default search action
Egyptian Computer Science Journal, Volume 30
Volume 30, Number 1, January 2008
- Basim Alhadidi:
Monolithic Code Analysis Using Numerical Pyramid Method. 1-4 - N. Krishnan, P. Vijayalakshmi, R. K. Selvakumar:
Moving Object Detection in a Video and a Lossless Compression For Real Time Applications. 5-13 - Ehab Mostafa, Abdel Fatah A. Hegazy, Amr Badr:
Automatic Mass Detection and Classification in Mammograms. 14-24 - Emad Abuelrub:
Embedding Trees and Cycles into Crossed Cubes. 25-34 - Basim Alhadidi, Mohammad Alwedyan:
Hybrid Stop-Word Removal Technique for Arabic Language. 35-38 - Mohamed M. Abd-Eldayem:
A Proposed Wavelet Based Image Data Hiding Technique. 39-51 - Gamil Abdel Azim:
Mapping the Three Matching Problem into Hopfield Neural Networks. 52-58 - I. A. Ismail, M. M. Abd El-kareem, N. A. Ali, E. Awadeen:
Image Registration by Genetic Algorithms. 59-64 - Emad M. Fawwaz, Mohamed M. Abd-Eldayem:
A Fisheye-Based Intrusion Detection System for Mobile Ad Hoc Networks. 65-75 - Galal H. Galal-Edeen:
Information Systems Architecting. 76-89 - Reham Adel Ali, Galal H. Galal-Edeen, Mohamed Osama Khozium:
Using a Pattern Approach for User Interface Design. 90-94
Volume 30, Number 2, May 2008
- Yousef Ajami Alotaibi:
Automatic Recognition, Investigation, and Analysis of the Spoken Arabic Alphabet. - Nabil Ahmed Sultan:
The Evolution, Implementation, Promise and Politics of Web Services: An Analytical Overview. - Hoda Waguih:
Predicting Student Success: An Application of Data Mining Techniques in Higher Educational Systems. - Alaa El-Halees:
A Comparative Study on Arabic Text Classification. - Ahmed El Demallawy, Ramadan Moawad:
Design and Implementation of a Software Configuration Management Tool. - Nevine M. Labib, Adel Ibrahim:
Knowledge Discovery through Data and Text Mining An Application to Medical Applications. - Nevine M. Labib:
A Case-based Tutoring System for Managerial Education. - Sherif A. Mazen, Sherif El-Henawy:
A Framework for Auditing Software Coding & Database Integrity. - Adnan G. Abuarafah:
An Adaptive Intelligent Agent Advisor for Java Programming Course. - Ibrahim Mahmoud El-Henawy, A. Mustafa, A. M. Atteya:
Supervised Techniques For Linear And Nonlinear Principal Component Analysis. - Mohamad M. Eassa, Ahmed S. Salama, Bahaa K. Saleh:
A Secure Integrated Model For Mobile Agent Migration (SIMMAM). - Yasir Khalil Ibrahim, Yarob Adnan Istitieh:
Master Lock Combination Cracker. Egypt. Comput. Sci. J. 30(2) (2008)
Volume 30, Number 3, September 2008
- Germano Vallesi, Anna Montesanto, Aldo Franco Dragoni:
Bayesian Conditioning for estimating the relative degrees of Reliability in a group of Neural Networks engaged at Iris Biometric Identification. 1-13 - Mohamed Taha, Hamed Nassar, Tarek F. Gharib:
ITARM: Incremental Temporal Association Rules Mining. 14-25 - Mahmoud Elgamal:
Automatic Scale Selection for Iris Recognition. - Emad M. Fawwaz, Mohamed M. Abd-Eldayem, Gamal Darwish:
Model-Based Clustring Framework for Intrusion Detection in Ad Hoc Networks. - Haitham S. Hamza, Shasha Wu:
Energy-Efficient End-To-End Routing Algorithm for Wireless Sensor Networks. - Reda A. El-Khoribi, Mahmoud A. Ismail:
Maximum Likelihood Decoding Of Linear Codes Using Particle Swarm Optimization Methods. - Hisham M. E. Abdelsalam:
Local E-Government Maturity in Egypt: An Exploratory Evaluation. - Ibrahim Mahmoud El-Henawy, Magdi Zakria Rashad, L. M. Abou El-Maged:
Speaker's Voice Features and Specification. - Ibrahim Mahmoud El-Henawy, Sherief Barakat, Nancy Awadallah:
E-Payment: Threats and Security - Survey. - Ahmed Yahya:
A Multimedia Provision for Mobile Ad Hoc Networks. - Khalid Sami Husain:
Examining the Relationship between Business Process Reengineering and Information Technology.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.