Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing applied the uniform and the variable interaction strength, however, there is still a lack of work addressing IOR. In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. The result of applying the Jaya algorithm in input-output based combinatorial testing is acceptable since it produces a nearly optimum number of test cases in a satisfactory time range.
Sixteen new complexes with the general formula [M(L)2(H2O)2] were prepared resulting from the reaction of the two new Schiff base ligands, which are: - L1= (E)-5-((2-hydroxybenzylidene)amino)-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) L2 = (E)-5-((2-hydroxy-3-methoxybenzylidene)amino)-2-phenylpyrazolidin-3-one) With divalent metal ions (manganese, cobalt, nickel, copper, zinc, cadmium, mercury) and (tetravalent platinum). Ligands was derived from the reaction of the amine (5-amino-2-phenyl-2,4-dihydro-3H-pyrazol-3-one) with Salicylaldehyde and ortho-vanillin, which is linked to the metal ions via the nitrogen atoms are the isomethene group and the oxygen is the hydroxide group of t
... Show MoreThe research aims at demonstrating the role of the formulation of the green strategy in adopting the areas of the green strategy at the level of jobs in the municipal institutions in the province of Babylon, specifically the Directorate of the municipality of Hilla. The most important areas related to the green strategy were highlighted directly or indirectly, after the indicators of environmental damage emerged from the actions of companies and institutions. The research included a sample size of 222 individual of municipal institutions with different job titles and specializations between the technical and administrative and different levels of academic achievement within the institutions within the Ministry of Construction, Ho
... Show MoreIn this research, the effect of each of the concentrations ( Nd+3) was studied (N) the thickness of the thin disk (d) the number of times that the pumping beam passes through the effective medium of this laser (Mp) the reflectivity of the laser output mirror (R 2) The losses of the effective medium (L) and the pumping power used in achieving the reverse qualification (PP) on each of the pumping threshold capacities (Pp.th) and the output power of the laser (Pout) and the efficiency (ŋ) in Nd3+ thin-disk lasers (TDLs) pumping quasi-three-level With continuous operation (cw), at room temperature, and in the Gaussian mode (TEM00),
We found under these opera
... Show MoreThe triggering effect for the face pumping of Nd:YVO4 disc medium of 4×5×0.5 mm was investigated using bulk diode laser at different resonator cavity length in pulse mode and at repetition rate of 1.3kHz. The maximum emitted peak power was found to be 100, 82, and 66 mW for resonator lengths of 10, 13.5, and 17.5 cm respectively, while the threshold pumping power was found to be 41mW. The maximum emitted peak power obtained was 300 mW when using external triggering and 10cm length, with repetition of 3Hz.
Ytterbium-doped (Y2O3), (Sc2O3) and (YAG) crystals are very important for high-power thindisk lasers. These lasers have shown their ability to operate quasi-three-level materials with high
efficiency as well as high thermal conductivity ratio for crystalline hosts. All these reasons have
required studying this type of laser. In the present work, the analytical solution was found for the
equation of laser output power, pumping threshold power, and efficiency of a quasi-three-level
thin disk laser. The numerical solution of these equations was also found through the Matlab
program at the fundamental transverse mode, at a temperature of 299K0
and with high pumping
capabilities in order to know the e
Abstract
The objective of image fusion is to merge multiple sources of images together in such a way that the final representation contains higher amount of useful information than any input one.. In this paper, a weighted average fusion method is proposed. It depends on using weights that are extracted from source images using counterlet transform. The extraction method is done by making the approximated transformed coefficients equal to zero, then taking the inverse counterlet transform to get the details of the images to be fused. The performance of the proposed algorithm has been verified on several grey scale and color test images, and compared with some present methods.
... Show MoreResearchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l
... Show MoreIn modern technology, the ownership of electronic data is the key to securing their privacy and identity from any trace or interference. Therefore, a new identity management system called Digital Identity Management, implemented throughout recent years, acts as a holder of the identity data to maintain the holder’s privacy and prevent identity theft. Therefore, an overwhelming number of users have two major problems, users who own data and third-party applications will handle it, and users who have no ownership of their data. Maintaining these identities will be a challenge these days. This paper proposes a system that solves the problem using blockchain technology for Digital Identity Management systems. Blockchain is a powerful techniqu
... Show More