Babylonian Journal of Internet of Things
https://mesopotamian.press/journals/index.php/BJIoT
<p>The Babylonian Journal of Internet of Things focuses on advancing IoT technologies. It offers a platform for sharing cutting-edge research and applications in sensor networks, architectures, data analytics, security, and various IoT fields. Committed to fostering innovation, it pushes the boundaries of IoT research and practical implementations</p> <p> </p>Mesopotamian academic press en-USBabylonian Journal of Internet of Things3006-1083Analyzing and Comparing Global Sustainability Standards: LEED, BREEAM, and PBRS in Green Building arch article topic
https://mesopotamian.press/journals/index.php/BJIoT/article/view/447
<p>Since the year 2000, a heightened environmental awareness has led to the emergence of global trends in forefront countries, prompting the need for standardized practices in the environmental building industry. This paper explores various experiments on buildings, demonstrating trends through examinations and tests conducted by governmental or private organizations. Notable among these trends are the standards set by global evaluation systems such as BREEAM, LEED, PBRS, and SSBS. The paper highlights the recent adoptaion of Arab standards in Abu Dhabi, positioning the emirate as a pioneer in sustainable development. The research focuses on the city of Kirkuk, where building regulations lack consideration for environmental standards. The study aims to identify applicable international standards, emphasizing the importance of residential standards in comparison to other criteria. The World Green Building Council's universal standards for existing buildings are discussed, with the recognition that these standards may need customization to align with the local environment and architectural characteristics of Kirkuk. The paper delves into the methodology used, employing a theoretical framework, analytical methodology, and a deductive approach to formulate recommendations tailored to meet local standards. The Abu Dhabi experience with the Pearl Rating System is explored, outlining its three evaluation stages and the specific criteria for building assessment. A comparison between sustainability standards reveals disparities in evaluation criteria, emphasizing the challenge in establishing global standards. The study calls for a transparent and globally applicable evaluation basis, considering discrepancies among diverse countries and their respective tools. The paper concludes by underlining the importance of establishing local standards, serving as a benchmark for quality and operational efficiency within the real estate market. It also emphasizes the crucial role of existing residential buildings in proposed solutions for sustainable development, highlighting their significance in local markets.</p>Noah Mohammed Saleh Ali Mohammed Saleh, Raed A. Hasan Jafar KeighobadiOmer Khalil AhmedZeyad K. Hamad
Copyright (c) 2024 Noah Mohammed Saleh , Ali Mohammed Saleh, , Raed A. Hasan , Jafar Keighobadi, Omer Khalil Ahmed, Zeyad K. Hamad
https://creativecommons.org/licenses/by/4.0
2024-07-072024-07-072024707810.58496/BJIoT/2024/009System design and implementation of an IoT electronic pulse sphygmomanometer
https://mesopotamian.press/journals/index.php/BJIoT/article/view/233
<p>A sphygmomanometer is a standard testing tool for monitoring blood pressure and plays a vital role in modern medical diagnosis. Traditional smart electronic sphygmomanometers are complex and costly; this paper designs a low-cost electronic pulse sphygmomanometer through microcontroller control. This design collects the gas pressure information through the barometric pressure sensor and inputs it into the analog-to-digital converter. It converts the collected analog signal into a digital signal and then completes the determination of blood pressure and pulse through the recognition algorithm. Finally, this design is found to have the advantages oa f wide range of applicationslightweightht, low price, etc., and has important application value.</p>Yitong NiuHaiyang WangVugar Abdullayevdep-tIsraa Ibraheem Al_Barazanchi
Copyright (c) 2024 Yitong Niu, Haiyang Wang, Vugar Abdullayevdep-t, Israa Ibraheem Al_Barazanchi
https://creativecommons.org/licenses/by/4.0
2024-01-102024-01-1020241910.58496/BJIoT/2024/001Intelligent Watering by Using Solar Energy System
https://mesopotamian.press/journals/index.php/BJIoT/article/view/442
<p>In this study, Kirkuk and its surrounding areas are evaluated to determine whether solar energy can be utilized for irrigation. PV panels create their own power (300 W). A meter is used to measure the depth of a well (h) (60, 70, and 80 m). Graphics demonstrating the link between solar radiation, angle of solar radiation, and sun brightness in each month were generated using data from Iraq's Meteorological Organization and Seismology. Graphs depicted the volume flow rate at each depth. A study found that using PV panels to generate power increased volume flow rate, in addition to being more efficient throughout the day and in the summer (summer season). The depth of the well and the rate of flow are inversely proportional to one another. Because the flow rate of the system is suitable for most crops grown in the agricultural area of the city, solar energy generated by a photovoltaic (PV) panel may be used for irrigation in Kirkuk.</p>Yaareb E. Ahmed
Copyright (c) 2024 Yaareb E. Ahmed
https://creativecommons.org/licenses/by/4.0
2024-07-022024-07-022024535910.58496/BJIoT/2024/007Empowering Aquarists a Comprehensive Study On IOT-Enabled Smart Aquarium Systems For Remote Monitoring And Control
https://mesopotamian.press/journals/index.php/BJIoT/article/view/422
<p>owadays, a lot of people keep fish as pets at home and the aquarium keeper has been feeding the fish in the tanks, therefore appropriate setup and upkeep are required. Taking care of the aquarium appears to be somewhat tough for aquarists. The fish's quality of life depends on the aquarium being kept up properly. Changes in water quality, fish feeding, temperature management, light control, and the challenge of physically inspecting aquarium conditions are these problems are experienced.. As such, it is important to monitor the physical characteristics regularly and to improve the quality of the water. It has water quality management, which levels the aquarium to the perfect conditions by keeping an eye on the physical variations in the tank. Thus, the system that this model suggests is capable of real-time operation and is fitted with sensors. It carries out turbidity system, water renewal, temperature monitoring, and pH level detection in water and all these things are carried out in the ESP32 controller which contains an inbuit WiFi module. For large-scale aquaculture, an embedded system with a wireless network technology and a water quality testing unit was proposed. The aquarium's state is tracked and sent to the user's mobile application via Thingspeak IoT platfrom.</p>M.Sahaya SheelaS.Ravi ChandS. GopalakrishnanShruti Bhargava choubeyM GopianandJ.Jasmine Hephzipah
Copyright (c) 2024 M.Sahaya Sheela, S.Ravi Chand, S. Gopalakrishnan, Shruti Bhargava choubey, M Gopianand, J.Jasmine Hephzipah
https://creativecommons.org/licenses/by/4.0
2024-06-112024-06-112024334310.58496/BJIoT/2024/005RNN-Based Framework for IoT Healthcare Security for Improving Anomaly Detection and System Integrity
https://mesopotamian.press/journals/index.php/BJIoT/article/view/555
<p style="text-align: justify;"><span lang="EN-IN" style="font-size: 10.0pt;">The rapid rise of the Internet of Things greatly benefited the healthcare sector by opening up new ways of monitoring patients and ingeniously collecting data on disease management. However, this increased connectivity and health system data interchange introduce many critical security vulnerabilities that are more likely to discredit highly sensitive patient information along with system integrity. The paper investigates only one critical IoT health care security issue, for which a new security framework based on RNNs was used to investigate enhancements in the threat detection and response. This approach modelled network traffic and device behavior sequentially for anomaly and potential breach detection using RNNs. Hence, we introduce the RNN-based model combined with an inclusive security architecture, including data encryption, mechanisms of authentication, and monitoring tools in real time. Experimental results prove that our RNN-based framework significantly improves malicious activity detection and reduces false positives compared to traditional security solutions. The proposed model would provide a strong, scalable, and adaptable security solution tailored to the IoT healthcare environment dynamics. These findings could indicate how RNNs can enhance security in IoTs and provide new ways in which better and more secure healthcare systems can be developed.</span></p>S. RajaprakashC. Bagath Basha M. Nithya K. Karthik Nitisha Aggarwal S. Kayathri
Copyright (c) 2024 S. Rajaprakash, C. Bagath Basha , M. Nithya , K. Karthik , Nitisha Aggarwal , S. Kayathri
https://creativecommons.org/licenses/by/4.0
2024-10-112024-10-11202410611410.58496/BJIoT/2024/013Role of Food and Drugs Authority Act, 1992 (PNDCL 305B) and Legislative Instrument (LI) in Regulating Artificial Intelligence Based Medical Devices, Apps, and Systems to Prevent Negligence
https://mesopotamian.press/journals/index.php/BJIoT/article/view/335
<p><strong>Objective:</strong> This analysis evaluates whether Ghana’s Food and Drugs Authority Act provides adequate statutory basis and policy tools for the medical regulatory authority to evaluate risks and oversee artificial intelligence (AI) based software devices, given complexities of AI technology.</p> <p><strong>Methods:</strong> Case examples of medical AI systems and international regulatory issues establish current challenges for regulators. Specific sections of the Act are analysed regarding definitions, requirements for safety and efficacy evidence, guidelines for changes to approved devices, and post-market powers.</p> <p><strong>Results and Conclusions:</strong> Current law does not provide explicit provisions to require transparency into AI systems’ decision-making or continuous monitoring of real-world performance. However added clauses on privacy and cybersecurity demonstrate a policy precedent for regulating complex technologies.</p> <p><strong>Recommendations</strong>: Updates should enable differentiated evaluation approach based on risk-tiers. Powers for inspecting algorithmic logic require expansion to address AI opacity. </p> <p><strong>Novelty and Significance</strong>: This represents the first analysis situating medical AI governance within Ghanaian statutes. Stress-testing decades old policy structures against emerging technology risks is both scientifically novel and significant for public health oversight.</p>George Benneh MensahMaad M. MijwilMostafa AbotalebAmr BadrIoannis AdamopoulosAbdullah S. ArafatMohammad Hameed
Copyright (c) 2024 George Benneh Mensah, Maad M. Mijwil, Mostafa Abotaleb, Amr Badr, Ioannis Adamopoulos, Abdullah S. Arafat, Mohammad Hameed
https://creativecommons.org/licenses/by/4.0
2024-03-272024-03-272024273210.58496/BJIoT/2024/004CNN- based intrusion detection software for network operating system environment
https://mesopotamian.press/journals/index.php/BJIoT/article/view/482
<p>Cybersecurity represents an important challenge specific to digital technology in the modern world, and is of vital importance for reducing or even preventing the impact of cybercrime. The Linux operating system is designed as open-source software that includes some features of software tools intended for network security and cybersecurity systems, such as intruder detection and penetration testing. With these tools in Linux, we need a special system to constantly detect intrusions into connected network devices. This research presents a method for detecting intrusion attacks based on analyzing the natural behavior of the system by building a special convolutional network to achieve this goal. The classification and detection results of the proposed convolutional neural network were compared with the regular machine learning method (SVM), with feature selection by correlation for both methods. Same datasets were used to train and test each of CNN and SVM. Some metrics were determined to evaluate the performance of classification and prediction models for a specific type of regular attacks, DoS and BOT attacks, where both SVM and CNN obtained an accuracy of 85.58% and 95.59%, respectively.</p>Sundos A. Hameed Alazawi Huda Abdulaali Abdulbaqi Ahmed Hussein Ali
Copyright (c) 2024 Sundos A. Hameed Alazawi , Huda Abdulaali Abdulbaqi
https://creativecommons.org/licenses/by/4.0
2024-08-022024-08-022024798610.58496/BJIoT/2024/010A Brief Review of Big Data in Healthcare: Challenges and Issues, Recent Developments, and Future Directions
https://mesopotamian.press/journals/index.php/BJIoT/article/view/296
<p>Big data is improving the healthcare industry and creating opportunities for improved patient care, personalized medicine, and advanced research. This brief review article aims to survey the challenges and issues connected with big data in healthcare, discuss recent developments in the field, and highlight future directions for helping big data to enhance healthcare outcomes by understanding these aspects, participants can make informed decisions and contribute to the advancement of big data analytics in healthcare.</p>Ahmed Adil NafeaRussel R Majeed Ashour Ali Ahmed Jumaah YasSaeed Amer Alameri Mohammed M AL-Ani
Copyright (c) 2024 Ahmed Adil Nafea, Russel R Majeed , Ashour Ali , Ahmed Jumaah Yas, Saeed Amer Alameri , Mohammed M AL-Ani
https://creativecommons.org/licenses/by/4.0
2024-02-262024-02-262024101510.58496/BJIoT/2024/002A Real-Time Intrusion Detection System for DoS/DDoS Attack Classification in IoT Networks Using KNN-Neural Network Hybrid Technique
https://mesopotamian.press/journals/index.php/BJIoT/article/view/446
<p>As more devices are connected to the Internet through the Internet of Things (IoT), there are huge security challenges. One of the major problems is Distributed Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks. These attacks floods networks with useless traffic, disrupting IoT services. There is a need for better security measures to handle this. Intrusion Detection Systems (IDS) is used to find suspicious activities, but many of them can't keep up with new types of attacks in real time. This study focuses on creating an efficient real time hybrid framework that uses the Kth Nearest Neighbor (KNN) algorithm and dense neural networks. This proposed framework aims to identify and categorize DoS/DDoS attacks in real time through the utilization of a simulation model and MQTT-IoT-IDS2020 dataset and compared with existing frameworks, our proposed framework excels in accuracy, precision, and recall.</p>Aisha Ibrahim Gide Abubakar Aminu Mu’azu
Copyright (c) 2024 Aisha Ibrahim Gide , Abubakar Aminu Mu’azu
https://creativecommons.org/licenses/by/4.0
2024-07-052024-07-052024606910.58496/BJIoT/2024/008System Development and Assessment For Road Vehicles Speed Detection Using GSM
https://mesopotamian.press/journals/index.php/BJIoT/article/view/428
<p>In metro cities, cars are not allowed to exceed the displayed speed limit. However, many drivers still choose to speed, which is a major contributing factor to accidents. To address this issue, an easy-to-use road speed check system has been implemented to automatically detect traffic crashes in smart cities. This system uses a photovoltaic (PV) input power supply source, which captures the light emitted by the sun on solar panels and converts it into energy. In addition, the system utilizes an IR sensor to measure the speed of vehicles by detecting their distance and time. The infrared sensor detects a car in front of it, allowing for the calculation of time. A proximity sensor is also used to detect the speed of vehicles, regardless of their material configuration. The ESP8266 interface camera is used to capture live images in traffic, which are then transmitted to a specific IP address. Furthermore, the GSM Communication Device allows for the transmission of vehicle speed information through digital cellular communications, such as GSM (Global System for Mobile Communications). The output of this system accurately reflects real-world traffic data and has been tested through a comparison examination of individual speed measurements</p>M.Sahaya SheelaS. GopalakrishnanVenkata Anjani Kumar GI.Parvin BegumM. GopianandJ. Jasmine Hephzipah
Copyright (c) 2024 M.Sahaya Sheela, S. Gopalakrishnan, Venkata Anjani Kumar G, I.Parvin Begum, M. Gopianand, J. Jasmine Hephzipah
https://creativecommons.org/licenses/by/4.0
2024-06-152024-06-152024445210.58496/BJIoT/2024/006Monitoring Pollution in Smart Cities Based on Arduino and IoT
https://mesopotamian.press/journals/index.php/BJIoT/article/view/574
<p style="text-align: justify;"><span lang="EN-IN" style="font-size: 10.0pt;">This study offerings an innovative solution for checking pollution in smart cities using the Internet of Things (IoT) and Arduino-based sensors. As urban areas face increasing air pollution levels, the need for effective monitoring systems becomes necessary. This paper focuses on creating a scalable, secure IoT architecture to collect, analyze, and manage air quality data in real-time. The system utilizes MQTT for secure data transmission, and machine learning algorithms for predictive analysis. A model is developed using Arduino sensors to measure carbon dioxide, butane gas, temperature, and humidity. The outcomes indicate the system’s ability to effectively monitor pollution, notify users through mobile applications, and provide actionable insights for pollution management. Future work will improve the system’s abilities, including expanded scalability and additional environmental parameters.</span></p>Sura Ali HobiDavood Akbari Bangar
Copyright (c) 2024 Sura Ali Hobi, Davood Akbari Bangar
https://creativecommons.org/licenses/by/4.0
2024-10-202024-10-20202411512510.58496/BJIoT/2024/014Real time Cloud based fishes health monitoring using IoT.
https://mesopotamian.press/journals/index.php/BJIoT/article/view/364
<p>This work is based on a prototype model for the Fishery Management System with the help of Internet of Things i.e., IOT.</p> <p>The proposed system works on IOT & provides real-time monitoring of the fishery system. With the help of various hardware & software devices like Sensors & the Arduino Cloud, data from the fishery system can be collected and analysed using the Cloud which also helps in maintenance of the fishes from time to time. This also helps in creating awareness about the fish whenever necessary.</p> <p>Along with IOT, Water Level Sensor, Temperature Sensor & pH Sensor is also used to measure the water level, temperature level and get the pH values in the system. The system can be made automatic as well as configured according to the requirement for the survival of the fishes. The Node MCU ESP8266 helps in collecting the information through the sensors & display it in the Cloud which can be accessed from Smartphones, PCs, and Tablets etc.</p>Anirbit SenguptaSomnath Dasgupta
Copyright (c) 2024 Anirbit Sengupta, Somnath Dasgupta
https://creativecommons.org/licenses/by/4.0
2024-09-022024-09-022024879310.58496/BJIoT/2024/011Evaluating the Effectiveness of Machine Learning-Based Intrusion Detection in Multi-Cloud Environments
https://mesopotamian.press/journals/index.php/BJIoT/article/view/513
<p>In the dynamic landscape of cloud computing, multi-cloud environments have emerged as the prevalent ones due to offering a host of advantages including redundancy, flexibility, and increased security. These multi-cloud environments can, however, be vulnerable to stealthy cyber-attacks, thereby making it a challenging job to find efficient intrusion detection systems (IDS).</p> <p>The efficiency of the Machine Learning-based Intrusion Detection System in multi-cloud environments has been evaluated using a 1-D Convolutional Neural Network to classify network traffic based on the UNSW-NB15 dataset. The dataset included a wide variety of network features, and it was decided that it could be used directly after converting the categorical variables into their numerical forms and scaling them with MinMaxScaler.</p> <p>This was used for training and testing the 1D-CNN model, which had attained an accuracy of 84.02% during training and 82.79% on validation. Further, the performance of the model is elicited with metrics that include precision at 80.91%, recall at 82.79%, and an F1-score at 81.28%, showing its capability in identifying network intrusions effectively.</p> <p>The small difference between the accuracy of training and validation shows that overfitting was minimal; thus, the model will generalize well when applied to unseen data. This research underlines the possibility of using deep learning techniques, and particularly CNNs, for intrusion detection in complex multi-cloud infrastructures. Probably future work would be optimizing the model through hyperparameter tuning, using additional sources of data, and even exploring much more sophisticated architectures that will further improve the accuracy of intrusion detection.</p>Hussein Jawad Kadhim AL Masoodi
Copyright (c) 2024 Hussein Jawad Kadhim AL Masoodi
https://creativecommons.org/licenses/by/4.0
2024-09-152024-09-1520249410510.58496/BJIoT/2024/012Impact of IoT-Based Environmental Monitoring on Lab Safety and Sustainability
https://mesopotamian.press/journals/index.php/BJIoT/article/view/301
<p>Several internal and external dangers might threaten a laboratory, the institution, and the public if not addressed properly. These hazards are addressed by our extensive laboratory monitoring system. This device detects elevated temperatures, gas leaks, fires, and solution pH. Elements of this system include an Esp32 microcontroller, LCD, Arduino Uno, mq2 gas sensor, DS18B20 temperature sensor, flame sensor, relay, water pump, and pH sensor for acidity measurement. The Arduino IDE controls sensors. Once the temperature reaches 50 degrees Celsius, an alarm, red LED, and mobile phone notification activate. Gas leaks activate a green LED, an alarm, and a message. Flame sensors notify and start water pumps when fires occur. Gas leaks and fires activate a buzzer. The IoT offers essential incident reporting and remote laboratory monitoring. The code is written in Arduino C++.</p>Nadia Mahmoud Hussein Yasmin Makki MohialdenSaba Abdulbaqi Salman
Copyright (c) 2024 Nadia Mahmoud Hussein , Yasmin Makki Mohialden, Saba Abdulbaqi Salman
https://creativecommons.org/licenses/by/4.0
2024-03-012024-03-012024162610.58496/BJIoT/2024/003