Call for Papers - Ongoing round of submission, notification and publication.
    
  
Home    |    Login or Register    |    Contact CSC
By Title/Keywords/Abstract   By Author
Browse CSC-OpenAccess Library.
  • HOME
  • LIST OF JOURNALS
  • AUTHORS
  • EDITORS & REVIEWERS
  • LIBRARIANS & BOOK SELLERS
  • PARTNERSHIP & COLLABORATION
Home   >   CSC-OpenAccess Library   >    Search By Manuscript Authors
CSC-OpenAccess Library
BROWSE BY
Complete List
Subjects
Year / Volume
Current Issues
Issues
Special Issues

EXPLORE PUBLICATIONS BY COUNTRIES

EUROPE
MIDDLE EAST
ASIA
AFRICA
.............................
United States of America
United Kingdom
Canada
Australia
Italy
France
Brazil
Germany
Malaysia
Turkey
China
Taiwan
Japan
Saudi Arabia
Jordan
Egypt
United Arab Emirates
India
Nigeria

SEARCH RESULT FOR "Middle East"

Total 708 records found in CSC-OpenAccess Library.
Page 9 of 36    Previous | Next
DNS Advanced Attacks and Analysis
Adam Ali.Zare Hudaib, Esra'a Ali Zare Hudaib
Two Mas ltd
Pages - 63 - 74     |    Revised - 31-03-2014     |    Published - 30-04-2014
Volume - 8,   Issue - 2, International Journal of Computer Science and Security (IJCSS)
SIP-Based Mobility Management for LTE-WiMAX-WLAN Interworking Using IMS Architecture
Reem A. Hamada, Hanaa S. Ali, M. I. Abdalla
Electronic and Communication department
Pages - 1 - 14     |    Revised - 24-02-2014     |    Published - 19-03-2014
Volume - 6,   Issue - 1, International Journal of Computer Networks (IJCN)
Blank Background Image Lossless Compression Technique
Samer Sawalha , Arafat Awajan
Princess Sumaya University for Technology
Pages - 9 - 16     |    Revised - 20-01-2014     |    Published - 11-02-2014
Volume - 8,   Issue - 1, International Journal of Image Processing (IJIP)
Efficient Coercion Resistant Public Key Encryption
Maged Hamada Ibrahim
Department of Electronics, Communications and Computers Engineering, Faculty of Engineering, Helwan University 1, Sherif St., Helwan, Cairo; P.O. 11792, Egypt
Pages - 1 - 13     |    Revised - 20-01-2014     |    Published - 11-02-2014
Volume - 8,   Issue - 1, International Journal of Computer Science and Security (IJCSS)
Up/Down Converter Linear Model with Feed Forward and Feedback Stability Analysis
Dr. Ziad Sobih, Arvin Grabel
Modern center
Pages - 1 - 10     |    Revised - 31-12-2013     |    Published - 22-01-2014
Volume - 8,   Issue - 1, International Journal of Engineering (IJE)
Resource Monitoring Algorithms Evaluation For Cloud Environment
Mostafa M. Al-Sayed, Shrerif M. Khattab, Fatma A. Omara
Faculty of Computers and Information Minia University Minia
Pages - 159 - 174     |    Revised - 15-11-2013     |    Published - 15-12-2013
Volume - 7,   Issue - 5, International Journal of Computer Science and Security (IJCSS)
Color Image Watermarking Application for ERTU Cloud
Salah A. Khamis, Salwa M. Serag Eldin, Abdel-Aziz Ibrahim Mahmoud HASSANIN, Mohammed A. Alsharqawy
ERTU
Pages - 436 - 448     |    Revised - 15-11-2013     |    Published - 30-11-2013
Volume - 7,   Issue - 5, International Journal of Image Processing (IJIP)
An Empirical Study on the Security Measurements of Websites of Jordanian Public Universities
Mokhled S. Al-Tarawneh
Mutah University
Pages - 127 - 136     |    Revised - 01-10-2013     |    Published - 01-11-2013
Volume - 7,   Issue - 4, International Journal of Computer Science and Security (IJCSS)
Empirical Design Guidelines for Enhanced Incorporation of Task Management in Web Browsing
Saad T Alharbi
Taibah University
Pages - 106 - 119     |    Revised - 15-08-2013     |    Published - 15-09-2013
Volume - 7,   Issue - 3, International Journal of Computer Science and Security (IJCSS)
An Automatic Neural Networks System for Classifying Dust, Clouds, Water, and Vegetation from Red Sea Area
Gamal M. Behery
University of Mansoura
Pages - 27 - 44     |    Revised - 15-08-2013     |    Published - 15-09-2013
Volume - 4,   Issue - 2, International Journal of Artificial Intelligence and Expert Systems (IJAE)
You can contact us anytime since we have 24 x 7 support.
Join Us|List of Journals|
    
Copyrights © 2025 Computer Science Journals (CSC Journals). All rights reserved. Privacy Policy | Terms of Conditions