关注
Hatem Abdelkader
Hatem Abdelkader
, professor information systems, Menoufiya university
在 ci.menofia.edu.eg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Performance evaluation of symmetric encryption algorithms
DSA Elminaam, HMA Kader, MM Hadhoud
IJCSNS International Journal of Computer Science and Network Security 8 (12 …, 2008
325*2008
Evaluating the performance of symmetric encryption algorithms.
DS Abd Elminaam, HM Abdual-Kader, MM Hadhoud
Int. J. Netw. Secur. 10 (3), 216-222, 2010
2562010
Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices
DSA Elminaam, HMA Kader, MM Hadhoud
International Journal of Computer Theory and Engineering 1 (4), 1793-8201, 2009
2482009
Enhanced particle swarm optimization for task scheduling in cloud computing environments
AI Awad, NA El-Hefnawy, HM Abdel_kader
Procedia Computer Science 65, 920-929, 2015
2242015
Enhanced data security model for cloud computing
EM Mohamed, HS Abdelkader, S El-Etriby
2012 8th International Conference on Informatics and Systems (INFOS), CC-12 …, 2012
1742012
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types.
DSA Minaam, HM Abdual-Kader, MM Hadhoud
Int. J. Netw. Secur. 11 (2), 78-87, 2010
1052010
A hybrid approach for efficient anomaly detection using metaheuristic methods
TF Ghanem, WS Elkilani, HM Abdul-Kader
Journal of advanced research 6 (4), 609-619, 2015
812015
Studying the effects of most common encryption algorithms
D Salama, HA Kader, M Hadhoud
International Arab Journal of e-technology 2 (1), 1-10, 2011
572011
Comparative study between differential evolution and particle swarm optimization algorithms in training of feed-forward neural network for stock price prediction
ME Abdual-Salam, HM Abdul-Kader, WF Abdel-Wahed
2010 the 7th international conference on informatics and systems (INFOS), 1-8, 2010
562010
E-learning systems in virtual environment
HM Abdul-Kader
2008 ITI 6th International Conference on Information & Communications …, 2008
532008
Data security model for cloud computing
EM Mohamed, HS Abdelkader, S El-Etriby
Journal of Communication and Computer 10 (8), 1047-1062, 2013
522013
Neural networks training based on differential evolution algorithm compared with other architectures for weather forecasting34
HM Abdul-Kader
International Journal of Computer Science and Network Security 9 (3), 92-99, 2009
452009
In silico identification of potential key regulatory factors in smoking-induced lung cancer
SA El-Aarag, A Mahmoud, MH Hashem, H Abd Elkader, AE Hemeida, ...
BMC medical genomics 10, 1-11, 2017
412017
Modern encryption techniques for cloud computing
S El-etriby, EM Mohamed, HS Abdul-kader
Proceedings of International Conference on Communications and Information …, 2012
402012
An artificial bee colony algorithm for data replication optimization in cloud environments
R Salem, MA Salam, H Abdelkader, AA Mohamed
IEEE Access 8, 51841-51852, 2019
392019
Image encryption based on new one-dimensional chaotic map
NF Elabady, HM Abdalkader, MI Moussa, SF Sabbeh
2014 international conference on engineering and technology (ICET), 1-6, 2014
362014
Protecting online social networks profiles by hiding sensitive data attributes
H AbdulKader, E ElAbd, W Ead
Procedia Computer Science 82, 20-27, 2016
352016
Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences
KA Al-Sheshtawi, HM Abdul-Kader, NA Ismail
International Journal of Computer Science and Network Security 10 (4), 31-39, 2010
332010
Discrete wavelet transform-based freezing of gait detection in Parkinson’s disease
A El-Attar, AS Ashour, N Dey, H Abdelkader, MM Abd El-Naby, ...
Journal of Experimental & Theoretical Artificial Intelligence 33 (4), 543-559, 2021
322021
Randomness testing of modern encryption techniques in cloud environment
EM Mohamed, S El-Etriby, HS Abdul-Kader
2012 8th International Conference on Informatics and Systems (INFOS), CC-1-CC-6, 2012
322012
系统目前无法执行此操作,请稍后再试。
文章 1–20