Open Access
ARTICLE
Ronak Patel1, Miral Patel2, Deep Kothadiya3, Noor A. Khan4, Shaha Al-Otaibi5,*, Roaa Khalil Mohamed Ali Abed6, Tanzila Saba7
1 U & P U. Patel Department of Computer Engineering, Chandubhai S. Patel Institute of Technology (CSPIT), Faculty of Technology (FTE), Charotar University of Science and Technology (CHARUSAT), Changa, India
2 G H Patel College of Engineering and Technology, CVM University, V.V. Nagar, Anand, Gujarat, India
3 Symbiosis Centre for Information Technology, Symbiosis International (Deemed University), Pune, India
4 Center of Excellence in Cyber Security (CYBEX), Prince Sultan University, Riyadh, Saudi Arabia
5 Department of Information Systems, College of Computer and Information Sciences, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh, Saudi Arabia
6 College of Sciences and Humanities (CSH), Prince Sultan University, Riyadh, Saudi Arabia
7 AIDA Lab. CCIS, Prince Sultan University, Riyadh, Saudi Arabia
* Corresponding Author: Shaha Al-Otaibi. Email:
Computer Modeling in Engineering & Sciences https://doi.org/10.32604/cmes.2026.080819
Received 15 February 2026; Accepted 15 April 2026; Published online 05 May 2026
View
Download
Like
A Robust Data Hiding Reversible Technique for Improving the Security in e-Health Care System
Saima Kanwal, Feng Tao, Ahmad...An Efficient Encryption and Compression of Sensed IoT Medical Images Using Auto-Encoder
Passent El-kafrawy, Maie Aboghazalah,...A Study of BERT-Based Classification Performance of Text-Based Health Counseling Data
Yeol Woo Sung, Dae Seung Park,...