الرئيسية > قسم الهندسة المدنية > الأبحاث العلمية
عدد الأبحاث : 1555 - ( 221 : 230 )

Compression of ECG Signal Based on Compressive Sensing and the Extraction of Significant Features
" M. M. Abo-Zahhad, Aziza I. Hussein, Abdelfatah M. Mohamed " Int. J. Communications, Network and System Sciences(IJCNS), Vol. 8, No. 5, May, 2015, pp. 97-117 , مايو 2015


Q-Parameterization/ mu Control of A CSI-Fed Induction Motor Drive System
" Abdelfatah M. Mohamed " Int. J. Automation, and Control, Vol. 9, No. 1, pp 71-88., يناير 2015


Adaptive Controller For Stabilization of Rotational Motion of A Vertical Shaft Magnetic Bearing
" A. Abo-Elsoud, Abdelfatah M. Mohamed " International Journal of Modeling, Identification and Control, Vol. 23, No. 2, pp. 154-163, فبراير 2015


Optimized Control of Skid Steering Mobile Robot with Slip Conditions
" Osama Elshazly, Zakarya Zyada, Abdelfatah Mohamed, Giovanni Muscato, " IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM2015), July 7-11, 2015. Busan, Korea., يوليو 2015


Versatile Climbing Robot for Vessels Inspection
" Mohamed G. Alkalla, Mohamed A. Fanni, and Abdelfatah M. Mohamed " International Conference on Control, Automation and Robotics (ICCAR 2015) in Singapore during May 20-22, 2015., مايو 2015


Design and Control of a Novel Contactless Active Robotic Joint Using AMB,”
" Mohamed Selmy, Mohamed Fanni, and Abdelfatah M. Mohamed " Proceeding of the IEEE International Conference on Autonomous Robot Systems and Competitions, University of Tras-os-Montes e Alto-Douro (UTAD) in Vila Real, Portugal, on April 8-10, 2015., أبريل 2015


Quantitative Masking Strength: Quantifying the Power Side-Channel Resistance of Software Code
" H Eldib, C Wang, M Taha, P Schaumont " IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, , 2015


Implementation Attacks on Post-Quantum Cryptographic Schemes
" M Taha, T Eisenbarth " IEEE International Conference on Anti-Cybercrime (ICACC-2015), 2015


Silent Simon: A Threshold Implementation under 100 Slices
" A Shahverdi, M Taha, T Eisenbarth " IEEE International Symposium on Hardware-Oriented Security and Trust (HOST'15), 2015


Key-Updating for Leakage Resiliency with Application to AES Modes of Operation
" M Taha, P Schaumont " IEEE Transactions on Information Forensics and Security, 2015

[ 1 ][ 2 ][ 3 ][ 4 ][ 5 ][ 6 ][ 7 ][ 8 ][ 9 ][ 10 ][ 11 ][ 12 ][ 13 ][ 14 ][ 15 ][ 16 ][ 17 ][ 18 ][ 19 ][ 20 ][ 21 ][ 22 ][ 23 ][ 24 ][ 25 ][ 26 ][ 27 ][ 28 ][ 29 ][ 30 ][ 31 ][ 32 ][ 33 ][ 34 ][ 35 ][ 36 ][ 37 ][ 38 ][ 39 ][ 40 ][ 41 ][ 42 ][ 43 ][ 44 ][ 45 ][ 46 ][ 47 ][ 48 ][ 49 ][ 50 ][ 51 ][ 52 ][ 53 ][ 54 ][ 55 ][ 56 ][ 57 ][ 58 ][ 59 ][ 60 ][ 61 ][ 62 ][ 63 ][ 64 ][ 65 ][ 66 ][ 67 ][ 68 ][ 69 ][ 70 ][ 71 ][ 72 ][ 73 ][ 74 ][ 75 ][ 76 ][ 77 ][ 78 ][ 79 ][ 80 ][ 81 ][ 82 ][ 83 ][ 84 ][ 85 ][ 86 ][ 87 ][ 88 ][ 89 ][ 90 ][ 91 ][ 92 ][ 93 ][ 94 ][ 95 ][ 96 ][ 97 ][ 98 ][ 99 ][ 100 ][ 101 ][ 102 ][ 103 ][ 104 ][ 105 ][ 106 ][ 107 ][ 108 ][ 109 ][ 110 ][ 111 ][ 112 ][ 113 ][ 114 ][ 115 ][ 116 ][ 117 ][ 118 ][ 119 ][ 120 ][ 121 ][ 122 ][ 123 ][ 124 ][ 125 ][ 126 ][ 127 ][ 128 ][ 129 ][ 130 ][ 131 ][ 132 ][ 133 ][ 134 ][ 135 ][ 136 ][ 137 ][ 138 ][ 139 ][ 140 ][ 141 ][ 142 ][ 143 ][ 144 ][ 145 ][ 146 ][ 147 ][ 148 ][ 149 ][ 150 ][ 151 ][ 152 ][ 153 ][ 154 ][ 155 ][ 156 ]

صفحة الكلية على فيسبوك

facebook

إضغط هنا

صفحة الكلية على تويتر

twitter

إضغط هنا

صفحة الكلية على جوجل+

google+

إضغط هنا

صفحة الكلية على يوتيوب

youtube

إضغط هنا