Thermal conductivity enhancement in a latent heat storage system EBS Mettawee, GMR Assassa Solar energy 81 (7), 839-845, 2007 | 526 | 2007 |
Experimental study of a compact PCM solar collector EBS Mettawee, GMR Assassa Energy 31 (14), 2958-2968, 2006 | 284 | 2006 |
On the development of electronic voting: a survey MFM Mursi, GMR Assassa, A Abdelhafez, KMA Samra International Journal of Computer Applications 61 (16), 2013 | 72 | 2013 |
A novel approach for hiding messages in images H Mathkour, GMR Assassa, A Al Muharib, I Kiady 2009 International Conference on Signal Acquisition and Processing, 89-93, 2009 | 45 | 2009 |
A practical, secure, and auditable e-voting system KM AboSamra, AA AbdelHafez, GMR Assassa, MFM Mursi Journal of information security and applications 36, 69-89, 2017 | 39 | 2017 |
Computer simulation of the horizontal falling film desalination plant HT El-Dessouky, GMR Assassa Desalination 55, 119-138, 1985 | 24 | 1985 |
An integral method for calculating turbulent boundary layer with separation GM Assassa, KD Papailiou | 21 | 1979 |
Performance characteristics of shell and helically coiled tube heat exchanger under different tube cross-sections, inclination angles and nanofluids AM Elsaid, M Ammar, A Lashin, GMR Assassa Case Studies in Thermal Engineering 49, 103239, 2023 | 16 | 2023 |
A DCT-based secure JPEG image authentication scheme MFM Mursi, GMR Assassa, HA Aboalsamh, K Alghathbar World Academy of Science, Engineering and Technology 53, 681-687, 2009 | 16 | 2009 |
A risk management tool for extreme programming H Mathkour, G Assassa, A Baihan International Journal of Computer Science and Network Security 8 (8), 326-333, 2008 | 16 | 2008 |
A secure and auditable cryptographic-based e-voting scheme MFM Mursi, GMR Assassa, AA Abdelhafez, KM Abosamra 2015 Second International Conference on Mathematics and Computers in …, 2015 | 13 | 2015 |
A Secured Cryptographic Messaging System Proc H Mathkour, G Assassa, A Al-Muharib, A Juma‘h International Conference on Machine Learning and Computing (ICMLC), 2009 | 7 | 2009 |
Breaking the F5 Algorith: An Improved Approach. HA Aboalsamh, SA Dokheekh, H Mathkour, GMR Assassa Egypt. Comput. Sci. J. 29 (1), 1-9, 2007 | 7 | 2007 |
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm HA Aboalsamh, MFM Mursi, GMR Assassa ICCOMP 8, 1011-1018, 2008 | 6 | 2008 |
Face recognition using incremental principal components analysis HA Aboalsamh, HI Mathkour, GMR Assassa, MFM Mursi 2009 International Conference on Computing, Engineering and Information, 39-43, 2009 | 5 | 2009 |
On the transformation of Object Oriented-based Systems to Component-based Systems H Mathkour, A Touir, H Hakami, G Assassa 2008 IEEE International Conference on Signal Image Technology and Internet …, 2008 | 5 | 2008 |
Al. Extreme Programming: A Case Study in Software Engineering Courses G Assassa, H Dossari Strategies, 2006 | 5 | 2006 |
Augmentation of solar still distillation performance using waste heat energy and guiding vanes: A field study MR Salem, RY Sakr, GMR Assassa, OA Aly Desalination 572, 117150, 2024 | 4 | 2024 |
A secured cryptographic messaging system H Mathkour, G Assassa, A Al-Muharib, A Juma’h 2009 InternationalConference on Machine Learning and Computing IPCSIT 3, 2011 | 4 | 2011 |
An improved steganalysis approach for breaking the F5 algorithm H Aboalsamh, H Mathkour, S Dokheekh, M Mursi, G Assassa WSEAS Transactions on Computers 7 (9), 1447-1456, 2008 | 4 | 2008 |