Fusion: Practice and Applications最新文献

筛选
英文 中文
Development of the hybrid MCDM model for cloud computing adoption strategic management 云计算采用战略管理的混合MCDM模型的开发
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.030203
A. Abdelmonem
{"title":"Development of the hybrid MCDM model for cloud computing adoption strategic management","authors":"A. Abdelmonem","doi":"10.54216/fpa.030203","DOIUrl":"https://doi.org/10.54216/fpa.030203","url":null,"abstract":"With the widespread use of distributed alternative energy sources, electric cars, energy storage systems, and technologies like Cloud Computing (CC), Big Data, and the IoT, energy management in CC contexts has developed. Concerns about the Energy Cloud's performance goals are presented in this fashion as a major development point (EC). The aims of this essay include identifying key FPVs and how they relate to issues in EC, as well as formulating an approach to overseeing the growth and maturity of EC settings. Through literature research, FPVs were identified as well as their influence on each other. It was determined that those FPVs were an important, secondary, motivational factor, and independent voters by using the AHP approach. An all-encompassing management model for EC is presented in the article, and it can be used as a compass for making strategic choices on technical, organizational, commercial, and regulatory matters. This model may be tailored to the specifics of the business landscape and its breadth.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116214114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective multicriteria decision-making model for extraction of lithium from seawater/brine: Design and practice 从海水/卤水中提取锂的有效多准则决策模型:设计与实践
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.040104
M. Ismail
{"title":"An Effective multicriteria decision-making model for extraction of lithium from seawater/brine: Design and practice","authors":"M. Ismail","doi":"10.54216/fpa.040104","DOIUrl":"https://doi.org/10.54216/fpa.040104","url":null,"abstract":"PROMETHEE II decision-making methodologies are integrated into a novel framework in this research. A real-world case study of lithium extraction techniques served as the basis for this investigation. Lithium extraction from brines and saltwater has become more difficult due to the limited natural resources of lithium and the worldwide desire to replace fossil fuels with clean and recyclable energy. Using a multi-criteria decision-making approach, the suggested framework aids in selecting the best lithium extraction procedure from brines and saltwater. A case study of lithium extraction from brines and saltwater has been used the findings of the study show that the suggested strategy is logical and enforceable.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126537625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Fusion for Attack Detection in Internet of Things Communications 基于深度学习融合的物联网通信攻击检测
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.090203
Ossama .., Mhmed Algrnaodi
{"title":"Deep Learning Fusion for Attack Detection in Internet of Things Communications","authors":"Ossama .., Mhmed Algrnaodi","doi":"10.54216/fpa.090203","DOIUrl":"https://doi.org/10.54216/fpa.090203","url":null,"abstract":"The increasing deep learning techniques used in multimedia and networkIoT solve many problems and increase performance. Securing the deep learning models, multimedia, and networkIoT has become a major area of research in the past few years which is considered to be a challenge during generative adversarial attacks over the multimedia or networkIoT. Many efforts and studies try to provide intelligent forensics techniques to solve security issues. This paper introduces a holistic organization of intelligent multimedia forensics that involve deep learning fusion, multimedia, and networkIoT forensics to attack detection. We highlight the importance of using deep learning fusion techniques to obtain intelligent forensics and security over multimedia or NetworkIoT. Finally, we discuss the key challenges and future directions in the area of intelligent multimedia forensics using deep learning fusion techniques.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132557284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling of an Adaptive Network Model for Phishing Website Detection Using Learning Approaches 基于学习方法的自适应网络钓鱼网站检测模型建模
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.120213
A. Tenis, S. R
{"title":"Modelling of an Adaptive Network Model for Phishing Website Detection Using Learning Approaches","authors":"A. Tenis, S. R","doi":"10.54216/fpa.120213","DOIUrl":"https://doi.org/10.54216/fpa.120213","url":null,"abstract":"Phishing links are spread via text messages, social media platforms, and email by phishing attackers. Social engineering skills are used to visit phishing websites to trick the users and enter critical information related to personal data. The confidential data is stolen to defraud legitimate financial institutions or general websites for illegally attaining the benefits. Many machine learning-based solutions are in the enhancements and the technology of machine learning applications to detect the suggested phishing. The rules are used for a solution which depends on the extracted features, and few features require to lies on the services of third-party that, creating time-consuming and instability in the service of prediction. A deep learning-based framework is suggested to detect website of phishing. A framework is established to determine if there is a risk of phishing in real-time during the web page is visited by the user to give a message of warming by the browser plug-in. The prediction service in real-time merges the various techniques for enhancing the accuracy to lower the fake alarm rates and the time of computation which has the filtering whitelist, interception of the blacklist, and prediction of deep learning (DL). Various models of deep learning are compared using the different datasets in the module of machine learning prediction. The greatest accuracy is obtained as 99.18% by the adaptive Recurrent Neural Networks (a−RNN) model from the results of experiments to demonstrate the suggested feasibility solution.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132611624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors 利用机器学习预测Web3区块链上的NFT价格,提供SAAS NFT收集器
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.100205
R. Almajed, A. Abualkishik, Amera Ibrahim, Nahia Mourad
{"title":"Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors","authors":"R. Almajed, A. Abualkishik, Amera Ibrahim, Nahia Mourad","doi":"10.54216/fpa.100205","DOIUrl":"https://doi.org/10.54216/fpa.100205","url":null,"abstract":"Non-Fungible Tokens (NFTs) are one-of-a-kind digital items with static or continuous visual and audio content. NFTs digitally represent any assets that may hold photos, gifs, audio, videos, or any other data-based storable material. These assets may come under a variety of asset groups, including art, in-game goods, and entertainment collecting units. What makes them appealing is their exclusivity, in the sense that each NFT is unique to itself, and ownership is determined by a digital certificate. In the first half of 2021, NFT sales totaled more than a billion. The NFT Software as a service (SAAS) based system is a one-of-a-kind offering and concept for thinking outside the box and presenting intellectuals and creative treasures and exhibiting these objects to ensure the security and integrity of digital assets. The existence of core decentralized networks allows for unrestricted access to this material as well as further analysis. Based on the Web3 Blockchain technology, these assets may be traded and represent next-generation ownership. In this paper, Adaptive Improved Convolutional Neural Networks (AICNN) are used to forecast NFT to provide a SAAS NFT collector. We also introduce Tree-seed Chaotic Atom Search Optimization (TSC-ASO) algorithm to optimize the forecasting process. The proposed method of NFT price forecasting is evaluated and compared with the existing forecasting methods. To produce an accurate report for NFT price forecasting, the proposed method will be effective.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130839553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhancing IoT-Based Intelligent Video Surveillance through Multi-Sensor Fusion and Deep Reinforcement Learning 通过多传感器融合和深度强化学习增强基于物联网的智能视频监控
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.110202
Aymen Hussein, S. Ahmed, Shorook K. Abed, Noor Thamer
{"title":"Enhancing IoT-Based Intelligent Video Surveillance through Multi-Sensor Fusion and Deep Reinforcement Learning","authors":"Aymen Hussein, S. Ahmed, Shorook K. Abed, Noor Thamer","doi":"10.54216/fpa.110202","DOIUrl":"https://doi.org/10.54216/fpa.110202","url":null,"abstract":"Currenlty, wireless communication that is successful in the Internet of Things (IoT) must be long-lasting and self-sustaining. The integration of machine learning (ML) techniques, including deep learning (DL), has enabled IoT networks to become highly effective and self-sufficient. DL models, such as enhanced DRL (EDRL), have been developed for intelligent video surveillance (IVS) applications. Combining multiple models and optimizing fusion scores can improve fusion system design and decision-making processes. These intelligent systems for information fusion have a wide range of potential applications, including in robotics and cloud environments. Fuzzy approaches and optimization algorithms can be used to improve data fusion in multimedia applications and e-systems. The camera sensor is developing algorithms for mobile edge computing (MEC) that use action-value techniques to instruct system actions through collaborative decision-making optimization. Combining IoT and deep learning technologies to improve the overall performance of apps is a difficult task. With this strategy, designers can increase security, performance, and accuracy by more than 97.24 %, as per research observations.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133623591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Classification Using Convolutional Neural Networks 使用卷积神经网络的文本分类
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.070105
S. Mishal, Murtadha M. Hamad
{"title":"Text Classification Using Convolutional Neural Networks","authors":"S. Mishal, Murtadha M. Hamad","doi":"10.54216/fpa.070105","DOIUrl":"https://doi.org/10.54216/fpa.070105","url":null,"abstract":"Most of the information (more than 80%) is stored as text, and text mining is a very important process as it is an initial step in the process of text classification, and this is especially the case in the Arabic language. The Aim of The Study is to classify Arabic texts according to specific categories using advanced performance indicators We used Data Templates as a platform for managing and organizing Apache Spark to solve big data challenges. Apache Spark offers several integrated language APIs. nlp lib was used for text processing. The data is pre-processed through several steps, namely separating the words into one text on the basis of the space between words, cleaning the text of unwanted words, restoring the words to their roots, as well as the feature selection process is a critical step. in text classification. It is a preprocessing technology. In this paper, one way to determine which TF attributes are used how often each feature appears in the document is that they consider the first level of the feature selection process. Then we use TF-IDF to determine the significance of the feature in the document, and this is the last step in the preprocessing Outcomes Text classification . Results were evaluated using advanced performance indicators such as accuracy, Precision and recall. A high accuracy of 96.94% was achieved.The main objective of this paper is to classify basic texts quickly and accurately, according to the results as long as the feature size is suitable, the most advanced technology is superior to other pass rate methods due to the reasonable reliability and perfect pruning level.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116489390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Blockchain based Certificate Validation 基于区块链的证书验证
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.120204
R. Jain, Geetika Dhand, Kavita Sheoran, S. Malik, Nishtha Jatana
{"title":"Blockchain based Certificate Validation","authors":"R. Jain, Geetika Dhand, Kavita Sheoran, S. Malik, Nishtha Jatana","doi":"10.54216/fpa.120204","DOIUrl":"https://doi.org/10.54216/fpa.120204","url":null,"abstract":"Certificate management is a tedious task for any university or any other organization. These schemes impose problems in Public Key Infrastructure (PKI). Checking the validity and preserving the security of these documents is of utmost importance. In this work, we have devised a blockchain-based solution for preventing malfunctioning in certificate validation which is an important step for any university. Each certificate is uploaded in its hash format and is stored using blockchain. The hashes are stored in unique transactions in nodes, which are deployed on a private network. Using the SHA-256 hashing algorithm, the certificates are uploaded into the system and can be viewed by anyone with the right credentials. Due to the usage of blockchain technology, the certificates are stored in a decentralized manner, which ensures there is no central point of failure. Any changes in the uploaded document need to be validated by other nodes. This paper also improvises that when certificate uploading is required new nodes are added, instead of modifying the past blocks. This work provides a very user-friendly app where any user with the right credentials can upload documents. In this work, digitized documents are stored using Inter Planetary File System (IPFS) which is distributed method of storage. Our theoretical analysis proves that it is a user-friendly application with the security of blockchain technology in partnership with IPFS. Only the issuer can upload documents and others can only view them. Using our proposed solution, problem of malicious certificates can be tackled with E-certification. The proposed method solves all the issues of storing, validating, and sharing documents. Chaotic Map technique is used in hash generation which is quite simple to implement. The proposed approach Chaotic Key based Certificate validation (CK-Cert) provides a hassle-free solution for certificate managements since it better manages the block size as compared to previously proposed techniques (PBCert and CertChain) as discussed with the help of graphs.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124049325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving Cloud-based ECG Monitoring, Detection and Classification using GAN 基于GAN的云心电监测、检测与分类改进
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.020201
A. Admin, Monika Gupta
{"title":"Improving Cloud-based ECG Monitoring, Detection and Classification using GAN","authors":"A. Admin, Monika Gupta","doi":"10.54216/fpa.020201","DOIUrl":"https://doi.org/10.54216/fpa.020201","url":null,"abstract":"Internet of Things (IoT) based healthcare applications have grown exponentially over the past decade. With the increasing number of fatalities due to cardiovascular diseases (CVD), it is the need of the hour to detect any signs of cardiac abnormalities as early as possible. This calls for automation on the detection and classification of said cardiac abnormalities by physicians. The problem here is that, there is not enough data to train Deep Learning models to classify ECG signals accurately because of sensitive nature of data and the rarity of certain cases involved in CVDs. In this paper, we propose a framework which involves Generative Adversarial Networks (GAN) to create synthetic training data for the classes with less data points to improve the performance of Deep Learning models trained with the dataset. With data being input from sensors via cloud and this model to classify the ECG signals, we expect the framework to be functional, accurate and efficient.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129907069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detection of Covid-19 using Cough Sounds 利用咳嗽声检测Covid-19
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.070202
H. Taneja, A. Abhinav, Apoorv Apoorv, Himanshu Mangal, Naman Agarwal
{"title":"Detection of Covid-19 using Cough Sounds","authors":"H. Taneja, A. Abhinav, Apoorv Apoorv, Himanshu Mangal, Naman Agarwal","doi":"10.54216/fpa.070202","DOIUrl":"https://doi.org/10.54216/fpa.070202","url":null,"abstract":"Coronavirus, the pandemic due to which about 4 million have lost their lives and counting, is still on. Many scientists and researchers are trying to find ways to detect coronavirus as soon as possible in the human body so that they can start their medication and precaution as soon as possible. Still, due to lack of lab facilities, the RT-PCR is taking more than three days to give the report, and in the meanwhile, patients get serious and life in danger. So in this paper, we proposed an audio-based coronavirus detection technique in which we can get results in minutes. Coronavirus is a respiratory disease, and the sound produced while breathing can tell us about the presence of coronavirus. Audio-based detection was already used for the detection of asthma, pneumonia. So, in this paper, we implemented a combination of machine learning and deep learning techniques to find the presence of Covid-19, and the model has an accuracy of 78% and an f1 score of 74%. This technique can be used as a starting point for just audio data to diagnose diseases and save lives.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"61 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129544377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信