Prof. Dr. Saad M. Darwish
Prof. Dr. Saad M. Darwish
Professor of Computer Science and Informatics
Verified email at - Homepage
Cited by
Cited by
Multi‐level fuzzy contourlet‐based image fusion for medical applications
SM Darwish
IET Image processing 7 (7), 694-700, 2013
A methodology to improve cash demand forecasting for ATM network
SM Darwish
International journal of Computer and electrical engineering 5 (4), 405-409, 2013
Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection
OA Hassen, SO Abter, AA Abdulhussein, SM Darwish, YM Ibrahim, ...
Computers, Materials & Continua 68 (1), 962-981, 2021
Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking
SM Darwish, LDS Al-Khafaji
Multimedia Tools and Applications 79 (9), 6503-6530, 2020
A bio-inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking
SM Darwish
Journal of Ambient Intelligence and Humanized Computing 11 (6), 4873–4887, 2020
A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding
SM Darwish
Multimedia Tools and Applications 78 (14), 19229-19252, 2019
Combining firefly algorithm and Bayesian classifier: new direction for automatic multilabel image annotation
SM Darwish
IET Image Processing 10 (10), 763-772, 2016
A model to authenticate requests for online banking transactions
SM Darwish, AM Hassan
Alexandria Engineering Journal 51 (3), 185-191, 2012
Design of adaptive biometric gait recognition algorithm with free walking directions
SM Darwish
IET Biometrics 6 (2), 53-60, 2017
Stealthy code obfuscation technique for software security
SM Darwish, SK Guirguis, MS Zalat
The 2010 International Conference on Computer Engineering & Systems, 93-99, 2010
A Meta-Heuristic Automatic CNN Architecture Design Approach based on Ensemble Learning
AA Ahmed, SM Darwish
IEEE Access 9 (2), 16975 - 16987, 2021
Design of a Robust and Secure Digital Signature Scheme for Image Authentication over Wireless Channels
SM Saad
IET Information Security 3 (1), 1-8, 2009
Machine learning approach to detect intruders in database based on hexplet data structure
SM Darwish
Journal of Electrical Systems and Information Technology 3 (2), 261-269, 2016
Empowering vehicle tracking in a cluttered environment with adaptive cellular automata suitable to intelligent transportation systems
SM Darwish
IET Intelligent Transport Systems 11 (2), 84-91, 2017
Soft computing applied to the build of textile defects inspection system
SM Darwish
IET Computer Vision 7 (5), 373-381, 2013
Combination of 2D chaotic encryption and turbo coding for secure image transmission
MA El-Iskandarani, SM Darwish, SM Abuguba
International Journal of Computer Science and Network Security 10 (11), 179, 2010
A robust and secure scheme for image transmission over wireless channels
MA El-Iskandarani, S Darwish, SM Abuguba
2008 42nd Annual IEEE International Carnahan Conference on Security …, 2008
Interval type-2 fuzzy logic to the treatment of uncertainty in 2d face recognition systems
SM Darwish, AH Mohammed
International Journal of Machine Learning and Computing 4 (1), 24-30, 2014
QIACO: A Quantum Dynamic Cost Ant System for Query Optimization in Distributed Database
SA Mohsin, SM Darwish, A Younes
IEEE Access 9 (1), 15833-15846, 2021
Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks
MM Madbouly, SM Darwish, R Essameldin
IET software 14 (3), 300-307, 2020
The system can't perform the operation now. Try again later.
Articles 1–20