Research Article
Other versions:
- Article InfoArticle Info
- CiteCite
- MetricsMetrics
- CommentComment
- RelatedRelated
- CitedCited
JUCS - Journal of Universal Computer Science 28(9): 949-966
doi:
10.3897/jucs.94161
Received:
05 Nov 2021 | Approved:
30 Apr 2022 | Published:
28 Sep 2022
This article is part of:
Authors
JAIN (Deemed to be University), Bangalore, India
Abdul Khader Jilani Saudagar
- Corresponding author
Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia
Information Systems Department,College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia
Information Systems Department,College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia
Information Systems Department,College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia
Information Systems Department,College of Computer and Information Sciences, Imam Mohammad Ibn Saud Islamic University (IMSIU), Riyadh, Saudi Arabia
GLA University, Mathura, India
Conflict of interest
The authors have declared that no competing interests exist.
Supporting agencies
The authors extend their appreciation to the Deanship of Scientific Research at Imam Mohammad Ibn Saud Islamic University for funding this work through Research Group no. RG-21-07-02.
This is an open access article distributed under the terms of the Creative Commons Attribution License (CC BY-ND 4.0). This license allows reusers to copy and distribute the material in any medium or format in unadapted form only, and only so long as attribution is given to the creator. The license allows for commercial use.