In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement different history-based TCP techniques. The second objective is to explore the problem of equal priority in history-based TCP techniques. The third objective is to explore random sorting as a solution to the problem of equal priority in history-based TCP techniques. Datasets of historical records of test cases from conventional and modern sources were collected. History-based TCP techniques were applied to different datasets. The History-based TCP techniques were checked for the problem of equal priority. Then random sorting was used as a solution to the problem of equal priority. Finally, the results were elaborated in terms of APFD and execution time. The results indicate that history-based techniques also suffer from the problem of equal priority like other types of TCP techniques. Secondly, random sorting does not produce optimal results while trying to solve the problem of equal priority in history-based TCP. Furthermore, random sorting deteriorates the results of history-based TCP techniques when employed to solve the problem of equal priority. One should resort to random sorting if no other solution exists. The decision to choose the best solution requires a cost-benefit analysis keeping in view the context and solution under consideration.
Of the importance of the concept of ownership of real estate as the basic basis from which various projects are launched in various economic, tourism, and urban areas .... The need to research the diagnosis of real estate reality went astray in the difficulties, which played a decisive role in the process of urban development.
This leads us to the research problem of the difficulty of implementing urban development plans in many cases due to the absence of a clear methodology for organizing and modernizing the ownership of real estate and its coordination with the management of urban land and to achieve the objective
... Show MoreThe research aims to determine what a photograph intends to convey as a visual text. Photographs are not captured randomly, especially those of politicians. Each photograph carries a message, even if interpretations of that message vary from person to person. The research adopts a methodology based on semiotic analysis, applying Laurent Gervero's model to analyze a photograph of the Iraqi Prime Minister Mustafa Al-Kadhimi's visit to Fallujah on the anniversary of the victory over ISIS. The photographs in question constitute a visual language built upon a sequence of iconic symbols and signs. These elements coalesce to give rise to an image centered around a particular theme, one designed to convey a precise messag
... Show MoreThe problem of multi assembly line balancing appears as one of the most prominent and complex type of problem. The research problem of this dissertation is concerned with choosing the suitable method that includes the nature of the processes of the multi assembly type of the sewing line at factory no. (7). The State Company for Leather Manufacturing. The sewing line currently suffers from idle times at work stations which resulted in low production levels that do not meet the production plans. The authors have devised a flexible simulation model which uses the uniform distribution to generate task time for each shoe type produced by the factory. The simulation of the multi assembly line was based on assigni
... Show MoreIn this paper new methods were presented based on technique of differences which is the difference- based modified jackknifed generalized ridge regression estimator(DMJGR) and difference-based generalized jackknifed ridge regression estimator(DGJR), in estimating the parameters of linear part of the partially linear model. As for the nonlinear part represented by the nonparametric function, it was estimated using Nadaraya Watson smoother. The partially linear model was compared using these proposed methods with other estimators based on differencing technique through the MSE comparison criterion in simulation study.
A true random TTL pulse generator was implemented and investigated for quantum key distribution systems. The random TTL signals are generated by low cost components available in the local markets. The TTL signals are obtained by using true random binary sequences based on registering photon arrival time difference registered in coincidence windows between two single – photon detectors. The true random TTL pulse generator performance was tested by using time to digital converters which gives accurate readings for photon arrival time. The proposed true random pulse TTL generator can be used in any quantum -key distribution system for random operation of the transmitters for these systems
The tax revenues achieved through projects of transition to private sector are regarded as an important source for using in achieving political, economic and social objectives. Since Iraq is heading towards free market economy, new strategies should be adopted to reform the taxation system from by a qualified taxation management office and to activate the taxation policy and to reconsider legislation in relation to the aware of the legible to the importance of disclosure of their taxable real income in order to arrive at contribution of privatization in the taxation revenues for the important role effect on economic activities. In the light of the above, the research is based upon a hypothesis which stipulates that privatization contribu
... Show MoreA simple all optical fiber sensor based on multimode interference (MMI) for chemical liquids sensing was designed and fabricated. A segment of coreless fiber (CF) was spliced between two single mode fibers to buildup single mode-coreless-single mode (SCS) structure. Broadband source and optical signal analyzer were connected to the ends of SCS structure. De-ionized water, acetone, and n-hexane were used to test the performance of the sensor. Two influence factors on the sensitivity namely the length and the diameter of the CF were investigated. The obtained maximum sensitivity was at n-hexane at 340.89 nm/RIU (at a wavelength resolution of the optical spectrum analyzer of 0.02 nm) when the diameter of the CF reduced from 125 μm to 60 μ
... Show MoreThere has been a growing interest in the use of chaotic techniques for enabling secure communication in recent years. This need has been motivated by the emergence of a number of wireless services which require the channel to provide very low bit error rates (BER) along with information security. As more and more information is transacted over wireless media, there has been increasing criminal activity directed against such systems. This paper investigates the feasibility of using chaotic communications over Multiple-Input-Multiple-Output (MIMO) channels. We have studied the performance of differential chaos shift keying (DCSK) with 2×2 Alamouti scheme and 2×1 Alamouti scheme for different chaotic maps over additive white Gaussian noise (
... Show MoreDigital tampering identification, which detects picture modification, is a significant area of image analysis studies. This area has grown with time with exceptional precision employing machine learning and deep learning-based strategies during the last five years. Synthesis and reinforcement-based learning techniques must now evolve to keep with the research. However, before doing any experimentation, a scientist must first comprehend the current state of the art in that domain. Diverse paths, associated outcomes, and analysis lay the groundwork for successful experimentation and superior results. Before starting with experiments, universal image forensics approaches must be thoroughly researched. As a result, this review of variou
... Show MoreCertain bacterial and viral infectious agents may play a role in the activation of inflammation in atherosclerosis lesions. Epidemiological studies indicate that infectious agents may predispose patients to atherosclerosis as Infections have been associated with an increased risk of this disease. Moreover, a positive antibody status has been detected against some infectious organisms associated with atherosclerotic rupture. Infectious agents found in human atheroma, which may directly cause or accelerate atherosclerosis , include many pathogens but the present study focused on Helicobacter pylori, hepatitis B virus surface antigen and C. In order to evaluate the possible association between H. pylori, HBV, and HCV infections and the risk of
... Show More