1. | Exploiting Search Engines for Attacking Database Exposed to Internet | |
Pages 1-12 | ||
N. M. A. Ayad; H. M. Klash; H. Sorour | ||
2. | Exploiting Search Engines for Attacking Database Exposed to Internett. | |
Pages 1-12 | ||
N. M. A. Ayad; H. M. Klash; H. Sorour | ||
3. | Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University | |
Pages 13-22 | ||
N. A. EL-FESHAWY; H. H. EL-BANNA; R. E. EL AZIZ | ||
4. | A Wideband Variable Gain Amplifier using 0.13m CMOS Technology | |
Pages 23-32 | ||
Abd El-Moneam Abd El-Bary Nasser; Amr E. Rizk | ||
5. | Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure | |
Pages 33-43 | ||
Ahmed A. Abou El-Fadl; Mahmoud A. Wafa | ||
6. | Indoor Geolocation System Based on Time of Arrival Technique | |
Pages 44-54 | ||
Adel A. Saleeb; Mahmoud G. T. Elkholy; Zeinab M. Elsherbieny | ||
7. | Control of Heart Irregularities Using Threshold Chaotic Control | |
Pages 55-65 | ||
Nessim Mohaadym; A. A. A. Nasser; S. Khamis | ||