We propose a novel strategy to optimize the test suite required for testing both hardware and software in a production line. Here, the strategy is based on two processes: Quality Signing Process and Quality Verification Process, respectively. Unlike earlier work, the proposed strategy is based on integration of black box and white box techniques in order to derive an optimum test suite during the Quality Signing Process. In this case, the generated optimal test suite significantly improves the Quality Verification Process. Considering both processes, the novelty of the proposed strategy is the fact that the optimization and reduction of test suite is performed by selecting only mutant killing test cases from cumulating t-way test cases. As such, the proposed strategy can potentially enhance the quality of product with minimal cost in terms of overall resource usage and time execution. As a case study, this paper describes the step-by-step application of the strategy for testing a 4-bit Magnitude Comparator Integrated Circuits in a production line. Comparatively, our result demonstrates that the proposed strategy outperforms the traditional block partitioning strategy with the mutant score of 100% to 90%, respectively, with the same number of test cases.
Unused and expired pharmaceutical drugs are a novel type of organic corrosion inhibitor. They are less expensive, more effective, and less harmful than conventional organic corrosion inhibitors. This study investigated the effects of concentration, adsorption mechanism and thermodynamic parameters of enalapril malate (ENAP) as a corrosion inhibitor for carbon steel in a saline solution (3.5 % NaCl). The polarization method was used to determine the corrosion rate and inhibition efficiency. Field emission scanning electron microscopy (FE-SEM) and atomic force spectroscopy (AFM) were used to investigate the surface morphology and topography of carbon steel after immersion in both uninhibited and inhibited media for 24 h. Fourier transform inf
... Show More Thsst researcher problem of delays faced by researchers are all waiting to evaluate their standards by the experts who must take their views to extract the truth Virtual important step first step in building standards whatsoever, then the difference of opinion among experts about the paragraphs Whatever the scope of their functions, leading to confusion in maintaining these paragraphs or delete? Or ignore the views and opinion of the researcher to maintain the same? Or as agreed upon with the supervisor if he was a student? Especially if the concepts of a modern new building.
Therefore, the researcher sought to try to find a solution to her problem to conduct an experiment to test building steps
The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreAR Al-Heany BSc, PKESMD MSc., PSAANBS PhD, APAANMD MSc., DDV, FICMS., IOSR Journal of Dental and Medical Sciences (IOSR-JDMS), 2014 - Cited by 14
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. This work modernize the feedforward neural network, so the secret message will be encrypted by unsupervised neural network method to get the cipher text that can be decrypted using the same network to get the original text. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding lengths. In this work, the key is the final weights
... Show MoreNAA Mustafa, Journal of the Sixth Conference of the Faculty of Languages, 2010
This paper aims to develop a technique for helping disabled people elderly with physical disability, such as those who are unable to move hands and cannot speak howover, by using a computer vision; real time video and interaction between human and computer where these combinations provide a promising solution to assist the disabled people. The main objective of the work is to design a project as a wheelchair which contains two wheel drives. This project is based on real time video for detecting and tracking human face. The proposed design is multi speed based on pulse width modulation(PWM), technique. This project is a fast response to detect and track face direction with four operations movement (left, right, forward and stop). These opera
... Show More