|
| | Issue Date | Title | Author(s) |
| 81 | 13-Jun-2022 | Gray-scale Image Encryption using DNA Operations | Nada H. Sharkawy; Afify, Yasmine M. ; Gad, Walaa ; Badr, Nagwa |
| 82 | Feb-2016 | Handbook of Research on Cloud Services Publication and Discovery | Afify, Yasmine M. ; Moawad, Ibrahim F.; Badr, Nagwa ; Tolba, Mohamed F. |
| 83 | 28-Jan-2018 | A hybrid model to predict proteins tertiary structure | Yousef M. ; Abdelkader, Tamer ; Elbahnasy K. |
| 84 | 2011 | Hybrid Multi-level Intrusion Detection Systems | Sahar Slim; Mohamed H. Abd El-Aziz ; Taymoor M. Nazmy |
| 85 | 2022 | A Hybrid Recommender System Combining Collaborative Filtering with Utility Mining | fouad, mohammed; Hussein, Wedad ; Rady, Sherine ; S. Yu, Philip; Gharib, Tarek |
| 86 | 2005 | Improving Cluster Homogeneity and Separation In Clustering Gene Expression Patterns | Hashem, Mohamed; M.Mounir; M.Siam,; M.El Sharkawy,; Hashem, M. |
| 87 | 1-Jun-2019 | Integrity and Confidentiality in Cloud Outsourced Data | Rady, Mai; Abdelkader, Tamer ; Rasha Ismail |
| 88 | 2023 | An Intelligent Decision Support System for Forecasting Financially Distressed Businesses | Abdul-kareem, Ahmed Amer; Taha Fayed, Zaki; Rady, Sherine ; El-Regaily, Salsabil Amin; Nema, Bashar M. |
| 89 | 2006 | Intelligent Detection and Modelling of Computer Viruses | Mohamed Hashem |
| 90 | 2012 | Interactive Multi-Layer Policies For Securing Relational Databases | M. Hashem ; I El-Henawy; A.Mostafa |
| 91 | 2009 | Intrusion Detection in VoIP/SIP Denial of Service attacks | H.Al-Allouni; A. Rohiem; A. El-moghazy; M. Hashem |
| 92 | 2010 | Intrusion Detection Using Multi-Stage Neural Network | Sahar Slim; Taymoor M. Nazmy; Mohamed Hashem |
| 93 | 1-Jan-2020 | Learners on Focus: Visualizing analytics through an integrated model for learning analytics in adaptive gamified e-learning | Maher, Yara; Sherin M. Moussa ; khalifa, mohamed essam |
| 94 | 2020 | Learning Preferences Adaptation Based on The Personalized Adaptive Gamified E-Learning (PAGE) Model | S. M. Moussa ; Maher, Yara; khalifa, mohamed essam |
| 95 | 2010 | Lightweight Distance Bound Protocol for Low cost RFID Tags | Mohamed Hashem |
| 96 | 1-Jan-2014 | A localized adaptive strategy to calculate the backoff interval in contention-based vehicular networks | Abdelkader, Tamer ; Naik K. |
| 97 | 1-Jan-2009 | A lossless compression algorithm for DNA sequences | Soliman, Taysir H.A.; Gharib, Tarek F.; Abo-alian, Alshaimaa ; El Sharkawy, M. A. |
| 98 | 30-Sep-2022 | MACHINE LEARNING PREDICTION OF HEPATIC FIBROSIS IN HEPATITIS B EGYPTIAN PATIENTS BASED ON CLINICAL LABORATORY PARAMETERS | Sharshar, Eslam Taher; Amin Maghawry, Huda ; Abdelsameea, Eman; Badr, Nagwa |
| 99 | 9-May-2016 | Machine learning techniques for mining location-based social networks for business predictions | Al Sonosy, Ola; Rady, Sherine ; Badr, Nagwa ; Hashem, Mohamed |
| 20 | 1-May-2016 | Machine-to-Machine (M2M) communications: A survey | Verma P. ; Verma R. ; Prakash A. ; Agrawal A. ; Naik K. ; Tripathi R. ; Alsabaan M. ; Khalifa T. ; Abdelkader, Tamer ; Abogharaf A. |