Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 670
| Issue Date | Title | Author(s) |
| 5-Nov-2025 | SecureMind: Detect Online Phishing Using Machine Learning Techniques | Aziz, Abdullah Abdul; Saleh, Abdulrahman Adel; Aldoj, Imad Yaser; Elyass, Mohamed Elwathig; Dahesh, Ziyad Hesham; Awad, Ziyad Sayed; Shawki, Mostafa; Islam Hegazy |
| 25-Nov-2025 | A Unified Framework for AR Indoor Navigation and Conversational Information Retrieval in Smart Campus Environments | Magdy, Ahmed; Mohamed, Ahmed; Boghdady, Amr Ali; Achraf, Basily; Mohamed, Hassan; Abd-El-Hamid, Ziad; Ali, Samar; Islam Hegazy |
| 25-Nov-2025 | Machine Learning Approaches for Detecting Lung Cancer: A Review | Rayan, Zeina ; Islam Hegazy ; Roushdy M. ; Salem A. |
| 25-Nov-2025 | Chargetime Predictor: A Data-Driven Approach for Estimating Smartphone Charging Session Duration | Yusuf Awad; Islam Hegazy ; El-Sayed M. El-Horbaty |
| 2021 | ProGOMap: Automatic Generation of Mappings from Property Graphs to Ontologies | Fathy, N; Gad, W; Badr, N; Hashem, M. |
| 2021 | OntoUML Conceptual Model for Egyption E-Government : Student and Traveler Case Study | Shaimaa Haridy; Rasha M; Ismail; Nagwa Badr; Hashem, M. |
| 2021 | Predicting of Autism Spectrum Disorder using Gene Ontology | Ismail, E.; Hashem, Mohamed; Gad, W.; M. Hashem |
| 2011 | Exploring A Hybrid Of Geospatial Semantic Information In Ubiquitous Computing Environments | Raghda A. Fouad; Hashem, Mohamed; Nagwa Badr; Hashem, M. |
| 2010 | On Location -Centeric Semantic Information Retrieval In Ubiquitous Computing Enviroments | Raghda A. Fouad, N,; Hashem, M. ; Hanaa Talha; agwa Badr |
| 2013 | Securing relational databases with artificial immunity features | A.Mostafa,; Hashem, Mohamed; I El-Henawy; Hashem, M. |
| 2013 | Design And Implementation Of Extensible Service-Oriented Algorithms For Securing Relational Data Bases | A.Mostafa,; Hashem, Mohamed; I El-Henawy; M. Hashem |
| 2013 | Design And Implementation Of Multi-Layer Polices For Database Security | A.Mostafa; Hashem, Mohamed; I El-Henawy; Hashem, M. |
| 2012 | Interactive Multi-Layer Policies For Securing Relational Databases | M. Hashem ; I El-Henawy; A.Mostafa |
| 2012 | Database Security-Mechanics,T echniques, Breaches,And New Directions | Hashem, M. ; I El-Henaw; y,A.Mostafa |
| 2014 | Encoding To The Form Of Natural Amino Acids | Mona Sabry; Hashem, Mohamed; Tymor Nazmy,; Hashem, M. |
| 2007 | The Quest Of Accuracy In Applying Data Mining In Intrusion Detection Systems For Ad-Hoc Networks | M. Hashem ; M.S.Ghoniemy |
| 2006 | Usability Analysis Of Applying Data Mining In Intrusion Detection Systems For Ad-Hoc Wireless Networks | M.H AbdelAziz ; Bassel Hafiz,; M.S.Ghoniemy |
| 2010 | A New Novel Fidelity Digital Watermarking Adaptively Pixel Based on Medial Pyramid of Embedding Error in Spatial Domain of Robust | Aliwa, M. B; Hashem, Mohamed; El-Toboly, T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
| 2011 | A Novel Authenticated Digital Watermarking in Mobile Ad-Hoc Networks using ns-2 Simulator | Aliwa, M. B; Hashem, Mohamed; El-Toboly,T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
| 2010 | A New Novel Fidelity Digital Watermarking Based on Adaptively Pixel-Most-Significant-Bit-6 in Spatial Domain Gray Scale Images and Robust | Aliwa, M. B; Hashem, Mohamed; El-Toboly, T. E; Fahmy, M. M; Nasr, M. E; M.H AbdelAziz |
Collection's Items (Sorted by Submit Date in Descending order): 1 to 20 of 670