Keyword Index

A

  • Accreditation Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
  • ACTEL and IS FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
  • Activation function Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
  • Activation Functions Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
  • Activation Functions A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
  • AES A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
  • Agile process ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • AI Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
  • AI AI-Driven Medical Imaging Platform: Advancements in Image Analysis and Healthcare Diagnosis [Volume 14, Issue 1, 2023]
  • Airport Check-in Systems Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
  • Algorithms HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • Annealing Schedule Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
  • Annealing Schedule Stochastic Simulated Annealing Algorithms using Different Annealing Schedules: An Analytical Approach [Volume 4, Issue 1, 2010, Pages 33-57]
  • Anomaly detection An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
  • Arabic language Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
  • Arabic Machine translation Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
  • Arabic Morphological analyzer Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
  • Arabic Natural Language Processing Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Arabic Natural Language Processing Towards an Arabic Question Answering system on the web [Volume 4, Issue 1, 2010, Pages 99-116]
  • Arabic Text Mining Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Arduino IoT- Based Design and Development Remote Drinking Water Quality Monitoring and Analysis System [Volume 13, Issue 1, 2022, Pages 32-41]
  • Artificial Immune Systems An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
  • Artificial Intelligence (AI) Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
  • Artificial Neural network (ANN) Skin Cancer Detection Using Convolutional Neural Network (CNN) [Volume 13, Issue 1, 2022, Pages 42-48]
  • Augment reality Reification of furnishings for interior design using Augmented Reality [Volume 14, Issue 1, 2023]
  • Auto-encoder A Real-Time Anomaly Detection in Satellite Telemetry Data Using Artificial Intelligence Techniques Depending on Time-Series Analysis [Volume 14, Issue 1, 2023]
  • Automatic image registration A Region Growing controlled by Edge Map technique (RGCE) for Automatic Registration of Satellite Images [Volume 10, Issue 1, 2019, Pages 113-125]

B

  • Backpropagation Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
  • Backpropagation A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
  • Bayes classifiers A Proposed Model to Allow Data Mining Classification Avoiding Privacy Concerns [Volume 1, Issue 1, 2007, Pages 95-118]
  • BCEL Practical View of Mobile Agent Obfuscation in Digital Cash System [Volume 1, Issue 1, 2007, Pages 81-94]
  • Behavioral/Predictive Analytics and Blockchain E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
  • Bert Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
  • Big Data E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
  • Big Data Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Biometric Identification Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Biometric Identification FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
  • Biometrics Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
  • Boolean Operation Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
  • Branch-and Bound method On the solution of stochastic multiobjective integer linear programming problems with a parametric study [Volume 3, Issue 1, 2009, Pages 71-82]
  • Business of translation Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
  • Business Process Reengineering A Practical Approach for Implementing Business Process Reengineering [Volume 1, Issue 1, 2007, Pages 15-24]

C

  • CCD images Cosmic Ray Background Detection and Removal from CCD Images using Neural Networks [Volume 14, Issue 1, 2023]
  • Chatbot Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
  • Chinese Remainder Theorem A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Chinese Remainder Theorem A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Chip cards Smart Cards Structure and Applications - Emerging and Evolution [Volume 11, Issue 1, 2020, Pages 77-92]
  • Classifier Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
  • Classifier, Feature extraction FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
  • Cloud Computing Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Collaborative filtering Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
  • Color Histogram Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
  • Combining features A Novel Ear Recognition Method Using Feature Combination [Volume 2, Issue 1, 2008, Pages 1-15]
  • Computer Aided Design and Modeling A Framework for Automatic Generation of Neural Models of Electron Devices [Volume 1, Issue 1, 2007, Pages 1-14]
  • Computer science education Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
  • Content based filtering Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
  • Convergence speed A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
  • Convolutional neural network Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Convolutional neural network (CNN) Skin Cancer Detection Using Convolutional Neural Network (CNN) [Volume 13, Issue 1, 2022, Pages 42-48]
  • Convolutional Neural Networks (CNNs) Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
  • Cover image Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
  • Cover image Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
  • COVID-19, Health informatics Design and Development of Mobile Application for Online Psychotherapy [Volume 13, Issue 1, 2022, Pages 63-77]
  • Cross-entropy Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
  • Cross language information retrieval Automated Construction of Arabic-English Parallel Corpus [Volume 3, Issue 1, 2009, Pages 57-69]
  • Cryptography A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Cryptography Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
  • Cryptography A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Cryptography A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
  • CS Curriculum Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
  • Custom Vision Service Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Cybersecurity An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]

D

  • Database Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Database design Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
  • Database system Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
  • Data mining Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Data mining Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
  • Data mining Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
  • Data mining Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
  • Data warehousing Metadata-Driven DSS Framework [Volume 2, Issue 1, 2008, Pages 49-71]
  • DCT FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
  • DCT HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
  • Decision support system Metadata-Driven DSS Framework [Volume 2, Issue 1, 2008, Pages 49-71]
  • Decision Tree On the Design of a DSS for Academic Achievement Prediction [Volume 8, Issue 1, 2014, Pages 45-59]
  • Decision Tree A comparative analysis of Techniques for Predicting Academic Performance [Volume 7, Issue 1, 2013, Pages 1-21]
  • Decision Tree Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
  • Decoder FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
  • Deep learning Convolutional Neural Network and its Applications in Artificial Intelligence [Volume 12, Issue 1, 2021, Pages 10-26]
  • Deep learning Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Deep learning Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
  • Deep learning A Real-Time Anomaly Detection in Satellite Telemetry Data Using Artificial Intelligence Techniques Depending on Time-Series Analysis [Volume 14, Issue 1, 2023]
  • Deep learning Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
  • Derivative filters Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Derivative filters FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
  • DES A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
  • Deterministic Annealing Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
  • Digital Cash Practical View of Mobile Agent Obfuscation in Digital Cash System [Volume 1, Issue 1, 2007, Pages 81-94]
  • Discrete Cosine Transform FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
  • Discrete Cosine Transform (DCT) A Novel Ear Recognition Method Using Feature Combination [Volume 2, Issue 1, 2008, Pages 1-15]
  • DNA A New Algorithm For Ssr Detection (Ssrs Finder) [Volume 12, Issue 1, 2021, Pages 64-74]
  • Dynamic equations on time scales Hyers-Ulam-Rassias Stability For Volterra Integral Equations on Time Scales [Volume 8, Issue 1, 2014, Pages 33-44]
  • Dynamic Time Warping Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]

E

  • Educational data mining Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
  • E-government E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
  • Embedded system Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
  • Embedding Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
  • Embedding Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
  • Encryption A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
  • ERP implementation approaches ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • ERP life cycle ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • Extraction Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
  • Extraction Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]

F

  • Face detection FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
  • Face detection HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • Face Recognition Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Face Recognition FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
  • Face Recognition LA2ENEE: Finding Lost People [Volume 13, Issue 1, 2022, Pages 20-31]
  • Fax Machine Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
  • Feature Extraction Feature Selection In Document Clustering Using Rough Set Theory [Volume 1, Issue 1, 2007, Pages 39-49]
  • Feature Extraction Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Feature Extraction FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
  • Feature Extraction HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
  • Feature extraction and Matching A Region Growing controlled by Edge Map technique (RGCE) for Automatic Registration of Satellite Images [Volume 10, Issue 1, 2019, Pages 113-125]
  • Feature Selection Feature Selection In Document Clustering Using Rough Set Theory [Volume 1, Issue 1, 2007, Pages 39-49]
  • Filters GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
  • FPGA FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]

G

  • Google mobile vision Mobile Phone cards recharge using OCR (Applied on android platform) [Volume 10, Issue 1, 2019, Pages 1-32]
  • GSM Network GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]

H

  • HAM10000 Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
  • Hand gesture recognition Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
  • Hand segmentation Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
  • HAND WRITING HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
  • Healthcare Diagnosis AI-Driven Medical Imaging Platform: Advancements in Image Analysis and Healthcare Diagnosis [Volume 14, Issue 1, 2023]
  • Histogram intersection Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
  • Hopfield Neural Network Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
  • Human-computer interaction Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
  • Human Computer Interaction (HCI) Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
  • Human Machine Interaction Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
  • Hu moments Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Hybrid Recommender Recommender System Approaches A Survey [Volume 11, Issue 1, 2020, Pages 30-38]
  • Hyers-Ulam- Rassias stability Hyers-Ulam-Rassias Stability For Volterra Integral Equations on Time Scales [Volume 8, Issue 1, 2014, Pages 33-44]

I

  • ICC Smart Cards Structure and Applications - Emerging and Evolution [Volume 11, Issue 1, 2020, Pages 77-92]
  • Image classification Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Image enhancement Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
  • Image processing FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
  • Image processing Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Image processing FACIAL FEATURE ORIENTED BANAN FILTERS [Volume 7, Issue 1, 2013, Pages 23-36]
  • Image processing HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
  • Image processing HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • Image processing Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
  • Image processing Cosmic Ray Background Detection and Removal from CCD Images using Neural Networks [Volume 14, Issue 1, 2023]
  • Indexing Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Industry certification Computer Science Curriculum and Industry Certification: Integrating Education with Practice [Volume 3, Issue 1, 2009, Pages 25-42]
  • Information Retrieval Towards an Arabic Question Answering system on the web [Volume 4, Issue 1, 2010, Pages 99-116]
  • Information Retrieval Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
  • Information Retrieval Enhancing Arabic Text Mining Using Linguistic Factors [Volume 5, Issue 1, 2011, Pages 49-62]
  • Intelligence security Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
  • Internet of Things A Survey on 5G Networks on IoT [Volume 10, Issue 1, 2019, Pages 67-77]
  • Internet of Things E-Governance Based on Evolution of Information, Data and Communication Technologies [Volume 12, Issue 1, 2021, Pages 27-35]
  • Internet of Things (IoT) Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
  • Intrusion detection and prevention Intrusion Detection System Using Data Mining Technique [Volume 4, Issue 1, 2010, Pages 59-75]
  • Intrusion detection and prevention An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
  • Ising Model Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]

K

  • Kalman filter Advanced Technique based on Nearest Neighbor for Tracking Closed Spaced Targets in Clutter [Volume 9, Issue 1, 2018, Pages 44-63]
  • Knowledge Discovery and Data Mining (KDDM) A Proposed Model to Allow Data Mining Classification Avoiding Privacy Concerns [Volume 1, Issue 1, 2007, Pages 95-118]
  • Kohonen’s algorithm Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]

L

  • Learning Analytics Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
  • Learning Rate and Neural Network Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
  • Learning Rates Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
  • Legacy Software Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
  • Legacy system ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • Legendre moments Face Recognition With Pre-Moment Processing [Volume 8, Issue 1, 2014, Pages 15-32]
  • Local Search Stochastic Simulated Annealing Algorithms using Different Annealing Schedules: An Analytical Approach [Volume 4, Issue 1, 2010, Pages 33-57]
  • Long short Term Memory (LSTM) A Real-Time Anomaly Detection in Satellite Telemetry Data Using Artificial Intelligence Techniques Depending on Time-Series Analysis [Volume 14, Issue 1, 2023]

M

  • Machine Learning Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Machine Translation Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
  • Marker-less Augmented Reality Reification of furnishings for interior design using Augmented Reality [Volume 14, Issue 1, 2023]
  • Mean Field annealing Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
  • Mean square error Classification of Multilayer Neural Networks Using Cross Entropy and Mean Square Errors [Volume 2, Issue 1, 2008, Pages 29-48]
  • Medical Imaging AI-Driven Medical Imaging Platform: Advancements in Image Analysis and Healthcare Diagnosis [Volume 14, Issue 1, 2023]
  • Melanoma Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
  • Metadata and Data Mart Metadata-Driven DSS Framework [Volume 2, Issue 1, 2008, Pages 49-71]
  • Metro Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
  • MNIST HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
  • Mobile agent Practical View of Mobile Agent Obfuscation in Digital Cash System [Volume 1, Issue 1, 2007, Pages 81-94]
  • MobileApp Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
  • Momentum Different Aspects for Enhancing The Backpropagation Neural Networks [Volume 1, Issue 1, 2007, Pages 63-79]
  • Multimedia A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Multimedia A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Multiobjective integer linear programming On the solution of stochastic multiobjective integer linear programming problems with a parametric study [Volume 3, Issue 1, 2009, Pages 71-82]
  • Multi-target Tracking Advanced Technique based on Nearest Neighbor for Tracking Closed Spaced Targets in Clutter [Volume 9, Issue 1, 2018, Pages 44-63]
  • MVC Architecture ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]

N

  • Natural Killer Cells An Artificial Immune System for Detecting Network Anomalies Using Hybrid Immune Theories [Volume 14, Issue 1, 2023]
  • NCBI A New Algorithm For Ssr Detection (Ssrs Finder) [Volume 12, Issue 1, 2021, Pages 64-74]
  • Network Security Cluster-Based Key Management in Wireless Sensor Networks [Volume 3, Issue 1, 2009, Pages 11-24]
  • Neural network Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
  • Neural Network applications A Framework for Automatic Generation of Neural Models of Electron Devices [Volume 1, Issue 1, 2007, Pages 1-14]
  • Neural Network Learning A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
  • Neural Networks A Comparative Approach to Accelerate Backpropagation Neural Network Learning using different Activation Functions [Volume 3, Issue 1, 2009, Pages 83-102]
  • Neural Networks HAND-WRITING RECOGNITION USING NEURAL MICRO-CLASSIFIERS NETWORK [Volume 9, Issue 1, 2018, Pages 91-107]
  • NLP Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
  • Node MCU ESP8266 Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]

O

  • Object modeling ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
  • OCR Exchanging Encrypted Documents Through Fax Machines [Volume 5, Issue 1, 2011, Pages 37-48]
  • OCR based snapshot recharge Mobile Phone cards recharge using OCR (Applied on android platform) [Volume 10, Issue 1, 2019, Pages 1-32]
  • Online Psychotherapy Design and Development of Mobile Application for Online Psychotherapy [Volume 13, Issue 1, 2022, Pages 63-77]
  • Opinion Mining A survey on Sentimental Analysis algorithms and techniques [Volume 10, Issue 1, 2019, Pages 99-112]

P

  • PCM FPGA Implementation of a PCM Decoder for Range Telemetry System with Block Code [Volume 2, Issue 1, 2008, Pages 73-84]
  • Pen Computing Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
  • Positioning GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
  • Precision Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Principle component analysis (PCA) A Novel Ear Recognition Method Using Feature Combination [Volume 2, Issue 1, 2008, Pages 1-15]
  • Probabilistic Encryption A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Probabilistic Encryption A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Psychology Services, Digital Transformation Design and Development of Mobile Application for Online Psychotherapy [Volume 13, Issue 1, 2022, Pages 63-77]
  • Public-key A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Public-key A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Public-Key encryption A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]

Q

  • Quadratic Residues A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Quadratic Residues A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Question-Answering Towards an Arabic Question Answering system on the web [Volume 4, Issue 1, 2010, Pages 99-116]

R

  • Radial Signature Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
  • Recall Improving Custom Vision cognitive services model [Volume 12, Issue 1, 2021, Pages 36-63]
  • Response Function Mean Field Annealing for Pattern Classification using different response functions: A Comparative Approach. [Volume 4, Issue 1, 2010, Pages 1-31]
  • RFID Tag and Reader Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
  • Robustness Analysis ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
  • Rough set theory Feature Selection In Document Clustering Using Rough Set Theory [Volume 1, Issue 1, 2007, Pages 39-49]
  • RSA A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
  • RSA and the Extended Euclidean Algorithm A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • RSA and the Extended Euclidean Algorithm A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]

S

  • SAR A Region Growing controlled by Edge Map technique (RGCE) for Automatic Registration of Satellite Images [Volume 10, Issue 1, 2019, Pages 113-125]
  • SAS Enterprise Miner 12.3 Academic Educational Data Mining predictive model for early detection of students at academic risk [Volume 9, Issue 1, 2018, Pages 21-42]
  • Satellite Images A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]
  • Secret message Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
  • Secret message Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]
  • Security via smart cards Smart Cards Structure and Applications - Emerging and Evolution [Volume 11, Issue 1, 2020, Pages 77-92]
  • Sentimental Analysis (SA) A survey on Sentimental Analysis algorithms and techniques [Volume 10, Issue 1, 2019, Pages 99-112]
  • Sentiment Analysis Sentiment Analysis Based on Bert for Amazon Reviewer [Volume 13, Issue 1, 2022, Pages 1-10]
  • Shape-Based Gesture Recognition Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
  • Signal Processing, propagation models GSM Mobile Positioning for Rescue and Law Enforcement [Volume 11, Issue 1, 2020, Pages 1-29]
  • Sign Language Recognition Arabic Sign language Recognition using Radial Signature and Dynamic Time Warping [Volume 7, Issue 1, 2013, Pages 97-115]
  • Skin Cancer Detection Skin Cancer Detection Using Deep Learning [Volume 14, Issue 1, 2023]
  • Skin Cancer(SC) Skin Cancer Detection Using Convolutional Neural Network (CNN) [Volume 13, Issue 1, 2022, Pages 42-48]
  • Skin color classification HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • Skin Color Modeling and Adaptation Real-time hand area segmentation for hand gesture recognition in desktop environment [Volume 10, Issue 1, 2019, Pages 49-66]
  • Skin detection HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • SLAM Reification of furnishings for interior design using Augmented Reality [Volume 14, Issue 1, 2023]
  • Smart Ticketing Smart Ticketing System in Metro Rail Using RFID Tag [Volume 13, Issue 1, 2022, Pages 11-19]
  • Social E-commerce network Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
  • Socio-Technical Systems Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
  • Software Architecture Comparison Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
  • Software Development Process ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
  • Software Engineering A Process Framework to Control the Time of Software Acceptance Testing [Volume 1, Issue 1, 2007, Pages 25-37]
  • Software Engineering ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]
  • Software Engineering ERP Implementation Approaches: A Comparative Study [Volume 5, Issue 1, 2011, Pages 1-20]
  • Software Engineering Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
  • Software Evolution Developing a software Architecture Comparison Analysis Method for Critical Systems at International Airports [Volume 4, Issue 1, 2010, Pages 78-98]
  • Software Testing A Process Framework to Control the Time of Software Acceptance Testing [Volume 1, Issue 1, 2007, Pages 25-37]
  • Soil Moisture Detector Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
  • Speech translation Machine translation status and its effect on business [Volume 10, Issue 1, 2019, Pages 33-48]
  • SSRs A New Algorithm For Ssr Detection (Ssrs Finder) [Volume 12, Issue 1, 2021, Pages 64-74]
  • Steganography Hide and Seek: A White Paper in Steganography [Volume 7, Issue 1, 2013, Pages 61-95]
  • Steganography A Stego-Crypto-Based Technique for Multimedia Transmission [Volume 5, Issue 1, 2011, Pages 21-36]
  • Steganography A Biometric Cryptographic System based on Fingerprint signature [Volume 9, Issue 1, 2018, Pages 1-19]
  • Steganography Hide and Seek: A White Paper in Steganography [Volume 11, Issue 1, 2020, Pages 39-70]

T

  • Tablet PC Tablet PC applications for education: database design using Hand-drawn ERD [Volume 3, Issue 1, 2009, Pages 43-55]
  • Temperature IoT- Based Design and Development Remote Drinking Water Quality Monitoring and Analysis System [Volume 13, Issue 1, 2022, Pages 32-41]
  • Text Summarization Automatic Summarization of Arabic Texts [Volume 3, Issue 1, 2009, Pages 1-10]
  • Texture Features FACE RECOGNITION BLOCK BASED STATICAL DCT AND TEXTURE [Volume 10, Issue 1, 2019, Pages 79-99]
  • Turbidity IoT- Based Design and Development Remote Drinking Water Quality Monitoring and Analysis System [Volume 13, Issue 1, 2022, Pages 32-41]
  • Twofish and blowfish A Robust Satellite Imagery On-Board Security System [Volume 9, Issue 1, 2018, Pages 77-89]

U

  • UML ICONIX Approach to MVC: Applying Robustness Analysis on the Model View Controller Architecture [Volume 7, Issue 1, 2013, Pages 37-59]

V

  • Videos frames HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • Viola- Jones HUMAN FACE DETECTION USING MOBILE PHONES [Volume 9, Issue 1, 2018, Pages 109-133]
  • Violation application Violations: Improving Egyptian Environmental Services Via AI technology [Volume 13, Issue 1, 2022, Pages 49-62]
  • Volterra Integral equations on time scales Hyers-Ulam-Rassias Stability For Volterra Integral Equations on Time Scales [Volume 8, Issue 1, 2014, Pages 33-44]

W

  • Web Mining Automated Construction of Arabic-English Parallel Corpus [Volume 3, Issue 1, 2009, Pages 57-69]
  • Web Mining Analysis of Social Media Networks based on Self-organizing Feature Maps Approach for Social E-commerce Networks [Volume 12, Issue 1, 2021, Pages 1-9]
  • WebSocket protocol Review of IOT_Smart Irrigation System using WebSocket Wireless Connection [Volume 14, Issue 1, 2023]
  • Wire less Sensor Networks Cluster-Based Key Management in Wireless Sensor Networks [Volume 3, Issue 1, 2009, Pages 11-24]
  • Workflow Management System A Practical Approach for Implementing Business Process Reengineering [Volume 1, Issue 1, 2007, Pages 15-24]