Collection's Items (Sorted by Submit Date in Descending order): 481 to 500 of 505
| Issue Date | Title | Author(s) |
| 1-Dec-2013 | Comparison of 3D feature registration techniques for indoor mapping | Latif D. ; Salem M. ; Ramadan H. ; Roushdy M. |
| 1-Jan-2014 | 3D graph-based vision-SLAM registration and optimization | Doaa D. ; Salem M. ; Ramadan H. ; Roushdy M. |
| 1-Jan-2014 | Remote computer-aided breast cancer detection and diagnosis system based on cytological images | George Y. ; Zayed H. ; Roushdy M. ; Elbagoury B. |
| 1-Jan-2016 | Machine learning techniques for intelligent access control | Khalifa W. ; Roushdy M. ; Salem A. |
| 2-Feb-2016 | Large-scale ontology storage and query using graph database-oriented approach: The case of Freebase | Elbattah M. ; Roushdy M. ; Aref M. ; Salem, A.-B.M. |
| 9-May-2016 | Towards feature selection for cascade growth prediction on twitter | Elsharkawy S. ; Hassan G. ; Nabhan T. ; Roushdy M. |
| 1-Jun-2016 | Extended Case-Based Behavior Control for Multi-Humanoid Robots | Altaf M. ; Elbagoury B. ; Alraddady F. ; Roushdy M. |
| 1-Jan-2017 | FreebaseViz: Interactive exploration of freebase schema using query-driven visualisation | Elbattah M. ; Roushdy M. ; Aref M. ; Salem A. |
| 1-Jan-2017 | Exploiting existed medical ontologies to build domain ontology for hepatobiliary system diseases | Al-Marzoqi G. ; Alfonse, Marco ; Moawad I. ; Roushdy M. |
| 1-Jan-2017 | A proposed Real-Time EMG intelligent robot control algorithm based on swarm intelligence and neural networks | ElBagoury B. ; Al-Amri J. ; Roushdy M. |
| 17-Jan-2017 | A method for contactless palm ROI extraction | ElSayed A. ; Ebeid H. ; Roushdy M. ; Fayed Z. |
| 1-Dec-2011 | The gross interest: Service popularity aggregation | Hamdy ElEliemy, Mohamed ; König-Ries, B. |
| 1-Jan-2012 | A Novel Watermarking Approach for Data Integrity and Non-repudiation in Rational Databases | Zawawi N. ; El-Gohary R. ; Hamdy ElEliemy, Mohamed ; Tolba M. |
| 1-Jan-2014 | A large dataset enhanced watermarking service for cloud environments | Zawawi N. ; Hamdy ElEliemy, Mohamed ; El-Gohary R. ; Tolba M. |
| 1-Jan-2014 | Security issues on cloud data services | Zawawi N. ; M. Hamdy ; El-Gohary R. ; Tolba M. |
| 31-Oct-2014 | Cyber space security assessment case study | Said H. ; El Gohary R. ; Hamdy ElEliemy, Mohamed ; Salem A. |
| 1-Jan-2015 | Evaluation of mobile WiMAX IEEE 802.16e handover load balancing trends | Hamdy ElEliemy, Mohamed |
| 1-Jan-2015 | GPSIH: A generic IP-based scheme for identity hiding in MANETs | Mohsen Y. ; Hamdy ElEliemy, Mohamed ; Hashem M. |
| 1-Jan-2015 | Fast Forced Handover Technique for Load Balancing in Mobile WiMAX for Real-time Applications | Samy A. ; Hamdy ElEliemy, Mohamed ; Semary N. |
| 25-Jan-2016 | A comparison on VANET authentication schemes: Public Key vs. Symmetric Key | Ibrahim S. ; Hamdy ElEliemy, Mohamed |
Collection's Items (Sorted by Submit Date in Descending order): 481 to 500 of 505