1 | Exploiting Search Engines for Attacking Database Exposed to Internet | |
Page 1-12 | ||
N. M. A. Ayad; H. M. Klash; H. Sorour | ||
2 | Exploiting Search Engines for Attacking Database Exposed to Internett. | |
Page 1-12 | ||
N. M. A. Ayad; H. M. Klash; H. Sorour | ||
3 | Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University | |
Page 13-22 | ||
N. A. EL-FESHAWY; H. H. EL-BANNA; R. E. EL AZIZ | ||
4 | A Wideband Variable Gain Amplifier using 0.13m CMOS Technology | |
Page 23-32 | ||
Abd El-Moneam Abd El-Bary Nasser; Amr E. Rizk | ||
5 | Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure | |
Page 33-43 | ||
Ahmed A. Abou El-Fadl; Mahmoud A. Wafa | ||
6 | Indoor Geolocation System Based on Time of Arrival Technique | |
Page 44-54 | ||
Adel A. Saleeb; Mahmoud G. T. Elkholy; Zeinab M. Elsherbieny | ||
7 | Control of Heart Irregularities Using Threshold Chaotic Control | |
Page 55-65 | ||
Nessim Mohaadym; A. A. A. Nasser; S. Khamis | ||