Claim Missing Document
Check
Articles

Found 15 Documents
Search

A Middleware Framework between Mobility and IoT Using IEEE 802.15.4e Sensor Networks Alam, Tanweer
JOIN (Jurnal Online Informatika) Vol 4 No 2 (2019)
Publisher : Department of Informatics, UIN Sunan Gunung Djati Bandung

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.15575/join.v4i2.487

Abstract

In this paper, we propose a mobility framework for connecting the physical things in wireless ad hoc sensor networks. Our area of study is the internet of things by using an ad hoc sensor network. Our purpose in this study is to create a mobility framework for the internet of things. For example- how we connect many physical objects and give them a sense of sensing each other in an ad hoc environment. We can connect different physical objects in a framework of an ad hoc sensor network. Our main contribution is a new methodology for simulating mobility physical objects for the internet of things. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of ad hoc sensor networks. Our study will generate a new framework for solving the issue of connectivity among physical objects. The proposed mobility framework is feasible to run among physical objects using the ad hoc sensor network.
Cloud Computing and its role in the Information Technology Alam, Tanweer
IAIC Transactions on Sustainable Digital Innovation (ITSDI) Vol 1 No 2 (2020): April
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/itsdi.v1i2.103

Abstract

The concept of Cloud Computing has been distinguished as one of the major computing models in recent years. Cloud computing has become a great innovation that has important consequences not just for services on the internet but also for the entire Information technology (IT) market. Its emergence aims to optimize on-demand technology, hardware and information provisioning as a service, reaching the economy of scale in the distribution and operation of IT strategies. A great deal of cloud computing research has been concerned over some obstacles and challenges that rely upon behind the lure of cloud computing. Security has been always raised as one of the most critical issues of cloud computing where resolving such an issue would result in constant growth in the use and popularity of the cloud. Security requirements represent a major issue that has to be met in order of easing some of these obstacles. This article presents the role of cloud computing in the IT sectors.
Software Defined Networks: Review and Architecture Alam, Tanweer; Aljohani, Mohammed
IAIC Transactions on Sustainable Digital Innovation (ITSDI) Vol 1 No 2 (2020): April
Publisher : Pandawan Sejahtera Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.34306/itsdi.v1i2.114

Abstract

In the fifth-generation communication system, secured and reliable data packets will rely on the network with high availability and low latency. The 5G network enables the dynamic control of nodes with low latency. Ultra-reliability is one of the challenging tasks in software-defined networks. The ultra-reliability feature is an interface working with high availability and low latency that brings in fifth-generation networks. The Internet of Things will work in the societies so that it required ultra-reliability features to empower the peoples as well as machines for collaborating with their neighbors. The connections among ultra-reliability networks are extremely hard situations to keep low packets corruption. The Software Defined Networks (SDN) will provide a platform for measuring, controlling, monitoring and scaling the smart objects in reality or virtually. Virtualization enables IT, specialists, to combine or separate the considerable networking or create new programmable networking among virtual machines. In this article, the authors are reviewed the architecture of SDN based on virtualization under the umbrella of 5G networks.
Leveraging Blockchain and Federated Reinforcement Learning for Enhanced Fraud Detection in Financial Transactions Alam, Tanweer
JITSI : Jurnal Ilmiah Teknologi Sistem Informasi Vol 6 No 4 (2025)
Publisher : SOTVI - Society of Visual Informatics

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.62527/jitsi.6.4.492

Abstract

Credit card fraud detection uses several technologies including machine learning (ML) and statistical analysis as well as card authentication methods. Credit card fraud is the illegal use of someone's credit card for purchase of goods or services. Comprehensive studies have shown how well ML technology generates exact prediction models to spot possible transaction fraud. Though the potential of losing the actual card is still a worry, hackers have been increasingly acquiring credit card numbers and personal information online. The growth in e-commerce has matched credit card use for online transactions, which has surged credit card theft. Complex detection systems including federated reinforcement learning (FRL) and blockchain technology have been developed to solve this challenge. Using standard pattern matching methods can make it difficult to tell real from fake transactions. A decentralised method of ML, FRL stresses user privacy and enhances anonymity and confidence in financial transactions. An original approach for teaching a credit card fraud detection model is shown in this work It makes advantage of user behaviour traits, federated reinforcement learning, and blockchain technologies. Using a smart contract between the bank and the client, the approach aims to reduce dishonest activity. By lowering the dependence on centralised data aggregation, this innovative approach guarantees user privacy protection all through model development. The research also looks at the challenges in credit card fraud detection and offers ideas for next developments.
CMI Computing: A Cloud, MANET, and Internet of Things Integration for Future Internet Alam, Tanweer
Jambura Journal of Informatics VOL 2, NO 1: APRIL 2020
Publisher : Universitas Negeri Gorontalo

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (931.613 KB) | DOI: 10.37905/jji.v2i1.4539

Abstract

The wireless communication is making it easier for smart devices to communicate with one another in terms of the network of the Internet of Things. Smart devices are automatically linked and built up a network on their own. But there are more obstacles to safe access within the network itself. Mobile devices such as smart home automation access point, smart washing machines, mobile boards, temperature sensors, color-changing smart lighting, smartphones, wearable devices, and smart appliances, etc. are widespread in our daily lives and is becoming valuable tools with wireless communication abilities that are using specific wireless standards that are commonly used with IEEE 802.11 access points. On the realism of the Internet, security has been perceived as a prominent inhibitor of embracing the cloud paradigm. It is resource storage and management that may lay in any since the cloud environment is a distributed architecture, which place of the world, many concerns have been raised over its vulnerabilities, security threats and challenges. The involvement of various parties has widened these concerns based on each party's perspective and objective. The Cloud point of view we mainly discuss the causes of obstacles and challenges related to security, reliability, privacy, and service availability. The wireless communication Security has been raised as one of the most critical issues of cloud computing where resolving such an issue would result in constant growth in the cloud's use and popularity. Our purpose of this study is to create a framework of mobile ad hoc network mobility model using cloud computing for providing secure communication among smart devices network for the internet of things in 5G heterogeneous networks. Our main contribution links a new methodology for providing secure communication on the internet of smart devices in 5G. Our methodology uses the correct and efficient simulation of the desired study and can be implemented in a framework of the Internet of Things in 5G.