| عنوان البحث | ملخص البحث |
| Performance evaluation and priority analysis of partially connected multiple-bus architectures | |
| Improvement of 3-D Reconstruction by Deformal Stereo Matching using a Set of Linear Spatial Filters | |
| Improvement 3-D Reconstruction Accuracy Considering Distortion in Stereovision Using a Set of Linear Spatial Filters, | |
| Phase-based disparity estimation with implicit Foreshortening Correction | |
| Improvement of 3-D Reconstruction by Deformal Stereo Matching using a Set of Linear Spatial Filters | |
| Dense Depth Map Reconstruction by Phase Difference-based Algorithm Under Influence of Perspective Distortion | |
| Dense Stereo Correspondence with Slanted Surface using Phase-based Algorithm | |
| Gesture Recognition for Alphabets from Hand Motion Trajectory Using Hidden Markov Models | |
| Regression test Selection technique based on dynamic behaviour | |
| Detection and correction of deformed historical arabic manuscripts | |
| egression test selection technique for multi-programming language | |
| Secure Backup System hosted on a Storage Cloud | |
| Evaluation of Modern Encryption Techniques on Cloud Computing | |
| Constructing Java Code for Specification based Approach for Implementing Atomic Read/ Write Shared Memory in Mobile Ad Hoc Networks Using Fuzzy Logic | |
| Constructing Semantic Web Form from Unstructured Web Page | |
| Frequency domain: Efficient and high speed technology for video transmission | |
| Fast diamond search algorithm for real time video coding | |
| Modern Encryption Techniques for Cloud Computing-Randomness and Performance Testing | |
| Specification–Based Approach for Implementing Atomic Read/ Write Shared Memory in Mobile Ad Hoc Networks Using Fuzzy Logic | |
| Semantic Data Extraction from Infobox Wikipedia Template | |
| Randomness testing of modern encryption techniques in cloud environment | |
| Enhanced data security model for cloud computing | |
| Evaluation of a Traditional Search Engine against a Semantic Search Engine Using User Effort Measurements | |
| Data Security Model for Cloud Computing | |
| Data Security Model for Cloud Computing | |
| Synthetic based Validation of Segmentation of Handwritten Arabic Words | |
| Sherif El-etriby, Ahmed Ghoneim, “ASM Based Synthesis of Handwritten Arabic Text Pages | |
| CRFs and HCRFs based Recognition for Off-line Arabic Handwriting | |
| 3D Range Data Acquisition Using Structured Lighting and Accuracy Phase-Based Stereo Algorithm | |
| High Speed On-Chip Multiple Cosine Transform Generator | |
| Ontology-Based Context modelling for a Smart Living Room | |
| Synthesis of Common Arabic Handwritings to Aid Optical Character Recognition Research | |
| Agent-based Context-aware Architecture for a Smart Living Room | |
| A Logic Based Context Modeling and Context-aware Services Adaptation for a Smart Office | |
| Smart System for Investigation and Analysis of Crowd Behavior | |
| A HYBRID MODULAR CONTEXT- AWARE SERVICES ADAPTATION FOR A SMART LIVING ROOM | |
| Crowd Behavior Analysis Using Discriminative Models in Video Sequences | |
| A Novel Approach for Crowd Behaviour Representation-Normal and Abnormal Event Detection | |
| Context-aware Authentication Approach for Smartphones | |
| Improving Intrusion Detection System using Artificial Neural Network | |
| Stabilizing and Improving Training of Generative Adversarial Networks Through Identity Blocks and Modified Loss
Function | |
| A Realistic and Practical Guide for Creating Intelligent Integrated Solutions in Higher Education Using Enterprise Architecture | |
| Novel Framework for Generating Criminals Images Based On Textual Data Using Identity GANs | |
| A novel wide scale well-baby clinic mobile application: An Egyptian pilot study | |
| IGAN-based Augmentation and Segmentation of Brain Tumors: A robust Approach | |
| Navigation Challenges in ERP Implementation Within Higher Education: Insights from the Egyptian Context and Proposed Mitigation Strategies | |