Sa'ed Abed

Orcid: 0000-0003-1849-9316

According to our database1, Sa'ed Abed authored at least 68 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Two-stage framework for diabetic retinopathy diagnosis and disease stage screening with ensemble learning.
Expert Syst. Appl., September, 2023

Lung cancer classification and identification framework with automatic nodule segmentation screening using machine learning.
Appl. Intell., August, 2023

Viral genome prediction from raw human DNA sequence samples by combining natural language processing and machine learning techniques.
Expert Syst. Appl., May, 2023

A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives.
Wirel. Pers. Commun., April, 2023

Using an Interactive Theorem Prover for Formally Analyzing the Dynamics of the Unmanned Aerial Vehicles.
Proceedings of the Mobile Robot: Motion Control and Path Planning, 2023

Early detection of diabetic foot ulcers from thermal images using the bag of features technique.
Biomed. Signal Process. Control., 2023

Epileptic Seizure Detection Using Novel CNN with Residual Connections.
Proceedings of the Fourth International Conference on Intelligent Data Science Technologies and Applications, 2023

Improving Energy Consumption in Content-Addressable Memory Through Precomputation.
Proceedings of the International Conference on Information Technology, 2023

Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing.
Proceedings of the 2023 International Conference on Advances in Computing Research (ACR'23), 2023

2022
Efficient hand vein recognition using local keypoint descriptors and directional gradients.
Multim. Tools Appl., 2022

Enhanced video-on-demand security in cloud computing against insider and outsider threats.
Int. J. Secur. Networks, 2022

Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine.
Int. J. Inf. Secur. Priv., 2022

Formal analysis of 2D image processing filters using higher-order logic theorem proving.
EURASIP J. Adv. Signal Process., 2022

Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach.
Biomed. Signal Process. Control., 2022

CAD systems for COVID-19 diagnosis and disease stage classification by segmentation of infected regions from CT images.
BMC Bioinform., 2022

2021
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Cluster-Based Antiphishing (CAP) Model for Smart Phones.
Sci. Program., 2021

Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture.
Multim. Tools Appl., 2021

SAT-based and CP-based declarative approaches for Top-Rank-K closed frequent itemset mining.
Int. J. Intell. Syst., 2021

Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm.
Int. J. Circuit Theory Appl., 2021

Performance evaluation of the SM4 cipher based on field-programmable gate array implementation.
IET Circuits Devices Syst., 2021

HVoC: a Hybrid Model Checking - Interactive Theorem Proving Approach for Functional Verification of Digital Circuits.
J. Electron. Test., 2021

Customized frequent patterns mining algorithms for enhanced Top-Rank-K frequent pattern mining.
Expert Syst. Appl., 2021

An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices.
Clust. Comput., 2021

Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
Formal Analysis of Unmanned Aerial Vehicles Using Higher-Order-Logic Theorem Proving.
J. Aerosp. Inf. Syst., September, 2020

Reducing Write Latency by Integrating Advanced PreSET Technique and Two-Stage-Write with Inversion Schemes.
J. Comput., 2020

Enhanced GPU-based anti-noise hybrid edge detection method.
Comput. Syst. Sci. Eng., 2020

Formal analysis of the biological circuits using higher-order-logic theorem proving.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2019
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher.
Sensors, 2019

An Automated Security Approach of Video Steganography-Based LSB Using FPGA Implementation.
J. Circuits Syst. Comput., 2019

Implementation of speech feature extraction for low-resource devices.
IET Circuits Devices Syst., 2019

Efficient cover image selection based on spatial block analysis and DCT embedding.
EURASIP J. Image Video Process., 2019

A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing.
Comput. Networks, 2019

A comprehensive study and analysis on SAT-solvers: advances, usages and achievements.
Artif. Intell. Rev., 2019

2018
Leakage/Temperature-Aware Dynamic Voltage Scaling and Dynamic Cache Reconfiguration to Reduce Power Consumption.
J. Low Power Electron., 2018

High-performance low-power approximate Wallace tree multiplier.
Int. J. Circuit Theory Appl., 2018

An efficient multiple sclerosis segmentation and detection system using neural networks.
Comput. Electr. Eng., 2018

2017
Optic disc detection in retinal fundus images using gravitational law-based edge detection.
Medical Biol. Eng. Comput., 2017

Automatic verification of single-electron transistor arrays based on multiway decision graphs.
IET Circuits Devices Syst., 2017

An adaptive edge detection operator for noisy images based on a total variation approach restoration.
Comput. Syst. Sci. Eng., 2017

Fault tolerance design for NoCs: partial virtual-channel sharing.
Proceedings of the 6th International Conference on Software and Computer Applications, 2017

2016
A high-capacity and secure least significant bit embedding approach based on word and letter frequencies.
Secur. Commun. Networks, 2016

Security of VoIP traffic over low or limited bandwidth networks.
Secur. Commun. Networks, 2016

Hybrid approach based on partial tag comparison technique and search methods to improve cache performance.
IET Comput. Digit. Tech., 2016

Effective optic disc detection method based on swarm intelligence techniques and novel pre-processing steps.
Appl. Soft Comput., 2016

2015
Towards improving the performance of distributed virtual memory based reversal cache approach.
Int. J. Comput. Appl. Technol., 2015

2014
MPLS technology in wireless networks.
Wirel. Networks, 2014

Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods.
J. Circuits Syst. Comput., 2014

Software comprehension based on database relational algebra.
Int. J. Inf. Commun. Technol., 2014

2013
Hierarchical steganography using novel optimum quantization technique.
Signal Image Video Process., 2013

An Efficient Backup Technique for Database Systems Based on Threshold Sharing.
J. Comput., 2013

Automatic verification of reduction techniques in Higher Order Logic.
Formal Aspects Comput., 2013

2012
Low power Wallace multiplier design based on wide counters.
Int. J. Circuit Theory Appl., 2012

MDG-SAT: an automated methodology for efficient safety checking.
Int. J. Crit. Comput. Based Syst., 2012

Towards an FPGA implementation and performance evaluation of a digital carrier synchronizer with a portable emulation environment.
Int. J. Comput. Appl. Technol., 2012

Abstract property language for MDG model checking methodology.
Int. J. Comput. Appl. Technol., 2012

A novel approach to enhance distributed virtual memory.
Comput. Electr. Eng., 2012

2011
NuMDG: A New Tool for Multiway Decision Graphs Construction.
J. Comput. Sci. Technol., 2011

Image Steganography Optimization Technique.
Proceedings of the Signal Processing and Information Technology, 2011

2010
MDGs Reduction Technique Based on the HOL Theorem Prover.
Proceedings of the 40th IEEE International Symposium on Multiple-Valued Logic, 2010

2009
An Abstract Reachability Approach by Combining HOL Induction and Multiway Decision Graphs.
J. Comput. Sci. Technol., 2009

LCF-style for Secure Verification Platform based on Multiway Decision Graphs.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

2008
LCF-style Platform based on Multiway Decision Graphs.
Proceedings of the 17th International Workshop on Functional and (Constraint) Logic Programming, 2008

Reachability analysis using multiway decision graphs in the HOL theorem prover.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

A New Approach for the Construction of Multiway Decision Graphs.
Proceedings of the Theoretical Aspects of Computing, 2008

The Performance of Combining Multiway Decision Graphs and HOL Theorem Prover.
Proceedings of the Forum on specification and Design Languages, 2008

2007
Towards First-Order Symbolic Trajectory Evaluation.
Proceedings of the 37th International Symposium on Multiple-Valued Logic, 2007


  Loading...