scispace - formally typeset
Search or ask a question
Author

Rabab Farouk Abdel-Kader

Bio: Rabab Farouk Abdel-Kader is an academic researcher from Port Said University. The author has contributed to research in topics: Fuzzy control system & Fuzzy logic. The author has an hindex of 6, co-authored 13 publications receiving 145 citations. Previous affiliations of Rabab Farouk Abdel-Kader include Suez Canal University & Auburn University.

Papers
More filters
Journal ArticleDOI
TL;DR: A new scheduling algorithm called Energy Aware DAG Scheduling (EADAGS) on heterogeneous processors that can run on discrete operating voltages that combines dynamic voltage scaling (DVS) with Decisive Path Scheduled (DPS) to achieve the twin objectives of minimizing finish time and energy consumption.
Abstract: We address the problem of scheduling directed a-cyclic task graph (DAG) on a heterogeneous distributed processor system with the twin objectives of minimizing finish time and energy consumption. Previous scheduling heuristics have assigned DAGs to processors to minimize overall run-time of the application. But applications on embedded systems, such as high performance DSP in image processing, multimedia, and wireless security, need schedules which use low energy too. We develop a new scheduling algorithm called Energy Aware DAG Scheduling (EADAGS) on heterogeneous processors that can run on discrete operating voltages. Such processors can scale down their voltages and slow down to reduce energy whenever they idle due to task dependencies. EADAGS combines dynamic voltage scaling (DVS) with Decisive Path Scheduling (DPS) to achieve the twin objectives. Using simulations we show average energy consumption reduction over DPS by 40%. Energy savings increased with increasing number of nodes or increasing Communication to Computation Ratios and decreased with increasing parallelism or increasing number of available processors. These results were based on a software simulation study over a large set of randomly generated graphs as well as graphs for real-world problems with various characteristics.

78 citations

Journal ArticleDOI
01 Apr 2015-Optik
TL;DR: Simulation results show that the proposed method preserves the image brightness more precisely and enhances it with relatively negligible visual artifacts, and outperforms the conventional image equalization such as GHE and local histogram equalization (LHE), as well as the SVD techniques that based on scaling its singular value both qualitatively and quantitatively.
Abstract: This paper proposes a modification of the low contrast enhancement techniques that are based on the singular value decomposition (SVD) for preserving the mean brightness of a given image. Although the SVD-based techniques enhance the low contrast images by scaling its singular value matrix, they may fail to produce satisfactory results for some low contrast images. With the proposed method, the weighted sum of singular matrices of the input image and its global histogram equalization (GHE) image is calculated to obtain the singular value matrix of the equalized image. Simulation results show that the proposed method preserves the image brightness more precisely and enhances it with relatively negligible visual artifacts. It outperforms the conventional image equalization such as GHE and local histogram equalization (LHE), as well as the SVD techniques that based on scaling its singular value both qualitatively and quantitatively.

38 citations

Journal ArticleDOI
TL;DR: A two-factor authentication scheme one-time password is proposed which overcomes the weaknesses in the existing authentication schemes and achieves high-security level by introducing different security processes with different stages.
Abstract: Cloud computing environment requires secure access for data from the cloud server, small execution time, and low time complexity. Existing traditional cryptography algorithms are not suitable for cloud storage. In this paper, an efficient two-stage cryptography scheme is proposed to access and store data into cloud safely. It comprises both user authentication and encryption processes. First, a two-factor authentication scheme one-time password is proposed. It overcomes the weaknesses in the existing authentication schemes. The proposed authentication method does not require specific extra hardware or additional processing time to identity the user. Second, the plaintext is divided into two parts which are encrypted separately using a unique key for each. This division increases the security of the proposed scheme and in addition decreases the encryption time. The keys are generated using logistic chaos model theory. Chaos equation generates different values of keys which are very sensitive to initial condition and control parameter values entered by the user. This scheme achieves high-security level by introducing different security processes with different stages. The simulation results demonstrate that the proposed scheme reduces the size of the ciphertext and both encryption and decryption times than competing schemes without adding any complexity.

13 citations

Proceedings ArticleDOI
TL;DR: In this article, a fuzzy logic window function based memristor model is proposed to capture the pinched hysteresis behavior of the memristors, which avoids common problems associated with window-function based models, such as the terminal state problem and the symmetry issues.
Abstract: Memristor (memory-resistor) is the fourth passive circuit element. We introduce a memristor model based on a fuzzy logic window function. Fuzzy models are flexible, which enables the capture of the pinched hysteresis behavior of the memristor. The introduced fuzzy model avoids common problems associated with window-function based memristor models, such as the terminal state problem, and the symmetry issues. The model captures the memristor behavior with a simple rule-base which gives an insight of how memristors work. Because of the flexibility offered by the fuzzy system, shape and distribution of input and output membership functions can be tuned to capture the behavior of various real memristors.

10 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper makes a comprehensive survey of workflow scheduling in cloud environment in a problem–solution manner and conducts taxonomy and comparative review on workflow scheduling algorithms.
Abstract: To program in distributed computing environments such as grids and clouds, workflow is adopted as an attractive paradigm for its powerful ability in expressing a wide range of applications, including scientific computing, multi-tier Web, and big data processing applications. With the development of cloud technology and extensive deployment of cloud platform, the problem of workflow scheduling in cloud becomes an important research topic. The challenges of the problem lie in: NP-hard nature of task-resource mapping; diverse QoS requirements; on-demand resource provisioning; performance fluctuation and failure handling; hybrid resource scheduling; data storage and transmission optimization. Consequently, a number of studies, focusing on different aspects, emerged in the literature. In this paper, we firstly conduct taxonomy and comparative review on workflow scheduling algorithms. Then, we make a comprehensive survey of workflow scheduling in cloud environment in a problem---solution manner. Based on the analysis, we also highlight some research directions for future investigation.

206 citations

Journal ArticleDOI
TL;DR: The experimental results demonstrate that the Re-Stream has the ability to improve energy efficiency of a big data stream computing system, and to reduce average response time.
Abstract: To achieve high energy efficiency and low response time in big data stream computing environments, it is required to model an energy-efficient resource scheduling and optimization framework. In this paper, we propose a real-time and energy-efficient resource scheduling and optimization framework, termed the Re-Stream. Firstly, the Re-Stream profiles a mathematical relationship among energy consumption, response time, and resource utilization, and obtains the conditions to meet high energy efficiency and low response time. Secondly, a data stream graph is modeled by using the distributed stream computing theories, which identifies the critical path within the data stream graph. Such a methodology aids in calculating the energy consumption of a resource allocation scheme for a data stream graph at a given data stream speed. Thirdly, the Re-Stream allocates tasks by utilizing an energy-efficient heuristic and a critical path scheduling mechanism subject to the architectural requirements. This is done to optimize the scheduling mechanism online by reallocating the critical vertices on the critical path of a data stream graph to minimize the response time and system fluctuations. Moreover, the Re-Stream consolidates the non-critical vertices on the non-critical path so as to improve energy efficiency. We evaluate the Re-Stream to measure energy efficiency and response time for big data stream computing environments. The experimental results demonstrate that the Re-Stream has the ability to improve energy efficiency of a big data stream computing system, and to reduce average response time. The Re-Stream provides an elegant trade-off between increased energy efficiency and decreased response time effectively within big data stream computing environments.

90 citations

Journal ArticleDOI
TL;DR: This article analyses the characteristics of various workflow scheduling techniques and classifies them based on their objectives and execution model and discusses workflow scheduling in the context of these emerging trends of cloud computing.
Abstract: Workflow scheduling is one of the challenging issues in emerging trends of the distributed environment that focuses on satisfying various quality of service (QoS) constraints. The cloud receives the applications as a form of a workflow, consisting of a set of interdependent tasks, to solve the large-scale scientific or enterprise problems. Workflow scheduling in the cloud environment has been studied extensively over the years, and this article provides a comprehensive review of the approaches. This article analyses the characteristics of various workflow scheduling techniques and classifies them based on their objectives and execution model. In addition, the recent technological developments and paradigms such as serverless computing and Fog computing are creating new requirements/opportunities for workflow scheduling in a distributed environment. The serverless infrastructures are mainly designed for processing background tasks such as Internet-of-Things (IoT), web applications, or event-driven applications. To address the ever-increasing demands of resources and to overcome the drawbacks of the cloud-centric IoT, the Fog computing paradigm has been developed. This article also discusses workflow scheduling in the context of these emerging trends of cloud computing.

80 citations

Journal ArticleDOI
01 Dec 2013
TL;DR: This work introduces a new formulation of the scheduling problem for multicore heterogeneous computational Grid systems in which the minimization of the energy consumption, along with the makespan metric, is considered.
Abstract: We address a multicriteria non-preemptive energy-aware scheduling problem for computational Grid systems. This work introduces a new formulation of the scheduling problem for multicore heterogeneous computational Grid systems in which the minimization of the energy consumption, along with the makespan metric, is considered. We adopt a two-level model, in which a meta-broker agent (level 1) receives all user tasks and schedules them on the available resources, belonging to different local providers (level 2). The computing capacity and energy consumption of resources are taken from real multi-core processors from the main current vendors. Twenty novel list scheduling methods for the problem are proposed, and a comparative analysis of all of them over a large set of problem instances is presented. Additionally, a scalability study is performed in order to analyze the contribution of the best new bi-objective list scheduling heuristics when the problem dimension grows. We conclude after the experimental analysis that accurate trade-off schedules are computed by using the new proposed methods.

80 citations

Journal ArticleDOI
TL;DR: In this study, an energy-aware method is introduced by using the Dynamic Voltage and Frequency Scaling (DVFS) technique to reduce energy consumption and a hybrid Invasive Weed Optimization and Culture (IWO-CA) evolutionary algorithm is applied.
Abstract: In recent years, large computational problems have beensolved by the distributed environment in which applications are executed in parallel. Also, lately, fog computing or edge computing as a new environment is applied to collect data from the devices and preprocessing is done before sending for main processing in cloud computing. Since one of the crucial issues in such systems is task scheduling, this issue is addressed by considering reducing energy consumption. In this study, an energy-aware method is introduced by using the Dynamic Voltage and Frequency Scaling (DVFS) technique to reduce energy consumption. In addition, in order to construct valid task sequences, a hybrid Invasive Weed Optimization and Culture (IWO-CA) evolutionary algorithm is applied. The experimental results revealed that the proposed algorithm improves some current algorithms in terms of energy consumption.

71 citations