Dr. Sa’ed Rasmi Hasan Abed

Professor
Department of Computer Engineering, College of Engineering and Petroleum, Kuwait University, Kuwait


Highest Degree
Ph.D. in Computer Engineering from Concordia University, Montreal, Canada

Share this Profile

Biography

Sa’ed Abed received his B.Sc. and M.Sc. in Computer Engineering from Jordan University of Science and Technology in 1994 and 1996, respectively. In 2008, he received his Ph.D. in Computer Engineering from Concordia University, Canada. Currently, he is a professor at the Computer Engineering Department, Kuwait University. His research interests include Formal Methods, VLSI Design, Hardware Security

Area of Interest:

Computer Sciences
Formal Methods
VLSI Design
Hardware Implementation
Formal Hardware Verification

Selected Publications

  1. Rashid, A., S. Abed and O. Hasan, 2022. Formal analysis of 2D image processing filters using higher-order logic theorem proving. EURASIP J. Adv. Signal Process., Vol. 2022. 10.1186/s13634-022-00882-3.
    CrossRef  |  Direct Link  |  

  2. Esmaeel, A.A., S. Abed, B.J. Mohd and A.A. Fairouz, 2022. POSIT vs. floating point in implementing IIR notch filter by enhancing radix-4 modified booth multiplier. Electronics, Vol. 11. 10.3390/electronics11010163.
    CrossRef  |  Direct Link  |  

  3. Alshayeji, M.H., H. Ellethy, S. Abed and R. Gupta, 2022. Computer-aided detection of breast cancer on the Wisconsin dataset: An artificial neural networks approach. Biomed. Signal Process. Control, Vol. 71. 10.1016/j.bspc.2021.103141.
    CrossRef  |  Direct Link  |  

  4. Parvin, S., S.F. Nimmy, S. Venkatraman, S. Abed and A. Gawanmeh, 2021. A KNN Approach for Blockchain Based Electronic Health Record Analysis. In: Proceedings of the 27th International Conference on Systems Engineering, ICSEng 2020: Lecture Notes in Networks and Systems, Selvaraj, H., G. Chmaj and D. Zydek (Eds.), Springer International Publishing, Cham, ISBN: 978-3-030-65795-6, pp: 455-464.
    CrossRef  |  Direct Link  |  

  5. Mohd, B.J., S. Abed, T. Hayajneh and M.H. Alshayeji, 2021. Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection. IEEE Trans. Dependable Secure Comput., 18: 2689-2704.
    CrossRef  |  Direct Link  |  

  6. Minhas, M.F., O. Hasan and S. Abed, 2021. HVoC: A hybrid model checking - interactive theorem proving approach for functional verification of digital circuits. J. Electron. Test., 37: 561-567.
    CrossRef  |  Direct Link  |  

  7. Faisal, M. and S. Abed, 2021. Cluster-based antiphishing (CAP) model for smart phones. Sci. Program., Vol. 2021. 10.1155/2021/9957323.
    CrossRef  |  Direct Link  |  

  8. Alshayeji, M., J. Al-Buloushi, A. Ashkanani and S. Abed, 2021. Enhanced brain tumor classification using an optimized multi-layered convolutional neural network architecture. Multimed. Tools Appl., 80: 28897-28917.
    CrossRef  |  Direct Link  |  

  9. Abed, S., R. Jaffal, B.J. Mohd and M. Alshayeji, 2021. Performance evaluation of the SM4 cipher based on field‐programmable gate array implementation. IET Circuits, Devices Syst., 15: 121-135.
    CrossRef  |  Direct Link  |  

  10. Abed, S., R. Jaffal, B.J. Mohd and M. Al-Shayeji, 2021. An analysis and evaluation of lightweight hash functions for blockchain-based IoT devices. Cluster Comput., 24: 3065-3084.
    CrossRef  |  Direct Link  |  

  11. Abed, S., L. Waleed, G. Aldamkhi and K. Hadi, 2021. Enhancement in data security and integrity using minhash technique. Indones. J. Electr. Eng. Comput. Sci., 21: 1739-1750.
    CrossRef  |  Direct Link  |  

  12. Abed, S., B.J. Mohd, T. Hayajneh and M.H. Alshayeji, 2021. Hardware Trojan detection for lightweight ciphers implemented on field-programmable gate arrays using the replay algorithm. Int. J. Circ. Theor. Appl., 49: 3607-3629.
    CrossRef  |  Direct Link  |  

  13. Abed, S., A.A. Abdelaal, M.H. Al-Shayeji and I. Ahmad, 2021. SAT-based and CP-based declarative approaches for top-rank-K closed frequent itemset mining. Int. J. Intell. Syst., 36: 112-151.
    CrossRef  |  Direct Link  |  

  14. Abdelaal, A.A., S. Abed, M. Al-Shayeji and M. Allaho, 2021. Customized frequent patterns mining algorithms for enhanced top-rank-K frequent pattern mining. Expert Syst. Appl., Vol. 169. 10.1016/j.eswa.2020.114530.
    CrossRef  |  Direct Link  |  

  15. et al, A.S., 2020. FPGA implementation of enhanced JPEG algorithm for colored images. Int. J. Comput. Digital Syst., 9: 13-22.
    CrossRef  |  Direct Link  |  

  16. Abed, S., N.H. Al-Huwais, Y.A. Atiyah, S. Parvin and A. Gawanmeh, 2020. An improved least significant bit image steganography method. 2020 Fourth International Conference on Multimedia Computing, Networking and Applications (MCNA), October 19-22, 2020, IEEE Xplore, Tunis, Tunisia, 90-96.
    CrossRef  |  Direct Link  |  

  17. Abed, S., M. AlMehteb, W. Mansoor and A. Gawanmeh, 2020. Verification of non-linear arithmetic circuits using functionally reduced and-inverter-graph (FRAIG). 2020 Global Congress on Electrical Engineering (GC-ElecEng), September 4-6 2020, IEEE Xplore, Tunis, Tunisia, 118-123.
    CrossRef  |  Direct Link  |  

  18. Abed, S., A.A.M.R. Behiry and I. Ahmad, 2020. Error metrics determination in functionally approximated circuits using sat solvers. PLoS ONE, 10.1371/journal.pone.0227745.
    CrossRef  |  Direct Link  |  

  19. Abed, S., A. Rashid and O. Hasan, 2020. Formal reasoning about synthetic biology using higher-order-logic theorem proving. IET Syst. Biol., 14: 271-283.
    CrossRef  |  Direct Link  |  

  20. Abed, S., A. Rashid and O. Hasan, 2020. Formal analysis of unmanned aerial vehicles using higher-order-logic theorem proving. J. Aerosp. Inform. Syst., 17: 481-495.
    CrossRef  |  Direct Link  |  

  21. Abed, S., A. Rashid and O. Hasan, 2020. Formal analysis of the biological circuits using higher-order-logic theorem proving. SAC ’20: Proceedings of the 35th Annual ACM Symposium on Applied Computing, March, 2020, ACM Digital Library, pp: 3-7.
    CrossRef  |  Direct Link  |  

  22. Abed, S., A. Ashkanan, W. Mansoor and A. Gawanmeh, 2020. Enhanced sat solvers based hashing method for bitcoin mining. Adv. Intell. Syst. Comput., 1134: 191-198.
    CrossRef  |  Direct Link  |  

  23. Abed, S., 2020. Reducing write latency by integrating advanced preset technique and two-stage-write with inversion schemes. J. Comput., 15: 22-36.
    CrossRef  |  Direct Link  |  

  24. Abed, S., 2020. Implementation of edge detection algorithm using FPGA reconfigurable hardware. J. Eng. Res., 10.36909/jer.v8i1.7956.
    CrossRef  |  Direct Link  |  

  25. Abed, S., S.A. Al-Roomi and M. Al-Shayeji, 2019. Efficient cover image selection based on spatial block analysis and DCT embedding. EURASIP J. Image Video Process., 10.1186/s13640-019-0486-8.
    CrossRef  |  Direct Link  |  

  26. Abed, S., R. Jaffal, B. Mohd and M. Alshayeji, 2019. FPGA modeling and optimization of a SIMON lightweight block cipher. Sensors, 10.3390/s19040913.
    CrossRef  |  Direct Link  |  

  27. Abed, S., M. Alshayeji and S. Sultan, 2019. Diacritics effect on Arabic speech recognition. Arabian J. Sci. Eng., 44: 9043-9056.
    CrossRef  |  Direct Link  |  

  28. Abed, S., M. AlKandari, H. AlRasheedi and I. Ahmad, 2019. Enhanced JPEG algorithm for colored images based on FPGA implementation. 2019 8th International Conference on Modeling Simulation and Applied Optimization (ICMSAO), April 15-17, 2019, IEEE Xplore, Tunis, Tunisia, pp: 1-5.
    CrossRef  |  Direct Link  |  

  29. Abed, S., M. Al-Shayeji and F. Ebrahim, 2019. A secure and energy-efficient platform for the integration of wireless sensor networks and mobile cloud computing. Comput. Networks, 10.1016/j.comnet.2019.106956.
    CrossRef  |  Direct Link  |  

  30. Abed, S., M. Al-Mutairi, A. Al-Watyan, O. Al-Mutairi, W. AlEnizy and A. Al-Noori, 2019. An automated security approach of video steganography-based ISB using FPGA implementation. J. Circuits, Syst. Comput., 10.1142/s021812661950083x.
    CrossRef  |  Direct Link  |  

  31. Abed, S., B.J. Mohd and M.H.A. Shayeji, 2019. Implementation of speech feature extraction for low-resource devices. IET Circuits, Devices Syst., 13: 863-872.
    CrossRef  |  Direct Link  |  

  32. Alouneh, S., S. Abed, M.H.A. Shayeji and R. Mesleh, 2018. A comprehensive study and analysis on sat-solvers: advances, usages and achievements. Artif. Intell. Rev., 52: 2575-2601.
    CrossRef  |  Direct Link  |  

  33. Abed, S.E., A.H. Bqerat, A. Al-Khasawneh, A. Alsarhan and I. Obeidat, 2015. Towards improving the performance of distributed virtual memory based reversal cache approach. Int. J. Comput. Appl. Technol., 51: 247-256.
    Direct Link  |  

  34. Mohd, B.J., T. Hayajneh, S.E. Abed and A. Itradat, 2014. Analysis and modeling of FPGA implementations of spatial steganography methods. J. Circuits, Syst. Comput., .

  35. Alouneh, S., S.E. Abed, M. Kharbutli and B.J. Mohd, 2014. MPLS technology in wireless networks. Wireless networks, 20: 1037-1051.
    Direct Link  |  

  36. Alouneh, S., S.E. Abed, B.J. Mohda and A. Al-Khasawneh, 2014. Software comprehension based on database relational algebra. Int. J. Inf. Commun. Technol., 6: 58-70.

  37. Mohd B. J., S. Abed, B. Na`ami, T.Hayajneh, 2013. Hierarchical steganography using novel optimum quantization technique. Signal, Image and Video Process., 7: 1029-1040.
    CrossRef  |  Direct Link  |  

  38. Alouneh, S., S.E. Abed, B.J. Mohd and M. Kharbutli, 2013. An efficient backup technique for database systems based on threshold sharing. J. Comput., 8: 2980-2989.
    Direct Link  |  

  39. Abed, S.E., A. Al-Khasawneh and S. Alouneh, 2013. Synthesizing a heart rate analyzer chip QRS. Int. J. Adv. Comput. Technol., 5: 126-137.
    Direct Link  |  

  40. Abed S.,O. A. Mohamed nd G.A. Sammane 2013. Automatic verification of reduction. techniques in Higher Order Logic. Formal Aspects Comput., 25: 971-991.
    CrossRef  |  Direct Link  |  

  41. Hoque,K. A.,O.Ai.Mohamed, S. Abed and M.Boukadoum, 2012. MDG-SAT:An automated methodology for efficient safety checking. Int.l J.Critical Compu.Based Sys., 3: 4-25.
    CrossRef  |  Direct Link  |  

  42. Abed,S., A.Hasan Bqerat, S.Alouneh and B.J.Mohd, 2012. A novel approach to enhance distributed virtual memory. Comput.Elect.Eng., 38: 388-398.
    CrossRef  |  Direct Link  |  

  43. Abed S.,M.B. Jamil,Z. Al-bayati and S.Alouneh 2012. Low power Wallace multiplier design based on wide counters. Int. J. Circuit Theory Appl., 40: 1175-1185.
    CrossRef  |  Direct Link  |  

  44. Mohd,B.J., S.Abed, S.Alouneh, 2012. Carry-based reduction parallel counter design. Int.J.Electr., 100: 1-19.
    CrossRef  |  Direct Link  |  

  45. Ahmed Asif I.,S. H.Rahman,O.A.Mohamed and S.Abed, 2012. Towards an FPGA implementation and performance evaluation of a digital carrier synchronizer with a portable emulation environment. Int. J. Comput. Appli.Techn., 45: 66-76.
    CrossRef  |  Direct Link  |  

  46. Abed,S., K. Hussain and O.Ait Mohamed, 2012. Abstract property language for MDG model checking methodology Int.J.Comput. Appl. Techn., 44: 23-36.
    CrossRef  |  Direct Link  |  

  47. Abed, S., Y. Mokhtari, O.A. Mohamed and S. Tahar, 2011. NuMDG: A new tool for multiway decision graphs construction. J. Comput. Sci. Technol., 26: 139-152.
    CrossRef  |  Direct Link  |  

  48. Abed,S.,O.A.Mohamed and G.A.Sammaneh, 2009. An abstract reachability approach by combining hol induction and multiway decision graphs. J.Comp.r Sci.Techn., 24: 79-95.
    CrossRef  |  Direct Link  |  

  49. Abed, S. and O.A. Mohamed, 2009. LCF-style platform based on multiway decision graphs. Electron. Notes Theor. Comput. Sci., 246: 3-26.
    CrossRef  |  

  50. Abed,S.,O.A.Mohamed and G. A.Sammane., 2007. On the integration of decision diagrams in high order logic based theorem provers: a survey. J.Comp. Sci., 3: 810-817.
    CrossRef  |  Direct Link  |  

  51. Ibbini,Mohammad S and S.R. Alawneh 1998. Closed-loop control system robustness improvement by a parameterised state feedback. IEE Proc. Control Theory Appl., 145: 33-40.
    CrossRef  |  Direct Link  |