| 1. | Exploiting Search Engines for Attacking Database Exposed to Internet | |
| Pages 1-12 | ||
| N. M. A. Ayad; H. M. Klash; H. Sorour | ||
| 2. | Exploiting Search Engines for Attacking Database Exposed to Internett. | |
| Pages 1-12 | ||
| N. M. A. Ayad; H. M. Klash; H. Sorour | ||
| 3. | Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University | |
| Pages 13-22 | ||
| N. A. EL-FESHAWY; H. H. EL-BANNA; R. E. EL AZIZ | ||
| 4. | A Wideband Variable Gain Amplifier using 0.13m CMOS Technology | |
| Pages 23-32 | ||
| Abd El-Moneam Abd El-Bary Nasser; Amr E. Rizk | ||
| 5. | Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure | |
| Pages 33-43 | ||
| Ahmed A. Abou El-Fadl; Mahmoud A. Wafa | ||
| 6. | Indoor Geolocation System Based on Time of Arrival Technique | |
| Pages 44-54 | ||
| Adel A. Saleeb; Mahmoud G. T. Elkholy; Zeinab M. Elsherbieny | ||
| 7. | Control of Heart Irregularities Using Threshold Chaotic Control | |
| Pages 55-65 | ||
| Nessim Mohaadym; A. A. A. Nasser; S. Khamis | ||