Author Index

A

  • Abou El-Fadl, Ahmed A. Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure [Volume 22, Issue 1, 2012, Pages 33-43]
  • Ayad, N. M. A. Exploiting Search Engines for Attacking Database Exposed to Internet [Volume 22, Issue 1, 2012, Pages 1-12]
  • Ayad, N. M. A. Exploiting Search Engines for Attacking Database Exposed to Internett. [Volume 22, Issue 1, 2012, Pages 1-12]

E

  • EL AZIZ, R. E. Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University [Volume 22, Issue 1, 2012, Pages 13-22]
  • EL-BANNA, H. H. Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University [Volume 22, Issue 1, 2012, Pages 13-22]
  • EL-FESHAWY, N. A. Dept. of Computer Science and Eng., Faculty of Elect., Eng., Minufiya University [Volume 22, Issue 1, 2012, Pages 13-22]
  • Elkholy, Mahmoud G. T. Indoor Geolocation System Based on Time of Arrival Technique [Volume 22, Issue 1, 2012, Pages 44-54]
  • Elsherbieny, Zeinab M. Indoor Geolocation System Based on Time of Arrival Technique [Volume 22, Issue 1, 2012, Pages 44-54]

K

  • Khamis, S. Control of Heart Irregularities Using Threshold Chaotic Control [Volume 22, Issue 1, 2012, Pages 55-65]
  • Klash, H. M. Exploiting Search Engines for Attacking Database Exposed to Internet [Volume 22, Issue 1, 2012, Pages 1-12]
  • Klash, H. M. Exploiting Search Engines for Attacking Database Exposed to Internett. [Volume 22, Issue 1, 2012, Pages 1-12]

M

  • Mohaadym, Nessim Control of Heart Irregularities Using Threshold Chaotic Control [Volume 22, Issue 1, 2012, Pages 55-65]

N

  • Nasser, A. A. A. Control of Heart Irregularities Using Threshold Chaotic Control [Volume 22, Issue 1, 2012, Pages 55-65]
  • Nasser, Abd El-Moneam Abd El-Bary A Wideband Variable Gain Amplifier using 0.13m CMOS Technology [Volume 22, Issue 1, 2012, Pages 23-32]

R

  • Rizk, Amr E. A Wideband Variable Gain Amplifier using 0.13m CMOS Technology [Volume 22, Issue 1, 2012, Pages 23-32]

S

  • Saleeb, Adel A. Indoor Geolocation System Based on Time of Arrival Technique [Volume 22, Issue 1, 2012, Pages 44-54]
  • Sorour, H. Exploiting Search Engines for Attacking Database Exposed to Internet [Volume 22, Issue 1, 2012, Pages 1-12]
  • Sorour, H. Exploiting Search Engines for Attacking Database Exposed to Internett. [Volume 22, Issue 1, 2012, Pages 1-12]

W

  • Wafa, Mahmoud A. Modeling and Analysis of LiNbO3 Optical Modulator with Two Step Back Slot Structure [Volume 22, Issue 1, 2012, Pages 33-43]