期刊文献+
共找到60篇文章
< 1 2 3 >
每页显示 20 50 100
A Survey about Self-Healing Systems (Desktop and Web Application) 被引量:1
1
作者 Amjad A. Hudaib Hussam N. Fakhouri +1 位作者 Fatima Eid Al Adwan Sandi N. Fakhouri 《Communications and Network》 2017年第1期71-88,共18页
The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost ... The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost are all factors guided many researchers to develop software, web applications and systems that have the ability of self-healing. The aim of the self healing software feature is to fast recover the application and keep it running and available for 24/7 as optimal as possible. This survey provides an overview of self-healing software and system that is especially useful in all of those situations in which the involvement of humans is costly and hard to recover and needs to be automated with self healing. There are different aspects which will make us understand the different benefits of these self-healing systems. Finally, the approaches, techniques, mechanisms and individual characteristics of self healing are classified in different tables and then summarized. 展开更多
关键词 COMPUTER Architecture SELF-HEALING Systems SELF-HEALING PRINCIPLES Software SELF-HEALING Web-Self-Healing
在线阅读 下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
2
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
在线阅读 下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
3
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures Data Breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
在线阅读 下载PDF
Toward Developing a Syllabus-Oriented Computer-Based Question-Banks Software to Support Partially Computerized Exams
4
作者 Sulieman Bani-Ahmad 《Journal of Software Engineering and Applications》 2015年第5期252-268,共17页
Aims: This study aims at designing and implementing syllabus-oriented question-bank system that is capable of producing paper-based exams with multiple forms along with answer keys. The developed software tool is nam... Aims: This study aims at designing and implementing syllabus-oriented question-bank system that is capable of producing paper-based exams with multiple forms along with answer keys. The developed software tool is named Χ(Chi)-Pro Milestone and supports four types of questions, namely: Multiple-choice, True/False, Short-Answer and Free-Response Essay questions. The study is motivated by the fact that student number in schools and universities is continuously growing at high, non-linear, and uncontrolled rates. This growth, however, is not accompanied by an equivalent growth of educational resources (mainly: instructors, classrooms, and labs). A direct result of this situation is having relatively large number of students in each classroom. It is observed that providing and using online-examining systems could be intractable and expensive. As an alternative, paper-based exams can be used. One main issue is that manually produced paper-based exams are of low quality because of some human factors such as instability and relatively narrow range of topics [1]. Further, it is observed that instructors usually need to spend a lot of time and energy in composing paper-based exams with multiple forms. Therefore, the use of computers for automatic production of paper-based exams from question banks is becoming more and more important. Methodology: The design and evaluation of X-Pro Milestone are done by considering a basic set of design principles that are based on a list of identified Functional and Non-Functional Requirements. Deriving those requirements is made possible by developing X-Pro Milestone using the Iterative and Incremental model from software engineering domain. Results: We demonstrate that X-Pro Milestone has a number of excellent characteristics compared to the exam-preparation and question banks tools available in market. Some of these characteristics are: ease of use and operation, user-friendly interface and good usability, high security and protection of the question bank-items, high stability, and reliability. Further, X-Pro Milestone makes initiating, maintaining and archiving Question-Banks and produced exams possible. Putting X-Pro Milestone into real use has showed that X-Pro Milestone is easy to be learned and effectively used. We demonstrate that X-Pro Milestone is a cost-effective alternative to online examining systems with more and richer features and with low infrastructure requirements. 展开更多
关键词 Exam Preparation Tools Syllabus-Oriented QUESTION Banks PARTIALLY COMPUTERIZED Exams Iterative and Incremental SOFTWARE Development Model X-Pro Milestone
暂未订购
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
5
作者 Chevroen Washington Phillip Yarbrough +3 位作者 Shavon Parker Rafia Islam Vishnu Vardhan Patamsetti Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2022年第2期15-30,共16页
This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to... This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to an increase in information assurance. The hypothesis is tested using data from the United States Department of Health and Human Services data breach notification repository during January 2018-December 2020. Our result shows that without the increased mitigation of information assurance, data breaches in the human service sector will continue to increase. 展开更多
关键词 Information Assurance Ransomware Data Breach HACKER HIPPA PHISHING Department of Health and Human Services
在线阅读 下载PDF
Data Security Issues and Challenges in Cloud Computing: A Conceptual Analysis and Review 被引量:3
6
作者 Osama Harfoushi Bader Alfawwaz +3 位作者 Nazeeh A. Ghatasheh Ruba Obiedat Mua’ad M. Abu-Faraj Hossam Faris 《Communications and Network》 2014年第1期15-21,共7页
Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud... Cloud computing is a set of Information Technology services offered to users over the web on a rented base. Such services enable the organizations to scale-up or scale-down their in-house foundations. Generally, cloud services are provided by a third-party supplier who possesses the arrangement. Cloud computing has many advantages such as flexibility, efficiency, scalability, integration, and capital reduction. Moreover, it provides an advanced virtual space for organizations to deploy their applications or run their operations. With disregard to the possible benefits of cloud computing services, the organizations are reluctant to invest in cloud computing mainly due to security concerns. Security is one of the main challenges that hinder the growth of cloud computing. At the same time, service providers strive to reduce the risks over the clouds and increase their reliability in order to build mutual trust between them and the cloud customers. Various security issues and challenges are discussed in this research, and possible opportunities are stated. 展开更多
关键词 CLOUD COMPUTING Data Security INFRASTRUCTURE SCALABILITY REVIEW
在线阅读 下载PDF
Transforming UML Sequence Diagrams into Petri Nets 被引量:2
7
作者 Tony Spiteri Staines 《通讯和计算机(中英文版)》 2013年第1期72-81,共10页
关键词 PETRI网 序列图 UML 转化 表达能力 系统工程 可执行文件 形式主义
在线阅读 下载PDF
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme 被引量:1
8
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 Pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
在线阅读 下载PDF
A Deep Learning Approach to Industrial Corrosion Detection 被引量:1
9
作者 Mehwash Farooqui Atta Rahman +7 位作者 Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull 《Computers, Materials & Continua》 SCIE EI 2024年第11期2587-2605,共19页
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection methods.While recent st... The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection methods.While recent studies have made progress,a common challenge is the low accuracy of existing detection models.These models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource use.The proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and EfficientNetB0.By leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial settings.This advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the field.The results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these challenges.Both CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies. 展开更多
关键词 Deep learning YOLOv8 EfficientNetB0 CNN corrosion detection Industry 4.0 SUSTAINABILITY
在线阅读 下载PDF
Using an Adaptive Neuro-Fuzzy Inference System (AnFis) Algorithm for Automatic Diagnosis of Skin Cancer 被引量:1
10
作者 Suhail M. Odeh 《通讯和计算机(中英文版)》 2011年第9期751-755,共5页
关键词 自适应神经模糊推理系统 ANFIS模型 自动诊断 皮肤癌 算法 诊断系统 分类方法 最小二乘法
在线阅读 下载PDF
A Secure Visual Cryptography Scheme Using Private Key with Invariant Share Sizes 被引量:2
11
作者 Rola I. Al-Khalid Randa A. Al-Dallah +2 位作者 Aseel M. Al-Anani Raghad M. Barham Salam I. Hajir 《Journal of Software Engineering and Applications》 2017年第1期1-10,共10页
Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptogra... Visual cryptography (VC) is one of the best techniques used to secure information. It uses the human vision to decrypt the encrypted images without any cryptographic computations. The basic concept of visual cryptography is splitting the secret image into shares such that when the shares are stacked, the secret image is revealed. In this paper we proposed a method that is based on the concept of visual cryptography for color images and without any pixel expansion which requires less space. The proposed method is used to encrypt halftone color images by generating two shares, random and key shares which are the same size as the secret color image. The two shares are generated based on a private key. At the receiving side, the secret color image is revealed by stacking the two shares and exploiting the human vision system. In this paper, we produce an enhanced form of the proposed method by modifying the encryption technique used to generate the random and the key shares. Experimental results have shown that the proposed and the enhanced methods suggest an efficient way to encrypt a secret color image with better level of security, less storage space, less time of computation and with a better value of PSNR. 展开更多
关键词 Visual CRYPTOGRAPHY (VC) HALFTONE Color Images Pixel Expansion PSNR PRIVATE Key
在线阅读 下载PDF
Automatic Test Data Generation for Java Card Applications Using Genetic Algorithm 被引量:2
12
作者 Saher Manaseer Warif Manasir +2 位作者 Mohammad Alshraideh Nabil Abu Hashish Omar Adwan 《Journal of Software Engineering and Applications》 2015年第12期603-616,共14页
The main objective of software testing is to have the highest likelihood of finding the most faults with a minimum amount of time and effort. Genetic Algorithm (GA) has been successfully used by researchers in softwar... The main objective of software testing is to have the highest likelihood of finding the most faults with a minimum amount of time and effort. Genetic Algorithm (GA) has been successfully used by researchers in software testing to automatically generate test data. In this paper, a GA is applied using branch coverage criterion to generate the least possible set of test data to test JSC applications. Results show that applying GA achieves better performance in terms of average number of test data?generations, execution time, and percentage of branch coverage. 展开更多
关键词 SOFTWARE Testing GENETIC Algorithm Java SMART CARD
在线阅读 下载PDF
An Automated Approach for Software Fault Detection and Recovery 被引量:2
13
作者 Amjad A. Hudaib Hussam N. Fakhouri 《Communications and Network》 2016年第3期158-169,共12页
Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This pape... Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach. 展开更多
关键词 Software Engineering Autonomic Software Systems Automatic Recovery Automatic Diagnosis Auto Restore
在线阅读 下载PDF
Design and Analysis of a Network Traffic Analysis Tool: NetFlow Analyzer 被引量:1
14
作者 Rafia Islam Vishnu Vardhan Patamsetti +4 位作者 Aparna Gadhi Ragha Madhavi Gondu Chinna Manikanta Bandaru Sai Chaitanya Kesani Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第2期21-29,共9页
A network analyzer can often comprehend many protocols, which enables it to display talks taking place between hosts over a network. A network analyzer analyzes the device or network response and measures for the oper... A network analyzer can often comprehend many protocols, which enables it to display talks taking place between hosts over a network. A network analyzer analyzes the device or network response and measures for the operator to keep an eye on the network’s or object’s performance in an RF circuit. The purpose of the following research includes analyzing the capabilities of NetFlow analyzer to measure various parts, including filters, mixers, frequency sensitive networks, transistors, and other RF-based instruments. NetFlow Analyzer is a network traffic analyzer that measures the network parameters of electrical networks. Although there are other types of network parameter sets including Y, Z, & H-parameters, these instruments are typically employed to measure S-parameters since transmission & reflection of electrical networks are simple to calculate at high frequencies. These analyzers are widely employed to distinguish between two-port networks, including filters and amplifiers. By allowing the user to view the actual data that is sent over a network, packet by packet, a network analyzer informs you of what is happening there. Also, this research will contain the design model of NetFlow Analyzer that Measurements involving transmission and reflection use. Gain, insertion loss, and transmission coefficient are measured in transmission measurements, whereas return loss, reflection coefficient, impedance, and other variables are measured in reflection measurements. These analyzers’ operational frequencies vary from 1 Hz to 1.5 THz. These analyzers can also be used to examine stability in measurements of open loops, audio components, and ultrasonics. 展开更多
关键词 Network Analyzer INSTRUMENTS PARAMETER RF Circuit TRANSISTORS Traffic Analysis Bandwidth Measurement
在线阅读 下载PDF
3D Mobile Augmented Reality Interface for Laboratory Experiments 被引量:2
15
作者 Clement Onime Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2016年第4期67-76,共10页
In fields such as science and engineering, virtual environment is commonly used to provide replacements for practical hands-on laboratories. Sometimes, these environments take the form of a remote interface to the phy... In fields such as science and engineering, virtual environment is commonly used to provide replacements for practical hands-on laboratories. Sometimes, these environments take the form of a remote interface to the physical laboratory apparatus and at other times, in the form of a complete software implementation that simulates the laboratory apparatus. In this paper, we report on the use of a semi-immersive 3D mobile Augmented Reality (mAR) interface and limited simulations as a replacement for practical hands-on laboratories in science and engineering. The 3D-mAR based interfaces implementations for three different experiments (from micro-electronics, power and communications engineering) are presented;the discovered limitations are discussed along with the results of an evaluation by science and engineering students from two different institutions and plans for future work. 展开更多
关键词 Mobile Augmented Reality Laboratory Experiments 3D
在线阅读 下载PDF
Four Sliding Windows Pattern Matching Algorithm (FSW) 被引量:1
16
作者 Amjad Hudaib Rola Al-Khalid +2 位作者 Aseel Al-Anani Mariam Itriq Dima Suleiman 《Journal of Software Engineering and Applications》 2015年第3期154-165,共12页
This paper presents an efficient pattern matching algorithm (FSW). FSW improves the searching process for a pattern in a text. It scans the text with the help of four sliding windows. The windows are equal to the leng... This paper presents an efficient pattern matching algorithm (FSW). FSW improves the searching process for a pattern in a text. It scans the text with the help of four sliding windows. The windows are equal to the length of the pattern, allowing multiple alignments in the searching process. The text is divided into two parts;each part is scanned from both sides simultaneously using two sliding windows. The four windows slide in parallel in both parts of the text. The comparisons done between the text and the pattern are done from both of the pattern sides in parallel. The conducted experiments show that FSW achieves the best overall results in the number of attempts and the number of character comparisons compared to the pattern matching algorithms: Two Sliding Windows (TSW), Enhanced Two Sliding Windows algorithm (ETSW) and Berry-Ravindran algorithm (BR). The best time case is calculated and found to be??while the average case time complexity is??. 展开更多
关键词 PATTERN MATCHING FWS Enhanced Two SLIDING Windows ALGORITHM RS-A Fast PATTERN MATCHING ALGORITHM
在线阅读 下载PDF
Enhancing ERS-A Algorithm for Pattern Matching (EERS-A) 被引量:1
17
作者 Dima Suleiman Mariam Itriq +2 位作者 Aseel Al-Anani Rola Al-Khalid Amjad Hudaib 《Journal of Software Engineering and Applications》 2015年第3期143-153,共11页
Pattern matching is a very important topic in computer science. It has been used in various applications such as information retrieval, virus scanning, DNA sequence analysis, data mining, machine learning, network sec... Pattern matching is a very important topic in computer science. It has been used in various applications such as information retrieval, virus scanning, DNA sequence analysis, data mining, machine learning, network security and pattern recognition. This paper has presented a new pattern matching algorithm—Enhanced ERS-A, which is an improvement over ERS-S algorithm. In ERS-A, two sliding windows are used to scan the text from the left and the right simultaneously. The proposed algorithm also scans the text from the left and the right simultaneously as well as making comparisons with the pattern from both sides simultaneously. The comparisons done between the text and the pattern are done from both sides in parallel. The shift technique used in the Enhanced ERS-A is the four consecutive characters in the text immediately following the pattern window. The experimental results show that the Enhanced ERS-A has enhanced the process of pattern matching by reducing the number of comparisons performed. 展开更多
关键词 PATTERN MATCHING ENHANCED Two Sliding Windows ALGORITHM RS-A Fast PATTERN MATCHING ALGORITHM ENHANCED RS-A
在线阅读 下载PDF
Improved Whale Optimization with Local-Search Method for Feature Selection 被引量:2
18
作者 Malek Alzaqebah Mutasem KAlsmadi +12 位作者 Sana Jawarneh Jehad Saad Alqurni Mohammed Tayfour Ibrahim Almarashdeh Rami Mustafa A.Mohammad Fahad A.Alghamdi Nahier Aldhafferi Abdullah Alqahtani Khalid A.Alissa Bashar A.Aldeeb Usama A.Badawi Maram Alwohaibi Hayat Alfagham 《Computers, Materials & Continua》 SCIE EI 2023年第4期1371-1389,共19页
Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among t... Various feature selection algorithms are usually employed to improve classification models’overall performance.Optimization algorithms typically accompany such algorithms to select the optimal set of features.Among the most currently attractive trends within optimization algorithms are hybrid metaheuristics.The present paper presents two Stages of Local Search models for feature selection based on WOA(Whale Optimization Algorithm)and Great Deluge(GD).GD Algorithm is integrated with the WOA algorithm to improve exploitation by identifying the most promising regions during the search.Another version is employed using the best solution found by the WOA algorithm and exploited by the GD algorithm.In addition,disruptive selection(DS)is employed to select the solutions from the population for local search.DS is chosen to maintain the diversity of the population via enhancing low and high-quality solutions.Fifteen(15)standard benchmark datasets provided by the University of California Irvine(UCI)repository were used in evaluating the proposed approaches’performance.Next,a comparison was made with four population-based algorithms as wrapper feature selection methods from the literature.The proposed techniques have proved their efficiency in enhancing classification accuracy compared to other wrapper methods.Hence,the WOA can search effectively in the feature space and choose the most relevant attributes for classification tasks. 展开更多
关键词 OPTIMIZATION whale optimization algorithm great deluge algorithm feature selection and classification
在线阅读 下载PDF
Statistical Debugging Effectiveness as a Fault Localization Approach: Comparative Study 被引量:1
19
作者 Ishaq Sandoqa Fawaz Alzghoul +3 位作者 Hamad Alsawalqah Isra Alzghoul Loai Alnemer Mohammad Akour 《Journal of Software Engineering and Applications》 2016年第8期412-423,共12页
Fault localization is an important topic in software testing, as it enables the developer to specify fault location in their code. One of the dynamic fault localization techniques is statistical debugging. In this stu... Fault localization is an important topic in software testing, as it enables the developer to specify fault location in their code. One of the dynamic fault localization techniques is statistical debugging. In this study, two statistical debugging algorithms are implemented, SOBER and Cause Isolation, and then the experimental works are conducted on five programs coded using Python as an example of well-known dynamic programming language. Results showed that in programs that contain only single bug, the two studied statistical debugging algorithms are very effective to localize a bug. In programs that have more than one bug, SOBER algorithm has limitations related to nested predicates, rarely observed predicates and complement predicates. The Cause Isolation has limitations related to sorting predicates based on importance and detecting bugs in predicate condition. The accuracy of both SOBER and Cause Isolation is affected by the program size. Quality comparison showed that SOBER algorithm requires more code examination than Cause Isolation to discover the bugs. 展开更多
关键词 Testing and Debugging Dynamic Language Statistical Debugging Fault Localization
在线阅读 下载PDF
Relative Time Quantum-based Enhancements in Round Robin Scheduling
20
作者 Sardar Zafar Iqbal Hina Gull +5 位作者 Saqib Saeed Madeeha Saqib Mohammed Alqahtani Yasser A.Bamarouf Gomathi Krishna May Issa Aldossary 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期461-477,共17页
Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system.Operating systems need to be upgraded to match the n... Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system.Operating systems need to be upgraded to match the needs of modern-day systems relying on Internet of Things,Fog computing and Mobile based applications.The scheduling algorithm of the operating system dictates that how the resources will be allocated to the processes and the Round Robin algorithm(RR)has been widely used for it.The intent of this study is to ameliorate RR scheduling algorithm to optimize task scheduling.We have carried out an experimental study where we have developed four variations of RR,each algorithm considers three-time quanta and the performance of these variations was compared with the RR algorithm,and results highlighted that these variations performed better than conventional RR algorithm.In the future,we intend to develop an automated scheduler that can determine optimal algorithm based on the current set of processes and will allocate time quantum to the processes intelligently at the run time.This way the task performance of modern-day systems can be improved to make them more efficient. 展开更多
关键词 CPU scheduling Round Robin enhanced Round Robin relative time quantum operating systems
在线阅读 下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部