Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Adversarial Machine Learning Challenges in Modern Network Security Systems

Lissett Margarita Arévalo Gamboa , Alberto León-Batallas , Jhonny Ortiz-Mata , Denis Mendoza-Cabrera

Hostile machine learning has network security issues that reduce prediction model accuracy. A full defence against these assaults entails establishing hostile scenarios, strengthening models via strategy training, and applying powerful defences. Small adjustments introduce antagonistic inputs into the research. These teach the model to recognize and withstand deception attempts. The proposed solution competed with Trust Shield, Secure Guard, Defend, and Adversary Block in rigorous performance testing. The recommended strategy has a 95.0% success rate for discovering assaults and a much lower 5.0% false positive rate. This is much superior to conventional approaches. Due to its modest accuracy loss and rapid response, it's effective at fighting assaults. This comprehensive overview demonstrates the wide-scale application of the strategy with minimal resources. Finally, this research emphasizes the need for robust and adaptable AI security. This will assist in creating secure and trustworthy AI solutions to protect sensitive data and ensure prediction model accuracy in an increasingly hostile future.

Read More

Doi: https://doi.org/10.54216/JCIM.150201

Vol. 15 Issue. 2 PP. 01-16, (2025)

Predictive-based Models for Efficient Energy Management in Smart Buildings

Osama Mohammed , Marwa Ibrahim , Abdalrahman Fatikhan Ataalla

The integration of sensing technologies with residential buildings raises the concept of a smart home, which has facilitated the life of the habitant nowadays. This technology helps us to track and understand the behavior of the client in the house to give him maximum comfort. A neighborhood area is an interconnected set of houses that exist in the same geographical region and share the same energy resources. The most important component in the process of decision-making is the energy usage in the smart building. The energy optimization problem in the smart building created a challenge for enterprises and the government for a long time. A lot of research were made to solve this energy optimization problem. One of these problems is the organization of energy usage within a neighborhood area network. The main challenges are to maintain the user comfort in each house and to not exceed the total energy offered to the network. For this, we proposed a technique that predicts, based on historical data of each house, its future behavior and created for each one a weekly schedule with hourly annotated field with: high, normal, or low, where each one represents the amount of energy user is able to use at this time. At the end, an incentive-based program is created to give the client an incentive on his bill if he used the daily high energy consumption in the annotated high in his schedule. To create the schedules, we extracted some features from the data, then we used the genetic algorithm to create schedules, then we did an improvement to the technique using dynamic programming that stores the features of a house with created schedule, later when we meet a similar house we can directly give a schedule that fits the need.

Read More

Doi: https://doi.org/10.54216/JCIM.150202

Vol. 15 Issue. 2 PP. 17-26, (2025)

Smart Energy Management in Green Cloud Computing using Machine Learning Algorithms

Assel Hashim Salman , Abdullahi Abdu Ibrahim

Cloud computing has many advantages as well as some disadvantages. An internet connection is required to use Cloud Computing. In other words, it is not possible to access the data in cases without internet. Cloud Computing can provide infrastructure services, platform services and software services to individuals with any device connected to the internet. If the connection speed is low when there is internet, the data transmission is also slower. In this context, it may not be practical for individuals or institutions to benefit from Cloud Computing in places where internet connection is low, limited, or absent. A new technology was obtained in this study; this method depends on deep learning and machine learning techniques applied to detect the attacks in the cloud computing-based systems. The suggested method compared with many traditional machine learning techniques.

Read More

Doi: https://doi.org/10.54216/JCIM.150203

Vol. 15 Issue. 2 PP. 27-34, (2025)

Dual Convolutional Neural Network for Skin Cancer Classification

Raya Sattar Shahadha , Belal Al-Khateeb

Skin cancer detection through deep learning is an evolving field, where convolutional neural networks (CNNs) have proven to be very effective in feature extraction. However, this approach still faces some limitations due to the use of data augmentation, It is the generation of artificial images. Which significantly increase the computational load without generate new clinically meaningful data and may introduce shadowed features. Therefore, this study aims to propose a new approach that use CNNs to extract important features from skin cancer medical images using the HAM 10000 dataset. The proposed approach involves training two different CNN architectures, extracting features from convolutional layers, and then use PCA to make the retrieved features less dimensional. In order to categorize skin cancer into seven different categories of skin lesions, the remaining features are then merged and fed into a classifier that uses neural networks. In comparison to earlier studies that employed CNN architectures on the same dataset, the results demonstrated that this method preserves significant information while improving computational efficiency and achieving superior classification performance. The suggested approach achieved 95.66% accuracy for multi-class classification.

Read More

Doi: https://doi.org/10.54216/JCIM.150204

Vol. 15 Issue. 2 PP. 35-42, (2025)

Quantum Machine Learning for Video Compression: An Optimal Video Frames Compression Model using Qutrits Quantum Genetic Algorithm for Video multicast over the Internet

Oday Ali Hassen , Huda Lafta Majeed , Mohammed Abdulhasan Hussein , Saad M. Darwish , Omar Al-Boridi

The transmission of video is greatly aided by video compression. Redundancy (spatial, temporal, statistical, and psycho-visual) within and between video frames is something that video compression approaches aim to get rid of. The degree to which similarity-based redundancy exists between consecutive frames, however, is a function of how often the frames are sampled and how the objects in the scene are moving. Existing neural network-based video compression approaches rely on a static codebook to perform compression, which prevents them from adapting to new video’s data. In order to create an optimal codebook for vector quantization, which is then employed as an activation function inside a neural network's hidden layer, this research offers a modified video compression method based on a Qutrits based Quantum Genetic Algorithm (QQGA). Using quantum parallelization and entanglement of the quantum state, QQGA is capable of solving the same set of problems as a traditional genetic algorithm while considerably accelerating the evolutionary process. The technique is built on the concept of utilizing Qutrits (three-level quantum system) to represent population individuals. The evolution operator, which is responsible for the updates to the quantum system state, has been constructed using a straightforward approach that does not need a lookup table. Compared to qubit, qudit provides a larger state space to store and process information, and thus can enhance the algorithm’s efficiency. To create the context-based initial codebook, the background subtraction algorithm is used to extract moving objects from frames. Moreover, important wavelet coefficients are compressed losslessly using Differential Pulse Code Modulation (DPCM), whereas low energy coefficients are compressed lossy using Learning Vector Quantization neural networks (LVQ). To obtain a high compression ratio, Run-Length Encoding is then used to encode the quantized coefficients. In comparison to the conventional evolutionary algorithm-based video compression method, experiments have shown that the quantum-inspired system may achieve a greater compression ratio with acceptable efficiency as evaluated by PSNR.

Read More

Doi: https://doi.org/10.54216/JCIM.150205

Vol. 15 Issue. 2 PP. 43-64, (2025)

Automated Agricultural Crop Type Mapping Using Fusion of Transfer Learning and Tasmanian devil Optimization Algorithm on Remote Sensing Imagery

Daniel Arockiam , Azween Abdullah , Valliappan Raju

At present, the application of remote sensing (RS) data achieved from satellite imagery or unmanned aerial vehicles (UAV) has become common for crop classification procedures, i.e. crop mapping, soil classification, or prediction of yield. The classification of food crop utilizing RS images (RSI) is one of the major applications of RS in farming. It contains the usage of aerial or satellite images for classifying and identifying dissimilar kinds of food crops developed in an exact region. This data is beneficial for estimation of yield, crop monitoring, and land management. Meeting the conditions for examining these data needs more refined techniques and artificial intelligence (AI) technologies, which deliver essential support. Recently, the usage of deep learning (DL) for crop type classification with RS images could help sustainable farming practices by providing appropriate and precise data on the kinds and features of crops. In this study, we offer an Automated Agricultural Crop Type Mapping Utilizing Fusion of Transfer Learning and Tasmanian Devil Optimization (AACTM-FTLTDO) algorithm on Remote Sensing Imagery. The primary goal of the AACTM-FTLTDO methodology is to accurately detect and classify crop types for more precise agricultural monitoring using remote sensing technologies. To accomplish that, the AACTM-FTLTDO model employs a fusion of transfer learning techniques involving three models such as SqueezeNet, CapsNet, and ShuffleNetV2 to capture diverse, multi-scale spatial and spectral features. For the crop type classification and detection process, the auto-encoder (AE) classifier can be employed. Eventually, the tasmanian devil optimization (TDO) technique was deployed to modify the hyperparameter of the AE technique for ensuring optimal model configurations and reducing computational complexity. A wide range of experimentation studies is made and the results are examined under numerous measures. The comparative study shows that the AACTM-FTLTDO technique performs better than existing approaches

Read More

Doi: https://doi.org/10.54216/JCIM.150206

Vol. 15 Issue. 2 PP. 65-77, (2025)