68 research outputs found

    Combined scheduling of hard and soft real-time tasks in multiprocessor systems

    Get PDF
    Many complex real-time systems are composed of both hard and soft real-time tasks. Combined scheduling of hard and soft tasks in such systems should satisfy two important goals: (1) maximize the schedulability of soft real-time tasks with no or little impact on the schedulability of hard real-time tasks; (2) minimize the scheduling overhead. In this thesis, we develop two sets of algorithms for the problem, of which the first set allows sacrificing the schedulability of hard tasks and the second set does not. The first set of algorithms is based on a new concept, called task association , by which each soft task is associated with a hard task, whenever possible, in order to minimize the scheduling overhead. The second set has two algorithms, namely, background scheduling and emergency based scheduling. The background scheduling schedules soft tasks in the holes that are present in the schedule considering only the hard tasks. The emergency based scheduling always maintains two schedules (primary schedule and emergency schedule) and switches back and forth between them during the schedule construction process depending on the schedulability of a given hard task. To evaluate the schedulability of the proposed algorithms, extensive simulation studies were conducted and the results show that the proposed algorithms are superior to existing algorithms, in addition to some of them incurring lesser scheduling overhead

    Al-Faruqi's Reformist Vision in the Field of Thought and Education

    Get PDF
    DOI: 10.7176/RHSS/12-13-05 Publication date:July 31st 2022 Abstract Reform is the opposite of corruption, which indicates its honor and importance in human life; God, the Blessed and Exalted, commanded it in his dear book in many verses, including the Almighty’s saying: “And let there be [arising] from you a nation inviting to [all that is] good, enjoining what is right and forbidding what is wrong, and those will be the successful”[1], and His saying: “You are the best nation produced [as an example] for mankind. You enjoin what is right and forbid what is wrong and believe in Allāh. If only the People of the Scripture had believed, it would have been better for them. Among them are believers, but most of them are defiantly disobedient”[2], and the Noble Qur’an indicated that the reformer will be in salvation and security if punishment and fear befall the corrupters. He Almighty said: “So why were there not among the generations before you those of enduring discrimination forbidding corruption on earth - except a few of those We saved from among them? But those who wronged pursued what luxury they were given therein, and they were criminals, and your Lord would not have destroyed the cities unjustly while their people were reformers”.[3] He also praised righteousness and reformers in many verses; Because the virtue of their presence is complete and the change leads to the straightening of the situation. The Messengers of God Almighty, may blessings and peace be upon them, are at the forefront of reformers, for God Almighty has made them imams in prayer and reform. That is why we find Him, the Highest, praising them on many sites in which he mentions some of them as “of the righteous.” The mission of the messengers and prophets to inform, warn, and establish an argument against the people does not go beyond the task of reforming and changing what has befallen individuals and nations of corruption in perception and belief, and deviation in behavior, and in bad conditions, God Almighty said on the tongue of Shuaib, in the course of performing the duty of advising to remind his people: “He said, "O my people, have you considered: if I am upon clear evidence from my Lord and He has provided me with a good provision from Him...? And I do not intend to differ from you in that which I have forbidden you; I only intend reform as much as I am able. And my success is not but through Allāh. Upon Him I have relied, and to Him I return”.[4] And he, peace be upon him, emphasized the need for a Muslim to reform by saying: “By the One in Whose Hand is my soul, you will enjoin good and forbid evil, or God will soon send a punishment from Him upon you, then you will call upon Him and He will not respond to you.”[5] It is inferred from the sum of the verses and the noble Prophetic hadiths that the reform process is a legitimate necessity, and that it is the responsibility of all, it is a legitimate necessity to preserve religion, self, honor, mind and money, and a human need because human life is not compatible with corruption. Since the scholars are the heirs of the prophets, they are the first people to assume the task of reform. Therefore, none of the Islamic eras was without these reformed scholars. Since the fields of reform are numerous and different in different areas of life, there are many visions and methods of reform. There are those who turn to political reform on the grounds that the political authority is the one who has the will to bring about change in the desired direction. There are those who turn to economic reform on the grounds that it is the most common in societies and the greatest danger to people’s lives, and there are those who turn to educational reform on the grounds that a person is either a corrupter, as God Almighty said through the angels on the authority of Adam - peace be upon him: “And [mention, O Muhammad], when your Lord said to the angels, "Indeed, I will make upon the earth a successive authority. “They said, "Will You place upon it one who causes corruption therein and sheds blood, while we exalt You with praise and declare Your perfection? “He [Allāh] said, "Indeed, I know that which you do not know." [6] The one who studies the biography of our Messenger Muhammad, may God bless him and grant him peace, finds that he took great care in raising his companions. He, peace and blessings be upon him, remained thirteen years in Mecca calling them to unite God Almighty, and educating them by purifying their belief from polytheism, modifying their behavior, and ordering them to be patient and enduring harm, to prepare them to carry out the mission of carrying the call and conveying it to the worlds. Hence, it can be said that educational reform is the basis for the well-being of societies. Al-Faruqi - may God have mercy on him - was one of those who approached this approach and saw that reforming the thought is the way to advance this nation, so he turned to reforming the thought and reforming the educational system. In this paper, God willing, the features of this thought will be explained. [1] Surah Al Imran, Verse 104 [2] Surah Al Imran, Verse 110 [3] Surah Hud, verses (116 - 117) [4] Surah Hud, Verse 88 [5] Sunan al-Tirmidhi: The Book of Fitnah, Chapter on Enjoining Good and Forbidding Evil [6] Surah Al-Baqarah, Verse 3

    Analytical Study of the Educational Thought of Imam Al-Qabesi in his Thesis Called (The Detailed Message on the Conditions of Learners and the Judgments of Teachers and Learners)

    Get PDF
    DOI: 10.7176/RHSS/12-12-06 Publication date:June 30th 2022 Introduction Psychology - in this sense - was not known before the twentieth century, but this does not mean that it was absent from human thought like many of the sciences that were independent and took their names in successive periods of ages. The issue of human behavior has occupied human nature with philosophers, thinkers and theorists since ancient times. When Islam came, you find that many Quranic verses and honorable prophetic hadiths deal with this issue clearly and realistically. The jinn and men were only created to be worshipped[1] Muslim scholars have discussed human nature since the early Islamic times. They have created for us an enormous wealth of intellectual heritage that can dispense with relying on the global theories that discussed this subject. He was one of the most famous scholars who had a great contribution to this Al-Majal Al-Imam Al-Qabisi, one of the scholars of the Islamic Maghreb in the third century AH, through his jurisprudential views related to the education and upbringing of boys, based on an authentic Islamic creedal framework, negating away from impurities, opinions and extraneous ideas, relying on the text of the Holy Companions and the Prophet’s sayings. This research represents an attempt to reveal whether this venerable scientist was He tackled the issue of "human development" and its related material and educational applications, based on his famous message that was included in the opinions and encyclopedia with the "Detailed Message on the Conditions of Learners and the Rulings of Teachers and Learners" and may God grant success in what I sought. [1] Surat Al-Dhariyat verse 56

    SIEM-based detection and mitigation of IoT-botnet DDoS attacks

    Get PDF
    The Internet of Things (IoT) is becoming an integral part of our daily life including health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices

    A Hybrid Spam Detection Method Based on Unstructured Datasets

    Get PDF
    This document is the accepted manuscript version of the following article: Shao, Y., Trovati, M., Shi, Q. et al. Soft Comput (2017) 21: 233. The final publication is available at Springer via http://dx.doi.org/10.1007/s00500-015-1959-z. © Springer-Verlag Berlin Heidelberg 2015.The identification of non-genuine or malicious messages poses a variety of challenges due to the continuous changes in the techniques utilised by cyber-criminals. In this article, we propose a hybrid detection method based on a combination of image and text spam recognition techniques. In particular, the former is based on sparse representation-based classification, which focuses on the global and local image features, and a dictionary learning technique to achieve a spam and a ham sub-dictionary. On the other hand, the textual analysis is based on semantic properties of documents to assess the level of maliciousness. More specifically, we are able to distinguish between meta-spam and real spam. Experimental results show the accuracy and potential of our approach.Peer reviewedFinal Accepted Versio

    Восприятие студентами вузов роли образовательных цифровых стимулов в побуждении к академической вовлеченности в профессиональном образовании

    Get PDF
    Introduction. Digital stimuli are one of the strategies prepared by higher education institutions in university teaching in the field of vocational education, but they do not attach importance to them from other strategies that are used. The investigation of the role of educational digital stimuli in achieving the academic passion of vocational education students in Jordanian universities in light of COVID-19 is important to try to know the effect of digital stimuli on the academic passion of vocational education students. Methodology and research methods. The descriptive survey method was used to analyse the data. To achieve the objectives of the study, a questionnaire consisting of (29) items was designed, divided into three areas: dynamics (11 items), mechanics (7 items), and components (11 items) to collect data. The study sample consisted of 260 male and female students in Jordanian universities. Results and scientific novelty. The results showed that the role of educational digital stimuli in achieving academic passion was ‘high’ with no statistically significant differences due to the gender variable, with statistically significant differences due to the variables of the academic year and university type. Practical significance. The study recommends designing educational environments that are attractive, interactive, and related to the students’ reality, using strategies for deep information processing, problem-solving method, creativity and critical thinking in order to achieve students’ involvement in learning.Введение. Цифровые стимулы являются одной из стратегий, подготовленных высшими учебными заведениями в университетском обучении в сфере профессионального образования, но университеты не выделяют их из других стратегий, которые используются. Исследование роли и влияния образовательных цифровых стимулов в достижении академической вовлеченности у студентов профессионального образования в иорданских университетах в свете COVID-19 важно. Методология и методы исследования. Для анализа данных использовался описательный метод опроса. Для достижения целей исследования была разработана анкета для сбора данных, состоящая из 29 пунктов, разделенных на три области: динамика (11 пунктов), механика (7 пунктов) и компоненты (11 пунктов). Выборка исследования состояла из 260 студентов мужского и женского пола в иорданских университетах. Результаты. Результаты показали, что роль образовательных цифровых стимулов в достижении академической вовлеченности была высокой без статистически значимых различий из-за гендерной переменной, со статистически значимыми различиями из-за переменных «учебный год» и «тип университета». Практическая значимость. Даны рекомендации создавать привлекательную, интерактивную и связанную с реальностью учащихся образовательную среду, используя стратегии глубокой обработки информации, метод решения проблем, креативность и критическое мышление, чтобы добиться вовлечения учащихся в процесс обучения

    Mitigation and traceback countermeasures for DDoS [ie DoS] attacks

    No full text
    Denial of service (DoS) attacks impose an imminent threat to the availability of Internet services. The alarming increase of such attacks coupled with the emergence of sophisticated DoS attack techniques, call for efficient defense mechanisms to counter these attacks. Although there has been ongoing research in this area---focusing on DoS prevention, mitigation, and traceback---the existing countermeasures lack in several qualitative and quantitative metrics. In this context, this dissertation makes two key contributions in the design and analysis of efficient, scalable schemes for DoS mitigation and traceback.;First, efficient perimeter mitigation schemes based on novel concepts, such as "protocol-determinism" and "victim-assistance" are proposed. The proposed schemes enable ISP edge routers to perform timely mitigation of both end-host and network exhaustion attacks. The proposed mitigation schemes have been evaluated through analytical studies for classical and advanced attacks quantifying security metrics, such as false positive and false negative rates, and performance metrics, such as effective attack rate and connection establishment latency increase. Our analysis shows that the proposed schemes offer very low false positive and false negative rates, and reduce attacker's effective attack rate significantly with an acceptable increase in connection establishment latency.;Second, hybrid IP traceback schemes that integrate the concepts of packet marking and packet logging in a novel manner are proposed. The goal is to achieve a drastic reduction in the number of attack packets required to conduct the traceback process. The proposed traceback schemes have been evaluated through a combination of analytical and simulation studies quantifying performance metrics, such as number of attack packets, storage overhead, and attack localization distance. Our studies show that the proposed traceback schemes are superior in comparison to the well known PPM scheme.;This dissertation opens up several directions for future research which includes (1) designing efficient mitigation schemes in the context of inter-domain network, (2) designing efficient mitigation schemes that employ traceback, and (3) designing a comprehensive DoS defense mechanism that integrates DoS prevention, mitigation, and traceback in an efficient manner.</p
    corecore