default search action
Mohamed Essam Khedr
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c17]Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:
Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. ICACT 2022: 220-225 - 2021
- [c16]Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:
Resilience Analysis of Multichord Peer to Peer IoT Satellite Networks. ICACT 2021: 220-225
2010 – 2019
- 2019
- [j7]Ahmed H. Salamah, Mohamed Tamazin, Maha A. Sharkas, Mohamed Essam Khedr, Mohamed Mahmoud:
Comprehensive Investigation on Principle Component Large-Scale Wi-Fi Indoor Localization. Sensors 19(7): 1678 (2019) - [c15]Ahmed Ismail Abdel Ghafar, Ángeles Vázquez-Castro, Mohamed Essam Khedr:
Satellite IoT services Using Multichord Peer to Peer Networking. 5G World Forum 2019: 566-571 - 2018
- [j6]Ahmed S. El-Bayaa, Mohamed Essam Khedr, Moustafa H. Aly:
Android smartphones network implementation in the absence of internet. Comput. Appl. Eng. Educ. 26(4): 938-946 (2018) - 2017
- [c14]A. El-Dalil, Maha A. Sharkas, Mohamed Essam Khedr:
Priority level mutualism for emergency vehicle using game theory. ICVES 2017: 75-80 - 2016
- [c13]N. E. Mosilhy, Mohamed S. El-Mahallawy, Mohamed Essam Khedr:
Multi-subcarrier OVSF code allocation in WCDMA. CCECE 2016: 1-5 - [c12]Ahmed H. Salamah, Mohamed Tamazin, Maha A. Sharkas, Mohamed Essam Khedr:
An enhanced WiFi indoor localization system based on machine learning. IPIN 2016: 1-8 - [c11]Mohamed Hossam Zaky, Abdelmonem Nasser, Mohamed Essam Khedr:
A robust Brain Computer Interface system for classifying multi motor imagery tasks over daily sessions. TSP 2016: 374-378 - 2015
- [j5]Mohamed Essam Khedr, Amr El-Helw, Mohamed Hossam Afifi:
Adaptive mitigation of narrowband interference in impulse radio UWB systems using time-hopping sequence design. J. Commun. Networks 17(6): 622-633 (2015) - [c10]Ismail M. El-Badawy, Safa Gasser, Ashraf M. Aziz, Mohamed Essam Khedr:
On the use of Pseudo-EIIP mapping scheme for identifying exons locations in DNA sequences. ICSIPA 2015: 244-247 - [c9]Mohamed K. Shehata, Safa M. Gasser, Hesham M. El-Badawy, Mohamed Essam Khedr:
Optimized dual uplink and downlink resource allocation for multiple class of service in OFDM network. ISSPIT 2015: 597-601 - 2014
- [j4]Hazem Shatila, Mohamed Essam Khedr, Jeffrey H. Reed:
Opportunistic channel allocation decision making in cognitive radio communications. Int. J. Commun. Syst. 27(2): 216-232 (2014) - [j3]Mohamed Essam Khedr, Rayan N. Makki Hassan:
Opportunistic call admission control for wireless broadband cognitive networks. Wirel. Networks 20(1): 105-114 (2014) - [c8]Nahla T. Abou-El-Kheir, Mohamed Abbas, Mohamed Essam Khedr:
An adaptive digital background calibration technique using variable step size LMS for pipelined ADC. CSNDSP 2014: 835-840 - [c7]Ismail M. El-Badawy, Safa Gasser, Mohamed Essam Khedr, Ashraf M. Aziz:
Improved time-domain approaches for locating exons in DNA using zero-phase filtering. GlobalSIP 2014: 1334-1337 - [c6]Nahla T. Abou-El-Kheir, Mohamed Essam Khedr, Mohamed Abbas:
A fast power efficient equalization-based digital background calibration technique for pipelined ADC. MIXDES 2014: 108-112 - 2013
- [c5]Ismail M. El-Badawy, Ashraf M. Aziz, Safa Gasser, Mohamed Essam Khedr:
A new multiple classifiers soft decisions fusion approach for exons prediction in DNA sequences. ICSIPA 2013: 281-286 - 2010
- [c4]Mohamed Essam Khedr, Mohamad Abou El-Nasr, Mona Ali:
QoS provisioning by reducing collision frequency for non-real time applications in wireless networks. WOCN 2010: 1-7
2000 – 2009
- 2009
- [c3]Mohamed Essam Khedr, Hazem Shatila:
CogMAX- A cognitive radio approach for WiMAX systems. AICCSA 2009: 550-554 - 2007
- [c2]Said E. El-Khamy, Mohamed Essam Khedr, Ahmad Al-Kabbany:
Punched Image Watermarking: A Novel Fast Fractal Coding Based Technique. IIH-MSP 2007: 629-632 - 2005
- [j2]Mohamed Essam Khedr, Ahmed Karmouch:
ACAI: agent-based context-aware infrastructure for spontaneous applications. J. Netw. Comput. Appl. 28(1): 19-44 (2005) - [c1]Mohamed Essam Khedr, Ahmed Karmouch, Mohamed Ganna, Eric Horlait:
Semantic techniques for reconfiguring adapting networks in pervasive environments. Integrated Network Management 2005: 645-658 - 2004
- [j1]Mohamed Essam Khedr, Ahmed Karmouch:
Negotiating Context Information in Context-Aware Systems. IEEE Intell. Syst. 19(6): 21-29 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint