Ontology-Based Constraint Recognition for Free-Form Service Requests MJ Al-Muhammed, DW Embley Proceedings of the 23rd International Conference on Data Engineering (ICDE …, 2006 | 34 | 2006 |
Probability-directed random search algorithm for unconstrained optimization problem MJ Al-Muhammed, RA Zitar Applied Soft Computing 71, 165-182, 2018 | 25 | 2018 |
K-Lookback random-based text encryption technique MJ Al-Muhammed Journal of King Saud University - Computer and Information Sciences, 2017 | 21* | 2017 |
Conceptual Model Based Semantic Web Services. JM Al-Muhammed, WD Embley, S Liddle In Proceedings of the 24th International Conference on Conceptual Modeling …, 2005 | 16 | 2005 |
Resolving Underconstrained and Overconstrained Systems of Conjunctive Constraints for Service Requests. JM Al-Muhammed, WD Embley Proceedings of the 18th International Conference on Advanced Information …, 2006 | 14 | 2006 |
Mesh-based encryption technique augmented with effective masking and distortion operations MJ Al-Muhammed, R Abuzitar Intelligent Computing: Proceedings of the 2019 Computing Conference, Volume …, 2019 | 10 | 2019 |
Toward a flexible human-agent collaboration framework with mediating domain ontologies for the semantic web DW Tijerino, Y. A., Al-Muhammed, M., and Embley In the Proceedings of The ISWC 2004 Workshop on Meaning Coordination and …, 2004 | 10* | 2004 |
Theory and application of the logistic probability density function as a population growth model JH Matis, MJ Al-Muhammed Damascus University Journal for Basics Science 26 (1), 9-19, 2010 | 9 | 2010 |
Ontology aware software service agents: Meeting ordinary user needs on the semantic web MJ Al-Muhammed Brigham Young University, 2007 | 9 | 2007 |
A novel key expansion technique using diffusion M Al-Muhammed Computer Fraud & Security 2018 (3), 12-20, 2018 | 8 | 2018 |
Dynamic text encryption MJ Al-Muhammed, R Abuzitar Int. J. Secur. Appl.(IJSIA) 11 (11), 13-30, 2017 | 8 | 2017 |
Bringing Web Principles to Services: Ontology-Based Web Services AMJ Muhammed, WE David Proceedings of the 4th International Workshop on Semantic Web for Services …, 2007 | 8 | 2007 |
Intelligent Convolutional Mesh-Based Encryption Technique Augmented with Fuzzy Masking Operations MJ Al-Muhammed, R Abuzitar International Journal of Innovative Computing, Information and Control …, 2020 | 6 | 2020 |
Light but Effective Encryption Technique based on Dynamic Substitution and Effective Masking MJ Al-Muhammed International Journal of Advanced Computer Science and Applications 9 (9), 2018 | 6 | 2018 |
Tightly Close it-Robustly Secure it: Key-Based Lightweight Process for Popping up Encryption Techniques MJ Al-Muhammed, A Al-daraiseh, R Abu Zitar Proceedings of the computing conference 2020, London, UK, 2020, 2020 | 5 | 2020 |
Random-guided search algorithm for complex functions MJ Al-Muhammed, RA Zitar 2017 10th Jordanian International Electrical and Electronics Engineering …, 2017 | 5 | 2017 |
Dynamic matchmaking between messages and services in multi-agent systems M Al-Muhammed Brigham Young University. Department of Computer Science, 2004 | 4 | 2004 |
Encryption technique based on fuzzy neural network hiding module and effective distortion method MJ Al-Muhammed, A Al-Daraiseh Neural Computing and Applications, https://doi.org/10.1007/s00521-022-06950, 2022 | 3 | 2022 |
An Innovative Image/Text Encryption Technique using Fuzzy Substitution and Chaotic Key Expansion Module MJ Al-Muhammed, A Al-Daraiseh Multimedia Tools and Applications 83 (8), 23201-23226, 2024 | 2 | 2024 |
Cryptographic Grade Chaotic Random Number Generator Based on Tent-Map A Al-Daraiseh, Y Sanjalawe, S Al-E’mari, S Fraihat, M Bany Taha, ... Journal of Sensor and Actuator Networks 12 (5), 73, 2023 | 2 | 2023 |