Seguir
Hatem Abdelkader
Hatem Abdelkader
, professor information systems, Menoufiya university
Dirección de correo verificada de ci.menofia.edu.eg - Página principal
Título
Citado por
Citado por
Año
Performance evaluation of various symmetric encryption algorithms
S Kansal, M Mittal
2014 international conference on parallel, distributed and grid computing …, 2014
298*2014
Performance evaluation of symmetric encryption algorithms on power consumption for wireless devices
DSA Elminaam, HMA Kader, MM Hadhoud
International Journal of Computer Theory and Engineering 1 (4), 1793-8201, 2009
2462009
Enhanced particle swarm optimization for task scheduling in cloud computing environments
AI Awad, NA El-Hefnawy, HM Abdel_kader
Procedia Computer Science 65, 920-929, 2015
2222015
Evaluating The Performance of Symmetric Encryption Algorithms.
DS Abd Elminaam, HM Abdual-Kader, MM Hadhoud
Int. J. Netw. Secur. 10 (3), 216-222, 2010
1932010
Enhanced data security model for cloud computing
EM Mohamed, HS Abdelkader, S El-Etriby
2012 8th International Conference on Informatics and Systems (INFOS), CC-12 …, 2012
1722012
Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types.
DSA Minaam, HM Abdual-Kader, MM Hadhoud
Int. J. Netw. Secur. 11 (2), 78-87, 2010
1042010
A hybrid approach for efficient anomaly detection using metaheuristic methods
TF Ghanem, WS Elkilani, HM Abdul-Kader
Journal of advanced research 6 (4), 609-619, 2015
792015
Studying the effects of most common encryption algorithms
D Salama, HA Kader, M Hadhoud
International Arab Journal of e-technology 2 (1), 1-10, 2011
582011
Comparative study between differential evolution and particle swarm optimization algorithms in training of feed-forward neural network for stock price prediction
ME Abdual-Salam, HM Abdul-Kader, WF Abdel-Wahed
2010 the 7th international conference on informatics and systems (INFOS), 1-8, 2010
542010
E-learning systems in virtual environment
HM Abdul-Kader
2008 ITI 6th International Conference on Information & Communications …, 2008
532008
Data security model for cloud computing
EM Mohamed, HS Abdelkader, S El-Etriby
Journal of Communication and Computer 10 (8), 1047-1062, 2013
512013
Neural networks training based on differential evolution algorithm compared with other architectures for weather forecasting34
HM Abdul-Kader
International Journal of Computer Science and Network Security 9 (3), 92-99, 2009
472009
Modern encryption techniques for cloud computing
S El-etriby, EM Mohamed, HS Abdul-kader
Proceedings of International Conference on Communications and Information …, 2012
402012
In silico identification of potential key regulatory factors in smoking-induced lung cancer
SA El-Aarag, A Mahmoud, MH Hashem, H Abd Elkader, AE Hemeida, ...
BMC medical genomics 10, 1-11, 2017
392017
An artificial bee colony algorithm for data replication optimization in cloud environments
R Salem, MA Salam, H Abdelkader, AA Mohamed
IEEE Access 8, 51841-51852, 2019
382019
Image encryption based on new one-dimensional chaotic map
NF Elabady, HM Abdalkader, MI Moussa, SF Sabbeh
2014 international conference on engineering and technology (ICET), 1-6, 2014
382014
Artificial immune clonal selection classification algorithms for classifying malware and benign processes using API call sequences
KA Al-Sheshtawi, HM Abdul-Kader, NA Ismail
International Journal of Computer Science and Network Security 10 (4), 31-39, 2010
332010
Randomness testing of modern encryption techniques in cloud environment
EM Mohamed, S El-Etriby, HS Abdul-Kader
2012 8th International Conference on Informatics and Systems (INFOS), CC-1-CC-6, 2012
322012
Discrete wavelet transform-based freezing of gait detection in Parkinson’s disease
A El-Attar, AS Ashour, N Dey, H Abdelkader, MM Abd El-Naby, ...
Journal of Experimental & Theoretical Artificial Intelligence 33 (4), 543-559, 2021
312021
Protecting online social networks profiles by hiding sensitive data attributes
H AbdulKader, E ElAbd, W Ead
Procedia Computer Science 82, 20-27, 2016
312016
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20