Open Access
ARTICLE
Amel Ali Alhussan1, Doaa Sami Khafaga1, El-Sayed M. El-kenawy2,*, Marwa M. Eid2,3, Abdelhameed Ibrahim4
1 Department of Computer Sciences, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, 11671, Saudi Arabia
2 Department of Communications and Electronics, Delta Higher Institute for Engineering and Technology, Mansoura, 35511, Egypt
3 Faculty of Artificial Intelligence, Delta University for Science and Technology, Mansoura, 35712, Egypt
4 Computer Engineering and Control Systems Department, Faculty of Engineering, Mansoura University, Mansoura, 35516, Egypt
* Corresponding Author: El-Sayed M. El-kenawy. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.049001
Received 24 December 2023; Accepted 03 June 2024; Published online 25 June 2024
View
Download
Like
An Improved Memory Cache Management Study Based on Spark
Suzhen Wang, Yanpiao Zhang, Lu...Network Security Situation Awareness Framework based on Threat Intelligence
Hongbin Zhang, Yuzi Yi, Junshe...A PSO based Energy Efficient Coverage Control Algorithm for Wireless Sensor Networks
Jin Wang, Chunwei Ju, Yu Gao,...Full-Blind Delegating Private Quantum Computation
Wenjie Liu, Zhenyu Chen, Jinsuo...An Empirical Comparison on Multi-Target Regression Learning
Xuefeng Xi, Victor S. Sheng, Binqi...