Nature-Inspired Level Set Segmentation Model for 3D-MRI Brain Tumor Detection OA Hassen, SO Abter, AA Abdulhussein, SM Darwish, YM Ibrahim, ... Computers, Materials & Continua 68 (1), 962-981, 2021 | 69* | 2021 |
Bio-inspired machine learning mechanism for detecting malicious URL through passive DNS in big data platform SM Darwish, AE Anber, S Mesbah Machine Learning and Big Data Analytics Paradigms: Analysis, Applications …, 2021 | 59* | 2021 |
Dual watermarking for color images: a new image copyright protection model based on the fusion of successive and segmented watermarking SM Darwish, LDS Al-Khafaji Multimedia Tools and Applications 79 (9), 6503-6530, 2020 | 52* | 2020 |
Parameter Estimation for Chaotic Systems Using the Fruit Fly Optimization Algorithm SM Darwish, AA Elmasry, AH Ibrahim Advances in Intelligent Systems and Computing 921, 1-8, 2019 | 50* | 2019 |
Multi‐level fuzzy contourlet‐based image fusion for medical applications SM Darwish IET Image processing 7 (7), 694-700, 2013 | 49 | 2013 |
A Meta-Heuristic Automatic CNN Architecture Design Approach based on Ensemble Learning AA Ahmed, SM Darwish IEEE Access 9 (2), 16975 - 16987, 2021 | 47* | 2021 |
A methodology to improve cash demand forecasting for ATM network SM Darwish International journal of Computer and electrical engineering 5 (4), 405-409, 2013 | 41 | 2013 |
Towards designing a trusted routing scheme in wireless sensor networks: A new deep blockchain approach IA Abd El-Moghith, SM Darwish IEEE Access 9, 103822-103834, 2021 | 37* | 2021 |
Stealthy code obfuscation technique for software security SM Darwish, SK Guirguis, MS Zalat The 2010 International Conference on Computer Engineering & Systems, 93-99, 2010 | 29 | 2010 |
QIACO: A Quantum Dynamic Cost Ant System for Query Optimization in Distributed Database SA Mohsin, SM Darwish, A Younes IEEE Access 9 (1), 15833-15846, 2021 | 28* | 2021 |
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network O A Hassen, A A Abdulhussein, S M Darwish, ZA Othman, S Tiun, ... Symmetry 12 (10), 1-18, 2020 | 26* | 2020 |
Privacy preserving data mining framework for negative association rules: An application to healthcare informatics SM Darwish, RM Essa, MA Osman, AA Ismail IEEE Access 10, 76268-76280, 2022 | 24* | 2022 |
Combining firefly algorithm and Bayesian classifier: new direction for automatic multilabel image annotation SM Darwish IET Image Processing 10 (10), 763-772, 2016 | 24 | 2016 |
Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks MM Madbouly, SM Darwish, R Essameldin IET software 14 (3), 300-307, 2020 | 23* | 2020 |
Predicting Stock Market Trends for Japanese Candlestick Using Cloud Model MM Madbouly, M Elkholy, YM Gharib, SM Darwish The International Conference on Artificial Intelligence and Computer Vision …, 2020 | 23* | 2020 |
Reverse Logistics Solution in e-Supply Chain Management by Blockchain Technology. M Farouk, SM Darwish Egyptian Computer Science Journal 44 (1), 2020 | 23 | 2020 |
Automated essay evaluation based on fusion of fuzzy ontology and latent semantic analysis SM Darwish, SK Mohamed The International Conference on Advanced Machine Learning Technologies and …, 2020 | 23* | 2020 |
A model to authenticate requests for online banking transactions SM Darwish, AM Hassan Alexandria Engineering Journal 51 (3), 185-191, 2012 | 22 | 2012 |
Design of adaptive biometric gait recognition algorithm with free walking directions SM Darwish IET Biometrics 6 (2), 53-60, 2017 | 21* | 2017 |
Machine learning approach to detect intruders in database based on hexplet data structure SM Darwish Journal of Electrical Systems and Information Technology 3 (2), 261-269, 2016 | 21* | 2016 |