Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Building a New Semantic Social Network Using Semantic Web-Based Techniques

Ahmed M. Daoud , Khlid M. Hosny , Ehab R. Mohamed

 Most people are more or less related to the web by participating in a kind of social networking site. Semantic Web technology plays a crucial role in these sites as they contain an enormous amount of data about ‎persons, pages, events, places, corporations, etc. This research is a Semantic Web application designed to create a new ‎semantic social community called Socialpedia. It links the already existing social public information to the newly ‎public ones. This information is linked with different information on the web to construct a new immense ‎data container. The resulting data container can be processed using a variety of Semantic Web techniques to produce ‎machine-understandable content. This content shows the promise of using integrated data to improve Web search and ‎Web-scale data analysis, unlike conventional search engines or social ones. This community involves obtaining data ‎from traditional users known as contributors or participants, linking data from existing social networks, extracting ‎structured data in triples using predefined ontologies, and finally querying and inferring such data to obtain ‎meaningful pieces of information. Socailpedia supports all popular functionalities of social networking websites ‎besides the enhanced features of the Semantic Web, providing advanced semantic search that acts as a semantic ‎search engine. 

Read More

Doi: https://doi.org/10.54216/FPA.030201

Vol. 3 Issue. 2 PP. 54-65, (2021)

E-College : an aid for E-Learning systems

Vanita Jain , Monu Gupta , Neeraj Joshi , Anubhav Mishra , Vishakha Bansal

The use of Android apps has significantly increased over the past few years, making android the most accepted and trusted operating system for smart devices. According to a survey, in 2020, over 30.5 billion Android mobile apps were downloaded compared to merely 6 billion in 2016, which is quite noteworthy. People worldwide are also becoming habitual to the use of android apps such that they want everything to be available on their mobile devices. The authors have developed ‘E-College’ - an android-based mobile learning application that helps users grasp various programming languages like C++, Java, and Python and help them with their undergraduate computer engineering course curriculum-related resources. The proposed application allows the learner to access a particular programming language's tutorials and explains it with an example and the required code snippet. Using this application, users can also assess themselves by utilizing the provided quiz section, which has various questions. The proposed mobile application also has a recommendation system section that uses machine learning techniques to intelligently serve the most relevant and suitable content for each user. It considers the user's previous learnings on the application and suggests new and relevant learning content for that particular user. During the ongoing global pandemic situation, E-college application is the most effective way to learn and acquire technical skills without stepping out of their home and fraee of cost.  

Read More

Doi: https://doi.org/10.54216/FPA.030202

Vol. 3 Issue. 2 PP. 66-72, (2021)

Development of the hybrid MCDM model for cloud computing adoption strategic management

Ahmed Abdelmonem

With the widespread use of distributed alternative energy sources, electric cars, energy storage systems, and technologies like Cloud Computing (CC), Big Data, and the IoT, energy management in CC contexts has developed. Concerns about the Energy Cloud's performance goals are presented in this fashion as a major development point (EC). The aims of this essay include identifying key FPVs and how they relate to issues in EC, as well as formulating an approach to overseeing the growth and maturity of EC settings. Through literature research, FPVs were identified as well as their influence on each other. It was determined that those FPVs were an important, secondary, motivational factor, and independent voters by using the AHP approach. An all-encompassing management model for EC is presented in the article, and it can be used as a compass for making strategic choices on technical, organizational, commercial, and regulatory matters. This model may be tailored to the specifics of the business landscape and its breadth.

Read More

Doi: https://doi.org/10.54216/FPA.030203

Vol. 3 Issue. 2 PP. 73-82, (2021)

Software Defined Network Function Virtualization Framework for Securing Cloud with Data Fusion and Machine Learning Techniques

Rajit Nair , Miguel Botto-Tobar , Premnarayan Arya

Computing in the cloud is one of the platforms that may be used to provide distributed computing resources. Supplying and managing cloud resources most effectively is referred to as resource management. A recent development in technology known as fog computing is an example of an expanded and dispersed infrastructure. This architecture maintains application processes between end devices and the network edge to provide more dependable and efficient services. These services include remote data storage, allowing customers to access their data from a distant location. Providing remote storage service is an advantageous function offered by cloud suppliers. On the other hand, the data stored in the cloud is geographically dispersed and kept in various data centers, significantly increasing the risk to users' privacy and security. One of the problems that might arise with privacy is when many data centers store the same information. Many cloud service providers check their customers' data using a Third-Party Auditor (TPA) to address concerns about client privacy and data integrity. Currently, most trusted TPAs only have one validator, making it impossible to expand the data integrity across several data centers. The various verifiers used by TPAs have been reduced in number in response to Man in the Cloud (MiTC) attacks. As a result, they cannot check and authenticate the integrity of data stored in several data centers. A unique Peer to Peer (P2P) authentication protocol with Certificate Authority (CA) and Data Storage Protocol is presented as a solution to the problem that has been outlined above to check for and go around any issues that may arise (DSP). The efficiency of the proposed protocol is demonstrated by the incorporation of TPAs and Certificate Authorities. The proposed protocol has been tested with a single user and a single storage server, as well as multiple storage servers in ownCloud with one backup server, two storage servers, three clients, and two TPAs. The NoSQL server in an organization's cloud is set up to save data to storage servers in the appropriate format. The Amanda backup server is used to back up the mirror copy of the stored data on the storage servers. Automated Validation of Internet Security Protocols with Data Fusion and Applications, or AVISPA for short, is a technology that may be used to verify data stored in the cloud. The findings make it abundantly evident that the suggested protocol is strong enough to guarantee the authenticity of data kept in several data centers.

Read More

Doi: https://doi.org/10.54216/FPA.030204

Vol. 3 Issue. 2 PP. 83-99, (2021)