Software Ageing Prevention from Software Maintenance Perspective–A Review

ZH Abdullah, JH Yahaya, Z Mansor… - Journal of …, 2017 - jtec.utem.edu.my
This paper presents the background study of software ageing phenomenon and the
prevention techniques to contravene the ageing. The accumulation of software failure and …

[PDF][PDF] Analysis of Current Trends in Software Aging: A Literature Survey

T Rahman, J Nwokeji… - Computer and Information …, 2022 - scholar.archive.org
Software aging and architecture degradation are important areas in software quality
assurance. Existing research in these areas has developed mitigation strategies for software …

[PDF][PDF] Monitoring and enhancement of mobile system performance

KS Noori, AA Fahad - Iraqi Journal of Science, 2020 - iasj.net
Android operating system, since its first start, is growing very fast and takes a large space in
smart devices market. It is built and developed on Linux and designed basically for touch …

Malware detection in IoTs using deep sparse auto encoders with signal processing techniques

ANA Abdulmajeed - 2022 - openaccess.altinbas.edu.tr
Nowadays, the internet and information systems are everywhere and have become an
integral part of human life. Governments, armies, and organizations of all kinds are now …

A new framework for defect detection using hybird machine learning techniques

FS Mansour, AA Ibrahim - 2022 International Symposium on …, 2022 - ieeexplore.ieee.org
In this study, some logs obtained with the Firewall Device are classified using multiclass
support vector machine (SVM) classifier optimized by grid search algorithm. The presented …

Analysing the information technology and security risks of Epic: the difference in the risk perception of Epic between the literature and practice

ML Go - 2023 - essay.utwente.nl
Electronic Health Records systems are one of the most vital systems in hospitals, containing
all the medical records of its patients. The information technology and security risks of such a …

GAN-ASD: Precise software aging state detection for Android system based on BEGAN model and state clustering

Z Hao, J Liu - 2020 20th IEEE/ACM International Symposium on …, 2020 - ieeexplore.ieee.org
Software applications may become no response or stop running due to performance
degradation, system crashes, or program cumulative failures, after long-term execution in …

New smart grid framework based optimized AI method: Case study attack detection

AYK Khudhair - 2022 - openaccess.altinbas.edu.tr
A smart grid is an electrical network based on digital technology that is used to deliver
electricity to consumers through two-way digital communications. The system provides …

An efficient recognition framework using deep convolutional neural network

LAA Alkhattab - 2022 - openaccess.altinbas.edu.tr
Facial recognition is a method of classifying or positive a person's individuality exploitation
their face. Facial recognition techniques can be applied to detect individuals in photos …

A new AI method for effective medical data security application

DAH Al-Jasim - 2022 - openaccess.altinbas.edu.tr
Security is the precautions to be taken for attacks and threats against everything that people,
institutions, states have material and spiritual. Cyber security is the whole of the strategies …