Saad Darwish

Saad Darwish
Institute of graduate studies and research, Egypt · Information Technology

Professor of Computer Science

About

105
Publications
9,815
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
413
Citations
Citations since 2016
95 Research Items
400 Citations
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
2016201720182019202020212022020406080100120140
Introduction
His research and professional interests include image processing, optimization techniques, security technologies, database management, machine learning, biometrics, digital forensics, and bioinformatics.

Publications

Publications (105)
Article
Full-text available
In a chaotic system, deterministic, nonlinear, irregular, and initial-condition-sensitive features are desired. Due to its chaotic nature, it is difficult to quantify a chaotic system’s parameters. Parameter estimation is a major issue because it depends on the stability analysis of a chaotic system, and communication systems that are based on chao...
Article
Full-text available
It is crucial, while using healthcare data, to assess the advantages of data privacy against the possible drawbacks. Data from several sources must be combined for use in many data mining applications. The medical practitioner may use the results of association rule mining performed on this aggregated data to better personalize patient care and imp...
Article
Signature verification is regarded as the most beneficial behavioral characteristic-based biometric feature in security and fraud protection. It is also a popular biometric authentication technology in forensic and commer�cial transactions due to its various advantages, including noninvasiveness, user-friendliness, and social and legal acceptabilit...
Article
Full-text available
The contemporary speed at which opinions move on social media makes them an undeniable force in the field of opinion mining (OM). This may cause the OM challenge to become more social than technical. This is when the process can determinately represent everyone to the degree they are worth. Nevertheless, considering perspectivism can result in opin...
Article
Full-text available
Digital evidence is critical in cybercrime investigations because it is used to connect individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily altered, and as such, it must be protected. The Chain of Custody (CoC) is a critical component of the digital evidence procedure. The aim of the CoC is to demonstrate...
Article
Full-text available
Medical image segmentation has consistently been a significant topic of research and a prominent goal, particularly in computer vision. Brain tumor research plays a major role in medical imaging applications by providing a tremendous amount of anatomical and functional knowledge that enhances and allows easy diagnosis and disease therapy preparatio...
Article
Contact between mobile hosts and database servers presents many problems in the Mobile Database System (MDS). It is harmed by a variety of causes, including handoff, inadequate capacity, frequent transaction updates, and repeated failures, both of which contribute to serious issues with the information system's consistency. However, error tolerance...
Article
Full-text available
Cybercrime investigations rely heavily on digital evidence to establish links between suspects and the criminal conduct they are allegedly involved in. As a result, digital evidence must be protected since it is complex, volatile, and susceptible to alteration. In the digital evidence method, the chain of custody (CoC) is essential. As a result of...
Article
Full-text available
The advent of big data related to spatial position knowledge, called geospatial big data, provides us with opportunities to recognize the urban environment. Existing database processing methods are inadequate to rapidly provide reliable results in a geospatial big data context due to the need for defining approximation “measures” and the increasing...
Article
Full-text available
Assessment of Initial Coin Offerings (ICOs) is crucial for investment decisions in the ICO market. Since most ICOs succeed in raising funds, failed ICOs must be discriminated against through intelligent classification methods. In this context, this research proposes an intelligent decision model for predicting ICOs’ success that merges both the Inf...
Article
Full-text available
One main incentive for the utilization of opinion mining (OM) in social media is the impossibility of manually analyzing millions of opinions. However, applying OM for decision-making requires imitating human brain reasoning for more pragmatic results. Analyzing opinions with human-like intelligence is vital for avoiding misleading results. This oc...
Article
Full-text available
The adoption of electronic patient records in hospitals will provide numerous benefits, but it will also present new issues. One of these is the creation of deadlocks, which causes delays in conducting tasks such as obtaining patient information. If the underlying system is distributed, the deadlock situation gets even more problematic. The strateg...
Article
Full-text available
The fast evolution of mobile applications demonstrates the growing need for more resources and processing power on mobile devices. Mobile Cloud Computing (MCC) combines cloud computing with mobile devices, enabling sophisticated and resource-intensive applications to operate on mobile devices regardless of their performance limits (e.g., battery li...
Article
Full-text available
Protecting the privacy of healthcare information is an important part of encouraging data custodians to give accurate records so that mining may proceed with confidence. The application of association rule mining in healthcare data has been widespread to this point in time. Most applications focus on positive association rules, ignoring the negativ...
Article
Full-text available
Due to businesses’ growing use of IoT services in their day-to-day operations and the increased use of smart devices, digital forensic investigations involving such systems will need increasingly sophisticated digital evidence collection and processing. The majority of IoT systems are composed of disparate software and hardware components, which ma...
Article
Full-text available
One of the big factors affecting yarn quality is the cotton mix; the reason forundertaking this work lies in the fact that there is always a considerable variation in the fiber characteristics from one bale to another, even within the same lot. This variation will result in the yarn quality difference, which leads to many fabric defects if the bale...
Article
A robust smile recognition system could be widely used for many real-world applications. Classification of a facial smile in an unconstrained setting is difficult due to the invertible and wide variety in face images. In this paper, an adaptive model for smile expression classification is suggested that integrates a fast features extraction algorit...
Article
Full-text available
A robust smile recognition system could be widely used for many real-world applications. Classification of a facial smile in an unconstrained setting is difficult due to the invertible and wide variety in face images. In this paper, an adaptive model for smile expression classification is suggested that integrates a fast features extraction algorit...
Article
Full-text available
Routing is a critical process in Wireless Sensor Networks (WSNs) since it is responsible for data transmission to base stations. Routing attacks are capable of completely destroying and degrading the function of WSNs. A trustworthy routing system is critical for ensuring routing security and WSN efficiency. Numerous studies have been conducted to i...
Article
Full-text available
In the development of human–machine interfaces, facial expression analysis has attracted considerable attention, as it provides a natural and efficient way of communication. Congruence between facial and behavioral inference in face processing is considered a serious challenge that needs to be solved in the near future. Automatic facial expression...
Article
Full-text available
With billions of devices being connected, how to make sure that our information stays secure is becoming a hot topic of IoT. Traditional approaches to personal authentication are inadequate and ineffective in the IoT era. Finger vein technology is the current biometric system that utilizes the vein structure for recognition. As such patterns are ve...
Article
Full-text available
Medical image segmentation has consistently been a significant topic of research and a prominent goal, particularly in computer vision. Brain tumor research plays a major role in medical imaging applications by providing a tremendous amount of anatomical and functional knowledge that enhances and allows easy diagnosis and disease therapy preparatio...
Article
Full-text available
One of the most critical and challenging processes is the provision of internet connectivity for nodes in Wireless Mesh Networks (WMN) or mobile ad hoc networks (MANET). A wide variety of "business and non-commercial" applications are implemented in MANET, most of them gaining Internet resources. Gateway (GW) or Mesh GWs are the key components of M...
Chapter
Healthcare data are often obtained from different healthcare providers for improved healthcare services. Healthcare data collection and maintenance became a concern owing to data issues including high-dimensionality irregularity, and sparsity. Several scholars focused on these topics and offered several effective and flexible healthcare solutions....
Chapter
Because of the increasingly dispersed existence of universal access to databases, it is important to establish security measures that allow the delicate properties of privacy and copyright rights of outsourcing databases. Researchers started studying how watermarking software would allow pervasive datasets accessing more secure work environments. I...
Article
Full-text available
Inside digital forensic science, expert systems are utilized to clarify suspicions where normally one or more human experts would need to be consulted. Expert systems‐based printer identification is provided with the objective of distinguishing the printer that produced a suspicious or questioned document. The arising problem is that the extraction...
Chapter
The use of augmented reality technologies in the healthcare sector opens up renewed possibilities. AR in medicine consists predominantly of three technical components, including camera calibration, patient registration, and object tracking. Object tracking assesses the camera or marker's spatial location on surgical instruments and is an integral a...
Chapter
The wide utilization of the Internet and the accessibility of supper computers deeply affect the manner in which we utilize computers today. Ongoing examination on these themes has prompted the rise of another world view known as grid computing. Performance and utilization of the grid depend on a complex and excessively dynamic procedure of optimal...
Chapter
With the creation of many sensor forms, enormous data are accessible for scientific study. Multiple image fusion incorporates details from many channels that cannot be collected from a camera single. The solely 3D image-based reconstruction of the scene geometry is still a complicated problem for in-stance through a stereo system. The key explanati...
Article
Full-text available
Video compression has great significance in the communication of motion pictures. Video compression techniques try to remove the different types of redundancy within or between video sequences. In the temporal domain, the video compression techniques remove the redundancies between the highly correlated consequence frames of the video. In the spati...
Article
Full-text available
Convolutional Neural Networks (CNNs) models achieve a dominant performance on immense domains. There are CNNs that come in numerous topologies of different sizes. This field’s challenge is to design the right CNN architecture for a specific problem to attain high results with low computing resources for training this architecture. Our proposed auto...
Article
Full-text available
Query optimization is considered as the most significant part in a model of distributed database. The optimizer tries to find an optimal join order, which reduces the query execution cost. Several factors may affect the cost of query execution, including number of relations, communication costs, resources, and access to large distributed data sets....
Article
Full-text available
A distributed database model can be effectively optimized through using query optimization.In such a model, the optimizer attempts to identify the most efficient join order, which minimizesthe overall cost of the query plan. Successful query processing largely relies on the methodologyimplemented by the query optimizer. Many researches are concerne...
Chapter
In the mobile environment, the communication between Mobile Hosts (MHs) and the database servers have a lot of challenges in the Mobile Database System (MDS). It suffers from many factors such as handoff, insufficient bandwidth, many transactions update, and recurrent failure that consider significant problems in the information system constancy. H...
Chapter
Finger vein technology is the biometric system that utilizes the vein structure for recognition. Finger vein recognition has gained a great deal of publicity because earlier biometric approaches experienced significant pitfalls. These include its inability to handle the imbalanced collection and failure to extract salient features for finger vein p...
Chapter
Malicious links are used as a source by the distribution channels to broadcast malware all over the Web. These links become instrumental in giving partial or full system control to the attackers. To overcome these issues, researchers have applied machine learning techniques for malicious URL detection. However, these techniques fall to identify dis...
Article
Full-text available
This paper applies the entropy-based fractal indexing scheme that enables the grid environment for fast indexing and querying. It addresses the issue of fault tolerance and load balancing-based fractal management to make computational grids more effective and reliable. A fractal dimension of a cloud of points gives an estimate of the intrinsic dime...
Article
Full-text available
The widened uses of Internet credit cards in e-banking systems are currently prone to credit card fraud. Data imbalance also poses a significant difficulty in the method of fraud detection. The efficiency of the existing fraud detection systems is only in question because it detects fraudulent action after the suspect transaction has been completed...
Article
Full-text available
Forecasting stock prices plays an important role in setting a trading strategy or determining the appropriate timing for buying or selling a stock. The use of technical analysis for financial forecasting has been successfully employed by many researchers. The existing qualitative based methods developed based on fuzzy reasoning techniques cannot de...
Chapter
Mobile Cloud Computing (MCC) has drawn significant research attention as mobile devices’ capability has been improved in recent years. MCC forms the platforms for a broad range of mobile cloud solutions. MCC’s key idea is to use powerful back-end computing nodes to enhance the capabilities of small mobile devices and provide better user experiences...
Chapter
In the modern world, there is rapid progress in the Internet and information technology that is becoming more important in the field of Electronic commerce. The majority of the clients use the electronic cash process as an alternative to using real cash. But in this E-cash method, there is a problem faced by most of the customers that is the privac...
Chapter
Providing Internet access for nodes in wireless mesh networks or Mobile Ad hoc Network (MANET) is one of the most critical and challenging processes. Multiple gateways (GWs) are deployed to enhance the capability of MANET. Many of the existing routing protocols, either using the traditional routing approaches or using the tree-based network’s appro...
Chapter
Blockchain technology is receiving a lot of attention in recent years for its wide variety of applications in different fields. On the other hand, the Internet of Things (IoT) technology currently considers the new growth engine of the fourth industrial revolution. Current studies developed techniques to overcome the limitations of IoT authenticati...
Chapter
Routing is one of the most important operations in Wireless Sensor Networks (WSNs) as it deals with data delivery to base stations. Routing attacks can easily destroy and significantly degrade the operation of WSNs. A trustworthy routing scheme is very essential to ensure the protection of routing and the efficiency of WSNs. There are a range of st...
Chapter
This paper proposes a modified video compression model that optimizes vector quantization codebook by using the adapted Quantum Genetic Algorithm (QGA) that uses the quantum features, superposition, and entanglement to build optimal codebook for vector quantization. A context-based initial codebook is created by using a background subtraction algor...
Article
Multiple watermarking techniques for images is receiving more attention in recent years for its wide variety of applications in different fields such as piracy of digital data, and copyrights protection. Current approaches rely on adding many watermarks in different bands or channels utilising scaling factor, and embedding locations that are mainly...
Article
Full-text available
Accurate brain tumor segmentation from 3D Magnetic Resonance Imaging (3D-MRI) is an important method for obtaining information required for diagnosis and disease therapy planning. Variation in the brain tumor’s size, structure, and form is one of the main challenges in tumor segmentation, and selecting the initial contour plays a significant role i...
Article
Full-text available
In the recent few years, there was a concentrated search on Arabic Optical Character Recognition (OCR), especially the recognition of scanned, offline, machine-printed documents. However, Arabic OCR consequences are dissatisfying and are still a developed research area. Finding the best feature extraction techniques and selecting an appropriate cla...
Article
Full-text available
The rapidly increasing of sentiment analysis in social networks has lead business owners and decision makers to value opinion leaders who can influence people's impressions concerning certain business or commodity. Nevertheless, decision makers are being misled by inaccurate results due to the ignorance of perspectivism. Considering perspectivism,...
Chapter
Optimizing query in distributed database is considered as the most important part of a database system. The optimizer tries to find an optimal join order which reduces the query execution cost. Many factors may affect the execution cost of a query, including communication costs, resources, and access to large distributed data sets. When the number...
Chapter
Full-text available
Cloud model covers the randomness gap in fuzzy logic model and represents the uncertainty transformation between two different concepts. First concept is the linguistic term that represent the qualitative mean. While the second is the crisp term which represent the quantitative mean. The proposed work presents promising model which combines cloud m...
Chapter
Full-text available
Existing approaches for query processing are insufficient to provide accurate results quickly in a big data environment due to the needing to identify approximation measures and execution time for the queries are increasing. The practical results are obtained through the clustering process. However, how to scale up and speed up clustering algorithm...
Chapter
Medical imaging technologies developed to satisfy the significant need for information on medical imaging by visualizing internal organs like tumors help the radiologists to extract critical clinical data accurately. Brain tumor segmentation is very needed for a contemporaneous planning system for brain surgery. This paper offers a quick and accura...
Chapter
Nowadays, big data is one of the most technical challenges confront researchers and companies. The main challenge lies in the fact that big data sources usually formed in a continuous data stream. Thus, many previous researches present incremental data mining approaches to deal with the challenges of the data streams by adapting traditional machine...
Article
Full-text available
Watermarking has been suggested as a generic technique to solve various problems associated with topics in the areas of digital rights management and multimedia security. Most of the early methods were based on single watermark embedding, but there are great limitations when single watermark embedding algorithms are tried into practical application...
Chapter
In recent decades, research concern in vehicle routing has progressively more concentrated on dynamic and stochastic approaches in solving sophisticated dynamic vehicle routing problems (DVRP) due to its importance in helping potential customers to better manage their applications and to provide e-freight and e-commerce systems similarly. Many tech...
Chapter
Mobile ad hoc network (MANET) can be defined as a self-configuring group of mobile devices or nodes. These nodes able to change locations and configure themselves rapidly, freely and dynamically, thus routing is big challenging in mobile ad hoc network. The important role of routing is selecting the route for transferring the data from the source n...
Chapter
New learning researches proved that creativity is an essential concern in the arena of education. The best means to evaluate learning outcomes and students’ creativity is essay questions. However, to evaluate these questions is a time-consuming task and subjectivity in scoring assessments remains inevitable. Automated essay evaluation systems (AEE)...
Chapter
Full-text available
Social media trends, which have become more popular nowadays, introduce a rich hub of a broad spectrum of topics. It is of great importance to track emerging related topics when major events occur. The source of such information would be available not only through social portals but also through news, articles and web portals. All this information...
Chapter
A chaotic system is a one of encryption technique used in wireless communication. The chaotic system is a nonlinear dynamic system, which provides a mechanism for signal design and generation to cover the transmitting information and data. The chaotic system is high security, fast and difficult to predict because of its parameters sensitive to init...
Article
Full-text available
The increased usage of credit cards for online and regular purchases in E-banking communication systems is vulnerable to credit card fraud. Data imbalance also poses a huge challenge in the fraud detection process. The efficiency of the current fraud detection system (FDS) is in question only because they detect the fraudulent activity after the su...
Chapter
Plagiarism became a considerable issue; the reason is easy access to articles on the Internet. However, many issues arise as the majority of available Plagiarism Detection (PD) tools could not identify plagiarism by structural variations and paraphrasing. For applied systems, with regards to more complicated levels, those systems fail. Genetic Algo...
Chapter
Full-text available
Digital watermarking for various multimedia contents is an effective solution for copyright protection. The techniques of 3D Watermarking carefully insert some secret bits of data in 3D object. These techniques contain contradictory parameters as watermarked object quality (invisibility), capacity and watermark robustness. Thus these parameters sho...
Chapter
Processing Sentiment Analysis (SA) in social networks has lead decision makers to value opinion leaders who can sway people’s impressions concerning certain business or commodity. Yet, a tremendous scarceness of considering perspectivism, while computing text polarity, has been spotted. Considering perspectivism in SA can help in the production of...
Chapter
Full-text available
In recent days, phones recognized as more significant personal communication device for daily life. Usually, ringing notifications are utilized in notifying users on incoming calls. Notifications of inappropriate incoming calls occasionally cause interruptions for users and surrounding people. These unwanted interruptions have a disruptive effect o...
Article
Full-text available
Blockchain technology has been commonly used in the last years in numerous fields, such astransactions documenting and monitoring real assets (house, cash) or intangible assets (copyright,intellectual property). The internet of things (IoT) technology, on the other hand, has become themain driver of the fourth industrial revolution, and is currentl...