17
سنة النشر نوع النشر جهة النشر الناشر اسم البحث رقم البحث
2009محلى
Al Azhar Univ. Eng. Journal, Faculty of ENG. Al Azhar Univ
أ.د/ محمود السيد جاد الله
Image-Based Steganography Using Wavelet Transform
13
2009دولى
Int. Journal of Intillegent Computing and Inf. Science
أ.د/ محمود السيد جاد الله
Low Cost Training of HMM-Based Speech Recognition or Synthesis System with Low Size Arabic Labled Unsegmented Noisy Speech Database
14
2009دولى
International Journal of Computer and Electrical Engineering (IJCEE)
أ.د/ محمود السيد جاد الله
Improving Machine Translation using Hybrid Dictionary-Graph Based Word Sense Disambiguation with Semantic and Statistical Methods
15
2009محلى
6th Int. Conf. in Electrical Engineering, Military Technical College
أ.د/ محمود السيد جاد الله
Speech signal reconstruction from modified STFT Magnitude Spectra using homomorphic analysis/synthesis
16
2009محلى
6th Int. Conf. in Electrical Engineering, Military Technical College
أ.د/ محمود السيد جاد الله
INVESTIGATIN THE EFFECT OF SPEECH FEATURES AND THE NUMBER OF HMM MIXTURES IN THE QUALITY HMM-BASED SYNTHESIZERS
17
2009محلى
The 8th conference on Language Engineering
أ.د/ محمود السيد جاد الله
Word Sense disambiguation in Machine Translation Using Monolingual Corpus
18
2009دولى
International Conference on Cryptography, Coding
أ.د/ محمود السيد جاد الله
A 8Novel S-box Substitution Technique for AES Algorithm
19
2009دولى
1st international Conference computer Science from Algorithms to applications, CSAA
أ.د/ محمد شبل البلتاجى
A goal programming approach for finding the best compromise solution of multicriteria nonlinear programming problems under Fuzzy environment
20
2010دولى
1st international Conference computer Science from Algorithms to applications, CSAA
أ.د/ محمد شبل البلتاجى
Fuzzy Discrete Right-Hand Side Parameterization For Multiobjective Integer Linear Programming Problem
21
2010دولى
Int. J. Contemp. Math. Sciences
أ.د/ محمد شبل البلتاجى
On the solution of Fuzzy Multiobjective Integer Linear Fractional Programming problem
22
2010دولى
International Journal of Computer and Electrical Engineering (IJCEE), Published by: International Association of Computer Science and Information Technology Press (IACSIT)
أ.د/ محمود السيد جاد الله
THE EFFECT OF SPEECH FEATURES AND HMM PARAMETERS ON THE QUALITY OF HMM BASED ARABIC SYNTHESIS SYSTEM
23
2010دولى
Special Issue on Dental Research in Journal of Medical and Biological Engineering, an SCIE and EI journal
أ.د/ محمود السيد جاد الله
Non-invasive Technique for Human Carious Detection and Monitoring Using Time-resolved Photothermal Imaging
24
2010دولى
7th Int. Conf. on Electrical Engineering, ICEENG
أ.د/ محمود السيد جاد الله
Multi-stages Visualized Parallel Beam CT Reconstruction with Performance Evaluation
25
2010دولى
7th Int. Conf. on Electrical Engineering, ICEENG
أ.د/ محمود السيد جاد الله
Computerized EEG abnormalities Detection
26
2011دولى
Gen. Math. Notes, Vol.2No 1, January 2011, PP 1-17 ISSN 2219-7184, Copyright © ICSRS Publication
أ.د/ محمد شبل البلتاجى
An Algorithms Multiobjective Integer Linear Fractional Programming problem under Fuzziness
27
2011دولى
Special Issue on Biomedical Imaging in Journal of Medical and Biological Engineering, an SCIE and EI journal
أ.د/ محمود السيد جاد الله
Noninvasive, noncontacting frequency-domain photothermal radiometry of caries
28
2011دولى
4th International conf. On BioMedical Engineering and Informatics (BMEI’11), Shanghai, China
أ.د/ محمود السيد جاد الله
A Computer-based System for Safe Physical Fitness Evaluation
29
2011دولى
Journal of Biology and Medical Engineering, JMBE, Vol 31, No 6 (2011)
أ.د/ محمود السيد جاد الله
Non-intrusive and Non-contact Frequency-domain Photothermal Radiometry of Caries
30
2011دولى
STUDIA UNIV. BABES_{BOLYAI, INFORMATICA, Volume LVI
د. لمياء حسان عبد النبى
Protien Channel Formation in P Systems
31
2011دولى
International Journal of Computer and Electrical Engineering
د. لمياء حسان عبد النبى
A Fuzzy Genetic Based Classifier P System to Predict Cell Aging
32
2012دولى
ICCIEgypt Conference
أ.د/ محمود السيد جاد الله
Multiple Human-Robot Interfaces Over the Internet
33
2012دولى
5th International Conference on Biomedical Engineering and Informatics (BMEI), China
أ.د/ محمود السيد جاد الله
An Optimized Cardiovascular Model: A Pattern Search Approach
34
2012دولى
In International Journal of Advanced Computer Science and Applications (IJACSA)
د. وائل جمعه
Short Answer Grading Using String Similarity and Corpus-Based Similarity
35
2013دولى
International Journal of Computer Applications
د. وائل جمعه
Survey of Text Similarity Approaches
36
2014دولى
IEEE Mediterranean Electrotechnical Conference (MELECON)
د. عباس رستم
Applied signal processing (Audio Fingerprinting)_x000d_
Econometrics
37
2014دولى
IEEE Engineering in Medicine and Biology Magazine
د. شريف حسين
Simulation Augment reality cloud Computing in health
38
2014دولى
International Journal of Advanced Research in Computer Science and Software Engineering
د. صلاح زاهر
Cloud Computing
39
2014دولى
International Journal of Computer and Electrical Engineering
د. لمياء حسان عبد النبى
Hybrid technique of membrane computing and cloud computing
40
2014دولى
International Journal of Intelligent Computing and Information Science
د. أحمد إبراهيم
Ad Hoc Multicasting Protocol
41
2014دولى
Int. J. Contemp. Math. Sciences
أ.د/ محمد شبل البلتاجى
Multi – objective programming (Now Trends)
42
2014دولى
IEEE Transactions on Parallel and Distributed Systems
أ.د/ محمود السيد جاد الله
Massive parallel game search tree on GPU implemented on autonomous checkers robot
43
2014دولى
International Journal of Computer Applications , Vol. 96- No. 9, June, 2014,pp., 14-23
أ.د/ محمود السيد جاد الله
Parallel Fault Detection of Analogue Circuits
44
2013دولى
International Journal of Advanced Research in Computer Science and Software Engineering
د. لمياء حسان عبد النبى
Channel Blockers in Membrane Systems
45
2014دولى
International Journal of Computer Applications,Volume 92, No. 10, April 2014, 11-17
د. لمياء حسان عبد النبى
Deadlock Detection and Recovery in P Systems
46
2013دولى
International Journal of Computer Applications, 68(13):13-18, April 2013. Published by Foundation of Computer Science, New York, USA.
د. وائل جمعه
A Survey of Text Similarity Approaches
47
2014دولى
elsevier computer speech and language
د. وائل جمعه
Automatic scoring for answers to Arabic test questions
48
2014دولى
International Journal of Computer Applications, 86 (2): 35-41, January 2014. Published by Foundation of Computer Science, New York, USA.
د. وائل جمعه
Arabic Short Answer Scoring with Effective Feedback for Students
49
2014دولى
International Conference on Computer Network and Information Science 2014 (CNIS2014)
أ.د/ شريف محرم
A New Steganalysis Technique using Run Length Matrix (RLM)
50
2014دولى
International Journal of Emerging Technology and Advanced Engineering
د. صلاح زاهر
Performance Enhancement of Transmission Control Protocol over Wireless Ad-hoc Networks
51
2015دولى
16th International Conference on AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 16
أ.د/ محمود السيد جاد الله
New Digital Testing of Analogue Circuits
53
2014دولى
2014 IEEE
أ.د/ محمود السيد جاد الله
Enhanced Parallel NegaMax Tree Search Algorithm on GPU
54
2015دولى
International Journal of Computer Applications (IJCA)
د. صلاح زاهر
RSM in Combination with Genetic Algorithms
55
2015دولى
Journal of Computer Sciences and Applications
د. أحمد إبراهيم
Solution to Black Hole Attack in Ad Hoc on Demand Distance Vector Routing Protocol
56
2014دولى
International Journal of Advanced Computer Science and Applications
أ.د/ محمود السيد جاد الله
A Comparative Study of Game Tree Searching Methods
57
2014دولى
The 9th International Conference on INFOrmatics and Systems (INFOS2014)
أ.د/ محمود السيد جاد الله
Autonomous Checkers Robot Using Enhanced Massive Parallel Game Tree Search
58
2010دولى
Journal of the Advanced in Computer Science(ACS), Volume 4
أ.د/ شريف محرم
Intrusion Detection System using data mining technique
98
2010دولى
EGYPTION COMPUTER SCIENCE JOURNAL (ECS), Volume 34, number 5http://net2.shams.edu.eg/ecs/
أ.د/ شريف محرم
Towards Ontology-Based Adaptive Multilevel Model for Intrusion Detection and Prevention System (AMIDPS)
99
2012دولى
International Journal of Computer Science & Information Security (IJCSIS), Vol. 10, No .8_x000d_
http://sites.google.com/site/ijcsis/
أ.د/ شريف محرم
Phases vs. Levels using Decision Trees for Intrusion Detection Systems
100
2012دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume56/number7/8901-2928
أ.د/ شريف محرم
Adaptive Layered Approach using Machine Learning Techniques with Gain ratio for Intrusion Detection systems
101
2012دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume60/number9/9720-3879
أ.د/ شريف محرم
A Framework for Integrated Routing Protocols for Mobil Ad Hoc Network
102
2013دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org))_x000d_
http://www.ijcaonline.org/archives/volume61/number4/9918-4526
أ.د/ شريف محرم
Implementation of Intelligent Multi-Layer Intrusion Detection Systems (IMLIDS)
103
2013دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume66/number22/11247-5956
أ.د/ شريف محرم
Adaptive Layered Approach using C5.0 Decision Tree for Intrusion Detection Systems (ALIDS)
104
2013دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume66/number22/11248-6280
أ.د/ شريف محرم
Secured hierarchically dependent distributed database Model Applied to Hospitals Information System (HIS)
105
2013دولى
International Journal of Computer Applications - IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume80/number2/13832-0335
أ.د/ شريف محرم
The effect of Mobility Models on a Secured Enhanced and Reliable Ad Hoc Multicasting Protocol
106
2013دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume80/number3/13839-1268
أ.د/ شريف محرم
Healthcare Cloud Integration using Distributed Cloud Storage and Hybrid Image Compression
107
2013دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume83/number1/14413-2515
أ.د/ شريف محرم
Erroneous Classified Attack: A Time-Bomb
108
2014دولى
International Journal of Computer Applications -IJCA (www.ijcaonline.org)_x000d_
http://www.ijcaonline.org/archives/volume102/number4/17802-8617
أ.د/ شريف محرم
A Review on Steganalysis Techniques: From Image Format Point of View
109
2014دولى
International Journal of Advanced Computer Science and Applications - IJACSA (www.ijacsa.thesai.org)_x000d_
http://thesai.org/Publications/ViewPaper?Volume=5&Issue=9&Code=IJACSA&SerialNo=1
أ.د/ شريف محرم
Cloud Based Public Collaboration System in Developing Countries
110
2014دولى
International Journal of Scientific & Engineering Research – IJSER (http://www.ijser.org)_x000d_
International Journal of Scientific & Engineering Research, Volume 5, Issue 9, September-2014
أ.د/ شريف محرم
The Card Management System, CMS, The Multi-service, multi-agent Service Delivery System
111
2016دولى
european journal
أ.د/ محمود السيد جاد الله
revue europeenne de la recherche scientifique
189