1 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
E-Voting Scheme Over The Internet, "E-Voting Scheme Over The Internet", 2006. E-Voting Scheme Over The Internet,vol., no., pp. - , 2006-12-01.
Read Abstract Read Research - Research type :
Conference
2 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Democracy In Egypt: Developing Secure E-Voting System, "Democracy In Egypt: Developing Secure E-Voting System", 2006. Democracy In Egypt: Developing Secure E-Voting System,vol.2, no.6, pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
3 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete , "Keystroke Biometrics For Web-Based E-Commerce Applications", 2006. The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete ,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
4 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
E-Voting Scheme Over The Internet, "E-Voting Scheme Over The Internet", 2006. E-Voting Scheme Over The Internet,vol., no., pp. - , 2006-12-01.
Read Abstract Read Research - Research type :
Conference
5 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Democracy In Egypt: Developing Secure E-Voting System, "Democracy In Egypt: Developing Secure E-Voting System", 2006. Democracy In Egypt: Developing Secure E-Voting System,vol.2, no.6, pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
6 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete , "Keystroke Biometrics For Web-Based E-Commerce Applications", 2006. The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete ,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
7 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
E-Voting Scheme Over The Internet, "E-Voting Scheme Over The Internet", 2006. E-Voting Scheme Over The Internet,vol., no., pp. - , 2006-12-01.
Read Abstract Read Research - Research type :
Conference
8 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Democracy In Egypt: Developing Secure E-Voting System, "Democracy In Egypt: Developing Secure E-Voting System", 2006. Democracy In Egypt: Developing Secure E-Voting System,vol.2, no.6, pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
9 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete , "Keystroke Biometrics For Web-Based E-Commerce Applications", 2006. The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete ,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
10 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
E-Voting Scheme Over The Internet, "E-Voting Scheme Over The Internet", 2006. E-Voting Scheme Over The Internet,vol., no., pp. - , 2006-12-01.
Read Abstract Read Research - Research type :
Conference
11 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Democracy In Egypt: Developing Secure E-Voting System, "Democracy In Egypt: Developing Secure E-Voting System", 2006. Democracy In Egypt: Developing Secure E-Voting System,vol.2, no.6, pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
12 - Topic : E-Business and E-Learning AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete , "Keystroke Biometrics For Web-Based E-Commerce Applications", 2006. The rapid growth of using different web-based e-commerce services over the internet shows the
need of reliable authentication technology to verify the identity of a person on a distant computer.
The traditional authentication technologies become obsolete ,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
13 - Topic : Modeling & Simulation AuthorAlaa El Din Ahmed Khalil
E.mekheal M.I. El-Singaby A.Khalil, "Robust Controller Design Using H∞ Loop-Shaping and Method of Inequalities", 2006. E.mekheal M.I. El-Singaby A.Khalil,vol.0, no.0, pp. - , 2006-07-09.
Read Abstract Read Research - Research type :
Conference
14 - Topic : Modeling & Simulation AuthorAmr Aly Hassan
A.Hassan and A. Sharara, "A Study of the performance of Stationary and Rotating Pocket Seals", 2006. A.Hassan and A. Sharara,vol.0, no.0, pp. - , 2006-12-27.
Read Abstract Read Research - Research type :
Conference
15 - Topic : Modeling & Simulation AuthorAmr Aly Hassan
Tarek Elsayed*, Amr Hassan*, Yasser Ahmed and Mohamed Darwish, "A Minimum Cost Design Approach of an ROV for Underwater Inspection", 2006. Tarek Elsayed*, Amr Hassan*, Yasser Ahmed and Mohamed Darwish,vol.0, no.0, pp. - , 2006-01-30.
Read Abstract Read Research - Research type :
Conference
16 - Topic : Modeling & Simulation AuthorEssam Eldien Fawzy Elfakharany
Single, "3D Visualization and Analysis of Filling Pattern in High-pressure Die-casting and Gravity Casting Based on 3-D Volume visualization technique", 2006. Single,vol.0, no.0, pp. - , 2006-01-01.
Read Abstract - Research type :
Conference
17 - Topic : Modeling & Simulation AuthorMohamed Aly Khamis El sayed
Mohamed A K Elsayed, "A novel technique in analyzing non-linear wave-wave interaction", 2006. Mohamed A K Elsayed,vol.0, no.0, pp. - , 2006-02-01.
Read Abstract - Research type :
Journal
18 - Topic : Modeling & Simulation AuthorMohamed Aly Khamis El sayed
Henry W. Tieleman, M.ASCE1 Mohamed A. K. Elsayed2 and Muhammad R. Hajj, M.ASCE3, "Peak Wind Load Comparison: Theoretical Estimates and ASCE 7", 2006. Henry W. Tieleman, M.ASCE1 Mohamed A. K. Elsayed2 and Muhammad R. Hajj, M.ASCE3,vol.0, no.0, pp. - , 2006-07-01.
Read Abstract - Research type :
Journal
19 - Topic : Modeling & Simulation AuthorMohamed Aly Khamis El sayed
Mohamed A.K. Elsayed, "Application of a Cross-Shore Profile Evolution Model to Barred Beaches", 2006. Mohamed A.K. Elsayed,vol.0, no.0, pp. - , 2006-05-05.
Read Abstract - Research type :
Journal
20 - Topic : Software Engineering AuthorKhaled Mohamed Mohamed Mahar
khaled maharahmed elderaa, "Software Project Estimation Model Using Function Point Analysis with CBR Support", 2006. khaled maharahmed elderaa,vol.0, no.0, pp. 508 - 512, 2006-02-01.
Read Abstract - Research type :
Conference
21 - Topic : Software Engineering AuthorWalid moahmed Rabae Abdel Moaz
W. M. Abdelmoez, K. Goseva-Popstojanova and H. H. Ammar,, "Methodology for maintainability-based risk assessment", 2006. W. M. Abdelmoez, K. Goseva-Popstojanova and H. H. Ammar,,vol.0, no.0, pp. - , 2006-08-28.
Read Abstract - Research type :
Conference
22 - Topic : Software Engineering AuthorWalid moahmed Rabae Abdel Moaz
I. Shaik W. Abdelmoez R. Gunnalan A. Mili C. Fuhrman M. Shereshevsky A. Zeid H.H. Ammar, "Using Change Propagation Probabilities to Assess Quality Attributes of Software Architectures", 2006. I. Shaik W. Abdelmoez R. Gunnalan A. Mili C. Fuhrman M. Shereshevsky A. Zeid H.H. Ammar,vol.0, no.0, pp. - , 2006-04-18.
Read Abstract - Research type :
Conference
23 - Topic : Software Engineering AuthorWalid moahmed Rabae Abdel Moaz
I. Shaik W. Abdelmoez R. Gunnalan M. Shereshevsky A. Zeid H.H. Ammar A. Mili C. Fuhrman, "Change Propagation for Assessing Design Quality of Software Architectures", 2006. I. Shaik W. Abdelmoez R. Gunnalan M. Shereshevsky A. Zeid H.H. Ammar A. Mili C. Fuhrman,vol.0, no.0, pp. - , 2006-04-24.
Read Abstract - Research type :
Conference
24 - Topic : Computer & Information Security AuthorAMMAR MOSTAFA HASSAN ALI AMMAR
Yassin MY Hasan, Ammar M Hassan, "Dual domain localized autorecovery image authentication", 2006. Yassin MY Hasan, Ammar M Hassan,vol.0, no.0, pp. - , 2006-05-02.
Read Abstract - Research type :
Conference
25 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Client-Authentication Via Lightweight Biometric Security, "Client-Authentication Via Lightweight Biometric Security", 2006. Client-Authentication Via Lightweight Biometric Security,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
26 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Enhancing Web-Authentication Through Keystroke Biometrics, "Enhancing Web-Authentication Through Keystroke Biometrics", 2006. Enhancing Web-Authentication Through Keystroke Biometrics,vol., no., pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
27 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in , "Secure E-Payment Using Multi-Agent Architecture", 2006. This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in ,vol., no., pp. - , 2006-09-01.
Read Abstract Read Research - Research type :
Conference
28 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Client-Authentication Via Lightweight Biometric Security, "Client-Authentication Via Lightweight Biometric Security", 2006. Client-Authentication Via Lightweight Biometric Security,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
29 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Enhancing Web-Authentication Through Keystroke Biometrics, "Enhancing Web-Authentication Through Keystroke Biometrics", 2006. Enhancing Web-Authentication Through Keystroke Biometrics,vol., no., pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
30 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in , "Secure E-Payment Using Multi-Agent Architecture", 2006. This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in ,vol., no., pp. - , 2006-09-01.
Read Abstract Read Research - Research type :
Conference
31 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Client-Authentication Via Lightweight Biometric Security, "Client-Authentication Via Lightweight Biometric Security", 2006. Client-Authentication Via Lightweight Biometric Security,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
32 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Enhancing Web-Authentication Through Keystroke Biometrics, "Enhancing Web-Authentication Through Keystroke Biometrics", 2006. Enhancing Web-Authentication Through Keystroke Biometrics,vol., no., pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
33 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in , "Secure E-Payment Using Multi-Agent Architecture", 2006. This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in ,vol., no., pp. - , 2006-09-01.
Read Abstract Read Research - Research type :
Conference
34 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Client-Authentication Via Lightweight Biometric Security, "Client-Authentication Via Lightweight Biometric Security", 2006. Client-Authentication Via Lightweight Biometric Security,vol., no., pp. - , 2006-08-01.
Read Abstract Read Research - Research type :
Conference
35 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Enhancing Web-Authentication Through Keystroke Biometrics, "Enhancing Web-Authentication Through Keystroke Biometrics", 2006. Enhancing Web-Authentication Through Keystroke Biometrics,vol., no., pp. - , 2006-06-01.
Read Abstract Read Research - Research type :
Conference
36 - Topic : Computer & Information Security AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in , "Secure E-Payment Using Multi-Agent Architecture", 2006. This paper investigates how multi-agents can digitally sign transactions in an untrusted
environment securely. We present an agent-based scenario for e-Payment and discuss techniques
using multiple agents that have been implemented to provide security in ,vol., no., pp. - , 2006-09-01.
Read Abstract Read Research - Research type :
Conference
37 - Topic : Image Processing & Pattern Recognition AuthorAMANY ANWAR AHMED SAAD
Rasha.A.Shokry, Amani A. Saad, Nagwa El-Makkey, and Mohamed A. Ismail, "Using New Soft Clustering Technique in Adaptive Web Site", 2006. Rasha.A.Shokry, Amani A. Saad, Nagwa El-Makkey, and Mohamed A. Ismail,vol.0, no.0, pp. - , 2006-12-01.
Read Abstract - Research type :
Conference
38 - Topic : Image Processing & Pattern Recognition AuthorEhab Farouk Badran
Ehab F. Badran, Ahmed Ghobashy, and Khamis El-Shennawy, "DCT-Based Digital Image Watermarking Via Image Segmentation Techniques", 2006. Ehab F. Badran, Ahmed Ghobashy, and Khamis El-Shennawy,vol.0, no.0, pp. - , 2006-12-10.
Read Abstract - Research type :
Conference
39 - Topic : Image Processing & Pattern Recognition AuthorYasmine Nagi Moustafa Saleh
Prof. Dr Magdy Saeb, Prof. Dr Yasser El Sonbaty, "VHDL-Based Simulation of a Parallel Implementation of a Phase-Based Algorithm for Optical Flow", 2006. Prof. Dr Magdy Saeb, Prof. Dr Yasser El Sonbaty,vol.0, no.0, pp. - , 2006-11-01.
Read Abstract - Research type :
Conference
40 - Topic : Image Processing & Pattern Recognition AuthorYASSER ALAAELDIN RIAD ELSONBATY
yasmine nagy, magdi saeb,yasser el-sonbaty, "VHDL-Based Simulation of a Parallel Implementation of a Phase-Based Algorithm for Optical Flow", 2006. yasmine nagy, magdi saeb,yasser el-sonbaty,vol.0, no.0, pp. - , 2006-01-02.
Read Abstract - Research type :
Conference
41 - Topic : Image Processing & Pattern Recognition AuthorYASSER ALAAELDIN RIAD ELSONBATY
yasmine nagy, magdi saeb,yasser el-sonbaty, "VHDL-Based Simulation of a Parallel Implementation of a Phase-Based Algorithm for Optical Flow", 2006. yasmine nagy, magdi saeb,yasser el-sonbaty,vol.0, no.0, pp. - , 2006-01-02.
Read Abstract - Research type :
Conference
42 - Topic : Computer Industrial Applications AuthorAmr Aly Hassan
Elsafty, A. F.* and Hassan, A. A., "Experimental and Numerical Investigation of Optimum location for FCU in an all-water Air conditioning system. ", 2006. Elsafty, A. F.* and Hassan, A. A.,vol.0, no.0, pp. - , 2006-01-04.
Read Abstract Read Research - Research type :
Conference
43 - Topic : Artificial Intelligence & Neural Networks AuthorKhaled Mohamed Mohamed Mahar
Khaled Mahar, "Automatic Generation Of University Timetables: An Evolutionary Approach", 2006. Khaled Mahar,vol.0, no.0, pp. 570 - 574, 2006-02-01.
Read Abstract - Research type :
Conference
44 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
I-AGENT: A System For Multi-Agent Interoperability, "I-AGENT: A System For Multi-Agent Interoperability", 2006. I-AGENT: A System For Multi-Agent Interoperability,vol., no., pp. - , 2006-03-01.
Read Abstract Read Research - Research type :
Conference
45 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Secure Mobile Agents, "Secure Mobile Agents", 2006. Secure Mobile Agents,vol., no., pp. - , 2006-03-01.
Read Abstract Read Research - Research type :
Conference
46 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Mobile Agent As A Digital Coin For Clone Detection And Double Spending Prevention, "Mobile Agent As A Digital Coin For Clone Detection And Double Spending Prevention", 2006. Mobile Agent As A Digital Coin For Clone Detection And Double Spending Prevention,vol.15, no.0, pp. 1 - 8, 2006-05-01.
Read Abstract Read Research - Research type :
Conference
47 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Hybrid Model For Agent-P2P E-Commerce Systems, "Hybrid Model For Agent-P2P E-Commerce Systems", 2006. Hybrid Model For Agent-P2P E-Commerce Systems,vol., no., pp. - , 2006-10-01.
Read Abstract Read Research - Research type :
Conference
48 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
I-AGENT: A System For Multi-Agent Interoperability, "I-AGENT: A System For Multi-Agent Interoperability", 2006. I-AGENT: A System For Multi-Agent Interoperability,vol., no., pp. - , 2006-03-01.
Read Abstract Read Research - Research type :
Conference
49 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Secure Mobile Agents, "Secure Mobile Agents", 2006. Secure Mobile Agents,vol., no., pp. - , 2006-03-01.
Read Abstract Read Research - Research type :
Conference
50 - Topic : Artificial Intelligence & Neural Networks AuthorMOHAMED MOHAMED ABDELFATTAH ABOURIZKA
Mobile Agent As A Digital Coin For Clone Detection And Double Spending Prevention, "Mobile Agent As A Digital Coin For Clone Detection And Double Spending Prevention", 2006. Mobile Agent As A Digital Coin For Clone Detection And Double Spending Prevention,vol.15, no.0, pp. 1 - 8, 2006-05-01.
Read Abstract Read Research - Research type :
Conference