عنوان البحث | ملخص البحث |
Performance evaluation and priority analysis of partially connected multiple-bus architectures | |
Improvement of 3-D Reconstruction by Deformal Stereo Matching using a Set of Linear Spatial Filters | |
Improvement 3-D Reconstruction Accuracy Considering Distortion in Stereovision Using a Set of Linear Spatial Filters, | |
Phase-based disparity estimation with implicit Foreshortening Correction | |
Improvement of 3-D Reconstruction by Deformal Stereo Matching using a Set of Linear Spatial Filters | |
Dense Depth Map Reconstruction by Phase Difference-based Algorithm Under Influence of Perspective Distortion | |
Dense Stereo Correspondence with Slanted Surface using Phase-based Algorithm | |
Gesture Recognition for Alphabets from Hand Motion Trajectory Using Hidden Markov Models | |
Regression test Selection technique based on dynamic behaviour | |
Detection and correction of deformed historical arabic manuscripts | |
egression test selection technique for multi-programming language | |
Secure Backup System hosted on a Storage Cloud | |
Evaluation of Modern Encryption Techniques on Cloud Computing | |
Constructing Java Code for Specification based Approach for Implementing Atomic Read/ Write Shared Memory in Mobile Ad Hoc Networks Using Fuzzy Logic | |
Constructing Semantic Web Form from Unstructured Web Page | |
Frequency domain: Efficient and high speed technology for video transmission | |
Fast diamond search algorithm for real time video coding | |
Modern Encryption Techniques for Cloud Computing-Randomness and Performance Testing | |
Specification–Based Approach for Implementing Atomic Read/ Write Shared Memory in Mobile Ad Hoc Networks Using Fuzzy Logic | |
Semantic Data Extraction from Infobox Wikipedia Template | |
Randomness testing of modern encryption techniques in cloud environment | |
Enhanced data security model for cloud computing | |
Evaluation of a Traditional Search Engine against a Semantic Search Engine Using User Effort Measurements | |
Data Security Model for Cloud Computing | |
Data Security Model for Cloud Computing | |
Synthetic based Validation of Segmentation of Handwritten Arabic Words | |
Sherif El-etriby, Ahmed Ghoneim, “ASM Based Synthesis of Handwritten Arabic Text Pages | |
CRFs and HCRFs based Recognition for Off-line Arabic Handwriting | |
3D Range Data Acquisition Using Structured Lighting and Accuracy Phase-Based Stereo Algorithm | |
High Speed On-Chip Multiple Cosine Transform Generator | |
Ontology-Based Context modelling for a Smart Living Room | |
Synthesis of Common Arabic Handwritings to Aid Optical Character Recognition Research | |
Agent-based Context-aware Architecture for a Smart Living Room | |
A Logic Based Context Modeling and Context-aware Services Adaptation for a Smart Office | |
Smart System for Investigation and Analysis of Crowd Behavior | |
A HYBRID MODULAR CONTEXT- AWARE SERVICES ADAPTATION FOR A SMART LIVING ROOM | |
Crowd Behavior Analysis Using Discriminative Models in Video Sequences | |
A Novel Approach for Crowd Behaviour Representation-Normal and Abnormal Event Detection | |
Context-aware Authentication Approach for Smartphones | |
Improving Intrusion Detection System using Artificial Neural Network | |
Stabilizing and Improving Training of Generative Adversarial Networks Through Identity Blocks and Modified Loss
Function | |
A Realistic and Practical Guide for Creating Intelligent Integrated Solutions in Higher Education Using Enterprise Architecture | |
Novel Framework for Generating Criminals Images Based On Textual Data Using Identity GANs | |
A novel wide scale well-baby clinic mobile application: An Egyptian pilot study | |
IGAN-based Augmentation and Segmentation of Brain Tumors: A robust Approach | |
Navigation Challenges in ERP Implementation Within Higher Education: Insights from the Egyptian Context and Proposed Mitigation Strategies | |