default search action
Sa'ed Abed
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Lamis Abdo, Imtiaz Ahmad, Sa'ed Abed:
A smart admission control and cache replacement approach in content delivery networks. Clust. Comput. 27(3): 2427-2445 (2024) - [j55]Adnan Rashid, Ayesha Gauhar, Osman Hasan, Sa'ed Abed, Imtiaz Ahmad:
Formal Verification of Universal Numbers using Theorem Proving. J. Electron. Test. 40(3): 329-345 (2024) - 2023
- [j54]Mohammad H. Alshayeji, Sa'ed Abed:
Lung cancer classification and identification framework with automatic nodule segmentation screening using machine learning. Appl. Intell. 53(16): 19724-19741 (2023) - [j53]Mohammad H. Alshayeji, Silpa ChandraBhasi Sindhu, Sa'ed Abed:
Early detection of diabetic foot ulcers from thermal images using the bag of features technique. Biomed. Signal Process. Control. 79(Part): 104143 (2023) - [j52]Mohammad H. Alshayeji, Silpa ChandraBhasi Sindhu, Sa'ed Abed:
Viral genome prediction from raw human DNA sequence samples by combining natural language processing and machine learning techniques. Expert Syst. Appl. 218: 119641 (2023) - [j51]Mohammad H. Alshayeji, Sa'ed Abed, Silpa ChandraBhasi Sindhu:
Two-stage framework for diabetic retinopathy diagnosis and disease stage screening with ensemble learning. Expert Syst. Appl. 225: 120206 (2023) - [j50]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd:
A Review on Blockchain and IoT Integration from Energy, Security and Hardware Perspectives. Wirel. Pers. Commun. 129(3): 2079-2122 (2023) - [c14]Amjad Gawanmeh, Sa'ed Abed, Sara Abdul Aziz AlAwadh, Wathiq Mansoor, Shadi Atalla, Ahmad Alomari, Eric Yocam:
Enhanced Not Recently Used Algorithm for Cache Memory Systems in Mobile Computing. ACR 2023: 433-442 - [c13]Hanaa Alrushood, Sa'ed Abed, Asmaa Alabdulhadi:
Improving Energy Consumption in Content-Addressable Memory Through Precomputation. ICIT 2023: 68-72 - [c12]Zainab Abualhassan, Ehtesham Hassan, Imtiaz Ahmad, Sa'ed Abed:
Epileptic Seizure Detection Using Novel CNN with Residual Connections. IDSTA 2023: 116-125 - [p1]Adnan Rashid, Osman Hasan, Sa'ed Abed:
Using an Interactive Theorem Prover for Formally Analyzing the Dynamics of the Unmanned Aerial Vehicles. Mobile Robot: Motion Control and Path Planning 2023: 253-282 - 2022
- [j49]Mohammad H. Alshayeji, Silpa ChandraBhasi Sindhu, Sa'ed Abed:
CAD systems for COVID-19 diagnosis and disease stage classification by segmentation of infected regions from CT images. BMC Bioinform. 23(1): 264 (2022) - [j48]Mohammad H. Alshayeji, Hanem Ellethy, Sa'ed Abed, Renu Gupta:
Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach. Biomed. Signal Process. Control. 71(Part): 103141 (2022) - [j47]Adnan Rashid, Sa'ed Abed, Osman Hasan:
Formal analysis of 2D image processing filters using higher-order logic theorem proving. EURASIP J. Adv. Signal Process. 2022(1): 53 (2022) - [j46]Mohammad H. Alshayeji, Mousa AlSulaimi, Sa'ed Abed, Reem Jaffal:
Network Intrusion Detection With Auto-Encoder and One-Class Support Vector Machine. Int. J. Inf. Secur. Priv. 16(1): 1-18 (2022) - [j45]Mohammad H. Alshayeji, Sa'ed Abed:
Enhanced video-on-demand security in cloud computing against insider and outsider threats. Int. J. Secur. Networks 17(1): 48-55 (2022) - [j44]Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed:
Efficient hand vein recognition using local keypoint descriptors and directional gradients. Multim. Tools Appl. 81(11): 15687-15705 (2022) - 2021
- [j43]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Clust. Comput. 24(4): 3065-3084 (2021) - [j42]Areej Ahmad Abdelaal, Sa'ed Abed, Mohammad Alshayeji, Mohammad Al-laho:
Customized frequent patterns mining algorithms for enhanced Top-Rank-K frequent pattern mining. Expert Syst. Appl. 169: 114530 (2021) - [j41]Mishal Fatima Minhas, Osman Hasan, Sa'ed Abed:
HVoC: a Hybrid Model Checking - Interactive Theorem Proving Approach for Functional Verification of Digital Circuits. J. Electron. Test. 37(4): 561-567 (2021) - [j40]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji:
Performance evaluation of the SM4 cipher based on field-programmable gate array implementation. IET Circuits Devices Syst. 15(2): 121-135 (2021) - [j39]Sa'ed Abed, Bassam Jamil Mohd, Thaier Hayajneh, Mohammad H. Alshayeji:
Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int. J. Circuit Theory Appl. 49(11): 3607-3629 (2021) - [j38]Sa'ed Abed, Areej A. Abdelaal, Mohammad H. Alshayeji, Imtiaz Ahmad:
SAT-based and CP-based declarative approaches for Top-Rank-K closed frequent itemset mining. Int. J. Intell. Syst. 36(1): 112-151 (2021) - [j37]Mohammad Alshayeji, Jassim Al-Buloushi, Ali Ashkanani, Sa'ed Abed:
Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture. Multim. Tools Appl. 80(19): 28897-28917 (2021) - [j36]Mohammad Faisal, Sa'ed Abed:
Cluster-Based Antiphishing (CAP) Model for Smart Phones. Sci. Program. 2021: 9957323:1-9957323:9 (2021) - [j35]Bassam Jamil Mohd, Sa'ed Abed, Thaier Hayajneh, Mohammad H. Alshayeji:
Run-Time Monitoring and Validation Using Reverse Function (RMVRF) for Hardware Trojans Detection. IEEE Trans. Dependable Secur. Comput. 18(6): 2689-2704 (2021) - [c11]Amjad Gawanmeh, Wathiq Mansoor, Sa'ed Abed, Darin Kablaoui, Hala Al-Faisal:
Starvation Avoidance Task Scheduling Algorithm for Heterogeneous Computing Systems. CSCI 2021: 1794-1799 - 2020
- [j34]Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
Enhanced GPU-based anti-noise hybrid edge detection method. Comput. Syst. Sci. Eng. 35(1) (2020) - [j33]Sa'ed Abed, Adnan Rashid, Osman Hasan:
Formal Analysis of Unmanned Aerial Vehicles Using Higher-Order-Logic Theorem Proving. J. Aerosp. Inf. Syst. 17(9): 481-495 (2020) - [j32]Sa'ed Abed:
Reducing Write Latency by Integrating Advanced PreSET Technique and Two-Stage-Write with Inversion Schemes. J. Comput. 15(1): 22-36 (2020) - [c10]Sa'ed Abed, Adnan Rashid, Osman Hasan:
Formal analysis of the biological circuits using higher-order-logic theorem proving. SAC 2020: 3-7
2010 – 2019
- 2019
- [j31]Sahel Alouneh, Sa'ed Abed, Mohammad H. Al Shayeji, Raed Mesleh:
A comprehensive study and analysis on SAT-solvers: advances, usages and achievements. Artif. Intell. Rev. 52(4): 2575-2601 (2019) - [j30]Sa'ed Abed, Mohammad H. Al Shayeji, Fahad Ebrahim:
A secure and energy-efficient platform for the integration of Wireless Sensor Networks and Mobile Cloud Computing. Comput. Networks 165 (2019) - [j29]Sa'ed Abed, Suood Abdulaziz Al-Roomi, Mohammad H. Al Shayeji:
Efficient cover image selection based on spatial block analysis and DCT embedding. EURASIP J. Image Video Process. 2019: 87 (2019) - [j28]Sa'ed Abed, Bassam Jamil Mohd, Mohammad H. Al Shayeji:
Implementation of speech feature extraction for low-resource devices. IET Circuits Devices Syst. 13(6): 863-872 (2019) - [j27]Sa'ed Abed, Mohammed Al-Mutairi, Abdullah Al-Watyan, Omar Al-Mutairi, Wesam Alenizy, Aisha Al-Noori:
An Automated Security Approach of Video Steganography-Based LSB Using FPGA Implementation. J. Circuits Syst. Comput. 28(5): 1950083:1-1950083:27 (2019) - [j26]Sa'ed Abed, Reem Jaffal, Bassam Jamil Mohd, Mohammad Alshayeji:
FPGA Modeling and Optimization of a SIMON Lightweight Block Cipher. Sensors 19(4): 913 (2019) - [i1]Sa'ed Abed, Adnan Rashid, Osman Hasan:
Formal Analysis of the Biological Circuits using Higher-order-logic Theorem Proving. CoRR abs/1912.07340 (2019) - 2018
- [j25]Mohammad H. Alshayeji, Mohammad A. Al-Rousan, Hanem Ellethy, Sa'ed Abed:
An efficient multiple sclerosis segmentation and detection system using neural networks. Comput. Electr. Eng. 71: 191-205 (2018) - [j24]Sa'ed Abed, Yasser H. Khalil, Mahdi Modhaffar, Imtiaz Ahmad:
High-performance low-power approximate Wallace tree multiplier. Int. J. Circuit Theory Appl. 46(12): 2334-2348 (2018) - [j23]Sa'ed Abed, Haya Alahmad, Maryam Safar:
Leakage/Temperature-Aware Dynamic Voltage Scaling and Dynamic Cache Reconfiguration to Reduce Power Consumption. J. Low Power Electron. 14(2): 318-326 (2018) - 2017
- [j22]Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
An adaptive edge detection operator for noisy images based on a total variation approach restoration. Comput. Syst. Sci. Eng. 32(1) (2017) - [j21]Sa'ed Abed, Mohammed H. Ali, Mohammad H. Al Shayeji:
An adaptive edge detection operator for noisy images based on a total variation approach restoration. Comput. Syst. Sci. Eng. 32(3) (2017) - [j20]Sa'ed Abed, Imtiaz Ahmad, Mohammad H. Al Shayeji, Sari Sultan:
Automatic verification of single-electron transistor arrays based on multiway decision graphs. IET Circuits Devices Syst. 11(4): 395-403 (2017) - [j19]Mohammad Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed:
Optic disc detection in retinal fundus images using gravitational law-based edge detection. Medical Biol. Eng. Comput. 55(6): 935-948 (2017) - [c9]Sa'ed Abed, Mohammad H. Al Shayeji, Zahra'a Abdullah, Zainab AlSaeed:
Fault tolerance design for NoCs: partial virtual-channel sharing. ICSCA 2017: 233-238 - 2016
- [j18]Sa'ed Abed, Suood Abdulaziz Al-Roomi, Mohammad Alshayeji:
Effective optic disc detection method based on swarm intelligence techniques and novel pre-processing steps. Appl. Soft Comput. 49: 146-163 (2016) - [j17]Sa'ed Abed, Mohammad Alshayeji, Sari Sultan, Nesreen Mohammad:
Hybrid approach based on partial tag comparison technique and search methods to improve cache performance. IET Comput. Digit. Tech. 10(2): 69-76 (2016) - [j16]Sahel Alouneh, Sa'ed Abed, George Ghinea:
Security of VoIP traffic over low or limited bandwidth networks. Secur. Commun. Networks 9(18): 5591-5599 (2016) - [j15]Mohammad H. Alshayeji, Suood Abdulaziz Al-Roomi, Sa'ed Abed:
A high-capacity and secure least significant bit embedding approach based on word and letter frequencies. Secur. Commun. Networks 9(18): 5764-5788 (2016) - 2015
- [j14]Sa'ed Abed, Ashraf Hasan Bqerat, Ahmad Al-Khasawneh, Ayoub Alsarhan, Ibrahim Obeidat:
Towards improving the performance of distributed virtual memory based reversal cache approach. Int. J. Comput. Appl. Technol. 51(3): 247-256 (2015) - 2014
- [j13]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Ahmad Al-Khasawneh:
Software comprehension based on database relational algebra. Int. J. Inf. Commun. Technol. 6(1): 58-70 (2014) - [j12]Bassam Jamil Mohd, Thaier Hayajneh, Sa'ed Abed, Awni Itradat:
Analysis and Modeling of FPGA Implementations of Spatial Steganography Methods. J. Circuits Syst. Comput. 23(2) (2014) - [j11]Sahel Alouneh, Sa'ed Abed, Mazen Kharbutli, Bassam Jamil Mohd:
MPLS technology in wireless networks. Wirel. Networks 20(5): 1037-1051 (2014) - 2013
- [j10]Sa'ed Abed, Otmane Aït Mohamed, Ghiath Al Sammane:
Automatic verification of reduction techniques in Higher Order Logic. Formal Aspects Comput. 25(6): 971-991 (2013) - [j9]Sahel Alouneh, Sa'ed Abed, Bassam Jamil Mohd, Mazen Kharbutli:
An Efficient Backup Technique for Database Systems Based on Threshold Sharing. J. Comput. 8(11): 2980-2989 (2013) - [j8]Bassam Jamil Mohd, Sa'ed Abed, Bassam Na'ami, Thaier Hayajneh:
Hierarchical steganography using novel optimum quantization technique. Signal Image Video Process. 7(6): 1029-1040 (2013) - 2012
- [j7]Sa'ed Abed, Ashraf Hasan Bqerat, Sahel Alouneh, Bassam Jamil Mohd:
A novel approach to enhance distributed virtual memory. Comput. Electr. Eng. 38(2): 388-398 (2012) - [j6]Sa'ed Abed, Kamran Hussain, Otmane Aït Mohamed:
Abstract property language for MDG model checking methodology. Int. J. Comput. Appl. Technol. 44(1): 23-36 (2012) - [j5]Asif Iqbal Ahmed, Sayed Hafizur Rahman, Otmane Aït Mohamed, Sa'ed Abed:
Towards an FPGA implementation and performance evaluation of a digital carrier synchronizer with a portable emulation environment. Int. J. Comput. Appl. Technol. 45(1): 66-76 (2012) - [j4]Khaza Anuarul Hoque, Otmane Aït Mohamed, Sa'ed Abed, Mounir Boukadoum:
MDG-SAT: an automated methodology for efficient safety checking. Int. J. Crit. Comput. Based Syst. 3(1/2): 4-25 (2012) - [j3]Sa'ed Abed, Bassam Jamil Mohd, Zaid Al-bayati, Sahel Alouneh:
Low power Wallace multiplier design based on wide counters. Int. J. Circuit Theory Appl. 40(11): 1175-1185 (2012) - 2011
- [j2]Sa'ed Abed, Yassine Mokhtari, Otmane Aït Mohamed, Sofiène Tahar:
NuMDG: A New Tool for Multiway Decision Graphs Construction. J. Comput. Sci. Technol. 26(1): 139-152 (2011) - [c8]Bassam Jamil Mohd, Sa'ed Abed, Bassam Al-Naami, Sahel Alouneh:
Image Steganography Optimization Technique. SPIT/IPC 2011: 205-209 - 2010
- [c7]Sa'ed Abed, Otmane Aït Mohamed:
MDGs Reduction Technique Based on the HOL Theorem Prover. ISMVL 2010: 15-20
2000 – 2009
- 2009
- [j1]Sa'ed Abed, Otmane Aït Mohamed, Ghiath Al Sammane:
An Abstract Reachability Approach by Combining HOL Induction and Multiway Decision Graphs. J. Comput. Sci. Technol. 24(1): 76-95 (2009) - [c6]Sa'ed Abed, Otmane Aït Mohamed:
LCF-style for Secure Verification Platform based on Multiway Decision Graphs. CIIA 2009 - 2008
- [c5]Sa'ed Abed, Otmane Aït Mohamed, Ghiath Al Sammane:
The Performance of Combining Multiway Decision Graphs and HOL Theorem Prover. FDL 2008: 136-141 - [c4]Yassine Mokhtari, Sa'ed Abed, Otmane Aït Mohamed, Sofiène Tahar, Xiaoyu Song:
A New Approach for the Construction of Multiway Decision Graphs. ICTAC 2008: 228-242 - [c3]Sa'ed Abed, Otmane Aït Mohamed, Ghiath Al Sammane:
Reachability analysis using multiway decision graphs in the HOL theorem prover. SAC 2008: 333-338 - [c2]Sa'ed Abed, Otmane Aït Mohamed:
LCF-style Platform based on Multiway Decision Graphs. WFLP 2008: 3-26 - 2007
- [c1]Donglin Li, Otmane Aït Mohamed, Sa'ed Abed:
Towards First-Order Symbolic Trajectory Evaluation. ISMVL 2007: 53
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint