Preferred Language
Articles
/
BxbBCocBVTCNdQwCgDL_
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing applied the uniform and the variable interaction strength, however, there is still a lack of work addressing IOR. In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. The result of applying the Jaya algorithm in input-output based combinatorial testing is acceptable since it produces a nearly optimum number of test cases in a satisfactory time range.

View Publication
Publication Date
Sun Aug 25 2024
Journal Name
University Of Samarra
Preparation, diagnosis and testing of the biological ‎activity of new complexes of Schiff bases
...Show More Authors

‎ Sixteen new complexes with the general formula [M(L)2(H2O)2] were ‎prepared resulting from the reaction of the two new Schiff base ligands, which ‎are‏: -‏ L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one)‎ L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) ‎ ‎ With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, ‎mercury) and (tetravalent platinum).‎‏ ‏ ‎ Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-‎dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is ‎linked to the metal ions via the nitrogen atoms are the isomethene group and ‎the oxygen is the hydroxide group of t

... Show More
Publication Date
Sun Jan 01 2023
Journal Name
Aip Conference Proceedings
The efficiency of cluster analysis to analyzing medical image of Covid-19 patient by using K-means algorithm
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Sat Feb 01 2020
Journal Name
Journal Of Economics And Administrative Sciences
The impact of green strategy formulation processes on the adoption of green strategy areas at the functional level
...Show More Authors

The research aims at demonstrating the role of the formulation of the green strategy in adopting the areas of the green strategy at the level of jobs in the municipal institutions in the province of Babylon, specifically the Directorate of the municipality of Hilla. The most important areas related to the green strategy were highlighted directly or indirectly, after the indicators of environmental damage emerged from the actions of companies and institutions. The research included a sample size of 222 individual of municipal institutions with different job titles and specializations between the technical and administrative and different levels of academic achievement within the institutions within the Ministry of Construction, Ho

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue May 01 2018
Journal Name
Journal Of Physics: Conference Series
Performance of Case-Based Reasoning Retrieval Using Classification Based on Associations versus Jcolibri and FreeCBR: A Further Validation Study
...Show More Authors

View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Sat Jan 20 2024
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Study of the Lasing Output for a Quasi-Three-Level Operation in Nd 3+:YAG Thin- Disk Laser
...Show More Authors

In this research, the effect of each of the concentrations ( Nd+3) was studied (N) the thickness of the thin disk (d) the number of times that the pumping beam passes through the effective medium of this laser (Mp) the reflectivity of the laser output mirror (R 2) The losses of the effective medium (L) and the pumping power used in achieving the reverse qualification (PP) on each of the pumping threshold capacities (Pp.th) and the output power of the laser (Pout) and the efficiency (ŋ) in Nd3+ thin-disk lasers (TDLs) pumping quasi-three-level With continuous operation (cw), at room temperature, and in the Gaussian mode (TEM00),

We found under these opera

... Show More
View Publication
Crossref
Publication Date
Sun Feb 24 2019
Journal Name
Iraqi Journal Of Physics
The effect of triggering on the output performance of diode direct face pumping for disc laser in pulse mode
...Show More Authors

The triggering effect for the face pumping of Nd:YVO4 disc medium of 4×5×0.5 mm was investigated using bulk diode laser at different resonator cavity length in pulse mode and at repetition rate of 1.3kHz. The maximum emitted peak power was found to be 100, 82, and 66 mW for resonator lengths of 10, 13.5, and 17.5 cm respectively, while the threshold pumping power was found to be 41mW. The maximum emitted peak power obtained was 300 mW when using external triggering and 10cm length, with repetition of 3Hz.

View Publication Preview PDF
Crossref
Publication Date
Thu Apr 20 2023
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Theoretical Study of the Effects Type of Host’s Crystal on the Lasing Output of High – Power Thin –Disk Laser
...Show More Authors

Ytterbium-doped (Y2O3), (Sc2O3) and (YAG) crystals are very important for high-power thindisk lasers. These lasers have shown their ability to operate quasi-three-level materials with high
efficiency as well as high thermal conductivity ratio for crystalline hosts. All these reasons have
required studying this type of laser. In the present work, the analytical solution was found for the
equation of laser output power, pumping threshold power, and efficiency of a quasi-three-level
thin disk laser. The numerical solution of these equations was also found through the Matlab
program at the fundamental transverse mode, at a temperature of 299K0
and with high pumping
capabilities in order to know the e

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jun 30 2015
Journal Name
Al-khwarizmi Engineering Journal
Multi-Focus Image Fusion Based on Pixel Significance Using Counterlet Transform
...Show More Authors

Abstract

 The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test  images, and compared with some present methods.

... Show More
View Publication Preview PDF
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Fri Jul 12 2024
Journal Name
International Journal Of Advances In Scientific Research And Engineering (ijasre), Issn:2454-8006, Doi: 10.31695/ijasre
A Proposed Blockchain-Based Digital-Identity Management using ERC 725/735
...Show More Authors

In modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu

... Show More
View Publication Preview PDF