Obserwuj
Muhammed Jassem Al-Muhammed
Muhammed Jassem Al-Muhammed
American University of Madaba, Madaba, Jordan
Zweryfikowany adres z aum.edu.jo
Tytuł
Cytowane przez
Cytowane przez
Rok
Ontology-Based Constraint Recognition for Free-Form Service Requests
MJ Al-Muhammed, DW Embley
Proceedings of the 23rd International Conference on Data Engineering (ICDE …, 2006
342006
Probability-directed random search algorithm for unconstrained optimization problem
MJ Al-Muhammed, RA Zitar
Applied Soft Computing 71, 165-182, 2018
222018
K-Lookback random-based text encryption technique
MJ Al-Muhammed
Journal of King Saud University - Computer and Information Sciences, 2017
21*2017
Conceptual Model Based Semantic Web Services.
JM Al-Muhammed, WD Embley, S Liddle
In Proceedings of the 24th International Conference on Conceptual Modeling …, 2005
162005
Resolving Underconstrained and Overconstrained Systems of Conjunctive Constraints for Service Requests.
JM Al-Muhammed, WD Embley
Proceedings of the 18th International Conference on Advanced Information …, 2006
142006
Mesh-based encryption technique augmented with effective masking and distortion operations
MJ Al-Muhammed, R Abuzitar
Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019
102019
Toward a flexible human-agent collaboration framework with mediating domain ontologies for the semantic web
DW Tijerino, Y. A., Al-Muhammed, M., and Embley
In the Proceedings of The ISWC 2004 Workshop on Meaning Coordination and …, 2004
10*2004
Theory and application of the logistic probability density function as a population growth model
JH Matis, MJ Al-Muhammed
Damascus University Journal for Basics Science 26 (1), 9-19, 2010
92010
Ontology aware software service agents: Meeting ordinary user needs on the semantic web
MJ Al-Muhammed
Brigham Young University, 2007
92007
Dynamic text encryption
MJ Al-Muhammed, R Abuzitar
Int. J. Secur. Appl.(IJSIA) 11 (11), 13-30, 2017
82017
Bringing Web Principles to Services: Ontology-Based Web Services
AMJ Muhammed, WE David
Proceedings of the 4th International Workshop on Semantic Web for Services …, 2007
82007
A novel key expansion technique using diffusion
M Al-Muhammed
Computer Fraud & Security 2018 (3), 12-20, 2018
72018
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking
MJ Al-Muhammed
International Journal of Advanced Computer Science and Applications 9 (9), 2018
72018
Intelligent Convolutional Mesh-Based Encryption Technique Augmented with Fuzzy Masking Operations
MJ Al-Muhammed, R Abuzitar
International Journal of Innovative Computing, Information and Control …, 2020
62020
Tightly Close it-Robustly Secure it: Key-Based Lightweight Process for Popping up Encryption Techniques
MJ Al-Muhammed, A Al-daraiseh, R Abu Zitar
Proceedings of the computing conference 2020, London, UK, 2020, 2020
52020
Random-guided search algorithm for complex functions
MJ Al-Muhammed, RA Zitar
2017 10th Jordanian International Electrical and Electronics Engineering …, 2017
52017
Dynamic matchmaking between messages and services in multi-agent systems
M Al-Muhammed
Brigham Young University. Department of Computer Science, 2004
42004
Encryption technique based on fuzzy neural network hiding module and effective distortion method
MJ Al-Muhammed, A Al-Daraiseh
Neural Computing and Applications, https://doi.org/10.1007/s00521-022-06950, 2022
32022
Mitigating autocorrelation in richards growth model analysis using incremental growth data with application to turkey growth.
JH Matis, KT Mohammed, MJ Al-Muhammed
32011
An Encryption Technique based on Bilateral Chaotic Systems and Fuzzy Symbol Encoding
MJ Al-Muhammed
Soft Computing, 2023
12023
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20