Journal of Intelligent Systems and Internet of Things

Journal DOI

https://doi.org/10.54216/JISIoT

Submit Your Paper

2690-6791ISSN (Online) 2769-786XISSN (Print)

Blockchain-Enabled Multi-Head Attention Based Deep Learning Model for Intrusion Detection System in Smart Networks

Ehab Bahaudien Ashary

Intrusion Detection Systems (IDS) are increasingly being integrated into smart homes for effective pervasive sensing and resource management, thanks to advancements in sensor technologies and the development of Information and Communication Technology (ICT). Securing IDSs in smart homes is significant for safeguarding crucial data and ensure the integrity of related devices. Implementing strong cybersecurity, measures, including regular software updates, encrypted communication protocols, and secure authentication mechanisms, is critical to safeguard potential risks. As the smart home network constantly increasing, developers, users, and manufacturers must work together to maintain and prioritize stringent security standards, alleviating the risks closely related to connected devices and preserving the safety and privacy of the consumer. Blockchain (BC) technology can increase the security of IDS in smart homes by giving a tamper-resistant and decentralized framework to manage data transactions and device interactions. By leveraging blockchain, smart home networks can establish a more secure and resilient infrastructure, which provides consumers with high confidence in the security and privacy of the interconnected devices. This study introduces a Blockchain and Multi-Head Attention-Based Deep Learning for Intrusion Detection System in Smart Networks (BCMHDL-IDSSN) technique in Smart Home Networks. The BCMHDL-IDSSN method aims to enhance security in the smart home networks. In the BCMHDL-IDSSN technique, BC technology is used to achieve security. Besides, the BCMHDL-IDSSN technique involves the design of a multi-head attention bidirectional gated recurrent unit (MHA-BiGRU) method for the detection of malicious activities. Finally, an enhanced pigeon-inspired optimization (EPIO) model is applied for the optimal hyperactive parameter choice of the MHA-BiGRU model. A detailed investigation was applied to validate the performance of the BCMHDL-IDSSN method. The simulation values emphasized that the BCMHDL-IDSSN method gains high efficiency over other techniques.

Read More

Doi: https://doi.org/10.54216/JISIoT.150201

Vol. 15 Issue. 2 PP. 01-13, (2025)

Design and implementation of intelligent home data cloud storage system with large system and big data

Yangxia Shu , Hai Liu

The increasing maturity of 5G technology and Internet of Things technology makes people feel the convenience brought by high-tech in their daily lives, and smart homes gradually penetrate into people’s lives. Aiming at the disadvantages of traditional data storage such as low flexibility and slow speed, an effective cloud storage system for data storage and management is designed. Through the design of the data cloud storage system structure and database, and the hardware design of the smart home data cloud storage system, this paper provides users with various functions, verifies the practicability of the cloud storage system through system testing and analysis, and improves the functions of the smart home data cloud storage system.

Read More

Doi: https://doi.org/10.54216/JISIoT.150202

Vol. 15 Issue. 2 PP. 14-28, (2025)

Modelling Software Development Effort Using Data-Driven Models

Zainab Rustum Mohsin , Firoj Khan

Software effort estimation is highly significant for project management regarding the bidding process since underestimation leads to financial losses, while overestimation may bring the chance of losing a competitive bid. Whereas numerous models have been designed up until now, those developed upon machine learning, Adaptive Neuro-Fuzzy Inference Systems (ANFIS) and Artificial Neural Networks (ANN) have emerged as preeminent technologies. The proposed research will explore the effectiveness of using the ANN and ANFIS approaches in the estimation of effort for NASA datasets by 13 observations used for training and the rest for the test. To check the precision of models, several measures are used to evaluate the accuracy of the developed model, including the correlation coefficient, RMSE, and MMRE. The findings demonstrate that ANN and ANFIS exhibit superior performance, yielding much higher prediction accuracy compared to conventional Models including Walston-Felix, Doty, Bailey-Basili, and Halstead. It emphasizes ANN and ANFIS as reliable and straightforward software effort estimating methodologies, hence yielding significant enhancements in estimation precision and competitiveness. Their high performance underlines their usefulness to project managers who seek accurate predictions. This study strongly recommends the application of data-driven approaches like ANN and ANFIS to enhance the overall estimation accuracy in software project bidding.

Read More

Doi: https://doi.org/10.54216/JISIoT.150203

Vol. 15 Issue. 2 PP. 29-40, (2025)

Deep Secure: An Integrated Approach to Anomaly Detection and Cryptographic Protection in Industrial Cyber-Physical Systems

Sameer Nooh

Industrial Cyber-Physical System (CPS) signify a noteworthy development in industrial automation and control, combining physical and digital parts in order to improve the efficacy, trustworthiness, and functionality of numerous industrial procedures. Industrial CPS are helpful in a huge range of industries such as transportation, energy, manufacturing, and healthcare.  Intrusion detection systems (IDs) assist as vigilant protectors, constantly observing network and physical modules for any illegal access, variances, or doubtful actions. They deliver initial threat recognition and prevent safety breaks and operating troubles. In addition, cryptographic protection guarantees the privacy, honesty and genuineness of data that spread across Industrial CPS systems. By utilizing innovative encryption and authentication devices, cryptographic solutions defense complex data from capture or damage preserving consistency and confidentiality of dangerous industrial procedures. The combination of these safety actions creates a strong defence device, boosting the flexibility of Industrial CPS besides developing cyber threats and protecting the reliability of vital industrial processes. This article presents a Deep Secure: An Integrated Approach to Intrusion Detection and Cryptographic Protection in Industrial CPS environment. The proposed model aims to integrate intrusion detection and cryptographic-based secure communication protocol for industrial CPS environments. The Deep Secure model comprises two major phases: intrusion detection and secure communication. Primarily, the intrusion detection process comprises a self-attention-based bidirectional long short-term memory (SA-BiLSTM) technique. Besides, the deer hunting optimization algorithm (DHOA) achieve hyperparameter tuning of the SA-BiLSTM technique. Moreover, a secure communication protocol is designed by the use of the ElGamal cryptosystem. The experimental result of the Deep Secure method was tested in terms of dissimilar measures. A comprehensive result analysis highlighted the advanced performance of the Deep Secure method when associated to other current approaches.

Read More

Doi: https://doi.org/10.54216/JISIoT.150204

Vol. 15 Issue. 2 PP. 41-54, (2025)

Explainable AI-Driven Gait Analysis Using Wearable Internet of Things (Wiot) and Human Activity Recognition

Ponugoti Kalpana , Sarangam Kodati , L. Smitha , Dhasaratham , Nara Sreekanth , Aseel Smerat , Muhannad Akram Ahmad

Due to the rapid expansion of the Internet of Things (IoT), supportive systems for healthcare have made significant advancements in both diagnosis and treatment processes. To provide optimal support in clinical settings and daily activities, these systems must accurately detect human movements. Real-time gait analysis plays a crucial role in developing advanced supportive systems. While machine learning and deep learning algorithms have significantly improved gait detection accuracy, many existing models primarily focus on enhancing detection accuracy, often neglecting computational overhead, which can affect real-time applicability. This paper proposes a novel hybrid combination of Sparse Gate Recurrent Units (SGRUs) and Devil Feared Feed Forward Networks (DFFFN) to effectively recognize human activities based on gait data. These data are gathered through Wearable Internet of Things (WIoT) devices. The SGRU and DFFFN networks extract spatio-temporal features for classification, enabling accurate gait recognition. Moreover, Explainable Artificial Intelligence (EAI) assesses the interoperability, scalability, and reliability of the proposed hybrid deep learning framework. Extensive experiments were conducted on real-time datasets and benchmark datasets, including WHU-Gait and OU-ISIR, to validate the algorithm’s efficacy against existing hybrid methods. SHAP models were also employed to evaluate feature importance and predict the degree of interoperability and robustness. The experimental results show that the method, combining Sparse GRUs and Tasmanian Devil Optimization (TDO)-inspired classifiers, achieves superior accuracy and computational efficiency compared to existing models. Tested on real-time and benchmark datasets, the model demonstrates significant potential for real-time healthcare applications, with an AUC of 0.988 on real-time data. These findings suggest that the approach offers practical benefits for improving gait recognition in clinical settings.

Read More

Doi: https://doi.org/10.54216/JISIoT.150205

Vol. 15 Issue. 2 PP. 55-75, (2025)