default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2015
- Ahmed M. AbdelSalam, Ashraf B. El-Sisi, Vamshi Reddy K:
Mitigating ARP Spoofing Attacks in Software-Defined Networks. ICCTA 2015: 126-131 - Esam H. Abdelhameed, Tarek Hassan Mohamed, Makoto Iwasaki:
Modified Model Predictive Control for a Positioning Mechanism with Harmonic Drive Gear. ICCTA 2015: 64-70 - Asmaa S. Abdo, Rashed K. Salem, Hatem Mohamed Abdul-kader:
Efficient Dependable Rules Generation Approach for Data Quality Enhancement. ICCTA 2015: 91-96 - Ahmed Al-Baz, Ayman El-Sayed:
Energy-Aware Enhancement of LEACH Protocol in Wireless Sensor Network. ICCTA 2015: 144-149 - Abdelmgeid A. Ali, Ahmed H. Ismail:
PRNG Based Modified MSLDIP Watermarking. ICCTA 2015: 138-143 - Walid Mohamed Aly, Khaled Eskaf, Alyaa Aly:
Framework for Activity Recognition Using Smart Devices. ICCTA 2015: 34-38 - Ali Amasha, Dina El-Sayed Ibrahim, Safaa M. Hassan:
A GIS based-Modelling for Best Allocation of Voters Among Polling Centers: Elections in Egypt Case Study. ICCTA 2015: 97-105 - Saad M. Darwish, Maha M. Ghoneim:
A Novel 3D Image Fusion Approach Using FTransform. ICCTA 2015: 191-196 - Ibrahim M. El-Henawy, A. A. Ali, Kareem Ahmed, Hadeer Adel:
Novel Single Image deblurring Technique using Sparse representation and Discrete Radon Transform. ICCTA 2015: 179-184 - Asmaa H. Elsaid, Hamdy Ibrahim, Hatem Mohamed Abdul-kader:
Software Release Planning Models: A Comparative Study. ICCTA 2015: 78-83 - Ramadan Gad, M. Zorkany, Nawal A. El-Fishawy, Ayman El-Sayed:
FPGA Implementation of Iris Recognition Based on Fast DCT Coding. ICCTA 2015: 185-190 - Mootaz Ghazy, Mohab Hossam:
Effect of SLA Process Parameters on Part Build-Time. ICCTA 2015: 40-45 - Mohammad Hashem, Essam A. Rashed, Fatma Harby Mohamed:
An Elliptical Basis Function Network for Non-blind Image Deconvolution. ICCTA 2015: 197-201 - A. S. Hashwa, Nawal A. El-Fishawy, Sherin M. Youssef:
Evaluating Social Media Information Usage in Ranking the Web. ICCTA 2015: 84-90 - Hassan Wahbi Hassan, Amin A. Shoukry, Mahmoud Farouk:
Simple and Robust Design of A Neural-Based Ensemble Classifier. ICCTA 2015: 17-21 - Sabra Hechmi, Ezzeddine Zagrouba:
Improving Sparse Subspace Clustering Using Subsampled Randomized Hadamard Transform. ICCTA 2015: 2-8 - Dina A. Ibrahim, Elsayed A. Sallam, H. M. Abdalkader:
DNA-Based Data Hiding Using Variable Length Substitution Technique. ICCTA 2015: 132-137 - Menna Maged Kamel, Mohamed Waleed Fakhr, Hassan Ibrahim Saleh, Mohamed B. Abdelhalim:
Multiclass Object Recognition Using Object-based and Local Image Features Extractors. ICCTA 2015: 202-207 - Mai Mahmoud, Rasha Abd El Aziz:
Adapting Balanced Score Card (BSC) technique to assess the Egyptian Government Websites. ICCTA 2015: 72-77 - Gafary Mahmoud, Esam H. Abdelhameed, G. Shabib, Mahmoud A. Sayed:
Modeling and Simulation of MDF Bagasse Fiber Drying. ICCTA 2015: 46-51 - Karim Mahmoud, Hanafy Ismail, Mohamed Kholief:
ROEF: A Smart Search Engine of the 3rd Generation World Wide Web (WWW). ICCTA 2015: 118-125 - Hoda Elhamy Mohamed, Essam M. Hamed, Mohammad H. Abdel-Rahman:
An Enhanced Gene Silencing Algorithm Using Hash Table. ICCTA 2015: 172-178 - Ammar Mohammed, Rana Mohamed, Hesham A. Hefny:
Epistemic Hybrid Tree Logic. ICCTA 2015: 22-27 - Samuli Piipponen, Eero Hyry:
Mechanism Design with Computational Algebra. ICCTA 2015: 58-63 - S. A. Qunber, Mohamed Saad Zaghloul, Osama Badawy, M. Farouk:
Intelligent Collision Detection and Avoidance in Railways using GPS/RF Module. ICCTA 2015: 150-156 - Sameh Samir, Sherif F. Fahmy, Gamal Selim:
Lossless Image Compression Using Agglomerative Hierarchical Clustering and the Jensen-Shannon Divergence. ICCTA 2015: 167-171 - E. M. Shaban, AR. Hamed, R. R. Darwish, A. M. Abdel Ghany:
New Tuning Approach of Discrete PI/PID Controller Applied to Bitumen System Based on Non-Minimal State Space Formulation. ICCTA 2015: 52-57 - Fainan Nagy El Sisi, Abd El-Fatah Hegazy, Hatem Abdel Kader:
Opinion Mining Framework For News Reviews To Build Good Customer Loyalty. ICCTA 2015: 28-33 - George Sharmokh Wanas, Ali H. El-Bastawissy, Mona Ahmed Kadry:
Decreasing ERP Implementation Failure in Egypt. ICCTA 2015: 106-111 - Hamada M. Zahera, Ashraf B. Elsisi:
Accelerated Parallel Training of Logistic Regression using OpenCL. ICCTA 2015: 113-117
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-24 20:43 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint