Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "Middle East"

Total 708 records found in CSC-OpenAccess Library.
Page 17 of 36    Previous | Next
A Security Analysis Framework Powered by an Expert System
Maher Mohamed Gamal, Bahaa Hassan, Abdel Fatah Hegazy
EDC
Pages - 505 - 527     |    Revised - 31-01-2011     |    Published - 08-02-2011
Volume - 4,   Issue - 6, International Journal of Computer Science and Security (IJCSS)
MFMP Vs ECMP Under RED Queue Management
Ahmed Redha Mahlous, Brahim Chaourar
Al Imam University
Pages - 297 - 302     |    Revised - 31-01-2011     |    Published - 08-02-2011
Volume - 2,   Issue - 6, International Journal of Computer Networks (IJCN)
A Genetic Algorithm for Reliability Evaluation of a Stochastic-Flow Network with Node Failure
Ahmed younes Hamed, Moatamad Refaat Hassan
Pages - 528 - 536     |    Revised - 31-01-2011     |    Published - 08-02-2011
Volume - 4,   Issue - 6, International Journal of Computer Science and Security (IJCSS)
Building a Distributed Secure System on Multi-Agent Platform Depending on the Principles of Software Engineering Life Cycle
Ghossoon Mohammed Waleed Al-Saadoon
Applied Science University (ASU)
Pages - 482 - 490     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based Optimization Problems
Prof. M. Abo-Zahhad, Sabah M. Ahmed, Nabil Sabor, Ahmad F. Al-Ajlouni
Assiut University
Pages - 247 - 266     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4,   Issue - 5, Signal Processing: An International Journal (SPIJ)
An exploratory re-search for variables representative of Academic Quality
Sreekumaran Nair, Seena Biju
Manipal University
Pages - 19 - 27     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 1,   Issue - 3, Innovative Studies: International Journal (ISIJ)
Securing Image Transmission Using in- Compression Encryption Technique
Shaimaa Ahmed Elsaid, Khalid F. A. Hussein, Mohamed M. Fouad
faculity of engineering
Pages - 466 - 481     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
Experimental Investigation and Numerical Modeling of the Effect of Natural and Steel Fibers on the Performance of Concrete
Hossam Hodhod, Mostafa Abdeen
Pages - 321 - 337     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4,   Issue - 5, International Journal of Engineering (IJE)
A Proposed Security Model for Web Enabled Business Process Management System
M. S. Kandil, Mohamed Abu El-Soud , A. E. Hassan , Abd Elghafar M. Elhady
Mansoura University
Pages - 436 - 450     |    Revised - 30-11-200     |    Published - 20-12-2010
Volume - 4,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
Determining an Optimal Number of Access Points Using GPS data to Secure a Wireless Network Environment
Iyad Aldasouqi, Walid Salameh
Royal Scientific Society
Pages - 85 - 99     |    Revised - 30-11-2010     |    Published - 20-12-2010
Volume - 4,   Issue - 5, International Journal of Security (IJS)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions