Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing applied the uniform and the variable interaction strength, however, there is still a lack of work addressing IOR. In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. The result of applying the Jaya algorithm in input-output based combinatorial testing is acceptable since it produces a nearly optimum number of test cases in a satisfactory time range.
This paper presents a new design of a nonlinear multi-input multi-output PID neural controller of the active brake steering force and the active front steering angle for a 2-DOF vehicle model based on modified Elman recurrent neural. The goal of this work is to achieve the stability and to improve the vehicle dynamic’s performance through achieving the desired yaw rate and reducing the lateral velocity of the vehicle in a minimum time period for preventing the vehicle from slipping out the road curvature by using two active control actions: the front steering angle and the brake steering force. Bacterial forging optimization algorithm is used to adjust the parameters weights of the proposed controller. Simulation resul
... Show MoreSteganography is the art of secret communication. Its purpose is to hide the presence of information, using, for example, images as covers. The frequency domain is well suited for embedding in image, since hiding in this frequency domain coefficients is robust to many attacks. This paper proposed hiding a secret image of size equal to quarter of the cover one. Set Partitioning in Hierarchal Trees (SPIHT) codec is used to code the secret image to achieve security. The proposed method applies Discrete Multiwavelet Transform (DMWT) for cover image. The coded bit stream of the secret image is embedded in the high frequency subbands of the transformed cover one. A scaling factors ? and ? in frequency domain control the quality of the stego
... Show MoreThe research aims to analyze the impact of exchange rate fluctuations (EXM and EXN) and inflation (INF) on the gross domestic product (GDP) in Iraq for the period 1988-2020. The research is important by analyzing the magnitude of the macroeconomic and especially GDP effects of these variables, as well as the economic effects of exchange rates on economic activity. The results of the standard analysis using the ARDL model showed a long-term equilibrium relationship, according to the Bound Test methodology, from explanatory (independent) variables to the internal (dependent) variable, while the value of the error correction vector factor was negative and moral at a level less than (1%). The relationship bet
... Show MoreIn this paper, a cognitive system based on a nonlinear neural controller and intelligent algorithm that will guide an autonomous mobile robot during continuous path-tracking and navigate over solid obstacles with avoidance was proposed. The goal of the proposed structure is to plan and track the reference path equation for the autonomous mobile robot in the mining environment to avoid the obstacles and reach to the target position by using intelligent optimization algorithms. Particle Swarm Optimization (PSO) and Artificial Bee Colony (ABC) Algorithms are used to finding the solutions of the mobile robot navigation problems in the mine by searching the optimal paths and finding the reference path equation of the optimal
... Show MoreBackground: Cardiopulmonary resuscitation (CPR) is a technique or procedure that combined chest compression and rescue breathing to maintain enough circulation that prevents brain damage until other essential steps are taken to control the main cause of cardiac and respiratory arrest. The health care personnel should be qualified in the performing of cardiopulmonary resuscitation (CPR) to improve the survival rate of the victims. Therefore; it is necessary to use new methods for learning [1]. Objectives: the study aims to compare the effectiveness of self-instructional teaching strategy and traditional teaching approach on student’s knowledge toward cardiopulmonary resuscitation. Methods: A randomized comparative trial (RCT) design was ca
... Show MoreWelcome to International Journal of Research in Social Sciences & Humanities (IJRSSH). It is an international refereed journal of Social Sciences, Humanities & Linguistics in English published quarterly, both print and online.
In this paper we deal with the problem of ciphering and useful from group isomorphism for construct public key cipher system, Where construction 1-EL- Gamal Algorithm. 2- key- exchange Algorithm
One of topics that occupied alarge area in Iraqi society at the moment is the issue( of tribal separation and its relation to the organization of the community ) so we see in the civilizations and heritage of each community aset of provisions and laws that take the form of status customary or religious it is indicative of the great interest in Iraqi society in cotrolling the behavior of individuals to comply with values and social laws and become their behavior is consistent with the behavior of the total and adhere to the social values and be productive individuals within the subject and this can only be achieved from the social co
... Show MoreBackground: Peripheral giant cell lesion (PGCL) and central giant cell lesion (CGCL) of the jaws have a distinct clinical behavior.Giant cell tumour (GCT) is a benign locally aggressive neoplasm affects the long bones. Both lesions are characterized histologically by multinucleated giant cells in a background of ovoid to spindle-shaped mesenchymal cells. The WW domain-containing oxidoreductase (WWOX) gene is located at 16q23.1–16q23.2, a region that spans the second most common human fragile site, FRA16D, at 16q23.2.The Ki-67 antigen is a nuclear protein that is associated with and may be necessary for cellular proliferation.Ki-67 protein is present during all active phases of the cell cycle (G1, S, G2, and mitosis), but is absent fr
... Show MoreThe continuous advancement in the use of the IoT has greatly transformed industries, though at the same time it has made the IoT network vulnerable to highly advanced cybercrimes. There are several limitations with traditional security measures for IoT; the protection of distributed and adaptive IoT systems requires new approaches. This research presents novel threat intelligence for IoT networks based on deep learning, which maintains compliance with IEEE standards. Interweaving artificial intelligence with standardization frameworks is the goal of the study and, thus, improves the identification, protection, and reduction of cyber threats impacting IoT environments. The study is systematic and begins by examining IoT-specific thre
... Show More