• Aucun résultat trouvé

Innovative Applications of Artificial Intelligence Techniques in Software Engineering

N/A
N/A
Protected

Academic year: 2021

Partager "Innovative Applications of Artificial Intelligence Techniques in Software Engineering"

Copied!
2
0
0

Texte intégral

(1)

HAL Id: hal-01060644

https://hal.inria.fr/hal-01060644

Submitted on 17 Nov 2017

HAL is a multi-disciplinary open access archive for the deposit and dissemination of sci- entific research documents, whether they are pub- lished or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers.

L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.

Distributed under a Creative Commons Attribution| 4.0 International License

Innovative Applications of Artificial Intelligence Techniques in Software Engineering

Masoud Mohammadian

To cite this version:

Masoud Mohammadian. Innovative Applications of Artificial Intelligence Techniques in Software En-

gineering. 6th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and In-

novations (AIAI), Oct 2010, Larnaca, Cyprus. pp.3-3, �10.1007/978-3-642-16239-8_3�. �hal-01060644�

(2)

Innovative Applications of Artificial Intelligence Techniques in Software Engineering

Masoud Mohammadian

University of Canberra, ACT, Australia.

Masoud.mohammadian@canberra.edu.au

Abstract. Artificial Intelligence (AI) techniques have been successfully applied in many areas of software engineering. The complexity of soft- ware systems has limited the application of AI techniques in many real world applications. This talk provides an insight into applications of AI techniques in software engineering and how innovative application of AI can assist in achieving ever competitive and firm schedules for software development projects as well as Information Technology (IT) manage- ment. The pros and cons of using AI techniques are investigated and specifically the application of AI in IT management, software applica- tion development and software security is considered.

Organisations that build software applications do so in an environment characterised by limited resources, increased pressure to reduce cost and development schedules. Organisations demand to build software applica- tions adequately and quickly. One approach to achieve this is to use auto- mated software development tools from the very initial stage of software design up to the software testing and installation. Considering software testing as an example, automated software systems can assist in most software testing phases.

On the hand data security, availability, privacy and integrity are very im- portant issues in the success of a business operation. Data security and privacy policies in business are governed by business requirements and government regulations. AI can also assist in software security, privacy and reliability. Implementing data security using data encryption solu- tions remain at the forefront for data security. Many solutions to data encryption at this level are expensive, disruptive and resource intensive.

AI can be used for data classification in organizations. It can assist in identifying and encrypting only the relevant data thereby saving time and processing power. Without data classification organizations using encryption process would simply encrypt everything and consequently impact users more than necessary. Data classification is essential and can assist organizations with their data security, privacy and accessi- bility needs. This talk explores the use of AI techniques (such as fuzzy logic) for data classification and suggests a method that can determine requirements for classification of organizations’ data for security and pri- vacy based on organizational needs and government policies. Finally the application of FCM in IT management is discussed.

Références

Documents relatifs

Results obtained in the first phase will be used for modelling of the cutting temperature using the response surface methodology model (RSM model), feed forward artificial

While S-Paths was focused on sets of resources sharing the same type, the second research project of this PhD, explores a broader context, aiming to combine the concept of

Development of a Seamlessly Integrated Factory Planning Software Tool (Prototype) to Evaluate and Optimize Surface Mount Manufacturing Lines Page 166.. Chapter

When the initial data points are projected on the plane of the first two factorial axes computed by means of a discriminant analysis, the fuzzy k-nearest neighbours technique permits

Note that this scheme can be applied for both classification and unmixing, i.e., the input of the fusion function can be either the class of a pixel in the case of classification,

The graphic on figure 1 shows four spectra corresponding to two vegetation pixels (one in the shadow and the other in the sun light) and two atmospheric correction methods, the

Fuzzy Inference Systems (FISs) are fuzzy classifiers that can learn fuzzy “if-then” rules able to classify data [4].. They exhibit several interesting properties that may address

This study provides a comprehensive comparison of several competitive classification techniques for the P300 Speller: Pearson’s correlation method (PCM), Fisher’s Linear