International Journal of Mechatronics, Robotics, and Artificial Intelligence
Login
IJMRAI
  • Home
  • Articles & Issues
    • Latest Issue
    • All Issues
  • Authors
    • Submit Manuscript
    • Guide for Authors
    • Authorship
    • Article Processing Charges (APC)
    • Proofreading Service
  • Reviewers
    • Guide for Reviewers
    • Become a Reviewer
  • About
    • About Journal
    • Aims and Scope
    • Editorial Team
    • Journal Insights
    • Peer Review Process
    • Publication Ethics
    • Plagiarism
    • Allegations of Misconduct
    • Appeals and Complaints
    • Corrections and Withdrawals
    • Open Access
    • Archiving Policy
    • Abstracting and indexing
    • Announcements
    • Contact

Search Results for Sherwan Abdullah

Article
A Hybrid Intrusion Detection Framework for CyberPhysical Security in Smart Home/Smart City IoT Systems

Mustafa Aljumaily , Sherwan Abdullah, Ahmed Abd Alhasan

Pages: 63-73

PDF Full Text
Abstract

The rapid expansion of smart home and smart city technologies has introduced a complex array of interconnected Internet of Things (IoT) devices, exposing both cyber and physical infrastructures to a growing spectrum of security threats. Traditional cybersecurity models are insufficient to address the dynamic and distributed nature of modern cyber-physical environments, particularly in emerging economies where standardized security frameworks are often lacking. This research proposes a unified, hybrid cyber-physical security framework tailored for smart home and smart city IoT systems. Leveraging publicly available datasets such as UNSW-NB15, TON_IoT, and CICIDS2019, we simulate various attack vectors and evaluate a multi-layered intrusion detection system (IDS) that combines both signature-based and anomaly-based machine learning models. The proposed framework is validated using simulated network topologies built with NS-3 and Cooja, focusing on performance metrics including detection accuracy, false-positive rate, and computational overhead. Results demonstrate that our hybrid approach achieves over 95% accuracy in detecting complex multi-stage attacks, while maintaining scalability and adaptability across different IoT environments. The findings contribute to the development of more secure, resilient, and context-aware smart infrastructure systems offering a practical foundation for real-world deployment in smart cities and connected home ecosystems, especially within developing regions such as Iraq.

Article
An AI-Driven Framework for Adaptive eSystems in Harsh Environments: A Case Study from Oilfield IoT Applications

Mustafa Aljumaily , Sherwan Abdullah

Pages: 1-7

PDF Full Text
Abstract

Harsh industrial environments such as oilfields present unique challenges to electronic systems, including extreme temperatures, limited connectivity, power constraints, and operational unpredictability. Traditional Internet of Things (IoT) deployments often fail to adapt in real-time, exposing systems to risks such as data loss, late anomaly detection, or critical failure. This paper proposes a lightweight, Artificial Intelligence (AI)-driven eSystem architecture tailored for such conditions, integrating edge intelligence, secure communication, and self-adaptive mechanisms. We demonstrate the framework's viability through simulating a case study of real-time sensor data from pipeline infrastructure, applying a Long Short-Term Memory (LSTM)-based anomaly detection model deployed at the edge. Results show significant improvements in detection latency, bandwidth efficiency, and system resilience. The framework offers a modular blueprint for deploying AI-enhanced eSystems across energy, mining, and remote critical infrastructure domains.

Article
Deep Learning for Enhanced Anomaly Detection in Wireless Communication Networks using Channel State Information (CSI)

Mustafa Aljumaily , Sherwan Abdullah

Pages: 104-113

PDF Full Text
Abstract

This research introduces a deep learning-based framework for anomaly detection in wireless communication networks using Channel State Information (CSI)—a fine-grained physical-layer signal that captures wireless channel dynamics. Traditional detection methods often fall short in identifying subtle or evolving threats, whereas CSI provides a rich, underutilized source for context-aware monitoring. Inspired by its use in human activity recognition, we apply and compare deep learning architectures such as Convolutional Neural Networks (CNNs), Long Short-Term Memory (LSTMs), and Transformers to learn normal network behavior and detect anomalies, including spoofing, jamming, rogue access points, environmental disruptions, and Quality of Service (QoS) degradation. The system supports supervised, semi-supervised, and unsupervised settings, accommodating scenarios with limited labeled data. CSI data is collected using tools like the Intel 5300 NIC and Nexmon CSI under both controlled and realistic conditions. We benchmark our models against traditional techniques (e.g., Isolation Forests, Support Vector Machines (SVMs), Principal Component Analysis (PCA)), evaluating accuracy, false positives, latency, and robustness. To enhance transparency, we employ interpretability methods such as Gradient-weighted Class Activation Mapping (Grad-CAM) and t-distributed Stochastic Neighbor Embedding (t-SNE). Experimental results show that deep learning models outperform classical baselines by up to 30% in detection accuracy. The Transformer architecture achieved 96.2% accuracy with a false positive rate of 3.9%, while the CNN-LSTM hybrid achieved the best latency–performance tradeoff (5.1ms inference). Compared to Isolation Forest and One-Class SVM, our framework reduced false positives by over 10–14%.

1 - 3 of 3 items

Search Parameters

Journal Logo
International Journal of Mechatronics, Robotics, and Artificial Intelligence

College of Engineering | University of Basrah

  • Copyright Policy
  • Terms & Conditions
  • Privacy Policy
  • Accessibility
  • Cookie Settings
Licensing & Open Access

CC BY 4.0 Logo Licensed under CC-BY-4.0

This journal provides immediate open access to its content.

Editorial Manager Logo Elsevier Logo

Peer-review powered by Elsevier’s Editorial Manager®

Copyright © 2025 College of Engineering | University of Basrah. All rights reserved, including those for text and data mining, AI training, and similar technologies.