default search action
Salwa K. Abd-El-Hafiz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Sherif H. Abdel Haleem, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan:
Analysis and Guidelines for Different Designs of Pseudo Random Number Generators. IEEE Access 12: 115697-115715 (2024) - [j10]Bishoy K. Sharobim, Muhammad Hosam, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan:
Software and hardware realizations for different designs of chaos-based secret image sharing systems. J. Real Time Image Process. 21(3): 83 (2024) - [c36]Mohamed Hosam, Sherif H. Abdel Haleem, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan:
Novel Fast Prediction Algorithm for Advanced and High Efficiency Video Coding. MOCAST 2024: 1-6 - [c35]Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan, Heba K. Aslan:
A $(k, n)$-Secret Image Sharing With Steganography Using Generalized Tent Map. MOCAST 2024: 1-6 - 2023
- [j9]Bishoy K. Sharobim, Marwan A. Fetteha, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan:
An Efficient Multi-Secret Image Sharing System Based on Chinese Remainder Theorem and Its FPGA Realization. IEEE Access 11: 9511-9520 (2023) - [c34]Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan:
Pixel-based Visual Secret Sharing Using Lorenz System. CCIOT 2023: 38-45 - [c33]Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan:
Progressive Multi-Secret Sharing of Color Images Using Lorenz Chaotic System. MOCAST 2023: 1-6 - 2022
- [c32]Marwan A. Fetteha, Wafaa S. Sayed, Lobna A. Said, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan:
Registerless Multiplierless YCoCg-R and YCoCg Color Space Converters Hardware Implementation. ICCTA 2022: 202-206 - [c31]Sherif H. Abdel Haleem, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
Blind Watermarking Using DCT and Fractional-Order Lorenz System. ICM 2022: 94-97 - [c30]Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan:
A Secured Lossless Visual Secret Sharing for Color Images Using Arnold Transform. ICM 2022: 254-257 - [c29]Sherif H. Abdel Haleem, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan:
PRNG Using Primitive Roots of Primes and its Utilization in Chess-based Image Encryption. ICAC 2022: 1-6 - [c28]Bishoy K. Sharobim, Salwa K. Abd-El-Hafiz, Wafaa S. Sayed, Lobna A. Said, Ahmed G. Radwan:
A Unified System for Encryption and Multi-Secret Image Sharing Using S-box and CRT. ICAC 2022: 1-6 - 2021
- [j8]Wafaa S. Sayed, Mohammed F. Tolba, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz, Ahmed M. Soliman:
A switched chaotic encryption scheme using multi-mode generalized modified transition map. Multim. Tools Appl. 80(4): 5373-5402 (2021)
2010 – 2019
- 2019
- [j7]Wafaa S. Sayed, Mohammed F. Tolba, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
FPGA realization of a speech encryption system based on a generalized modified chaotic transition map and bit permutation. Multim. Tools Appl. 78(12): 16097-16127 (2019) - 2018
- [c27]Mohamed F. Tolba, Wafaa S. Sayed, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz, Ahmed M. Soliman:
Permutation-Only FPGA Realization of Real-Time Speech Encryption. ICECS 2018: 93-96 - [c26]Mohammed F. Tolba, Wafaa S. Sayed, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
FPGA realization of speech encryption based on modified chaotic logistic map. ICIT 2018: 1412-1417 - [c25]Wafaa S. Sayed, Mohammed F. Tolba, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
Speech encryption using generalized modified chaotic logistic and tent maps. ICIT 2018: 1526-1531 - [c24]Wafaa S. Sayed, Mohammed F. Tolba, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz, Ahmed M. Soliman:
Security and Efficiency of Feistel Networks Versus Discrete Chaos for Lightweight Speech Encryption. ICM 2018: 92-95 - [c23]Mohammed F. Tolba, Wafaa S. Sayed, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz, Ahmed M. Soliman:
Hardware Speech Encryption Using a Chaotic Generator, Dynamic Shift and Bit Permutation. ICM 2018: 100-103 - [c22]Moheb M. R. Henein, Doaa M. Shawky, Salwa K. Abd-El-Hafiz:
Clustering-based Under-sampling for Software Defect Prediction. ICSOFT 2018: 219-227 - [c21]Mohamed F. Tolba, Wafaa S. Sayed, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
Chaos-based hardware speech encryption scheme using modified tent map and bit permutation. MOCAST 2018: 1-4 - 2017
- [j6]Wafaa S. Sayed, Moheb M. R. Henein, Salwa K. Abd-El-Hafiz, Ahmed G. Radwan:
Generalized Dynamic Switched Synchronization between Combinations of Fractional-Order Chaotic Systems. Complex. 2017: 9189120:1-9189120:17 (2017) - [c20]Doaa M. Shawky, Salwa K. Abd-El-Hafiz:
A Study of the Effect of Agile Approaches on Software Metrics Using Self-Organizing Maps. AISI 2017: 547-559 - [p1]Ahmed G. Radwan, Wafaa S. Sayed, Salwa K. Abd-El-Hafiz:
Control and Synchronization of Fractional-Order Chaotic Systems. Fractional Order Control and Synchronization of Chaotic Systems 2017: 325-355 - 2016
- [j5]Doaa M. Shawky, Salwa K. Abd-El-Hafiz:
Characterizing software development method using metrics. J. Softw. Evol. Process. 28(2): 82-96 (2016) - [c19]Mohammed A. Adly, Salwa K. Abd-El-Hafiz:
Inverse kinematics using single- and multi-objective particle swarm optimization. ICM 2016: 269-272 - 2014
- [j4]Salwa K. Abd-El-Hafiz, Ahmed Gomaa Radwan, Sherif H. Abdel Haleem, M. L. Barakat:
A fractal-based image encryption system. IET Image Process. 8(12): 742-752 (2014) - [c18]Ahmed Gomaa Radwan, Salwa K. Abd-El-Hafiz, Sherif H. Abdel Haleem:
An image encryption system based on generalized discrete maps. ICECS 2014: 283-286 - [c17]Ahmed Gomaa Radwan, Salwa K. Abd-El-Hafiz:
The effect of multi-scrolls distribution on image encryption. ICECS 2014: 435-438 - [c16]Doaa M. Shawky, Salwa K. Abd-El-Hafiz:
The Impact of Agile Approaches on Software Quality Attributes - An Empirical Study. ICSOFT PT 2014: 49-57 - [c15]Sherif H. Abdel Haleem, Ahmed Gomaa Radwan, Salwa K. Abd-El-Hafiz:
A chess-based chaotic block cipher. NEWCAS 2014: 405-408 - 2013
- [c14]Amr A. Adly, Osama A. Mahgoub, Salwa K. Abd-El-Hafiz:
Design and construction of a low cost single-phase induction motor test bench. ICECS 2013: 113-116 - [c13]Sherif H. Abdel Haleem, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
Utilizing LFSR and Feistel networks in image encryption. ICECS 2013: 601-604 - [c12]Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
Image encryption using generalized tent map. ICECS 2013: 653-656 - [c11]Sherif H. Abdel Haleem, Ahmed G. Radwan, Salwa K. Abd-El-Hafiz:
Design of pseudo random keystream generator using fractals. ICECS 2013: 877-880 - 2012
- [c10]Salwa K. Abd-El-Hafiz:
A Metrics-Based Data Mining Approach for Software Clone Detection. COMPSAC 2012: 35-41
2000 – 2009
- 2005
- [c9]Doaa M. Shawky, Salwa K. Abd-El-Hafiz, Abdel-Latif El-Sedeek:
A Dynamic Approach for the Identification of Object-oriented Design Patterns. IASTED Conf. on Software Engineering 2005: 138-143 - 2004
- [c8]Salwa K. Abd-El-Hafiz:
Studying the evolution of software through entropy metrics. IASTED Conf. on Software Engineering 2004: 632-638 - 2001
- [c7]Salwa K. Abd-El-Hafiz:
Entropies as Measures of Software Information. ICSM 2001: 110-117 - 2000
- [j3]Salwa K. Abd-El-Hafiz:
Identifying Objects in Procedural Programs Using Clustering Neural Networks. Autom. Softw. Eng. 7(3): 239-261 (2000)
1990 – 1999
- 1997
- [c6]Salwa K. Abd-El-Hafiz:
Effects of Decomposition Techniques on Knowledge-Based Program Understanding. ICSM 1997: 21- - 1996
- [j2]Victor R. Basili, Salwa K. Abd-El-Hafiz:
A method for documenting code components. J. Syst. Softw. 34(2): 89-104 (1996) - [j1]Salwa K. Abd-El-Hafiz, Victor R. Basili:
A Knowledge-Based Approach to the Analysis of Loops. IEEE Trans. Software Eng. 22(5): 339-360 (1996) - [c5]Salwa K. Abd-El-Hafiz:
Evaluation of a Knowledge-Based Approach to Program Understanding. ICSM 1996: 275- - [c4]Salwa K. Abd-El-Hafiz:
Evaluation of a Knowledge-Based Approach to Program Understanding. WCRE 1996: 259- - 1994
- [c3]Salwa K. Abd-El-Hafiz, Victor R. Basili:
A tool for assisting the understanding and formal development of software. SEKE 1994: 36-45 - 1993
- [c2]Salwa K. Abd-El-Hafiz, Victor R. Basili:
Documenting Programs Using a Library of Tree Structured Plans. ICSM 1993: 152-161 - 1991
- [c1]Salwa K. Abd-El-Hafiz, Victor R. Basili, Gianluigi Caldiera:
Towards automated support for extraction of reusable components. ICSM 1991: 212-219
Coauthor Index
aka: Ahmed G. Radwan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-18 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint