Tag: applied artificial intelligence

Best practices in applied artificial intelligence, 2023 – Research and Analysis of IT Specifications of Good Practices in the Area of Artificial Intelligence

Best practices in applied artificial intelligence, 2023 – Research and Analysis of IT Specifications of Good Practices in the Area of Artificial Intelligence

This article is a contribution within the Erasmus+ project titled “The Future Lies in Applied Artificial Intelligence” (FAAI) and examines research of collected IT specifications of good practices in Area of Artificial Intelligence (AAI). The article describes research conducted, the purpose of which is to find IT specifications of good practices in AI and describe their characteristics, like an area of implementation of the AI solution, the result of processing the data, the source of data, Data processing, and quality, what tools are used for processing data, and others. AAI application cases and the technologies used for implementation are reviewed. The specifics of the data and the applications used are described. The examination of these technologies will provide insight into which ones are favored and provide an overview of what is commonly referred to as “best practices” in this particular domain.

Trenchev, Ivan,Dimitrov, Willian,Dimitrov, Georgi,Ostrovska, Tanya,Trencheva, Miglena, Mathematical Approaches Transform Cybersecurity from Protoscience to Science, 2023, Applied Sciences (Switzerland)Open Access, Volume 13, Issue 11, June 2023 Article number 6508; Publisher – MDPI; ISSN – 20763417; DOI – 10.3390/app13116508;

Trenchev, Ivan,Dimitrov, Willian,Dimitrov, Georgi,Ostrovska, Tanya,Trencheva, Miglena, Mathematical Approaches Transform Cybersecurity from Protoscience to Science, 2023, Applied Sciences (Switzerland)Open Access, Volume 13, Issue 11, June 2023 Article number 6508; Publisher – MDPI; ISSN – 20763417; DOI – 10.3390/app13116508;

The area of cybersecurity problems has reached the stage of becoming a science. This raises questions about the connection between the mathematical theories used in cybersecurity research and their relation to the methodology for experiments and conceptual models synthesized from the academic community. This research proposes an analytical review of the mathematical ideas used in applied cyber-security and theoretical explorations. This meta viewpoint is dedicated to standard mathematical theories applied in cybersecurity issues. The ground of the work is methodological problems relating to the validation of experiments and models with mathematical ideas in the cybersecurity exploration of digital space. This research emphasizes the application of game theory, catastrophe theory, queuing systems, and Markov chains. The methods are shown without claiming to be exhaustive. The goal is to review the currently established implementation of mathematical approaches to cybersecurity. A spectrum of possibilities for applying mathematical apparatus in future research for cybersecurity is given. After a review of the literature for each presented mathematical approach, we expose a list of problematic areas in which this has already been implemented.