Preferred Language
Articles
/
vBcCUpEBVTCNdQwCaJRh
Combinatorial Testing Approaches: A Systematic Review
...Show More Authors

Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evaluated based on a variety of criteria, including the generation technology, test strategy method, supported interactions, mixed coverage ,and support constraints between parameters. CT analysis had a wide range of interaction assistance options available to researchers. Since 2010, a unified interaction has been the most common style of interaction between the two parties. The year 2018 was hailed as the most successful in terms of CT by researchers. Researchers should focus on one test at a time and metaheuristic search strategies for t-way CT. There has also been a significant increase in the popularity of other trends, such as deep learning (DL). CT appears to be a useful testing technique for balancing and fault detection capabilities for a variety of systems and applications, according to our research. Future research and software development may benefit from this information. Index Terms— Combinatorial Testing, Test Case Generation, Optimization Algorithms, Software Testing, Artificial Intelligent.

Crossref
View Publication
Publication Date
Fri Aug 31 2012
Journal Name
Al-khwarizmi Engineering Journal
Design a Security Network System against Internet Worms
...Show More Authors

 Active worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.

View Publication Preview PDF
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of The College Of Languages (jcl)
Colonization and Civilization in Aimé Cesaire’s A Tempest
...Show More Authors

This study deals with the concepts of Colonialism and Civilization in Aimé Cesaire’s A Tempest. The concern of this study is to discuss how postcolonial writers are continually re-writing the Western canonical works as a reaction to the European cultural hegemony. The Western representations of the black are products of specific moments and developments in history and culture. A Tempest reflects a certain historical moment in the decolonization process.

A Tempest is analysed to reveal the counter literary strategy used by Aimé Cesaire, and to disclose the reasons why re-writing and writing back are considered as vital and inescapable tasks. Shakespeare’s The Tempest, which deals with the

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 25 2022
Journal Name
Studies In Pragmatics And Discourse Analysis
Negation in American Discourse: A Socio-Cognitive Study
...Show More Authors

The present study cognitive aims to investigate the negation phenomenon in American political discourse under Critical Discourse Analysis (CDA) principles. The research sample includes two speeches given by Clinton and Trump in their election campaigns in 2016. Since the nature of the study follows the social-cognitive approach, the researcher adopted two models of analysis to achieve the study’s objectives: First, the theoretical framework of MST (developed by Fauconnier (1994), Fauconnier and Sweetser (1996) to examine meaning construction resulting from building different levels of negative mental spaces by two different genders the selected speeches. Second, pragmatic model to examine the role of gender from the functional per

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 01 1990
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
A New Species of Systole Walker (Hymenoptera, Eurytomidae)
...Show More Authors

Systole merazvensis sp. n. from Iraq, is described, figuri4 and differentiated from ,other species of the genus Systok.

View Publication Preview PDF
Publication Date
Mon Jun 05 2023
Journal Name
Journal Of Engineering
A Computerized Integrated System for Geodetic Networks Design
...Show More Authors

This research presents a model for surveying networks configuration which is designed and called a Computerized Integrated System for Triangulation Network Modeling (CISTNM). It focuses on the strength of figure as a concept then on estimating the relative error (RE) for the computed side (base line) triangulation element. The CISTNM can compute the maximum elevations of the highest
obstacles of the line of sight, the observational signal tower height, the contribution of each triangulation station with their intervisibility test and analysis. The model is characterized by the flexibility to select either a single figure or a combined figures network option. Each option includes three other implicit options such as: triangles, quadri

... Show More
View Publication Preview PDF
Publication Date
Mon Apr 01 2013
Journal Name
مجلة كلية بغداد للعلوم الاقتصادية الجامعة العدد الخاص بمؤتمر الكلية
A propose method for hiding image into image
...Show More Authors

Publication Date
Thu Jun 01 2006
Journal Name
Journal Of The College Of Languages (jcl)
Demonstratives in English and Arabic : A Contrastive Study
...Show More Authors

This paper studies the demonstratives as deictic expressions in Standard Arabic and English by outlining their phonological, syntactic and semantic properties in the two languages. On the basis of the outcome of this outline, a contrastive study of the linguistic properties of this group of deictic expressions in the two languages is conducted next. The aim is to find out what generalizations could be made from the results of this contrastive study.

View Publication Preview PDF
Publication Date
Wed May 24 2023
Journal Name
2023 9th International Conference On Information Technology Trends (itt)
A Comparative Study of Unauthorized Drone Detection Techniques
...Show More Authors

View Publication
Scopus (5)
Crossref (2)
Scopus Crossref
Publication Date
Sat Sep 30 2017
Journal Name
College Of Islamic Sciences
Semantic Exchange A study of rooting the term
...Show More Authors

The term "semantic exchange" was popularized in Arabic, especially in derivatives, grammatical structures, etc., but it came under different names or terms, including deviation, deviation, transition, displacement, tooth breach, replacement, attention, etc. In the rooting of this term through its study in language and terminology, and among linguists, grammar and others, we have reached a number of results, including The existence of a harmonization between the lexical and idiomatic meaning of the term exchange, and the phenomenon of semantic exchange is a form of expansion in language, and that the first language scientists They had turned to this And studied under Cairo for different names, as noted above.

View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Medeniyet Medical Journal
SARS-CoV-2: A Piece of Bad News
...Show More Authors

A shocking third species emerged from a family of coronaviruses (CoV) in late 2019 following viruses causing SARS (Severe Acute Respiratory Syndrome-CoV) in 2003 and MERS (Middle East Respiratory Syndrome-CoV) in 2012; it’s a novel coronavirus now called severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2; formerly called 2019-nCoV). First emerging in China, it has spread rapidly across the globe, giving rise to significant social and economic costs and imposing severe strain on healthcare systems. Since many attempts to control viral spread has been futile, the only old practice of containment including city lockdown and social distancing are working to some extent. Unfortunately, specific antiviral drugs and vaccines remain u

... Show More
View Publication
Scopus (8)
Crossref (2)
Scopus Crossref