To ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and compare it to the results obtained from the various methodologies. TWGH was shown to be a demonstration of scalability in studies involving speedups. When the recommended method was implemented, the rate of acceleration increased by eight.
In today's digital era, the importance of securing information has reached critical levels. Steganography is one of the methods used for this purpose by hiding sensitive data within other files. This study introduces an approach utilizing a chaotic dynamic system as a random key generator, governing both the selection of hiding locations within an image and the amount of data concealed in each location. The security of the steganography approach is considerably improved by using this random procedure. A 3D dynamic system with nine parameters influencing its behavior was carefully chosen. For each parameter, suitable interval values were determined to guarantee the system's chaotic behavior. Analysis of chaotic performance is given using the
... Show MoreIncreased downscaling of CMOS circuits with respect to feature size and threshold voltage has a result of dramatically increasing in leakage current. So, leakage power reduction is an important design issue for active and standby modes as long as the technology scaling increased. In this paper, a simultaneous active and standby energy optimization methodology is proposed for 22 nm sub-threshold CMOS circuits. In the first phase, we investigate the dual threshold voltage design for active energy per cycle minimization. A slack based genetic algorithm is proposed to find the optimal reverse body bias assignment to set of noncritical paths gates to ensure low active energy per cycle with the maximum allowable frequency at the optimal supply vo
... Show MoreBackground: Legionella pneumophila (L. pneumophila) is gram-negative bacterium, which causes Legionnaires’ disease as well as Pontiac fever. Objective: To determine the frequency of Legionella pneumophila in pneumonic patients, to determine the clinical utility of diagnosing Legionella pneumonia by urinary antigen testing (LPUAT) in terms of sensitivity and specificity, to compares the results obtained from patients by urinary antigen test with q Real Time PCR (RT PCR) using serum samples and to determine the frequency of serogroup 1 and other serogroups of L. pneumophila. Methods: A total of 100 pneumonic patients (community acquired pneumonia) were enrolled in this study during a period between October 2016 to April 2017; 92 sam
... Show MoreAbstract
In this work, two algorithms of Metaheuristic algorithms were hybridized. The first is Invasive Weed Optimization algorithm (IWO) it is a numerical stochastic optimization algorithm and the second is Whale Optimization Algorithm (WOA) it is an algorithm based on the intelligence of swarms and community intelligence. Invasive Weed Optimization Algorithm (IWO) is an algorithm inspired by nature and specifically from the colonizing weeds behavior of weeds, first proposed in 2006 by Mehrabian and Lucas. Due to their strength and adaptability, weeds pose a serious threat to cultivated plants, making them a threat to the cultivation process. The behavior of these weeds has been simulated and used in Invas
... Show MoreDue to the popularity of radar, receivers often “hear” a great number of other transmitters in
addition to their own return merely in noise. The dealing with the problem of identifying and/or
separating a sum of tens of such pulse trains from a number of different sources are often received on
the one communication channel. It is then of interest to identify which pulses are from which source,
based on the assumption that the different sources have different characteristics. This search deals with a
graphical user interface (GUI) to generate the radar pulse in order to use the required radar signal in any
specified location.
The traditional technique of generating MPSK signals is basically to use IQ modulator that involves analog processing like multiplication and addition where inaccuracies may exist and would lead to imbalance problems that affects the output modulated signal and hence the overall performance of the system. In this paper, a simple method is presented for generating the MPSK using logic circuits that basically generated M-carrier signals each carrier of different equally spaced phase shift. Then these carriers are time multiplexed, according to the data symbols, into the output modulated signal.
Vol. 6, Issue 1 (2025)
Municipal solid waste generation in Babylon Governorate is often affected by changes in lifestyles, population growth, social and cultural habits and improved economic conditions. This effect will make it difficult to plan and draw up future plans for solid waste management.In this study, municipal solid waste was divided into residential and commercial solid wastes. Residential solid wastes were represented by household wastes, while commercial solid wastes included commercial, institutional and municipal services wastes.For residential solid wastes, the relational stratified random sampling was implemented, that is the total population should be divided into clusters (socio-income level), a random sample was taken in e
... Show More