Dr. Ashraf Darwish
Helwan University, Egypt
Email: ashraf.darwish.eg@ieee.org
Qualifications
2006 Ph.D., Saint Petersburg State University,
Russia
1996 M.A., Tanta University, Egypt
1990 B.A., Tanta University, Egypt
Publications (selected)
-
“A Partial Correctness Proof for Programs with
Decided Specifications”, International journal of Applied Mathematics and
Information Sciences,USA, Vol. 1(2), pp.195-202, 2007.
-
“A Survey on medical imaging content-based image
retrieval”, Proceeding of the 22nd International Conference on Topology and Its
Applications, 7-8 July 2008.
-
“P-SPACE complete languages for model-checking of a
program”, International Journal for Computer Science and Network Security
(IJCSNS), May 2009.
-
“A Review on Conceptual Data Modeling Quality”,
Proceeding of the 22nd International Conference on Mathematics and Computer
Science and Its Applications, 14-16 January, 2009,Baku,Azerbaijan.
-
“The polynomial decision algorithm for Boolean
solution of polynomial congruences by power of prime modulo”, International
Journal of Egyptian Mathematical Society, J. Egypt Math. Soc. Vol. 17(2) (2009)
, pp259-270.
-
“Assessment the Quality of Distorted Images by Using
Sampling Technique”, Proceeding of 5th International Conference of Scientific
Research and Its Applications, December 22-24, 2009,CairoUniversity.
-
“Human Recognition by Face edge and Fingerprint”,
Proceeding of the IEEE international conference of ICAMIS 2009,Uk.
-
“Development of Information Agent Reranking By Using
Weights Measurement”, International Journal of Computer Science & Security
(IJCSS), Volume (4) : Issue (2), pp. 193-191, 2010.
-
“A Developed Model for Analyzing of
Telecommunication Data Using Data Mining Techniques”, International Journal of
Intelligent Computing and Information Sciences, Vol.10, N.1, pp. 171-185,
January 2010.
-
“Adaptive Algorithm for Image Denoising Based on
Curvelet Threshold”, International Journal of Computer Science and Network
Security, VOL.10 No.1, January 2010.
-
Content based medical image retrieval based on
pyramid structure wavelet”, IJCSNS International Journal of Computer Science
and Network Security, VOL.10 No.3,pp.157-164, March 2010.
-
“Computational intelligence in speech and audio
processing: Recent advances”, Proceeding of Soft Computing in Industrial
Applications, AISC 75, pp. 303–311. springerlink.com ,Springer-Verlag Berlin
Heidelberg, 2010.
-
Principle Components Analysis and Support Vector
Machine Based Intrusion Detection System”, Proceeding of the IEEE international
conference of ISDA 2010,Egypt.
-
“Computational Intelligence in Digital Watermarking
Systems: Review, Recent Advances and New trends”, International Journal of
Neural Network World (NNW), 2011.
-
“Hybrid Portable Document Format Protection Scheme
based on Public key and Digital Watermarking”, International journal of
-
Computer Science and Network Security, 2010.
-
“A Robust Algorithm for Enhancement of Remotely
Sensed Images Based on Wavelet Transform”, Proceeding of the Springer
international conference of SOCO,Spain, 2011.
-
“Protecting Patient Privacy Scheme against
Unauthorized Release of Medical Images”, Proceeding of Springer international
conference of SOCO201,Spain.
-
“Retinal Image Analysis System “Proceeding of
Springer international conference of SOCO201,Spain.
-
“The Impact of Web 2.0 and Social Network Models in
Revolutions of Societies: E- Revolutions”, The International Journal of
Next-Generation Networks (IJNGN).
-
“Wearable and Implantable Wireless Sensor Network
Solutions for Healthcare Monitoring”, International Journal of Sensors, 2011.
-
“gNIDS : Rule Based Network Intrusion Detection
System using Genetic Algorithms”, FGCN 2011, Part I, CCIS 265, pp. 209–218,
2011, Springer-Verlag Berlin Heidelberg 2011.
-
“A New Dynamic Coordinators Selection Algorithm in
Distributed Database Systems”, International Journal of Mathematical
Archive-3(1), pp. 1-7, 2012.
-
“Fuzzy Models for Educational Data Mining,
International Journal of Telecommunications (IJT), VOLUME 15, ISSUE 2, AUGUST
2012.
-
“An On-line Analytical Data Mining (OLAM) Prototype
for Telecommunication Data Mining International Calls, International Journal of
Applied Mathematics and Information Sciences (AMIS), Appl. Math. Inf. Sci. 6
No. 1S (2012) 1-4.
-
“A Secure and Robust Prototype for Electronic Voting
System, International Journal of Computer Engineering and Technology (IJCET),
2012.