Fusion: Practice and Applications

Journal DOI


Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Augmenting security for electronic patient health record (ePHR) monitoring system using cryptographic key management schemes

Shibin David , Andrew J , K. Martin Sagayam , Ahmed A. Elngar

Security plays a major role in most fields including the pharmaceutical field. Authorization and Authentication are the key concepts in supporting notable areas of the cyber-health world. HIPAA's (Health Insurance Portability and Accountability Act) ultimate focus is to preserve the privacy of the health records of an individual without disclosing it and preventing the data from unauthorized access. A complaint key management solution is applied to the patient's health records to reduce the risk factor while engaging with cryptographic mechanisms. Though there are many existing cryptographic algorithms such as Elliptic curve cryptography, and Elgammal's key exchange algorithm which provides security to the access of patient's health records, the proposed key management solution will overlay the same variant of security to the Electronic Health Records (EHR). This paper provides the countermeasures for improving security and suggests a key recovery mechanism for the protection of keys used in the security mechanism.

Read More

Doi: https://doi.org/10.54216/FPA.050201

Vol. 5 Issue. 2 PP. 51-61, (2021)

A Survey on Web Service Discovery Approaches

Abdelghany Mosa , Ahmed Abdelaziz

Service-Oriented Architecture (SOA) is an approach to building distributed systems that deliver application functionality as services that are language and platform-independent. Web service is one of the fundamental technologies in implementing SOA-based applications. Web services are modular, self-describing, self-contained, and loosely coupled applications that can be published, located, and invoked across the web. As the number of web services is increased, finding a set of suitable web service candidates with regard to a user’s requirement becomes a challenge. Web service discovery is the process of finding the most suitable service by matching service descriptions against service requests. Various approaches for web service discovery have been proposed. In this paper, we present an overview of different approaches for web service discovery described in the literature and try to classify them into different categories. We also determine the advantages and disadvantages of each category. The goal is to help researchers to propose a new approach or to select the most appropriate existing approach for service discovery.

Read More

Doi: https://doi.org/10.54216/FPA.050202

Vol. 5 Issue. 2 PP. 62-69, (2021)

Robust Neural Language Translation Model Formulation using Seq2seq approach

Meenu Gupta , Prince Kumar

In this work, the approach used is to sequence powerful models that have achieved excellent performance on language translation encoding-decoding tasks. A language transformer model is used in this work based on the sequence-to-sequence approach, which uses a Long Short-Term Memory (LSTM) to map the input sequence to a vector of fixed dimensionality. Then another deep LSTM decodes the target sequence from the vector. Evaluated the model efficiency through BLEU score and LSTM's BLEU score was penalized on out-of-vocabulary words. Additionally, the LSTM did not have difficulty with long-short of sentences. This work performed the deep LSTM setup English-Japanese translation accuracy at an order of magnitude faster speed, both on GPU and CPU. The variety of the data is introduced into it to evaluate the robustness using the BLEU score. Finally, a better result is achieved by merging the two different types of datasets and getting the highest BLEU score of 40.1 at the end.

Read More

Doi: https://doi.org/10.54216/FPA.050203

Vol. 5 Issue. 2 PP. 70-76, (2021)