Follow
Muhammed Jassem Al-Muhammed
Muhammed Jassem Al-Muhammed
American University of Madaba, Madaba, Jordan
Verified email at aum.edu.jo
Title
Cited by
Cited by
Year
Ontology-Based Constraint Recognition for Free-Form Service Requests
MJ Al-Muhammed, DW Embley
Proceedings of the 23rd International Conference on Data Engineering (ICDE …, 2006
342006
Probability-directed random search algorithm for unconstrained optimization problem
MJ Al-Muhammed, RA Zitar
Applied Soft Computing 71, 165-182, 2018
222018
K-Lookback random-based text encryption technique
MJ Al-Muhammed
Journal of King Saud University - Computer and Information Sciences, 2017
21*2017
Conceptual Model Based Semantic Web Services.
JM Al-Muhammed, WD Embley, S Liddle
In Proceedings of the 24th International Conference on Conceptual Modeling …, 2005
162005
Resolving Underconstrained and Overconstrained Systems of Conjunctive Constraints for Service Requests.
JM Al-Muhammed, WD Embley
Proceedings of the 18th International Conference on Advanced Information …, 2006
142006
Mesh-based encryption technique augmented with effective masking and distortion operations
MJ Al-Muhammed, R Abuzitar
Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019
102019
Toward a flexible human-agent collaboration framework with mediating domain ontologies for the semantic web
DW Tijerino, Y. A., Al-Muhammed, M., and Embley
In the Proceedings of The ISWC 2004 Workshop on Meaning Coordination and …, 2004
10*2004
Theory and application of the logistic probability density function as a population growth model
JH Matis, MJ Al-Muhammed
Damascus University Journal for Basics Science 26 (1), 9-19, 2010
92010
Ontology aware software service agents: Meeting ordinary user needs on the semantic web
MJ Al-Muhammed
Brigham Young University, 2007
92007
A novel key expansion technique using diffusion
M Al-Muhammed
Computer Fraud & Security 2018 (3), 12-20, 2018
82018
Dynamic text encryption
MJ Al-Muhammed, R Abuzitar
Int. J. Secur. Appl.(IJSIA) 11 (11), 13-30, 2017
82017
Bringing Web Principles to Services: Ontology-Based Web Services
AMJ Muhammed, WE David
Proceedings of the 4th International Workshop on Semantic Web for Services …, 2007
82007
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
MJ Al-Muhammed
International Journal of Advanced Computer Science and Applications 9 (9), 2018
72018
Intelligent Convolutional Mesh-Based Encryption Technique Augmented with Fuzzy Masking Operations
MJ Al-Muhammed, R Abuzitar
International Journal of Innovative Computing, Information and Control …, 2020
62020
Tightly Close it-Robustly Secure it: Key-Based Lightweight Process for Popping up Encryption Techniques
MJ Al-Muhammed, A Al-daraiseh, R Abu Zitar
Proceedings of the computing conference 2020, London, UK, 2020, 2020
52020
Random-guided search algorithm for complex functions
MJ Al-Muhammed, RA Zitar
2017 10th Jordanian International Electrical and Electronics Engineering …, 2017
52017
Dynamic matchmaking between messages and services in multi-agent systems
M Al-Muhammed
Brigham Young University. Department of Computer Science, 2004
42004
Encryption technique based on fuzzy neural network hiding module and effective distortion method
MJ Al-Muhammed, A Al-Daraiseh
Neural Computing and Applications, https://doi.org/10.1007/s00521-022-06950, 2022
32022
Mitigating autocorrelation in richards growth model analysis using incremental growth data with application to turkey growth.
JH Matis, KT Mohammed, MJ Al-Muhammed
32011
An Encryption Technique based on Bilateral Chaotic Systems and Fuzzy Symbol Encoding
MJ Al-Muhammed
Soft Computing, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20