In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement different history-based TCP techniques. The second objective is to explore the problem of equal priority in history-based TCP techniques. The third objective is to explore random sorting as a solution to the problem of equal priority in history-based TCP techniques. Datasets of historical records of test cases from conventional and modern sources were collected. History-based TCP techniques were applied to different datasets. The History-based TCP techniques were checked for the problem of equal priority. Then random sorting was used as a solution to the problem of equal priority. Finally, the results were elaborated in terms of APFD and execution time. The results indicate that history-based techniques also suffer from the problem of equal priority like other types of TCP techniques. Secondly, random sorting does not produce optimal results while trying to solve the problem of equal priority in history-based TCP. Furthermore, random sorting deteriorates the results of history-based TCP techniques when employed to solve the problem of equal priority. One should resort to random sorting if no other solution exists. The decision to choose the best solution requires a cost-benefit analysis keeping in view the context and solution under consideration.
The data preprocessing step is an important step in web usage mining because of the nature of log data, which are heterogeneous, unstructured, and noisy. Given the scalability and efficiency of algorithms in pattern discovery, a preprocessing step must be applied. In this study, the sequential methodologies utilized in the preprocessing of data from web server logs, with an emphasis on sub-phases, such as session identification, user identification, and data cleansing, are comprehensively evaluated and meticulously examined.
This study focused on a fundamental issue which was represented by ability of Iraqi central bank in facing the difficulty of determining the optimal ratio of liquidity in the Iraqi banks in terms of the balancing between its obligations to the depositors and borrowers, and liquidate their funds on one hand and the risks on the other hand.the search aimed for achieving the goals which represented by identifying the possibility of Iraqi banks to apply the regulations rules and instructions issued by central bank of Iraq in determining ratio of liquidity and its appropriate with Iraqi banks action to implement a reasonable profit to&
... Show MoreThis research aims to solve the nonlinear model formulated in a system of differential equations with an initial value problem (IVP) represented in COVID-19 mathematical epidemiology model as an application using new approach: Approximate Shrunken are proposed to solve such model under investigation, which combines classic numerical method and numerical simulation techniques in an effective statistical form which is shrunken estimation formula. Two numerical simulation methods are used firstly to solve this model: Mean Monte Carlo Runge-Kutta and Mean Latin Hypercube Runge-Kutta Methods. Then two approximate simulation methods are proposed to solve the current study. The results of the proposed approximate shrunken methods and the numerical
... Show MoreSecured multimedia data has grown in importance over the last few decades to safeguard multimedia content from unwanted users. Generally speaking, a number of methods have been employed to hide important visual data from eavesdroppers, one of which is chaotic encryption. This review article will examine chaotic encryption methods currently in use, highlighting their benefits and drawbacks in terms of their applicability for picture security.
Praise be to God, who started his book with the praise of himself and prayers and peace be upon those who have no prophet after him and his family and companions and those who followed them with charity until the Day of Judgment.
For it is known to every researcher in jurisprudence and its origins that the semantics in terms of formulas for assignment are divided into an order and a prohibition, and I have seen it necessary to write a small research on the prohibition, and since this topic is complex, and has a great impact on the difference of scholars, I decided to write on one issue of it And it is the absolute prohibition and its effect on the difference of jurists, and what is meant by the absolute p
This study included the estimation of growth rate, viability and morphological changes in different culture media (NNN, P-Y, RPMI- 1640, and Panmed). Promastigotes cultured in RPMI-1640 showed maximal growth rate after (2, 4, 6) days of cultivation (27.26 ± 0.05), (172.20 ± 0.1) and (343.81 ± 1.48) million parasites / ml for each day respectively, while P-Y media gave the highest mean of growth rat after (8 and 10) days of cultivation (307.16 ± 1.67) and (303.5 ± 4.96) million parasites / ml for each day respectively. P-Y medium showed the maximal percentage of viability after (2, 4, 6, 8, and 10) days of cultivation (99.76 ± 0.5) %, (98.30 ± 0.17) %, (96.1 ± 0.1) %, (92.5 ± 0.52) % and (87.26 ± 0.05) % for each day respectively.
... Show More
Background: the oral cavity is consider to be an open ecosystem, with the balance between the microorganism’s entrance and the defenses of the host. The initiation of periodontitis has been associated with restricted kinds of anaerobic bacteria, such as Aggregatibacter actinomycetemcomitans (A.a) and Porphyromonas gingivalis (P.g) in plaque subgingivally. Ozone has a biological effects on bacteria due to oxidation of bio-molecules and its toxins. The aim is to determine and compare the antimicrobial effect of gaseous ozone and ozonized water on the growth of isolated anaerobic bacteria (A.a and P.g) when exposed to different time intervals. Materials and methods:This experiment is done byozone generator OLYMPIC- III(600mg/hr) to gene
... Show More