Ashraf Darwish
Cited by
Cited by
Wearable and implantable wireless sensor network solutions for healthcare monitoring
A Darwish, AE Hassanien
Sensors 11 (6), 5561-5595, 2011
Hybrid intelligent intrusion detection scheme
MA Salama, HF Eid, RA Ramadan, A Darwish, AE Hassanien
Soft computing in industrial applications, 293-303, 2011
The impact of the hybrid platform of internet of things and cloud computing on healthcare systems: opportunities, challenges, and open problems
A Darwish, AE Hassanien, M Elhoseny, AK Sangaiah, K Muhammad
Journal of Ambient Intelligence and Humanized Computing 10 (10), 4151-4166, 2019
Principle components analysis and support vector machine based intrusion detection system
FE Heba, A Darwish, AE Hassanien, A Abraham
2010 10th international conference on intelligent systems design and …, 2010
The impact of the new Web 2.0 technologies in communication, development, and revolutions of societies
A Darwish, KI Lakhtaria
Journal of advances in information technology 2 (4), 204-216, 2011
Bio-inspired computing: Algorithms review, deep analysis, and the scope of applications
A Darwish
Future Computing and Informatics Journal 3 (2), 231-246, 2018
A survey of machine learning techniques for Spam filtering
O Saad, A Darwish, R Faraj
International Journal of Computer Science and Network Security (IJCSNS) 12 …, 2012
Hybrid security techniques for Internet of Things healthcare applications
L Yehia, A Khedr, A Darwish
Advances in Internet of Things 5 (03), 21, 2015
A new chaotic whale optimization algorithm for features selection
GI Sayed, A Darwish, AE Hassanien
Journal of classification 35 (2), 300-344, 2018
Breast cancer diagnosis approach based on meta-heuristic optimization algorithm inspired by the bubble-net hunting strategy of whales
GI Sayed, A Darwish, AE Hassanien, JS Pan
International Conference on Genetic and Evolutionary Computing, 306-313, 2016
Adaptive algorithm for image denoising based on curvelet threshold
AAA Youssif, AA Darwish, AMM Madbouly
IJCSNS International journal of computer science and network security 10 (1 …, 2010
Human authentication using face and fingerprint biometrics
AA Darwish, WM Zaki, OM Saad, NM Nassar, G Schaefer
2010 2nd International Conference on Computational Intelligence …, 2010
Cyber physical systems design, methodology, and integration: the current status and future outlook
A Darwish, AE Hassanien
Journal of Ambient Intelligence and Humanized Computing 9 (5), 1541-1556, 2018
Cybercrime, digital forensics and jurisdiction
M Chawki, A Darwish, MA Khan, S Tyagi
Springer, 2015
Content based medical image retrieval based on pyramid structure wavelet
AA Youssif, AA Darwish, RA Mohamed
Int J Comput Sci Netw Secur 10 (3), 157-164, 2010
New models for monitoring and clustering of the state of plant species based on semantic spaces
A Darwish, O Poleshchuk
Journal of Intelligent & Fuzzy Systems 26 (3), 1089-1094, 2014
A survey of swarm and evolutionary computing approaches for deep learning
A Darwish, AE Hassanien, S Das
Artificial Intelligence Review 53 (3), 1767-1812, 2020
Managing computing infrastructure for IoT data
S Tyagi, A Darwish, MY Khan
Scientific Research Publishing, 2014
Intelligent hybrid anomaly network intrusion detection system
HF Eid, A Darwish, AE Hassanien, T Kim
International Conference on Future Generation Communication and Networking …, 2011
Quantum multiverse optimization algorithm for optimization problems
GI Sayed, A Darwish, AE Hassanien
Neural Computing and Applications, 1-18, 2019
The system can't perform the operation now. Try again later.
Articles 1–20