Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient t
... Show MoreIn this research, the size strain plot method was used to estimate the particle size and lattice strain of CaTiO3 nanoparticles. The SSP method was developed to calculate new variables, namely stress, and strain energy, and the results were crystallite size (44.7181794 nm) lattice strain (0.001211), This method has been modified to calculate new variables such as stress and its value (184.3046308X10-3Mpa) and strain energy and its value (1.115833287X10-6 KJm-3).
The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features that are attributable to them and their relationships with men and their interests and tendencies , activities and ways and methods pursued to achieve their goals , or what appeared to be trying to achieve and whether made movies vivid and varied models for women, or confined to a rigid model and duplicate Is films raised issues concerning women? The research seeks to examine the image of women in Iraqi films produced after 2003 over the answer to questions such as “ level of the representation of women and appearing in films and features th
... Show MoreTime and space are indispensable basics in cinematic art. They contain the characters, their actions and the nature of events, as well as their expressive abilities to express many ideas and information. However, the process of collecting space and time in one term is space-time, and it is one of Einstein’s theoretical propositions, who sees that Time is an added dimension within the place, so the study here differs from the previous one, and this is what the researcher determined in the topic of his research, which was titled (The Dramatic Function of Space-Time Variables in the Narrative Film), Which included the following: The research problem, which crystallized in the following question: What is the dramatic function of the tempor
... Show MoreThis paper describes the digital chaotic signal with ship map design. The robust digital implementation eliminates the variation tolerance and electronics noise problems common in analog chaotic circuits. Generation of good non-repeatable and nonpredictable random sequences is of increasing importance in security applications. The use of 1-D chaotic signal to mask useful information and to mask it unrecognizable by the receiver is a field of research in full expansion. The piece-wise 1-D map such as ship map is used for this paper. The main advantages of chaos are the increased security of the transmission and ease of generation of a great number of distinct sequences. As consequence, the number of users in the systems can be increased. Rec
... Show MoreThe primary purpose of this paper is to introduce the, 2- coprobabilistic normed space, coprobabilistic dual space of 2- coprobabilistic normed space and give some facts that are related of them
With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi
... Show MoreThe purpose of this paper is to introduce and study the concepts of fuzzy generalized open sets, fuzzy generalized closed sets, generalized continuous fuzzy proper functions and prove results about these concepts.
وفقأ للدراسات السابقة تم تحضير ليكاند آزو جديد (ن-(3-اسيتايل-2-هيدروكسي-5-مثيل-فنيل)ن-(4-كاربوكسي-سايكلوهكسيل مثيل)-ملح الدايازونيوم) وبعد التحقق من الصيغة المقترحة وفق نتائج التحاليل وبعد استخدام الليكاند لتحضير سلسلة ن المعقدات باستخدام نسب مولية متساوية (1:1) من الليكاند وتفاعلها مع كل من املاح المنغنيز والكوبلت والنيكل والنحاس والخارصين وبعد التحقق وفق تقنيات التحاليل الطيفية والتشخيصية(الاشعة فوق البنف
... Show More