Energy aware DAG scheduling on heterogeneous systems S Baskiyar, RF Abdel-Kader Cluster Computing 13 (4), 373-383, 2010 | 106 | 2010 |
Brightness preserving based on singular value decomposition for image contrast enhancement R Atta, RF Abdel-Kader Optik 126 (7-8), 799-803, 2015 | 51 | 2015 |
Efficient two-stage cryptography scheme for secure distributed data storage in cloud computing. RF Abdel-Kader, SH El-Sherif, RY Rizk International Journal of Electrical & Computer Engineering (2088-8708) 10 (3), 2020 | 19 | 2020 |
A low‐light image enhancement method based on bright channel prior and maximum colour channel G Sandoub, R Atta, HA Ali, RF Abdel‐Kader IET Image Processing 15 (8), 1759-1772, 2021 | 17 | 2021 |
Memristor model based on fuzzy window function RF Abdel-Kader, SM Abuelenin 2015 IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), 1-5, 2015 | 17 | 2015 |
Closed-form mathematical representations of interval type-2 fuzzy logic systems SM Abuelenin, RF Abdel-Kader arXiv preprint arXiv:1706.05593, 2017 | 11 | 2017 |
Innovative approach to high-speed spinning using a magnetically-elevated spinning ring Faissal Abdel-hady, Yehia El Mogahzy, Sherif AbuElenin, Rabab Abdel-Kader AUTEX Research Journal 6, 113-121, 2006 | 10 | 2006 |
Efficient energy and completion time for dependent task computation offloading algorithm in industry 4.0 RF Abdel-Kader, NE El-Sayad, RY Rizk Plos one 16 (6), e0252756, 2021 | 9 | 2021 |
Face Recognition as an Authentication Technique in Electronic Voting NE El-Sayad, RF Abdel-Kader, MI Marie International Journal of Advanced Computer Science and Applications 4 (No 6 …, 2013 | 4 | 2013 |
Efficient noise reduction system in industrial IoT data streams RF Abdel-Kader, NE El-Sayad, RY Rizk International Conference on Advanced Intelligent Systems and Informatics …, 2021 | 3 | 2021 |
Two-factor authentication scheme using one time password in cloud computing SH El-sherif, RF Abdel-kader, RY Rizk Proceedings of the International Conference on Advanced Intelligent Systems …, 2019 | 3 | 2019 |
Automated server-side model for recognition of security vulnerabilities in scripting languages RF Abdel-Kader, M Nashaat, MI Habib, HMK Mahdi International Journal of Electrical and Computer Engineering (IJECE) 10 (6 …, 2020 | 1 | 2020 |
Closed-Form Mathematical Representations of Interval Type-2 Fuzzy Logic Systems with Application to Inverted Pendulum Stabilization SM Abuelenin, RF Abdel-Kader Fuzzy Information and Engineering 14 (3), 269-290, 2022 | | 2022 |
SPLIE: Optimal Illumination Estimation for Structure Preserving Low-light Image Enhancement G Sandoub, R Atta, RF Abdel-Kader, HA Ali Port-Said Engineering Research Journal 25 (2), 120-134, 2021 | | 2021 |
Image steganography in wavelet domain R abdel-Kader, R Atta, A Elkafrawy Port Said Engineering Research Journal 21 (2), 2017 | | 2017 |
Memristor model based on fuzzy window function R Farouk Abdel-Kader, SM Abuelenin arXiv e-prints, arXiv: 1605.05767, 2016 | | 2016 |
A Static Code Analysis Tool for Security Vulnerabilities in PHP 5 Scripts HM M. Nashaat, M. Ibrahem Habib, Rabab F. Abdel Kader The 2012 World Congress on Computer Science and Information Technology,WCSIT'12, 2012 | | 2012 |
ENERGY AWARE TASK SCHEDULING ON HETEROGENEOUS SYSTEMS R Farouk Abdel Kader | | 2007 |
Power Managed Task Scheduling on Heterogeneous Systems. RAK Sanjeev Baskiyar Proceedings of the ISCA 19th International Conference on Parallel and …, 2006 | | 2006 |