Ahmed Abdelhadi
YOU?
Author Swipe
View article: RSMA-enabled RIS-assisted Integrated Sensing and Communication for 6G: A Comprehensive Survey
RSMA-enabled RIS-assisted Integrated Sensing and Communication for 6G: A Comprehensive Survey Open
View article: Privacy-preserving federated learning approach based on Hensel’s compression and differential privacy
Privacy-preserving federated learning approach based on Hensel’s compression and differential privacy Open
We present a novel two-layer mechanism that combines Hensel’s Lemma with differential privacy to enhance user privacy protection in federated learning. The first layer introduces a new dimensionality reduction method, utilizing Hensel’s Le…
View article: Prescribed-Time Observer Is Naturally Robust Against Disturbances and Uncertainties
Prescribed-Time Observer Is Naturally Robust Against Disturbances and Uncertainties Open
This paper addresses the robustness of a prescribed-time observer for a class of nonlinear systems in the presence of disturbances and unmodeled dynamics. It is proven and demonstrated through simulations that the proposed observer complet…
View article: Patient-Specific Markerless Tracking of Pancreatic-GTV and Abdominal Organs-at-Risk Using Deep-Learning
Patient-Specific Markerless Tracking of Pancreatic-GTV and Abdominal Organs-at-Risk Using Deep-Learning Open
View article: Privacy-Preserving Federated Learning Approach Based on Hensel’s Compression and Differential Privacy
Privacy-Preserving Federated Learning Approach Based on Hensel’s Compression and Differential Privacy Open
We present a novel two-layer mechanism that combines Hensel’s Lemma with differential privacy to enhance user privacy protection in federated learning. The first layer introduces a new dimensionality reduction method, utilizing Hensel’s Le…
View article: Quantum Codes: A Comprehensive Survey of Techniques, Challenges, and Future Directions
Quantum Codes: A Comprehensive Survey of Techniques, Challenges, and Future Directions Open
View article: Deep Learning in Wireless Communication Receiver: A Survey
Deep Learning in Wireless Communication Receiver: A Survey Open
The design of wireless communication receivers to enhance signal processing in complex and dynamic environments is going through a transformation by leveraging deep neural networks (DNNs). Traditional wireless receivers depend on mathemati…
View article: Artificial Intelligence in Quantum Communications: A Comprehensive Survey
Artificial Intelligence in Quantum Communications: A Comprehensive Survey Open
View article: Quantum Codes: A Comprehensive Survey of Techniques, Challenges, and Future Directions
Quantum Codes: A Comprehensive Survey of Techniques, Challenges, and Future Directions Open
View article: Deep Learning in Wireless Communication Receivers: A Survey
Deep Learning in Wireless Communication Receivers: A Survey Open
The design of wireless communication receivers to enhance signal processing in complex and dynamic environments is going through a transformation by leveraging deep neural networks (DNNs). Traditional wireless receivers depend on models an…
View article: Artificial Intelligence in Quantum Communications: A Comprehensive Survey
Artificial Intelligence in Quantum Communications: A Comprehensive Survey Open
The integration of Artificial Intelligence (AI) into the field of quantum communication has emerged in recent years as a promising avenue for enhancing secure data transmission, error correction, and scalability in quantum networks. This p…
View article: The Employment of Filters in Electrocardiogram Signal Processing and their Applications
The Employment of Filters in Electrocardiogram Signal Processing and their Applications Open
View article: STATE OBJECTIONS TO THE ILLEGALITY OF INVESTMENT IN INVESTOR-STATE ARBITRATION
STATE OBJECTIONS TO THE ILLEGALITY OF INVESTMENT IN INVESTOR-STATE ARBITRATION Open
View article: Enhanced Bearing Fault Diagnosis Through Trees Ensemble Method and Feature Importance Analysis
Enhanced Bearing Fault Diagnosis Through Trees Ensemble Method and Feature Importance Analysis Open
Purpose This research introduces a groundbreaking method for bearing defect detection. It leverages ensemble machine learning (ML) models and conducts comprehensive feature importance analysis. The key innovation is the training and benchm…
View article: Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey
Orthogonal Time Frequency Space for Integrated Sensing and Communication: A Survey Open
Sixth-generation (6G) wireless communication systems, as stated in the European 6G flagship project Hexa-X, are anticipated to feature the integration of intelligence, communication, sensing, positioning, and computation. An important aspe…
View article: Exploring the Effects of Test Length, Number of Alternatives, and Sample Size on the Accuracy of Individual Estimates and Item Parameters within the Framework of Item Response Theory
Exploring the Effects of Test Length, Number of Alternatives, and Sample Size on the Accuracy of Individual Estimates and Item Parameters within the Framework of Item Response Theory Open
View article: Hensel’s Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated Learning
Hensel’s Compression-Based Dimensionality Reduction Approach for Privacy Protection in Federated Learning Open
Differential privacy (DP) is considered a de-facto standard for protecting users' privacy in data analysis, machine, and deep learning. Existing DP-based privacy-preserving training approaches consist of adding noise to the clients' gradie…
View article: Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel
Large-Scale Rate-Splitting Multiple Access in Uplink UAV Networks: Effective Secrecy Throughput Maximization Under Limited Feedback Channel Open
UAVs are capable of improving the performance of next generation wireless systems. Specifically, UAVs can be exploited as aerial base-stations (UAV-BS) for supporting legitimate ground users in remote uncovered areas or in environments tem…
View article: Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks
Mixture GAN For Modulation Classification Resiliency Against Adversarial Attacks Open
Automatic modulation classification (AMC) using the Deep Neural Network (DNN) approach outperforms the traditional classification techniques, even in the presence of challenging wireless channel environments. However, the adversarial attac…
View article: Differential Privacy Preservation in Robust Continual Learning
Differential Privacy Preservation in Robust Continual Learning Open
Enhancing the privacy of machine learning (ML) algorithms has become crucial with the
\npresence of different types of attacks on AI applications. Continual learning (CL) is a branch of ML with
\nthe aim of learning a set of knowledge sequ…
View article: Differential Privacy for Deep and Federated Learning: A Survey
Differential Privacy for Deep and Federated Learning: A Survey Open
Users’ privacy is vulnerable at all stages of the deep learning process. Sensitive information of users may be disclosed during data collection, during training, or even after releasing the trained learning model. Differential privacy (DP)…
View article: Fast and Robust LRSD-Based SAR/ISAR Imaging and Decomposition
Fast and Robust LRSD-Based SAR/ISAR Imaging and Decomposition Open
The earlier works in the context of low-rank-sparse-decomposition (LRSD)-driven stationary synthetic aperture radar (SAR) imaging have shown significant improvement in the reconstruction-decomposition process. Neither of the proposed frame…
View article: Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning
Secrecy Rate Maximization for Hardware Impaired Untrusted Relaying Network with Deep Learning Open
This paper investigates the physical layer security design of an untrusted relaying network where the source node coexists with a multi-antenna eavesdropper (Eve). While the communication relies on untrustworthy relay nodes to increase rel…
View article: INDEX VOLUME 22, 2021
INDEX VOLUME 22, 2021 Open
View article: Artesunate-induced hemolysis in severe complicated malaria – A diagnostic challenge: A case report and literature review of anemia in malaria
Artesunate-induced hemolysis in severe complicated malaria – A diagnostic challenge: A case report and literature review of anemia in malaria Open
Malaria infection, which results due to the parasitic protozoan Plasmodium, has several known etiologies of hemolytic anemia as a possible complication in cases such as concurrent G6PD deficiency, severe parasitemia, or use of paren…
View article: Adaptive Bitrate Video Streaming for Wireless nodes: A Survey
Adaptive Bitrate Video Streaming for Wireless nodes: A Survey Open
In today's Internet, video is the most dominant application and in addition to this, wireless networks such as WiFi, Cellular, and Bluetooth have become ubiquitous. Hence, most of the Internet traffic is video over wireless nodes. There is…
View article: Modelling and Control of Chemical Processes using Local Linear Model Networks
Modelling and Control of Chemical Processes using Local Linear Model Networks Open
Recently, technology and research in control systems have made fast progress in numerous fields, such as chemical process engineering. The modelling and control may face some challenges as the procedures applied to chemical reactors and pr…
View article: Secure Authentication of ADS-B Aircraft Communications using Retroactive Key Publication
Secure Authentication of ADS-B Aircraft Communications using Retroactive Key Publication Open
Automatic Dependent Surveillance-Broadcast(ADSB), is the next generation Air Traffic management system to monitor the airspace for air traffic communication and traffic information. While the ADS-B empowers aircraft to broadcast their loca…
View article: Do ward round stickers improve surgical ward round? A quality improvement project in a high-volume general surgery department
Do ward round stickers improve surgical ward round? A quality improvement project in a high-volume general surgery department Open
Introduction Increasing pressure and limitations on the NHS necessitate simple and effective ways for maintaining standards of patient care. This quality improvement project aims to design and implement user-friendly and clear ward round s…
View article: Robust Resource Allocation With Joint Carrier Aggregation in Multi-Carrier Cellular Networks
Robust Resource Allocation With Joint Carrier Aggregation in Multi-Carrier Cellular Networks Open
In this paper, we present a novel approach for robust optimal resource allocation with joint carrier aggregation to allocate multiple carriers resources optimally among users with elastic and inelastic traffic in cellular networks. We use …