A
-
Abou El-Fadl, Ahmed A.
Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure [Volume 22, Issue 1, 2012, Pages 33-43]
-
Ayad, N. M. A.
Exploiting Search Engines for Attacking Database Exposed to Internet [Volume 22, Issue 1, 2012, Pages 1-12]
-
Ayad, N. M. A.
Exploiting Search Engines for Attacking Database Exposed to Internett. [Volume 22, Issue 1, 2012, Pages 1-12]
E
-
EL AZIZ, R. E.
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University [Volume 22, Issue 1, 2012, Pages 13-22]
-
EL-BANNA, H. H.
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University [Volume 22, Issue 1, 2012, Pages 13-22]
-
EL-FESHAWY, N. A.
Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University [Volume 22, Issue 1, 2012, Pages 13-22]
-
Elkholy, Mahmoud G. T.
Indoor Geolocation System Based on Time of Arrival Technique [Volume 22, Issue 1, 2012, Pages 44-54]
-
Elsherbieny, Zeinab M.
Indoor Geolocation System Based on Time of Arrival Technique [Volume 22, Issue 1, 2012, Pages 44-54]
K
-
Khamis, S.
Control of Heart Irregularities Using Threshold Chaotic Control [Volume 22, Issue 1, 2012, Pages 55-65]
-
Klash, H. M.
Exploiting Search Engines for Attacking Database Exposed to Internet [Volume 22, Issue 1, 2012, Pages 1-12]
-
Klash, H. M.
Exploiting Search Engines for Attacking Database Exposed to Internett. [Volume 22, Issue 1, 2012, Pages 1-12]
M
-
Mohaadym, Nessim
Control of Heart Irregularities Using Threshold Chaotic Control [Volume 22, Issue 1, 2012, Pages 55-65]
N
-
Nasser, A. A. A.
Control of Heart Irregularities Using Threshold Chaotic Control [Volume 22, Issue 1, 2012, Pages 55-65]
-
Nasser, Abd El-Moneam Abd El-Bary
A Wideband Variable Gain Amplifier using 0.13m CMOS Technology [Volume 22, Issue 1, 2012, Pages 23-32]
R
-
Rizk, Amr E.
A Wideband Variable Gain Amplifier using 0.13m CMOS Technology [Volume 22, Issue 1, 2012, Pages 23-32]
S
-
Saleeb, Adel A.
Indoor Geolocation System Based on Time of Arrival Technique [Volume 22, Issue 1, 2012, Pages 44-54]
-
Sorour, H.
Exploiting Search Engines for Attacking Database Exposed to Internet [Volume 22, Issue 1, 2012, Pages 1-12]
-
Sorour, H.
Exploiting Search Engines for Attacking Database Exposed to Internett. [Volume 22, Issue 1, 2012, Pages 1-12]
W
-
Wafa, Mahmoud A.
Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure [Volume 22, Issue 1, 2012, Pages 33-43]
Your query does not match with any item