共 19 条
[1]
Abikoye O. C., 2012, INT J ACCOUNT INF SY, V4, P6
[2]
Al-Nofaie SM, 2016, Journal of Computer Science & Computational Mathematics, V6, P59, DOI [10.20967/jcscm.2016.03.004, DOI 10.20967/JCSCM.2016.03.004]
[3]
Al-Otaibi Nouf A., 2014, Lecture Notes on Information Theory, V2, P151, DOI 10.12720/lnit.2.2.151-157
[4]
Alanizy N, 2018, J Res Eng Appl Sci, V3, P118
[5]
Alsaidi A., 2018, J COMPUTER SCI COMPU, V8, DOI [10.20967/jcscm.2018.03.002, DOI 10.20967/jcscm.2018.03.002]
[6]
[Anonymous], 2015, 12 LEARN TECHN C WEA
[7]
[Anonymous], 2014, INT C ADV ENG TECHN
[8]
Asad M., 2011, Proceedings of the 1st International Conference on Computer Networks and Information Technology (ICCNIT 2011), P143, DOI 10.1109/ICCNIT.2011.6020921
[9]
Deshmukh R, 2011, INT J ADV RES COMPUT, V2, P492
[10]
Goshwe NY, 2013, INT J COMPUT SCI NET, V13, P9