EKB Journal Management System
Volume & Issue: Volume 8, 8th International Conference on Electrical Engineering ICEENG 2012, May 2012  XML

26

A Threshold Revocation Scheme For Mobile Ad Hoc Networks

Page 1-7
Fatma Elsayed; Hisham Dahshan; Alaa Eldin Rohiem; Ali Elmoghazy

27

Performance Analysis of M-ary DPSK over VHF air-to-ground Communication Channel

Page 1-13
Amr Aly Nagy; Gamal Mabrouk Abdel-Hamid; Ahmed E. Abdalla

28

HANK-1 ,A new Efficient and Secure Block Cipher Algorithm for Limited Resources Devices

Page 1-12
Hazem Mostafa Eldeeb; Khaled Ali Shehata; Nabil Hamdy Shaker; Ahmed Ali Abdel Hafez

29

A Newly Proposed Routing Protocol for Wireless Mesh Networks (WMNs)

Page 1-30
Marw. M. Khashaba; Fathy. A. Amer; Nabil. A. Lashin

30

Hybrid Database Performance Evaluation Achieving Security

Page 1-14
Wasim Khalil Shalish; A. Z. Ghalwash; H. M. El-Deeb; K. Badran

31

INS Alignment Using Onboard Computer Software for Missile Trajectory

Page 1-13
Ibrahim Ismail Arafa; Ahmed Mohsen; A. Elboraee

32

Strap down INS Alignment Using Non-Linear Model for Large Azimuth Misalignment

Page 1-14
Ibrahim Ismail Arafa; Ahmed Mohsen

33

Toward high-speed level-crossing ADCs

Page 1-8
Mohamed Abbas

34

The effects of harmonic distortions on transformers

Page 1-7
Hafez Elsalmawy; Kamelia Youssef; Shereen Abdulla; Iman Ahmed

35

Low voltage low power programmable logic gate based on SE-MOSFET

Page 1-7
Soha Ahmed; Hesham F. A. Hamed; E. A. M. Hasaneen

36

Adaptive distance protection of a double circuit transmission line

Page 1-15
D. A. Zaki; N. H. El-Amary; A. Y. Abdelaziz; M. M. Mansour

37

Experimental testing of the neural network based protection of synchronous generators

Page 1-10
A. Helal, H. El Dessouki; M. El-Saadawi; M. Tantawy; A. Hatata

38

Analysis of false tripping for power transformers in Egypt

Page 1-10
M. Abdelfatah; M. EL-Shimy; H. M. Ismail

39

An efficient power differential scheme for power transformer protection

Page 1-11
Eman S. Ahmed; Ragab A. El-Sehiemy

40

A Novel S-box Substitution Technique for AES Algorithm

Page 1-15
Faiz Yousif Mohamed; M. E. Gadallah; Alaa Eldin Rohiem; Ashraf Diaa Elbayoumy

41

An Efficient Location based Hybrid and Dynamic Key Management Scheme for SurvSec Security Architecture

Page 1-20
Mohamed Helmy Megahed; Dimitrios Makrakis

42

An Efficient Overlapped Groups based Compromised Nodes Detection at First Stage for WSN

Page 1-14
Mohamed Helmy Megahed; Dimitrios Makrakis

43

Key Partitioning Cryptanalysis of Reduced Rounds AES Algorithm Variant

Page 1-11
Amr M. Ashry; AlaaEl-Din R. Shehata; Ashraf D. El-Bayoumy

44

A Modified Kerberos Authentication Scheme Using Public Key Cryptography

Page 1-10
Khaled Mohamed Khairy; Ahmed Abd Elhafez; Essam Abd El Wanees

45

Selection of optimal filtration and prediction block in the single target tracking system with one imaging sensor under changeable daylight

Page 1-13
Mikluc Davorin; Antonijević Goran; Andrić Milenko; Bondžulić Boban

46

Non-linear motion deblurring in single images using genetic algorithms

Page 1-13
Salsabil El-Regaily; H. El-Messiry; M. Abd El-Aziz; M. I. Roushdy

47

Urban expansion and its impacts on agricultural areas in Al-ZAHRA region, Libya using high resolution images

Page 1-10
Ashour Soliman; Fawzy El tohamy

48

Investigating the impact of smart grids’ contributions in developing countries

Page 1-12
Walid El-Khattam; Marwa Mostafa

49

Design and operation of PV / FC smart electrical power system using neural networks

Page 1-13
Hassan. H. EL-Tamaly; Ayman Yousef Nassef

50

Phasor measurement units for out of step detection

Page 1-19
Almoataz Y. Abdelaziz; Amr M. Ibrahim; Zeinab G. Hasan

First Page Previous Page 1 2 3 4 5 Next Page Last Page