Papers by Masoud Mohammadian
IOS Press , Ohmsha eBooks, 1999
IGI Global eBooks, 2004
Chapter XIII. Using Dynamically Acquired Background Knowledge for Information Extraction and Inte... more Chapter XIII. Using Dynamically Acquired Background Knowledge for Information Extraction and Intelligent Search ..
Social Science Research Network, 2022
International Conference on Information Technology, Dec 10, 2020

Journal of Telecommunication, Electronic and Computer Engineering, Nov 30, 2017
Demand for Information Technology industry is increasing worldwide. The expansion of digital comm... more Demand for Information Technology industry is increasing worldwide. The expansion of digital communication has seen a large growth in the use of IT and increased capacity for data collection, storage and processing for internal and external use in business and industry. IT demands at the university sector have been increasing rapidly with the introduction of new teaching and learning methods requiring anywhere anytime teaching and learning. Data centres have emerged as an approach that enables accesses to shared computing resources. However, the increasing trends of resource usage and cost of maintaining a large number of servers and electrical consumption within data centres are of a growing concern. There are several challenges and opportunities within a data centre realm to lower the resource usage and cost of data centres to improve the cost and energy efficiency. At the beginning of 2008, the University of Canberra (UC) completed a major re-organisation involving the centralisation of all IT departments. This case study looks at how virtualisation helped rationalise that dispersed environment and how virtualisation has continued to enable dramatic affects at UC. Topics covered include; how virtualisation has affected the physical Data Centre, how the management of the IT systems has changed and what benefits and challenges were realised.

International journal of information technology, Jun 1, 2017
Data security and privacy plays a key role in carrying out day to day and long term business oper... more Data security and privacy plays a key role in carrying out day to day and long term business operations successfully. Organizations need to protect their data in the areas of data security and privacy. Therefore data security and privacy is a significant activity for large organizations. One novel method used to achieve data security is to use fuzzy logic based data classification to determine the required data security levels based on various government and business policies. Classifying data provides organizations the facilities to categorise organisational data based on organisational policies. Organisational data needs to be evaluated. Fuzzy logic based categorisation is explored in this paper. The method employed is based on Mohammadian et al. (Int J Electron Financ 3(4):374–386, 2009). This paper considers the application of a hierarchical fuzzy logic (HFL) classification method for categorizing organisational data based on governmental and business data policies. This paper demonstrates the use of a HFL to improve data classification. HFL reduces the size of the required fuzzy knowledge base system of the HFL data classification. This paper demonstrates how a HFL system can be employed to improve data security, privacy and user access control to determine data and user access control based on data sensitivity government and organizational data security requirements and user level security measures.

Springer eBooks, 2012
ABSTRACT When presented with an attack graph, network administrator may raise question on how to ... more ABSTRACT When presented with an attack graph, network administrator may raise question on how to harden the network. To defend his network, network administrator should be supplied with list of all attack paths that can compromise the network. With this list, he can decide which paths are worth paying attention to and defending against. In the event of limited resources, network administrator may only be interested in certain critical paths which cause worst network attack. Attack graph alone is not always helpful on its own and needs additional work for this purpose. In this paper we present the use of a Fuzzy Cognitive Map which is converted from attack graph with genetic algorithm to find attack scenarios causing worst impact on network security. The identified scenarios can then help network administrator to mitigate risks associated with the attack scenarios and improve his network security.
IOS Press , Ohmsha eBooks, 1999
International Conference on Modelling, Identification and Control, 1998
IGI Global eBooks, Jan 2, 2013
Utilization and application of the latest technologies can save lives and improve patient treatme... more Utilization and application of the latest technologies can save lives and improve patient treatments and well-being. For this it is important to have accurate, near real-time data acquisition and evaluation. The delivery of patient's medical data needs to be as fast and as secure as possible. Accurate almost real-time data acquisition and analysis of patient data and the ability to update such a data is a way to reduce cost and improve patient care. One possible solution to achieve this task is to use a wireless framework based on Radio Frequency Identification (RFID). This framework can integrate wireless networks for fast data acquisition and transmission, while maintaining the privacy issue. This chapter discusses the development of an intelligent multi-agent system in a framework in which RFID can be used
BCS Learning & Development, Feb 18, 2015

To introduce the multi-agent systems (MaS) as a new technology in software engineering and making... more To introduce the multi-agent systems (MaS) as a new technology in software engineering and making it acceptable by the industries requires adequate clarification to show the advantages and the improvements of this technology over the existing ones. A substantial survey in the field of multi-agent systems research literature reveals that the majority of the system developers have not accurately identified the purpose behind applying the multi-agent system from the human computer interaction (HCI) perspective, as a user's cooperative system. The aim of this paper is to illustrate how the MaS concept is centred on establishing a user collaborative system and explain why this concept is essential to the modern software engineering strategies. The research also identifies the multi-agent systems problem domains and its emphasis on the existing Web services user coordination problem. It then proposes high level semantic web architecture. The research concludes by a listing of the advantages of applying multi-agent systems, from the usability and quality perspectives.

Springer eBooks, 2013
Proper data protection facilities and services are very important in organizations. Data security... more Proper data protection facilities and services are very important in organizations. Data security and privacy issues needs to be considered and applied in organizations to provide a successful business operation. Large organizations have adapted the implementation and application of policies related to data security and privacy as one of their core and important activities. Data classification process allows financial organizations to organize their data according to their needs. However data classification is a laborious activity with significant data to evaluate and categorize. Data classification process is needed for organizations to identify and apply appropriate policy and security settings such as private access control and encryption requirements. In this paper a fuzzy logic based classification is used to classify data and suggests a method that can determine requirements for data security and privacy in organizations based on organizational needs and government policies imposed on data. A new method for data access authorization is also developed based on fuzzy logic, which will assist in preserving privacy and security of data. A Case study is considered to present the effectiveness of the proposed methods.
Lecture Notes in Computer Science, 2005
ABSTRACT Electricity load forecasting has been the subject of research over the past several year... more ABSTRACT Electricity load forecasting has been the subject of research over the past several years by researchers and practitioners in academia and industry. This is due to its very important role for effective and economic operation of power stations. In this paper an intelligent hierarchical fuzzy logic system using genetic algorithms for the prediction and modelling of electricity consumption is developed. A hierarchical fuzzy logic system is developed to model and predict daily electricity load fluctuations. The system is further trained to model and predict electricity consumption for daily peak.

Data security and privacy are very important issues in the success of a business operation. Imple... more Data security and privacy are very important issues in the success of a business operation. Implementing and applying policies related to data security and privacy therefore has become one of the core and important activities for large organizations. Data classification process allows companies to organize their data according to their needs. This process can be laborious in large organizations with significant content to evaluate and categorize. Using a data classification process organizations can identify and apply appropriate setting and polices such as private access control and encryption requirements only to the relevant data thereby saving time and processing power. This paper explores the use of fuzzy logic in classification of data and suggests a method that can determine requirements for data security and privacy in an organization based on organizations needs and government policies imposed on data. A Case study is considered to present the effectiveness of the proposed method.
The paper discusses the development of an intelligent fuzzy logic system using genetic algorithms... more The paper discusses the development of an intelligent fuzzy logic system using genetic algorithms for the prediction of fluctuations in interest rates. The proposed system uses a set of fuzzy rules to determine quarterly interest rates. The set of rules is unknown so a knowledge base must be created from the available data. A hierarchical fuzzy logic system consisting of

Journal of Interdisciplinary Mathematics, Feb 17, 2020
Cancer is the principle wellspring of death around the globe with 2.09 million cases so far in 20... more Cancer is the principle wellspring of death around the globe with 2.09 million cases so far in 2018 [1]. Around 627000 deaths accounting to 6.6% are caused because of female breast cancer and it ranks five amongst the list of top causes for deaths, the prime reason being prognosis being favorable in developed countries. The timely empathy of breast cancer further makes the process of prognosis better hence improving the rates of survival, because this will indorse on time treatment which is given clinically to patients. When the classification is done in an accurate way for malignant and benign tumours, it stops the suffering of patients with excessive ailments. The best possible recognizable proof of breast cancer disease and the process of characterizing into benign and malignant groups is that the main concern of a ton of investigation and research. When thrown light on its particular advantages in significant
Uploads
Papers by Masoud Mohammadian