Fusion: Practice and Applications最新文献

筛选
英文 中文
A Comprehensive Study on the RFID Technology of Delhi Metro Cards 德里地铁卡RFID技术的综合研究
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.040103
Vanita Jain, Rishab Bansal, Mahima Swmai, Achin Jain
{"title":"A Comprehensive Study on the RFID Technology of Delhi Metro Cards","authors":"Vanita Jain, Rishab Bansal, Mahima Swmai, Achin Jain","doi":"10.54216/fpa.040103","DOIUrl":"https://doi.org/10.54216/fpa.040103","url":null,"abstract":"In this paper, the authors analyse RFID technology, different types of Tags, Readers and various protocols associated with RFID. We read, write and dump the raw bytes from the MIFARE Classic Card using RC5220 and Arduino Mega. Delhi Metro Card uses MIFARE DESFire. MIFARE DESFire uses 3(DES) for encryption. In this paper, we also read the data structure of the Delhi Metro Card. Additionally, we also compare MIFARE Classic Card and MIFARE DESFire Card.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127154019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multimodal Image Fusion in Biometric Authentication 生物特征认证中的多模态图像融合
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.010203
Uma Maheshwari, Kalpana Kalpana
{"title":"Multimodal Image Fusion in Biometric Authentication","authors":"Uma Maheshwari, Kalpana Kalpana","doi":"10.54216/fpa.010203","DOIUrl":"https://doi.org/10.54216/fpa.010203","url":null,"abstract":"During this study, a unique multimodal biometric system was constructed. This system incorporated a variety of unimodal biometric inputs, including fingerprints, palmprints, knuckle prints, and retina images. The multimodal system generated the fused template via feature-level fusion, which combined several different biometric characteristics. The Gabor filter extracted the features from the various biometric aspects. The fusion of the extracted information from the fingerprint, knuckle print, palmprint, and retina into a single template, which was then saved in the database for authentication, resulted in a reduction in both the spatial and temporal complexity of the process. A novel technique for safeguarding fingerprint privacy has been developed to contribute to the study. This system integrates the unique fingerprints of the thumb, index finger, and middle finger into a single new template. It was suggested that the Fixed-Size Template (FEFST) technique may be used might develop a novel strategy for the extraction of fingerprint features. From each of the fingerprints, the minute locations of the ridge end and ridge bifurcations as well as their orientations relative to the reference points were retrieved. The primary template was derived from the fingerprint that included the greatest number of ridge ends. For the purpose of generating the combined minutiae template, the templates of the other two fingerprints were incorporated into this template. The merged minutiae template that was developed was then saved in a database so that registration could take place. During the authentication process, the system received the three query fingerprints, and those fingerprints were compared to the previously saved template.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Sentiment Analysis Algorithms and Techniques For Arabic Textual Data 阿拉伯语文本数据情感分析算法与技术综述
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.020205
A. Admin, G. Hussein, A. N. Zaied
{"title":"A Survey on Sentiment Analysis Algorithms and Techniques For Arabic Textual Data","authors":"A. Admin, G. Hussein, A. N. Zaied","doi":"10.54216/fpa.020205","DOIUrl":"https://doi.org/10.54216/fpa.020205","url":null,"abstract":"The concept Sentiment means the feeling, behavior, belief, or attitude towards something that almost being embedded. sentiment analysis is the process of analyzing, extracting, studying, and classifying the various reviews, opinions are given by people, and human’s emictions into positive, negative, neutral. It is considered one of the most significant scientific branches that aim to determine the behavior of the speaker, the attitude of the writer according to some topic, or the overall emotional reaction to website, document, event, interaction, products, or services. many users can share every day various opinions on different topics that may be detected or embedded by using micro-blogging which considered a rich resource for sentiment analysis and belief mining such as Facebook, Twitter, forums, and Blogs. recently a huge number of posted comments, tweets, and reviews of different social media websites include rich information in addition to most of the on-line shopping sites provide the opportunity to customers to write reviews about products in order to enhance the sales of those products and to improve both of product quality and customer satisfaction. manual analysis of these large reviews is practically impossible thus it is needed to discover an automated approach to solving such a hard process. In the Middle East and particularly in the Arab world, social media websites continue to be the top-visited websites especially with the current social and political changes in this part of the world. the main objective of that research is to differentiate between various algorithms and techniques of sentiment analysis and classification dependent on the Arabic language as a little number of researchers discusses that point relevant to the Arabic language. Different algorithms and techniques of data mining such as Support Vector Machine (SVM), Naïve Bayes (NB), Bayesian Network (BN), Decision tree (DT), k-nearest neighbor (KNN), Maximum Entropy (ME), and Neural Network (NN) in addition to many other alternative techniques which are used for analyzing and classifying textual data. For the reasons of difficulties in analyzing and mining a large number of linguistic words for their Those techniques are estimated based on the Arabic language due to its richness and diversity. The comparison between data mining techniques showed that the most accurate technique is the support vector machine (SVM) algorithm. every successful sentiment depends on two essential analysis tools are language and culture.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diabetes prediction system using ml & dl techniques 基于ml和dl技术的糖尿病预测系统
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.010201
N. Gupta, S. .., H. -, Surinder Kaur
{"title":"Diabetes prediction system using ml & dl techniques","authors":"N. Gupta, S. .., H. -, Surinder Kaur","doi":"10.54216/fpa.010201","DOIUrl":"https://doi.org/10.54216/fpa.010201","url":null,"abstract":"Diabetes nowadays is a familiar and long-term disease. If a prediction is made early better treatment can be provided. The data pre-processing approach is extremely useful in predicting the disease at an early stage. “A number of tools are used in determining significant characteristics such as selection, prediction, and association rule mining for diabetes. The principal component analysis method was used to select significant attributes. Our judgments denote a firm association of diabetes with body mass indicator (BMI) and with glucose degree. The study implemented logistic regression, decision trees, and ANN techniques to process Pima Indian diabetes datasets and predict whether people at risk have diabetes. It was analysed that random forest had the best accuracy of 80.52 %. Out of 500 negative records 268 positive records our model correctly analysed 403 records 216 records respectively.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125374561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of Glowworm Swarm Optimization Meta-Heuristic Swarm Intelligence and its Fusion in Various Applications 萤火虫群优化元启发式群体智能及其融合应用综述
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.130107
Muhammad A. S. Mohd Shahrom, Nurezayana, Mohamad F. Ab. Aziz, Salama A. Mostafa
{"title":"A Review of Glowworm Swarm Optimization Meta-Heuristic Swarm Intelligence and its Fusion in Various Applications","authors":"Muhammad A. S. Mohd Shahrom, Nurezayana, Mohamad F. Ab. Aziz, Salama A. Mostafa","doi":"10.54216/fpa.130107","DOIUrl":"https://doi.org/10.54216/fpa.130107","url":null,"abstract":"Natural phenomena inspire the meta-heuristic algorithm to carry out the aim of reaching the optimal solution. Glowworm swarm optimization (GSO) is an original swarm intelligence algorithm for optimization, which mimic the glow behavior of glowworm that can effectively capture the maximum multimodal function. GSO is part of the meta-heuristic algorithm used to solve the optimization problem. This algorithm solves many problems in optimization, especially in science, engineering, and network. Therefore, this paper review exposes the GSO method in solving the problem in any industry area. This study focuses on the basic flow of GSO, the modification of GSO, and the hybridization of GSO by conducting the previous study of the researcher. Based on this study, the GSO application in the engineering industry gets the highest score of 15% among other sectors.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121236966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Vehicle License Plate Recognition 车牌识别
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.040102
A. .., J. .., Somya .., Surinder Kaur
{"title":"Vehicle License Plate Recognition","authors":"A. .., J. .., Somya .., Surinder Kaur","doi":"10.54216/fpa.040102","DOIUrl":"https://doi.org/10.54216/fpa.040102","url":null,"abstract":"One of the most significant parts of integrating computer technologies into intelligent transportation systems (ITS) is vehicle license plate recognition (VLPR). In most cases, however, to recognize a license plate successfully, the location of the license plate is to be determined first. Vehicle License Plate Recognition systems are used by law enforcement agencies, traffic management agencies, control agencies, and various government and non-government agencies. VLPR is used in various commercial applications, including electronic toll collecting, personal security, visitor management systems, parking management, and other corporate applications. As a result, calculating the correct positioning of a license plate from a vehicle image is an essential stage of a VLPR system, which substantially impacts the recognition rate and speed of the entire system. In the fields of intelligent transportation systems and image recognition, VLPR is a popular topic. In this research paper, we address the problem of license plate detection using a You Only Look Once (YOLO)-PyTorch deep learning architecture. In this research, we use YOLO version 5 to recognize a single class in an image dataset.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Earthworm Optimization with Deep Transfer Learning Enabled Aerial Image Classification Model in IoT Enabled UAV Networks 物联网无人机网络中基于深度迁移学习的航空图像分类模型蚯蚓优化
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.070104
Dr.R.PANDI Selvam
{"title":"Earthworm Optimization with Deep Transfer Learning Enabled Aerial Image Classification Model in IoT Enabled UAV Networks","authors":"Dr.R.PANDI Selvam","doi":"10.54216/fpa.070104","DOIUrl":"https://doi.org/10.54216/fpa.070104","url":null,"abstract":"Unmanned aerial vehicles (UAVs) can be placed effectively in offering high-quality services for Internet of Things (IoT) networks. It finds use in several applications such as smart city, smart healthcare, surveillance, environment monitoring, disaster management, etc. Classification of images captured by UAV networks, i.e., aerial image classification is a challenging task and can be solved by the design of artificial intelligence (AI) techniques. Therefore, this article presents an Earthworm Optimization with Deep Transfer Learning Enabled Aerial Image Classification (EWODTL-AIC) model in IoT enabled UAV networks. The major intention of the EWODTL-AIC technique is to effectually categorize different classes of aerial images captured by UAVs. The EWODTL-AIC technique initially employs AlexNet model as feature extractor for producing optimal feature vectors. Followed by, the hyperparameter values of the AlexNet model are decided by the utilization of earthworm optimization (EWO) algorithm. At last, the extreme gradient boosting (XGBoost) model is employed for the classification of aerial images. The experimental validation of the EWODTL-AIC model is performed using benchmark dataset. The extensive comparative analysis reported the better outcomes of the EWODTL-AIC technique over the other existing techniques.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning-Based Intelligent Video Surveillance in Smart City Framework 智慧城市框架下基于机器学习的智能视频监控
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.110203
M. A. J. Maktoof, Ibraheem H.. M., M. Razzaq, Ahmed Abbas, A. Majdi
{"title":"Machine Learning-Based Intelligent Video Surveillance in Smart City Framework","authors":"M. A. J. Maktoof, Ibraheem H.. M., M. Razzaq, Ahmed Abbas, A. Majdi","doi":"10.54216/fpa.110203","DOIUrl":"https://doi.org/10.54216/fpa.110203","url":null,"abstract":"The proposed method of using Machine Learning in Motion Detection and Pedestrian Tracking-assisted Intelligent Video Surveillance Systems (ML-IVSS) can be seen as an application of intelligent fusion techniques. ML-IVSS combines the power of motion detection, pedestrian tracking, and machine learning to create a more accurate and efficient surveillance system for smart cities. By fusing these techniques, ML-IVSS can effectively detect unusual behaviors such as trespassing, interruption, crime, or fall-down, and provide accurate depth data from surveillance footage to protect residents. Intelligent fusion techniques can help improve the accuracy and effectiveness of surveillance systems in smart cities, making them safer and more secure for residents. Combination channel models are used at first, and an object area with prominent features is selected for surveillance. Scaled modification and extraction of features are carried out on the presumed object's region. Identifying the low-level characteristic is the first step in incorporating it into neural architectures for deep feature learning. A smart CCTV data set is used to evaluate the proposed method's performance. According to the numerical analysis, the proposed ML-IVSS model outperforms other traditional approaches in terms of abnormal behaviour detection (98.8%), prediction (97.4%), accuracy (96.9%), F1-score (97.1%), precision (95.6%), and recall (96.2%).","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Opinion mining for Arabic dialect in social media data fusion platforms: A systematic review 社交媒体数据融合平台中阿拉伯语方言的意见挖掘:系统综述
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.090101
Hani D. Hejazi, Ahmed A. Khamees
{"title":"Opinion mining for Arabic dialect in social media data fusion platforms: A systematic review","authors":"Hani D. Hejazi, Ahmed A. Khamees","doi":"10.54216/fpa.090101","DOIUrl":"https://doi.org/10.54216/fpa.090101","url":null,"abstract":"The huge text generated on social media in Arabic, especially the Arabic dialect becomes more attractive for Natural Language Processing (NLP) to extract useful and structured information that benefits many domains. The more challenging point is that this content is mostly written in an Arabic dialect with a big data fusion challenge, and the problem with these dialects it has no written rules like Modern Standard Arabic (MSA) or traditional Arabic, and it is changing slowly but unexpectedly. One of the ways to benefit from this huge data fusion is opinion mining, so we introduce this systematic review for opinion mining from Arabic text dialect for the years from 2016 until 2019. We have found that Saudi, Egyptian, Algerian, and Jordanian are the most studied dialects even if it is still under development and need a bit more effort, nevertheless, dialects like Mauritanian, Yemeni, Libyan, and somalin have not been studied in this period. Many data fusion models that show a good result is the last four years have been discussed.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116098016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Provable Chaotically Authenticated Encrypted Biomedical Image Using OFDM Transmission 利用OFDM传输可证明的混沌认证加密生物医学图像
Fusion: Practice and Applications Pub Date : 1900-01-01 DOI: 10.54216/fpa.090201
B. M. El-den
{"title":"Provable Chaotically Authenticated Encrypted Biomedical Image Using OFDM Transmission","authors":"B. M. El-den","doi":"10.54216/fpa.090201","DOIUrl":"https://doi.org/10.54216/fpa.090201","url":null,"abstract":"In this research, a unique multiband random chaotic key generator based provable authenticated encrypted technique for biomedical picture for the healthcare biomedical system, which can be used in 5G communication system is presented. In addition, the encryption method employed in this research is based on Multiband Random Chaotic Key Generator, and the proposed provable authenticated methodology is based on symmetric authenticated encryption data (MBRCKG). In the proposed proven Orthogonal Frequency Division Multiplexing (OFDM) communication system, the Authenticated Chaotic Encrypted Biomedical Image (ACE-BI) is utilized. This study uses discrete wavelet transformation (DWT) and discrete cosine transformation (DCT) to mask patient data and hospital watermarks in biological images. With various statistical and OFDM settings, channel analysis and statistical analysis have been examined for their effects on the collected hospital logo and patient data. The simulation studies demonstrate how resistant to communication signal processing the proposed ACE-BI method is. Additionally, the proposed algorithm is able to reduce encryption time to one quarter because the partial encryption based in one level DWT scheme.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信