![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Egyptian Computer Science Journal, Volume 30
Volume 30, Number 1, January 2008
- Basim Alhadidi:
Monolithic Code Analysis Using Numerical Pyramid Method. 1-4 - N. Krishnan, P. Vijayalakshmi, R. K. Selvakumar:
Moving Object Detection in a Video and a Lossless Compression For Real Time Applications. 5-13 - Ehab Mostafa, Abdel Fatah A. Hegazy, Amr Badr:
Automatic Mass Detection and Classification in Mammograms. 14-24 - Emad Abuelrub:
Embedding Trees and Cycles into Crossed Cubes. 25-34 - Basim Alhadidi, Mohammad Alwedyan:
Hybrid Stop-Word Removal Technique for Arabic Language. 35-38 - Mohamed M. Abd-Eldayem:
A Proposed Wavelet Based Image Data Hiding Technique. 39-51 - Gamil Abdel Azim:
Mapping the Three Matching Problem into Hopfield Neural Networks. 52-58 - I. A. Ismail, M. M. Abd El-kareem, N. A. Ali, E. Awadeen:
Image Registration by Genetic Algorithms. 59-64 - Emad M. Fawwaz, Mohamed M. Abd-Eldayem:
A Fisheye-Based Intrusion Detection System for Mobile Ad Hoc Networks. 65-75 - Galal H. Galal-Edeen:
Information Systems Architecting. 76-89 - Reham Adel Ali, Galal H. Galal-Edeen, Mohamed Osama Khozium:
Using a Pattern Approach for User Interface Design. 90-94
Volume 30, Number 2, May 2008
- Yousef Ajami Alotaibi:
Automatic Recognition, Investigation, and Analysis of the Spoken Arabic Alphabet. - Nabil Ahmed Sultan:
The Evolution, Implementation, Promise and Politics of Web Services: An Analytical Overview. - Hoda Waguih:
Predicting Student Success: An Application of Data Mining Techniques in Higher Educational Systems. - Alaa El-Halees:
A Comparative Study on Arabic Text Classification. - Ahmed El Demallawy, Ramadan Moawad:
Design and Implementation of a Software Configuration Management Tool. - Nevine M. Labib, Adel Ibrahim:
Knowledge Discovery through Data and Text Mining An Application to Medical Applications. - Nevine M. Labib:
A Case-based Tutoring System for Managerial Education. - Sherif A. Mazen, Sherif El-Henawy:
A Framework for Auditing Software Coding & Database Integrity. - Adnan G. Abuarafah:
An Adaptive Intelligent Agent Advisor for Java Programming Course. - Ibrahim Mahmoud El-Henawy, A. Mustafa, A. M. Atteya:
Supervised Techniques For Linear And Nonlinear Principal Component Analysis. - Mohamad M. Eassa, Ahmed S. Salama, Bahaa K. Saleh:
A Secure Integrated Model For Mobile Agent Migration (SIMMAM). - Yasir Khalil Ibrahim, Yarob Adnan Istitieh:
Master Lock Combination Cracker. Egypt. Comput. Sci. J. 30(2) (2008)
Volume 30, Number 3, September 2008
- Germano Vallesi, Anna Montesanto, Aldo Franco Dragoni:
Bayesian Conditioning for estimating the relative degrees of Reliability in a group of Neural Networks engaged at Iris Biometric Identification. 1-13 - Mohamed Taha, Hamed Nassar, Tarek F. Gharib:
ITARM: Incremental Temporal Association Rules Mining. 14-25 - Mahmoud Elgamal:
Automatic Scale Selection for Iris Recognition. - Emad M. Fawwaz, Mohamed M. Abd-Eldayem, Gamal Darwish:
Model-Based Clustring Framework for Intrusion Detection in Ad Hoc Networks. - Haitham S. Hamza, Shasha Wu:
Energy-Efficient End-To-End Routing Algorithm for Wireless Sensor Networks. - Reda A. El-Khoribi, Mahmoud A. Ismail:
Maximum Likelihood Decoding Of Linear Codes Using Particle Swarm Optimization Methods. - Hisham M. E. Abdelsalam:
Local E-Government Maturity in Egypt: An Exploratory Evaluation. - Ibrahim Mahmoud El-Henawy, Magdi Zakria Rashad, L. M. Abou El-Maged:
Speaker's Voice Features and Specification. - Ibrahim Mahmoud El-Henawy, Sherief Barakat, Nancy Awadallah:
E-Payment: Threats and Security - Survey. - Ahmed Yahya:
A Multimedia Provision for Mobile Ad Hoc Networks. - Khalid Sami Husain:
Examining the Relationship between Business Process Reengineering and Information Technology.
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.