{"title":"A Comprehensive Study on the RFID Technology of Delhi Metro Cards","authors":"Vanita Jain, Rishab Bansal, Mahima Swmai, Achin Jain","doi":"10.54216/fpa.040103","DOIUrl":"https://doi.org/10.54216/fpa.040103","url":null,"abstract":"In this paper, the authors analyse RFID technology, different types of Tags, Readers and various protocols associated with RFID. We read, write and dump the raw bytes from the MIFARE Classic Card using RC5220 and Arduino Mega. Delhi Metro Card uses MIFARE DESFire. MIFARE DESFire uses 3(DES) for encryption. In this paper, we also read the data structure of the Delhi Metro Card. Additionally, we also compare MIFARE Classic Card and MIFARE DESFire Card.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127154019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal Image Fusion in Biometric Authentication","authors":"Uma Maheshwari, Kalpana Kalpana","doi":"10.54216/fpa.010203","DOIUrl":"https://doi.org/10.54216/fpa.010203","url":null,"abstract":"During this study, a unique multimodal biometric system was constructed. This system incorporated a variety of unimodal biometric inputs, including fingerprints, palmprints, knuckle prints, and retina images. The multimodal system generated the fused template via feature-level fusion, which combined several different biometric characteristics. The Gabor filter extracted the features from the various biometric aspects. The fusion of the extracted information from the fingerprint, knuckle print, palmprint, and retina into a single template, which was then saved in the database for authentication, resulted in a reduction in both the spatial and temporal complexity of the process. A novel technique for safeguarding fingerprint privacy has been developed to contribute to the study. This system integrates the unique fingerprints of the thumb, index finger, and middle finger into a single new template. It was suggested that the Fixed-Size Template (FEFST) technique may be used might develop a novel strategy for the extraction of fingerprint features. From each of the fingerprints, the minute locations of the ridge end and ridge bifurcations as well as their orientations relative to the reference points were retrieved. The primary template was derived from the fingerprint that included the greatest number of ridge ends. For the purpose of generating the combined minutiae template, the templates of the other two fingerprints were incorporated into this template. The merged minutiae template that was developed was then saved in a database so that registration could take place. During the authentication process, the system received the three query fingerprints, and those fingerprints were compared to the previously saved template.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125653527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey on Sentiment Analysis Algorithms and Techniques For Arabic Textual Data","authors":"A. Admin, G. Hussein, A. N. Zaied","doi":"10.54216/fpa.020205","DOIUrl":"https://doi.org/10.54216/fpa.020205","url":null,"abstract":"The concept Sentiment means the feeling, behavior, belief, or attitude towards something that almost being embedded. sentiment analysis is the process of analyzing, extracting, studying, and classifying the various reviews, opinions are given by people, and human’s emictions into positive, negative, neutral. It is considered one of the most significant scientific branches that aim to determine the behavior of the speaker, the attitude of the writer according to some topic, or the overall emotional reaction to website, document, event, interaction, products, or services. many users can share every day various opinions on different topics that may be detected or embedded by using micro-blogging which considered a rich resource for sentiment analysis and belief mining such as Facebook, Twitter, forums, and Blogs. recently a huge number of posted comments, tweets, and reviews of different social media websites include rich information in addition to most of the on-line shopping sites provide the opportunity to customers to write reviews about products in order to enhance the sales of those products and to improve both of product quality and customer satisfaction. manual analysis of these large reviews is practically impossible thus it is needed to discover an automated approach to solving such a hard process. In the Middle East and particularly in the Arab world, social media websites continue to be the top-visited websites especially with the current social and political changes in this part of the world. the main objective of that research is to differentiate between various algorithms and techniques of sentiment analysis and classification dependent on the Arabic language as a little number of researchers discusses that point relevant to the Arabic language. Different algorithms and techniques of data mining such as Support Vector Machine (SVM), Naïve Bayes (NB), Bayesian Network (BN), Decision tree (DT), k-nearest neighbor (KNN), Maximum Entropy (ME), and Neural Network (NN) in addition to many other alternative techniques which are used for analyzing and classifying textual data. For the reasons of difficulties in analyzing and mining a large number of linguistic words for their Those techniques are estimated based on the Arabic language due to its richness and diversity. The comparison between data mining techniques showed that the most accurate technique is the support vector machine (SVM) algorithm. every successful sentiment depends on two essential analysis tools are language and culture.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132039459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Diabetes prediction system using ml & dl techniques","authors":"N. Gupta, S. .., H. -, Surinder Kaur","doi":"10.54216/fpa.010201","DOIUrl":"https://doi.org/10.54216/fpa.010201","url":null,"abstract":"Diabetes nowadays is a familiar and long-term disease. If a prediction is made early better treatment can be provided. The data pre-processing approach is extremely useful in predicting the disease at an early stage. “A number of tools are used in determining significant characteristics such as selection, prediction, and association rule mining for diabetes. The principal component analysis method was used to select significant attributes. Our judgments denote a firm association of diabetes with body mass indicator (BMI) and with glucose degree. The study implemented logistic regression, decision trees, and ANN techniques to process Pima Indian diabetes datasets and predict whether people at risk have diabetes. It was analysed that random forest had the best accuracy of 80.52 %. Out of 500 negative records 268 positive records our model correctly analysed 403 records 216 records respectively.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125374561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad A. S. Mohd Shahrom, Nurezayana, Mohamad F. Ab. Aziz, Salama A. Mostafa
{"title":"A Review of Glowworm Swarm Optimization Meta-Heuristic Swarm Intelligence and its Fusion in Various Applications","authors":"Muhammad A. S. Mohd Shahrom, Nurezayana, Mohamad F. Ab. Aziz, Salama A. Mostafa","doi":"10.54216/fpa.130107","DOIUrl":"https://doi.org/10.54216/fpa.130107","url":null,"abstract":"Natural phenomena inspire the meta-heuristic algorithm to carry out the aim of reaching the optimal solution. Glowworm swarm optimization (GSO) is an original swarm intelligence algorithm for optimization, which mimic the glow behavior of glowworm that can effectively capture the maximum multimodal function. GSO is part of the meta-heuristic algorithm used to solve the optimization problem. This algorithm solves many problems in optimization, especially in science, engineering, and network. Therefore, this paper review exposes the GSO method in solving the problem in any industry area. This study focuses on the basic flow of GSO, the modification of GSO, and the hybridization of GSO by conducting the previous study of the researcher. Based on this study, the GSO application in the engineering industry gets the highest score of 15% among other sectors.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121236966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vehicle License Plate Recognition","authors":"A. .., J. .., Somya .., Surinder Kaur","doi":"10.54216/fpa.040102","DOIUrl":"https://doi.org/10.54216/fpa.040102","url":null,"abstract":"One of the most significant parts of integrating computer technologies into intelligent transportation systems (ITS) is vehicle license plate recognition (VLPR). In most cases, however, to recognize a license plate successfully, the location of the license plate is to be determined first. Vehicle License Plate Recognition systems are used by law enforcement agencies, traffic management agencies, control agencies, and various government and non-government agencies. VLPR is used in various commercial applications, including electronic toll collecting, personal security, visitor management systems, parking management, and other corporate applications. As a result, calculating the correct positioning of a license plate from a vehicle image is an essential stage of a VLPR system, which substantially impacts the recognition rate and speed of the entire system. In the fields of intelligent transportation systems and image recognition, VLPR is a popular topic. In this research paper, we address the problem of license plate detection using a You Only Look Once (YOLO)-PyTorch deep learning architecture. In this research, we use YOLO version 5 to recognize a single class in an image dataset.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130156412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Earthworm Optimization with Deep Transfer Learning Enabled Aerial Image Classification Model in IoT Enabled UAV Networks","authors":"Dr.R.PANDI Selvam","doi":"10.54216/fpa.070104","DOIUrl":"https://doi.org/10.54216/fpa.070104","url":null,"abstract":"Unmanned aerial vehicles (UAVs) can be placed effectively in offering high-quality services for Internet of Things (IoT) networks. It finds use in several applications such as smart city, smart healthcare, surveillance, environment monitoring, disaster management, etc. Classification of images captured by UAV networks, i.e., aerial image classification is a challenging task and can be solved by the design of artificial intelligence (AI) techniques. Therefore, this article presents an Earthworm Optimization with Deep Transfer Learning Enabled Aerial Image Classification (EWODTL-AIC) model in IoT enabled UAV networks. The major intention of the EWODTL-AIC technique is to effectually categorize different classes of aerial images captured by UAVs. The EWODTL-AIC technique initially employs AlexNet model as feature extractor for producing optimal feature vectors. Followed by, the hyperparameter values of the AlexNet model are decided by the utilization of earthworm optimization (EWO) algorithm. At last, the extreme gradient boosting (XGBoost) model is employed for the classification of aerial images. The experimental validation of the EWODTL-AIC model is performed using benchmark dataset. The extensive comparative analysis reported the better outcomes of the EWODTL-AIC technique over the other existing techniques.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122879010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. J. Maktoof, Ibraheem H.. M., M. Razzaq, Ahmed Abbas, A. Majdi
{"title":"Machine Learning-Based Intelligent Video Surveillance in Smart City Framework","authors":"M. A. J. Maktoof, Ibraheem H.. M., M. Razzaq, Ahmed Abbas, A. Majdi","doi":"10.54216/fpa.110203","DOIUrl":"https://doi.org/10.54216/fpa.110203","url":null,"abstract":"The proposed method of using Machine Learning in Motion Detection and Pedestrian Tracking-assisted Intelligent Video Surveillance Systems (ML-IVSS) can be seen as an application of intelligent fusion techniques. ML-IVSS combines the power of motion detection, pedestrian tracking, and machine learning to create a more accurate and efficient surveillance system for smart cities. By fusing these techniques, ML-IVSS can effectively detect unusual behaviors such as trespassing, interruption, crime, or fall-down, and provide accurate depth data from surveillance footage to protect residents. Intelligent fusion techniques can help improve the accuracy and effectiveness of surveillance systems in smart cities, making them safer and more secure for residents. Combination channel models are used at first, and an object area with prominent features is selected for surveillance. Scaled modification and extraction of features are carried out on the presumed object's region. Identifying the low-level characteristic is the first step in incorporating it into neural architectures for deep feature learning. A smart CCTV data set is used to evaluate the proposed method's performance. According to the numerical analysis, the proposed ML-IVSS model outperforms other traditional approaches in terms of abnormal behaviour detection (98.8%), prediction (97.4%), accuracy (96.9%), F1-score (97.1%), precision (95.6%), and recall (96.2%).","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134536006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Opinion mining for Arabic dialect in social media data fusion platforms: A systematic review","authors":"Hani D. Hejazi, Ahmed A. Khamees","doi":"10.54216/fpa.090101","DOIUrl":"https://doi.org/10.54216/fpa.090101","url":null,"abstract":"The huge text generated on social media in Arabic, especially the Arabic dialect becomes more attractive for Natural Language Processing (NLP) to extract useful and structured information that benefits many domains. The more challenging point is that this content is mostly written in an Arabic dialect with a big data fusion challenge, and the problem with these dialects it has no written rules like Modern Standard Arabic (MSA) or traditional Arabic, and it is changing slowly but unexpectedly. One of the ways to benefit from this huge data fusion is opinion mining, so we introduce this systematic review for opinion mining from Arabic text dialect for the years from 2016 until 2019. We have found that Saudi, Egyptian, Algerian, and Jordanian are the most studied dialects even if it is still under development and need a bit more effort, nevertheless, dialects like Mauritanian, Yemeni, Libyan, and somalin have not been studied in this period. Many data fusion models that show a good result is the last four years have been discussed.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"284 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116098016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Provable Chaotically Authenticated Encrypted Biomedical Image Using OFDM Transmission","authors":"B. M. El-den","doi":"10.54216/fpa.090201","DOIUrl":"https://doi.org/10.54216/fpa.090201","url":null,"abstract":"In this research, a unique multiband random chaotic key generator based provable authenticated encrypted technique for biomedical picture for the healthcare biomedical system, which can be used in 5G communication system is presented. In addition, the encryption method employed in this research is based on Multiband Random Chaotic Key Generator, and the proposed provable authenticated methodology is based on symmetric authenticated encryption data (MBRCKG). In the proposed proven Orthogonal Frequency Division Multiplexing (OFDM) communication system, the Authenticated Chaotic Encrypted Biomedical Image (ACE-BI) is utilized. This study uses discrete wavelet transformation (DWT) and discrete cosine transformation (DCT) to mask patient data and hospital watermarks in biological images. With various statistical and OFDM settings, channel analysis and statistical analysis have been examined for their effects on the collected hospital logo and patient data. The simulation studies demonstrate how resistant to communication signal processing the proposed ACE-BI method is. Additionally, the proposed algorithm is able to reduce encryption time to one quarter because the partial encryption based in one level DWT scheme.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115487282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}