Student project allocation with preference lists over (student, project) pairs AHA El-Atta, MI Moussa 2009 Second International Conference on Computer and Electrical Engineering …, 2009 | 38 | 2009 |
Some computational results on MPI parallel implementation of dense simplex method ES Badr, M Moussa, K Paparrizos, N Samaras, A Sifaleras Transactions on Engineering, Computing and Technology 17, 228-231, 2006 | 37 | 2006 |
Image Encryption Based on New One-Dimensional Chaotic Map NF Elabady, MI Moussa, HM Abdalkader, SF Sabbeh Second International Conference on Engineering and Technology, 2013 | 36 | 2013 |
Ladder and subdivision of ladder graphs with pendant edges are odd graceful MI Moussa, EM Badr arXiv preprint arXiv:1604.02347, 2016 | 28 | 2016 |
A symmetric encryption algorithm based on DNA computing FE Ibrahim, MI Moussa, HM Abdalkader International Journal of Computer Applications 97 (16), 41-45, 2014 | 25 | 2014 |
An upper bound of radio k-coloring problem and its integer linear programming model EM Badr, MI Moussa Wireless Networks 25, 1-10, 2019 | 23 | 2019 |
Preparation of graphene/poly (vinyl alcohol) composite hydrogel films with enhanced electrical and mechanical properties A Alam, M Moussa Polymer Composites 41 (3), 809-816, 2020 | 21 | 2020 |
An algorithm for odd graceful labeling of the union of paths and cycles MI Moussa arXiv preprint arXiv:1003.3566, 2010 | 18 | 2010 |
Information hiding using artificial DNA sequences based on Gaussian kernel function EIA El-Latif, MI Moussa Journal of Information and Optimization Sciences, 2019 | 17 | 2019 |
Information hiding using artificial DNA sequences based on Elliptic Curve EIA El-Latif, MI Moussa International Conference on Mathematics, Statistics & Information Technology …, 2016 | 15* | 2016 |
MCACC: New approach for augmenting the computing capabilities of mobile devices with Cloud Computing MA Elgendy, A Shawish, MI Moussa 2014 Science and Information Conference, 79-86, 2014 | 14 | 2014 |
Crown graphs and subdivision of ladders are odd graceful EM Badr, MI Moussa, K Kathiresan International Journal of Computer Mathematics 88 (17), 3570-3576, 2011 | 13 | 2011 |
Three-step-in-one synthesis of supercapacitor MWCNT superparamagnetic magnetite composite material under flow TMD Alharbi, AHM Al-Antaki, M Moussa, WD Hutchison, CL Raston Nanoscale Advances 1 (9), 3761-3770, 2019 | 12 | 2019 |
Two-class support vector machine with new kernel function based on paths of features for predicting chemical activity AHA El-Atta, IM Moussa, AE Hassanien Information Sciences 403, 42-54, 2017 | 12 | 2017 |
Enhancing the Security of Data Hiding Using Double DNA Sequences FE Ibrahim, HM Abdalkader, MI Moussa Industry Academia Collaboration Conference (IAC), 6-8, 2015 | 12 | 2015 |
Access control models for pervasive environments: A survey W Elsayed, T Gaber, N Zhang, M Ibrahim Moussa The 1st International Conference on Advanced Intelligent System and …, 2016 | 11 | 2016 |
A Data Hiding Algorithm Based on DNA and Elliptic Curve Cryptosystems EMBSA M. I. Moussa Journal of Information Hiding and Multimedia Signal Processing (JIHMSP) 10 …, 2019 | 9 | 2019 |
A Visual Implementation of Student Project Allocation MI Moussa, AHA El-Atta | 9 | 2010 |
Polynomial, exponential and approximate algorithms for metric dimension problem E Badr, A Abd El-hay, H Ahmed, M Moussa Mathematical Combinatorics 2, 51-67, 2021 | 8 | 2021 |
Odd graceful labelings of Crown graphs MI Moussa, EM Badr 1th International Conference Computer Science From Algorithms To …, 2009 | 8 | 2009 |