{"title":"Computer Network Design for the teaching area of the Elvira Cape library","authors":"Yackelyn Dayanys Domínguez Izquierdo","doi":"10.54216/jisiot.050101","DOIUrl":"https://doi.org/10.54216/jisiot.050101","url":null,"abstract":"Interconnected devices have provided companies and individuals with the advantage that information travels from one place to another, making information processes more viable. The interconnection networks are responsible for providing everything necessary for the machine to have an adequate passage of messages and use of commutations. In this document a design of a LAN network is developed for the area of a library which needs to expand its communication network, thus forming a computer network to connect different types of computers sharing information links. These data links are established through means such as cable, optical cables, or wireless means such as WIFI.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124305900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent system for IoT botnet detection using SVM and PSO optimization","authors":"M. A. Salam","doi":"10.54216/jisiot.030203","DOIUrl":"https://doi.org/10.54216/jisiot.030203","url":null,"abstract":"Botnet attacks involving Internet-of-Things (IoT) devices have skyrocketed in recent years due to the proliferation of internet IoT devices that can be readily infiltrated. The botnet is a common threat, exploiting the absence of basic IoT security technologies and can perform several DDoS attacks. Existing IoT botnet detection methods still have issues, such as relying on labeled data, not being validated with newer botnets, and using very complex machine learning algorithms, making the development of new methods to detect compromised IoT devices urgent to reduce the negative implications of these IoT botnets. Due to the vast amount of normal data accessible, anomaly detection algorithms seem to promise for identifying botnet attacks on the Internet of Things (IoT). For anomaly detection, the One-Class Support vector machine is a strong method (ONE-SVM). Many aspects influence the classification outcomes of the ONE-SVM technique, like that of the subset of features utilized for training the ONE-SVM model, hyperparameters of the kernel. An evolutionary IoT botnet detection algorithm is described in this paper. Particle Swarm Optimization technique (PSO) is used to tune the hyperparameters of the ONE-SVM to detect IoT botnet assaults launched from hacked IoT devices. A new version of a real benchmark dataset is used to evaluate the proposed method's performance using traditional anomaly detection evaluation measures. This technique exceeds all existing algorithms in terms of false positive, true positive and rates, and G-mean for all IoT device categories, according to testing results. It also achieves the shortest detection time despite lowering the number of picked features by a significant amount.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132219542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative study on Internet of Things (IoT): Frameworks, Tools, Applications and Future directions","authors":"Mona Mohamed","doi":"10.5281/ZENODO.3376687","DOIUrl":"https://doi.org/10.5281/ZENODO.3376687","url":null,"abstract":"The proliferation of the smart and sensing devices in the field of communicating networks support in to develop the so-called Internet of Things (IoT). IoT considers a new paradigm for evolutionary of internet connectivity. IoT refers to connect objects around the real world with the Internet to accomplish the common goals and monitor these objects via wire/wireless communications. It plays a large and important role in human life through its use in many applications of human interest. Through using a variety of enabling wireless technologies as Wireless Sensor Networks (WSN), Radio Frequency Identification (RFID), Near Filed Communication (NFC), and barcode in the applications. These technologies will support IoT to transform the internet into a fully integrated future internet. This paper attempts to provide a comprehensive survey of the available literature related to IoT technologies and its applications in many areas of modern-day living. Identify the trend and directions of future research in IoT applications, depend on a comprehensive literature review and the discussion of the achievements of the researchers.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121664198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ERP Implementation Road Map for Small and Medium Size Enterprises (SMEs)","authors":"A. N. Zaied, S. Mohmed","doi":"10.5281/ZENODO.4554347","DOIUrl":"https://doi.org/10.5281/ZENODO.4554347","url":null,"abstract":"The definitions of small and medium enterprises (SMEs) vary from country to country and industry to industry, each country or region has their own definition which depends on who defines it and where is utilized. SMEs play an essential role in most economies, particularly in developing countries. Many large enterprises depend on SMEs (Startups) for their supply chain; thus, SMEs need to adopt Enterprise Resources Planning (ERP) systems more and more. Since ERP system adoption is a challenging project in SMEs, the main purpose of this article is to propose an ERP implementation roadmap for SMEs. This work proposes a road map for ERP implementation in SMEs. It consists of three major stages and eight phases. The paper concludes that even though ERP is important to SMEs, its implementation is challenging, and organizations must prepare adequately to get it right.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121571328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hybrid Machine Learning Model for Rainfall Forecasting","authors":"Hatem Abdel-Kader, M. A. Salam, Mona Mohamed","doi":"10.5281/ZENODO.3376685","DOIUrl":"https://doi.org/10.5281/ZENODO.3376685","url":null,"abstract":"The state of the weather became a point of attraction for researchers in recent days. It control in many fields as agriculture, the country determines the types of crops depend on state of the atmosphere. It is therefore important to know the weather in the coming days to take precautions. Forecasting the weather in future especially rainfall won the attention of many researchers, to prevent flooding and other risks arising from rainfall. This Paper presents a vigorous hybrid technique was applied to forecast rainfall by combining Particle Swarm Optimization (PSO) and Multi-Layer Perceptron (MLP) which is popular kind used in Feed Forward Neural Network (FFNN). The purpose of using PSO with MLP is not just to forecast the rainfall but, to improve the performance of the network; this was proved by comparison with various Back Propagation (BP) an algorithm such as Levenberg-Marquardt (LM) through results of Root Mean Square Error (RMSE). RMSE for MLP based PSO is 0.14 while RMSE for MLP based LM is 0.18.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving the Security and Authentication of the Cloud with IoT using Hybrid Optimization Based Quantum Hash Function","authors":"K. Shankar","doi":"10.5281/ZENODO.3689761","DOIUrl":"https://doi.org/10.5281/ZENODO.3689761","url":null,"abstract":"The security with the protection of IoT is to stay a consequential test, for the most part, because of the huge scale and dispersed nature of IoT systems. A cloud server brings wide pertinence of IoT in numerous businesses just as Government parts. Be that as it may, the security concerns, for example, verification and information protection of these gadgets assume a key job in fruitful coordination of two innovations. To build the security here, a quantum hash work system and hybrid cuckoo search-Artificial Bee Colony algorithm is displayed. A quantum hash work has been presented as an amazing system for secure correspondence of IoT and cloud because of its irregular disordered robust execution, greater affectability for introductory authority dimension, steadiness, and the exceptionally huge crucial area is hypothetically sufficiently able to oppose different known assaults. Cloud servers utilizing CS-ABC to upgrading the safe calculations through a quantum channel inside the cloud framework. Execution examinations and recreation outcomes demonstrate our presented methods are portrayed and also have greater safety, proficiency with strength opposed to a few surely understood assaults which choose them as a great contender for verifying cloud and IoT applications.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124288911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Trustworthy Learning Technique for Securing Industrial Internet of Things Systems","authors":"Osama Maher, E. Sitnikova","doi":"10.54216/jisiot.050104","DOIUrl":"https://doi.org/10.54216/jisiot.050104","url":null,"abstract":"Since the Industrial Internet of Things (IIoT) networks comprise heterogeneous manufacturing and technological devices and services, discovering advanced cyber threats is an arduous and risk-prone process. Cyber-attack detection techniques have been recently emerged to understand the process of obtaining knowledge about cyber threats to collect evidence. These techniques have broadly employed for identifying malicious events of cyber threats to protect organizations’ assets. The main limitation of these systems is that they are not able to discover and interpret new attack activities. This paper proposes a new adversarial deep learning for discovering adversarial attacks in IIoT networks. Evaluation of correlation reduction has been used as a means of feature selection for reducing the impact of data poisoning attacks on the subsequent deep learning techniques. Feed Forward Deep Neural Networks have been developed using across various parameter permutations, at differing rates of data poisoning, to develop a robust deep learning architecture. The results of the proposed technique have been compared with previously developed deep learning models, proving the increased robustness of the new deep learning architectures across the ToN_IoT datasets.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving the Problem of Target k-Coverage in WSNs Using Fuzzy Clustering Algorithm","authors":"M. .., Zohre .., Mohammad Reza Esfandyari","doi":"10.54216/jisiot.020203","DOIUrl":"https://doi.org/10.54216/jisiot.020203","url":null,"abstract":"The purpose of the present research was to introduce an algorithm to solve the coverage problem in wireless multimedia networks that can be used to optimize energy consumption and network lifetime. In this regard, the problem of target k-coverage in WSNs was solved by dividing the environment into the proportional area and random selection. This can be done using a fuzzy clustering algorithm. It is worth noting that the results of the proposed algorithm were compared with previous methods such as genetic and annealing algorithm. The simulation results and comparison with other algorithms show a 27% superiority of the proposed algorithm. It is hoped that this method can be used in networks with larger dimensions in the future","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124314170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An effective model for Selection of the best IoT platform: A critical review of challenges and solutions","authors":"Mahmoud A. Zaher, N. M. Eldakhly","doi":"10.54216/jisiot.070204","DOIUrl":"https://doi.org/10.54216/jisiot.070204","url":null,"abstract":"The process of making an informed decision on which Internet of Things (IoT) platform to choose is an extremely important one in the modern world. The choice procedure is made more difficult as a result of (a) the vast number of IoT platforms that are offered on the market for IoT applications and (b) the wide diversity of functions and solutions that are provided by these platforms. In this article, the multi-criteria decision-making (MCDM) methodologies for selecting the specific Internet of Things platform are taken into consideration. The TOPSIS method is used in this paper to select the best IoT platform. TOPSIS method is a common MCDM method. TOPSIS method used the idea of the best and cost criteria to compute the distance from it. During the IoT platform choice procedures, relevant aspects, such as the stability, consistency, protection, and privacy of IoT platforms, are regarded to be the most significant ones for making decisions.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"1987 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125481278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Waste Management System for Recycling and Resource Optimization","authors":"A. Sleem, Ibrahim Elhenawy","doi":"10.54216/jisiot.010205","DOIUrl":"https://doi.org/10.54216/jisiot.010205","url":null,"abstract":"This paper proposes a deep learning-based intelligent waste management system that can accurately classify waste types and optimize waste disposal processes. The proposed system utilizes a convolutional model to concisely identify the waste type from images captured by a camera system. Our system uses intelligent data augmentation to perform large datasets of waste item images and achieves a high classification accuracy rate. The waste types are classified into several categories, including glass, cardboard, metal, plastic, paper, and trash. Experimental results show that our system achieves high accuracy rates in waste classification and improves waste disposal efficiency compared to traditional waste management systems. Our system has the potential to significantly reduce the negative impact of waste on the environment and to promote sustainable waste management practices.","PeriodicalId":122556,"journal":{"name":"Journal of Intelligent Systems and Internet of Things","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130175723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}