The application of the test case prioritization method is a key part of system testing intended to think it through and sort out the issues early in the development stage. Traditional prioritization techniques frequently fail to take into account the complexities of big-scale test suites, growing systems and time constraints, therefore cannot fully fix this problem. The proposed study here will deal with a meta-heuristic hybrid method that focuses on addressing the challenges of the modern time. The strategy utilizes genetic algorithms alongside a black hole as a means to create a smooth tradeoff between exploring numerous possibilities and exploiting the best one. The proposed hybrid algorithm of genetic black hole (HGBH) uses the capabilities of considering the imperatives such as code coverage, fault finding rate and execution time from search algorithms in our hybrid approach to refine test cases considerations repetitively. The strategy accomplished this by putting experiments on a large-scale project of industrial software developed. The hybrid meta-heuristic technique ends up being better than the routine techniques. It helps in higher code coverage, which, in turn, enables to detect crucial defects at an early stage and also to allocate the testing resources in a better way. In particular, the best APFD value was 0.9321, which was achieved in 6 generations with 4.879 seconds the value to which the computer was run. Besides these, , the approach resulted in the mean value of APFD as 0.9247 and 0.9302 seconds which took from 10.509 seconds to 30.372 seconds. The carried out experiment proves the feasibility of this approach in implementing complex systems and consistently detecting the changes, enabling it to adapt to rapidly changing systems. In the end, this research provides us with a new hybrid meta-heuristic way of test case prioritization and optimization, which, in turn, helps to tackle the obstacles caused by large-scale test cases and constantly changing systems.
The aim of this research is to show the importance of the effective use
of the internet in academic libraries; to improve the services and to increase
the competence of librarians.
The research has given some recommendations to improve the quality
of services and the need for cooperative network among academic libraries.
HTH Ali Tarik Abdulwahid , Ahmed Dheyaa Al-Obaidi , Mustafa Najah Al-Obaidi, eNeurologicalSci, 2023
Conflict, peace, and sports have a long history as practical realities, and their correlation has become an important subject of study in the last decades of the twentieth century. Sport has infiltrated peace and conflict studies as a tool for resolving conflict and building peace, but opinions have differed between those who say it is a positive tool and others who see it as negative. The Gulf Cup is one of the champions that have never been studied, and in-depth research about it has not been done. This tournament has affected the relations between the states involved. The politics cast its shadow on the Gulf Cup. The paper aims to shed light on how political events in the region have consistently affected the Gulf Cup and how politics in
... Show MoreReliable estimation of critical parameters such as hydrocarbon pore volume, water saturation, and recovery factor are essential for accurate reserve assessment. The inherent uncertainties associated with these parameters encompass a reasonable range of estimated recoverable volumes for single accumulations or projects. Incorporating this uncertainty range allows for a comprehensive understanding of potential outcomes and associated risks. In this study, we focus on the oil field located in the northern part of Iraq and employ a Monte Carlo based petrophysical uncertainty modeling approach. This method systematically considers various sources of error and utilizes effective interpretation techniques. Leveraging the current state of a
... Show MoreThe importance of the construction sector and its Great role in the provision of services and infrastructure, reduce poverty, improve living conditions and improve the economic situation in the country, impose attention to the way in which the projects implemented for its improvement and to get successful projects. The objective of this research was to determine the criteria for success as well as critical success and failure factors that have a significant impact on project success. A selected 75 engineer (department managers, project managers and engineers) are asked to fill the questionnaire form, Sixty-seven valid questionnaire forms were analyzed statistically to get search results, which were as follows : Twe
... Show MoreThe problem of the paper focused on the role of the learning organization in the crisis management strategy, and the extent of the actual interest in both the learning organization and the crisis management and aimed at diagnosing and analyzing that and surrounding questions. The Statistical Package for the Social Sciences (SPSS) program was used to calculate the results and the correlation coefficient between the two main variables. The methodology was descriptive and analytical. The case study was followed by a questionnaire that was distributed to a sample of 31 teachers. The paper adopted a seven-dimensional model of systemic thinking that encourages questioning, empowerment, provision of advanced technologies, and strategic lea
... Show MoreCentral and Eastern European Online Library - CEE journals, documents, articles, periodicals, books available online for download, Zeitschrfitendatenbank, Online Zeitschriften, Online Zeitschriftendatenbank
The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le
... Show MoreIn this paper, an algorithm for reconstruction of a completely lost blocks using Modified
Hybrid Transform. The algorithms examined in this paper do not require a DC estimation
method or interpolation. The reconstruction achieved using matrix manipulation based on
Modified Hybrid transform. Also adopted in this paper smart matrix (Detection Matrix) to detect
the missing blocks for the purpose of rebuilding it. We further asses the performance of the
Modified Hybrid Transform in lost block reconstruction application. Also this paper discusses
the effect of using multiwavelet and 3D Radon in lost block reconstruction.
The vast advantages of 3D modelling industry have urged competitors to improve capturing techniques and processing pipelines towards minimizing labour requirements, saving time and reducing project risk. When it comes to digital 3D documentary and conserving projects, laser scanning and photogrammetry are compared to choose between the two. Since both techniques have pros and cons, this paper approaches the potential issues of individual techniques in terms of time, budget, accuracy, density, methodology and ease to use. Terrestrial laser scanner and close-range photogrammetry are tested to document a unique invaluable artefact (Lady of Hatra) located in Iraq for future data fusion sc