Follow
Prof. Dr. Saad M. Darwish
Prof. Dr. Saad M. Darwish
Professor of Computer Science and Informatics
Verified email at alexu.edu.eg - Homepage
Title
Cited by
Cited by
Year
Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection
OA Hassen, SO Abter, AA Abdulhussein, SM Darwish, YM Ibrahim, ...
Computers, Materials & Continua 68 (1), 962-981, 2021
70*2021
Bio-inspired machine learning mechanism for detecting malicious URL through passive DNS in big data platform
SM Darwish, AE Anber, S Mesbah
Machine Learning and Big Data Analytics Paradigms: Analysis, Applications …, 2021
68*2021
Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking
SM Darwish, LDS Al-Khafaji
Multimedia Tools and Applications 79 (9), 6503-6530, 2020
56*2020
Parameter Estimation for Chaotic Systems Using the Fruit Fly Optimization Algorithm
SM Darwish, AA Elmasry, AH Ibrahim
Advances in Intelligent Systems and Computing 921, 1-8, 2019
50*2019
A Meta-Heuristic Automatic CNN Architecture Design Approach based on Ensemble Learning
AA Ahmed, SM Darwish
IEEE Access 9 (2), 16975 - 16987, 2021
49*2021
Multi‐level fuzzy contourlet‐based image fusion for medical applications
SM Darwish
IET Image processing 7 (7), 694-700, 2013
482013
A methodology to improve cash demand forecasting for ATM network
SM Darwish
International journal of Computer and electrical engineering 5 (4), 405-409, 2013
442013
Towards designing a trusted routing scheme in wireless sensor networks: A new deep blockchain approach
IA Abd El-Moghith, SM Darwish
IEEE Access 9, 103822-103834, 2021
39*2021
QIACO: A Quantum Dynamic Cost Ant System for Query Optimization in Distributed Database
SA Mohsin, SM Darwish, A Younes
IEEE Access 9 (1), 15833-15846, 2021
30*2021
Automated essay evaluation based on fusion of fuzzy ontology and latent semantic analysis
SM Darwish, SK Mohamed
The International Conference on Advanced Machine Learning Technologies and …, 2020
29*2020
Stealthy code obfuscation technique for software security
SM Darwish, SK Guirguis, MS Zalat
The 2010 International Conference on Computer Engineering & Systems, 93-99, 2010
292010
Privacy preserving data mining framework for negative association rules: An application to healthcare informatics
SM Darwish, RM Essa, MA Osman, AA Ismail
IEEE Access 10, 76268-76280, 2022
28*2022
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network
O A Hassen, A A Abdulhussein, S M Darwish, ZA Othman, S Tiun, ...
Symmetry 12 (10), 1-18, 2020
27*2020
A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain
M Ali, A Ismail, H Elgohary, S Darwish, S Mesbah
Symmetry 14 (2), pp.1-17, 2022
26*2022
Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks
MM Madbouly, SM Darwish, R Essameldin
IET software 14 (3), 300-307, 2020
24*2020
Combining firefly algorithm and Bayesian classifier: new direction for automatic multilabel image annotation
SM Darwish
IET Image Processing 10 (10), 763-772, 2016
242016
An Enhanced Blockchain-based IoT Digital Forensics Architecture using Fuzzy Hash
WA Mahrous, M Farouk, SM Darwish
IEEE Access 9 (11), 151327-151336, 2021
232021
Reverse Logistics Solution in e-Supply Chain Management by Blockchain Technology.
M Farouk, SM Darwish
Egyptian Computer Science Journal 44 (1), 2020
232020
A model to authenticate requests for online banking transactions
SM Darwish, AM Hassan
Alexandria Engineering Journal 51 (3), 185-191, 2012
232012
Predicting Stock Market Trends for Japanese Candlestick Using Cloud Model
MM Madbouly, M Elkholy, YM Gharib, SM Darwish
The International Conference on Artificial Intelligence and Computer Vision …, 2020
22*2020
The system can't perform the operation now. Try again later.
Articles 1–20