To ensure that a software/hardware product is of sufficient quality and functionality, it is essential to conduct thorough testing and evaluations of the numerous individual software components that make up the application. Many different approaches exist for testing software, including combinatorial testing and covering arrays. Because of the difficulty of dealing with difficulties like a two-way combinatorial explosion, this brings up yet another problem: time. Using client-server architectures, this research introduces a parallel implementation of the TWGH algorithm. Many studies have been conducted to demonstrate the efficiency of this technique. The findings of this experiment were used to determine the increase in speed and compare it to the results obtained from the various methodologies. TWGH was shown to be a demonstration of scalability in studies involving speedups. When the recommended method was implemented, the rate of acceleration increased by eight.
Quantum dots of CdSe, CdS and ZnS QDs were prepared by chemical reaction and used to fabricate organic quantum dot hybrid junction device. QD-LEDs were fabricated using ITO/TPD: PMMA/CdSe/Al, ITO/TPD: PMMA/CdS/Al and ITO/TPD: PMMA/ZnS/Al QDs devices which synthesized by phase segregation method. The hybrid white light emitting devices consists, of two-layers deposited successively on the ITO glass substrate; the first layer was of N, N’-bis (3-methylphenyl)-N, N’-bis (phenyl) benzidine (TPD) polymer mixed with polymethyl methacrylate (PMMA) polymers in ratio 1:1, while the second layer was 0.5wt% from each type of the (CdSe, CdS and ZnS) QDs for each device.The optical properties of QDs were characterized by UV-Vis. and photolum
... Show MoreDigital Elevation Model (DEM) is one of the developed techniques for relief representation. The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kri
... Show MoreIn this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u
... Show Moreأثبتت الشبكات المحددة بالبرمجيات (SDN) تفوقها في معالجة مشاكل الشبكة العادية مثل قابلية التوسع وخفة الحركة والأمن. تأتي هذه الميزة من SDN بسبب فصل مستوى التحكم عن مستوى البيانات. على الرغم من وجود العديد من الأوراق والدراسات التي تركز على إدارة SDN، والرصد، والتحكم، وتحسين QoS، إلا أن القليل منها يركز على تقديم ما يستخدمونه لتوليد حركة المرور وقياس أداء الشبكة. كما أن المؤلفات تفتقر إلى مقارنات بين الأدوات والأ
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreThe aim of this research is to compare traditional and modern methods to obtain the optimal solution using dynamic programming and intelligent algorithms to solve the problems of project management.
It shows the possible ways in which these problems can be addressed, drawing on a schedule of interrelated and sequential activities And clarifies the relationships between the activities to determine the beginning and end of each activity and determine the duration and cost of the total project and estimate the times used by each activity and determine the objectives sought by the project through planning, implementation and monitoring to maintain the budget assessed
... Show MoreThis paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show MoreIn order to study the dynamic response of historical masonry structures, a scaled down brick masonry model constructed in civil engineering department at Baghdad University to simulate a part of a real case study, which is Alkifil historic minaret. Most of the previous researches about masonry structures try to understand the behavior of the masonry under seismic loading by experimental and numerical methods. In this paper, the masonry units (bricks) simulated in scale (S= 1/6) with the exact shape of the prototype bricks. Cementitious tile adhesive was selected to be the mortar for the modeling. The height of the model designed to be 1.5 m with a 0.5 m diameter. Detailed construction steps were presented in this paper. Experts buil
... Show MoreIn this study, a chaotic method is proposed that generates S-boxes similar to AES S-boxes with the help of a private key belonging to
In this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the produ
... Show MoreIn this work, an investigation for the dynamic analysis of thin composite cylindrical and spherical shells is presented. The analytical solution is based upon the higher order shear deformation theory of elastic shells from which the developed equations are derived to deal with orthotropic layers. This will cover the determination of the fundamental natural frequencies and mode shapes for simply supported composites cylindrical and spherical shells.
The analytical results obtained by using the derived equations were confirmed by the finite element technique using the well known Ansys package. The results have shown a good agreement with a maximum percentage of discrepancy, which gives a confidence o
... Show More