Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing applied the uniform and the variable interaction strength, however, there is still a lack of work addressing IOR. In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. The result of applying the Jaya algorithm in input-output based combinatorial testing is acceptable since it produces a nearly optimum number of test cases in a satisfactory time range.
in this paper the notion of threshold relations by using resemblance relation are introduced to get a similarity relation from a resemnblance relation R
The research aims mainly to the role of the statement style costs on the basis of activity based on performance (PFABC) to reduce production cost and improve the competitive advantage of economic units and industrial under the modern business environment dominated by a lot of developments and changes rapidly, which necessitates taking them and criticize them to ensure survival and continuity. The research problem is the inability of traditional cost methods of providing useful information to the departments of units to take many administrative decisions, particularly decisions related to the product and calculating the costs of the quality of the sound and the availability of the need and the ability to replace methods capa
... Show MoreThis paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreAnal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm
Wireless Sensor Networks (WSNs) are promoting the spread of the Internet for devices in all areas of
life, which makes it is a promising technology in the future. In the coming days, as attack technologies become
more improved, security will have an important role in WSN. Currently, quantum computers pose a significant
risk to current encryption technologies that work in tandem with intrusion detection systems because it is
difficult to implement quantum properties on sensors due to the resource limitations. In this paper, quantum
computing is used to develop a future-proof, robust, lightweight and resource-conscious approach to sensor
networks. Great emphasis is placed on the concepts of using the BB8
In this work the corrosion behavior of Al metal was studied by using non- destructive testing (NDT), which is a noninvasive technique for determining the integrity of a material. The ultrasonic waves was used to measure the corrosion which occur by two corrosive medium (0.1N sodium chloride and 0.1N sodium hydroxide) and study the corrosion by weight-loss method and electrochemical method in addition to performance the microscopic inspection for the samples before and after the immersion in the corrosive medium. Corrosion parameters were interpreted in these media which involve corrosion potential (Ecorr) and corrosion current density (icorr). The results indicate that both
... Show MoreManual probing and periodontal charting are the gold standard for periodontal diagnosis that have been used in practice over a century. These methods are affordable and reliable but they are associated with some drawbacks that cannot be avoided. Among these issues is their reliance on operator’s skills, time-consuming and tedious procedure, lack sensitivity especially in cases of early bone loss, and causing discomfort to the patient. Availability of a wide range of biomarkers in the oral biofluids, dental biofilm, and tissues that potentially reflect the periodontal health and disease accurately encouraged their use as predictive/diagnostic/monitoring tools. Analysing biomarkers during care-giving to the patient using chairside kits i
... Show MoreIn this study, the four tests employed for non-linear dependence which is Engle (1982), McLeod &Li (1983), Tsay (1986), and Hinich & Patterson (1995). To test the null hypothesis that the time series is a serially independent and identical distribution process .The linear structure is removed from the data which is represent the sales of State Company for Electrical Industries, through a pre-whitening model, AR (p) model .From The results for tests to the data is not so clear.
The deep learning algorithm has recently achieved a lot of success, especially in the field of computer vision. This research aims to describe the classification method applied to the dataset of multiple types of images (Synthetic Aperture Radar (SAR) images and non-SAR images). In such a classification, transfer learning was used followed by fine-tuning methods. Besides, pre-trained architectures were used on the known image database ImageNet. The model VGG16 was indeed used as a feature extractor and a new classifier was trained based on extracted features.The input data mainly focused on the dataset consist of five classes including the SAR images class (houses) and the non-SAR images classes (Cats, Dogs, Horses, and Humans). The Conv
... Show More