Automatic Programming Assessment (APA) has been gaining lots of attention among researchers mainly to support automated grading and marking of students’ programming assignments or exercises systematically. APA is commonly identified as a method that can enhance accuracy, efficiency and consistency as well as providing instant feedback on students’ programming solutions. In achieving APA, test data generation process is very important so as to perform a dynamic testing on students’ assignment. In software testing field, many researches that focus on test data generation have demonstrated the successful of adoption of Meta-Heuristic Search Techniques (MHST) so as to enhance the procedure of deriving adequate test data for efficient testing. Nonetheless, thus far the researches on APA have not yet usefully exploited the techniques accordingly to include a better quality program testing coverage. Therefore, this study has conducted a comparative evaluation to identify any applicable MHST to support efficient Automated Test Data Generation (ATDG) in executing a dynamic-functional testing in APA. Several recent MHST are included in the comparative evaluation combining both the local and global search algorithms ranging from the year of 2000 until 2018. Result of this study suggests that the hybridization of Cuckoo Search with Tabu Search and lévy flight as one of promising MHST to be applied, as it’s outperforms other MHST with regards to number of iterations and range of inputs.
Show the greatness of Allah Almighty when contemplating the benefits of trees and plants in
Life in general and trees mentioned in the Koran in particular, do not have to meditate that
He acknowledges the greatness of the Almighty Creator, and his preference over man, that he is prepared for his livelihood
And give him what he can do in this life to the fullest.
The study also stressed the need to urge people to this great blessing trees
By preserving them and wasteful wastefulness.
The study also pointed to the need to guide people towards the aesthetics and improvements of
Look through and enjoy the beauty of trees, flowers, greenery and fruits ..
Fifty-Four paddy samples, 45 soil samples, and nine irrigation water samples of some paddy fields at Alfurat Alawsat Area, Iraq were collected to investigate the microbial quality including total count bacteria (TCB), molds and yeast, total coliform (TC), and E. coli bacteria. Paddy samples were processed at the laboratory level to produce rice at 32 and 36 whiteness, and the microbial quality of the produced rice was conducted too. The results showed that all irrigation water samples were overpassed the FDA limit for E. coli. All paddy samples were exceeded the good limit of TCB, but no sample exceeded the acceptable limit. Most paddy samples were exceeded the FDA limit for molds and yeast, and few paddy samples exc
... Show MoreThe objective of this work is to study the influence of end milling cutting process parameters, tool material and geometry on multi-response outputs for 4032 Al-alloy. This can be done by proposing an approach that combines Taguchi method with grey relational analysis. Three cutting parameters have been selected (spindle speed, feed rate and cut depth) with three levels for each parameter. Three tools with different materials and geometry have been also used to design the experimental tests and runs based on matrix L9. The end milling process with several output characteristics is solved using a grey relational analysis. The results of analysis of variance (ANOVA) showed that the major influencing parameters on multi-objective response w
... Show MoreUsing remote sensing technology and modeling methodologies to monitor changes in land surface temperature (LST) and urban heat islands (UHI) has become an essential reference for making decisions on sustainable land use. This study estimates LST and UHI in Salah al-din Province to contribute to land management, Urban planning, or climate resilience in the region; as a result of environmental changes in recent years, LANDSAT Satellite Imagery from 2014- 2024 was implemented to estimate the LST and UHI indexes in Salah al-din Province, ArcGIS 10.7 was use to calculate the indices, and The normalized mean vegetation index (NDVI) was calculated as it is closely related to extracting (LST
In the digital age, protecting intellectual property and sensitive information against unauthorized access is of paramount importance. While encryption helps keep data private and steganography hides the fact that data are present, using both together makes the security much stronger. This paper introduces a new way to hide encrypted text inside color images by integrating discrete wavelet transform (DWT), discrete cosine transform (DCT), and singular value decomposition (SVD), along with AES-GCM encryption, to guarantee data integrity and authenticity. The proposed method operates in the YCbCr color space, targeting the luminance (Y) channel to preserve perceptual quality. Embedding is performed within the HL subband obtained from DWT deco
... Show MoreImage quality plays a vital role in improving and assessing image compression performance. Image compression represents big image data to a new image with a smaller size suitable for storage and transmission. This paper aims to evaluate the implementation of the hybrid techniques-based tensor product mixed transform. Compression and quality metrics such as compression-ratio (CR), rate-distortion (RD), peak signal-to-noise ratio (PSNR), and Structural Content (SC) are utilized for evaluating the hybrid techniques. Then, a comparison between techniques is achieved according to these metrics to estimate the best technique. The main contribution is to improve the hybrid techniques. The proposed hybrid techniques are consisting of discrete wavel
... Show MoreWith the rapid development of computers and network technologies, the security of information in the internet becomes compromise and many threats may affect the integrity of such information. Many researches are focused theirs works on providing solution to this threat. Machine learning and data mining are widely used in anomaly-detection schemes to decide whether or not a malicious activity is taking place on a network. In this paper a hierarchical classification for anomaly based intrusion detection system is proposed. Two levels of features selection and classification are used. In the first level, the global feature vector for detection the basic attacks (DoS, U2R, R2L and Probe) is selected. In the second level, four local feature vect
... Show MoreIndicative supervision represents the comparison between direct intervention (acquisition, nationalism) and participation through rules.
The last financial crisis reflected our needs for different approaches of supervision consist with our goals, but the crisis reveals also number of sounds requested and pressured toward direct control (Intervention via forces) through government acquisition and nationalization.
This study attempts to deal with crisis lessons, in the field of choice between indicative and direct supervision which government authorities used to reduce the bad effect on the monetary firms.
Iraqi banks suffered from high levels of direct co
... Show More