Bio-inspired machine learning mechanism for detecting malicious URL through passive DNS in big data platform SM Darwish, AE Anber, S Mesbah Machine Learning and Big Data Analytics Paradigms: Analysis, Applications …, 2021 | 82* | 2021 |
Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection OA Hassen, SO Abter, AA Abdulhussein, SM Darwish, YM Ibrahim, ... Computers, Materials & Continua 68 (1), 962-981, 2021 | 81* | 2021 |
Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking SM Darwish, LDS Al-Khafaji Multimedia Tools and Applications 79 (9), 6503-6530, 2020 | 71* | 2020 |
Parameter Estimation for Chaotic Systems Using the Fruit Fly Optimization Algorithm SM Darwish, AA Elmasry, AH Ibrahim Advances in Intelligent Systems and Computing 921, 1-8, 2019 | 55* | 2019 |
A Meta-Heuristic Automatic CNN Architecture Design Approach based on Ensemble Learning AA Ahmed, SM Darwish IEEE Access 9 (2), 16975 - 16987, 2021 | 52* | 2021 |
Towards designing a trusted routing scheme in wireless sensor networks: A new deep blockchain approach IA Abd El-moghith, SM Darwish IEEE Access 9, 103822-103834, 2021 | 47* | 2021 |
Multi‐level fuzzy contourlet‐based image fusion for medical applications SM Darwish IET Image processing 7 (7), 694-700, 2013 | 47 | 2013 |
A methodology to improve cash demand forecasting for ATM network SM Darwish International journal of Computer and electrical engineering 5 (4), 405-409, 2013 | 44 | 2013 |
A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain M Ali, A Ismail, H Elgohary, S Darwish, S Mesbah Symmetry 14 (2), pp.1-17, 2022 | 41* | 2022 |
An Enhanced Blockchain-based IoT Digital Forensics Architecture using Fuzzy Hash WA Mahrous, M Farouk, SM Darwish IEEE Access 9 (11), 151327-151336, 2021 | 34 | 2021 |
QIACO: A Quantum Dynamic Cost Ant System for Query Optimization in Distributed Database SA Mohsin, SM Darwish, A Younes IEEE Access 9 (1), 15833-15846, 2021 | 33* | 2021 |
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network O A Hassen, A A Abdulhussein, S M Darwish, ZA Othman, S Tiun, ... Symmetry 12 (10), 1-18, 2020 | 33* | 2020 |
Automated essay evaluation based on fusion of fuzzy ontology and latent semantic analysis SM Darwish, SK Mohamed The International Conference on Advanced Machine Learning Technologies and …, 2020 | 33* | 2020 |
Privacy preserving data mining framework for negative association rules: An application to healthcare informatics SM Darwish, RM Essa, MA Osman, AA Ismail IEEE Access 10, 76268-76280, 2022 | 31* | 2022 |
Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks MM Madbouly, SM Darwish, R Essameldin IET software 14 (3), 300-307, 2020 | 27* | 2020 |
Predicting Stock Market Trends for Japanese Candlestick Using Cloud Model MM Madbouly, M Elkholy, YM Gharib, SM Darwish The International Conference on Artificial Intelligence and Computer Vision …, 2020 | 27* | 2020 |
Reverse Logistics Solution in e-Supply Chain Management by Blockchain Technology. M Farouk, SM Darwish Egyptian Computer Science Journal 44 (1), 2020 | 26 | 2020 |
Combining firefly algorithm and Bayesian classifier: new direction for automatic multilabel image annotation SM Darwish IET Image Processing 10 (10), 763-772, 2016 | 26 | 2016 |
Stealthy code obfuscation technique for software security SM Darwish, SK Guirguis, MS Zalat The 2010 International Conference on Computer Engineering & Systems, 93-99, 2010 | 26 | 2010 |
An Enhanced Offline Printed Arabic OCR Model based on Bio-Inspired Fuzzy Classifier SM Darwish, KO Elzoghaly IEEE Access 8 (6), 117770-117781, 2020 | 24 | 2020 |