Follow
Ghazy M R Assassa
Ghazy M R Assassa
Prof Dr Eng, Ex Advisor to Benha University President for Information Technology - www.bu.edu.eg
Verified email at feng.bu.edu.eg - Homepage
Title
Cited by
Cited by
Year
Thermal conductivity enhancement in a latent heat storage system
EBS Mettawee, GMR Assassa
Solar energy 81 (7), 839-845, 2007
5262007
Experimental study of a compact PCM solar collector
EBS Mettawee, GMR Assassa
Energy 31 (14), 2958-2968, 2006
2842006
On the development of electronic voting: a survey
MFM Mursi, GMR Assassa, A Abdelhafez, KMA Samra
International Journal of Computer Applications 61 (16), 2013
722013
A novel approach for hiding messages in images
H Mathkour, GMR Assassa, A Al Muharib, I Kiady
2009 International Conference on Signal Acquisition and Processing, 89-93, 2009
452009
A practical, secure, and auditable e-voting system
KM AboSamra, AA AbdelHafez, GMR Assassa, MFM Mursi
Journal of information security and applications 36, 69-89, 2017
392017
Computer simulation of the horizontal falling film desalination plant
HT El-Dessouky, GMR Assassa
Desalination 55, 119-138, 1985
241985
An integral method for calculating turbulent boundary layer with separation
GM Assassa, KD Papailiou
211979
Performance characteristics of shell and helically coiled tube heat exchanger under different tube cross-sections, inclination angles and nanofluids
AM Elsaid, M Ammar, A Lashin, GMR Assassa
Case Studies in Thermal Engineering 49, 103239, 2023
162023
A DCT-based secure JPEG image authentication scheme
MFM Mursi, GMR Assassa, HA Aboalsamh, K Alghathbar
World Academy of Science, Engineering and Technology 53, 681-687, 2009
162009
A risk management tool for extreme programming
H Mathkour, G Assassa, A Baihan
International Journal of Computer Science and Network Security 8 (8), 326-333, 2008
162008
A secure and auditable cryptographic-based e-voting scheme
MFM Mursi, GMR Assassa, AA Abdelhafez, KM Abosamra
2015 Second International Conference on Mathematics and Computers in …, 2015
132015
A Secured Cryptographic Messaging System Proc
H Mathkour, G Assassa, A Al-Muharib, A Juma‘h
International Conference on Machine Learning and Computing (ICMLC), 2009
72009
Breaking the F5 Algorith: An Improved Approach.
HA Aboalsamh, SA Dokheekh, H Mathkour, GMR Assassa
Egypt. Comput. Sci. J. 29 (1), 1-9, 2007
72007
Steganalysis of JPEG images: an improved approach for breaking the F5 algorithm
HA Aboalsamh, MFM Mursi, GMR Assassa
ICCOMP 8, 1011-1018, 2008
62008
Face recognition using incremental principal components analysis
HA Aboalsamh, HI Mathkour, GMR Assassa, MFM Mursi
2009 International Conference on Computing, Engineering and Information, 39-43, 2009
52009
On the transformation of Object Oriented-based Systems to Component-based Systems
H Mathkour, A Touir, H Hakami, G Assassa
2008 IEEE International Conference on Signal Image Technology and Internet …, 2008
52008
Al. Extreme Programming: A Case Study in Software Engineering Courses
G Assassa, H Dossari
Strategies, 2006
52006
Augmentation of solar still distillation performance using waste heat energy and guiding vanes: A field study
MR Salem, RY Sakr, GMR Assassa, OA Aly
Desalination 572, 117150, 2024
42024
A secured cryptographic messaging system
H Mathkour, G Assassa, A Al-Muharib, A Juma’h
2009 InternationalConference on Machine Learning and Computing IPCSIT 3, 2011
42011
An improved steganalysis approach for breaking the F5 algorithm
H Aboalsamh, H Mathkour, S Dokheekh, M Mursi, G Assassa
WSEAS Transactions on Computers 7 (9), 1447-1456, 2008
42008
The system can't perform the operation now. Try again later.
Articles 1–20