M. B. Akanbi, R. Jimoh, A. Imoize, J. B. Awotunde, ,. O. S. Isiaka, Shade B. Abdulrahaman
{"title":"Enhanced Template Protection Algorithms Based on Fuzzy Vault and Cuckoo Hashing for Fingerprint Biometrics","authors":"M. B. Akanbi, R. Jimoh, A. Imoize, J. B. Awotunde, ,. O. S. Isiaka, Shade B. Abdulrahaman","doi":"10.54216/fpa.100201","DOIUrl":"https://doi.org/10.54216/fpa.100201","url":null,"abstract":"Biometrics provides better authentication. Unprotected biometrics is open to attacks from intruders as stolen biometrics may not be revocable. Although there are several points where attacks can be launched on biometric systems, template databases are said to be the most frequently attacked. When a template database is attacked, attackers can add fresh templates, modify the existing ones, copy or steal templates and later construct a spoof from it or replay it back into the biometric system to impersonate a genuine user. Several template security systems have been presented in the literature to secure biometric templates. Fuzzy vault, as proposed by many researchers is, to some extent, one of the best algorithms to achieve template protection as it has good security. Fuzzy vault, however, lacks irreversibility, revocability, and diversity. To address these disadvantages and strengthen fuzzy vault, this study combines a noninvertible feature transformation template protection algorithm known as cuckoo hashing that possesses irreversibility, revocability, and diversity properties with a fuzzy vault for privacy. The study used fingerprint biometrics as it is widely used. The proposed algorithm was implemented in the MATLAB 2016a environment using FVC 2004 DB1 fingerprint public database. The proposed algorithm recorded a FAR of 0.01% and an FRR value of 0.09% with an EER of 0.05%.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125641289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Breast Cancer Detection Using Deep Learning and Feature Decision Level Fusion","authors":"S. .., J. Kumar, Gopal Chaudhary, Manju Khari","doi":"10.54216/fpa.080105","DOIUrl":"https://doi.org/10.54216/fpa.080105","url":null,"abstract":"Among women, breast cancer has a high incidence and high fatality rate. Due to a lack of early detection facilities and barriers to accessing technological improvements in battling this illness, mortality rates are disproportionately greater in underdeveloped countries. Biopsies done by trained pathologists are the only certain approach to diagnosing cancer. With the use of computer-aided diagnostic algorithms, pathologists may improve their efficiency, objectivity, and consistency in making diagnoses. A key goal of this research is to create an accurate automated system for diagnosing breast cancer that can function in the current clinical setting. In this work, we offer an algorithm for the identification of breast cancer that uses asymmetric analysis as the basic choice and decision-level fusion. Fusion of local nuclei features extracted using convolutional neural network (CNN) models pre-trained on the database constitutes the picture feature representation. The dataset is accessible for public use, and the results are evaluated by running 25 random trials with an 80%-20% split between train and test. Overall, the suggested framework was 86%. The proposed framework is shown to outperform numerous current methods and to provide results on par with the state-of-the-art techniques without requiring extensive computing resources. Breast cancer detection from histological pictures may be greatly aided by the use of this qualitative approach based on transfer learning.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121215482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Hybrid Pelican Optimization Algorithm and Black Hole Algorithm for Kernel Semi-Parametric Fusion Modeling","authors":"F. AL-Taie, Z. Algamal, O. Qasim","doi":"10.54216/fpa.110104","DOIUrl":"https://doi.org/10.54216/fpa.110104","url":null,"abstract":"This paper investigates the process of selecting a hyperparameter for use in a kernel semiparametric regression model for fusion data, which is an important tool in various scientific study fields. The selection of the best model to use in advance is not a simple task, and one of the most fascinating current advances in the application is the use of hybrid metaheuristics algorithms to increase the exploration and exploitation capacity of traditional meta-heuristic algorithms. In this study, a hybrid optimization method that combines the pelican algorithm with the black hole algorithm is presented, which achieves a lower mean squared error (MSE) in comparison to other competing techniques. Data merging through the suggested hybrid metaheuristics algorithm gives superior performance in terms of computing time when compared to both the CV-method and the GCV-method. This work has practical implications for researchers and practitioners who use statistical modeling techniques in their work, especially those dealing with data merging for improved accuracy and efficiency.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130601651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. J. Maktoof, Anwar Ja’afar M. .., Hasan M. Abd, Ahmed Husain, A. Majdi
{"title":"Using a Fuzzy Logic Integrated Machine Learning Algorithm for Information Fusion in Smart Parking","authors":"M. A. J. Maktoof, Anwar Ja’afar M. .., Hasan M. Abd, Ahmed Husain, A. Majdi","doi":"10.54216/fpa.110109","DOIUrl":"https://doi.org/10.54216/fpa.110109","url":null,"abstract":"The free flow of people and products within metropolitan areas depends on well-managed transportation systems. However, public parking places in smart cities are often limited by traffic, causing cars and residents to waste time, money, and fuel. To counteract this issue, today's automobile systems combine information fusion with intelligent parking solutions. In this research, we present a Fuzzy Logic Integrated Machine Learning Algorithm (FL-MLA) for use in smart parking and traffic management in a metropolis. The FL-MLA use fuzzy induction to distinguish between parked and moving vehicles while calculating traffic flow. The suggested technique efficiently resolves the problem of locating suitable parking places by avoiding incorrect configurations that govern traffic management difficulties. Therefore, the FL-MLA is used in traffic management systems to boost performance metrics like efficiency ratio (98.1%) and accident detection (98.1%) based on simulation results like reduced energy consumption (95.3%), more accurate traffic estimation (97.9%), higher average daily park occupancy (97.2%), and higher efficiency ratio (98.1%).","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129026696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rachna Tewani, Achin Jain, Eshika Agarwal, Disha Mittal, A. Dubey
{"title":"An efficient extraction of information from Indian Government issued documents Aadhar and Pan Card","authors":"Rachna Tewani, Achin Jain, Eshika Agarwal, Disha Mittal, A. Dubey","doi":"10.54216/fpa.040201","DOIUrl":"https://doi.org/10.54216/fpa.040201","url":null,"abstract":"In today's world, everything is getting digitized, and widespread use of data scanning tools and photography. When we have a lot of image data, it becomes important to accumulate data in a form that is useful for the company/organization. Doing it manually is a tedious task and takes an ample amount of time. Hence to simplify the job, we have developed a FLASK API that takes an image folder as an object and returns an excel sheet of relevant data from the image data. We have used optical character recognition and software like pytesseract to extract data from images. Further in the process, we have used natural language processing, and finally, we have found relevant data using the globe and regex module. This model is helpful in data collection from Registration certificates which helps us store data like chassis number, owner name, car number, etc., easily and can be applied to Aadhaar cards and pan cards.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130057644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Admin, Anwar Ja’afar M. .., M. Jalil, Noor Sami, Z. Madhi
{"title":"Multi-Level Fusion Optimization in Cyber-Physical Systems Using Computer Vision-Based Fault Detection","authors":"A. Admin, Anwar Ja’afar M. .., M. Jalil, Noor Sami, Z. Madhi","doi":"10.54216/fpa.110205","DOIUrl":"https://doi.org/10.54216/fpa.110205","url":null,"abstract":"The healthcare sector's use of cyber-physical systems to provide high-quality patient treatment highlights the need for sophisticated security solutions due to the wide range of attack surfaces from medical and mobile devices, as well as body sensor nodes. Cyber-physical systems have various processing technologies to choose from, but these technical methods are as varied. Existing technologies are not well-suited for managing complex information about problem identification and diagnosis, which is distinct from technology. To address this issue, intelligent techniques for fusion processing, such as multi-sensor fusion system architectures and fusion optimization, can be used to improve fusion score and decision-making. Additionally, the use of deep learning models and multimedia data fusion applications can help to combine multiple models for intelligent systems and enhance machine learning for data fusion in E-Systems and cloud environments. Fuzzy approaches and optimization algorithms for data fusion can also be applied to robotics and other applications.. In this paper, a computer vision technology-based fault detection (CVT-FD) framework has been suggested for securely sharing healthcare data. When utilizing a trusted device like a mobile phone, end-users can rest assured that their data is secure. Cyber-attack behavior can be predicted using an artificial neural network (ANN), and the analysis of this data can assist healthcare professionals in making decisions. The experimental findings show that the model outperforms with current detection accuracy (98.3%), energy consumption (97.2%), attack prediction (96.6%), efficiency (97.9%), and delay ratios (35.6%) over existing approaches.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128758974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using method of Nadaraya-Watson kernel regression to detection outliers in multivariate data fusion","authors":"Omar A. abd Alwahab","doi":"10.54216/fpa.100207","DOIUrl":"https://doi.org/10.54216/fpa.100207","url":null,"abstract":"In this paper, the researcher discussed a developed approach to the detection of outliers that is suited to multivariate data fusion. The challenge in outlier detection when dealing with multivariate data it is the detection of the outlier with more than two dimensions. To address this issue, the researcher developed a method to detect anomalies using methods based on local density including comparing a specific observations density with the densities of its neighboring observations. To make such comparisons, the researcher often employs an outlier score. In this study, various density estimation functions and distance metrics were utilized. Nadaraya-Watson kernel regression for multivariate data considered the KNN with multivariate data. Finally, the estimate of the Volcano kernel method is an essential method for outliers detection. In the simulation experiments of multivariate data with (4,6,8) variables and (60,120,180) observations, the results of simulation experiments by using the criterion of the precision evaluation showed that the N-W method is better than the VOL method in outlier detection in multivariate data.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129053034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hamzah A. Alsayadi, E. El-Kenawy, A. Ibrahim, M. Eid, Abdelaziz A. Abdelhamid
{"title":"Blog Feedback Prediction based on Ensemble Machine Learning Regression Model: Towards Data Fusion Analysis","authors":"Hamzah A. Alsayadi, E. El-Kenawy, A. Ibrahim, M. Eid, Abdelaziz A. Abdelhamid","doi":"10.54216/fpa.090103","DOIUrl":"https://doi.org/10.54216/fpa.090103","url":null,"abstract":"The last decade lead to an unbelievable growth of the importance of social media. Due to the huge amounts of documents appearing in social media, there is an enormous need for the automatic analysis of such documents. In this work, we proposed various regression models for the blog feedback prediction to be used in the data fusion environment. These models include decision tree regressor, MLP regressor, SVR, random forest regressor, and K-Neighbors regressor. The models are enhanced by average ensemble and ensemble using K-Neighbors regressor. The Blog Feedback dataset is used for training and evaluating the proposed models. The results show that there is a decrease in RMSE, MAE, MBE, R, R2, RRMSE, NSE, and WI when compared to the traditional methods.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127824127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. AbdelAziz, Hassan H. Mohammed, Khalid A. Eldrandaly
{"title":"An effective Decision making model through Fusion Optimization and risk associated with flash flood hazards: A case study Asyut, Egypt","authors":"N. AbdelAziz, Hassan H. Mohammed, Khalid A. Eldrandaly","doi":"10.54216/fpa.120105","DOIUrl":"https://doi.org/10.54216/fpa.120105","url":null,"abstract":"One of the most dangerous natural disasters, which causes massive damage all over the world, is flash floods. Therefore, the assessment of flash floods disasters is considered increasingly urgent and important. The widely used techniques for studying and analyzing the causes and impact of natural hazards are multi-criteria techniques. Several researchers used traditional multi-criteria decision-making techniques in the estimation process of flash floods problems as the analytical hierarchy process, decision making trial and evaluation laboratory and analytic network process. The main disadvantage of these traditional models is the incapability of simulating and reflecting uncertain human thoughts. Since neutrosophic logic has a great ability for simulating human’s thoughts and increase the flexibility of expert's preferences in real world problems, we applied it in this study. There are different locations in Egypt that are at a serious risk of flooding, especially in Upper Egypt. Asyut has suffered from frequent flash floods, with some flood events that lead to mortality, damages, and economic losses in the last decades. The intensity of floods in Egypt varies from year to year, according to several climatic and hydrological variables. This study focuses on using a Neutrosophic Decision making trial and evaluation laboratory (N-DEMATEL) technique with remotely sensed data and geographical information system (GIS) for producing a flash floods hazard map. The N-DEMATEL technique is applied to determine the weights of various factors that related to flash flooding, including elevation, slope, topographic wetness index, distance from the stream, flow accumulation, aspect, flow direction, soil, land cover, watershed, curvature, drainage density , total population , population density and precipitation. The obtained weight of selected criteria used then to produce the flood hazard map (FHM) using a raster calculator tool in geographic information system.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121168153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Devanshu Joshi, Rishabh Tater, Priya Yaday, Tripti Jain, P. Nagrath
{"title":"Leukemia Cancer Detection Using Various Deep Learning Algorithms","authors":"Devanshu Joshi, Rishabh Tater, Priya Yaday, Tripti Jain, P. Nagrath","doi":"10.54216/fpa.090106","DOIUrl":"https://doi.org/10.54216/fpa.090106","url":null,"abstract":"Leukemia is a type of blood cancer. Leukemia is cancer that begins in the blood cells. The lymphocytes and other blood cells are created in the bone marrow. When a person has leukemia the bone marrow does not function properly. Leukemia cells are produced by the bone marrow. Leukemia cells are mainly referred to as rupture. These naive cancer cells block the cells that create the bone marrow. In this paper, various approaches to the classification automatic detection of leukemia are described. The experiment was successfully implemented in Kaggle. Deep Learning algorithms were largely used in the treatment of Leukemia for the classification detection of its presence in a patient. The paper describes Convolutional Neural Networks (CNN) and Visual Geometry Group-16(VGG-16) algorithms that are used to categorize leukemia into its sub-types and presents a comprehensive study of these algorithms.","PeriodicalId":269527,"journal":{"name":"Fusion: Practice and Applications","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116161315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}