Back
Return
Biography
Ashraf Darwish

Dr. Ashraf Darwish

Helwan University, Egypt


Email: ashraf.darwish.eg@ieee.org


Qualifications

2006  Ph.D., Saint Petersburg State University, Russia

1996  M.A., Tanta University, Egypt

1990  B.A., Tanta University, Egypt


Publications (selected)


  1. “A Partial Correctness Proof for Programs with Decided Specifications”, International journal of Applied Mathematics and Information Sciences,USA, Vol. 1(2), pp.195-202, 2007.
  2. “A Survey on medical imaging content-based image retrieval”, Proceeding of the 22nd International Conference on Topology and Its Applications, 7-8 July 2008.
  3. “P-SPACE complete languages for model-checking of a program”, International Journal for Computer Science and Network Security (IJCSNS), May 2009.
  4. “A Review on Conceptual Data Modeling Quality”, Proceeding of the 22nd International Conference on Mathematics and Computer Science and Its Applications, 14-16 January, 2009,Baku,Azerbaijan.
  5. “The polynomial decision algorithm for Boolean solution of polynomial congruences by power of prime modulo”, International Journal of Egyptian Mathematical Society, J. Egypt Math. Soc. Vol. 17(2) (2009) , pp259-270.
  6. “Assessment the Quality of Distorted Images by Using Sampling Technique”, Proceeding of 5th International Conference of Scientific Research and Its Applications, December 22-24, 2009,CairoUniversity.
  7. “Human Recognition by Face edge and Fingerprint”, Proceeding of the IEEE international conference of  ICAMIS 2009,Uk.
  8. “Development of Information Agent Reranking By Using Weights Measurement”, International Journal of Computer Science & Security (IJCSS), Volume (4) : Issue (2), pp. 193-191, 2010.
  9. “A Developed Model for Analyzing of Telecommunication Data Using Data Mining Techniques”, International Journal of Intelligent Computing and Information Sciences, Vol.10, N.1, pp. 171-185, January 2010.
  10. “Adaptive Algorithm for Image Denoising Based on Curvelet Threshold”, International Journal of Computer Science and Network Security, VOL.10 No.1, January 2010.
  11. Content based medical image retrieval based on pyramid structure wavelet”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3,pp.157-164, March 2010.
  12. “Computational intelligence in speech and audio processing: Recent advances”, Proceeding of Soft Computing in Industrial Applications, AISC 75, pp. 303–311. springerlink.com ,Springer-Verlag Berlin Heidelberg,  2010.
  13. Principle Components Analysis and Support Vector Machine Based Intrusion Detection System”, Proceeding of the IEEE international conference of ISDA 2010,Egypt.
  14. “Computational Intelligence in Digital Watermarking Systems: Review, Recent Advances and New trends”, International Journal of Neural Network World (NNW), 2011.
  15. “Hybrid Portable Document Format Protection Scheme based on Public key and Digital Watermarking”, International journal of
  16. Computer Science and Network Security, 2010.
  17. “A Robust Algorithm for Enhancement of Remotely Sensed Images Based on Wavelet Transform”, Proceeding of the Springer international conference of SOCO,Spain, 2011.
  18. “Protecting Patient Privacy Scheme against Unauthorized Release of Medical Images”, Proceeding of Springer international conference of SOCO201,Spain.
  19. “Retinal Image Analysis System “Proceeding of  Springer international conference of SOCO201,Spain.
  20. “The Impact of Web 2.0 and Social Network Models in Revolutions of Societies: E- Revolutions”, The International Journal of Next-Generation Networks (IJNGN).
  21. “Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring”, International Journal of Sensors, 2011.
  22. “gNIDS : Rule Based Network Intrusion Detection System using Genetic Algorithms”, FGCN 2011, Part I, CCIS 265, pp. 209–218, 2011, Springer-Verlag Berlin Heidelberg 2011.
  23. “A New Dynamic Coordinators Selection Algorithm in Distributed Database Systems”, International Journal of Mathematical Archive-3(1), pp. 1-7, 2012.
  24. “Fuzzy Models for Educational Data Mining, International Journal of Telecommunications (IJT), VOLUME 15, ISSUE 2, AUGUST 2012.
  25. “An On-line Analytical Data Mining (OLAM) Prototype for Telecommunication Data Mining International Calls, International Journal of Applied Mathematics and Information Sciences (AMIS), Appl. Math. Inf. Sci. 6 No. 1S (2012) 1-4.
  26. “A Secure and Robust Prototype for Electronic Voting System, International Journal of Computer Engineering and Technology (IJCET), 2012.