The Iot-Machine Learning Security Algorithm for Detecting the Intruders Gaining an Unauthorised

Article ID

X0UU1

The Iot-Machine Learning Security Algorithm for Detecting the Intruders Gaining an Unauthorised

J.K Adedeji
J.K Adedeji Adekunle Ajasin University
E.A Adenagbe
E.A Adenagbe
DOI

Abstract

The essentiality in the protection of the government restricted areas using the technology of IOT (Internet of Things) has been observed in this research, with the sole aim of providing certain measures to curbing the activities of the terrorists creating dirty scenario within the environment. The neural network employed four input neurons which are the Sensors used as IP address, while the government authorized areas are the clients who receive messages from the IP neurons, there are two separate hidden layers of orders seven each as the processors preceding the output which is the threshold value that has been determined through the sigmoid activation function. The research adopted the deep learning machine language and internet base IP with python socket command lines to address the problem of detecting unauthorized access in the government restricted areas. The unsupervised neural network algorithm used is of configuration 5-7-7-4, which was coded in python functional programming language and trained with the back propagation algorithm with 300 epoch runs to ensure that errors are maintained at about 5% confidence level through the sigmoid activation function. The research concluded that IOT technology if properly annexed is faster and better than conventional security method of narrower view, coverage and limitation to capture intruders invading government protected areas.

The Iot-Machine Learning Security Algorithm for Detecting the Intruders Gaining an Unauthorised

The essentiality in the protection of the government restricted areas using the technology of IOT (Internet of Things) has been observed in this research, with the sole aim of providing certain measures to curbing the activities of the terrorists creating dirty scenario within the environment. The neural network employed four input neurons which are the Sensors used as IP address, while the government authorized areas are the clients who receive messages from the IP neurons, there are two separate hidden layers of orders seven each as the processors preceding the output which is the threshold value that has been determined through the sigmoid activation function. The research adopted the deep learning machine language and internet base IP with python socket command lines to address the problem of detecting unauthorized access in the government restricted areas. The unsupervised neural network algorithm used is of configuration 5-7-7-4, which was coded in python functional programming language and trained with the back propagation algorithm with 300 epoch runs to ensure that errors are maintained at about 5% confidence level through the sigmoid activation function. The research concluded that IOT technology if properly annexed is faster and better than conventional security method of narrower view, coverage and limitation to capture intruders invading government protected areas.

J.K Adedeji
J.K Adedeji Adekunle Ajasin University
E.A Adenagbe
E.A Adenagbe

No Figures found in article.

J.K Adedeji. 2018. “. Global Journal of Research in Engineering – F: Electrical & Electronic GJRE-F Volume 18 (GJRE Volume 18 Issue F4): .

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjre

Print ISSN 0975-5861

e-ISSN 2249-4596

Classification
GJRE-F Classification: FOR Code: 090699
Keywords
Article Matrices
Total Views: 2883
Total Downloads: 1343
2026 Trends
Research Identity (RIN)
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

The Iot-Machine Learning Security Algorithm for Detecting the Intruders Gaining an Unauthorised

J.K Adedeji
J.K Adedeji Adekunle Ajasin University
E.A Adenagbe
E.A Adenagbe

Research Journals