Claim Missing Document
Check
Articles

Found 3 Documents
Search

Deep Learning Based Security Schemes for IoT Applications: A Review Othman, Mina; askar, shavan; Ali, Daban; Ibrahim, Media Ali; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3839

Abstract

Due to its widespread perception as a crucial element of the Internet of the future, the Internet of Things (IoT) has garnered a lot of attention in recent years. The Internet of Things (IoT) is made up of billions of sentients, communicative "things" that expand the boundaries of the physical and virtual worlds. Every day, such widely used smart gadgets generate enormous amounts of data, creating an urgent need for rapid data analysis across a range of smart mobile devices. Thankfully, current developments in deep learning have made it possible for us to solve the issue tastefully. Deep models may be built to handle large amounts of sensor data and rapidly and effectively learn underlying properties for a variety of Internet of Things applications on smart devices. We review the research on applying deep learning to several Internet of Things applications in this post. Our goal is to provide insights into the many ways in which deep learning techniques may be used to support Internet of Things applications in four typical domains: smart industrial, smart home, smart healthcare, and smart transportation. One of the main goals is to seamlessly integrate deep learning and IoT, leading to a variety of novel ideas in IoT applications, including autonomous driving, manufacture inspection, intelligent control, indoor localization, health monitoring, disease analysis, and home robotics. We also go over a number of problems, difficulties, and potential avenues for future study that make use of deep learning (DL), which is turning out to be one of the most effective and appropriate methods for dealing with various IoT security concerns. The goal of recent research has been to enhance deep learning algorithms for better Internet of Things security. This study examines deep learning-based intrusion detection techniques, evaluates the effectiveness of several deep learning techniques, and determines the most effective approach for deploying intrusion detection in the Internet of Things. This study uses Deep Learning (DL) approaches to better expand intelligence and application skills by using the large quantity of data generated or acquired. The many IoT domains have drawn the attention of several academics, and both DL and IoT approaches have been explored. Because DL was designed to handle a variety of data in huge volumes and required processing in virtually real-time, it was indicated by several studies as a workable method for handling data generated by IoT.
Image Copyright Protection Based on Blockchain Technology Review Ali, Daban; Askar, Shavan; saleem, mohammed; Othman, Mina; Omer, Saman M.
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3840

Abstract

On a daily basis, a significant number of individuals distribute several photos and videos that have been marginally modified from the original material produced by copyright owners, such as photographers, graphic designers, and video producers. Individuals that infringe upon the rights of others, lacking the legal authority to access multimedia content, employ various digital image and picture manipulation techniques, it involves converting to gray scale, trimming, rotating, contracting the frame, and adjusting the background speed, to modify said content. Blockchain technology obviates the necessity of an intermediary, hence circumventing the possibility of a singular point of failure. Infractions to copyright poses a significant barrier to protecting commercial image and video information. The IPFS blockchain technology offers on-chain preservation for copyright information and off-chain storing for distinct multimedia files. The enhanced perceptual hashing algorithm significantly enhances the precision of identifying connections to identify digital image piracy. The photographers and designers that submit their photographs on websites are experiencing significant dissatisfaction due to a prevalent practice in which others attempt to claim credit and profit from the initial creator's effort.
Deep Learning in Medical Image Analysis Article Review Ibrahim, Media Ali; askar, shavan; saleem, Mohammad; Ali, Daban; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3842

Abstract

Transfer learning, in evaluation to common deep studying strategies which include convolutional neural networks (CNNs), stands proud due to its simplicity, efficiency, and coffee education value, efficaciously addressing the venture of restricted datasets. The importance of scientific picture analysis in both scientific research and medical prognosis can't be overstated, with image techniques like Computer Tomography (CT), Magnetic Resonance Image (MRI), Ultrasound (US), and X-Ray playing a crucial function. Despite their utility in non-invasive analysis, the scarcity of categorized medical images poses a completely unique challenge in comparison to datasets in other pc imaginative and prescient domains, like facial reputation. Given this shortage, switch getting to know has won reputation amongst researchers for medical photo processing. This complete evaluation draws on one hundred amazing papers from IEEE, Elsevier, Google Scholar, Web of Science, and diverse sources spanning 2000 to 2023 It covers vital components, which includes the (i) shape of CNNs, (ii) foundational know-how of switch learning, (iii) numerous techniques for enforcing transfer mastering, (iv) the utility of switch gaining knowledge of throughout numerous sub-fields of medical photo analysis, and (v) a dialogue at the future potentialities of transfer studying within the realm of medical image analysis. This evaluate no longer handiest equips beginners with a scientific understanding of transfer mastering applications in medical image analysis but additionally serves policymakers by means of summarizing the evolving trends in transfer learning within the scientific image domain. This insight might also encourage policymakers to formulate advantageous rules that support the continued development of Transfer learning knowledge of in medical image analysis.