Mohammed Abdul Jaleel Maktoof

Mohammed Abdul Jaleel Maktoof

مطالب
ترتیب بر اساس: جدیدترینپربازدیدترین

فیلترهای جستجو: فیلتری انتخاب نشده است.
نمایش ۱ تا ۵ مورد از کل ۵ مورد.
۱.

Blockchain Beyond Cryptocurrency: Emerging Applications in Secure Data Sharing(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Blockchain Secure Data Sharing Decentralization Data Integrity cryptocurrency Healthcare Finance Supply Chain Management immutability Scalability

حوزه‌های تخصصی:
تعداد بازدید : ۴ تعداد دانلود : ۳
Background: Blockchain, mainly known for supporting cryptocurrencies, has a much broader role, as seen in this paper. These fundamental features of decentralization and immutability guarantee improved security and transparency in multiple spheres of human life. Objective: The article seeks to review current literature on new prospects of using blockchain as a secure way of sharing data with the purpose of establishing its advantages and disadvantages in this field. Methods: Relevant academic articles and papers published in the last 5 years were considered, and research cases of blockchain applications in numerous fields including healthcare, finance, supply chain, etc. This incorporates a review of blockchain within the capacity of data integrity, confidentiality, and availability. Results: The results show that blockchain can greatly improve the security and credibility of data in data sharing by reducing common vulnerability and offering reliable traceability. The technology ensures safe transactions of data and minimizes the possibilities of manipulation of data in fields which involve sensitive data processes. Conclusion: Opportunities for the blockchain for secure data sharing are demonstrated across several industries through current advancements. However, it also has limitations that includes size ability, compatibility and legislation issues which still has to be solved. The study should therefore consider the following recommendations about the barriers outlined above in order to enhance the application of blockchain in secure data sharing in the future.
۲.

Artificial Intelligence in Network Security with Autonomous Threat Response Systems(مقاله علمی وزارت علوم)

کلیدواژه‌ها: Artificial Intelligence Network Security Autonomous Systems Machine Learning (ML) Deep Learning (DL) Threat Detection cyberattacks Threat Mitigation Response time DDoS

حوزه‌های تخصصی:
تعداد بازدید : ۴ تعداد دانلود : ۳
Background: With the continued advance in cyber threats, traditional network security systems offer little returns to organizations. AI has turned out to be a useful technology in improving network security because it proactively identifies and responds to threats in a short time. Objective: This article seeks to discuss the role played by AI self-defending mechanisms in autonomous network security given their effectiveness in threat detection, response time, and the overall harm that can be caused to networks by cyber criminals. Methods: Three separate studies were made, including conventional security systems, and analytically compared them with the AI-driven system across 100 different network environments. Machine learning (ML), deep learning (DL), and other forms of AI were applied to identify and counteract distinct threats like viruses, phishing, and even DDoS attacks. Detecting accuracy, response time and ability to mitigate attacks where among some of the other factors that were examined. Results: Automated threat intelligence systems have a 92% accuracy while legacy systems only have 78%. Mean response time was also decreasing by 65% from 45 seconds to 15 seconds. A significant increase to attack mitigation rates was noted with fifty percent effectiveness of the AI programs averting 85 percent of the threats in the first 30 seconds of identification. Conclusion: Autonomous threat response systems substantiate AI, which function as a radically superior replacement to conventional network security structures, minimizing threat response time and boosting the overall threat neutralization outcome. Incorporation of these types of secure mechanisms into contemporary security landscapes is important as a means of counteraction against new forms of cyber threats.
۳.

Beyond 5G. Strategic Pathways to 6G Development and Emerging Applications(مقاله علمی وزارت علوم)

کلیدواژه‌ها: 6G Beyond 5G terahertz communication smart cities Autonomous Systems AI integration latency reduction spectrum management network architecture Industrial Automation

حوزه‌های تخصصی:
تعداد بازدید : ۳ تعداد دانلود : ۲
Background: The rapid evolution from 4G to 5G has transformed the telecommunications landscape, but as technological demands continue to grow, the shift toward 6G is gaining attention. 6G aims to address the limitations of 5G, such as latency and bandwidth constraints, while introducing new capabilities like terahertz communication and ubiquitous AI integration. Objective: This article explores the development roadmap of 6G, highlighting its applications across industries and addressing key challenges in its deployment. Methods: A comprehensive review of current literature on 5G advancements and emerging 6G technologies was conducted. Comparative analyses were performed on the theoretical frameworks of 6G’s core capabilities, including network architecture, spectrum management, and AI integration. Results: The study identified key applications for 6G, such as smart cities, autonomous transportation, healthcare, and industrial automation. It also highlighted the anticipated improvements in data transmission speed, reliability, and connectivity. Conclusion: 6G represents a pivotal evolution in telecommunications, offering transformation in numerous sectors. However, challenges such as infrastructure development, regulatory frameworks, and energy efficiency must be addressed.
۴.

Artificial Intelligence in Healthcare: Revolutionizing Diagnostics with Predictive Algorithms(مقاله علمی وزارت علوم)

کلیدواژه‌ها: artificial intelligence (AI) Healthcare Predictive Algorithms Diagnostics Personalized Medicine early detection Diagnostic Accuracy Medical Errors Patient Outcomes Clinical Applications

حوزه‌های تخصصی:
تعداد بازدید : ۴ تعداد دانلود : ۱
ABSTRACT Background: Artificial Intelligence (AI) has rapidly integrated into healthcare, proving indispensable in diagnostic processes. Event-predicting equations in medicine offer solutions to longstanding issues related to early diagnosis and personalized patient care. Objective: This article aims to explore best practices in objective and quantitative diagnostic predictions using AI and predictive algorithms. It seeks to revolutionize healthcare diagnostics by enhancing effectiveness and reducing diagnostic error rates. Methods: This study involves a literature review of the past five years, focusing on recent innovations in AI for healthcare diagnostics. The review includes fields such as oncology, cardiology, and others to evaluate the efficacy of prediction algorithms in practice. Results: The findings indicate that machine learning-based computer-aided diagnosis models significantly improve diagnostic accuracy by detecting diseases at early stages and personalizing treatment programs. The integration of these algorithms has led to reduced diagnostic errors and improved patient experiences across various medical fields. Conclusion: AI predictive algorithms represent the future of diagnostic medicine. Their adoption is set to personalize and advance patient treatment, enhance health outcomes, and improve the efficiency of healthcare systems. However, comprehensive research and precise implementation are essential to fully harness the potential of AI in diagnostics.
۵.

Exploring the Synergy between AI and Cybersecurity for Threat Detection(مقاله علمی وزارت علوم)

کلیدواژه‌ها: AI Cybersecurity Threat Detection Machine Learning (ML) Deep Learning (DL) Natural Language Processing (NLP) Advanced Persistent Threats (APT) Cyber-attacks AI-driven Systems Security Infrastructure

حوزه‌های تخصصی:
تعداد بازدید : ۴ تعداد دانلود : ۳
Background : Security has been a major issue of discussion due to increase in the number and sophistication of Cyber threats in the modern era. Conventional approaches to threat identification might face difficulties in a number of things, namely the relevancy and the ability to process new and constantly evolving threats. Machine learning (ML) and deep learning (DL) based Approaches present AI as a potential solution to the problem of efficient threat detection.   Objective : The article aims to compare the RF, SVM, CNNs, and RNNs models’ performance, computational time, and resilience in identifying potential cyber threats, such as malware, phishing, and DoS attacks.   Methods : The proposed models were trained as well as evaluated on the NSL-KDD and CICIDS 2017 datasets. This was done based on common scheme indicators including accuracy, precision, recollection, F1 measure, detection rate of efficiency, AUC-ROC, False Alarm Rate (FAR), and the stability to adversaries. Rating of computational efficiency was defined by training time and memory consumption.   Results : The findings indicate that the CNNs gave the best accuracy (96%) and resisted perturbation better, and the RF showed good performance with little computational load. RNNs have been proved effective in sequential data analysis and SVM also performed fairly well on binary data classification although there is a problem of scalability.   Conclusion : CNNs used in AI models are the best solutions to protection from the threats in the cybersecurity space. Nevertheless, some of them still require computational optimization in order to make those beneficial in scenarios with a limited usage of computational resources. It is suggested that these findings can be used in the context of subsequent research and practical applications.

پالایش نتایج جستجو

تعداد نتایج در یک صفحه:

درجه علمی

مجله

سال

حوزه تخصصی

زبان