8 research outputs found

    An Automated Approach for Software Fault Detection and Recovery

    Get PDF
    Abstract Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach

    Overview of Mobile Attack Detection and Prevention Techniques Using Machine Learning

    Get PDF
    In light of the increasing sophistication and frequency of mobile attacks, there is a growing demand for advanced intelligent techniques capable of offering comprehensive mobile attack detection and prevention. This paper aims to critically evaluate the landscape of mobile security, outlining the evolution of mobile attack vectors and pinpointing the deficiencies in traditional security methods. The text embarks on a journey to understand the connection between machine learning (ML) and its promising applications in enhancing mobile security. First, we outline the current state of mobile attacks and the traditional methods used for their detection, emphasizing the clear limitations and the necessity for an innovative approach. Following this, we will elucidate the fundamentals of ML and its implications in cybersecurity, exploring the benefits it can provide to mobile attack detection frameworks. We delve into discussing various ML algorithms, such as decision trees, random forests, and support vector machines, highlighting their effectiveness and the metrics used to evaluate ML models in security tasks. Moreover, the paper sheds light on novel approaches such as semi-supervised and unsupervised learning in anomaly detection, as well as the applications of transfer learning in security. Addressing the pressing challenges faced in artificial intelligence (AI)-driven mobile attack detection, we delve deep into the intricacies of data collection, labeling, and the prevailing issues of imbalance and overfitting. Furthermore, we explore contemporary adversarial attacks and defenses, scrutinizing the real-world adaptability of AI models and the pivotal role of human-AI collaboration in enhancing attack detection mechanisms

    Music Students’ Perception Towards Music Distance Learning Education During COVID-19 Pandemic: Cross-Sectional Study in Jordan

    Full text link
    During COVID-19 pandemic countries have faced various levels of COVID-19 infection rates, and millions of students are affected by changing the educational process. However, many music Schools have been faced with the challenge of dealing with a situation that necessitates emergency measures to continue the academic course in the midst of lock-downs and social distancing measures. Therefore, it is important to evaluate the effectiveness of online methods of learning and to decide their feasibility and appropriateness for music students. Thus, this research aimed to provide an analysis of Music Students’ Perception towered Music E-learning Education during COVID-19 Pandemic, to study the situation of musicians in COVID-19 and to study music Distance learning knowledge, attitudes and practices and to develop suggestions for solving the problems. A sample of (83) students from the music department in the University of Jordan completed a questionnaire. An online survey distributed The survey sought population and socio-economic information and information relating to electronic and online musical training; musical education during the COVID 19 pandemic; mental music assessments; and the skills, attitudes and practices of E-learning. Most respondents (76.2%) agreed that Distance learning is applicable in music department. While (54.2 %) of the respondents agreed Distance learning is a possible substitute for standard education. However, E-learning has actually been created as a modern way of improving the process of learning and improving learning performance

    A cognitive deep learning approach for medical image processing

    Full text link
    In ophthalmic diagnostics, achieving precise segmentation of retinal blood vessels is a critical yet challenging task, primarily due to the complex nature of retinal images. The intricacies of these images often hinder the accuracy and efficiency of segmentation processes. To overcome these challenges, we introduce the cognitive DL retinal blood vessel segmentation (CoDLRBVS), a novel hybrid model that synergistically combines the deep learning capabilities of the U-Net architecture with a suite of advanced image processing techniques. This model uniquely integrates a preprocessing phase using a matched filter (MF) for feature enhancement and a post-processing phase employing morphological techniques (MT) for refining the segmentation output. Also, the model incorporates multi-scale line detection and scale space methods to enhance its segmentation capabilities. Hence, CoDLRBVS leverages the strengths of these combined approaches within the cognitive computing framework, endowing the system with human-like adaptability and reasoning. This strategic integration enables the model to emphasize blood vessels, accurately segment effectively, and proficiently detect vessels of varying sizes. CoDLRBVS achieves a notable mean accuracy of 96.7%, precision of 96.9%, sensitivity of 99.3%, and specificity of 80.4% across all of the studied datasets, including DRIVE, STARE, HRF, retinal blood vessel and Chase-DB1. CoDLRBVS has been compared with different models, and the resulting metrics surpass the compared models and establish a new benchmark in retinal vessel segmentation. The success of CoDLRBVS underscores its significant potential in advancing medical image processing, particularly in the realm of retinal blood vessel segmentation

    Novel Hybrid Crayfish Optimization Algorithm and Self-Adaptive Differential Evolution for Solving Complex Optimization Problems

    Full text link
    This study presents the Hybrid COASaDE Optimizer, a novel combination of the Crayfish Optimization Algorithm (COA) and Self-adaptive Differential Evolution (SaDE), designed to address complex optimization challenges and solve engineering design problems. The hybrid approach leverages COA’s efficient exploration mechanisms, inspired by crayfish behaviour, with the symmetry of SaDE’s adaptive exploitation capabilities, characterized by its dynamic parameter adjustment. The balance between these two phases represents a symmetrical relationship wherein both components contribute equally and complementary to the algorithm’s overall performance. This symmetry in design enables the Hybrid COASaDE to maintain consistent and robust performance across a diverse range of optimization problems. Experimental evaluations were conducted using CEC2022 and CEC2017 benchmark functions, demonstrating COASaDE’s superior performance compared to state-of-the-art optimization algorithms. The results and statistical analyses confirm the robustness and efficiency of the Hybrid COASaDE in finding optimal solutions. Furthermore, the applicability of the Hybrid COASaDE was validated through several engineering design problems, where COASaDE outperformed other optimizers in achieving the optimal solution

    A Comprehensive Study on the Role of Machine Learning in 5G Security: Challenges, Technologies, and Solutions

    Full text link
    Fifth-generation (5G) mobile networks have already marked their presence globally, revolutionizing entertainment, business, healthcare, and other domains. While this leap forward brings numerous advantages in speed and connectivity, it also poses new challenges for security protocols. Machine learning (ML) and deep learning (DL) have been employed to augment traditional security measures, promising to mitigate risks and vulnerabilities. This paper conducts an exhaustive study to assess ML and DL algorithms’ role and effectiveness within the 5G security landscape. Also, it offers a profound dissection of the 5G network’s security paradigm, particularly emphasizing the transformative role of ML and DL as enabling security tools. This study starts by examining the unique architecture of 5G and its inherent vulnerabilities, contrasting them with emerging threat vectors. Next, we conduct a detailed analysis of the network’s underlying segments, such as network slicing, Massive Machine-Type Communications (mMTC), and edge computing, revealing their associated security challenges. By scrutinizing current security protocols and international regulatory impositions, this paper delineates the existing 5G security landscape. Finally, we outline the capabilities of ML and DL in redefining 5G security. We detail their application in enhancing anomaly detection, fortifying predictive security measures, and strengthening intrusion prevention strategies. This research sheds light on the present-day 5G security challenges and offers a visionary perspective, highlighting the intersection of advanced computational methods and future 5G security

    An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks

    Full text link
    Mobile Social Networks (MSNs) have emerged as pivotal platforms for communication, information dissemination, and social connection in contemporary society. As their prevalence escalates, so too do concerns regarding security and privacy. This paper presents a furnishes a detailed analysis of these pressing issues and elucidates how Artificial Intelligence (AI) can be instrumental in addressing them. The study thoroughly explores a spectrum of security and privacy challenges endemic to MSNs, such as data leakage, unauthorized access, cyberstalking, location privacy, and more. Additionally, the investigation expands to encompass problems like impersonation, phishing attacks, malware threats, information overload, user profiling, inadequate privacy policies, third-party application vulnerabilities, and privacy issues related to photos, videos, end-to-end encryption, Wi-Fi connections, and data retention. Each of these issues is dissected in depth, highlighting the potential risks and implications for users. Furthermore, the paper underlines how AI can provide in mitigating these problems, establishing its fundamental role in fortifying the security and privacy of MSNs. This thorough analysis offers valuable insights and feasible solutions using AI to bolster security and privacy in the ever-evolving landscape of Mobile Social Networks. © 2023 IEEE

    Improved Path Testing Using Multi-Verse Optimization Algorithm and the Integration of Test Path Distance

    Full text link
    Emerging technologies in artificial intelligence (AI) and advanced optimization methodologies have opened up a new frontier in the field of software engineering. Among these methodologies, optimization algorithms such as the multi-verse optimizer (MVO) provide a compelling and structured technique for identifying software vulnerabilities, thereby enhancing software robustness and reliability. This research investigates the feasibility and efficacy of applying an augmented version of this technique, known as the test path distance multiverse optimization (TPDMVO) algorithm, for comprehensive path coverage testing, which is an indispensable aspect of software validation. The algorithm’s versatility and robustness are examined through its application to a wide range of case studies with varying degrees of complexity. These case studies include rudimentary functions like maximum and middle value extraction, as well as more sophisticated data structures such as binary search trees and AVL trees. A notable innovation in this research is the introduction of a customized fitness function, carefully designed to guide TPDMVO towards traversing all possible execution paths in a program, thereby ensuring comprehensive coverage. To further enhance the comprehensiveness of the test, a metric called ‘test path distance’ (TPD) is utilized. This metric is designed to guide TPDMVO towards paths that have not been explored before. The findings confirm the superior performance of the TPDMVO algorithm, which achieves complete path coverage in all test scenarios. This demonstrates its robustness and adaptability in handling different program complexities
    corecore