A
-
Abu Elfetouh, Ahmed
Efficient Iris Recognition Using Multi-feature Fusion [Volume 13, Issue 1, 2017, Pages 1-8]
-
Abu-Elnasr, Osama
Enhancement Of Text Recognition In Scene Images [Volume 13, Issue 1, 2017, Pages 19-26]
-
A. El-Dosuky, Mohammad
Data Security Evaluation Based on Trend Line Rules Model [Volume 13, Issue 1, 2017, Pages 37-41]
-
A.M. Hegazy, Shaimaa
Efficient Iris Recognition Using Multi-feature Fusion [Volume 13, Issue 1, 2017, Pages 1-8]
-
Atwan, Ahmed
A secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding [Volume 13, Issue 1, 2017, Pages 27-36]
B
-
Barakat, Sherif
Enhancement Of Text Recognition In Scene Images [Volume 13, Issue 1, 2017, Pages 19-26]
-
Barakat, Sherif
A Wrapper Feature Selection Technique for Improving Diagnosis of Breast Cancer [Volume 13, Issue 1, 2017, Pages 43-49]
E
-
Elmogy, Mohammed
A Wrapper Feature Selection Technique for Improving Diagnosis of Breast Cancer [Volume 13, Issue 1, 2017, Pages 43-49]
-
Elmougy, Samir
Automatic Cloud-Based IoT Mashup Algorithm [Volume 13, Issue 1, 2017, Pages 9-17]
-
Elwi, Dalia
Automatic Cloud-Based IoT Mashup Algorithm [Volume 13, Issue 1, 2017, Pages 9-17]
F
-
F. Goweda, Amal
A Wrapper Feature Selection Technique for Improving Diagnosis of Breast Cancer [Volume 13, Issue 1, 2017, Pages 43-49]
G
-
G.M. Mostafa, Mostafa
Efficient Iris Recognition Using Multi-feature Fusion [Volume 13, Issue 1, 2017, Pages 1-8]
H
-
Hamad, Moayed
Enhancement Of Text Recognition In Scene Images [Volume 13, Issue 1, 2017, Pages 19-26]
K
-
K. Khorsheed, Nazar
Data Security Evaluation Based on Trend Line Rules Model [Volume 13, Issue 1, 2017, Pages 37-41]
N
-
Nomair, Omaima
Automatic Cloud-Based IoT Mashup Algorithm [Volume 13, Issue 1, 2017, Pages 9-17]
O
-
Ouda, Osama
A secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding [Volume 13, Issue 1, 2017, Pages 27-36]
T
-
Tarek, Eman
A secure Multimodal Biometric Authentication with Cryptographic key Management Using Double Random Phase Encoding [Volume 13, Issue 1, 2017, Pages 27-36]
-
T. Hamza, Taher
Data Security Evaluation Based on Trend Line Rules Model [Volume 13, Issue 1, 2017, Pages 37-41]
Z
-
Z. Rashad, Magdi
Data Security Evaluation Based on Trend Line Rules Model [Volume 13, Issue 1, 2017, Pages 37-41]
Your query does not match with any item