Menu
Top

Amr Abdel-Hamid

Instructional Professor, Technology Innovation and Entrepreneurship

Office of the Provost

Program Affiliations

Research Interests

Professor Abdel-Hamid’s research spans IoT and AIoT systems, edge computing, and hardware security. His work emphasizes practical system integration, rapid prototyping, and the translation of research into industry-ready products and platforms. He has led projects on LoRa/BLE/5G solutions, smart city applications, and AI-enabled embedded systems.

Keyword tag icon IoT AIoT Edge Computing Embedded Systems Hardware Security

Publications

  • M. M. Farag, M. Fouad, and A. T. Abdel-Hamid, “Automatic severity classification of diabetic retinopathy based on densenet and convolutional block attention module,” IEEE Access, vol. 10, pp. 38299–38308, 2022.

  • S. Hosny, M. W. El-Kharashi, and A. T. Abdel-Hamid, “Survey on compressed sensing over the past two decades,” Memories - Materials, Devices, Circuits and Systems, vol. 4, p. 100060, Elsevier, 2023.

  • O. Mahmoud, H. Kopp, A. T. Abdelhamid, and F. Kargl, “Applications of smart-contracts: anonymous decentralized insurances with IoT sensors,” in Proc. 2018 IEEE Int. Conf. Internet of Things (iThings), GreenCom, CPSCom, and SmartData, pp. 1507–1512, IEEE, 2018.

  • B. Akbarpour, A. T. Abdel-Hamid, S. Tahar, and J. Harrison, “Verifying a synthesized implementation of IEEE-754 floating-point exponential function using HOL,” The Computer Journal, vol. 53, no. 4, pp. 465–488, OUP, 2010.

  • A. T. Abdel-Hamid, S. Tahar, and E. M. Aboulhamid, “IP watermarking techniques: Survey and comparison,” in Proc. 3rd IEEE Int. Workshop on System-on-Chip for Real-Time Applications, pp. 60–65, IEEE, 2003.

  • A. Cui, C.-H. Chang, S. Tahar, and A. T. Abdel-Hamid, “A robust FSM watermarking scheme for IP protection of sequential circuit design,” IEEE Trans. Computer-Aided Design of Integrated Circuits and Systems, vol. 30, no. 5, pp. 678–690, IEEE, 2011.

  • A. T. Abdel-Hamid, S. Tahar, and E. M. Aboulhamid, “A tool for automatic watermarking of IP designs,” in Proc. 2nd IEEE Northeast Workshop on Circuits and Systems (NEWCAS), pp. 381–384, IEEE, 2004.

  • Y. M. Amin and A. T. Abdel-Hamid, “Classification and analysis of IEEE 802.15.4 MAC layer attacks,” in Proc. 2015 11th Int. Conf. Innovations in Information Technology (IIT), pp. 74–79, IEEE, 2015.

  • M. A. Hany and A. T. Abdel-Hamid, “ZEIN: An indoor Zigbee planning tool,” in Proc. 2015 11th Int. Conf. Innovations in Information Technology (IIT), pp. 250–255, IEEE, 2015.

  • T. Gowda, S. Vrudhula, N. Kulkarni, K. Berezowski, A. Cui, C.-H. Chang, S. Tahar, and A. T. Abdel-Hamid, “High-level synthesis mapping multi-domain applications onto coarse-grained reconfigurable architectures,” in Proc. [Book/Conf. details missing].

  • M. M. A. Moustafa, S. H. A. El-Ramly, A. M. Taha, A. T. Abdel-Hamid, S. Tahar, N. Toledo, M. V. Higuero, E. Jacob, J. Matias, and N. Bi, “WOCN2009 conference program, Cairo, Egypt,” 2023. [Conference program entry]

  • A. T. Abdel-Hamid, M. Zaki, and S. Tahar, “A tool converting finite state machine to VHDL,” in Proc. Canadian Conf. Electrical and Computer Engineering (CCECE), vol. 4, pp. 1907–1910, IEEE, 2004.

  • M. M. Abdel-Aziz and A. T. Abdel-Hamid, “Hardware low power implementation of attribute-based encryption,” in Proc. 2016 28th Int. Conf. Microelectronics (ICM), pp. 273–276, IEEE, 2016.