International Journal of Computer Science & Network Security
International Journal of Computer Science & Network Security (IJCSNS)
- Monthly
- /
- 1738-7906(pISSN)
Volume 24 Issue 1
-
Krupskyi Yaroslav;Tiytiynnyk Oksana;Kosovets Olena;Soia Olena 1
In contemporary education, the rapid advancement of digital technologies elevates demands for integrating the latest tools into the learning process. Mathematical analysis, as a discipline, benefits from computer mathematics in distance education, enhancing practical aspects and enabling individualized learning. This article addresses the integration of the Maple computer mathematics system into higher education, specifically in teaching "Mathematical Analysis." Emphasizing its role in distance learning, computer mathematics optimizes the educational environment, reducing the time required for knowledge acquisition. The article showcases the application of Maple in finding extremum points and introduces an educational software simulator, enabling students to practice the method. The simulator, developed within Maple, facilitates self-checking and enhances the study of functions. Conclusions drawn from the study highlight the positive impact of these tools on distance education, affirming Maple's role in enhancing professional training and information culture among higher education students. -
AI or Artificial Intelligence has been a significant tool used in the organisational backgrounds for an effective improvement in the management methods. The processing of the information and the analysis of the data for the further achievement of heightened efficiency can be performed by AI through its data analytics measures. In the medical field, AI has been integrated for an improvement within the management of the medical services and to note a rise in the levels of customer satisfaction. With the benefits of reasoning and problem solving, AI has been able to initiate a range of benefits for both the consumers and the medical personnel. The main benefits which have been noted in the integration of AI would be integrated into the study. The issues which are noted with the integrated AI usage for the medical sector would also be identified in the study. Medical Image Processing has been seen to integrate 3D image datasets with the medical industry, in terms of Computed Tomography (CT) or Magnetic Resonance Imaging (MRI). The usage of such medical devices have occurred in the diagnosis of the patients, the development of guidance towards medical intervention and an overall increase in the medical efficiency. The study would focus on such different tools, adhered with AI for increased medical improvement.
-
The objective of this work is to design a low cost yet fully functional 4-DOF articulate manipulator for educational applications. The design is based on general purpose, programmable smart servo motors namely the Dynamixel Ax-12. The mechanism for motion was developed by formulating the equations of kinematics and subsequent solutions for joint space variables. The trajectory of end-effector in joint variable space was determined by interpolation of a 3rd order polynomial. The solutions were verified through computer simulations and ultimately implemented on the hardware. Owing to the feedback from the built-in sensors, it is possible to correct the positioning error due to loading effects. The proposed solution offers an efficient and cost-effective platform to study the trajectory planning as well as dynamics of the manipulator.
-
This study tries clarify the process of making decisions with geographic information systems and how to choose the best place for Khartoum State displaced people to relocate to in order to be closer to cheaper places with access to commodities and services. For network analysis, use a unique model. The network analysis tool was dependent on the following information: availability of goods and services, cheap cost, and proximity to the state of Khartoum.in choosing the best state. The study came to the conclusion that, in terms of accessibility, affordability, and availability of products and services, Gezira State is the best state for people who have been displaced from Khartoum State.When developing a new model, we recommend that all GIS users apply the theories of spatial analysis.
-
Nawaf A. AlZahrani;Mohammad Hamza Awedh;Ali M. Rushdi 31
People have been using more energy in the last years. Several research studies were conducted to develop sustainable energy sources that can produce clean energy to fulfill our energy requirements. Using renewable energy sources helps to decrease the harm to the environment caused by conventional power plants. Choosing the right location and capacity for DG-RESs can greatly impact the performance of Radial Distribution Systems. It is beneficial to have a good and stable electrical power supply with low energy waste and high effectiveness because it improves the performance and reliability of the system. This research investigates the ideal location and size for solar and wind power systems, which are popular methods for producing clean electricity. A new artificial intelligent algorithm called Nutcracker Optimization Algorithm (NOA) is used to find the best solution in two common electrical systems named IEEE 33 and 69 bus systems to examine the improvement in the efficiency & reliability of power system network by reducing power losses, making voltage deviation smaller, and improving voltage stability. Finally, the NOA method is compared with another method called PSO and developed Hybrid Algorithm (NOA+PSO) to validate the proposed algorithm effectiveness and enhancement of both efficiency and reliability aspects. -
The subject of navigation has drawn a large interest in the last few years. The navigation within a city is to find the path between two points, source location and destination location. In many cities, solving the routing problem is very essential as to find the route between different locations (starting location (source) and an ending location (destination)) in a fast and efficient way. This paper considers streets with diagonal streets. Such streets pose a problem in determining the directions of the route to be followed. The paper presents a solution for the path planning using the reconfigurable mesh (R-Mesh). R-Mesh is a parallel platform that has very fast solutions to many problems and can be deployed in moving vehicles and moving robots. This paper presents a solution that is very fast in computing the routes.
-
APT (Advanced Persistent Threat) attack is a dangerous, targeted attack form with clear targets. APT attack campaigns have huge consequences. Therefore, the problem of researching and developing the APT attack detection solution is very urgent and necessary nowadays. On the other hand, no matter how advanced the APT attack, it has clear processes and lifecycles. Taking advantage of this point, security experts recommend that could develop APT attack detection solutions for each of their life cycles and processes. In APT attacks, hackers often use phishing techniques to perform attacks and steal data. If this attack and phishing phase is detected, the entire APT attack campaign will be crash. Therefore, it is necessary to research and deploy technology and solutions that could detect early the APT attack when it is in the stages of attacking and stealing data. This paper proposes an APT attack detection framework based on the Network traffic analysis technique using open-source tools and deep learning models. This research focuses on analyzing Network traffic into different components, then finds ways to extract abnormal behaviors on those components, and finally uses deep learning algorithms to classify Network traffic based on the extracted abnormal behaviors. The abnormal behavior analysis process is presented in detail in section III.A of the paper. The APT attack detection method based on Network traffic is presented in section III.B of this paper. Finally, the experimental process of the proposal is performed in section IV of the paper.
-
Mohammed Al-Shalabi;Waleed K. Abdulraheem;Jafar Ababneh;Nader Abdel Karim 61
Cloud Computing is internet-based computing, where the users are provided with whatever service they need from the resources, software, and information. Recently, the security of cloud computing is considered as one of the major issues for both cloud service providers CSP and end-users. Privacy and highly confidential data make many users refuse to store their data within cloud computing, since data on cloud computing is not dully secured. The cryptographic algorithm is a technique which is used to maintain the security and privacy of the data on the cloud. In this research, we applied eight different cryptographic algorithms on Xen and KVM as hypervisors on cloud computing, to be able to measure and compare the performance of the two hypervisors. Response time and CPU utilization while encryption and decryption have been our aspects to measure the performance. In terms of response time and CPU utilization, results show that KVM is more efficient than Xen on average at 11.5% and 11% respectively. While TripleDES cryptographic algorithm shows a more efficient time response at Xen hypervisor than KVM. -
This paper presents a critical analysis of the current application of big data in higher education and how Learning Analytics (LA), and Educational Data Mining (EDM) are helping to shape learning in higher education institutions that have applied the concepts successfully. An extensive literature review of Learning Analytics, Educational Data Mining, Learning Management Systems, Informal Learning and Online Social Networks are presented to understand their usage and trends in higher education pedagogy taking advantage of 21st century educational technologies and platforms. The roles of and benefits of these technologies in teaching and learning are critically examined. Imperatively, this study provides vital information for education stakeholders on the significance of establishing a teaching and learning agenda that takes advantage of today's educational relevant technologies to promote teaching and learning while also acknowledging the difficulties of 21st-century learning. Aside from the roles and benefits of these technologies, the review highlights major challenges and research needs apparent in the use and application of these technologies. It appears that there is lack of research understanding in the challenges and utilization of data effectively for learning analytics, despite the massive educational data generated by high institutions. Also due to the growing importance of LA, there appears to be a serious lack of academic research that explore the application and impact of LA in high institution, especially in the context of informal online social network learning. In addition, high institution managers seem not to understand the emerging trends of LA which could be useful in the running of higher education. Though LA is viewed as a complex and expensive technology that will culturally change the future of high institution, the question that comes to mind is whether the use of LA in relation to informal learning in online social network is really what is expected? A study to analyze and evaluate the elements that influence high usage of OSN is also needed in the African context. It is high time African Universities paid attention to the application and use of these technologies to create a simplified learning approach occasioned by the use of these technologies.
-
In this paper, we present the very first time the generalized notion of (α, β, γ, δ) - convex (concave) function in mixed kind, which is the generalization of (α, β) - convex (concave) functions in 1st and 2nd kind, (s, r) - convex (concave) functions in mixed kind, s - convex (concave) functions in 1st and 2nd kind, p - convex (concave) functions, quasi convex(concave) functions and the class of convex (concave) functions. We would like to state the well-known Ostrowski inequality via SVN-Riemann Integrals for (α, β, γ, δ) - convex (concave) function in mixed kind. Moreover we establish some SVN-Ostrowski type inequalities for the class of functions whose derivatives in absolute values at certain powers are (α, β, γ, δ)-convex (concave) functions in mixed kind by using different techniques including Hölder's inequality and power mean inequality. Also, various established results would be captured as special cases with respect to convexity of function.
-
Alla Kapiton;Nataliia Kononets;Valeriy Zhamardiy;Lesya Petrenko;Nadiya Kravtsova;Tetiana Blahova 95
The article is devoted to the design and development of an information system for preserving the results of testing to verify the residual knowledge of students of the resource for training specialists in information and communication technologies. The purpose of the study is to provide a scientific justification for the problem of developing professional training of specialists in information and communication technologies in the process of using an information system to save test results to verify students' residual knowledge and to verify the effectiveness of its implementation in universities. According to the results of the experiment, it can be argued that the introduction of an information system to preserve the results of testing to test students' residual knowledge in the educational process contributes to the professional training of specialists in information and communication technologies at the universities of Ukraine. The practice of development and use of modern information technologies focused on the implementation of psychological and pedagogical goals of teaching and education is fundamentally new mediated by modern technical and technological innovations. -
With the seamless growth of the technology, network usage requirements are expanding day by day. The majority of electronic devices are capable of communication, which strongly requires a secure and reliable network. Network-based intrusion detection systems (NIDS) is a new method for preventing and alerting computers and networks from attacks. Machine Learning is an emerging field that provides a variety of ways to implement effective network intrusion detection systems (NIDS). Bagging and Boosting are two ensemble ML techniques, renowned for better performance in the learning and classification process. In this paper, the study provides a detailed literature review of the past work done and proposed a novel ensemble approach to develop a NIDS system based on the voting method using bagging and boosting ensemble techniques. The test results demonstrate that the ensemble of bagging and boosting through voting exhibits the highest classification accuracy of 99.98% and a minimum false positive rate (FPR) on both datasets. Although the model building time is average which can be a tradeoff by processor speed.
-
Disease caused by the coronavirus (COVID-19) is sweeping the globe. There are numerous methods for identifying this disease using a chest imaging. Computerized Tomography (CT) chest scans are used in this study to detect COVID-19 disease using a pretrain Convolutional Neural Network (CNN) ResNet50. This model is based on image dataset taken from two hospitals and used to identify Covid-19 illnesses. The pre-train CNN (ResNet50) architecture was used for feature extraction, and then fully connected layers were used for classification, yielding 97%, 96%, 96%, 96% for accuracy, precision, recall, and F1-score, respectively. When combining the feature extraction techniques with the Back Propagation Neural Network (BPNN), it produced accuracy, precision, recall, and F1-scores of 92.5%, 83%, 92%, and 87.3%. In our suggested approach, we use a preprocessing phase to improve accuracy. The image was enhanced using the Contrast Limited Adaptive Histogram Equalization (CLAHE) algorithm, which was followed by cropping the image before feature extraction with ResNet50. Finally, a fully connected layer was added for classification, with results of 99.1%, 98.7%, 99%, 98.8% in terms of accuracy, precision, recall, and F1-score.
-
With the rapid evolution of the Internet, the application of artificial intelligence fields is more and more extensive, and the era of AI has come. At the same time, adversarial attacks in the AI field are also frequent. Therefore, the research into adversarial attack security is extremely urgent. An increasing number of researchers are working in this field. We provide a comprehensive review of the theories and methods that enable researchers to enter the field of adversarial attack. This article is according to the "Why? → What? → How?" research line for elaboration. Firstly, we explain the significance of adversarial attack. Then, we introduce the concepts, types, and hazards of adversarial attack. Finally, we review the typical attack algorithms and defense techniques in each application area. Facing the increasingly complex neural network model, this paper focuses on the fields of image, text, and malicious code and focuses on the adversarial attack classifications and methods of these three data types, so that researchers can quickly find their own type of study. At the end of this review, we also raised some discussions and open issues and compared them with other similar reviews.
-
Nadiia A. Bachynska;Oksana Z. Klymenko;Tetiana V. Novalska;Halyna V. Salata;Vladyslav V. Kasian;Maryna M. Tsilyna 133
The educational situation, which resulted from the announced self-isolation regime, intensified the forced decisions on the organization of the distance educational process. The study is topical because of the provision of distance learning based on the experience of Kyiv National University of Culture and Arts. The study was conducted in three stages. Systemic, socio-communicative, competence approaches, sociological methods (questionnaires and interviews) were chosen as methodological tools of the research. The results of a survey of teachers and entrants to higher education institutions on the topic "Using social networks and digital platforms for online classes under the conditions of quarantine restrictions" allowed to scientifically substantiate the need for deeper knowledge of such tools as Google Meet (79%), Zoom (13.78%) and Google Classroom (11.62%), which are preferred by entrants. Almost a third of entrants (34.26%) noted the lack of scientific and methodological support for learning the subjects. The study showed high efficiency of messengers in distance education. The study found that in the process of organizing communication in the student-teacher system, it is necessary to take into account the priority of Telegram on the basis of which it is necessary to implement a chatbot for convenient and effective exchange of information about the educational process. Further research should focus on the effectiveness of the use of Telegram. The effectiveness of using chatbots should also be considered. Chatbots can be used to automate routine components of the learning process. -
A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in CloudDatabase-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.
-
This project is designed with the aim to facilitate the farmer or gardener to engage in green house systems and to improve agricultural technology. In order to reduce continuous monitoring of the soil parameters, excess time consumption for the farmers and excessive usage of water, "Smart irrigation and temperature control for a greenhouse system" has been developed. There are two different ways to irrigate the land namely traditional irrigation methods and modern irrigation methods.
-
Humanity has gone since a long time through several pandemics; we cite H1N1 in 2009 and also Spanish flu in 1917. In December 2019, the health authorities of China detected unexplained cases of pneumonia. The WHO (World Health Organization) has declared the apparition of Covid-19 (novel Coronavirus). In data analysis, multiple approaches and diverse techniques were used to extract useful information from multiple heterogeneous sources and to discover knowledge and new information for decision-making. In this paper, we propose a multidimensional model for analyzing the Coronavirus Covid-19 data (spread and vaccination in European countries).
-
Abdelwahed Motwakel;Adnan Shaout;Anwer Mustafa Hilal;Manar Ahmed Hamza 163
The fingerprint image quality relies on the clearness of separated ridges by valleys and the uniformity of the separation. The condition of skin still dominate the overall quality of the fingerprint. However, the identification performance of such system is very sensitive to the quality of the captured fingerprint image. Fingerprint image quality analysis and enhancement are useful in improving the performance of fingerprint identification systems. A fuzzy technique is introduced in this paper for both fingerprint image quality analysis and enhancement. First, the quality analysis is performed by extracting four features from a fingerprint image which are the local clarity score (LCS), global clarity score (GCS), ridge_valley thickness ratio (RVTR), and the Global Contrast Factor (GCF). A fuzzy logic technique that uses Mamdani fuzzy rule model is designed. The fuzzy inference system is able to analyse and determinate the fingerprint image type (oily, dry or neutral) based on the extracted feature values and the fuzzy inference rules. The percentages of the test fuzzy inference system for each type is as follow: For dry fingerprint the percentage is 81.33, for oily the percentage is 54.75, and for neutral the percentage is 68.48. Secondly, a fuzzy morphology is applied to enhance the dry and oily fingerprint images. The fuzzy morphology method improves the quality of a fingerprint image, thus improving the performance of the fingerprint identification system significantly. All experimental work which was done for both quality analysis and image enhancement was done using the DB_ITS_2009 database which is a private database collected by the department of electrical engineering, institute of technology Sepuluh Nopember Surabaya, Indonesia. The performance evaluation was done using the Feature Similarity index (FSIM). Where the FSIM is an image quality assessment (IQA) metric, which uses computational models to measure the image quality consistently with subjective evaluations. The new proposed system outperformed the classical system by 900% for the dry fingerprint images and 14% for the oily fingerprint images. -
Tetiana Kulinich;Yuliia Lisnievska;Yuliia Zimbalevska;Tetiana Trubnik;Svitlana Obikhod 178
While in high-income countries the development of digital technology began in the 1970s, in low- and middle-income countries it began in the 1990s and even after 2005, due to the political regime that constrained economic development and innovation. At the same time, there are no studies of the relationship between technological development and structural changes through innovation in low- and middle-income countries. The article aims to quantify the relationship of the introduction of digital technologies on innovation, structural transformation of low- and middle-income economies. The industrial-agrarian economy of Uzbekistan with an authoritarian regime is in a state of transition to a market economy, while in Ukraine, there are active processes of Europeanization and integration into the EU. Ukraine's economy is commodity-based (the export of raw materials of industries and the agricultural sector in developed countries predominates) and industrial-agrarian. Digital technologies and the service sector are little developed in Uzbekistan. On the other hand, Ukraine has a more developed ICT sector. Uzbekistan is gradually undergoing an innovative and structural transformation of the economy: the productivity of the agricultural, industrial, and service sectors is growing, but the ICT sector is virtually undeveloped. In comparison, in Ukraine, there are no significant structural transformations due to a significant drop in productivity of the industrial sector, with stable growth of productivity of the agricultural sector due to technology and a slight increase in productivity of the service sector. It is revealed that Ukraine and Uzbekistan have undergone structural transformations of the economy in favor of the service sector, while the agricultural and industrial sectors produce less and less. If Uzbekistan remains the industrial-agrarian country with an aggregate share of the added value of these sectors 59% in 2019, Ukraine transits to the post-industrial type of economy where the added value of the service sector in GDP grows (55% compared to agrarian and industrial sectors at 42%). -
This is an extended paper explaining the role of E-learning and quality development in the current situation. Amid Covid:19, E-Learning has achieved a new miles stone in imparting education and all levels of institutions have transformed their learning platform from face to face to virtual learning. In this scenario E-Learning is facing two major challenges, first to ensure the ability of computer systems or software to exchange and make use of information on virtual platform (interoperability) and secondly, developing quality learning through e-Learning. To impart learning and teaching (L&T) through E-learning, Middle East University (MEU) has adopted Learning Management Services (LMS) through Blackboard. The university has three types of L&T methods; full online, Blended and Supportive. This research studies the concept, scope and dimensions of interoperability (InT) of E-Learning in MEU then the connection and interdependence between with quality development. In this paper we have described the support and the importance of finest standards and specifications for the objectives of InT of E-Learning and quality development in MEU. The research is based principally on secondary data observed from MEU E-Learning deanship. Also sample of 20 E-Learning experts at MEU were given closed ended as well as semi closed questionnaires for evaluating the assurance of InT of E-Learning and quality development. These experts are mainly certified online facilitators and admin staff. Results provide the verification of application and presence of InT of E-Learning and assured the quality development process in MEU.
-
Prakash Kuppuswamy;Saeed QY Al Khalidi;Nithya Rekha Sivakumar 196
The security of data and information using encryption algorithms is becoming increasingly important in today's world of digital data transmission over unsecured wired and wireless communication channels. Hybrid encryption techniques combine both symmetric and asymmetric encryption methods and provide more security than public or private key encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The proposed hybrid algorithm is a combination of the well-known RSA algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy. -
Artificial Intelligence (AI) technology has evolved rapidly in recent years and is used in everything from banking to email management to surgery, but without the help of the visible, most of the fun features of the Internet include visual impairment. It benefits people with disabilities. The main purpose of this study is to find ways to help people with visual impairments using AI technology. A visually impaired request is made for the visually impaired. For example, when a message arrives that the program will notify you by voice (reads the sender's name, read the message, and replies to it if necessary), this is a special program installed on your mobile phone. This program uses a customized algorithm developed in Python to convert written text to voice, read text, and convert voice to written text on a message when a visually impaired person wants to respond. Then it sends the response in the form of a text message. Therefore, the research should lead to programs for people with visual impairments. This program makes mobile phones easier and more comfortable to use and makes the daily life easier for visual impairments.
-
This is an extended research paper focusing on the applications of Machine Learing and Artificial Intelligence in virtual learning environment. The world is moving at a fast pace having the application of Machine Learning (ML) and Artificial Intelligence (AI) in all the major disciplines and the educational sector is also not untouched by its impact especially in an online learning environment. This paper attempts to elaborate on the benefits of ML and AI in E-Learning (EL) in general and explain how King Khalid University (KKU) EL Deanship is making the best of ML and AI in its practices. Also, researchers have focused on the future of ML and AI in any academic program. This research is descriptive in nature; results are based on qualitative analysis done through tools and techniques of EL applied in KKU as an example but the same modus operandi can be implemented by any institution in its EL platform. KKU is using Learning Management Services (LMS) for providing online learning practices and Blackboard (BB) for sharing online learning resources, therefore these tools are considered by the researchers for explaining the results of ML and AI.
-
Salma Maataoui;Ghita Bencheikh;Ghizlane Bencheikh 215
Predictive maintenance has been considered fundamental in the industrial applications in the last few years. It contributes to improve reliability, availability, and maintainability of the systems and to avoid breakdowns. These breakdowns could potentially lead to system shutdowns and to decrease the production efficiency of the manufacturing plants. The present article aims to study how predictive maintenance could be planed into the production scheduling, through a systematic review of literature. . The review includes the research articles published in international journals indexed in the Scopus database. 165 research articles were included in the search using #predictive maintenance# AND #production scheduling#. Press articles, conference and non-English papers are not considered in this study. After careful evaluation of each study for its purpose and scope, 50 research articles are selected for this review by following the 2020 Preferred Reporting Items for Systematic Review and Meta-Analysis Protocols (PRISMA) statement. A benchmarking of predictive maintenance methods was used to understand the parameters that contributed to improve the production scheduling. The results of the comparative analysis highlight that artificial intelligence is a promising tool to anticipate breakdowns. An additional impression of this study is that each equipment has its own parameters that have to be collected, monitored and analyzed. -
The frequent handover problem and playing ping-pong effects in 5G (5th Generation) ultra-dense networking cannot be effectively resolved by the conventional handover decision methods, which rely on the handover thresholds and measurement reports. For instance, millimetre-wave LANs, broadband remote association techniques, and 5G/6G organizations are instances of group of people yet to come frameworks that request greater security, lower idleness, and dependable principles and correspondence limit. One of the critical parts of 5G and 6G innovation is believed to be successful blockage the board. With further developed help quality, it empowers administrator to run many systems administration recreations on a solitary association. To guarantee load adjusting, forestall network cut disappointment, and give substitute cuts in case of blockage or cut frustration, a modern pursuing choices framework to deal with showing up network information is require. Our goal is to balance the strain on BSs while optimizing the value of the information that is transferred from satellites to BSs. Nevertheless, due to their irregular flight characteristic, some satellites frequently cannot establish a connection with Base Stations (BSs), which further complicates the joint satellite-BS connection and channel allocation. SF redistribution techniques based on Deep Reinforcement Learning (DRL) have been devised, taking into account the randomness of the data received by the terminal. In order to predict the best capacity improvements in the wireless instruments of 5G and 6G IoT networks, a hybrid algorithm for deep learning is being used in this study. To control the level of congestion within a 5G/6G network, the suggested approach is put into effect to a training set. With 0.933 accuracy and 0.067 miss rate, the suggested method produced encouraging results.