Claim Missing Document
Check
Articles

Found 3 Documents
Search

Deep Learning Based Security Schemes for IoT Applications: A Review Othman, Mina; askar, shavan; Ali, Daban; Ibrahim, Media Ali; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3839

Abstract

Due to its widespread perception as a crucial element of the Internet of the future, the Internet of Things (IoT) has garnered a lot of attention in recent years. The Internet of Things (IoT) is made up of billions of sentients, communicative "things" that expand the boundaries of the physical and virtual worlds. Every day, such widely used smart gadgets generate enormous amounts of data, creating an urgent need for rapid data analysis across a range of smart mobile devices. Thankfully, current developments in deep learning have made it possible for us to solve the issue tastefully. Deep models may be built to handle large amounts of sensor data and rapidly and effectively learn underlying properties for a variety of Internet of Things applications on smart devices. We review the research on applying deep learning to several Internet of Things applications in this post. Our goal is to provide insights into the many ways in which deep learning techniques may be used to support Internet of Things applications in four typical domains: smart industrial, smart home, smart healthcare, and smart transportation. One of the main goals is to seamlessly integrate deep learning and IoT, leading to a variety of novel ideas in IoT applications, including autonomous driving, manufacture inspection, intelligent control, indoor localization, health monitoring, disease analysis, and home robotics. We also go over a number of problems, difficulties, and potential avenues for future study that make use of deep learning (DL), which is turning out to be one of the most effective and appropriate methods for dealing with various IoT security concerns. The goal of recent research has been to enhance deep learning algorithms for better Internet of Things security. This study examines deep learning-based intrusion detection techniques, evaluates the effectiveness of several deep learning techniques, and determines the most effective approach for deploying intrusion detection in the Internet of Things. This study uses Deep Learning (DL) approaches to better expand intelligence and application skills by using the large quantity of data generated or acquired. The many IoT domains have drawn the attention of several academics, and both DL and IoT approaches have been explored. Because DL was designed to handle a variety of data in huge volumes and required processing in virtually real-time, it was indicated by several studies as a workable method for handling data generated by IoT.
Image Copyright Protection Based on Blockchain Technology Review Ali, Daban; Askar, Shavan; saleem, mohammed; Othman, Mina; Omer, Saman M.
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3840

Abstract

On a daily basis, a significant number of individuals distribute several photos and videos that have been marginally modified from the original material produced by copyright owners, such as photographers, graphic designers, and video producers. Individuals that infringe upon the rights of others, lacking the legal authority to access multimedia content, employ various digital image and picture manipulation techniques, it involves converting to gray scale, trimming, rotating, contracting the frame, and adjusting the background speed, to modify said content. Blockchain technology obviates the necessity of an intermediary, hence circumventing the possibility of a singular point of failure. Infractions to copyright poses a significant barrier to protecting commercial image and video information. The IPFS blockchain technology offers on-chain preservation for copyright information and off-chain storing for distinct multimedia files. The enhanced perceptual hashing algorithm significantly enhances the precision of identifying connections to identify digital image piracy. The photographers and designers that submit their photographs on websites are experiencing significant dissatisfaction due to a prevalent practice in which others attempt to claim credit and profit from the initial creator's effort.
The Industrial Internet of Things (IIoT) and its roles in the Fourth Industrial Revolution: A review Saleem, Mohammed; askar, shavan; Ibrahim, Media Ali; Othman, Mina; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3841

Abstract

The Industrial Internet of Things and Industry 4.0 are now two highly sought-after areas of research and development, attracting significant interest from both academic and industrial sectors. The two ideas, Industry 4.0 and IIoT, share significant similarities, with Industry 4.0 being seen as the use of IIoT specifically in the automation and manufacturing sectors. Within the framework of the present Industry 4.0 paradigm, many growth pathways have emerged, collectively leading to notable enhancements in terms of efficiency, flexibility, communication, adaptability, customization, and modularity in the industrial sector. The Industry 4.0 is rapidly evolving within the framework of the Industrial Internet of Things (IIoT), and the authors are recognizing the necessity for a comprehensive and in-depth overview of the many research areas that are currently expanding. The area will remain intriguing in the foreseeable future due to its significant potential for enhancing the existing industrial technologies. An exhaustive evaluation of the current systems in the automotive sector, emergency response, and chain management on IIoT has been conducted, revealing that IIoT has been widely adopted across several technological domains. Industry 4.0 is the term used to describe the present automation and data sharing trend in businesses. Presently, there is a dearth of agreement about the assessment of an organization's readiness for Industry 4.0. Industry 4.0 encompasses a diverse array of digital technologies that profoundly influence industrial enterprises. The literature on Industry 4.0 has had significant exponential growth during the previous decade. The results of our research confirm the idea of Industry 4.0 as a concept that goes beyond the Smart Manufacturing sector, hence opening up possibilities for collaboration with other interconnected disciplines.