default search action
Saad M. Darwish
Person information
- affiliation: Alexandria University, Department of Information Technology, Egypt
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j56]Bassant A. Abdelfattah, Saad M. Darwish, Saleh M. El-Kaffas:
Enhancing the Prediction of Stock Market Movement Using Neutrosophic-Logic-Based Sentiment Analysis. J. Theor. Appl. Electron. Commer. Res. 19(1): 116-134 (2024) - [j55]Ansam A. Abdulhussien, Mohammad Faidzul Nasrudin, Saad M. Darwish, Zaid Abdi Alkareem Alyasseri:
Improving arabic signature authentication with quantum inspired evolutionary feature selection. Multim. Tools Appl. 83(28): 71495-71524 (2024) - [j54]Huda H. Thabet, Saad M. Darwish, Gihan M. Ali:
Measuring the efficiency of banks using high-performance ensemble technique. Neural Comput. Appl. 36(27): 16797-16815 (2024) - 2023
- [j53]Jamal Kh-Madhloom, Zainab H. Noori, Sif K. Ebis, Oday A. Hassen, Saad M. Darwish:
An Information Security Engineering Framework for Modeling Packet Filtering Firewall Using Neutrosophic Petri Nets. Comput. 12(10): 202 (2023) - [j52]Saad M. Darwish, Ibrahim Abdullah Mhaimeed, Adel A. El-Zoghabi:
A Quantum Genetic Algorithm for Building a Semantic Textual Similarity Estimation Framework for Plagiarism Detection Applications. Entropy 25(9): 1271 (2023) - [j51]Ansam A. Abdulhussien, Mohammad Faidzul Nasrudin, Saad M. Darwish, Zaid Abdi Alkareem Alyasseri:
A Genetic Algorithm Based One Class Support Vector Machine Model for Arabic Skilled Forgery Signature Verification. J. Imaging 9(4): 79 (2023) - [j50]Ansam A. Abdulhussien, Mohammad Faidzul Nasrudin, Saad M. Darwish, Zaid Abdi Alkareem Alyasseri:
Feature selection method based on quantum inspired genetic algorithm for Arabic signature verification. J. King Saud Univ. Comput. Inf. Sci. 35(3): 141-156 (2023) - 2022
- [j49]Hany M. Elgohary, Saad M. Darwish, Saleh Mesbah El-Kaffas:
Improving Uncertainty in Chain of Custody for Image Forensics Investigation Applications. IEEE Access 10: 14669-14679 (2022) - [j48]Magda M. Madbouly, Saad M. Darwish, Noha A. Bagi, Mohamed A. Osman:
Clustering Big Data Based on Distributed Fuzzy K-Medoids: An Application to Geospatial Informatics. IEEE Access 10: 20926-20936 (2022) - [j47]Mohamed Gihan Ali, Ismail Ibrahim Gomaa, Saad Mohamed Darwish:
An Intelligent Model for Success Prediction of Initial Coin Offerings. IEEE Access 10: 58589-58602 (2022) - [j46]Reem Essameldin, Ahmed A. Ismail, Saad M. Darwish:
An Opinion Mining Approach to Handle Perspectivism and Ambiguity: Moving Toward Neutrosophic Logic. IEEE Access 10: 63314-63328 (2022) - [j45]Saad M. Darwish, Reham M. Essa, Mohamed A. Osman, Ahmed A. Ismail:
Privacy Preserving Data Mining Framework for Negative Association Rules: An Application to Healthcare Informatics. IEEE Access 10: 76268-76280 (2022) - [j44]Marwan H. Hassan, Saad M. Darwish, Saleh M. El-Kaffas:
An Efficient Deadlock Handling Model Based on Neutrosophic Logic: Case Study on Real Time Healthcare Database Systems. IEEE Access 10: 76607-76621 (2022) - [j43]Mohamed S. Zalat, Saad M. Darwish, Magda M. Madbouly:
An Adaptive Offloading Mechanism for Mobile Cloud Computing: A Niching Genetic Algorithm Perspective. IEEE Access 10: 76752-76765 (2022) - [j42]Marwan A. Hefnawy, Saad M. Darwish, Amr Elmasry:
Tuning the Evaporation Parameter in ACO MANET Routing Using a Satisfaction-Form Game-Theoretic Approach. IEEE Access 10: 98004-98012 (2022) - [j41]Mohamed Ali, Ahmed Ismail, Hany M. Elgohary, Saad M. Darwish, Saleh Mesbah:
A Procedure for Tracing Chain of Custody in Digital Image Forensics: A Paradigm Based on Grey Hash and Blockchain. Symmetry 14(2): 334 (2022) - [j40]Ali Fahem Neamah, Hussein Khudhur Ibrahim, Saad Mohamed Darwish, Oday A. Hassen:
Big Data Clustering Using Chemical Reaction Optimization Technique: A Computational Symmetry Paradigm for Location-Aware Decision Support in Geospatial Query Processing. Symmetry 14(12): 2637 (2022) - 2021
- [j39]Sayed A. Mohsin, Saad Mohamed Darwish, Ahmed Younes:
QIACO: A Quantum Dynamic Cost Ant System for Query Optimization in Distributed Database. IEEE Access 9: 15833-15846 (2021) - [j38]Amr AbdelFatah Ahmed, Saad M. Darwish:
A Meta-Heuristic Automatic CNN Architecture Design Approach Based on Ensemble Learning. IEEE Access 9: 16975-16987 (2021) - [j37]Kassem Mohammed Mostafa, Saad M. Darwish, Mohamed N. El-Derini:
Adaptive Mechanism for Discovering Internet Gateways in Wireless Networks Using Swarm Intelligence. IEEE Access 9: 47294-47302 (2021) - [j36]Ibrahim A. Abd El-Moghith, Saad M. Darwish:
Towards Designing a Trusted Routing Scheme in Wireless Sensor Networks: A New Deep Blockchain Approach. IEEE Access 9: 103822-103834 (2021) - [j35]Wael A. Mahrous, Mahmoud Farouk, Saad M. Darwish:
An Enhanced Blockchain-Based IoT Digital Forensics Architecture Using Fuzzy Hash. IEEE Access 9: 151327-151336 (2021) - [j34]Waleed F. Halawa, Saad M. Darwish, Adel A. El-Zoghabi:
Cotton Warehousing Improvement for Bale Management System Based on Neutrosophic Classifier. IEEE Access 9: 159413-159420 (2021) - [j33]Saad M. Darwish, Hany M. Elgohary:
Building an expert system for printer forensics: A new printer identification model based on niching genetic algorithm. Expert Syst. J. Knowl. Eng. 38(2) (2021) - [j32]Saad M. Darwish, Osama Farouk Hassan:
A new colour image copyright protection approach using evolution-based dual watermarking. J. Exp. Theor. Artif. Intell. 33(6): 945-967 (2021) - [j31]Saad M. Darwish, Ahmed A. J. Almajtomi:
Metaheuristic-based vector quantization approach: a new paradigm for neural network-based video compression. Multim. Tools Appl. 80(5): 7367-7396 (2021) - [j30]Saad M. Darwish:
Feature extraction of finger-vein patterns based on boosting evolutionary algorithm and its application for loT identity and access management. Multim. Tools Appl. 80(10): 14829-14851 (2021) - [j29]Sayed A. Mohsin, Ahmed Younes, Saad M. Darwish:
Dynamic Cost Ant Colony Algorithm to Optimize Query for Distributed Database Based on Quantum-Inspired Approach. Symmetry 13(1): 70 (2021) - [j28]Oday A. Hassen, Nur Azman Abu, Zaheera Zainal Abidin, Saad M. Darwish:
A New Descriptor for Smile Classification Based on Cascade Classifier in Unconstrained Scenarios. Symmetry 13(5): 805 (2021) - [j27]Magda M. Madbouly, Yasser F. Mokhtar, Saad M. Darwish:
Quantum Game Application to Recovery Problem in Mobile Database. Symmetry 13(11): 1984 (2021) - 2020
- [j26]Saad Mohamed Darwish, Khaled Osama Elzoghaly:
An Enhanced Offline Printed Arabic OCR Model Based on Bio-Inspired Fuzzy Classifier. IEEE Access 8: 117770-117781 (2020) - [j25]Oday A. Hassen, Saad M. Darwish, Nur Azman Abu, Zaheera Zainal Abidin:
Application of Cloud Model in Qualitative Forecasting for Stock Market Trends. Entropy 22(9): 991 (2020) - [j24]Murad B. Khorsheed, Qasim M. Zainel, Oday A. Hassen, Saad M. Darwish:
The Application of Fractal Transform and Entropy for Improving Fault Tolerance and Load Balancing in Grid Computing Environments. Entropy 22(12): 1410 (2020) - [j23]Magda M. Madbouly, Saad M. Darwish, Reem Essameldin:
Modified fuzzy sentiment analysis approach based on user ranking suitable for online social networks. IET Softw. 14(3): 300-307 (2020) - [j22]Saad M. Darwish:
A bio-inspired credit card fraud detection model based on user behavior analysis suitable for business management in electronic banking. J. Ambient Intell. Humaniz. Comput. 11(11): 4873-4887 (2020) - [j21]Saad M. Darwish, Layth Dhafer Shukur Al-Khafaji:
Dual Watermarking for Color Images: A New Image Copyright Protection Model based on the Fusion of Successive and Segmented Watermarking. Multim. Tools Appl. 79(9-10): 6503-6530 (2020) - [j20]Saad M. Darwish:
An intelligent credit card fraud detection approach based on semantic fusion of two classifiers. Soft Comput. 24(2): 1243-1253 (2020) - [j19]Hassan A. Khalil, Saad M. Darwish, Yasmine Mahmoud Ibrahim, Osama Farouk Hassan:
3D-MRI Brain Tumor Detection Model Using Modified Version of Level Set Segmentation Based on Dragonfly Algorithm. Symmetry 12(8): 1256 (2020) - [j18]Oday A. Hassen, Ansam A. Abdulhussein, Saad M. Darwish, Zulaiha Ali Othman, Sabrina Tiun, Yasmin A. Lotfy:
Towards a Secure Signature Scheme Based on Multimodal Biometric Technology: Application for IOT Blockchain Network. Symmetry 12(10): 1699 (2020) - 2019
- [j17]Saad M. Darwish, Tamer A. Shendi, Ahmed Younes:
Quantum-inspired genetic programming model with application to predict toxicity degree for chemical compounds. Expert Syst. J. Knowl. Eng. 36(4) (2019) - [j16]Saad Mohamed Darwish, Zainab H. Noori:
Secure image compression approach based on fusion of 3D chaotic maps and arithmetic coding. IET Signal Process. 13(3): 286-295 (2019) - [j15]Saad Mohamed Darwish:
A modified image selective encryption-compression technique based on 3D chaotic maps and arithmetic coding. Multim. Tools Appl. 78(14): 19229-19252 (2019) - 2018
- [j14]Saad M. Darwish, Adel A. El-Zoghabi, Amr G. El-Shnawy:
Proactive cache replacement technique for mobile networks based on genetic programming. IET Networks 7(6): 376-383 (2018) - [j13]Saad M. Darwish, Amr G. El-Shnawy:
An intelligent database proactive cache replacement policy for mobile communication system based on genetic programming. Int. J. Commun. Syst. 31(8) (2018) - [j12]Saad M. Darwish, Hosam A. Selim, Mohamed M. El-Sherbiny:
Distortion Free Database Watermarking System Based on Intelligent Mechanism for Content Integrity and Ownership Control. J. Comput. 13(9): 1053-1066 (2018) - 2017
- [j11]Saad M. Darwish:
Design of adaptive biometric gait recognition algorithm with free walking directions. IET Biom. 6(2): 53-60 (2017) - [j10]Saad M. Darwish:
Extension of Cellular Automata for Dynamic Vehicle Tracking. Int. J. Intell. Transp. Syst. Res. 15(3): 127-140 (2017) - 2016
- [j9]Saad Mohamed Darwish:
Improving semantic compression specification in large relational database. IET Softw. 10(4): 108-115 (2016) - [j8]Saad M. Darwish:
Combining firefly algorithm and Bayesian classifier: new direction for automatic multilabel image annotation. IET Image Process. 10(10): 763-772 (2016) - [j7]Saad M. Darwish, Magda M. Madbouly, Mohamed Ali Hassan:
From Public Polls to Tweets: Developing an Algorithm for Classifying Sentiment from Twitter Based on Computing with Words. J. Comput. 11(3): 238-246 (2016) - [j6]Saad Mohamed Darwish:
Bio-Inspired Intelligent System for Software Quality Certification. J. Softw. 11(4): 362-375 (2016) - [j5]Saad M. Darwish:
Software test quality rating: A paradigm shift in swarm computing for software certification. Knowl. Based Syst. 110: 167-175 (2016) - 2015
- [j4]Saad M. Darwish, Saleh M. El-Kaffas, Omar A. Abdulateef:
Semantic Database Compression System Based on Augmented Vector Quantization. J. Softw. 10(10): 1127-1139 (2015) - 2013
- [j3]Saad Mohamed Darwish:
Soft computing applied to the build of textile defects inspection system. IET Comput. Vis. 7(5): 373-381 (2013) - [j2]Saad M. Darwish:
Multi-level fuzzy contourlet-based image fusion for medical applications. IET Image Process. 7(7): 694-700 (2013) - 2012
- [j1]Saad M. Darwish:
New system to fingerprint extensible markup language documents using winnowing theory. IET Signal Process. 6(4): 348-357 (2012)
Conference and Workshop Papers
- 2023
- [c39]Mostafa R. Kaseb, Saad M. Darwish, Ahmed E. El-Toukhy:
HealthCare Fake News Detection: A New Approach Using Feature Selection Concept. WorldCIST (2) 2023: 285-295 - 2021
- [c38]Mohamed Ali Hassan, Saleh Mesbah, Saad M. Darwish:
An Enhanced Image Fusion Model Based on Fuzzy Transform for 3D Imaging Applications. AMLTA 2021: 184-194 - [c37]Ahmed A. Ismail, Saad M. Darwish, Aya A. Mohallel:
An Enhanced Object Tracking Algorithm Based on Augmented Reality Markup Language (ARML) for Medical Engineering. AMLTA 2021: 249-259 - [c36]Hossam Selim, Saad M. Darwish:
On the Viability of Entropy for Improving Fault Tolerance and Load Balancing in Grid Computing. AMLTA 2021: 275-285 - [c35]Ahmed M. Hassan, Saad M. Darwish:
Dynamic Distributed Clustering Approach Directed to Patient-Centric Healthcare System. AMLTA 2021: 355-365 - [c34]Ahmed A. Ismail, Saad M. Darwish:
Context-Based Zero Database Watermarking Scheme Based on Evolutionary Mechanism. AMLTA 2021: 1005-1015 - 2020
- [c33]Sayed A. Mohsin, Saad M. Darwish, Ahmed Younes:
Dynamic Cost Ant Colony Algorithm for Optimize Distributed Database Query. AICV 2020: 170-181 - [c32]Yasmine Mahmoud Ibrahim, Saad M. Darwish, Walaa M. Sheta:
Brain Tumor Segmentation in 3D-MRI Based on Artificial Bee Colony and Level Set. AICV 2020: 193-202 - [c31]Saad M. Darwish, Akmal I. Saber:
Self-adaptive Parameters Optimization for Incremental Classification in Big Data Using Swarm Intelligence. AICV 2020: 203-212 - [c30]Saad M. Darwish, Ramy D. Elsaidy, Saleh Mesbah:
A Modified Query Processing Algorithm Based on Dynamic Clustering for Big Data Applications. AICV 2020: 438-447 - [c29]Magda M. Madbouly, Mohamed Elkholy, Yasser M. Gharib, Saad M. Darwish:
Predicting Stock Market Trends for Japanese Candlestick Using Cloud Model. AICV 2020: 628-645 - [c28]Osama Farouk Hassan, Saad M. Darwish, Hassan A. Khalil:
A Context-Based Video Compression: A Quantum-Inspired Vector Quantization Approach. AISI 2020: 3-15 - [c27]Yasser F. Mokhtar, Saad M. Darwish, Magda M. Madbouly:
An Enhanced Database Recovery Model Based on Game Theory for Mobile Applications. AISI 2020: 16-25 - [c26]Mohamed S. Zalat, Saad M. Darwish, Magda M. Madbouly:
An Effective Offloading Model Based on Genetic Markov Process for Cloud Mobile Applications. AISI 2020: 38-50 - [c25]Saad M. Darwish, Osama Farouk Hassan, Khaled Osama Elzoghaly:
Arabic Offline Character Recognition Model Using Non-dominated Rank Sorting Genetic Algorithm. AISI 2020: 215-226 - [c24]Yasmin A. Lotfy, Saad M. Darwish:
A Secure Signature Scheme for IoT Blockchain Framework Based on Multimodal Biometrics. AISI 2020: 261-270 - [c23]Saad M. Darwish, Ahmed A. Ismail:
An Evolutionary Biometric Authentication Model for Finger Vein Patterns. AISI 2020: 271-281 - [c22]Ibrahim A. Abd El-Moghith, Saad M. Darwish:
A Deep Blockchain-Based Trusted Routing Scheme for Wireless Sensor Networks. AISI 2020: 282-291 - [c21]Marwan A. Hefnawy, Saad M. Darwish:
Game Theoretic Approach to Optimize Exploration Parameter in ACO MANET Routing. AISI 2020: 465-474 - [c20]Ahmed M. Hassan, Saad M. Darwish:
E-cash Payment Scheme in Near Field Communication Based on Boosted Trapdoor Hash. AISI 2020: 621-631 - [c19]Kassem Mohammed Mostafa, Saad M. Darwish:
Smart Approach for Discovering Gateways in Mobile Ad Hoc Network. AISI 2020: 793-802 - 2019
- [c18]Maha F. Hany, Bayumy A. B. Youssef, Saad M. Darwish, Osama Hosam:
Intelligent Watermarking System Based on Soft Computing. AISI 2019: 24-34 - [c17]Magda M. Madbouly, Reem Essameldin, Saad M. Darwish:
A Modified Fuzzy Sentiment Analysis Approach Based on User Ranking Suitable for Online Social Networks. AISI 2019: 340-349 - [c16]Amr AbdelFatah Ahmed, Saad M. Darwish, Mohamed M. El-Sherbiny:
A Novel Automatic CNN Architecture Design Approach Based on Genetic Algorithm. AISI 2019: 473-482 - [c15]Saad M. Darwish, Mayar M. Moawad:
An Adaptive Plagiarism Detection System Based on Semantic Concept and Hierarchical Genetic Algorithm. AISI 2019: 739-749 - [c14]Saad M. Darwish, Ahmed E. El-Toukhy, Yasser M. Omar:
Mobile Intelligent Interruption Management: A New Context-Aware Fuzzy Mining Approach. AISI 2019: 791-800 - [c13]Saad M. Darwish, Amr Elmasry, Asmaa H. Ibrahim:
Parameter Estimation for Chaotic Systems Using the Fruit Fly Optimization Algorithm. AMLTA 2019: 80-90 - [c12]Saad M. Darwish, Amr Elmasry, Shaymaa H. Ibrahim:
Optimal Shortest Path in Mobile Ad-Hoc Network Based on Fruit Fly Optimization Algorithm. AMLTA 2019: 91-101 - [c11]Saad M. Darwish, Bassem E. Abdel-Samee:
Game Theory Based Solver for Dynamic Vehicle Routing Problem. AMLTA 2019: 133-142 - [c10]Saad M. Darwish, Sherine Kh. Mohamed:
Automated Essay Evaluation Based on Fusion of Fuzzy Ontology and Latent Semantic Analysis. AMLTA 2019: 566-575 - [c9]Mona A. Abou-Of, Hassan M. Saad, Saad M. Darwish:
Smart and Incremental Model to Build Clustered Trending Topics of Web Documents. AMLTA 2019: 888-897 - [c8]M. Medhat Kamal, Saad M. Darwish, Ahmed Elfatatry:
Enhancing the Automation of GUI Testing. ICSIE 2019: 66-70 - [c7]Saad M. Darwish, Adel A. El-Zoghabi, Hany M. Elgohary:
Bio-inspired Expert System for Identifying Questioned Documents' Printer Source Suitable for Digital Forensics. ICSIE 2019: 100-104 - 2017
- [c6]Saad M. Darwish:
Man-Machine Interaction System for Subject Independent Sign Language Recognition. ICCAE 2017: 121-125 - 2016
- [c5]Saleh Mesbah El-Kaffas, Saad M. Darwish, Ahmed H. Ali:
An Intelligent XML Information Retrieval System. ICCTA 2016: 81-85 - 2015
- [c4]Saad M. Darwish, Maha M. Ghoneim:
A Novel 3D Image Fusion Approach Using FTransform. ICCTA 2015: 191-196 - 2010
- [c3]Saad M. Darwish, Mohamed M. El-Sherbiny, Amr El Shenawy:
Intelligent multi-agent system for information monitoring. ISDA 2010: 1436-1441 - [c2]Saad M. Darwish:
Intelligent copyright protection framework for irregular large 3D meshes. SoCPaR 2010: 436-441 - [c1]Saad M. Darwish:
An optimized fingerprinting system for tamper proof and copy control of XML documents. SoCPaR 2010: 454-457
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint