1. Parallel Performance Analysis and Numerical Simulation of Magnetic Nanoparticles Transportation and Blood Flow Pattern in Capillaries
2. Cole, E., Krutz, R. L., Conley, J., Reisman, B., Ruebush, M., & Gollmann, D. (2007). Wiley Pathways Network Security
Fundamentals, John Wiley & Sons.
3. Damico, T. M. (2009). A brief history of cryptography. Inquiries Journal, 1(11). Retrieved from http://www.inquiriesjournal.
com/a?id=1698
4. Elzaki, T. M. (2009). Existence and uniqueness of solutions for composite type equation. Journal of Science and
Technology, 10(2), 215-220.
5. Elzaki, T. M. (2011a). The new integral transform Elzaki transform. Global Journal of Pure and Applied Mathematics, 7(1),
57-64.