default search action
Tarek M. El-Fouly
Person information
- affiliation: Qatar University, Electrical Engineering Department, Qatar
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Tarek Elfouly, Ali T. Alouani:
Harnessing the Heart's Magnetic Field for Advanced Diagnostic Techniques. Sensors 24(18): 6017 (2024) - [c32]Owen O'Connor, Tarek Elfouly:
Federated Learning: A Paradigm Shift in Cybersecurity for Smart Grids. ISVLSI 2024: 821-824 - 2023
- [i8]Basem Abdellatif, Mostafa M. Shibl, Tamer Khattab, John Tadrous, Tarek ElFouly, Nizar Zorba:
Caching Through the Skies: The Case of LEO Satellites Connected Edges for 6G and Beyond. CoRR abs/2303.12895 (2023) - 2022
- [j19]Mays Alshaikhli, Tarek Elfouly, Omar Elharrouss, Amr Mohamed, Najmath Ottakath:
Evolution of Internet of Things From Blockchain to IOTA: A Survey. IEEE Access 10: 844-866 (2022) - [j18]Mohamed Elmahallawy, Tarek Elfouly, Ali Alouani, Ahmed M. Massoud:
A Comprehensive Review of Lithium-Ion Batteries Modeling, and State of Health and Remaining Useful Lifetime Prediction. IEEE Access 10: 119040-119070 (2022) - [c31]Basem Abdellatif, Mohammad Galal Khafagy, Nan Chen, Tarek ElFouly, Tamer Khattab:
Energy-Efficient Proactive Scheduling Policies for Finite-Buffer Regular Service Guarantees. WCNC 2022: 72-77 - 2021
- [c30]Basem Abdellatif, Tarek Elfouly, Khalid Abualsaud, Ala Gouissem, Elias Yaacoub, Tamer Khattab:
Towards Information Theoretic Interpretation of Practical Ciphers. IWCMC 2021: 807-812 - 2020
- [j17]Ahmed Badawy, Tarek Elfouly, Tamer Khattab, Carla-Fabiana Chiasserini, Daniele Trinchero:
Order Statistics-Based Design of UWB Receivers. IEEE Wirel. Commun. Lett. 9(9): 1427-1431 (2020) - [c29]Lina Al-Sahan, Fatima Al-Jabiri, Nora Abdelsalam, Amr Mohamed, Tarek Elfouly, Mohamed Abdallah:
Public Security Surveillance System Using Blockchain Technology and Advanced Image Processing Techniques. ICIoT 2020: 104-111 - [c28]Abderrazak Abdaoui, Hasan Tariq, Farid Touati, Tarek Elfouly, Mohammed A. Al-Hitmi, Mohamed H. Ahmed:
Optimal Consensus Time Synchronizations for Wireless Sensor Networks. IWCMC 2020: 1145-1152
2010 – 2019
- 2019
- [j16]Khalid Abualsaud, Tarek M. Elfouly, Tamer Khattab, Elias Yaacoub, Loay Sabry-Ismaïl, Mohamed Hossam Ahmed, Mohsen Guizani:
A Survey on Mobile Crowd-Sensing and Its Applications in the IoT Era. IEEE Access 7: 3855-3881 (2019) - [j15]Farah AbdelMutaleb El-Qawasma, Tarek Mohamed El-Fouly, Mohamed Hossam Ahmed:
Minimising number of sensors in wireless sensor networks for structure health monitoring systems. IET Wirel. Sens. Syst. 9(2): 94-101 (2019) - 2018
- [j14]Ahmed Ben Said, Mohamed Fathi Al-Sa'D, Mounira Tlili, Alaa Awad Abdellatif, Amr Mohamed, Tarek Elfouly, Khaled A. Harras, Mark Dennis O'Connor:
A Deep Learning Approach for Vital Signs Compression and Energy Efficient Delivery in mhealth Systems. IEEE Access 6: 33727-33739 (2018) - [j13]Mohammed Hafez, Marwan Yusuf, Tamer Khattab, Tarek Elfouly, Hüseyin Arslan:
Secure Spatial Multiple Access Using Directional Modulation. IEEE Trans. Wirel. Commun. 17(1): 563-573 (2018) - [c27]Ahmed Ben Said, Amr Mohamed, Tarek Elfouly, Khalid Abualsaud, Khaled A. Harras:
Deep learning and low rank dictionary model for mHealth data classification. IWCMC 2018: 358-363 - [i7]Tara Salman, Ahmed Badawy, Tarek M. El-Fouly, Amr Mohamed, Tamer Khattab:
Estimating the Number of Sources: An Efficient Maximization Approach. CoRR abs/1810.09850 (2018) - 2017
- [j12]Fatemeh Mansourkiaie, Loay Sabry-Ismaïl, Tarek M. El-Fouly, Mohamed Hossam Ahmed:
Maximizing Lifetime in Wireless Sensor Network for Structural Health Monitoring With and Without Energy Harvesting. IEEE Access 5: 2383-2395 (2017) - [j11]Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek M. Elfouly, Amr Mohamed:
A Simple Cross Correlation Switched Beam System (XSBS) for Angle of Arrival Estimation. IEEE Access 5: 3340-3352 (2017) - [j10]Ahmed Badawy, Tarek M. El-Fouly, Carla-Fabiana Chiasserini, Tamer Khattab, Daniele Trinchero:
Exploiting spectrum sensing data for key management. Comput. Commun. 97: 31-39 (2017) - [j9]Adam B. Noel, Abderrazak Abdaoui, Tarek Elfouly, Mohamed Hossam Ahmed, Ahmed Badawy, Mohamed S. Shehata:
Structural Health Monitoring Using Wireless Sensor Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 19(3): 1403-1423 (2017) - [j8]Ahmed Badawy, Tara Salman, Tarek Elfouly, Tamer Khattab, Amr Mohamed, Mohsen Guizani:
Estimating the number of sources in white Gaussian noise: simple eigenvalues based approaches. IET Signal Process. 11(6): 663-673 (2017) - [j7]Alaa Awad, Amr Mohamed, Carla-Fabiana Chiasserini, Tarek M. El-Fouly:
Distributed in-network processing and resource optimization over mobile-health systems. J. Netw. Comput. Appl. 82: 65-76 (2017) - [j6]Abderrazak Abdaoui, Tarek M. El-Fouly, Mohamed H. Ahmed:
Impact of time synchronization error on the mode-shape identification and damage detection/localization in WSNs for structural health monitoring. J. Netw. Comput. Appl. 83: 181-189 (2017) - [j5]Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal, Tarek M. El-Fouly:
The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications. IEEE Trans. Control. Netw. Syst. 4(4): 886-898 (2017) - [c26]Ahmed Ben Said, Amr Mohamed, Tarek Elfouly:
Deep learning approach for EEG compression in mHealth system. IWCMC 2017: 1508-1512 - [c25]Alaa Awad, Amr Mohamed, Carla-Fabiana Chiasserini, Tarek Elfouly:
Network Association with Dynamic Pricing over D2D-Enabled Heterogeneous Networks. WCNC 2017: 1-6 - [c24]Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek ElFouly, Amr Mohamed:
A Simple Angle of Arrival Estimation System. WCNC 2017: 1-6 - [c23]Ahmed Ben Said, Amr Mohamed, Tarek Elfouly, Khaled A. Harras, Z. Jane Wang:
Multimodal Deep Learning Approach for Joint EEG-EMG Data Compression and Classification. WCNC 2017: 1-6 - [i6]Ahmed Ben Said, Amr Mohamed, Tarek Elfouly, Khaled A. Harras, Z. Jane Wang:
Multimodal deep learning approach for joint EEG-EMG data compression and classification. CoRR abs/1703.08970 (2017) - 2016
- [j4]Ahmed Badawy, Tarek M. El-Fouly, Tamer Khattab, Amr Mohamed, Mohsen Guizani:
Unleashing the secure potential of the wireless physical layer: Secret key generation methods. Phys. Commun. 19: 1-10 (2016) - [j3]Ahmed Badawy, Tarek M. El-Fouly, Tamer Khattab, Carla-Fabiana Chiasserini, Amr Mohamed, Daniele Trinchero:
Robust secret key extraction from channel secondary random process. Wirel. Commun. Mob. Comput. 16(11): 1389-1400 (2016) - [c22]Ahmed Badawy, Tarek M. Elfouly, Tamer Khattab, Carla-Fabiana Chiasserini, Daniele Trinchero:
Performance of eigenvalue based spectrum sensing in full-duplex cognitive radio networks. CCECE 2016: 1-6 - [c21]Mohammed Hafez, Tamer Khattab, Tarek M. El-Fouly, Hüseyin Arslan:
Secure multiple-users transmission using multi-path directional modulation. ICC 2016: 1-5 - [c20]Mohamed Elsersy, Khalid Abualsaud, Tarek Elfouly, Mohamed Mahgoub, Mohamed Ahmed, Marwa Ibrahim:
Performance evaluation of experimental damage detection in structure health monitoring using acceleration. IWCMC 2016: 529-534 - [c19]Abderrazak Abdaoui, Mohamed Hossam Ahmed, Tarek M. El-Fouly:
Impact of time synchronization error on the mode-shape calculation in wireless sensor networks for structural health monitoring. WCNC 2016: 1-6 - [c18]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Carla-Fabiana Chiasserini, Daniele Trinchero:
On the performance of spectrum sensing based on GLR for full-duplex cognitive radio networks. WCNC 2016: 1-6 - [i5]Mohamed Amir, Tamer Khattab, Tarek M. El-Fouly:
On the Secure Degrees of Freedom of the K-user MAC and 2-user Interference Channels. CoRR abs/1603.09376 (2016) - 2015
- [j2]Noor Al-Nakhala, Ryan D. Riley, Tarek M. Elfouly:
Distributed algorithms in wireless sensor networks: An approach for applying binary consensus in a real testbed. Comput. Networks 79: 30-38 (2015) - [c17]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Carla-Fabiana Chiasserini, Amr Mohamed, Daniele Trinchero:
Channel secondary random process for robust secret key generation. IWCMC 2015: 114-119 - [c16]Amal Saad, Amr Mohamed, Tarek M. Elfouly, Tamer Khattab, Mohsen Guizani:
Comparative simulation for physical layer key generation methods. IWCMC 2015: 120-125 - [c15]Tara Salman, Ahmed Badawy, Tarek M. Elfouly, Amr Mohamed, Tamer Khattab:
Estimating the number of sources: An efficient maximization approach. IWCMC 2015: 199-204 - [c14]Mohamed Elsersy, Mohamed Hossam Ahmed, Tarek Mohamed El-Fouly, Abderrazak Abdaoui:
Multi-objective sensor placement using the effective independence model (SPEM) for wireless sensor networks in structural health monitoring. IWCMC 2015: 576-580 - [c13]Mohamed Amir, Tamer Khattab, Tarek Elfouly, Amr Mohamed:
Secrecy for MIMO wiretap and MIMO broadcast channels with fading eavesdroppers: CSI does not increase the secure DoF. PACRIM 2015: 479-484 - [c12]Ahmed Badawy, Tamer Khattab, Tarek M. El-Fouly, Amr Mohamed, Daniele Trinchero, Carla-Fabiana Chiasserini:
Secret Key Generation Based on AoA Estimation for Low SNR Conditions. VTC Spring 2015: 1-7 - [c11]Mohamed Elsersy, Mohamed Hossam Ahmed, Abderrazak Abdaoui, Tarek Mohamed El-Fouly:
Routing and flow rate assignment using multi-objective optimization in wireless sensor networks. WCNC 2015: 1368-1373 - [c10]Alaa Awad, Amr Mohamed, Tarek M. Elfouly:
Energy-cost-distortion optimization for delay-sensitive M-health applications. WTS 2015: 1-5 - 2014
- [j1]Abderrazak Abdaoui, Tarek M. El-Fouly:
TOSSIM and distributed binary consensus algorithm in wireless sensor networks. J. Netw. Comput. Appl. 41: 451-458 (2014) - [c9]Kashif Nisar, Ibrahim A. Lawal, Khalid Abualsaud, Tarek M. El-Fouly:
A new WDM Application Response Time in WLAN Network and Fixed WiMAX using Distributed. AICCSA 2014: 781-787 - [c8]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed, Daniele Trinchero:
Secret key generation based on channel and distance measurements. ICUMT 2014: 136-142 - [c7]Tara Salman, Ahmed Badawy, Tarek M. Elfouly, Tamer Khattab, Amr Mohamed:
Non-data-aided SNR estimation for QPSK modulation in AWGN channel. WiMob 2014: 611-616 - [i4]Mohamed Amir, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed:
On the degrees of freedom of MIMO Multiple access channel with multiple eavesdroppers. CoRR abs/1404.5007 (2014) - [i3]Mohamed Amir, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed:
On the degrees of freedom of the MIMO Wiretap and MIMO broadcast channels with unknown eavesdroppers. CoRR abs/1409.5583 (2014) - [i2]Ahmed Badawy, Tamer Khattab, Daniele Trinchero, Tarek M. Elfouly, Amr Mohamed:
A Simple AoA Estimation Scheme. CoRR abs/1409.5744 (2014) - [i1]Ahmed Badawy, Tamer Khattab, Tarek M. Elfouly, Amr Mohamed, Daniele Trinchero, Carla-Fabiana Chiasserini:
Secret Key Generation Based on AoA Estimation for Low SNR Conditions. CoRR abs/1411.2208 (2014) - 2013
- [c6]Abderrazak Abdaoui, Tarek Mohamed El-Fouly:
On the distributed binary consensus algorithm in wireless sensor networks. ICSPCS 2013: 1-9 - [c5]Abderrazek Abdaoui, Tarek M. El-Fouly, Moez Draief:
Distributed binary consensus algorithm and wireless sensor network. IWCMC 2013: 1331-1336 - [c4]Noor Al-Nakhala, Ryan D. Riley, Tarek M. Elfouly:
Binary consensus in sensor motes. IWCMC 2013: 1337-1342 - 2012
- [c3]Lamia Romdhani, Amr Mohamed, Tarek M. Elfouly, Salman Raeisi:
QUMESH: Wireless mesh network deployment and configuration in harsh environment. WCNC 2012: 3328-3333 - 2011
- [c2]Abderrazak Abdaoui, K. Gurram, M. Singh, A. Errandani, Eric Châtelet, Abderrahim Doumar, Tarek M. El-Fouly:
Video acquisition between USB 2.0 CMOS camera and embedded FPGA system. ICSPCS 2011: 1-5
2000 – 2009
- 2008
- [c1]Tarek M. El-Fouly, Mohammed Saleh, Qutaibah M. Malluhi:
Efficient Forward Error Correction for Reliable Transmission in Packet Networks. PDPTA 2008: 103-109
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint