Follow
Ghazy M R Assassa
Ghazy M R Assassa
Prof Dr Eng, Ex Advisor to Benha University President for Information Technology - www.bu.edu.eg
Verified email at feng.bu.edu.eg - Homepage
Title
Cited by
Cited by
Year
Thermal conductivity enhancement in a latent heat storage system
EBS Mettawee, GMR Assassa
Solar energy 81 (7), 839-845, 2007
5122007
Experimental study of a compact PCM solar collector
EBS Mettawee, GMR Assassa
Energy 31 (14), 2958-2968, 2006
2762006
On the development of electronic voting: a survey
MFM Mursi, GMR Assassa, A Abdelhafez, KMA Samra
International Journal of Computer Applications 61 (16), 2013
682013
A novel approach for hiding messages in images
H Mathkour, GMR Assassa, A Al Muharib, I Kiady
2009 International Conference on Signal Acquisition and Processing, 89-93, 2009
442009
A practical, secure, and auditable e-voting system
KM AboSamra, AA AbdelHafez, GMR Assassa, MFM Mursi
Journal of information security and applications 36, 69-89, 2017
362017
Computer simulation of the horizontal falling film desalination plant
HT El-Dessouky, GMR Assassa
Desalination 55, 119-138, 1985
241985
An integral method for calculating turbulent boundary layer with separation
GM Assassa, KD Papailiou
211979
A DCT-based secure JPEG image authentication scheme
MFM Mursi, GMR Assassa, HA Aboalsamh, K Alghathbar
World Academy of Science, Engineering and Technology 53, 681-687, 2009
162009
A risk management tool for extreme programming
H Mathkour, G Assassa, A Baihan
International Journal of Computer Science and Network Security 8 (8), 326-333, 2008
162008
Performance characteristics of shell and helically coiled tube heat exchanger under different tube cross-sections, inclination angles and nanofluids
AM Elsaid, M Ammar, A Lashin, GMR Assassa
Case Studies in Thermal Engineering 49, 103239, 2023
132023
A secure and auditable cryptographic-based e-voting scheme
MFM Mursi, GMR Assassa, AA Abdelhafez, KM Abosamra
2015 Second International Conference on Mathematics and Computers in …, 2015
122015
A Secured Cryptographic Messaging System Proc
H Mathkour, G Assassa, A Al-Muharib, A Juma‘h
International Conference on Machine Learning and Computing (ICMLC), 2009
72009
Breaking the F5 Algorith: An Improved Approach.
HA Aboalsamh, SA Dokheekh, H Mathkour, GMR Assassa
Egypt. Comput. Sci. J. 29 (1), 1-9, 2007
72007
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
HA Aboalsamh, MFM Mursi, GMR Assassa
ICCOMP 8, 1011-1018, 2008
62008
Face recognition using incremental principal components analysis
HA Aboalsamh, HI Mathkour, GMR Assassa, MFM Mursi
2009 International Conference on Computing, Engineering and Information, 39-43, 2009
52009
On the transformation of Object Oriented-based Systems to Component-based Systems
H Mathkour, A Touir, H Hakami, G Assassa
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
52008
Al. Extreme Programming: A Case Study in Software Engineering Courses
G Assassa, H Dossari
Strategies, 2006
52006
A secured cryptographic messaging system
H Mathkour, G Assassa, A Al-Muharib, A Juma’h
2009 InternationalConference on Machine Learning and Computing IPCSIT 3, 2011
42011
An improved steganalysis approach for breaking the F5 algorithm
H Aboalsamh, H Mathkour, S Dokheekh, M Mursi, G Assassa
WSEAS Transactions on Computers 7 (9), 1447-1456, 2008
42008
Losses in MSF desalination plants
HT El-Dessouky, G Assassa
Proc. of the 3rd Joint Conf. on Mech. Eng. Technology, Cairo, 1985
41985
The system can't perform the operation now. Try again later.
Articles 1–20