Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ashraf Darwish is active.

Publication


Featured researches published by Ashraf Darwish.


Sensors | 2011

Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring

Ashraf Darwish; Aboul Ella Hassanien

Wireless sensor network (WSN) technologies are considered one of the key research areas in computer science and the healthcare application industries for improving the quality of life. The purpose of this paper is to provide a snapshot of current developments and future direction of research on wearable and implantable body area network systems for continuous monitoring of patients. This paper explains the important role of body sensor networks in medicine to minimize the need for caregivers and help the chronically ill and elderly people live an independent life, besides providing people with quality care. The paper provides several examples of state of the art technology together with the design considerations like unobtrusiveness, scalability, energy efficiency, security and also provides a comprehensive analysis of the various benefits and drawbacks of these systems. Although offering significant benefits, the field of wearable and implantable body sensor networks still faces major challenges and open research problems which are investigated and covered, along with some proposed solutions, in this paper.


Expert Review of Proteomics | 2014

Lectin approaches for glycoproteomics in FDA-approved cancer biomarkers

Haitham A. Badr; Dina M.M. AlSadek; Ashraf Darwish; Abdelaleim Ismail ElSayed; Bakhytzhan O Bekmanov; Elmira Khussainova; Xueji Zhang; William Cs Cho; Leyla B. Djansugurova; Chen-Zhong Li

The nine FDA-approved protein biomarkers for the diagnosis and management of cancer are approaching maturity, but their different glycosylation compositions relevant to early diagnosis still remain practically unexplored at the sub-glycoproteome scale. Lectins generally exhibit strong binding to specific sub-glycoproteome components and this property has been quite poorly addressed as the basis for the early diagnosis methods. Here, we discuss some glycoproteome issues that make tackling the glycoproteome particularly challenging in the cancer biomarkers field and include a brief view for next generation technologies.


Archive | 2011

Hybrid Intelligent Intrusion Detection Scheme

Mostafa A. Salama; Heba F. Eid; Rabie A. Ramadan; Ashraf Darwish; Aboul Ella Hassanien

This paper introduces a hybrid scheme that combines the advantages of deep belief network and support vector machine. An application of intrusion detection imaging has been chosen and hybridization scheme have been applied to see their ability and accuracy to classify the intrusion into two outcomes: normal or attack, and the attacks fall into four classes; R2L, DoS, U2R, and Probing. First, we utilize deep belief network to reduct the dimensionality of the feature sets. This is followed by a support vector machine to classify the intrusion into five outcome; Normal, R2L, DoS, U2R, and Probing. To evaluate the performance of our approach, we present tests on NSL-KDD dataset and show that the overall accuracy offered by the employed approach is high.


intelligent systems design and applications | 2010

Principle components analysis and Support Vector Machine based Intrusion Detection System

F. Eid Heba; Ashraf Darwish; Aboul Ella Hassanien; Ajith Abraham

Intrusion Detection System (IDS) is an important and necessary component in ensuring network security and protecting network resources and infrastructures. In this paper, we effectively introduced intrusion detection system by using Principal Component Analysis (PCA) with Support Vector Machines (SVMs) as an approach to select the optimum feature subset. We verify the effectiveness and the feasibility of the proposed IDS system by several experiments on NSL-KDD dataset. A reduction process has been used to reduce the number of features in order to decrease the complexity of the system. The experimental results show that the proposed system is able to speed up the process of intrusion detection and to minimize the memory space and CPU time cost.


computational intelligence communication systems and networks | 2010

Human Authentication Using Face and Fingerprint Biometrics

Ashraf Darwish; Walaa M. Zaki; Omar M. Saad; Nadia M. Nassar; Gerald Schaefer

Multimodal biometric approaches are growing in importance for personal verification and identification, since they provide better recognition results and hence improve security compared to biometrics based on a single modality. In this paper, we present a multimodal biometric system that is based on the fusion of face and fingerprint biometrics. For face recognition, we employ uniform local binary patterns (ULBP), while minutiae extraction is used for fingerprint recognition. Fusion at matching score level is then applied to enhance recognition performance. In particular, we employ the product rule in our investigation. The final identification is then performed using a nearest neighbour classifier which is fast and effective. Experimental results confirm that our approach achieves excellent recognition performance, and that the fusion approach outperforms biometric identification based on single modalities.


international conference on future generation communication and networking | 2011

Intelligent Hybrid Anomaly Network Intrusion Detection System

Heba F. Eid; Ashraf Darwish; Aboul Ella Hassanien; Tai-hoon Kim

Intrusion detection systems (IDSs) is an essential key for network defense. The hybrid intrusion detection system combines the individual base classifiers and feature selection algorithm to maximize detection accuracy and minimize computational complexity. We investigated the performance of Genetic algorithm-based feature selection system to reduce the data features space and then the hidden naive bays (HNB) system were adapted to classify the network intrusion into five outcomes: normal, and four anomaly types including denial of service, user-to-root, remote-to-local, and probing. In order to evaluate the performance of introduced hybrid intrusion system, several groups of experiments are conducted and demonstrated on NSL-KDD dataset. Moreover, the performances of intelligent hybrid intrusion system have been compared with the results of well-known feature selection algorithms. It is found that, hybrid intrusion system produces consistently better performances on selecting the subsets of features which resulting better classification accuracies (98.63%).


Sensors | 2012

Correction: Darwish, A. and Hassanien, A.E. Wearable and Implantable Wireless Sensor Network Solutions for Healthcare Monitoring. Sensors 2011, 11, 5561-5595

Ashraf Darwish; Aboul Ella Hassanien

A reference is missing in our paper [1]. Figure 2 was adapted from Reference [2] with permission. The figure is listed and described as below: [...]


Neural Network World | 2011

The use of computational intelligence in digital watermarking: review, challenges, and new trends

Ashraf Darwish; Ajith Abraham

Digital Watermarking (DW) based on computational intelligence (CI) is currently attracting considerable interest from the research community. This article provides an overview of the research progress in applying CI methods to the problem of DW. The scope of this review will encompass core methods of CI, including rough sets (RS), fuzzy logic (FL), artiflcial neural networks (ANNs), ge- netic algorithms (GA), swarm intelligence (SI), and hybrid intelligent systems. The research contributions in each fleld are systematically summarized and compared to highlight promising new research directions. The flndings of this review should provide useful insights into the current DW literature and be a good source for anyone who is interested in the application of CI approaches to DW systems or related flelds. In addition, hybrid intelligent systems are a growing research area in CI.


Neural Computing and Applications | 2017

Quantum multiverse optimization algorithm for optimization problems

Gehad Ismail Sayed; Ashraf Darwish; Aboul Ella Hassanien

In this paper, a new hybrid algorithm called quantum multiverse optimization (QMVO) is proposed. The proposed QMVO is based on quantum computing and multiverse optimization (MVO) algorithm. The main features of quantum theory and MVO were applied in a new algorithm to find the optimal trade-off between exploration and exploitation. QMVO algorithm depends on adopting a quantum representation of the search space and the integration of the quantum interference and operators in the multiverse optimization algorithm to obtain the optimal solution of the objective function. The performance of QMVO algorithm is evaluated by using 50 unimodal and multimodal benchmark functions. The experimental results show that the proposed algorithm has comprehensive superiority in solving complex numerical optimization problems. Also, the results show that the proposed QMVO is a promising optimization algorithm compared with other well-known and popular algorithms.


winter simulation conference | 2010

Computational Intelligence in Speech and Audio Processing: Recent Advances

Aboul Ella Hassanien; Gerald Schaefer; Ashraf Darwish

Computational intelligence techniques have been used for the processing of speech and audio for several years. Some of the applications in speech processing where computational intelligences are extensively used include speech recognition, speaker recognition, speech enhancement, speech coding and speech synthesis, while in audio processing, computational intelligence applications include music classification, audio classification and audio indexing and retrieval. In this paper we provide an overview of recent applications of modern computational intelligence theory in the field of speech and audio processing.

Collaboration


Dive into the Ashraf Darwish's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Olga Poleshchuk

Moscow State Forest University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge