Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of coverage. Motivated by such challenge, this paper proposes a novel SCA strategy called Dynamic Event Order (DEO), in which the test case generation is done using one-parameter-at-a-time fashion. The details of the DEO are presented with a step-by-step example to demonstrate the behavior and show the correctness of the proposed strategy. In addition, this paper makes a comparison with existing computational strategies. The practical results demonstrate that the proposed DEO strategy outperforms the existing strategies in term of minimal test size in most cases. Moreover, the significance of the DEO increases as the number of sequences increases and/ or the strength of coverage increases. Furthermore, the proposed DEO strategy succeeds to generate SCAs up to t=7. Finally, the DEO strategy succeeds to find new upper bounds for SCA. In fact, the proposed strategy can act as a research vehicle for variants future implementation.
The concept of the order sum graph associated with a finite group based on the order of the group and order of group elements is introduced. Some of the properties and characteristics such as size, chromatic number, domination number, diameter, circumference, independence number, clique number, vertex connectivity, spectra, and Laplacian spectra of the order sum graph are determined. Characterizations of the order sum graph to be complete, perfect, etc. are also obtained.
This research is concerned with studying the representations of the event in the drawings of the ancient civilizations of the world, and the research consists of two axes, the axis of the theoretical framework, which included (the research problem, its aim, its limits, and the definition of its terminology).
The research aims to reveal how the event pattern was formulated by the artist on the surface of his visual achievement, and the limits of the search were spatial in the ancient civilizations of Iraq, Egypt, Greece and Rome, but the limits of the temporal research could not be determined because they were before birth, and objectively:
representations of the event in the civilizations of the ancient world This axis also in
The aim of this study is to examine the effectiveness of fishbowl strategy as one of the effective learning strategies for intermediate students’ achievement in geography subject. To do this, three classes of second intermediate were chosen from Noor Al-Mustafa School for academic years (2015-2016). (64) Student were selected as a sample that distributed into two equal groups: experimental and control group. The research used the achievement test as an instrument to come up with the finding of the study. The experiment began on Tuesday 13th of October 2015 and ended on Tuesday 5th January 2016. Through this time, the researcher taught them the first and second chapter in geography of Arab homeland using fishbowl s
... Show MoreSince the human being knew simulation as an expressive style of expressing himself which developed into dramatic arts that have their aesthetic uniqueness involving their own constructive techniques, the art of the theatre had a pioneering role in the development of the human awareness of himself. That’s why it was and still is in all its aesthetic manifestations a free space for the self –disclosure thus man has been simulated as he is the main theme of the existence and its main wealth. Thus the interest in the child's theatre began, because this theatrical pattern has its effectiveness in the construction of the human self and enabling it to be a productive source for a life that accommodates and elevates the human action t
... Show MoreThe research aims to examine the effect of KUD strategy on acquiring the grammatical concepts among intermediate school students. To achieve the research objective, the researcher adopted the null hypothesis in which there is no statistically significant difference at the level (0.05) between the average scores of students of the experimental group who study grammar base on the KUD strategy and the average scores of the control group who study the grammar through the traditional way of acquiring grammatical concepts. In a random manner, the researcher selected the research sample from one of Baghdad’s education schools in al Rusafa / 2, as the total number of students of the two groups reached (67) students. They were divided into (33)
... Show MoreIn today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreEstimation of the unknown parameters in 2-D sinusoidal signal model can be considered as important and difficult problem. Due to the difficulty to find estimate of all the parameters of this type of models at the same time, we propose sequential non-liner least squares method and sequential robust M method after their development through the use of sequential approach in the estimate suggested by Prasad et al to estimate unknown frequencies and amplitudes for the 2-D sinusoidal compounds but depending on Downhill Simplex Algorithm in solving non-linear equations for the purpose of obtaining non-linear parameters estimation which represents frequencies and then use of least squares formula to estimate
... Show MoreA novel planar type antenna printed on a high permittivity Rogers’ substrate is proposed for early stage microwave breast cancer detection. The design is based on a p-shaped wide-slot structure with microstrip feeding circuit to eliminate losses of transmission. The design parameters are optimized resulting in a good reflection coefficient at −10 dB from 4.5 to 10.9 GHz. Imaging result using inhomogeneous breast phantom indicates that the proposed antenna is capable of detecting a 5 mm size cancerous tumor embedded inside the fibroglandular region with dielectric contrast between the target and the surrounding materials ranging from 1.7 : 1 to 3.6 : 1.
The aim of this study to identify patterns of cerebral control (right and left) for second grade students in the collage of physical education and sports science of the University of Baghdad, as well as identify the definition of theThe Effect of Using the Bybee Strategy(5ES) according to Brain Control Patterns in Learning a Kinetic Series on Floor exercises in Artistic Gymnastics for menمجلة الرياضة المعاصرةالمجلد 19 العدد 1 عام 2020effect using the (Bybee) strategy (5ES) according to brain control patterns inlearning a Kinetic series on floor exercises In artistic gymnastics for men, andidentify the best combination between the four research groups learn, use Finderexperimental method research sample consi
... Show MoreThis paper presents a fully computerized method to backup the router configuration file. The method consists of a friendly graphical interface programmed by Java programming language.
The proposed method is compared with the two existing methods, namely: TFTP server method and Copy/Paste method. The comparison reveals that the proposed method has many advantages over the existing ones. The proposed method has been implemented on Cisco routers (series 2500, 2600 and 2800).