Preferred Language
Articles
/
CRbCCocBVTCNdQwCYjKv
DEO: A Dynamic Event Order Strategy for t-way Sequence Covering Array Test Data Generation
...Show More Authors

Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of coverage. Motivated by such challenge, this paper proposes a novel SCA strategy called Dynamic Event Order (DEO), in which the test case generation is done using one-parameter-at-a-time fashion. The details of the DEO are presented with a step-by-step example to demonstrate the behavior and show the correctness of the proposed strategy. In addition, this paper makes a comparison with existing computational strategies. The practical results demonstrate that the proposed DEO strategy outperforms the existing strategies in term of minimal test size in most cases. Moreover, the significance of the DEO increases as the number of sequences increases and/ or the strength of coverage increases. Furthermore, the proposed DEO strategy succeeds to generate SCAs up to t=7. Finally, the DEO strategy succeeds to find new upper bounds for SCA. In fact, the proposed strategy can act as a research vehicle for variants future implementation.

View Publication
Publication Date
Sat Mar 01 2014
Journal Name
International Journal Of Computer Science Engineering And Technology
Streaming video content over NGA (next generation access) network technology‏
...Show More Authors

An approach for hiding information has been proposed for securing information using Slanlet transform and the T-codes. Same as the wavelet transform the Slantlet transform is better in compression signal and good time localization signal compression than the conventional transforms like (DCT) discrete cosine transforms. The proposed method provides efficient security, because the original secret image is encrypted before embedding in order to build a robust system that is no attacker can defeat it. Some of the well known fidelity measures like (PSNR and AR) were used to measure the quality of the Steganography image and the image after extracted. The results show that the stego-image is closed related to the cover image, with (PSNR) Peak Si

... Show More
Publication Date
Fri Dec 30 2011
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Energy Generation from Static Water Head Developed By Forward Osmosis
...Show More Authors

In this work, the possibility of utilizing osmosis phenomenon to produce energy as a type of the renewable energy using Thin Film Composite Ultra Low Pressure membrane TFC-ULP was studied. Where by forward osmosis water passes through the membrane toward the concentrated brine solution, this will lead to raise the head of the high brine solution. This developed static head may be used to produce energy. The aim of the present work is to study the static head developed and the flux on the high brine water solution side when using forward and reverse osmosis membranes for an initial concentration range from 35-300 g/l for each type of membrane used at room temperature and pressure conditions, and finally calculating the maximum possible po

... Show More
View Publication Preview PDF
Publication Date
Fri May 01 2015
Journal Name
Journal Of Engineering
Brackish Water Desalination Coupled With Wastewater Treatment and Electricity Generation
...Show More Authors

A new bio-electrochemical system was proposed for simultaneous removal of organic matters and salinity from actual domestic wastewater and synthetically prepared saline water, respectively. The performance of a three-chambered microbial osmotic fuel cell (MOFC) provided with forward osmosis (FO) membrane and cation exchange membrane (CEM) was evaluated with respect to the chemical oxygen demand (COD) removal from wastewater, electricity generation, and desalination of saline water. The MOFC wasinoculated with activated sludge and fueled with actual domestic wastewater. Results revealed that maximum removal efficiency of COD from wastewater, TDS removal efficiency from saline water, power density, and current density were

... Show More
View Publication Preview PDF
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Entropy Generation of Shell and Double Concentric Tubes Heat Exchanger
...Show More Authors

Entropy generation was studied for new type of heat exchanger (shell and double concentric tubes heat exchanger). Parameters of hot oil flow rate, temperature of inlet hot oil and pressure drop were investigated with the concept of entropy generation. The results showed that the value of entropy generation increased with increasing the flow rate of hot oil and when cold water flow rate was doubled from 20 to 40 l/min, these values were larger. On the other hand, entropy generation increased with increasing the hot oil inlet temperature at a certain flow rate of hot oil. Furthermore, at a certain hot oil inlet temperature, the entropy generation increased with the pressure drop at different hot oil inlet flow rates. Final

... Show More
View Publication Preview PDF
Publication Date
Mon Oct 02 2023
Journal Name
Journal Of Engineering
Power Generation from Utilizing Thermal Energy of Hazardous Waste Incinerators
...Show More Authors

A large amount of thermal energy is generated from burning hazardous chemical wastes, and the temperature of the flue gases in hazardous waste incinerators reaches up to (1200 °C). The flue gases are cooled to (40°C) and are treated before emission. This thermal energy can be utilized to produce electrical power by designing a system suitable for dangerous flue gases in the future depending on the results of much research about using a proto-type small steam power plant that uses safe fuel to study and develop the electricity generation process with water tube boiler which is manufactured experimentally with theoretical development for some of its parts which are inefficient in experimental work. The studied system gen

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Wed Oct 21 2015
Journal Name
Integrated Journal Of Engineering Research And Technology
A HYBRID CUCKOO SEARCH AND BACK-PROPAGATION ALGORITHMS WITH DYNAMIC LEARNING RATE TO SPEED UP THE CONVERGENCE (SUBPL) ALGORITHM
...Show More Authors

BP algorithm is the most widely used supervised training algorithms for multi-layered feedforward neural net works. However, BP takes long time to converge and quite sensitive to the initial weights of a network. In this paper, a modified cuckoo search algorithm is used to get the optimal set of initial weights that will be used by BP algorithm. And changing the value of BP learning rate to improve the error convergence. The performance of the proposed hybrid algorithm is compared with the stan dard BP using simple data sets. The simulation result show that the proposed algorithm has improved the BP training in terms of quick convergence of the solution depending on the slope of the error graph.

Publication Date
Tue Dec 25 2018
Journal Name
Journal Of Engineering Science And Technology
RIETVELD TEXTURE REFINEMENT ANALYSIS OF LINDE TYPE A ZEOLITE FROM X-RAY DIFFRACTION DATA
...Show More Authors

Scopus (31)
Scopus
Publication Date
Sun Dec 01 2024
Journal Name
Journal Of Economics And Administrative Sciences
Nadaraya-Watson Estimation of a Circular Regression Model on Peak Systolic Blood Pressure Data
...Show More Authors

Purpose: The research aims to estimate models representing phenomena that follow the logic of circular (angular) data, accounting for the 24-hour periodicity in measurement. Theoretical framework: The regression model is developed to account for the periodic nature of the circular scale, considering the periodicity in the dependent variable y, the explanatory variables x, or both. Design/methodology/approach: Two estimation methods were applied: a parametric model, represented by the Simple Circular Regression (SCR) model, and a nonparametric model, represented by the Nadaraya-Watson Circular Regression (NW) model. The analysis used real data from 50 patients at Al-Kindi Teaching Hospital in Baghdad. Findings: The Mean Circular Erro

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 01 2023
Journal Name
Journal Of Intelligent Systems
A study on predicting crime rates through machine learning and data mining using text
...Show More Authors
Abstract<p>Crime is a threat to any nation’s security administration and jurisdiction. Therefore, crime analysis becomes increasingly important because it assigns the time and place based on the collected spatial and temporal data. However, old techniques, such as paperwork, investigative judges, and statistical analysis, are not efficient enough to predict the accurate time and location where the crime had taken place. But when machine learning and data mining methods were deployed in crime analysis, crime analysis and predication accuracy increased dramatically. In this study, various types of criminal analysis and prediction using several machine learning and data mining techniques, based o</p> ... Show More
View Publication
Scopus (9)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Digital Data Encryption Using a Proposed W-Method Based on AES and DES Algorithms
...Show More Authors

This paper proposes a new encryption method. It combines two cipher algorithms, i.e., DES and AES, to generate hybrid keys. This combination strengthens the proposed W-method by generating high randomized keys. Two points can represent the reliability of any encryption technique. Firstly, is the key generation; therefore, our approach merges 64 bits of DES with 64 bits of AES to produce 128 bits as a root key for all remaining keys that are 15. This complexity increases the level of the ciphering process. Moreover, it shifts the operation one bit only to the right. Secondly is the nature of the encryption process. It includes two keys and mixes one round of DES with one round of AES to reduce the performance time. The W-method deals with

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref