6 research outputs found

    An Automated Approach for Software Fault Detection and Recovery

    Get PDF
    Abstract Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach

    Music Students’ Perception Towards Music Distance Learning Education During COVID-19 Pandemic: Cross-Sectional Study in Jordan

    No full text
    During COVID-19 pandemic countries have faced various levels of COVID-19 infection rates, and millions of students are affected by changing the educational process. However, many music Schools have been faced with the challenge of dealing with a situation that necessitates emergency measures to continue the academic course in the midst of lock-downs and social distancing measures. Therefore, it is important to evaluate the effectiveness of online methods of learning and to decide their feasibility and appropriateness for music students. Thus, this research aimed to provide an analysis of Music Students’ Perception towered Music E-learning Education during COVID-19 Pandemic, to study the situation of musicians in COVID-19 and to study music Distance learning knowledge, attitudes and practices and to develop suggestions for solving the problems. A sample of (83) students from the music department in the University of Jordan completed a questionnaire. An online survey distributed The survey sought population and socio-economic information and information relating to electronic and online musical training; musical education during the COVID 19 pandemic; mental music assessments; and the skills, attitudes and practices of E-learning. Most respondents (76.2%) agreed that Distance learning is applicable in music department. While (54.2 %) of the respondents agreed Distance learning is a possible substitute for standard education. However, E-learning has actually been created as a modern way of improving the process of learning and improving learning performance

    A cognitive deep learning approach for medical image processing

    No full text
    In ophthalmic diagnostics, achieving precise segmentation of retinal blood vessels is a critical yet challenging task, primarily due to the complex nature of retinal images. The intricacies of these images often hinder the accuracy and efficiency of segmentation processes. To overcome these challenges, we introduce the cognitive DL retinal blood vessel segmentation (CoDLRBVS), a novel hybrid model that synergistically combines the deep learning capabilities of the U-Net architecture with a suite of advanced image processing techniques. This model uniquely integrates a preprocessing phase using a matched filter (MF) for feature enhancement and a post-processing phase employing morphological techniques (MT) for refining the segmentation output. Also, the model incorporates multi-scale line detection and scale space methods to enhance its segmentation capabilities. Hence, CoDLRBVS leverages the strengths of these combined approaches within the cognitive computing framework, endowing the system with human-like adaptability and reasoning. This strategic integration enables the model to emphasize blood vessels, accurately segment effectively, and proficiently detect vessels of varying sizes. CoDLRBVS achieves a notable mean accuracy of 96.7%, precision of 96.9%, sensitivity of 99.3%, and specificity of 80.4% across all of the studied datasets, including DRIVE, STARE, HRF, retinal blood vessel and Chase-DB1. CoDLRBVS has been compared with different models, and the resulting metrics surpass the compared models and establish a new benchmark in retinal vessel segmentation. The success of CoDLRBVS underscores its significant potential in advancing medical image processing, particularly in the realm of retinal blood vessel segmentation

    A Comprehensive Study on the Role of Machine Learning in 5G Security: Challenges, Technologies, and Solutions

    No full text
    Fifth-generation (5G) mobile networks have already marked their presence globally, revolutionizing entertainment, business, healthcare, and other domains. While this leap forward brings numerous advantages in speed and connectivity, it also poses new challenges for security protocols. Machine learning (ML) and deep learning (DL) have been employed to augment traditional security measures, promising to mitigate risks and vulnerabilities. This paper conducts an exhaustive study to assess ML and DL algorithms’ role and effectiveness within the 5G security landscape. Also, it offers a profound dissection of the 5G network’s security paradigm, particularly emphasizing the transformative role of ML and DL as enabling security tools. This study starts by examining the unique architecture of 5G and its inherent vulnerabilities, contrasting them with emerging threat vectors. Next, we conduct a detailed analysis of the network’s underlying segments, such as network slicing, Massive Machine-Type Communications (mMTC), and edge computing, revealing their associated security challenges. By scrutinizing current security protocols and international regulatory impositions, this paper delineates the existing 5G security landscape. Finally, we outline the capabilities of ML and DL in redefining 5G security. We detail their application in enhancing anomaly detection, fortifying predictive security measures, and strengthening intrusion prevention strategies. This research sheds light on the present-day 5G security challenges and offers a visionary perspective, highlighting the intersection of advanced computational methods and future 5G security

    An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks

    No full text
    Mobile Social Networks (MSNs) have emerged as pivotal platforms for communication, information dissemination, and social connection in contemporary society. As their prevalence escalates, so too do concerns regarding security and privacy. This paper presents a furnishes a detailed analysis of these pressing issues and elucidates how Artificial Intelligence (AI) can be instrumental in addressing them. The study thoroughly explores a spectrum of security and privacy challenges endemic to MSNs, such as data leakage, unauthorized access, cyberstalking, location privacy, and more. Additionally, the investigation expands to encompass problems like impersonation, phishing attacks, malware threats, information overload, user profiling, inadequate privacy policies, third-party application vulnerabilities, and privacy issues related to photos, videos, end-to-end encryption, Wi-Fi connections, and data retention. Each of these issues is dissected in depth, highlighting the potential risks and implications for users. Furthermore, the paper underlines how AI can provide in mitigating these problems, establishing its fundamental role in fortifying the security and privacy of MSNs. This thorough analysis offers valuable insights and feasible solutions using AI to bolster security and privacy in the ever-evolving landscape of Mobile Social Networks. © 2023 IEEE

    Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance

    No full text
    Emerging technologies in artificial intelligence (AI) and advanced optimization methodologies have opened up a new frontier in the field of software engineering. Among these methodologies, optimization algorithms such as the multi-verse optimizer (MVO) provide a compelling and structured technique for identifying software vulnerabilities, thereby enhancing software robustness and reliability. This research investigates the feasibility and efficacy of applying an augmented version of this technique, known as the test path distance multiverse optimization (TPDMVO) algorithm, for comprehensive path coverage testing, which is an indispensable aspect of software validation. The algorithm’s versatility and robustness are examined through its application to a wide range of case studies with varying degrees of complexity. These case studies include rudimentary functions like maximum and middle value extraction, as well as more sophisticated data structures such as binary search trees and AVL trees. A notable innovation in this research is the introduction of a customized fitness function, carefully designed to guide TPDMVO towards traversing all possible execution paths in a program, thereby ensuring comprehensive coverage. To further enhance the comprehensiveness of the test, a metric called ‘test path distance’ (TPD) is utilized. This metric is designed to guide TPDMVO towards paths that have not been explored before. The findings confirm the superior performance of the TPDMVO algorithm, which achieves complete path coverage in all test scenarios. This demonstrates its robustness and adaptability in handling different program complexities
    corecore