<p>In combinatorial testing development, the fabrication of covering arrays is the key challenge by the multiple aspects that influence it. A wide range of combinatorial problems can be solved using metaheuristic and greedy techniques. Combining the greedy technique utilizing a metaheuristic search technique like hill climbing (HC), can produce feasible results for combinatorial tests. Methods based on metaheuristics are used to deal with tuples that may be left after redundancy using greedy strategies; then the result utilization is assured to be near-optimal using a metaheuristic algorithm. As a result, the use of both greedy and HC algorithms in a single test generation system is a good candidate if constructed correctly. This study presents a hybrid greedy hill climbing algorithm (HGHC) that ensures both effectiveness and near-optimal results for generating a small number of test data. To make certain that the suggested HGHC outperforms the most used techniques in terms of test size. It is compared to others in order to determine its effectiveness. In contrast to recent practices utilized for the production of covering arrays (CAs) and mixed covering arrays (MCAs), this hybrid strategy is superior since allowing it to provide the utmost outcome while reducing the size and limit the loss of unique pairings in the CA/MCA generation.</p>
The effects of Internet use on university’s students:The effects of Internet use on university’s students:“A Study on a Sample of Jordanian University’s students "This survey aims to identify the most important effects of Internet use on Jordanian public and private universities’ students by monitoring and analyzing a set of indicators that show the quality of the effects on specific fields such as cultural, social, psychological, moral and political effects .To achieve these goals, the study attempts to answer the following questions:1. What are the effects of Internet’s use on students?2. What is the relationship between the effects and demographic variables such as gender, age, family size an
... Show MoreRestoration of degraded lands by adoption of recommended conservation management practices can rehabilitate watersheds and lead to improving soil and water quality. The objective was to evaluate the effects of grass buffers (GBs), biomass crops (BCs), grass waterways (GWWs), agroforestry buffers (ABs), landscape positions, and distance from tree base for AB treatment on soil quality compared with row crop (RC) (corn [
The research aims to identify the role of strategic improvisation as an independent variable with its dimensions (Building the Solution, Intuition, Adaptation, and Spontaneity) and the Entrepreneurial Orientation as a dependent variable with its dimensions (Identifying Opportunities, Creativity, Adopting risk, and Vision). This research has been applied in the Rafidain Bank and its branches (Sunk, People, Al-Firdaws, and Alawiya); it used the questionnaire as a basic tool for collecting information. The sample was intentionality, which included all the heads of departments in the bank’s branches, which amounted to (33) workers, and data on the questionnaire paragraphs of 28 were processed using the SPSS V.23 and AMOS V.23). The most impor
... Show MoreDetermining risk indicators for dental implants is an essential strategy for preventing peri-implant diseases and effective diagnosis of dental implant success. To investigate the impact of certain potential factors on the osseointegrated dental implant. Eighty-four individuals were included in our study, 50 cases as a patient’s group and 34 participants as a control group. All cases were diagnosed based on certain criteria, 30 (60%) of patients had peri-implantitis, 20 (40%) with severe periimplantitis, 36(72%) were generalized, and 15 (30%) as localized peri-implantitis cases. The study has indicated that 44.7% of dental implants were in the anterior maxilla, followed by (27.3%) posterior maxilla, (17.4%) posterior mandible, and (10.4%)
... Show MoreThe advent of UNHCR reports has given rise to the uniqueness of its distinctive way of image representation and using semiotic features. So, there are a lot of researches that have investigated UNHCR reports, but no research has examined images in UNHCR reports of displaced Iraqis from a multimodal discourse perspective. The present study suggests that the images are, like language, rich in many potential meanings and are governed by clearly visual grammar structures that can be employed to decode these multiple meanings. Seven images are examined in terms of their representational, interactional and compositional aspects. Depending on the results, this study concludes that the findings support the visual grammar theory and highlight the va
... Show MoreLet R be a 2-torision free prime ring and ?, ?? Aut(R). Furthermore, G: R×R?R is a symmetric generalized (?, ?)-Biderivation associated with a nonzero (?, ?)-Biderivation D. In this paper some certain identities are presented satisfying by the traces of G and D on an ideal of R which forces R to be commutative
When exercising their authority in the jurisprudence, judges are subject to a set of restrictions that they must adhere to, as they do not want their jurisprudence to be accepted and welcomed by law practitioners in general, and legal scholars in particular, and in contrast to it, the arrows of criticism and defamation will extend to that jurisprudence, and then they will have to reverse them . Perhaps the most important of those restrictions imposed on judges is their observance of justice between the parties to the lawsuit through their lack of bias for one of the parties at the expense of the other, in addition to their observance of public order and public morals, as well as their observance of the legal texts that they work under its u
... Show MoreToday, the role of cloud computing in our day-to-day lives is very prominent. The cloud computing paradigm makes it possible to provide demand-based resources. Cloud computing has changed the way that organizations manage resources due to their robustness, low cost, and pervasive nature. Data security is usually realized using different methods such as encryption. However, the privacy of data is another important challenge that should be considered when transporting, storing, and analyzing data in the public cloud. In this paper, a new method is proposed to track malicious users who use their private key to decrypt data in a system, share it with others and cause system information leakage. Security policies are also considered to be int
... Show MoreAn edge dominating set of a graph is said to be an odd (even) sum degree edge dominating set (osded (esded) - set) of G if the sum of the degree of all edges in X is an odd (even) number. The odd (even) sum degree edge domination number is the minimum cardinality taken over all odd (even) sum degree edge dominating sets of G and is defined as zero if no such odd (even) sum degree edge dominating set exists in G. In this paper, the odd (even) sum degree domination concept is extended on the co-dominating set E-T of a graph G, where T is an edge dominating set of G. The corresponding parameters co-odd (even) sum degree edge dominating set, co-odd (even) sum degree edge domination number and co-odd (even) sum degree edge domin
... Show MoreMultilayer reservoirs are currently modeled as a single zone system by averaging the reservoir parameters associated with each reservoir zone. However, this type of modeling is rarely accurate because a single zone system does not account for the fact that each zone's pressure decreases independently. Pressure drop for each zone has an effect on the total output and would result in inter-flow and the premature depletion of one of the zones. Understanding reservoir performance requires a precise estimation of each layer's permeability and skin factor. The Multilayer Transient Analysis is a well-testing technique designed to determine formation properties in more than one layer, and its effectiveness over the past two decades has been
... Show More