Open Access
ARTICLE
Dhiaa Musleh1, Atta Rahman1,*, Mohammed Abbas Alkherallah1, Menhal Kamel Al-Bohassan1, Mustafa Mohammed Alawami1, Hayder Ali Alsebaa1, Jawad Ali Alnemer1, Ghazi Fayez Al-Mutairi1, May Issa Aldossary2, Dalal A. Aldowaihi1, Fahd Alhaidari3
1 Department of Computer Science, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
2 Department of Computer Information Systems, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
3 Department of Networks and Communications, College of Computer Science and Information Technology, Imam Abdulrahman Bin Faisal University, P.O. Box 1982, Dammam, 31441, Saudi Arabia
* Corresponding Author: Atta Rahman. Email:
Computers, Materials & Continua https://doi.org/10.32604/cmc.2024.048003
Received 24 November 2023; Accepted 28 May 2024; Published online 28 June 2024
View
Download
Like
A Novel Ensemble Learning Algorithm Based on D-S Evidence Theory for IoT Security
Changting ShiNew Generation Model of Word Vector Representation Based on CBOW or Skip-Gram
Zeyu Xiong, Qiangqiang Shen, Yueshan...