Fusion: Practice and Applications

Journal DOI

https://doi.org/10.54216/FPA

Submit Your Paper

2692-4048ISSN (Online) 2770-0070ISSN (Print)

Chaos Based Stego Color Image Encryption

M. I. Fath Allah

Intensive studies have been done to get robust encryption algorithms. Due to the importance of image information, image encryption has become played a vital rule in information security. Many image encryption schemes have been proposed but most of them suffer from poor robustness against severe types of attacks. In this paper two proposed techniques will be presented for color image encryption to be robust to severe attacks: composite attack. One of these approaches is represented by hybrid use of both steganography and Discrete Wavelet Transform (DWT) based encryption and the other one in which Fractional Fast Fourier Transform (FRFFT) has been used with DWT. Not only new techniques will be presented but also a new chaotic map has been used as random keys for both algorithms. After extensive comparative study with some traditional techniques, it has been found that the proposed algorithms have achieved better performance.

Read More

Doi: https://doi.org/10.54216/JCIM.100201

Vol. 10 Issue. 2 PP. 08-18, (2022)

Coded DCO-OFDM Techniques in Intensity Modulation/Direct Detection (IM/DD) Systems

Mohamed Abdelaziz , Essam Abdellatef

Optical wireless communications (OWC) are among the best alternative techniques for transmitting information-laden optical radiation across a free-space channel from one place to another. DC-biased optical OFDM (DCO-OFDM) is a technique that sacrifices the power efficiency to transmit unipolar OFDM signals. The primary drawback with DCO-OFDM is its clipping noise, which causes distortion and lowers the bit error rate (BER). Thus, in this paper, we show the performance of DCO with different coded techniques to improve the BER in additive white Gaussian noise (AWGN) for IM/DD systems. The experimental results show that the coded DCO-OFDM has the best performance. Furthermore, turbo coding has the best coding technique added to the DCO-OFDM system.

Read More

Doi: https://doi.org/10.54216/JCIM.100202

Vol. 10 Issue. 2 PP. 19-25, (2022)

Media Students’ Internship planning and practices During and After COVID-19: Fusion of technology perspective

Walaa Fouda , Federico Triolo , Amira Al Nahdi

The COVID-19 pandemic had a significant impact on many areas of the workforce, including internship programs. The education sector in general started integrating technology as a kind of fusion of technology in different ways.   The internship course was one of the important educational programs that get affected by the pandemic and there was a deep need for technology fusion to overcome the hard times. This study investigates the effects of COVID-19 on internship programs and provides recommendations for implementing effective strategies in a post-COVID-19 World.  To accomplish this, a comprehensive review of relevant literature review has been conducted, including academic journals, governments, and industry reports, as well as employing both qualitative and quantitative research methods. This study also discussed a case study of the Professional Work Shadow Program, an internship for media students specialized in Integrated marketing communication, Broadcasting, International relations, and public relations. The study findings recommend various marketing strategies, which can help media internship providers and beyond offer effective and sustainable programs to university students.

Read More

Doi: https://doi.org/10.54216/FPA.100202

Vol. 10 Issue. 2 PP. 25-34, (2023)

Forecasting NFT Prices on Web3 Blockchain Using Machine Learning to Provide SAAS NFT Collectors

Rasha Almajed , Abedallah Z. Abualkishik , Amer Ibrahim , Nahia Mourad

Non-Fungible Tokens (NFTs) are one-of-a-kind digital items with static or continuous visual and audio content. NFTs digitally represent any assets that may hold photos, gifs, audio, videos, or any other data-based storable material. These assets may come under a variety of asset groups, including art, in-game goods, and entertainment collecting units. What makes them appealing is their exclusivity, in the sense that each NFT is unique to itself, and ownership is determined by a digital certificate. In the first half of 2021, NFT sales totaled more than a billion. The NFT Software as a service (SAAS) based system is a one-of-a-kind offering and concept for thinking outside the box and presenting intellectuals and creative treasures and exhibiting these objects to ensure the security and integrity of digital assets. The existence of core decentralized networks allows for unrestricted access to this material as well as further analysis. Based on the Web3 Blockchain technology, these assets may be traded and represent next-generation ownership.  In this paper, Adaptive Improved Convolutional Neural Networks (AICNN) are used to forecast NFT to provide a SAAS NFT collector. We also introduce Tree-seed Chaotic Atom Search Optimization (TSC-ASO) algorithm to optimize the forecasting process. The proposed method of NFT price forecasting is evaluated and compared with the existing forecasting methods. To produce an accurate report for NFT price forecasting, the proposed method will be effective.

Read More

Doi: https://doi.org/10.54216/FPA.100205

Vol. 10 Issue. 2 PP. 55-68, (2023)

Using method of Nadaraya-Watson kernel regression to detection outliers in multivariate data fusion

Omar A. abd Alwahab

In this paper, the researcher discussed a developed approach to the detection of outliers that is suited to multivariate data fusion. The challenge in outlier detection when dealing with multivariate data it is the detection of the outlier with more than two dimensions. To address this issue, the researcher developed a method to detect anomalies using methods based on local density including comparing a specific observations density with the densities of its neighboring observations. To make such comparisons, the researcher often employs an outlier score. In this study, various density estimation functions and distance metrics were utilized. Nadaraya-Watson kernel regression for multivariate data considered the KNN with multivariate data. Finally, the estimate of the Volcano kernel method is an essential method for outliers detection. In the simulation experiments of multivariate data with (4,6,8) variables and (60,120,180) observations, the results of simulation experiments by using the criterion of the precision evaluation showed that the N-W method is better than the VOL method in outlier detection in multivariate data.

Read More

Doi: https://doi.org/10.54216/FPA.100207

Vol. 10 Issue. 2 PP. 75-85, (2023)

Securing the Internet of Things (IoT) with Blockchain: A Proof-of-Concept Implementation and Analysis

Mahmoud A. Zaher , Nabil M. Eldakhly

The Internet of Things (IoT) has revolutionized the way we interact with everyday objects, enabling devices to collect and share data seamlessly. However, this increased connectivity has also increased the security risks associated with these devices, as they often lack the necessary security mechanisms to prevent malicious attacks. To address this issue, we propose using blockchain technology to secure IoT devices. In this paper, we present a proof-of-concept implementation of a blockchain-based IoT security system and analyze its effectiveness. Our system leverages blockchain's distributed ledger technology to ensure data integrity, decentralization, and transparency, making it more resilient to attacks. We evaluate our system's performance and compare it with other existing IoT security solutions. Our results show that our blockchain-based approach outperforms traditional security measures and is a viable solution for securing IoT devices. Finally, we discuss the limitations of our study and suggest future research directions for improving the security of IoT devices.

Read More

Doi: https://doi.org/10.54216/JCIM.100203

Vol. 10 Issue. 2 PP. 26-34, (2022)

A Comprehensive Study of Cybersecurity Threats and Countermeasures: Strategies for Mitigating Risks in the Digital Age

Ahmed Sleem

The digital age has ushered in a new era of connectivity and opportunity. However, it has also made us more vulnerable to cyber threats. In recent years, we have seen a rise in the number and sophistication of cyberattacks. These attacks can have a devastating impact on businesses, governments, and individuals. This paper provides a comprehensive overview of cybersecurity threats and countermeasures. It begins by discussing the different types of cybersecurity threats, including malware, phishing, denial-of-service attacks, and data breaches. The paper then discusses the different types of cybersecurity countermeasures, including firewalls, antivirus software, and intrusion detection systems. The paper concludes by discussing strategies for mitigating risks in the digital age including 1) Investing in cybersecurity solutions, 2) Educating employees about cybersecurity best practices, and 3) Having a plan in place to respond to cyberattacks. By following these strategies, businesses, governments, and individuals can help to protect themselves from cyber threats.

Read More

Doi: https://doi.org/10.54216/JCIM.100204

Vol. 10 Issue. 2 PP. 35-46, (2022)