Mahmoud Al-Qutayri
Mahmoud Al-Qutayri
Khalifa University
Verified email at
Cited by
Cited by
State of the art of metal oxide memristor devices
B Mohammad, MA Jaoude, V Kumar, DM Al Homouz, HA Nahla, ...
Nanotechnology reviews 5 (3), 311-329, 2016
Human vital signs detection methods and potential using radars: A review
M Kebe, R Gadhafi, B Mohammad, M Sanduleanu, H Saleh, M Al-Qutayri
Sensors 20 (5), 1454, 2020
The evolution of distributed systems towards microservices architecture
T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi
2016 11th International Conference for Internet Technology and Secured …, 2016
RF-powered cognitive radio networks: Technical challenges and limitations
L Mohjazi, M Dianati, GK Karagiannidis, S Muhaidat, M Al-Qutayri
IEEE communications Magazine 53 (4), 94-100, 2015
An overview of localization techniques for wireless sensor networks
AR Kulaib, RM Shubair, MA Al-Qutayri, JWP Ng
2011 international conference on innovations in information technology, 167-172, 2011
Digital Phase Lock Loops
SR Al-Araji, ZM Hussain, MA Al-Qutayri
Digital Phase Lock Loops: Architectures and Applications, 15-30, 2006
A high-speed FPGA implementation of an RSD-based ECC processor
H Marzouqi, M Al-Qutayri, K Salah, D Schinianakis, T Stouraitis
IEEE Transactions on very large scale integration (vlsi) systems 24 (1), 151-164, 2015
Performance comparison between container-based and VM-based services
T Salah, MJ Zemerly, CY Yeun, M Al-Qutayri, Y Al-Hammadi
2017 20th Conference on Innovations in Clouds, Internet and Networks (ICIN …, 2017
Smart Home Systems
M Al-Qutayri
BoD–Books on Demand, 2010
A Setup for the Evaluation of MUSIC and LMS Algorithms for a Smart Antenna System.
RM Shubair, M Al-Qutayri, JM Samhan
J. Commun. 2 (4), 71-77, 2007
BROSMAP: A novel broadcast based secure mobile agent protocol for distributed service applications
D Shehada, CY Yeun, MJ Zemerly, M Al Qutayri, Y Al Hammadi, ...
Security and communication networks 2017 (1), 3606424, 2017
Semi-supervised multi-layered clustering model for intrusion detection
OY Al-Jarrah, Y Al-Hammdi, PD Yoo, S Muhaidat, M Al-Qutayri
Digital Communications and Networks 4 (4), 277-286, 2018
Security and privacy of intelligent VANETs
M Al-Qutayri, C Yeun, F Al-Hawi
Computational Intelligence and Modern Heuristics, 2010
Rate-splitting multiple access: Unifying NOMA and SDMA in MISO VLC channels
S Naser, PC Sofotasios, L Bariah, W Jaafar, S Muhaidat, M Al-Qutayri, ...
IEEE Open Journal of Vehicular Technology 1, 393-413, 2020
A new adaptive trust and reputation model for mobile agent systems
D Shehada, CY Yeun, MJ Zemerly, M Al-Qutayri, Y Al-Hammadi, J Hu
Journal of Network and Computer Applications 124, 33-43, 2018
Modeling and optimization of memristor and STT-RAM-based memory for low-power applications
Y Halawani, B Mohammad, D Homouz, M Al-Qutayri, H Saleh
IEEE Transactions on Very Large Scale Integration (VLSI) Systems 24 (3 …, 2015
Framework of a national level electronic health record system
O Gul, M Al-Qutayri, CY Yeun, QH Vu
2012 International Conference on Cloud Computing Technologies, Applications …, 2012
MOMSense: metal-oxide-metal elementary glucose sensor
H Abunahla, B Mohammad, A Alazzam, MA Jaoude, M Al-Qutayri, ...
Scientific reports 9 (1), 5524, 2019
Review of elliptic curve cryptography processor designs
H Marzouqi, M Al-Qutayri, K Salah
Microprocessors and Microsystems 39 (2), 97-112, 2015
GNN-RE: Graph Neural Networks for Reverse Engineering of Gate-Level Netlists
L Alrahis, A Sengupta, J Knechtel, S Patnaik, H Saleh, B Mohammad, ...
IEEE Transactions on Computer-Aided Design of Integrated Circuits and …, 2021
The system can't perform the operation now. Try again later.
Articles 1–20