Abstract is missing.
- Performance Analysis of Selective Authentication Schemes for IPTV NetworksAhmad H. Al-Sharif, Khaled Y. Youssef, Mansour Hala A. K.. 2-7 [doi]
- Lightweight Cryptographic Algorithm : Variable Key Length Encryption Algorithm (VEA)Bassam. W. Aboshosha, Rabie A. Ramdan, Abdel-Moneim Wahdan. 8-13 [doi]
- Hybrid Trust Management Model for Cloud ComputingAya Salama A. Saleh, Essam M. Ramzy Hamed, Mohamed Hashem. 14-22 [doi]
- Aggregating Local Metrics for Global Trust Calculations in the TOR NetworkNada M. Abdel Aziem, Sherif F. Fahmy, Attallah I. Hashad. 23-31 [doi]
- An Advanced Data Security Algorithm Using cryptography and DNA-Based steganographyEssam M. Ramzy Hamed, Ayman E. Taha, Ahmed Imad Hammoodi. 32-38 [doi]
- Process Algebras, Reasoning, And ValidationNabil Hassan. 40-49 [doi]
- A Heuristic Quality-based Nurse Scheduling Algorithm for Emergency CentersRamy Refat, Ayman Taha, Samah Senbel. 50-56 [doi]
- Tracing Origins Of Unknown DNA/Protein Offspring Sequences On Multi-ProcessorsMohamed Issa, Ahmed Mansour Alzohairy. 57-61 [doi]
- Analytical Model for Service Response Time in Distributed SystemsAbdulhalim Dandoush, Mohamed Shaheen Elgamel. 62-67 [doi]
- Prevention Of DOM Based XSS Attacks Using A White List FrameworkKhaled Ali, Ayman Abdel-Hamid, Mohamed Kholief. 68-75 [doi]
- Visualizing Demographics Based on Micro-blogger Tracking: Twitter Case StudyKhaled Ahmed 0001, Neamat El-Tazi, Ahmad Hossny. 78-81 [doi]
- GIS-Based Decision Support System Using Analytical Hierarchy Process for Solar Cells Site Selection in Sinai Peninsula, EgyptHeba Abdu Al Aziz, Saleh Mesbah Elkaffas, Safaa M. Hassan, Ali Amasha. 82-87 [doi]
- Students' Attitudes toward Mobile Learning Adoption in Private University in EgyptTamer F. Abdelfattah, Ossama Esmail. 88-94 [doi]
- Multi-Agent based University Advising SystemMohamed Attia, Osama Badawy, Essam Kosba. 95-101 [doi]
- Measuring Organizations' readiness for Customer Relationship Management (CRM): A Comparative StudyMennatallah Ammar, Essam Kosba, Khaled Mahar. 102-107 [doi]
- Integrated Inductor Class-D Audio Amplifier Modeling & SimulationAbdelrahman Shalaby, Mohamed Orabi, El-Sayed Hasaneen. 109-113 [doi]
- Power System Disturbance Suppression Using Interval Type-2 Fuzzy Logic StabilizerO. E. Gouda, G. M. Amer, O. M. Salim, M. A. Hassan. 114-119 [doi]
- Using Genetic Algorithm to Improve the Performance of Sigma-Delta Converter Used on Earthquake Monitoring SystemsOmar Mohamed, Roshdy AbdelRassoul, Mahmoud Mohanna, Hamed Nofal. 120-126 [doi]
- Intelligent Look-ahead Controllers for Nonholonomic Mobile Robot ManipulatorAhmed F. Amer, Elsayed A. Sallam, Ibrahim A. Sultan. 127-132 [doi]
- Biologically Inspired Hierarchical Model for Traffic Sign RecognitionAmr Abdel Aziz, Ibrahim F. Imam, Amin Shoukry. 133-140 [doi]