Analysis of community question‐answering issues via machine learning and deep learning: State‐of‐the‐art review

PK Roy, S Saumya, JP Singh… - CAAI Transactions on …, 2023 - Wiley Online Library
Over the last couple of decades, community question‐answering sites (CQAs) have been a
topic of much academic interest. Scholars have often leveraged traditional machine learning …

Ai-based mobile edge computing for iot: Applications, challenges, and future scope

A Singh, SC Satapathy, A Roy, A Gutub - Arabian Journal for Science and …, 2022 - Springer
New technology is needed to meet the latency and bandwidth issues present in cloud
computing architecture specially to support the currency of 5G networks. Accordingly, mobile …

Boosting image watermarking authenticity spreading secrecy from counting‐based secret‐sharing

A Gutub - CAAI Transactions on Intelligence Technology, 2023 - Wiley Online Library
This study presents enhancing images authentication by securing watermarking hidden data
via shares generated from counting‐based secret sharing. The trustfulness of shares utilised …

[HTML][HTML] Blockchain based hierarchical semi-decentralized approach using IPFS for secure and efficient data sharing

S Athanere, R Thakur - Journal of King Saud University-Computer and …, 2022 - Elsevier
Nowadays, cloud servers are gathering an increasing amount of data. Data is commonly
stored on cloud servers in the form of ciphertext to protect security and concealment of data …

Encryption and steganography-based text extraction in IoT using the EWCTS optimizer

B Kumar Pandey, D Pandey, VK Nassa… - The Imaging Science …, 2021 - Taylor & Francis
This paper develops an effective encryption and steganography-based text extraction in IoT
using deep learning method. Initially, the input text and cover images are separately pre …

[HTML][HTML] Securing matrix counting-based secret-sharing involving crypto steganography

F Al-Shaarani, A Gutub - Journal of King Saud University-Computer and …, 2022 - Elsevier
The privacy and confidentiality of our data are more fundamental to our existence than ever,
especially with our growing dependence on online services and the transfer of information …

Improving grayscale steganography to protect personal information disclosure within hotel services

AK Sahu, A Gutub - Multimedia Tools and Applications, 2022 - Springer
An unauthorized leak of information that is not tolerable always implies inadequate or poor
security measures of information. Globally, the hospitality industry has in the recent past …

Adopting counting-based secret-sharing for e-Video Watermarking allowing Fractional Invalidation

AAA Gutub - Multimedia Tools and Applications, 2022 - Springer
Watermarking is the process of embedding secret data to prove ownership copyright
authentication validation. It is becoming urgently required within e-videos to provide proper …

Novel arabic e-text watermarking supporting partial dishonesty based on counting-based secret sharing

E Almehmadi, A Gutub - Arabian Journal for Science and Engineering, 2022 - Springer
Nowadays, the proliferation done on information systems had led to an alarming increase in
security breaches. This security trend is now viewed as an essential foundation in the …

Discrepancies of remote techno-tolerance due to COVID-19 pandemic within Arab middle-east countries

MA Abu-Hashem, A Gutub, O Salem… - Journal of Umm Al-Qura …, 2023 - Springer
Abstract The coronavirus disease (COVID-19) changed the world's lifestyle switching many
techno-services to be provided remotely instead of direct usual physical interactions …