Preferred Language
Articles
/
eBZxBocBVTCNdQwCxy-h
TWGH: A Tripartite Whale–Gray Wolf–Harmony Algorithm to Minimize Combinatorial Test Suite Problem
...Show More Authors

Today’s academics have a major hurdle in solving combinatorial problems in the actual world. It is nevertheless possible to use optimization techniques to find, design, and solve a genuine optimal solution to a particular problem, despite the limitations of the applied approach. A surge in interest in population-based optimization methodologies has spawned a plethora of new and improved approaches to a wide range of engineering problems. Optimizing test suites is a combinatorial testing challenge that has been demonstrated to be an extremely difficult combinatorial optimization limitation of the research. The authors have proposed an almost infallible method for selecting combinatorial test cases. It uses a hybrid whale–gray wolf optimization algorithm in conjunction with harmony search techniques. Test suite size was significantly reduced using the proposed approach, as shown by the analysis of the results. In order to assess the quality, speed, and scalability of TWGH, experiments were carried out on a set of well-known benchmarks. It was shown in tests that the proposed strategy has a good overall strong reputation test reduction size and could be used to improve performance. Compared with well-known optimization-based strategies, TWGH gives competitive results and supports high combinations (2 ≤ t ≤ 12).

Scopus Clarivate Crossref
View Publication
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Arobust Hotelling-T2 test"
...Show More Authors

This research work as an attempt has been made to find robust estimations for Hotelling-T2 test when the data is from amultivariate normal distribution and the sample of the multivariate contain outliers also this research gives an easily high breakdown point robust consistent estimators of multivariate location and dispersion for multivariate analysis by using two types of robust estimators, of these methods are minimum covariance determinant estimator and reweighted minimum covariance determinant estimator.

View Publication Preview PDF
Crossref
Publication Date
Mon Jun 01 2009
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the Shapiro-Wilk test Jureckova test using simulation and multiple distributions
...Show More Authors

 إن المقصود باختبارات حسن المطابقة هو التحقق من فرضية العدم القائمة على تطابق مشاهدات أية عينة تحت الدراسة لتوزيع احتمالي معين وترد مثل هكذا حالات في التطبيق العملي بكثرة وفي كافة المجالات وعلى الأخص بحوث علم الوراثة والبحوث الطبية والبحوث الحياتية ,عندما اقترح كلا من   Shapiro والعالم Wilk  عام 1965 اختبار حسن المطابقة الحدسي مع معالم القياس
(

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 02 2018
Journal Name
Journal Of The Faculty Of Medicine Baghdad
Serological markers “CEA test & sAPRIL test” in Iraqi patients with colon cancer
...Show More Authors

Background: Colonic cancer is a very common disease world-wide being fourth most common cancer characterized by abnormal proliferation of the inner wall of colon then taking full colon wall thickness then spreading to surrounding lymph nodes and tissues and finally distant metastasis. It is one of most complicated diseases with debilitating symptoms which becomes more sever , prominent and specific with advancing stage with high percent of fatality and relatively short survival if diagnosed late or if left untreated.Objective: To evaluate the efficacy of serum CEA & sAPRIL levels in the diagnosis and screening of colon cancer and their validity for this.Patients and methods: This study was applied on 35 patients with colonic can

... Show More
View Publication
Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
Critical Thinking Skills of A’Sharqiah University Students According to California Critical Thinking Skills Test and Its Relationship to Some Variables
...Show More Authors

Abstract

The research aims to measure the level of critical thinking skills among students of A’Sharqiah University in the Sultanate of Oman, as well as identify the level of their availability based on the variables: gender, academic level, school year, cumulative average, and general diploma / high school ratio. The researchers used the descriptive approach. To achieve the objectives of the study, they used The California Test for Critical Thinking Skills Picture (A) after evaluation (Farraj, 2006). It was applied to a sample of (487) students from A’sharqiah University. The results of the study found that the critical thinking skills of A’sharqiah University students are below the educationally acceptabl

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Economics And Administrative Sciences
Comparison of the method of partial least squares and the algorithm of singular values decomposion to estimate the parameters of the logistic regression model in the case of the problem of linear multiplicity by using the simulation
...Show More Authors

The logistic regression model is an important statistical model showing the relationship between the binary variable and the explanatory variables.                                                        The large number of explanations that are usually used to illustrate the response led to the emergence of the problem of linear multiplicity between the explanatory variables that make estimating the parameters of the model not accurate.    

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Feb 23 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
A Training Program According to Interactive Teaching Strategies and its Impact on Achievement and Creative Problem Solving for Fourth-Grade Preparatory Students in Chemistry
...Show More Authors

The aim of the research is to know the effect of a training program based on interactive teaching strategies on achievement and creative problem solving among fourth-grade students in chemistry of the directorate of education Rusafa first, the sample was divided into two groups, one experimental and numbering (29) students and the other control group numbering (30) students. The experimental group underwent the training program in the first semester of the year (2021-2022) and the control one studied according to the usual method. Two tools were built, the first being an academic achievement test consisting of (40) multiple-choice items, and the second a test of creative problem-solving skills in a chemistry subject and consisting o

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Honeyword Generation Using a Proposed Discrete Salp Swarm Algorithm
...Show More Authors

Honeywords are fake passwords that serve as an accompaniment to the real password, which is called a “sugarword.” The honeyword system is an effective password cracking detection system designed to easily detect password cracking in order to improve the security of hashed passwords. For every user, the password file of the honeyword system will have one real hashed password accompanied by numerous fake hashed passwords. If an intruder steals the password file from the system and successfully cracks the passwords while attempting to log in to users’ accounts, the honeyword system will detect this attempt through the honeychecker. A honeychecker is an auxiliary server that distinguishes the real password from the fake passwords and t

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Wed Jan 01 2020
Journal Name
Aip Conference Proceedings
Developing a lightweight cryptographic algorithm based on DNA computing
...Show More Authors

This work aims to develop a secure lightweight cipher algorithm for constrained devices. A secure communication among constrained devices is a critical issue during the data transmission from the client to the server devices. Lightweight cipher algorithms are defined as a secure solution for constrained devices that require low computational functions and small memory. In contrast, most lightweight algorithms suffer from the trade-off between complexity and speed in order to produce robust cipher algorithm. The PRESENT cipher has been successfully experimented on as a lightweight cryptography algorithm, which transcends other ciphers in terms of its computational processing that required low complexity operations. The mathematical model of

... Show More
Crossref (7)
Crossref
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Kufa For Mathematics And Computer
Hiding a Secret Message Encrypted by S-DES Algorithm
...Show More Authors

Nowadays, it is quite usual to transmit data through the internet, making safe online communication essential and transmitting data over internet channels requires maintaining its confidentiality and ensuring the integrity of the transmitted data from unauthorized individuals. The two most common techniques for supplying security are cryptography and steganography. Data is converted from a readable format into an unreadable one using cryptography. Steganography is the technique of hiding sensitive information in digital media including image, audio, and video. In our proposed system, both encryption and hiding techniques will be utilized. This study presents encryption using the S-DES algorithm, which generates a new key in each cyc

... Show More
View Publication
Crossref
Publication Date
Mon May 11 2020
Journal Name
Baghdad Science Journal
A Cryptosystem for Database Security Based on TSFS Algorithm
...Show More Authors

Implementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.

View Publication Preview PDF
Scopus (7)
Crossref (2)
Scopus Clarivate Crossref