Muhammed Jassem Al-Muhammed
Orcid: 0000-0002-1845-4364
According to our database1,
Muhammed Jassem Al-Muhammed
authored at least 14 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An encryption technique based on bilateral chaotic systems and fuzzy symbol encoding.
Soft Comput., August, 2024
Bit-sensitive chaos-based encryption technique with nonparametric memory loss-based key hiding code generation.
J. Cryptogr. Eng., June, 2024
An Innovative Image/Text Encryption Technique using Fuzzy Substitution and Chaotic Key Expansion Module.
Multim. Tools Appl., 2024
Medical image encryption algorithm based on Fresnel zone formula, differential neural networks, and pixel-guided perturbation techniques.
Comput. Electr. Eng., 2024
2023
J. Sens. Actuator Networks, September, 2023
2022
Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method.
Symmetry, 2022
Strong and Efficient Cipher with Dynamic Symbol Substitution and Dynamic Noise Insertion.
Symmetry, 2022
Encryption technique based on fuzzy neural network hiding module and effective distortion method.
Neural Comput. Appl., 2022
Ontology-aware dynamically adaptable free-form natural language agent interface for querying databases.
Knowl. Based Syst., 2022
2020
Lookback-Guess-Next Optimizer: Feedback-Guided Random Search Technique with Biased Mapping for Solving Unconstrained Optimization Problems.
Comput. J., 2020
Tightly Close It, Robustly Secure It: Key-Based Lightweight Process for Propping up Encryption Techniques.
Proceedings of the Intelligent Computing, 2020
2019
J. King Saud Univ. Comput. Inf. Sci., 2019
2018
Appl. Soft Comput., 2018
Likelihood-Based Random Search Technique for Solving Unconstrained Optimization Problems.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018