Claim Missing Document
Check
Articles

Found 4 Documents
Search

Deep Learning Based Security Schemes for IoT Applications: A Review Othman, Mina; askar, shavan; Ali, Daban; Ibrahim, Media Ali; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3839

Abstract

Due to its widespread perception as a crucial element of the Internet of the future, the Internet of Things (IoT) has garnered a lot of attention in recent years. The Internet of Things (IoT) is made up of billions of sentients, communicative "things" that expand the boundaries of the physical and virtual worlds. Every day, such widely used smart gadgets generate enormous amounts of data, creating an urgent need for rapid data analysis across a range of smart mobile devices. Thankfully, current developments in deep learning have made it possible for us to solve the issue tastefully. Deep models may be built to handle large amounts of sensor data and rapidly and effectively learn underlying properties for a variety of Internet of Things applications on smart devices. We review the research on applying deep learning to several Internet of Things applications in this post. Our goal is to provide insights into the many ways in which deep learning techniques may be used to support Internet of Things applications in four typical domains: smart industrial, smart home, smart healthcare, and smart transportation. One of the main goals is to seamlessly integrate deep learning and IoT, leading to a variety of novel ideas in IoT applications, including autonomous driving, manufacture inspection, intelligent control, indoor localization, health monitoring, disease analysis, and home robotics. We also go over a number of problems, difficulties, and potential avenues for future study that make use of deep learning (DL), which is turning out to be one of the most effective and appropriate methods for dealing with various IoT security concerns. The goal of recent research has been to enhance deep learning algorithms for better Internet of Things security. This study examines deep learning-based intrusion detection techniques, evaluates the effectiveness of several deep learning techniques, and determines the most effective approach for deploying intrusion detection in the Internet of Things. This study uses Deep Learning (DL) approaches to better expand intelligence and application skills by using the large quantity of data generated or acquired. The many IoT domains have drawn the attention of several academics, and both DL and IoT approaches have been explored. Because DL was designed to handle a variety of data in huge volumes and required processing in virtually real-time, it was indicated by several studies as a workable method for handling data generated by IoT.
The Industrial Internet of Things (IIoT) and its roles in the Fourth Industrial Revolution: A review Saleem, Mohammed; askar, shavan; Ibrahim, Media Ali; Othman, Mina; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3841

Abstract

The Industrial Internet of Things and Industry 4.0 are now two highly sought-after areas of research and development, attracting significant interest from both academic and industrial sectors. The two ideas, Industry 4.0 and IIoT, share significant similarities, with Industry 4.0 being seen as the use of IIoT specifically in the automation and manufacturing sectors. Within the framework of the present Industry 4.0 paradigm, many growth pathways have emerged, collectively leading to notable enhancements in terms of efficiency, flexibility, communication, adaptability, customization, and modularity in the industrial sector. The Industry 4.0 is rapidly evolving within the framework of the Industrial Internet of Things (IIoT), and the authors are recognizing the necessity for a comprehensive and in-depth overview of the many research areas that are currently expanding. The area will remain intriguing in the foreseeable future due to its significant potential for enhancing the existing industrial technologies. An exhaustive evaluation of the current systems in the automotive sector, emergency response, and chain management on IIoT has been conducted, revealing that IIoT has been widely adopted across several technological domains. Industry 4.0 is the term used to describe the present automation and data sharing trend in businesses. Presently, there is a dearth of agreement about the assessment of an organization's readiness for Industry 4.0. Industry 4.0 encompasses a diverse array of digital technologies that profoundly influence industrial enterprises. The literature on Industry 4.0 has had significant exponential growth during the previous decade. The results of our research confirm the idea of Industry 4.0 as a concept that goes beyond the Smart Manufacturing sector, hence opening up possibilities for collaboration with other interconnected disciplines.
Deep Learning in Medical Image Analysis Article Review Ibrahim, Media Ali; askar, shavan; saleem, Mohammad; Ali, Daban; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3842

Abstract

Transfer learning, in evaluation to common deep studying strategies which include convolutional neural networks (CNNs), stands proud due to its simplicity, efficiency, and coffee education value, efficaciously addressing the venture of restricted datasets. The importance of scientific picture analysis in both scientific research and medical prognosis can't be overstated, with image techniques like Computer Tomography (CT), Magnetic Resonance Image (MRI), Ultrasound (US), and X-Ray playing a crucial function. Despite their utility in non-invasive analysis, the scarcity of categorized medical images poses a completely unique challenge in comparison to datasets in other pc imaginative and prescient domains, like facial reputation. Given this shortage, switch getting to know has won reputation amongst researchers for medical photo processing. This complete evaluation draws on one hundred amazing papers from IEEE, Elsevier, Google Scholar, Web of Science, and diverse sources spanning 2000 to 2023 It covers vital components, which includes the (i) shape of CNNs, (ii) foundational know-how of switch learning, (iii) numerous techniques for enforcing transfer mastering, (iv) the utility of switch gaining knowledge of throughout numerous sub-fields of medical photo analysis, and (v) a dialogue at the future potentialities of transfer studying within the realm of medical image analysis. This evaluate no longer handiest equips beginners with a scientific understanding of transfer mastering applications in medical image analysis but additionally serves policymakers by means of summarizing the evolving trends in transfer learning within the scientific image domain. This insight might also encourage policymakers to formulate advantageous rules that support the continued development of Transfer learning knowledge of in medical image analysis.
Deep Learning Algorithms for Detecting and Mitigating DDoS Attacks Hamad, Soran; Askar, Shavan; Sami Khoshaba, Farah; Maghdid, Sozan; Abdullah, Nihad
The Indonesian Journal of Computer Science Vol. 13 No. 2 (2024): The Indonesian Journal of Computer Science (IJCS)
Publisher : AI Society & STMIK Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.33022/ijcs.v13i2.3847

Abstract

Raising the threat of Distributed Denial of Service (DDoS) attacks means that high and adapted detection tools are required now more than ever. This research focuses on exploring the latest solutions in preventing DDoS attacks and emphasizes how Artificial Intelligence (AI) is involved in enhancing end-to-end detection techniques. Through the analysis of several key approaches, this work notes that AI-guided models quickly identify and counteract any unusual traffic patterns that may indicate an oncoming DDoS attack. Essential aspects towards creating more resilient networks against such attacks include machine learning algorithms, sophisticated data analytics together with AI based detection systems for traffic pattern recognition. Importantly, AI does well in behavioral analysis because it can distinguish and adapt to changing attack vectors. Additionally, it puts AI into perspective as making positive mitigation strategies possible that contain quick interferences such as temporary halt of traffic, rerouting and targeted block listing with real time control panel operations. On the contrary, current DDoS detection prevention techniques remain critically addressed of persistent challenges and limitations fundamental to them. From what emerges, they should always be ready for innovation and improvement because of how attacks might evolve over time. This paper aligns itself with the position that AI-driven detection mechanisms are natural to network security against DDoS attacks. It underlines the importance of integrating AI-based solutions with conventional practices in order to enhance network resilience and efficiently counteract cyber threats that are evolving all the time.