Prof. Dr. Saad M. Darwish
Prof. Dr. Saad M. Darwish
Professor of Computer Science and Informatics
Geverifieerd e-mailadres voor alexu.edu.eg - Homepage
Geciteerd door
Geciteerd door
Multi‐level fuzzy contourlet‐based image fusion for medical applications
SM Darwish
IET Image processing 7 (7), 694-700, 2013
Bio-inspired machine learning mechanism for detecting malicious URL through passive DNS in big data platform
SM Darwish, AE Anber, S Mesbah
Machine Learning and Big Data Analytics Paradigms: Analysis, Applications …, 2021
Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection
OA Hassen, SO Abter, AA Abdulhussein, SM Darwish, YM Ibrahim, ...
Computers, Materials & Continua 68 (1), 962-981, 2021
A methodology to improve cash demand forecasting for ATM network
SM Darwish
International journal of Computer and electrical engineering 5 (4), 405-409, 2013
Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking
SM Darwish, LDS Al-Khafaji
Multimedia Tools and Applications 79 (9-10), 6503-6530, 2020
Parameter Estimation for Chaotic Systems Using the Fruit Fly Optimization Algorithm
SM Darwish, AA Elmasry, AH Ibrahim
Advances in Intelligent Systems and Computing 921, 1-8, 2019
A Meta-Heuristic Automatic CNN Architecture Design Approach based on Ensemble Learning
AA Ahmed, SM Darwish
IEEE Access 9 (2), 16975 - 16987, 2021
Combining firefly algorithm and Bayesian classifier: new direction for automatic multilabel image annotation
SM Darwish
IET Image Processing 10 (10), 763-772, 2016
Design of adaptive biometric gait recognition algorithm with free walking directions
SM Darwish
IET Biometrics 6 (2), 53-60, 2017
Stealthy code obfuscation technique for software security
SM Darwish, SK Guirguis, MS Zalat
The 2010 International Conference on Computer Engineering & Systems, 93-99, 2010
A model to authenticate requests for online banking transactions
SM Darwish, AM Hassan
Alexandria Engineering Journal 51 (3), 185-191, 2012
Design of a Robust and Secure Digital Signature Scheme for Image Authentication over Wireless Channels
SM Saad
IET Information Security 3 (1), 1-8, 2009
A robust and secure scheme for image transmission over wireless channels
MA El-Iskandarani, S Darwish, SM Abuguba
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks
MM Madbouly, SM Darwish, R Essameldin
IET software 14 (3), 300-307, 2020
Empowering vehicle tracking in a cluttered environment with adaptive cellular automata suitable to intelligent transportation systems
SM Darwish
IET Intelligent Transport Systems 11 (2), 84-91, 2017
Interval type-2 fuzzy logic to the treatment of uncertainty in 2d face recognition systems
SM Darwish, AH Mohammed
International Journal of Machine Learning and Computing 4 (1), 24-30, 2014
Soft computing applied to the build of textile defects inspection system
SM Darwish
IET Computer Vision 7 (5), 373-381, 2013
Combination of 2D chaotic encryption and turbo coding for secure image transmission
MA El-Iskandarani, SM Darwish, SM Abuguba
International Journal of Computer Science and Network Security 10 (11), 179, 2010
QIACO: A Quantum Dynamic Cost Ant System for Query Optimization in Distributed Database
SA Mohsin, SM Darwish, A Younes
IEEE Access 9 (1), 15833-15846, 2021
Machine learning approach to detect intruders in database based on hexplet data structure
SM Darwish
Journal of Electrical Systems and Information Technology 3 (2), 261-269, 2016
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20