default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2018
- Roshdy AbdelRassoul, Abd El-Menem Abd El-Bary, Aya Mohamed El-Ebshihy:
DNA Computing Modeling of HEMT transistor Noise Parameters. ICCTA 2018: 117-122 - Omar G. Abood, Saleh Mesbah, Shawkat K. Guirguis:
Enhancing AES Algorithm with DNA Computing. ICCTA 2018: 35-41 - Mohamed Abd El Hafez Bakr, Mohamed Amr Mokhtar, Ali El Sherbini Takieldeen:
Modified Elliptic Curve Cryptography in Wireless Sensor Networks Security. ICCTA 2018: 13-18 - Amr ElBanna, Noha M. Galal, Aziz E. El-Sayed:
Modeling Municipal Solid Waste Management System with Consideration of the Informal Sector. ICCTA 2018: 100-105 - AbdelMalek Mohamed ElBarrawy:
The Impact of Using Inbound Open Innovation Product Platforming by Egyptian SMEs on New Software Product Introduction. ICCTA 2018: 82-87 - Amr Elmestekawi, Ashraf Tammam, Hanady Hussien Issa:
Unclonable key Generator Based on Chip signature and SRAM-PUF of ATmega328P chip. ICCTA 2018: 24-29 - Ahmed Elsayed, Mohamed Shaheen, Osama Badawy:
Caching Techniques for Flight Delays Prediction in Big Data Using SparkR. ICCTA 2018: 48-53 - Ahmed R. Elshami, Aliaa Youssef, Mohamed Waleed Fakhr:
Multi-step Ahead Time Series Prediction via Bagging Trees Based Neighborhood. ICCTA 2018: 60-65 - Ahmed Ezzet, Ahmed El-Shenawy, Ezz Eldin Zakzouk:
A New Approach for Pressure Sore Prevention. ICCTA 2018: 112-116 - Mohmmed Foda, Alfonso Montella, Noureldin Sheta:
A Computer Simulator to Study the effect of the Spiral curves on driver's speed behavior on Two-Lane Rural Highway. ICCTA 2018: 138-142 - Michael Lahzi Gaid, Mohamed Waleed Fakhr, Gamal Ibrahim Selim:
Secure Translation Using Fully Homomorphic Encryption and Sequence-to-Sequence Neural Networks. ICCTA 2018: 30-34 - Hamdi Hassen, Walid Dabour, Maher Khemakhem:
Improving Performance of Robust and Efficient E-Learning Platform Using Distributed Computing Technologies for Saudi Arabia's Institutes. ICCTA 2018: 77-81 - Mohamad El Hawary:
Keynote Speech I: Microsoft AI. ICCTA 2018: 1 - Kawthar Karkouda, Ahlem Nabli, Faïez Gargouri:
CloudWar: A new schema for securing and querying data warehouse hosted in the cloud. ICCTA 2018: 6-12 - Amira Khattab, Mohamed Farag:
Application of pattern recognition algorithms in assessing phytoequivalency of phytomedicines using NMR metabolomics data: A case study of artichoke. ICCTA 2018: 134-137 - Nawel Kortas, Habib Youssef:
Evaluation of virtual machine scheduling algorithms within Cloud environment. ICCTA 2018: 42-47 - Lamiaa Mostafa, AbdelMalek Mohamed ElBarrawy:
Enhance Job Candidate Learning Path using Gamification. ICCTA 2018: 88-93 - Hussein T. Mouftah:
Keynote Speech II: Autonomous and Connected Electric Vehicles Deployment in Smart Cities. ICCTA 2018: 2 - Mohamed Sherif Nabil, Mohamed Misbah El-Khatib, Ashraf Tammam:
Neuro Fuzzy DC-DC Converter. ICCTA 2018: 106-111 - Farida Orabi, Essam Kosba, Walid Abdelmoez:
A Modified Multinomial Platform Architecture for Computer Adaptive Testing (CAT). ICCTA 2018: 72-76 - Mona Saad, Essam Kosba, Khaled Eskaf:
Gamified Mathematics Learning for K 12. ICCTA 2018: 94-98 - Firas Saidi, Zouheir Trabelsi, Henda Ben Ghézala:
Towards a Multidimensional Model for Terrorist Attacks Analysis and Mining. ICCTA 2018: 55-59 - Abdel-Badeeh M. Salem:
Keynote Speech IV: Knowledge Engineering Paradigms in Smart Education: Methodologies, Applications and Challenges. ICCTA 2018: 4 - Salma Khaled Shaheen, Essam El Fakharany:
Predictive analytics for loan default in banking sector using machine learning techniques. ICCTA 2018: 66-71 - Mohammed F. Suleiman, Biju Issac:
Performance Comparison of Intrusion Detection Machine Learning Classifiers on Benchmark and New Datasets. ICCTA 2018: 19-23 - Michael Gr. Voskoglou:
Keynote Speech III: Evaluating a System's Effectiveness with Approximate Data. ICCTA 2018: 3 - Michael Gr. Voskoglou:
Application of the Grey System Theory to Assessment with Approximate Data. ICCTA 2018: 123-128 - Hamdy M. Youssef, Alaa Abd-El-Bary:
Numerical Solution of One Dimensional Generalized Thermoelastic Problem by Using Adomian's Decomposition Method and Laplace's Transform Method. ICCTA 2018: 129-133 - 28th International Conference on Computer Theory and Applications, ICCTA 2018, Alexandria, Egypt, October 30 - November 1, 2018. IEEE 2018, ISBN 978-1-5386-9239-4 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-22 04:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint