Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evaluated based on a variety of criteria, including the generation technology, test strategy method, supported interactions, mixed coverage ,and support constraints between parameters. CT analysis had a wide range of interaction assistance options available to researchers. Since 2010, a unified interaction has been the most common style of interaction between the two parties. The year 2018 was hailed as the most successful in terms of CT by researchers. Researchers should focus on one test at a time and metaheuristic search strategies for t-way CT. There has also been a significant increase in the popularity of other trends, such as deep learning (DL). CT appears to be a useful testing technique for balancing and fault detection capabilities for a variety of systems and applications, according to our research. Future research and software development may benefit from this information. Index Terms— Combinatorial Testing, Test Case Generation, Optimization Algorithms, Software Testing, Artificial Intelligent.
This study sought to determine malformation caused by Ochratoxin-A (OTA) on mouse embryos. Twenty adult female white Swiss mice (mus msculus) were divided into four groups, with five females per group, and with one male placed with two females in a cage. Avaginal plug was observed in the early morning and the day of mating was considered as day of pregnancy followed by the first day of pregnancy. Three sub lethal concentrations of OTA were applied to the respective groups (other than the control), 1mg/kg, 2mg/kg and 4mg/kg. The animals were given 0.1 ml per 10 gm body weight per concentration of OTA once a day during days 7-14 of pregnancy. The control group animals were given distilled water. The pregnant mice were dissected, and the embry
... Show MoreOnline communication on social networks has become a never-given-up way of expressing and sharing views and opinions within the realm of all topics on earth, and that is that! A basis essential in this is the limits at which "freedom of expression" should not be trespassed so as not to fall into the expression of "hate speech". These two ends make a base in the UN regulations pertaining to human rights: One is free to express, but not to hate by expression. Hereunder, a Critical Discourse Analysis in terms of Fairclough's dialectical-relational approach (2001) is made of Facebook posts (being made by common people, and not of official nature) targeting Islam and Muslims. This is made so as to recognize these instances of "speech" a
... Show MoreThis paper aims at presenting a comparison between objective and subjective tests . This paper attemptsto shed light on these two aspects of tests and make do a compression by using suitable techniques for objective and subjective tests .
The paper compares between the two techniques used by the objective and subjective tests respectively, the time and efforts required by each type, the extent to which each type can be reliable, and the skills each type is suitable to measure.
The paper shows that objective tests, on the contrary of the subjective ones, encourages guess> Objective tests are used to test specific areas of langua
... Show MoreVariable-Length Subnet Masks (VLSM), often referred to as "subnetting a subnet", is used to maximize addressing efficiency. The network administrator is able to use a long mask on networks with few hosts, and a short mask on subnets with many hosts. This addressing scheme allows growth and does not involve wasting addresses. VLSM gives a way of subnetting a network with
minimal loses of IP addresses for a specific range. Unfortunately, the network administrator has to perform several mathematical steps (or use charts) to get the required results from VLSM. In this paper, a simple graph simulator is proposed (using Visual Basic 6.0 Language) to perform all the required mathematical steps and to display the obtained required informatio
The aim of this paper is to translate the basic properties of the classical complete normed algebra to the complete fuzzy normed algebra at this end a proof of multiplication fuzzy continuous is given. Also a proof of every fuzzy normed algebra without identity can be embedded into fuzzy normed algebra with identity and is an ideal in is given. Moreover the proof of the resolvent set of a non zero element in complete fuzzy normed space is equal to the set of complex numbers is given. Finally basic properties of the resolvent space of a complete fuzzy normed algebra is given.
An indoor spraying robot is built in this research to solve numerous challenges associated with manual spraying. The mechanical, hardware and essential technologies used are all detailed and designed. The proposed spraying robot's conceptual design is split into two parts: hardware and software. The mechanical design, manufacturing, electrical, and electronics systems are described in the hardware part, while the control of the robot is described in the software section. This robot's kinematic and dynamic models were developed using three links that move in the x, y, and z directions. The robot was then designed using SolidWorks software to compute each connection's deflection and maximum stresses. The characteristics of the stepper moto
... Show MoreFor the graph , the behavior associated with to the majority of the graphical properties of this graph is covered in this article. The reflection of the capabilities of on the Ly constructions is one of the key ideas addressed throughout this paper. For instance, by this technique we can comprehend the mechanism via which groups of relatively tiny structure are exist within Ly.