Journal articles on the topic 'Manetho'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Manetho.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
James, Peter, and Robert Morkot. "Two Studies in 21st Dynasty ChronologyI: Deconstructing Manetho’s 21st DynastyII: The Datelines of High Priest Menkheperre." Journal of Egyptian History 6, no. 2 (2013): 219–56. http://dx.doi.org/10.1163/18741665-12340005.
Full textTheis, Christoffer. "Bemerkungen zu Manetho und zur manethonischen Tradition." Die Welt des Orients 44, no. 1 (May 2014): 109–25. http://dx.doi.org/10.13109/wdor.2014.44.1.109.
Full textFerguson, Cameron Evan. "A Note on Contra Apionem 1.250: Further Evidence for Anti-Jewish Interpolation." Journal of Ancient Judaism 12, no. 2 (April 19, 2021): 205–16. http://dx.doi.org/10.30965/21967954-bja10005.
Full textCook, David. "Berossus and Genesis, Manetho and Exodus ? By Russell Gmirkin." Religious Studies Review 33, no. 1 (January 2007): 64. http://dx.doi.org/10.1111/j.1748-0922.2007.00149_24.x.
Full textPopko, Lutz. "Ammeris/Marrhos/Moiris:Herodot, Manetho, P.Lips. Inv. 590 und Diodors Neues Reich." Journal of Egyptian History 4, no. 1 (2011): 99–117. http://dx.doi.org/10.1163/187416611x580723.
Full textElnozahy, E. N., and W. Zwaenepoel. "Manetho: transparent roll back-recovery with low overhead, limited rollback, and fast output commit." IEEE Transactions on Computers 41, no. 5 (May 1992): 526–31. http://dx.doi.org/10.1109/12.142678.
Full textBányai, Michael. "Merenptah und Amenmesse: Entwurf einer alternativen Chronologie." Journal of Egyptian History 12, no. 1 (April 29, 2019): 36–103. http://dx.doi.org/10.1163/18741665-12340051.
Full textRay, J. D. "Psammuthis and Hakoris." Journal of Egyptian Archaeology 72, no. 1 (August 1986): 149–58. http://dx.doi.org/10.1177/030751338607200112.
Full textVan Seters, J. "Berossus and Genesis, Manetho and Exodus: Hellenistic Histories and the Date of the Pentateuch. By RUSSELL E. GMIRKIN." Journal of Theological Studies 59, no. 1 (February 6, 2008): 212–14. http://dx.doi.org/10.1093/jts/flm136.
Full textLadynin, Ivan, and Alexandr Nemirovsky. "Manetho and His Work in a New Monographic Study (Dillery, J. – Clio’s Other Sons. Berossus and Manetho. A Discussion of the First Written Histories of Babylon and Egypt. The University of Michigan Press, Ann Arbor, 2015. Pp. xxxviii, 494. ISBN 9780472052271)." Вестник древней истории 78, no. 4 (2018): 1034–54. http://dx.doi.org/10.31857/s032103910002918-2.
Full textLópez-Ruiz, Carolina. "Clio’s Other Sons: Berossus and Manetho. By John Dillery. Ann Arbor: University of Michigan Press, 2015. Pp. [xxxviii] + 494." Classical Philology 112, no. 1 (January 2017): 103–8. http://dx.doi.org/10.1086/689611.
Full textAndersen, W. "Manet Manette." Common Knowledge 10, no. 1 (January 1, 2004): 162–63. http://dx.doi.org/10.1215/0961754x-10-1-162.
Full textLEWIS, ADRIAN. "MANET MANETTE." Art Book 13, no. 1 (February 2006): 43–45. http://dx.doi.org/10.1111/j.1467-8357.2006.00641.x.
Full textSirajuddin, Mohammad, Ch Rupa, Celestine Iwendi, and Cresantus Biamba. "TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc Network." Security and Communication Networks 2021 (April 21, 2021): 1–9. http://dx.doi.org/10.1155/2021/5521713.
Full textStevens, Kathryn. "(J.) Dillery Clio's Other Sons: Berossus and Manetho, with an Afterword on Demetrius. Ann Arbor: University of Michigan Press, 2015. Pp. xxxviii + 494. $50. 9780472052271." Journal of Hellenic Studies 136 (2016): 242–43. http://dx.doi.org/10.1017/s0075426916000598.
Full textWilks, John. "DATING THE PENTATEUCH Russell E. Gmirkin, Berossus and Genesis, Manetho and Exodus (LHBOTS 433; London: Continuum, 2006. £75.00. pp. xii + 332. ISBN 978—0—567—02592—0)." Expository Times 120, no. 5 (February 2009): 242. http://dx.doi.org/10.1177/00145246091200050702.
Full textDivya, K., and B. Srinivasan. "Trust Based Secure Multipath Routing Protocol for MANET." International Journal of Computer Science and Mobile Computing 10, no. 5 (May 30, 2021): 72–80. http://dx.doi.org/10.47760/ijcsmc.2021.v10i05.008.
Full textEdwards, M. J. "(G.) Verbrugghe and (J.M.) Wickersham Tr. and comm. Berossus and Manetho, Native Tradition in Ancient Mesopotamia and Egypt. Ann Arbor: U Michigan P, 1996. Pp. x + 239. 0472107224." Journal of Hellenic Studies 119 (November 1999): 214–15. http://dx.doi.org/10.2307/632371.
Full textKurni, Muralidhar, and Saritha K. "‘Power-as-a-Service’ – A Hierarchical On-Demand Charging Model for Recharging the Mobile Nodes of MANETs." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 12 (June 18, 2021): 170. http://dx.doi.org/10.3991/ijim.v15i12.23081.
Full textPhate, Neelam, and M. A. Rizvi. "CHALLENGES, CLASSIFICATION AND COMPARATIVE STUDY OF QOS SOLUTIONS IN MANET." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 6 (June 30, 2014): 4530–36. http://dx.doi.org/10.24297/ijct.v13i6.2514.
Full textDebnath, Sumon Kumar, Mousumi Saha, Md Manowarul Islam, Prodip Kumar Sarker, and Ileas Pramanik. "Evaluation of Multicast and Unicast Routing Protocols Performance for Group Communication with QoS Constraints in 802.11 Mobile Ad-hoc Networks." International Journal of Computer Network and Information Security 13, no. 1 (February 8, 2021): 1–15. http://dx.doi.org/10.5815/ijcnis.2021.01.01.
Full textAl Sharah, Ashraf, Taiwo Oyedare, and Sachin Shetty. "Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game." Journal of Computer Networks and Communications 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/4289176.
Full textJim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Australian Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61. http://dx.doi.org/10.18080/ajtde.v5n2.100.
Full textJim, Lincy Elizebeth, and Mark A. Gregory. "Utilisation of DANGER and PAMP signals to detect a MANET Packet Storage Time Attack." Journal of Telecommunications and the Digital Economy 5, no. 2 (June 5, 2017): 61–74. http://dx.doi.org/10.18080/jtde.v5n2.100.
Full textKatz, Maya Balakirsky. "Photography Versus Caricature: "Footnotes" on Manet's Zola and Zola's Manet." Nineteenth Century French Studies 34, no. 3 (2006): 323–37. http://dx.doi.org/10.1353/ncf.2006.0026.
Full textPark, Ik-Kyun, Nam-Hi Kang, and Young-Han Kim. "A MANET Routing Protocol using Address Autoconfiguration in Zone-based MANETs." KIPS Transactions:PartC 13C, no. 7 (December 31, 2006): 897–904. http://dx.doi.org/10.3745/kipstc.2006.13c.7.897.
Full textMahmood, Z., A. Hashim, O. Khalifa, F. Anwar, and S. Hameed. "Review paper of gateway selection schemes for MANET of NEMO (MANEMO)." IOP Conference Series: Materials Science and Engineering 53 (December 20, 2013): 012047. http://dx.doi.org/10.1088/1757-899x/53/1/012047.
Full textSalama, Hatem Mahmoud, Mohamed Zaki Abd El Mageed, Gouda Ismail Mohamed Salama, and Khaled Mahmoud Badran. "CSMCSM." International Journal of Information Security and Privacy 15, no. 1 (January 2021): 44–64. http://dx.doi.org/10.4018/ijisp.2021010103.
Full textKanellopoulos, Dimitris N. "Congestion Control for NDN-Based MANETs." Journal of Organizational and End User Computing 33, no. 5 (September 2021): 111–34. http://dx.doi.org/10.4018/joeuc.20210901.oa6.
Full textGoyal, Vincy, Sunil Kumar Jangir, and Naveen Hemrajani. "Analysis of Routing Protocols for Large Scale Multihop Multirate MANETs." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, no. 3 (August 5, 2013): 1440–44. http://dx.doi.org/10.24297/ijct.v10i3.3274.
Full textHaglan, Hussein M., Salama A. Mostafa, Noor Zuraidin Mohd Safar, Aida Mustapha, Mohd Zainuri Saringatb, Hosam Alhakami, and Wajdi Alhakami. "Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment." Bulletin of Electrical Engineering and Informatics 10, no. 1 (February 1, 2021): 434–40. http://dx.doi.org/10.11591/eei.v10i1.2516.
Full textChen, Juan, Hong Shan, and Tao Ma. "A Study of Modeling Mobile Ad-Hoc Networks Attacks." Advanced Materials Research 546-547 (July 2012): 1217–22. http://dx.doi.org/10.4028/www.scientific.net/amr.546-547.1217.
Full textKanellopoulos, Dimitris N. "QoS Routing for Multimedia Communication over Wireless Mobile Ad Hoc Networks." International Journal of Multimedia Data Engineering and Management 8, no. 1 (January 2017): 42–71. http://dx.doi.org/10.4018/ijmdem.2017010103.
Full textR., Srividya, and Ramesh B. "Implementation of AES using biometric." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 5 (October 1, 2019): 4266. http://dx.doi.org/10.11591/ijece.v9i5.pp4266-4276.
Full textVelagaleti, Sesha Bhargavi, Dr M. Seetha, and Dr S. Viswanadha Raju. "A Simulation and analysis of DSR Protocol in Mobile ad hoc Networks." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 8, no. 1 (November 25, 2013): 1279–86. http://dx.doi.org/10.24297/ijmit.v8i1.692.
Full textA.Y., Prasad, and Balakrishna Rayanki. "A generic algorithmic protocol approaches to improve network life time and energy efficient using combined genetic algorithm with simulated annealing in MANET." International Journal of Intelligent Unmanned Systems 8, no. 1 (July 8, 2019): 23–42. http://dx.doi.org/10.1108/ijius-02-2019-0011.
Full textEt. al., Suneetha Bulla,. "A Comprehensive Survey on Cryptography Evaluation in Mobile (MANETs)." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 3406–16. http://dx.doi.org/10.17762/turcomat.v12i2.2402.
Full textHanin, Moulay Hicham, Mohamed Amnai, and Youssef Fakhri. "New adaptation method based on cross layer and TCP over protocols to improve QoS in mobile ad hoc network." International Journal of Electrical and Computer Engineering (IJECE) 11, no. 3 (June 1, 2021): 2134. http://dx.doi.org/10.11591/ijece.v11i3.pp2134-2142.
Full textRath, Mamata, and Binod Kumar Pattanayak. "Security Protocol with IDS Framework Using Mobile Agent in Robotic MANET." International Journal of Information Security and Privacy 13, no. 1 (January 2019): 46–58. http://dx.doi.org/10.4018/ijisp.2019010104.
Full textda Silva Rodrigues, Carlo Kleber, and Vladimir Emiliano Moreira Rocha. "BT-MANET: A Novel BitTorrent-Like Algorithm for Video On-Demand Streaming over MANETs." IEEE Latin America Transactions 17, no. 01 (January 2019): 78–84. http://dx.doi.org/10.1109/tla.2019.8826698.
Full textHikal, Noha A., Mahmoud Y. Shams, Hanaa Salem, and Marwa M. Eid. "Detection of black-hole attacks in MANET using adaboost support vector machine." Journal of Intelligent & Fuzzy Systems 41, no. 1 (August 11, 2021): 669–82. http://dx.doi.org/10.3233/jifs-202471.
Full textAl-Shehri, Salman, and Pavel Loskot. "Enhancing Reliability of Tactical MANETs by Improving Routing Decisions." Journal of Low Power Electronics and Applications 8, no. 4 (November 28, 2018): 49. http://dx.doi.org/10.3390/jlpea8040049.
Full textAhirwal, Ramratan, Nitesh Kumar Chaurasiya, and Yogendra Kumar Jain. "An Algorithm to reduce End to End Delay AND Enhance the Quality of Service in Mobile Adhoc Network." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 12, no. 1 (December 15, 2013): 3147–57. http://dx.doi.org/10.24297/ijct.v12i1.3368.
Full textAbdollahi Nami, A., and L. Rajabion. "Data replication techniques in the mobile ad hoc networks." International Journal of Pervasive Computing and Communications 15, no. 3/4 (November 4, 2019): 174–98. http://dx.doi.org/10.1108/ijpcc-06-2019-0051.
Full textEt. al., S. Arivarasan,. "An Energy Efficient Qos Routing Protocol Based On Red Deer Algorithm In MANET." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 11, 2021): 1461–71. http://dx.doi.org/10.17762/turcomat.v12i5.2112.
Full textMijanovic, Srdjan. "MANEVRO." ACM SIGPLAN Notices 27, no. 11 (November 1992): 85–89. http://dx.doi.org/10.1145/141018.141057.
Full textJain, Ashish, and Vrinda Tokekar. "Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks." Oriental journal of computer science and technology 10, no. 1 (March 25, 2017): 94–102. http://dx.doi.org/10.13005/ojcst/10.01.13.
Full textChauhan, Naveen, Lalit K. Awasthi, Narottam Chand, R. C. Joshi, and Manoj Misra. "Cooperative Caching in Mobile Ad Hoc Networks." International Journal of Mobile Computing and Multimedia Communications 3, no. 3 (July 2011): 20–35. http://dx.doi.org/10.4018/jmcmc.2011070102.
Full textBöse, Joos-Hendrik, and Jürgen Broß. "Reducing Blocking Risks of Atomic Transactions in MANETs Using a Backup Coordinator." International Journal of Ambient Computing and Intelligence 2, no. 4 (October 2010): 44–54. http://dx.doi.org/10.4018/jaci.2010100104.
Full textGangwar, Sanjeev. "Mobile Ad Hoc Networks: Comparasion of Multipath Routing Protocols with Unipath Routing Protocols." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 5, no. 3 (May 30, 2013): 193–99. http://dx.doi.org/10.24297/ijct.v5i3.3520.
Full text