ASPG Menu
search

American Scientific Publishing Group

verified Journal

Fusion: Practice and Applications

ISSN
Online: 2692-4048 Print: 2770-0070
Frequency

Continuous publication

Publication Model

Open access · Articles freely available online · APC applies after acceptance

Fusion: Practice and Applications

Volume 16 / Issue 1 ( 20 Articles)

Full Length Article DOI: https://doi.org/10.54216/FPA.160120

Neutrosophic Methods and Linguistic Tools for Interpreting Human Perceptions in Complex Decision-Making

This study addresses a particular issue in relation to the disambiguation of human views, which remains critical in the current era that is the quest for suitable instruments that can cognize, simulate, and interpret the multilayered nature of the standpoint. Today, in contexts where a decision must be made that requires a synthesis of different and often-opposed points of view, such methods are very limited. This methodological gap focuses on the question where ways and means are lacking, which combine analytical accuracy and the flexibility of approaches for dealing with huge amounts of complex and unstructured information. To mitigate this problem, the study seeks for the application of neutrosophic methods and languages as a new approach for understanding human perceptions, which present a great deal of uncertainty. From the combined angles of neutrosophic logic and special linguistic devices, images from different practical situations are scrutinized. The results indicate that this method not only enhances the accuracy with which human subjectivity is simulated but also renders stronger analytical models for application in the area of organizational strategy, public policy formulation and even marketing research. In conclusion, this research extends new and significant methodological boundaries to the social and applied sciences and provides a useful approach to the problem of interpretation and decision-making in a multidimensional and time-changing society.
María Lorena Merızalde Avıles, Emver Nivela Ortega, Kleber Eduardo Carrion Leon et al.
visibility 2229
download 2785
Full Length Article DOI: https://doi.org/10.54216/FPA.160119

Integrative Analysis of Diesel-Kerosene Blends on Engine Performance and Emissions

Combines diesel fuel with cheese to enhance engine efficiency and mitigate detrimental pollutants. Analyzed using a meticulous approach derived from the ISO 8178 standard, combinations containing different ratios of cheese are investigated. The aim of the research is to conduct a multivariate analysis that provides insights into the rheology of diesel and kerosene mixes, thereby enhancing our understanding of the fuel's properties and performance. The researchers conducted experimental trials utilizing diesel blends with varying proportions of cheese, including 5%, 10%, 15%, 20%, 25%, and 30%. A descriptive and multivariate analysis was conducted to measure parameters such as opacity, NOx, CO, HC emissions, and fuel efficiency under different load circumstances. The study identified key elements that determine gasoline characteristics and emissions, including density, viscosity, calorific value, and sulfur content. It emphasized that the addition of cheese had a significant impact on these crucial factors. Two separate categories were created based on the composition of fuel. Blends containing a lower amount of cheesesine (up to 20%) formed a cluster that exhibited an ideal equilibrium in terms of both performance and emissions. The groupings of factors are interconnected, with substantial correlations shown between the physical qualities of the fuel and emissions. This highlights the direct impact of the fuel composition on the engine's environmental performance.
Cristian I. Eugenio-Pilliza, Francisco J. Montalvo-Marquez, Ángel Portilla
visibility 2681
download 4344
Full Length Article DOI: https://doi.org/10.54216/FPA.160118

Climate Optimization in Greenhouses Using the NARMA-L2 Model: An Advanced Integration of Environmental Variables

Agricultural systems, such as greenhouses, can be used to control environmental factors, such as temperature and humidity, to increase output by employing traditional automation techniques. The advancement of science has resulted in the utilization of mathematical models to understand the behavior of data by analyzing its variability. The objective of this project is to validate a method for controlling temperature and humidity in controlled experimental environments using artificial intelligence and Neutrosophy. The transfer functions obtained from temperature and humidity readings gathered via a SCADA system are utilized. Neutrosophic numbers are used to adjust the temperature and humidity values based on the experimental conditions of the greenhouse, indicating the optimal, important, and sensitive ranges. The control system being investigated employs NARMA-L2 neural networks that belong to the multilayer perception category. This facilitates efficient system administration and showcases outstanding performance in simulations conducted across several temperature and humidity scenarios. The observed errors consistently remain below 5% and any instances of exceeding this threshold are insignificant.
María F. Molina, Secundino Marrero
visibility 3203
download 3370
Full Length Article DOI: https://doi.org/10.54216/FPA.160117

Technological Tools before and after COVID-19 in Ecuador

The COVID-19-induced state of emergency in Ecuador necessitated compulsory isolation for most of the people. During this period, there was a rise in the utilization of technical equipment as individuals had to perform their tasks remotely from their homes. This study sought to assess the utilization of technology resources during the period of quarantine, necessitating the creation of a survey. Specific indicators were considered and standardized for processing. The data processing techniques employed were the Hierarchical Analytical Process and Logic Scoring of Preference. The key findings indicate that the indicators "Modes of Use," "Use Preferences," "Daily Usage Frequency," and "Monthly Expenditure" are crucial for measuring the composite indicator "use of technological tools." A survey was created to contribute to the research.
Manuel A. Abarca-Zaquinaula, Matius R.Mendoza-Poma, Freddy A. Álvarez-Lema et al.
visibility 2860
download 3629
Full Length Article DOI: https://doi.org/10.54216/FPA.160116

Efficient Sink Node Position Estimation using Harris Hawks Optimization Algorithm in Wireless Sensor Networks

Wireless sensor network (WSN) was utilized widely in numerous areas owing to their accessibility in data collection, processing, and transmission, and the strength and reliability of data processing and transmission are based on the accuracy of the positions of sensor nodes (SNs) in the WSN. Sink node location estimation in WSN is a vital task intended to define the geographical position of the sink node in the network area of coverage. This procedure normally includes using numerous localization techniques that trust data like received signal strength, arrival time, time variance of arrival, or angle of arrival from adjacent SNs. The accuracy of sink node localization directly influences the efficiency of data aggregation, routing procedures, and complete performance of the network in tasks like environmental monitoring, target tracking, and event recognition. As WSNs are frequently used in remote environments where physical involvement is unusable, an effective and accurate sink node localization model plays a vital part in certifying the network's longevity and reliability. This study develops an Efficient Sink Node Position Estimation using the Harris Hawks Optimization (SNPE-HHO) Algorithm in WSN. The main intention of the SNPE-HHO technique is to recognize the optimal position of the sink node in the network. To achieve this, the SNPE-HHO technique employs the HHO system which gets inspiration from the hunting tactics of Harris Hawk. Moreover, the SNPE-HHO technique computes a fitness function that can drive the searching direction of the HHO algorithm and enhance the node estimation performance. The performance analysis of the SNPE-HHO method is verified by utilizing distinct metrics. The experimentation values confirmed the improved estimation performance of the SNPE-HHO technique over other existing methods
R. Padmaraj, K. Selvakumar
visibility 2753
download 3290
Full Length Article DOI: https://doi.org/10.54216/FPA.160115

Deep Neural Network Discipline and Consequence to be Achieved through Internet Implementation Dropdown

The difficulty of automatically modifying and updating operations within Deep Learning (DL) frameworks can slow down the performance of Deep Neural Network processing (DNNs). This research presents a novel approach to software optimization by leveraging dynamically collected profile data. A unique online auto-tuning system for DNNs was developed to enhance both the training and inference phases. Python Distributed Training of Neural Networks (PyDTNN) is a lightweight toolkit designed for distributed DNN training and estimation. It is utilized to evaluate the VGG19 model on two distinct multi-core architecture options. In testing, our auto-tuning system performs comparably, if not better, than a static selection strategy. The performance of each variation of PyDTNN that employs static selection remains consistently high throughout execution. Conversely, the auto-tuned version initially performs at a set level and progressively improves as more feasible choices become available. While both variations yield similar results in training, the selection strategy outperforms all other inference options by autonomously determining the best strategy for each layer in VGG19. The new online implementation selection tool assists in choosing the best performance option from numerous alternatives while the program is running. Its key features include constructing layered judgments and thoroughly examining 35 possibilities. Our advanced systems represent the optimal choice for monitoring sustainable environmental systems with maximum effectiveness, efficiency, and timeliness.
Haitham S. Hasan
visibility 13346
download 3209
Full Length Article DOI: https://doi.org/10.54216/FPA.160114

Knowledge Navigator: Revolutionizing Education through LLMs in Generative AI

The education landscape is shifting towards automation and digitalization to cater to the increasing demand for personalized learning experiences and more efficient teaching methods. In response to this trend, we propose the development of an integrated educational automation fusion platform that aims to overhaul educating and learning practices across various educational sectors. The integration of cutting-edge language models like GPT-3.5 and Gemini Pro in information retrieval and conversational AI has opened fresher opportunities, even within the realm of education. With its advanced features, LangChain, a powerful framework for large language models, enables seamless integration of AI-driven functionalities, including document analysis, question generation, and chatbot interaction, revolutionizing the educational landscape. Also, by harnessing the vast resources of the OpenAI API, our platform empowers educators and learners to engage in dynamic conversations with educational materials, generate personalized assessments, and gain deeper insights from complex datasets within a single forum. This single platform disseminates information on all facets of research and development in educational domain on the grounds of fusion practices and applications. This system is successful in combining multiple models for intelligent systems. On evaluation, our system was successful in generating decent performance compared to existing systems, even though they are singular modules. Overall, our platform aims to empower educators, students, and institutions to embrace the digital era of learning and unlock new avenues for fusion-based knowledge acquisition and innovation.
Malathi S., Hemamalini S., Ashwin M. et al.
visibility 27130
download 4684
Full Length Article DOI: https://doi.org/10.54216/FPA.160113

Using a Digital Storytelling-Based Electronic Program to develop primary stage pupils’ EFL reading comprehension skills

The present study aimed to identify the effect of using a digital storytelling-based electronic program to develop reading comprehension skills of Pupils with Learning Difficulties. The study adopted a quasi-experimental pre-post design with two groups. Each group consisted of 30 pupils. The experimental group was taught through using the digital storytelling-based electronic program, whereas the control one was taught through the traditional method. The researchers prepared a reading comprehension skills test as an instrument to collect data. The results showed that the pupils of the experimental group achieved better results than those of the control one. The results revealed the effectiveness of the Digital Storytelling-Based Electronic Program in developing primary-fifth pupils’ reading comprehension skills.
Amr Mohamed El Koshiry, Ahmed Zakaria Hegazy
visibility 26954
download 6988
Full Length Article DOI: https://doi.org/10.54216/FPA.160112

Efficient Intrusion Detection using OptCNN-LSTM Model based on hybrid Correlation-based Feature Selection in IoMT

Intrusion detection in the IoMT (Internet of Medical Things) represents the process of keeping track of and discovering unauthorized or malicious actions in medical devices and networks. Some of its benefits include early detection of potential threats, prevention of data breaches, and protection of patient privacy. Aside from these benefits, some difficulties are evident, like alarm fatigue due to false positives, the complexity in the standardizing detection across different devices, and resource limits that hinder qualitative implementations, thus leaving some vulnerabilities in the healthcare infrastructure. This paper proposes a new Efficient Intrusion Detection model based on the Correlation-Based Feature Selection and the OptCNN-LSTM model to address these problems. The proposed methodology comprises five key phases: (i) Data Acquisition (ii) Pre-processing (iii) Feature Extraction (iv) Feature Selection (v) OptCNN-LSTM Model-based intrusion detection. The raw data is first gathered and then preprocessed using z-score normalization and data cleaning. Then, the best features are extracted using central tendency, the degree of dispersion, and correlation. A mixed IHHO-PSO feature with the Correlation-based Feature Selection (CFS) framework is employed to choose the best features amongst the collected features. At last, the OptCNN-LSTM model is performed to detect the intrusion in the IoMT based on features-selected data. The CNN is tuned using the Levy Flight Optimization (LF) which can be further combined with the LSTM to get the expected results. The code is written in Python and the model is then run to determine its performance which is measured in terms of accuracy, precision, f-measure, and a Receiver Operating Characteristic Curve (ROC). Compared to the current models, the proposed model has the highest accuracies 97.6% and 96.5% for learning rates 70 and 80, respectively…
Sultan Almotairi, Deepak Dasaratha Rao, Olayan Alharbi et al.
visibility 28702
download 3485
Full Length Article DOI: https://doi.org/10.54216/FPA.160111

Personal Data Protection Model in IOMT-Blockchain on Secured Bit-Count Transmutation Data Encryption Approach

The Internet of Medical Things (IoMT) has paved the way for innovative approaches to collecting and managing medical data. With the large and sensitive medical data being processed hence, the need for a strong identity and privacy become necessary. The present paper suggests a comprehensive method of PriMedGuard which aims at protection of the personal medical information. The first stage will be data collection from devices and sensors, then data cleaning to transform the data into the required format. There is also a safety system in the system that registers and authenticates authorized entities as well as ETDO (Enhanced Tasmanian Devil Optimization algorithm) is used for generating asymmetric cryptographic keys. The data is encrypted using the Secure Bit-Count Transmutation (SBCT) Data Encryption Algorithm and then put in the locations provided by the InterPlanetary File System (IPFS), a decentralized and distributed storage system. A safe smart contract on the blockchain is created so that the data retrieval is secure and MedSecEnsemble Detection is proposed as an intrusion detection technique in the IoMT network. By using this method, data will stay available while at the same time integrity, confidentiality and protection against vulnerabilities are ensured. Hence, the Internet of Medical Things ecosystem will be secured from unauthorized access and possible security threats…
Sultan Almotairi, Santosh Reddy Addula, Olayan Alharbi et al.
visibility 29518
download 3934
Full Length Article DOI: https://doi.org/10.54216/FPA.160110

Fused and Cascaded Squeeze Excitation Network for Pneumonia Detection

Pneumonia is a medical condition affecting 100 million people globally, and rates are predicted to reach epidemic levels within the next several decades. As a result of the air sacs in both or even one lung becoming inflamed, the patient may experience fever, chills, and trouble breathing. Coughs with pus may also occur. Various organisms can cause pneumonia, including bacteria, viruses, and fungi. Early detection of pneumonia can allow the severity of the purulent material to be reduced. The ability of computer-aided detection techniques to reliably diagnose pneumonia has made them popular among scientists. We used a pre-trained Inception V3Net, Squeeze Excitation-based deep Convolutional Neural Network (SE-CNN) that was trained on the Kermany dataset and the RSNA Pneumonia Detection Challenge dataset in this study. In early-stage detection, the suggested technique beat previous state-of-the-art networks, achieving 91% precision in severity rating. Furthermore, our network's accuracy, recall, f1-score, as well as quadratic weighted kappa were reported to be 91.56%, 91%, and 90%, respectively. In terms of processing time and space, our suggested framework is simple, precise, and effective.
Ramitha M. A., N. Mohanasundaram, R. Santhosh
visibility 53545
download 3720
Full Length Article DOI: https://doi.org/10.54216/FPA.160109

Facial Recognition for Criminal Identification using Convolutional Neural Network

The process of identifying and recognising the criminal is the time consuming and difficult task. There are several ways to identify culprits at the crime site, including fingerprinting, DNA matching, and eyewitness testimony. The criminal face identification system will be built on a existing criminal database. The method for identifying a human face using features extrapolated from an image is presented in this study. The technique for identifying a human face using characteristics extrapolated from a picture is presented in this research. It is quite difficult to develop a computer model for recognizing the human face since it is a complicated multidimensional visual representation. The video captured by the camera will be translated into frames as part of the suggested process. To increase detection accuracy, this suggested a Binary Gradient Alignment (BGA) algorithm a description texture classification technique. When a facial feature is detected in an image frame, it undergoes pre-processing to eliminate unnecessary data and reduce unwanted distortions. The real- time processed image is compared to the trained images that have previously been saved in the database. The technology will send an automatic email notice to the police officials if the surveillance camera detects a criminal.
V. Sathya Preiya, R. Vijay, A. Hemlathadhevi et al.
visibility 57617
download 7359
Full Length Article DOI: https://doi.org/10.54216/FPA.160108

Optimizing Message Response Time in IoT Security Using DenseNet and Fusion Techniques for Enhanced Real-Time Threat Detection

As IoT devices increase, accuracy and data security become increasingly crucial. This research recommends a powerful threat detection system that accelerates message responses to improve IoT security. The recommended strategy finds dangers in using many data sources. Our deep learning system is DenseNet. It groups photographs nicely. We show how the approach works using real-world experiments. It has few false positives and negatives and is effective at recognizing items. Through ablation research, we examine how design and component selections impact technique performance. This clarifies the method's fundamentals. The research reveals that feature selection, fusion, and DenseNet design improve the technique. We discuss the need for fine-tuning hyperparameters to improve approaches and monitor more individuals. The strategy makes IoT communities safer and more robust by laying the groundwork for threat detection and response. This approach solves message transmission delay concerns, making the IoT safer. These discoveries may benefit hacking specialists. They improve and speed up IoT security. 
Hitesh Kumar Sharma, Samta Jain Goyal, Sumit Kumar et al.
visibility 57239
download 3236
Full Length Article DOI: https://doi.org/10.54216/FPA.160107

Integrating Improved Mobile Net and Homomorphic Encryption in Hybrid IoT Security Frameworks for Enhanced Resilience Against Advanced Persistent Threats

IoT devices have transformed smart cities and healthcare. The expanding usage of IoT devices creates major security threats, leaving critical systems vulnerable to sophisticated and persistent assaults. Our hybrid IoT security approach employs homomorphic encryption and improved MobileNet to protect data and simplify feature extraction. Our extensive testing and assessment prove that the proposed structure makes IoT settings more resistant to sophisticated persistent attacks. We discovered superior methodologies for F1 score, accuracy, precision, and memory performance measurement. To ensure data privacy and security during analysis and transmission, homomorphic encryption is incorporated. Our ablation research lays out each framework component's contributions. To increase system speed, it emphasizes safe data processing, real-time analytical optimization, lightweight feature extraction, and privacy-preserving computing. The scalability study indicates that the framework can scale with IoT installations while maintaining peak performance and resource efficiency. Finally, the hybrid IoT security architecture improves IoT security. It provides a full and effective security solution for IoT infrastructure. Lawmakers, business experts, and students in the sector may learn from this research regarding genuine IoT security systems.
Abhishek Kumar, Samta Jain Goyal, Sumit Kumar et al.
visibility 57498
download 3485
Full Length Article DOI: https://doi.org/10.54216/FPA.160106

Fusion of Preferences with Linguistic Weighted Power Mean Operator in Complex Decision-Making Environment

This article explores the application of the linguistic 2-tuple computational model in decision-making processes, focusing on its efficiency in managing ambiguous and imprecise linguistic information, which is vital in complex decision-making environments. The main objective is to demonstrate the use of the Weighted Power Mean (WPM) operator for hierarchical aggregation, highlighting its adaptability in reflecting the priority structures of specific problems and preserving the integrity of expert opinions. The model enhances user interaction by minimizing the need for complex numerical conversions, facilitating more intuitive decision-making. The study introduces the methodology of the linguistic 2-tuples, emphasizing their practical application in various decision-making contexts through detailed case studies. It elaborates on the hierarchical aggregation model, discussing the flexibility and potential of the WPM operator to adjust the influence of individual criteria based on their importance. The article also examines potential improvements in aggregation operators to increase their effectiveness and applicability across different scenarios. This comprehensive analysis not only underscores the capabilities of linguistic computational models in modern decision-making environments but also proposes future directions for advancing these techniques to handle increasingly complex information landscapes.
Silva A. Guido Javier, Juan G. Sailema Armijos, Marco P. Villa Zura et al.
visibility 57199
download 3436