Journal: Egyptian Computer Science Journal

Volume 30, Issue 3

0 -- 0Hisham M. E. Abdelsalam. Local E-Government Maturity in Egypt: An Exploratory Evaluation
0 -- 0Emad M. Fawwaz, Mohamed M. Abd-Eldayem, Gamal Darwish. Model-Based Clustring Framework for Intrusion Detection in Ad Hoc Networks
0 -- 0Reda A. El-Khoribi, Mahmoud A. Ismail. Maximum Likelihood Decoding Of Linear Codes Using Particle Swarm Optimization Methods
0 -- 0Ibrahim El Henawy, M. Z. Rashad, L. M. Abou El-Maged. Speaker s Voice Features and Specification
0 -- 0Mahmoud Elgamal. Automatic Scale Selection for Iris Recognition
0 -- 0Ibrahim Elhenawy, Sherief Barakat, Nancy Awadallah. E-Payment: Threats and Security - Survey
0 -- 0Khalid Sami Husain. Examining the Relationship between Business Process Reengineering and Information Technology
0 -- 0Ahmed Yahya. A Multimedia Provision for Mobile Ad Hoc Networks
0 -- 0Haitham S. Hamza, Shasha Wu. Energy-Efficient End-To-End Routing Algorithm for Wireless Sensor Networks
1 -- 13Germano Vallesi, Anna Montesanto, Aldo Franco Dragoni. Bayesian Conditioning for estimating the relative degrees of Reliability in a group of Neural Networks engaged at Iris Biometric Identification
14 -- 25Mohamed Taha, Hamed Nassar, Tarek F. Gharib. ITARM: Incremental Temporal Association Rules Mining

Volume 30, Issue 2

0 -- 0Alaa El-Halees. A Comparative Study on Arabic Text Classification
0 -- 0I. M. El-Henawy, A. Mustafa, A. M. Atteya. Supervised Techniques For Linear And Nonlinear Principal Component Analysis
0 -- 0Mohamad M. Eassa, Ahmed S. Salama, Bahaa K. Saleh. A Secure Integrated Model For Mobile Agent Migration (SIMMAM)
0 -- 0Yasir Khalil Ibrahim, Yarob Adnan Istitieh. Master Lock Combination Cracker
0 -- 0Sherif A. Mazen, Sherif El-Henawy. A Framework for Auditing Software Coding & Database Integrity
0 -- 0Nabil Ahmed Sultan. The Evolution, Implementation, Promise and Politics of Web Services: An Analytical Overview
0 -- 0Adnan G. Abuarafah. An Adaptive Intelligent Agent Advisor for Java Programming Course
0 -- 0Hoda Waguih. Predicting Student Success: An Application of Data Mining Techniques in Higher Educational Systems
0 -- 0Nevine M. Labib. A Case-based Tutoring System for Managerial Education
0 -- 0Nevine M. Labib, Adel Ibrahim. Knowledge Discovery through Data and Text Mining An Application to Medical Applications
0 -- 0Ahmed El Demallawy, Ramadan Moawad. Design and Implementation of a Software Configuration Management Tool
0 -- 0Yousef Ajami Alotaibi. Automatic Recognition, Investigation, and Analysis of the Spoken Arabic Alphabet

Volume 30, Issue 1

1 -- 4Basim Alhadidi. Monolithic Code Analysis Using Numerical Pyramid Method
5 -- 13N. Krishnan, P. Vijayalakshmi, R. K. Selvakumar. Moving Object Detection in a Video and a Lossless Compression For Real Time Applications
14 -- 24Ehab Mostafa, Abdel Fatah A. Hegazy, Amr Badr. Automatic Mass Detection and Classification in Mammograms
25 -- 34Emad Abuelrub. Embedding Trees and Cycles into Crossed Cubes
35 -- 38Basim Alhadidi, Mohammad Alwedyan. Hybrid Stop-Word Removal Technique for Arabic Language
39 -- 51Mohamed M. Abd-Eldayem. A Proposed Wavelet Based Image Data Hiding Technique
52 -- 58Gamil Abdel Azim. Mapping the Three Matching Problem into Hopfield Neural Networks
59 -- 64I. A. Ismail, M. M. Abd El-kareem, N. A. Ali, E. Awadeen. Image Registration by Genetic Algorithms
65 -- 75Emad M. Fawwaz, Mohamed M. Abd-Eldayem. A Fisheye-Based Intrusion Detection System for Mobile Ad Hoc Networks
76 -- 89Galal H. Galal-Edeen. Information Systems Architecting
90 -- 94Reham Adel Ali, Galal H. Galal-Edeen, Mohamed Osama Khozium. Using a Pattern Approach for User Interface Design