Filters








5,025 Hits in 8.0 sec

Using Machine Intelligence to Prioritise Code Review Requests

Nishrith Saini, Ricardo Britto
2021 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)  
This thesis aims to address and solve the above issues by developing a machine intelligence-based code review prioritization tool.  ...  The implementation and validation of Pineapple suggest the possible usefulness of the tool to help developers prioritise their code review requests.  ...  Pineapple is a machine intelligence-based code review prioritisation tool which is built using the concept of Bayesian Networks.  ... 
doi:10.1109/icse-seip52600.2021.00010 fatcat:kbm63jrakneobeinfkk2pfbdxu

An intelligent maintenance system for continuous cost-based prioritisation of maintenance activities

W.J. Moore, A.G. Starr
2006 Computers in industry (Print)  
CBC does not attempt to change the strategic plan for maintenance activities: it only addresses prioritisation.  ...  The decision-maker will take into account cost, criticality and other factors, such as limited resources, to prioritise the work.  ...  Acknowledgements The authors would like to thank PAS Grantham and its staff, in particular John Bowman, for their cooperation in the ongoing case study, and gratefully acknowledge the support of the Engineering  ... 
doi:10.1016/j.compind.2006.02.008 fatcat:jnehhilnijcahprz2odscpngfi

A static analysis approach for Android permission-based malware detection systems

Juliza Mohamad Arif, Mohd Faizal Ab Razak, Suryanti Awang, Sharfah Ratibah Tuan Mat, Nor Syahidatul Nadiah Ismail, Ahmad Firdaus, A. Pravin
2021 PLoS ONE  
This study proposes machine learning with different sets of classifiers was used to evaluate Android malware detection.  ...  Two techniques can be used in this regard: Static analysis, which meticulously examines the full codes of applications, and dynamic analysis, which monitors malware behaviour.  ...  Machine learning process Machine learning, known as artificial intelligence, is used to solve complex problems and reduce decision-making times for human beings.  ... 
doi:10.1371/journal.pone.0257968 pmid:34591930 pmcid:PMC8483345 fatcat:t5hlxq5kqvfatm5s6vkr2g3lgu

Intelligent agent based framework to augment warehouse management systems for dynamic demand environments

Tania Binos, Vince Bruno, Arthur Adamopoulos
2021 Australasian Journal of Information Systems  
This paper presents the design and development stage of a design science methodology of an intelligent agent framework for basic warehouse management systems.  ...  Standard operational process is paramount to warehouse operational control but may preclude a dynamic response to real-time operational constraints.  ...  Figure 8 Work Priorities Service Agent Multiple requests for priority reviews for the same product beyond a threshold (from machine learning) can signal a potential issue to a human operator and assist  ... 
doi:10.3127/ajis.v25i0.2845 fatcat:6uyr4vodgzbgzljoa6ndtlp2zq

Exploring the current practices, costs and benefits of FAIR Implementation in pharmaceutical Research and Development: A Qualitative Interview Study

Ebtisam Alharbi, Rigina Skeva, Nick Juty, Caroline Jay, Carole Goble
2021 Data Intelligence  
The findable, accessible, interoperable, reusable (FAIR) principles for scientific data management and stewardship aim to facilitate data reuse at scale by both humans and machines.  ...  How decisions were made about FAIRification was influenced by legal and ethical considerations, management commitment, and data prioritisation.  ...  ideas converted into relevant concepts-codes; (3) preliminary codes identified to contextualise the data; and (4) themes reviewed iteratively until each code was effectively represented by the extracts  ... 
doi:10.1162/dint_a_00109 fatcat:5enj5pqgdvab3bisw7f76vck54

CyberOps: Situational Awareness in Cybersecurity Operations

Cyril Onwubiko, Research Series Ltd
2020 International Journal on Cyber Situational Awareness  
Cybersecurity operations (CyberOps) is the use and application of cybersecurity capabilities to a domain, department, organisation or nation.  ...  It is fundamentally to protect digital investments, contribute to national economic wellbeing by providing a safe, secure and conducive environment to conduct business and to protect a nation's critical  ...  This is to ensure code and architecture are continually assured, and obsolete codes are removed, while new stacks are certified, reviewed and approved through automation and appropriate code review channels  ... 
doi:10.22619/ijcsa.2020.100134 fatcat:frbg2gx43zax7itvjp2vim7md4

Algorithmic Decision-making and the Law

Dirk Brand
2020 JeDEM - eJournal of eDemocracy & Open Government  
The public law concept of accountability should be contextualised in order to apply it to algorithmic decision-making.  ...  In the context of public law there are many questions and challenges relating to individual rights, for example the right to privacy, and the role and responsibilities of government relating to policy  ...  Due to the nature and complexity of most algorithms, in particular in the context of machine learning, it makes looking into that black box of computer code not very useful for citizens and consumers seeking  ... 
doi:10.29379/jedem.v12i1.576 fatcat:5vkdusggwnfshoyv6s5lgsqjba

THE INTELLIGENT PRODUCT IN MANUFACTURING CONTROL AND MANAGEMENT

Duncan McFarlane, Sanjay Sarma, Jin Lung Chirn, C Y Wong, Kevin Ashton
2002 IFAC Proceedings Volumes  
The Auto-ID project will enable unique information about a particular item to be stored, retrieved, communicated to others and even used in automated decision making relevant to that item.  ...  In this way we begin to build a specification for an intelligent product -one whose information content is permanently bound to its material content.  ...  Using the appropriate distributed control algorithms, the individual machine and product agents can make their own manufacturing control decisions relating to scheduling, resource allocation, prioritisation  ... 
doi:10.3182/20020721-6-es-1901.00011 fatcat:lqrgm6ezinggrivqcine3krtiq

Artificial intelligence and machine learning in dynamic cyber risk analytics at the edge

Petar Radanliev, David De Roure, Rob Walton, Max Van Kleek, Rafael Mantilla Montalvo, La'Treall Maddox, Omar Santos, Peter Burnap, Eirini Anthi
2020 SN Applied Sciences  
We explore the potential and practical challenges in the use of artificial intelligence (AI) in cyber risk analytics, for improving organisational resilience and understanding cyber risk.  ...  Through literature review, we identify wide ranging and creative methodologies for cyber analytics and explore the risks of deliberately influencing or disrupting behaviours to socio-technical systems.  ...  Taxonomy of focus areas for artificial intelligence for CPS risk analytics The Smart literature review framework based on latent Dirichlet allocation [36] was used to perform a taxonomic analysis.  ... 
doi:10.1007/s42452-020-03559-4 fatcat:utrws565jngpdozzw2ghbt3j6q

Qos-Based Web Service Discovery And Selection Using Machine Learning

Sarathkumar Rangarajan
2018 EAI Endorsed Transactions on Scalable Information Systems  
The core component is a machine learning based methodology to predict the QoS properties using source code metrics.  ...  The credibility value and previous usage count are used to determine the reputation of the service.  ...  Ontology based (OWL-S) Semantic web services cannot be discovered by using the proposed architecture.  ... 
doi:10.4108/eai.29-5-2018.154809 fatcat:bhcn7yjt5ze6zg3osd2f2lioau

Ethical principles in machine learning and artificial intelligence: cases from the field and possible ways forward

Samuele Lo Piano
2020 Humanities and Social Sciences Communications  
Decision-making on numerous aspects of our daily lives is being outsourced to machinelearning (ML) algorithms and artificial intelligence (AI), motivated by speed and efficiency in the decision process  ...  The implication is that ML code scripts are rarely scrutinised; interpretability is usually sacrificed in favour of usability and effectiveness.  ...  Thomas Hodgson, Jill Walter Rettberg, Elizabeth Chatterjee, Ragnar Fjelland and Marta Kuc-Czarnecka for their useful comments in this venue.  ... 
doi:10.1057/s41599-020-0501-9 fatcat:3pgqhpb4ezcqre6enedltgkfsa

A Threat Model for a Cloud Infrastructure with no Hypervisor

William A. R. de Souza, Allan Tomlinson
2014 International Journal of Intelligent Computing Research  
The NoHype architecture is a new approach to the security problems related to hypervisors and proposes simply to eliminate the hypervisor.  ...  However, as with any new approach to security, it can also introduce new threats.  ...  The methodology used to identify the new threats is that proposed in [16] [19] and consists of detailed analyses and review of the architecture.  ... 
doi:10.20533/ijicr.2042.4655.2014.0051 fatcat:ffcfb4avbbfznj4oujuy2xnqbe

Intelligence, policing and the use of algorithmic analysis: a freedom of information-based study

Marion Oswald, Jamie Grace
2016 Journal of Information Rights Policy and Practice  
the extent to which algorithmic analysis of intelligence is currently used in UK policing; ii) investigating the handling of intelligence by police forces; and iii) reviewing how the police in the UK  ...  To gain a better understanding of these issues, as they are currently developing, a freedom of information (FOI) request was sent in several parts to all police forces in the UK: i) seeking to establish  ...  A further theme was use as a tool in 53 For an excellent discussion of the challenges around drafting the request, see Ashley 'prioritising' work for the intelligence analysis team to carry out, mentioned  ... 
doi:10.21039/irpandp.v1i1.16 fatcat:pqfyqmvnk5gs5lhhq33d6by7c4

Using text mining for study identification in systematic reviews: a systematic review of current approaches

Alison O'Mara-Eves, James Thomas, John McNaught, Makoto Miwa, Sophia Ananiadou
2015 Systematic Reviews  
Conclusions: Using text mining to prioritise the order in which items are screened should be considered safe and ready for use in 'live' reviews.  ...  We answered these questions using standard systematic review methods: systematic and exhaustive searching, quality-assured data extraction and a narrative synthesis to synthesise findings.  ...  Some studies adopted more than one approach to workload reduction, so column total is greater than 44 studies. from; the machine subsequently generates a ranked list and requests the reviewer to provide  ... 
doi:10.1186/2046-4053-4-5 pmid:25588314 pmcid:PMC4320539 fatcat:u4ywvqkbazgqfk33ev4g7u2bti

Expedited digital appraisal for regular archivists: an MPLP-type approach

Susanne Belovari
2017 Journal of Archival Organization  
They use predictive coding (which is a way of automatically classifying documents based on statistical analysis and machine learning) to identify documents that are relevant to the reviewer.  ...  Predictive coding A way of automatically classifying documents based on statistical analysis and machine learning.  ... 
doi:10.1080/15332748.2018.1503014 fatcat:bojjfpyxv5ecvginnc2jx72tiy
« Previous Showing results 1 — 15 out of 5,025 results