EKB Journal Management System
Keywords = security
Number of Articles: 61

51

ARTIFICIAL NEURAL NETWORK AND C4.5 ALGORITHMS FOR TAMPER DETECTION MODEL OF HEALTHCARE APPLICATIONS IN INTERNET OF THINGS

Volume 17, Issue 3, July 2017, Page 51-63
lobna yehia; ashraf Darwish; Ahmed elngar; Ayman khedr

52

Safety and Security Measures in Egyptian Hotels

Volume 13, Issue 1, 2016, Page 165-190
Karam Mansour Ghazi

53

Enhancing Security in Affordable Housing Projects: The Case of Prince Fawaz Project

Volume 20, Issue 1, April 2016, Page 118-140
Maged Kamal Attia

54

SECURE MOBILE AGENT TRADER SYSTEM

Volume 16, Issue 1, January 2016, Page 71-88
S Koriem; R Hassaan

55

The role of private security companies in securing tourist facilities

Volume 11, Issue 3, 2014, Page 79-90
Hanaa Abdel Qader; Mohamed Farrag

56

Feature Extraction Algorithm for Real Time Object Tracking

Volume 14, AEROSPACE SCIENCES & AVIATION TECHNOLOGY, ASAT - 14 – May 24 - 26, 2011, May 2011, Page 1-14
A. M. Sallam; O. M. Elmowafy; R. A. Elbordany; A. M. Fahmy

57

SECUIRTY USING THE EFFICIENT PUBLIC KEY ENCRYPTION WITH KEYWORD SEARCH SYSTEM

Volume 39, No 3, May and June 2011, Page 607-624
B. MORGAN; M. HAMADA; G. ABDELFADEL

58

A customized 152 bit key DES algorithm

Volume 7, 7th International Conference on Electrical Engineering ICEENG 2010, May 2010, Page 1-13
Salah S. El Agooz; Essam Abd Elwanees Amer; Alan Eldin R. Shehata; Mahmoud Y. Ahmed

59

Security constrained optimal dispatch using ant colony optimization algorithm

Volume 7, 7th International Conference on Electrical Engineering ICEENG 2010, May 2010, Page 1-20
A. A. Abou El-Ela; A. M. Kinawy; R. A. El-Sehiemy; M. T. Mouwafi

60

SECURITY CONSTRAINED OPTIMAL POWER DISPATCH USING ANT COLONY OPTIMIZATION ALGORITHM

Volume 33, Issue 2, April 2010, Page 81-89
A. A. Abou El-Ela; A. M. Kinawy; M. T. Mouwafi; R. A. El-Sehiemy

61

Cluster-Based Key Management in Wireless Sensor Networks

Volume 3, Issue 1, 2009, Page 11-24

First Page Previous Page 1 2 3 Next Page Last Page