Filter options

Publication Date
From
to
Subjects
Journals
Article Types
Countries / Territories
Open Access January 10, 2025

Artificial Immune Systems: A Bio-Inspired Paradigm for Computational Intelligence

Abstract Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and immune memory. These systems have demonstrated significant potential in addressing complex challenges across optimization, anomaly detection, and adaptive system control. This paper provides a [...] Read more.
Artificial Immune Systems (AIS) are bio-inspired computational frameworks that emulate the adaptive mechanisms of the human immune system, such as self/non-self discrimination, clonal selection, and immune memory. These systems have demonstrated significant potential in addressing complex challenges across optimization, anomaly detection, and adaptive system control. This paper provides a comprehensive exploration of AIS applications in domains such as cybersecurity, resource allocation, and autonomous systems, highlighting the growing importance of hybrid AIS models. Recent advancements, including integrations with machine learning, quantum computing, and bioinformatics, are discussed as solutions to scalability, high-dimensional data processing, and efficiency challenges. Core algorithms, such as the Negative Selection Algorithm (NSA) and Clonal Selection Algorithm (CSA), are examined, along with limitations in interpretability and compatibility with emerging AI paradigms. The paper concludes by proposing future research directions, emphasizing scalable hybrid frameworks, quantum-inspired approaches, and real-time adaptive systems, underscoring AIS's transformative potential across diverse computational fields.
Figures
PreviousNext
Article
Open Access October 29, 2022

Neural Networks for Enhancing Rail Safety and Security: Real-Time Monitoring and Incident Prediction

Abstract The growth in demand for rail transportation systems within cities, together with high-speed and long-distance transportation running on a rail network, raises the issues of both rail safety and security. If an accident or an attack occurs, its consequences can be extremely severe. To mitigate the impact of these events, the real-time monitoring of a rail system is required. In that case, the [...] Read more.
The growth in demand for rail transportation systems within cities, together with high-speed and long-distance transportation running on a rail network, raises the issues of both rail safety and security. If an accident or an attack occurs, its consequences can be extremely severe. To mitigate the impact of these events, the real-time monitoring of a rail system is required. In that case, the improvements in monitoring can be achieved using artificial intelligence algorithms such as neural networks. Neural networks have been used to achieve real-time incident identification in monitoring the track quality in terms of classifying the graphical outputs of an ultrasonic system working with the rails and track bed, to predict incidents on the rail infrastructure due to transmission channels becoming blocked, and also to attempt scheduling preemptive and preventative maintenance. In terms of forecasting incidents and accidents on board the trains, neural networks have been used to model passenger behavior and optimize responses during a train station evacuation. In tackling the incidents and accidents occurring on rail transport, we contribute with two methodologies to detect anomalies in real-time and identify the level of security risk: at the maintenance level with personnel operating along the railways, and onboard passenger trains. These methodologies were evaluated on real-world datasets and shown to be able to achieve a high accuracy in the results. The results generated from these case studies also reveal the potential for network-wide applications, which could enhance security and safety on railway networks by offering the possibility of better managing network disruptions and more rapidly identifying security issues. The speed and coverage of the information generated through the implementation of these methodologies have implications in utilizing prediction for decision support and enhancing safety and security on board the rail network.
Figures
PreviousNext
Review Article
Open Access December 29, 2020

A Deep Learning Architectures for Enhancing Cyber Security Protocols in Big Data Integrated ERP Systems

Abstract Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectures of variational autoencoder, sparse autoencoder, and deep belief network for detecting anomalies, fraud, and preventing cybersecurity attacks. These cybersecurity issues occur in finance, human [...] Read more.
Deep learning approaches are very useful to enhance cybersecurity protocols for industry-integrated big data enterprise resource planning systems. This research study develops deep learning architectures of variational autoencoder, sparse autoencoder, and deep belief network for detecting anomalies, fraud, and preventing cybersecurity attacks. These cybersecurity issues occur in finance, human resources, supply chain, and marketing in the big data integrated ERP systems or cloud-based ERP systems. The main objectives of this creative research work are to identify the vulnerabilities in various ERP systems, databases, and the interconnected domains; to introduce a conceptual cybersecurity network model that incorporates variational autoencoders, sparse autoencoders, and deep belief networks; to evaluate the performance of the proposed cybersecurity model by employing the appropriate parameters with real-time and synthetic databases and simulated scenarios; and to validate the model performance by comparing it with traditional algorithms. A big data platform with an integrated business management system is known as an integrated ERP system, which plays an instrumental role in conducting business for various organizations in society. In recent times, as uncertainty and disparity increase, the cyber ecosystem becomes more complex, volatile, dynamic, and unpredictable. In particular, the number of cyber-attacks is increasing at an alarming rate; the resultant security breaches have a disruptive and disturbing effect on businesses around the world, with a loss of billions of dollars. To combat these threats, it is essential to develop a conceptual cybersecurity network model to secure systems by functioning as a mutually supporting and strengthening network model rather than working in isolation. In this dynamic and fluid environment, introducing a deep learning approach helps to support and prevent fraud and other illicit activities related to human resources and the supply chain, among others. Some cybersecurity vulnerabilities include, for example, database vulnerabilities, service level vulnerabilities, and system vulnerabilities, among others. The proposed methodology focuses only on database vulnerabilities, with the main aim of detecting and mitigating new potential vulnerabilities in other dependent domains as a future initiative.
Figures
PreviousNext
Review Article
Open Access December 27, 2021

Digital Signal Processing Challenges in Financial Messaging Systems: Case Studies in High-Volume SWIFT Flows

Abstract Digital signal processing played a central role in two practical studies addressing challenging problems related to high-volume SWIFT financial messaging flows conveyed by the interconnected banking network. Technical methods and results are summarized here for each study, with the links to fundamental concepts underlying the work shown in parentheses. The first addresses real-time fraud [...] Read more.
Digital signal processing played a central role in two practical studies addressing challenging problems related to high-volume SWIFT financial messaging flows conveyed by the interconnected banking network. Technical methods and results are summarized here for each study, with the links to fundamental concepts underlying the work shown in parentheses. The first addresses real-time fraud detection, integrating pattern recognition and anomaly scoring procedures into a latency conscious processing system. The second focuses on minimizing delay without degrading detection accuracy, balancing speed and fidelity in filter design and control. Together, they demonstrate the potential for applying a DSP perspective to broad classes of problems encountered in processing financial messaging data. The first study extends work on a signal representation of financial messaging data streams and the associated noise characteristics by developing a vocabulary that translates real-world fraud patterns into DSP operations. Examination of the resulting choice of signal features, combined with considerations of detection speed, form the basis for details about implementing the pattern-recognition and anomaly-scoring tasks within a streaming-processing architecture.
Figures
PreviousNext
Review Article

Query parameters

Keyword:  Anomaly Detection

View options

Citations of

Views of

Downloads of