{"title":"Development of the hybrid MCDM model for cloud computing adoption strategic management","authors":"A. Abdelmonem","doi":"10.54216/fpa.030203","DOIUrl":"https://doi.org/10.54216/fpa.030203","url":null,"abstract":"With the widespread use of distributed alternative energy sources, electric cars, energy storage systems, and technologies like Cloud Computing (CC), Big Data, and the IoT, energy management in CC contexts has developed. Concerns about the Energy Cloud's performance goals are presented in this fashion as a major development point (EC). The aims of this essay include identifying key FPVs and how they relate to issues in EC, as well as formulating an approach to overseeing the growth and maturity of EC settings. Through literature research, FPVs were identified as well as their influence on each other. It was determined that those FPVs were an important, secondary, motivational factor, and independent voters by using the AHP approach. An all-encompassing management model for EC is presented in the article, and it can be used as a compass for making strategic choices on technical, organizational, commercial, and regulatory matters. This model may be tailored to the specifics of the business landscape and its breadth.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Effective multicriteria decision-making model for extraction of lithium from seawater/brine: Design and practice","authors":"M. Ismail","doi":"10.54216/fpa.040104","DOIUrl":"https://doi.org/10.54216/fpa.040104","url":null,"abstract":"PROMETHEE II decision-making methodologies are integrated into a novel framework in this research. A real-world case study of lithium extraction techniques served as the basis for this investigation. Lithium extraction from brines and saltwater has become more difficult due to the limited natural resources of lithium and the worldwide desire to replace fossil fuels with clean and recyclable energy. Using a multi-criteria decision-making approach, the suggested framework aids in selecting the best lithium extraction procedure from brines and saltwater. A case study of lithium extraction from brines and saltwater has been used the findings of the study show that the suggested strategy is logical and enforceable.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Deep Learning Fusion for Attack Detection in Internet of Things Communications","authors":"Ossama .., Mhmed Algrnaodi","doi":"10.54216/fpa.090203","DOIUrl":"https://doi.org/10.54216/fpa.090203","url":null,"abstract":"The increasing deep learning techniques used in multimedia and networkIoT solve many problems and increase performance. Securing the deep learning models, multimedia, and networkIoT has become a major area of research in the past few years which is considered to be a challenge during generative adversarial attacks over the multimedia or networkIoT. Many efforts and studies try to provide intelligent forensics techniques to solve security issues. This paper introduces a holistic organization of intelligent multimedia forensics that involve deep learning fusion, multimedia, and networkIoT forensics to attack detection. We highlight the importance of using deep learning fusion techniques to obtain intelligent forensics and security over multimedia or NetworkIoT. Finally, we discuss the key challenges and future directions in the area of intelligent multimedia forensics using deep learning fusion techniques.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modelling of an Adaptive Network Model for Phishing Website Detection Using Learning Approaches","authors":"A. Tenis, S. R","doi":"10.54216/fpa.120213","DOIUrl":"https://doi.org/10.54216/fpa.120213","url":null,"abstract":"Phishing links are spread via text messages, social media platforms, and email by phishing attackers. Social engineering skills are used to visit phishing websites to trick the users and enter critical information related to personal data. The confidential data is stolen to defraud legitimate financial institutions or general websites for illegally attaining the benefits. Many machine learning-based solutions are in the enhancements and the technology of machine learning applications to detect the suggested phishing. The rules are used for a solution which depends on the extracted features, and few features require to lies on the services of third-party that, creating time-consuming and instability in the service of prediction. A deep learning-based framework is suggested to detect website of phishing. A framework is established to determine if there is a risk of phishing in real-time during the web page is visited by the user to give a message of warming by the browser plug-in. The prediction service in real-time merges the various techniques for enhancing the accuracy to lower the fake alarm rates and the time of computation which has the filtering whitelist, interception of the blacklist, and prediction of deep learning (DL). Various models of deep learning are compared using the different datasets in the module of machine learning prediction. The greatest accuracy is obtained as 99.18% by the adaptive Recurrent Neural Networks (a−RNN) model from the results of experiments to demonstrate the suggested feasibility solution.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132611624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Almajed, A. Abualkishik, Amera Ibrahim, Nahia Mourad
{"title":"Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors","authors":"R. Almajed, A. Abualkishik, Amera Ibrahim, Nahia Mourad","doi":"10.54216/fpa.100205","DOIUrl":"https://doi.org/10.54216/fpa.100205","url":null,"abstract":"Non-Fungible Tokens (NFTs) are one-of-a-kind digital items with static or continuous visual and audio content. NFTs digitally represent any assets that may hold photos, gifs, audio, videos, or any other data-based storable material. These assets may come under a variety of asset groups, including art, in-game goods, and entertainment collecting units. What makes them appealing is their exclusivity, in the sense that each NFT is unique to itself, and ownership is determined by a digital certificate. In the first half of 2021, NFT sales totaled more than a billion. The NFT Software as a service (SAAS) based system is a one-of-a-kind offering and concept for thinking outside the box and presenting intellectuals and creative treasures and exhibiting these objects to ensure the security and integrity of digital assets. The existence of core decentralized networks allows for unrestricted access to this material as well as further analysis. Based on the Web3 Blockchain technology, these assets may be traded and represent next-generation ownership. In this paper, Adaptive Improved Convolutional Neural Networks (AICNN) are used to forecast NFT to provide a SAAS NFT collector. We also introduce Tree-seed Chaotic Atom Search Optimization (TSC-ASO) algorithm to optimize the forecasting process. The proposed method of NFT price forecasting is evaluated and compared with the existing forecasting methods. To produce an accurate report for NFT price forecasting, the proposed method will be effective.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aymen Hussein, S. Ahmed, Shorook K. Abed, Noor Thamer
{"title":"Enhancing IoT-Based Intelligent Video Surveillance through Multi-Sensor Fusion and Deep Reinforcement Learning","authors":"Aymen Hussein, S. Ahmed, Shorook K. Abed, Noor Thamer","doi":"10.54216/fpa.110202","DOIUrl":"https://doi.org/10.54216/fpa.110202","url":null,"abstract":"Currenlty, wireless communication that is successful in the Internet of Things (IoT) must be long-lasting and self-sustaining. The integration of machine learning (ML) techniques, including deep learning (DL), has enabled IoT networks to become highly effective and self-sufficient. DL models, such as enhanced DRL (EDRL), have been developed for intelligent video surveillance (IVS) applications. Combining multiple models and optimizing fusion scores can improve fusion system design and decision-making processes. These intelligent systems for information fusion have a wide range of potential applications, including in robotics and cloud environments. Fuzzy approaches and optimization algorithms can be used to improve data fusion in multimedia applications and e-systems. The camera sensor is developing algorithms for mobile edge computing (MEC) that use action-value techniques to instruct system actions through collaborative decision-making optimization. Combining IoT and deep learning technologies to improve the overall performance of apps is a difficult task. With this strategy, designers can increase security, performance, and accuracy by more than 97.24 %, as per research observations.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text Classification Using Convolutional Neural Networks","authors":"S. Mishal, Murtadha M. Hamad","doi":"10.54216/fpa.070105","DOIUrl":"https://doi.org/10.54216/fpa.070105","url":null,"abstract":"Most of the information (more than 80%) is stored as text, and text mining is a very important process as it is an initial step in the process of text classification, and this is especially the case in the Arabic language. The Aim of The Study is to classify Arabic texts according to specific categories using advanced performance indicators We used Data Templates as a platform for managing and organizing Apache Spark to solve big data challenges. Apache Spark offers several integrated language APIs. nlp lib was used for text processing. The data is pre-processed through several steps, namely separating the words into one text on the basis of the space between words, cleaning the text of unwanted words, restoring the words to their roots, as well as the feature selection process is a critical step. in text classification. It is a preprocessing technology. In this paper, one way to determine which TF attributes are used how often each feature appears in the document is that they consider the first level of the feature selection process. Then we use TF-IDF to determine the significance of the feature in the document, and this is the last step in the preprocessing Outcomes Text classification . Results were evaluated using advanced performance indicators such as accuracy, Precision and recall. A high accuracy of 96.94% was achieved.The main objective of this paper is to classify basic texts quickly and accurately, according to the results as long as the feature size is suitable, the most advanced technology is superior to other pass rate methods due to the reasonable reliability and perfect pruning level.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Jain, Geetika Dhand, Kavita Sheoran, S. Malik, Nishtha Jatana
{"title":"Blockchain based Certificate Validation","authors":"R. Jain, Geetika Dhand, Kavita Sheoran, S. Malik, Nishtha Jatana","doi":"10.54216/fpa.120204","DOIUrl":"https://doi.org/10.54216/fpa.120204","url":null,"abstract":"Certificate management is a tedious task for any university or any other organization. These schemes impose problems in Public Key Infrastructure (PKI). Checking the validity and preserving the security of these documents is of utmost importance. In this work, we have devised a blockchain-based solution for preventing malfunctioning in certificate validation which is an important step for any university. Each certificate is uploaded in its hash format and is stored using blockchain. The hashes are stored in unique transactions in nodes, which are deployed on a private network. Using the SHA-256 hashing algorithm, the certificates are uploaded into the system and can be viewed by anyone with the right credentials. Due to the usage of blockchain technology, the certificates are stored in a decentralized manner, which ensures there is no central point of failure. Any changes in the uploaded document need to be validated by other nodes. This paper also improvises that when certificate uploading is required new nodes are added, instead of modifying the past blocks. This work provides a very user-friendly app where any user with the right credentials can upload documents. In this work, digitized documents are stored using Inter Planetary File System (IPFS) which is distributed method of storage. Our theoretical analysis proves that it is a user-friendly application with the security of blockchain technology in partnership with IPFS. Only the issuer can upload documents and others can only view them. Using our proposed solution, problem of malicious certificates can be tackled with E-certification. The proposed method solves all the issues of storing, validating, and sharing documents. Chaotic Map technique is used in hash generation which is quite simple to implement. The proposed approach Chaotic Key based Certificate validation (CK-Cert) provides a hassle-free solution for certificate managements since it better manages the block size as compared to previously proposed techniques (PBCert and CertChain) as discussed with the help of graphs.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Cloud-based ECG Monitoring, Detection and Classification using GAN","authors":"A. Admin, Monika Gupta","doi":"10.54216/fpa.020201","DOIUrl":"https://doi.org/10.54216/fpa.020201","url":null,"abstract":"Internet of Things (IoT) based healthcare applications have grown exponentially over the past decade. With the increasing number of fatalities due to cardiovascular diseases (CVD), it is the need of the hour to detect any signs of cardiac abnormalities as early as possible. This calls for automation on the detection and classification of said cardiac abnormalities by physicians. The problem here is that, there is not enough data to train Deep Learning models to classify ECG signals accurately because of sensitive nature of data and the rarity of certain cases involved in CVDs. In this paper, we propose a framework which involves Generative Adversarial Networks (GAN) to create synthetic training data for the classes with less data points to improve the performance of Deep Learning models trained with the dataset. With data being input from sensors via cloud and this model to classify the ECG signals, we expect the framework to be functional, accurate and efficient.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129907069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H. Taneja, A. Abhinav, Apoorv Apoorv, Himanshu Mangal, Naman Agarwal
{"title":"Detection of Covid-19 using Cough Sounds","authors":"H. Taneja, A. Abhinav, Apoorv Apoorv, Himanshu Mangal, Naman Agarwal","doi":"10.54216/fpa.070202","DOIUrl":"https://doi.org/10.54216/fpa.070202","url":null,"abstract":"Coronavirus, the pandemic due to which about 4 million have lost their lives and counting, is still on. Many scientists and researchers are trying to find ways to detect coronavirus as soon as possible in the human body so that they can start their medication and precaution as soon as possible. Still, due to lack of lab facilities, the RT-PCR is taking more than three days to give the report, and in the meanwhile, patients get serious and life in danger. So in this paper, we proposed an audio-based coronavirus detection technique in which we can get results in minutes. Coronavirus is a respiratory disease, and the sound produced while breathing can tell us about the presence of coronavirus. Audio-based detection was already used for the detection of asthma, pneumonia. So, in this paper, we implemented a combination of machine learning and deep learning techniques to find the presence of Covid-19, and the model has an accuracy of 78% and an f1 score of 74%. This technique can be used as a starting point for just audio data to diagnose diseases and save lives.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"61 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129544377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}