关注
Muhammed Jassem Al-Muhammed
Muhammed Jassem Al-Muhammed
American University of Madaba, Madaba, Jordan
在 aum.edu.jo 的电子邮件经过验证
标题
引用次数
引用次数
年份
Ontology-Based Constraint Recognition for Free-Form Service Requests
MJ Al-Muhammed, DW Embley
Proceedings of the 23rd International Conference on Data Engineering (ICDE …, 2006
342006
Probability-directed random search algorithm for unconstrained optimization problem
MJ Al-Muhammed, RA Zitar
Applied Soft Computing 71, 165-182, 2018
252018
K-Lookback random-based text encryption technique
MJ Al-Muhammed
Journal of King Saud University - Computer and Information Sciences, 2017
21*2017
Conceptual Model Based Semantic Web Services.
JM Al-Muhammed, WD Embley, S Liddle
In Proceedings of the 24th International Conference on Conceptual Modeling …, 2005
162005
Resolving Underconstrained and Overconstrained Systems of Conjunctive Constraints for Service Requests.
JM Al-Muhammed, WD Embley
Proceedings of the 18th International Conference on Advanced Information …, 2006
142006
Mesh-based encryption technique augmented with effective masking and distortion operations
MJ Al-Muhammed, R Abuzitar
Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019
102019
Toward a flexible human-agent collaboration framework with mediating domain ontologies for the semantic web
DW Tijerino, Y. A., Al-Muhammed, M., and Embley
In the Proceedings of The ISWC 2004 Workshop on Meaning Coordination and …, 2004
10*2004
Theory and application of the logistic probability density function as a population growth model
JH Matis, MJ Al-Muhammed
Damascus University Journal for Basics Science 26 (1), 9-19, 2010
92010
Ontology aware software service agents: Meeting ordinary user needs on the semantic web
MJ Al-Muhammed
Brigham Young University, 2007
92007
A novel key expansion technique using diffusion
M Al-Muhammed
Computer Fraud & Security 2018 (3), 12-20, 2018
82018
Dynamic text encryption
MJ Al-Muhammed, R Abuzitar
Int. J. Secur. Appl.(IJSIA) 11 (11), 13-30, 2017
82017
Bringing Web Principles to Services: Ontology-Based Web Services
AMJ Muhammed, WE David
Proceedings of the 4th International Workshop on Semantic Web for Services …, 2007
82007
Intelligent Convolutional Mesh-Based Encryption Technique Augmented with Fuzzy Masking Operations
MJ Al-Muhammed, R Abuzitar
International Journal of Innovative Computing, Information and Control …, 2020
62020
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
MJ Al-Muhammed
International Journal of Advanced Computer Science and Applications 9 (9), 2018
62018
Tightly Close it-Robustly Secure it: Key-Based Lightweight Process for Popping up Encryption Techniques
MJ Al-Muhammed, A Al-daraiseh, R Abu Zitar
Proceedings of the computing conference 2020, London, UK, 2020, 2020
52020
Random-guided search algorithm for complex functions
MJ Al-Muhammed, RA Zitar
2017 10th Jordanian International Electrical and Electronics Engineering …, 2017
52017
Dynamic matchmaking between messages and services in multi-agent systems
M Al-Muhammed
Brigham Young University. Department of Computer Science, 2004
42004
Encryption technique based on fuzzy neural network hiding module and effective distortion method
MJ Al-Muhammed, A Al-Daraiseh
Neural Computing and Applications, https://doi.org/10.1007/s00521-022-06950, 2022
32022
An Innovative Image/Text Encryption Technique using Fuzzy Substitution and Chaotic Key Expansion Module
MJ Al-Muhammed, A Al-Daraiseh
Multimedia Tools and Applications 83 (8), 23201-23226, 2024
22024
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map
A Al-Daraiseh, Y Sanjalawe, S Al-E’mari, S Fraihat, M Bany Taha, ...
Journal of Sensor and Actuator Networks 12 (5), 73, 2023
22023
系统目前无法执行此操作,请稍后再试。
文章 1–20