A
-
Accreditation
Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
-
ACTEL and IS
FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
-
Activation function
Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
-
Activation Functions
Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
-
Activation Functions
A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
-
AES
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
-
Agile process
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
AI
Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
-
AI
AI-Driven Medical Imaging Platform: Advancements in Image Analysis and Healthcare Diagnosis [Volume 14, Issue 1, 2023]
-
Airport Check-in Systems
Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
-
Algorithms
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
Annealing Schedule
Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
-
Annealing Schedule
Stochastic Simulated Annealing Algorithms using Different Annealing Schedules: An Analytical Approach [Volume 4, Issue 1, 2010, Pages 33-57]
-
Anomaly detection
An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
-
Arabic language
Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
-
Arabic Machine translation
Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
-
Arabic Morphological analyzer
Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
-
Arabic Natural Language Processing
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Arabic Natural Language Processing
Towards an Arabic Question Answering system on the web [Volume 4, Issue 1, 2010, Pages 99-116]
-
Arabic Text Mining
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Arduino
IoT- Based Design and Development Remote Drinking Water Quality Monitoring and Analysis System [Volume 13, Issue 1, 2022, Pages 32-41]
-
Artificial Immune Systems
An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
-
Artificial Intelligence (AI)
Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
-
Artificial Neural network (ANN)
Skin Cancer Detection Using Convolutional Neural Network (CNN) [Volume 13, Issue 1, 2022, Pages 42-48]
-
Augment reality
Reification of furnishings for interior design using Augmented Reality [Volume 14, Issue 1, 2023]
-
Auto-encoder
A Real-Time Anomaly Detection in Satellite Telemetry Data Using Artificial Intelligence Techniques Depending on Time-Series Analysis [Volume 14, Issue 1, 2023]
-
Automatic image registration
A Region Growing controlled by Edge Map technique (RGCE) for Automatic Registration of Satellite Images [Volume 10, Issue 1, 2019, Pages 113-125]
B
-
Backpropagation
Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
-
Backpropagation
A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
-
Bayes classifiers
A Proposed Model to Allow Data Mining Classification Avoiding Privacy Concerns [Volume 1, Issue 1, 2007, Pages 95-118]
-
BCEL
Practical View of Mobile Agent Obfuscation in Digital Cash System [Volume 1, Issue 1, 2007, Pages 81-94]
-
Behavioral/Predictive Analytics and Blockchain
E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
-
Bert
Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
-
Big Data
E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
-
Big Data
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Biometric Identification
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Biometric Identification
FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
-
Biometrics
Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
-
Boolean Operation
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
-
Branch-and Bound method
On the solution of stochastic multiobjective integer linear programming problems with a parametric study [Volume 3, Issue 1, 2009, Pages 71-82]
-
Business of translation
Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
-
Business Process Reengineering
A Practical Approach for Implementing Business Process Reengineering [Volume 1, Issue 1, 2007, Pages 15-24]
C
-
CCD images
Cosmic Ray Background Detection and Removal from CCD Images using Neural Networks [Volume 14, Issue 1, 2023]
-
Chatbot
Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
-
Chinese Remainder Theorem
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Chinese Remainder Theorem
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Chip cards
Smart Cards Structure and Applications - Emerging and Evolution [Volume 11, Issue 1, 2020, Pages 77-92]
-
Classifier
Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
-
Classifier, Feature extraction
FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
-
Cloud Computing
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Collaborative filtering
Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
-
Color Histogram
Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
-
Combining features
A Novel Ear Recognition Method Using Feature Combination [Volume 2, Issue 1, 2008, Pages 1-15]
-
Computer Aided Design and Modeling
A Framework for Automatic Generation of Neural Models of Electron Devices [Volume 1, Issue 1, 2007, Pages 1-14]
-
Computer science education
Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
-
Content based filtering
Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
-
Convergence speed
A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
-
Convolutional neural network
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Convolutional neural network (CNN)
Skin Cancer Detection Using Convolutional Neural Network (CNN) [Volume 13, Issue 1, 2022, Pages 42-48]
-
Convolutional Neural Networks (CNNs)
Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
-
Cover image
Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
-
Cover image
Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
-
COVID-19, Health informatics
Design and Development of Mobile Application for Online Psychotherapy [Volume 13, Issue 1, 2022, Pages 63-77]
-
Cross-entropy
Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
-
Cross language information retrieval
Automated Construction of Arabic-English Parallel Corpus [Volume 3, Issue 1, 2009, Pages 57-69]
-
Cryptography
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Cryptography
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
-
Cryptography
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Cryptography
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
-
CS Curriculum
Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
-
Custom Vision Service
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Cybersecurity
An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
D
-
Database
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Database design
Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
-
Database system
Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
-
Data mining
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Data mining
Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
-
Data mining
Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
-
Data mining
Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
-
Data warehousing
Metadata-Driven DSS Framework [Volume 2, Issue 1, 2008, Pages 49-71]
-
DCT
FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
-
DCT
HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
-
Decision support system
Metadata-Driven DSS Framework [Volume 2, Issue 1, 2008, Pages 49-71]
-
Decision Tree
On the Design of a DSS for Academic Achievement Prediction [Volume 8, Issue 1, 2014, Pages 45-59]
-
Decision Tree
A comparative analysis of Techniques for Predicting Academic Performance [Volume 7, Issue 1, 2013, Pages 1-21]
-
Decision Tree
Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
-
Decoder
FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
-
Deep learning
Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
-
Deep learning
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Deep learning
Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
-
Deep learning
A Real-Time Anomaly Detection in Satellite Telemetry Data Using Artificial Intelligence Techniques Depending on Time-Series Analysis [Volume 14, Issue 1, 2023]
-
Deep learning
Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
-
Derivative filters
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Derivative filters
FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
-
DES
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
-
Deterministic Annealing
Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
-
Digital Cash
Practical View of Mobile Agent Obfuscation in Digital Cash System [Volume 1, Issue 1, 2007, Pages 81-94]
-
Discrete Cosine Transform
FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
-
Discrete Cosine Transform (DCT)
A Novel Ear Recognition Method Using Feature Combination [Volume 2, Issue 1, 2008, Pages 1-15]
-
DNA
A New Algorithm For Ssr Detection (Ssrs Finder) [Volume 12, Issue 1, 2021, Pages 64-74]
-
Dynamic equations on time scales
Hyers-Ulam-Rassias Stability For Volterra Integral Equations on Time Scales [Volume 8, Issue 1, 2014, Pages 33-44]
-
Dynamic Time Warping
Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
E
-
Educational data mining
Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
-
E-government
E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
-
Embedded system
Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
-
Embedding
Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
-
Embedding
Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
-
Encryption
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
-
ERP implementation approaches
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
ERP life cycle
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
Extraction
Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
-
Extraction
Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
F
-
Face detection
FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
-
Face detection
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
Face Recognition
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Face Recognition
FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
-
Face Recognition
LA2ENEE: Finding Lost People [Volume 13, Issue 1, 2022, Pages 20-31]
-
Fax Machine
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
-
Feature Extraction
Feature Selection In Document Clustering Using Rough Set Theory [Volume 1, Issue 1, 2007, Pages 39-49]
-
Feature Extraction
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Feature Extraction
FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
-
Feature Extraction
HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
-
Feature extraction and Matching
A Region Growing controlled by Edge Map technique (RGCE) for Automatic Registration of Satellite Images [Volume 10, Issue 1, 2019, Pages 113-125]
-
Feature Selection
Feature Selection In Document Clustering Using Rough Set Theory [Volume 1, Issue 1, 2007, Pages 39-49]
-
Filters
GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
-
FPGA
FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
G
-
Google mobile vision
Mobile Phone cards recharge using OCR (Applied on android platform) [Volume 10, Issue 1, 2019, Pages 1-32]
-
GSM Network
GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
H
-
HAM10000
Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
-
Hand gesture recognition
Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
-
Hand segmentation
Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
-
HAND WRITING
HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
-
Healthcare Diagnosis
AI-Driven Medical Imaging Platform: Advancements in Image Analysis and Healthcare Diagnosis [Volume 14, Issue 1, 2023]
-
Histogram intersection
Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
-
Hopfield Neural Network
Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
-
Human-computer interaction
Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
-
Human Computer Interaction (HCI)
Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
-
Human Machine Interaction
Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
-
Hu moments
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Hybrid Recommender
Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
-
Hyers-Ulam- Rassias stability
Hyers-Ulam-Rassias Stability For Volterra Integral Equations on Time Scales [Volume 8, Issue 1, 2014, Pages 33-44]
I
-
ICC
Smart Cards Structure and Applications - Emerging and Evolution [Volume 11, Issue 1, 2020, Pages 77-92]
-
Image classification
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Image enhancement
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
-
Image processing
FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
-
Image processing
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Image processing
FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
-
Image processing
HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
-
Image processing
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
Image processing
Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
-
Image processing
Cosmic Ray Background Detection and Removal from CCD Images using Neural Networks [Volume 14, Issue 1, 2023]
-
Indexing
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Industry certification
Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
-
Information Retrieval
Towards an Arabic Question Answering system on the web [Volume 4, Issue 1, 2010, Pages 99-116]
-
Information Retrieval
Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
-
Information Retrieval
Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
-
Intelligence security
Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
-
Internet of Things
A Survey on 5G Networks on IoT [Volume 10, Issue 1, 2019, Pages 67-77]
-
Internet of Things
E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
-
Internet of Things (IoT)
Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
-
Intrusion detection and prevention
Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
-
Intrusion detection and prevention
An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
-
Ising Model
Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
K
-
Kalman filter
Advanced Technique based on Nearest Neighbor for Tracking Closed Spaced Targets in Clutter [Volume 9, Issue 1, 2018, Pages 44-63]
-
Knowledge Discovery and Data Mining (KDDM)
A Proposed Model to Allow Data Mining Classification Avoiding Privacy Concerns [Volume 1, Issue 1, 2007, Pages 95-118]
-
Kohonen’s algorithm
Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
L
-
Learning Analytics
Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
-
Learning Rate and Neural Network
Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
-
Learning Rates
Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
-
Legacy Software
Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
-
Legacy system
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
Legendre moments
Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
-
Local Search
Stochastic Simulated Annealing Algorithms using Different Annealing Schedules: An Analytical Approach [Volume 4, Issue 1, 2010, Pages 33-57]
-
Long short Term Memory (LSTM)
A Real-Time Anomaly Detection in Satellite Telemetry Data Using Artificial Intelligence Techniques Depending on Time-Series Analysis [Volume 14, Issue 1, 2023]
M
-
Machine Learning
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Machine Translation
Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
-
Marker-less Augmented Reality
Reification of furnishings for interior design using Augmented Reality [Volume 14, Issue 1, 2023]
-
Mean Field annealing
Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
-
Mean square error
Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
-
Medical Imaging
AI-Driven Medical Imaging Platform: Advancements in Image Analysis and Healthcare Diagnosis [Volume 14, Issue 1, 2023]
-
Melanoma
Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
-
Metadata and Data Mart
Metadata-Driven DSS Framework [Volume 2, Issue 1, 2008, Pages 49-71]
-
Metro
Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
-
MNIST
HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
-
Mobile agent
Practical View of Mobile Agent Obfuscation in Digital Cash System [Volume 1, Issue 1, 2007, Pages 81-94]
-
MobileApp
Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
-
Momentum
Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
-
Multimedia
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Multimedia
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Multiobjective integer linear programming
On the solution of stochastic multiobjective integer linear programming problems with a parametric study [Volume 3, Issue 1, 2009, Pages 71-82]
-
Multi-target Tracking
Advanced Technique based on Nearest Neighbor for Tracking Closed Spaced Targets in Clutter [Volume 9, Issue 1, 2018, Pages 44-63]
-
MVC Architecture
ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
N
-
Natural Killer Cells
An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
-
NCBI
A New Algorithm For Ssr Detection (Ssrs Finder) [Volume 12, Issue 1, 2021, Pages 64-74]
-
Network Security
Cluster-Based Key Management in Wireless Sensor Networks [Volume 3, Issue 1, 2009, Pages 11-24]
-
Neural network
Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
-
Neural Network applications
A Framework for Automatic Generation of Neural Models of Electron Devices [Volume 1, Issue 1, 2007, Pages 1-14]
-
Neural Network Learning
A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
-
Neural Networks
A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
-
Neural Networks
HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
-
NLP
Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
-
Node MCU ESP8266
Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
O
-
Object modeling
ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
-
OCR
Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
-
OCR based snapshot recharge
Mobile Phone cards recharge using OCR (Applied on android platform) [Volume 10, Issue 1, 2019, Pages 1-32]
-
Online Psychotherapy
Design and Development of Mobile Application for Online Psychotherapy [Volume 13, Issue 1, 2022, Pages 63-77]
-
Opinion Mining
A survey on Sentimental Analysis algorithms and techniques [Volume 10, Issue 1, 2019, Pages 99-112]
P
-
PCM
FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
-
Pen Computing
Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
-
Positioning
GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
-
Precision
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Principle component analysis (PCA)
A Novel Ear Recognition Method Using Feature Combination [Volume 2, Issue 1, 2008, Pages 1-15]
-
Probabilistic Encryption
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Probabilistic Encryption
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Psychology Services, Digital Transformation
Design and Development of Mobile Application for Online Psychotherapy [Volume 13, Issue 1, 2022, Pages 63-77]
-
Public-key
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Public-key
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Public-Key encryption
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
Q
-
Quadratic Residues
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Quadratic Residues
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Question-Answering
Towards an Arabic Question Answering system on the web [Volume 4, Issue 1, 2010, Pages 99-116]
R
-
Radial Signature
Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
-
Recall
Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
-
Response Function
Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
-
RFID Tag and Reader
Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
-
Robustness Analysis
ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
-
Rough set theory
Feature Selection In Document Clustering Using Rough Set Theory [Volume 1, Issue 1, 2007, Pages 39-49]
-
RSA
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
-
RSA and the Extended Euclidean Algorithm
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
RSA and the Extended Euclidean Algorithm
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
S
-
SAR
A Region Growing controlled by Edge Map technique (RGCE) for Automatic Registration of Satellite Images [Volume 10, Issue 1, 2019, Pages 113-125]
-
SAS Enterprise Miner 12.3
Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
-
Satellite Images
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
-
Secret message
Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
-
Secret message
Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
-
Security via smart cards
Smart Cards Structure and Applications - Emerging and Evolution [Volume 11, Issue 1, 2020, Pages 77-92]
-
Sentimental Analysis (SA)
A survey on Sentimental Analysis algorithms and techniques [Volume 10, Issue 1, 2019, Pages 99-112]
-
Sentiment Analysis
Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
-
Shape-Based Gesture Recognition
Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
-
Signal Processing, propagation models
GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
-
Sign Language Recognition
Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
-
Skin Cancer Detection
Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
-
Skin Cancer(SC)
Skin Cancer Detection Using Convolutional Neural Network (CNN) [Volume 13, Issue 1, 2022, Pages 42-48]
-
Skin color classification
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
Skin Color Modeling and Adaptation
Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
-
Skin detection
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
SLAM
Reification of furnishings for interior design using Augmented Reality [Volume 14, Issue 1, 2023]
-
Smart Ticketing
Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
-
Social E-commerce network
Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
-
Socio-Technical Systems
Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
-
Software Architecture Comparison
Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
-
Software Development Process
ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
-
Software Engineering
A Process Framework to Control the Time of Software Acceptance Testing [Volume 1, Issue 1, 2007, Pages 25-37]
-
Software Engineering
ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
-
Software Engineering
ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
-
Software Engineering
Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
-
Software Evolution
Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
-
Software Testing
A Process Framework to Control the Time of Software Acceptance Testing [Volume 1, Issue 1, 2007, Pages 25-37]
-
Soil Moisture Detector
Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
-
Speech translation
Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
-
SSRs
A New Algorithm For Ssr Detection (Ssrs Finder) [Volume 12, Issue 1, 2021, Pages 64-74]
-
Steganography
Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
-
Steganography
A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
-
Steganography
A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
-
Steganography
Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
T
-
Tablet PC
Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
-
Temperature
IoT- Based Design and Development Remote Drinking Water Quality Monitoring and Analysis System [Volume 13, Issue 1, 2022, Pages 32-41]
-
Text Summarization
Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
-
Texture Features
FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
-
Turbidity
IoT- Based Design and Development Remote Drinking Water Quality Monitoring and Analysis System [Volume 13, Issue 1, 2022, Pages 32-41]
-
Twofish and blowfish
A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
U
-
UML
ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
V
-
Videos frames
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
Viola- Jones
HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
-
Violation application
Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
-
Volterra Integral equations on time scales
Hyers-Ulam-Rassias Stability For Volterra Integral Equations on Time Scales [Volume 8, Issue 1, 2014, Pages 33-44]
W
-
Web Mining
Automated Construction of Arabic-English Parallel Corpus [Volume 3, Issue 1, 2009, Pages 57-69]
-
Web Mining
Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
-
WebSocket protocol
Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
-
Wire less Sensor Networks
Cluster-Based Key Management in Wireless Sensor Networks [Volume 3, Issue 1, 2009, Pages 11-24]
-
Workflow Management System
A Practical Approach for Implementing Business Process Reengineering [Volume 1, Issue 1, 2007, Pages 15-24]
Your query does not match with any item