Abstract is missing.
- Dynamic Code Loading to a Bare-metal Embedded TargetAndrew Sadek, Mohamed Elmahdy 0001, Tarek ElDeeb. 1-6 [doi]
- An Empirical Study with Function Point Analysis for Software Development Phase MethodJalal Shah, Nazri Kama, Saiful Adli Ismail. 7-11 [doi]
- Analysing Log Files For Web Intrusion Investigation Using HadoopMarlina Abdul Latib, Saiful Adli Ismail, Othman Mohd Yusop, Pritheega Magalingam, Azri Azmi. 12-21 [doi]
- Privacy-Preserving Personal Health Record (P3HR): A Secure Android ApplicationSaeed Samet, Mohd Tazim Ishraque, Anupam Sharma. 22-26 [doi]
- The Role of Ethnography in Agile Requirements AnalysisAli Meligy, Walid Dabour, Alaa Farhat. 27-31 [doi]
- Predicting the Survivors of the Titanic Kaggle, Machine Learning From DisasterNadine Farag, Ghada Hassan. 32-37 [doi]
- Using Fuzzy Logic in QCA for the Selection of Relevant IS Adoption Drivers in Emerging EconomiesNayeth I. Solorzano Alcivar, Luke Houghton, Louis Sanzogni. 38-43 [doi]
- Using SMOTE and Heterogeneous Stacking in Ensemble learning for Software Defect PredictionSara Adel El-Shorbagy, Wael Mohamed El-Gammal, Walid M. Abdelmoez. 44-47 [doi]
- Extraction of Egyptian License Plate Numbers and Characters Using SURF and Cross CorrelationAnn Nosseir, Ramy Roshdy. 48-55 [doi]
- Automatic Extraction of Arabic Number from Egyptian ID CardsAnn Nosseir, Omar Adel. 56-61 [doi]
- Automatic Identification and Classifications for Fruits Using k-NNAnn Nosseir, Seif Eldin Ashraf Ahmed. 62-67 [doi]
- Computer Aided Diagnosis System for Liver Cirrhosis Based on Ultrasound ImagesReham Rabie, Mohamed Meselhy Eltoukhy, Mohammad al-Shatouri, Essam A. Rashed. 68-71 [doi]
- Image Denoising Technique for CT Dose ModulationHaneen A. Elyamani, Samir Abou El-Seoud, Essam A. Rashed. 72-75 [doi]
- An Interactive Mixed Reality Imaging System for Minimally Invasive SurgeriesSamir Abou El-Seoud, Amr S. Mady, Essam A. Rashed. 76-80 [doi]
- A Computer-Aided Early Detection System of Pulmonary Nodules in CT Scan ImagesHanan M. Amer, Fatma E. Z. Abou-Chadi, Sherif S. Kishk, Marwa Ismael Obayya. 81-86 [doi]
- Directer: A Parallel and Directed Fuzzing based on Concolic ExecutionXiaobin Song, Zehui Wu, Yunchao Wang. 87-92 [doi]
- A New Approach for Implementing 3D Video Call on Cloud Computing InfrastructureNada Radwan, Mohamed B. Abdelhalim, Ashraf AbdelRaouf. 93-96 [doi]
- Interactive Mobile Learning Platform at the British University in EgyptIhab Adly, Mohamed Fadel, Ahmed El-Baz, Hani Amin. 97-101 [doi]
- A RESTful Architecture for Portable Remote Online Experimentation ServicesMohanad Odema, Ihab Adly, Ahmed El-Baz, Hani Amin. 102-105 [doi]
- Adaptive security scheme for real-time VoIP using multi-layer steganographyShourok AbdelRahim, Samy Ghoneimy, Gamal Selim. 106-110 [doi]
- Clickbait DetectionSuhaib R. Khater, Oraib H. Al-Sahlee, Daoud M. Daoud, M. Samir Abou El-Seoud. 111-115 [doi]
- Pedagogical and Elearning Logs Analyses to Enhance Students' PerformanceEslam Abou Gamie, M. Samir Abou El-Seoud, Mostafa A. Salama, Walid B. Hussein. 116-120 [doi]
- Efficient Architecture for Controlled Accurate Computation using AVXDiaaEldin M. Osman, Mohamed A. Sobh, Ayman M. Bahaa Eldin, Ahmad M. Zaki. 121-125 [doi]
- A Framework to Automate the generation of movies' trailers using only subtitlesEslam Amer, Ayman Nabil. 126-130 [doi]
- Example-Based English to Arabic Machine Translation: Matching Stage Using Internal Medicine PublicationsRana Ehab, Eslam Amer, Mahmoud Gadallah. 131-135 [doi]
- Positive and Negative Feature-Feature Correlation Measure: AddGainMostafa A. Salama, Ghada Hassan. 136-140 [doi]