically exchange beacon that include speed, time, and GPS information. Reported position information must be accurate authentic. To mitigate potential risk spoofing/falsifying attack, this paper presents Angle-of-Arrival (AoA) estimation a physical layer authentication scheme cross...
In the scope of vehicular communication networks (V2X), nature exchanged safety/warning messages renders itself highly location dependent as it is usually for incident reporting. Vehicles are required to periodically exchange beacon that include speed, time and GPS information. Reported position information must be accurate authentic. To mitigate potential risk spoofing/falsifying attack, this project presents dual use a multi-antenna roadside unit (RSU) radar well wireless transceiver. The...
Mobility prediction in cellular networks helps reducing the number of unnecessary handovers (HO). The deployment large femtocells renders challenge users' great importance. Femtocells achieve higher data rate and extend coverage area networks. Deploying a huge results more frequent initiation an HO procedure. In this paper, novel algorithm based on Reference Signal Received Power (RSRP), Quality (RSRQ) some User Equipment (UE) parameters like moving direction position inside femtocell used...
Angle of Arrival (AoA) estimation has found its way to a wide range applications. Much attention been paid study different techniques for AoA and applications jamming suppression, however, security vulnerability issues itself under hostile activity have not the same attention. In this paper, problem in Rician flat fading channel condition is investigated. We consider scenario which receiver with multiple antenna trying estimate specular line sight (LOS) component signal received from given...
We present a physical layer assisted message authentication scheme that uses Angle of Arrival (AoA) estimation to verify the originator location based on claimed information. The problem deciding whether received signal is originated from GPS formulated as two sided hypotheses testing whose solution given by Wald test statics. Moreover, we give correct decision and false alarm probabilities in closed form quantitative performance measure. Also introduce secret key agreement (PHY-SKA)...
Drastic increase in throughput and link reliability requirements over high frequency (HF) long-distance communication backhaul necessities the exploitation of HF ionospheric channels with wider spectrum. While there exist substantial work modeling narrowband (3KHz) channel, bandwidth did not gain same attention. Present paper introduces an OFDM system design a concatenation eight standard 3KHz resulting overall 24KHz channel. First, we provide accurate channel model for such wideband that...
Inventories are playing vital role in every business, so organization needs to have proper control and management of inventories as it may lead increase manufacturing cost.A correctly managed inventory can significantly affect organizational effectiveness.Just Time (JIT) has been treated one the best methods address issues related all types wastes.Thus, this research broadens geographical range by measuring relationship between level effectiveness through JIT Egyptian context, using...
Compound MIMO wiretap channel with double sided uncertainty is considered under mean information model. In model, variations are centered around its value which fed back to the transmitter. We show that worst case main anti-parallel resulting in an overall unit rank channel. Further, eavesdropper shown be isotropic information. Accordingly, we provide capacity achieving beamforming direction. saddle point property holds model and, thus, compound secrecy equals over class of uncertainty....
Direction-Finding (DF) in low Signal-to-Noise Ratio (SNR) environments presents challenges accurate Angle-of-Arrival (AOA) estimation, resolution, and maximum detection range due to extrinsic sources hardware imperfections, particularly when dealing with correlated sources. Spatial-Smoothing (SS) techniques are developed solve the problem of fully at expense potential loss both antenna aperture angular resolution. In this paper, we introduce a pre-processing "oversampling averaging" stage...
In this paper, a tight lower bound for the differential entropy of Gaussian mixture model is presented. First, probability mixed distribution that created by mixing both discrete and continuous random variables investigated in order to represent symmetric bimodal using hyperbolic cosine function, on which tighter upper set. Then, used derive introduced. The proposed allows maintain its tightness over entire range model's parameters shows more when compared with other bounds lose their...
Index modulation (IM) techniques have the potential to achieve better error performance, spectral efficiency (SE), and/or power (PE) enhancements for next-generation communications. In this paper, we study generalized orthogonal frequency division multiplexing (OFDM) index (G-OFDM-IM) system whose subcarrier activation pattern is completely controlled by information bits without need a predefined number of active subcarriers, so-called free-form OFDM-IM. Although G-OFDM-IM promises...
Due to their potential enhance spectral efficiency and energy efficiency, Index Modulation (IM) techniques in different domains (space, time, frequency) have gained significant attention wireless communications, especially systems with increasing volumes of teletraffic constrained energy. In this paper, we provide an information theoretic foundation for IM systems. The entropy source has been derived a closed form, moreover, derive the maximum proposed which is first quantity necessary...
<p>This paper presents a resource allocation scheme that fulfills the maximum possible aggregate rate of capacity region by targeting corner points multiple-input multiple-output multiple access channel. This channel’s are attainable whenever each user’s transmission has minimum interference among other users. work aims to investigate non-singularity such situations exploitation users’ geographic location seeking opportunity getting spatially multiplexed. The developed model...
A threat to governments and the medical community globally are infectious illness outbreaks such as COVID-19, Spanish flu, Ebola, which kill millions of people. Furthermore, because people afraid go their employment, diseases hinder economic progress. Therefore, it is imperative implement interventions lessen spread diseases. From this angle, practice tracking contacts might be viewed a mitigation strategy stop contagious As going on, users’ trace data sets growing exponentially larger over...