logo
ArticlesAbout
Register | Login
Research Article
JUCS - Journal of Universal Computer Science 26(1): 33-49
https://doi.org/10.3897/jucs.2020.003 (28 Jan 2020)
Other versions:
XML
PDF
 
 
Twitter
Facebook
Mendeley
Reddit
Notify a colleague
  • Article InfoArticle Info
  • CitationCitation
  • MetricsMetrics
  • CommentComment
  • RelatedRelated
  • CitedCited
JUCS - Journal of Universal Computer Science 26(1): 33-49
doi: 10.3897/jucs.2020.003
Received: 30 Dec 2018 | Approved: 15 Nov 2019 | Published: 28 Jan 2020
This article is part of:
JUCS - Journal of Universal Computer Science 26(1): Recent Advances in Social Network Analysis, Management and Security
Authors
Mohammad Muhairat - Corresponding author
Al Zaytoonah University of Jordan, Amman, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Shadi ALZu Bi
Al Zaytoonah University of Jordan, Amman, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Bilal Hawashin
Al Zaytoonah University of Jordan, Amman, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Mohammad Elbes
Al Zaytoonah University of Jordan, Amman, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Mahmoud Al-Ayyoub
Jordan University of Science and Technology, Irbid, Jordan
Articles by this author in:  CrossRef  |  Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY-ND 4.0). This license allows reusers to copy and distribute the material in any medium or format in unadapted form only, and only so long as attribution is given to the creator. The license allows for commercial use.
Powered by

This website uses cookies in order to improve your web experience. Read our Cookies Policy

OK