Mina Farooq’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Figure1. The three-layered IOT security architectural framework (Azumah et al. 2021)
Figure 2. Kinds of threats in IOT 4.2 Deep Learning DL uses multiple layers of Artificial Neural Networks (ANNs) to learn hierarchical representations in deep structures. DL architectures have several processing layers. Based on input layer data, each layer might respond nonlinearly. The human brain's and neurons' signal processing methods are mimicked in DL's functioning. Compared to other conventional machine learning techniques, deep learning architectures have garnered more attention in the last several years. These methods are regarded as restricted subsets of shallow-structured learning architectures (DL). Figure 4 displays the Google trends search trend of five major machine learning algorithms, with DL rising in popularity. The notion of deep belief networks was developed by G. Hinton et al. in 2006, kicking off the DNN movement (Hinton and Salakhutdinov 2006). Subsequently, the technology's cutting-edge capabilities have been noted in several AI domains, such as picture identification, image recovery, information retrieval and search engines, and natural language processing. ANNs have been the foundation for the development of DL approaches. Neural Networks with Feed-forwarding (FNNs) (Svozil, Kvasnicka, and Pospichal 1997)(a.k.a Multilayer Perceptrons -MLPs) have been used to train systems for decades, but adding layers makes them harder to learn (Schmidhuber 2015). Another cause of overfitted models was small training data. Back then, computing resources limited the construction of efficient deeper FNNs. Recent technology improvements, especially GPUs and hardware accelerators, have addressed these processing restrictions. In addition to hardware and structural breakthroughs, DL approaches have benefitted from successful deep network training algorithms, such as: • Utilizing Rectified Linear Units (ReLUs) as activation function (Glorot, Bordes, and Bengio 2011), • Introducing dropout methods (Hinton et al. 2012),
Figure 3. Recent Google trends indicate increased interest in DL
Figure 5. An RBM with n hidden variables and m displayed variables.
Figure 7. The architecture of Le Net 5. Each of these planes indicate a feature map. Kernels-little white boxes-are convolutional neural network keys. The graphic shows that convolutional layers emphasize local associations more than complete connection layers.

+3

(online) Deep Learning Based Security Schemes for IoT Applications: A Review
  • Article
  • Full-text available

December 2024

·

29 Reads

Mina Farooq

·

·

Ali Qadir

·

[...]

·

Nihad Abdullah

Due to its widespread perception as a crucial element of the Internet of the future, the Internet of Things (IoT) has garnered a lot of attention in recent years. The Internet of Things (IoT) is made up of billions of sentients, communicative "things" that expand the boundaries of the physical and virtual worlds. Every day, such widely used smart gadgets generate enormous amounts of data, creating an urgent need for rapid data analysis across a range of smart mobile devices. Thankfully, current developments in deep learning have made it possible for us to solve the issue tastefully. Deep models may be built to handle large amounts of sensor data and rapidly and effectively learn underlying properties for a variety of Internet of Things applications on smart devices. We review the research on applying deep learning to several Internet of Things applications in this post. Our goal is to provide insights into the many ways in which deep learning techniques may be used to support Internet of Things applications in four typical domains: smart industrial, smart home, smart healthcare, and smart transportation. One of the main goals is to seamlessly integrate deep learning and IoT, leading to a variety of novel ideas in IoT applications, including autonomous driving, manufacture inspection, intelligent control, indoor localization, health monitoring, disease analysis, and home robotics. We also go over a number of problems, difficulties, and potential avenues for future study that make use of deep learning (DL), which is turning out to be one of the most effective and appropriate methods for dealing with various IoT security concerns. The goal of recent research has been to enhance deep learning algorithms for better Internet of Things security. This study examines deep learning-based intrusion detection techniques, evaluates the effectiveness of several deep learning techniques, and determines the most effective approach for deploying intrusion detection in the Internet of Things. This study uses Deep Learning (DL) approaches to better expand intelligence and application skills by using the large quantity of data generated or acquired. The many IoT domains have drawn the attention of several academics, and both DL and IoT approaches have been explored. Because DL was designed to handle a variety of data in huge volumes and required processing in virtually real-time, it was indicated by several studies as a workable method for handling data generated by IoT.

Download

Figure 1. System design architecture [1]
Blockchain Copyright Protection Comparison's
Image Copyright Protection Based on Blockchain Technology Review

June 2024

·

85 Reads

Indonesian Journal of Computer Science

On a daily basis, a significant number of individuals distribute several photos and videos that have been marginally modified from the original material produced by copyright owners, such as photographers, graphic designers, and video producers. Individuals that infringe upon the rights of others, lacking the legal authority to access multimedia content, employ various digital image and picture manipulation techniques, it involves converting to gray scale, trimming, rotating, contracting the frame, and adjusting the background speed, to modify said content. Blockchain technology obviates the necessity of an intermediary, hence circumventing the possibility of a singular point of failure. Infractions to copyright poses a significant barrier to protecting commercial image and video information. The IPFS blockchain technology offers on-chain preservation for copyright information and off-chain storing for distinct multimedia files. The enhanced perceptual hashing algorithm significantly enhances the precision of identifying connections to identify digital image piracy. The photographers and designers that submit their photographs on websites are experiencing significant dissatisfaction due to a prevalent practice in which others attempt to claim credit and profit from the initial creator's effort.