Mahmoud Al-Qutayri
Khalifa University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mahmoud Al-Qutayri.
Journal of Communications | 2007
Raed M. Shubair; Mahmoud Al-Qutayri; Jassim M. Samhan
This paper presents practical design of a smart antenna system based on direction-of-arrival estimation and adaptive beamforming. Direction-of-arrival (DOA) estimation is based on the MUSIC algorithm for identifying the directions of the source signals incident on the sensor array comprising the smart antenna system. Adaptive beamforming is achieved using the LMS algorithm for directing the main beam towards the desired source signals and generating deep nulls in the directions of interfering signals. The smart antenna system designed involves a hardware part which provides real data measurements of the incident signals received by the sensor array. Results obtained verify the improved performance of the smart antenna system when the practical measurements of the signal environment surrounding the sensor array are used. This takes the form of sharper peaks in the MUSIC angular spectrum and deep nulls in the LMS array beampattern.
Archive | 2006
Saleh R. Al-Araji; Zahir M. Hussain; Mahmoud Al-Qutayri
The first € price and the £ and
IEEE Communications Magazine | 2015
Lina S. Mohjazi; Mehrdad Dianati; George K. Karagiannidis; Sami Muhaidat; Mahmoud Al-Qutayri
price are net prices, subject to local VAT. Prices indicated with * include VAT for books; the €(D) includes 7% for Germany, the €(A) includes 10% for Austria. Prices indicated with ** include VAT for electronic products; 19% for Germany, 20% for Austria. All prices exclusive of carriage charges. Prices and other details are subject to change without notice. All errors and omissions excepted. S.R. Al-Araji, Z.M. Hussain, M.A. Al-Qutayri Digital Phase Lock Loops
international conference on innovations in information technology | 2011
Ahmed Rashed Kulaib; Raed M. Shubair; Mahmoud Al-Qutayri; Jason W. P. Ng
The increasing demand for spectral- and energy-efficient communication networks has spurred great interest in energy harvesting cognitive radio networks. Such a revolutionary technology represents a paradigm shift in the development of wireless networks, as it can simultaneously enable the efficient use of the available spectrum and the exploitation of RF energy in order to reduce reliance on traditional energy sources. This is mainly triggered by the recent advancements in microelectronics that puts forward RF energy harvesting as a plausible technique in the near future. On the other hand, it has been suggested that the operation of a network relying on harvested energy needs to be redesigned to allow the network to reliably function in the long term. To this end, the aim of this survey article is to provide a comprehensive overview of recent development and the challenges regarding the operation of CRNs powered by RF energy. In addition, the potential open issues that might be considered for future research are also discussed in this article.
IEEE Transactions on Circuits and Systems | 2006
Mahmoud Al-Qutayri; Saleh R. Al-Araji; Nawaf I. Al-Moosa
Localization of sensor nodes is an important aspect in Wireless Sensor Networks (WSNs). This paper presents an overview of the major localization techniques for WSNs. These techniques are classified into centralized and distributed depending on where the computational effort is carried out. The paper concentrates on the factors that need to be considered when selecting a localization technique. The advantages and limitation of various techniques are also discussed. Finally, future research directions and challenges are highlighted.
IEEE Transactions on Very Large Scale Integration Systems | 2016
Hamad Marzouqi; Mahmoud Al-Qutayri; Khaled Salah; Dimitrios Schinianakis; Thanos Stouraitis
This paper presents a study of the performance of the first-order time-delay digital tanlock loop (TDTL). It proposes a number of modified loop architectures that overcome some of the original TDTL design limitations. Simulation results indicate that the new architectures, which include delay switching, gain adaptation and a combination of both techniques, improve the TDTL performance in terms of acquisition speed, locking range and resilience to frequency disturbances. The first-order TDTL was also implemented on a field programmable gate array (FPGA). The real-time results from the FPGA implementation are in agreement with the ones obtained through simulation
biomedical and health informatics | 2014
Hussam M. N. Al Hamadi; Amjad Gawanmeh; Mahmoud Al-Qutayri
In this paper, an exportable application-specific instruction-set elliptic curve cryptography processor based on redundant signed digit representation is proposed. The processor employs extensive pipelining techniques for Karatsuba-Ofman method to achieve high throughput multiplication. Furthermore, an efficient modular adder without comparison and a high-throughput modular divider, which results in a short datapath for maximized frequency, are implemented. The processor supports the recommended NIST curve P256 and is based on an extended NIST reduction scheme. The proposed processor performs single-point multiplication employing points in affine coordinates in 2.26 ms and runs at a maximum frequency of 160 MHz in Xilinx Virtex 5 (XC5VLX110T) field-programmable gate array.
ieee systems conference | 2008
Mahmoud Al-Qutayri; Hassan R. Barada; S. Al-Mehairi; J. Nuaimi
Modern healthcare systems benefit from the phenomenal advances that continue to be made in ICT. These advances have resulted in the development of several technologies that have become fundamental parts of electronic healthcare systems such as wireless body sensor networks (WBSNs). WBSNs integrate wearable and implanted devices with wireless communication and information processing systems to monitor the well-being of an individual. Testing and verification of WBSNs are of paramount importance as faults in these critical systems may lead to loss of life. In this paper, we propose a framework to verify the functionality of WBSN healthcare system using formal methods. We adopted a practical WBSN design, and provided a model for its behavior, then defined several properties for its correct operation, and finally we used theorem proving method to show that the proposed design correctly implements the required properties.
international conference on e health networking application services | 2015
Amjad Gawanmeh; Hussam Al-Hamadi; Mahmoud Al-Qutayri; Shiu-Kai Chin; Kashif Saleem
This paper describes a complete framework for an end- to-end smart home monitoring and control system. The communication with all components of the system is done using a variety of wireless technologies. The system incorporates security features at both ends that prevent unauthorized access as well as assign privileges to the users. The complete prototype smart home system was implemented and it supports three main services: monitoring the status of devices, controlling their settings through configurations that are device dependent, and periodic notification of the status of devices. The prototype system has a modular structure that enables the incorporation of additional components and services.
Journal of Computer Networks and Communications | 2012
Lina S. Mohjazi; Mahmoud Al-Qutayri; Hassan R. Barada; Kin Fai Poon; Raed M. Shubair
Testing and verification of healthcare information systems is a challenging and important issue since faults in these critical systems may lead to loss of lives, and in the best cases, loss of money and reputations. However, due to the complexity of these systems, and the increasing demand for new products and new technologies in this domain, there are several methods and technologies being used for testing these systems. In this paper, we review the state of the art on testing and verification of healthcare information systems, and then we identify several open issues and challenges in the area. We divide the exiting methods into three categories: simulation based methods, formal methods, and other techniques such as semi-formal methods. Then, we discuss challenging and open issues in the domain.