Sequence covering array (SCA) generation is an active research area in recent years. Unlike the sequence-less covering arrays (CA), the order of sequence varies in the test case generation process. This paper reviews the state-of-the-art of the SCA strategies, earlier works reported that finding a minimal size of a test suite is considered as an NP-Hard problem. In addition, most of the existing strategies for SCA generation have a high order of complexity due to the generation of all combinatorial interactions by adopting one-test-at-a-time fashion. Reducing the complexity by adopting one-parameter- at-a-time for SCA generation is a challenging process. In addition, this reduction facilitates the supporting for a higher strength of coverage. Motivated by such challenge, this paper proposes a novel SCA strategy called Dynamic Event Order (DEO), in which the test case generation is done using one-parameter-at-a-time fashion. The details of the DEO are presented with a step-by-step example to demonstrate the behavior and show the correctness of the proposed strategy. In addition, this paper makes a comparison with existing computational strategies. The practical results demonstrate that the proposed DEO strategy outperforms the existing strategies in term of minimal test size in most cases. Moreover, the significance of the DEO increases as the number of sequences increases and/ or the strength of coverage increases. Furthermore, the proposed DEO strategy succeeds to generate SCAs up to t=7. Finally, the DEO strategy succeeds to find new upper bounds for SCA. In fact, the proposed strategy can act as a research vehicle for variants future implementation.
Digital Elevation Model (DEM) is one of the developed techniques for relief representation. The definition of a DEM construction is the modeling technique of earth surface from existing data. DEM plays a role as one of the fundamental information requirement that has been generally utilized in GIS data structures. The main aim of this research is to present a methodology for assessing DEMs generation methods. The DEMs data will be extracted from open source data e.g. Google Earth. The tested data will be compared with data produced from formal institutions such as General Directorate of Surveying. The study area has been chosen in south of Iraq (Al-Gharraf / Dhi Qar governorate. The methods of DEMs creation are kriging, IDW (inver
... Show MorePumping a BBO crystal by a violet diode laser with a wavelength of (405 nm) output power of (24 mW) and a line width of (3nm) was employed to generate entangled photons with a wavelength of 810 nm by achieving type II phase matching conditions.The coincidence count rate obtained in this experiment was in the range of (18000) counts/s. Two BBO crystals with different thicknesses of (4 mm and 2 mm) were tested, where maximum count rates of about (18000) counts/s was obtained with a (5*5*2) mm BBO crystal where the short coherence time for the pumping source was tolerated by using shorter BBO crystals. Also, the effect of compensating crystal on the walk-off effect was studied. The coincidence count rates were increased by using these crystal
... Show MoreIn this study, generation of elliptical gears with different teeth profiles of crowned involute, double circular arc (DCA), and combined (crowned involute with DCA) has been developed. The resulting mathematical equations have been computerized and feed to CNC end mill machine to manufacture elliptical gear models with different profiles. These models are investigated in plane polariscope to show the resulting stresses under certain load. Comparison of photo-elastic stress results shows that combined elliptical gears with DCA side as a loaded side have a minimum resulting contact stress with a reduction percentage of 40% compare with contact stresses in counterpart elliptical gear of involute profile (which is commonly u
... Show MoreKey generation for data cryptography is vital in wireless communications security. This key must be generated in a random way so that can not be regenerated by a third party other than the intended receiver. The random nature of the wireless channel is utilized to generate the encryption key. However, the randomness of wireless channels deteriorated over time due to channel aging which casing security threats, particularly for spatially correlated channels. In this paper, the effect of channel aging on the ciphering key generations is addressed. A proposed method to randomize the encryption key each coherence time is developed which decreases the correlation between keys generated at consecutive coherence times. When compared to the
... Show MoreThe factorial analysis method consider a advanced statistical way concern in different ways like physical education field and the purpose to analyze the results that we want to test it or measure or for knowing the dimensions of some correlations between common variables that formed the phenomenon in less number of factors that effect on explanation , so we must depend use the self consistent that achieved for reaching that basic request. The goal of this search that depending on techntion of self consistent degree guessing for choosing perfect way from different methods for (orthogonal & oblique) kinds in physical education factor studies and we select some of references for ( master & doctoral) and also the scientific magazine and confere
... Show MoreIn order to study the dynamic response of historical masonry structures, a scaled down brick masonry model constructed in civil engineering department at Baghdad University to simulate a part of a real case study, which is Alkifil historic minaret. Most of the previous researches about masonry structures try to understand the behavior of the masonry under seismic loading by experimental and numerical methods. In this paper, the masonry units (bricks) simulated in scale (S= 1/6) with the exact shape of the prototype bricks. Cementitious tile adhesive was selected to be the mortar for the modeling. The height of the model designed to be 1.5 m with a 0.5 m diameter. Detailed construction steps were presented in this paper. Experts buil
... Show MoreThis paper presents the dynamic responses of generators in a multi-machine power system. The fundamental swing equations for a multi-machine stability analysis are revisited. The swing equations are solved to investigate the influence of a three-phase fault on the network largest load bus. The Nigerian 330kV transmission network was used as a test case for the study. The time domain simulation approach was explored to determine if the system could withstand a 3-phase fault. The stability of the transmission network is estimated considering the dynamic behaviour of the system under various contingency conditions. This study identifies Egbin, Benin, Olorunsogo, Akangba, Sakete, Omotosho and Oshogbo as the key buses w
... Show MoreIn this study, dynamic encryption techniques are explored as an image cipher method to generate S-boxes similar to AES S-boxes with the help of a private key belonging to the user and enable images to be encrypted or decrypted using S-boxes. This study consists of two stages: the dynamic generation of the S-box method and the encryption-decryption method. S-boxes should have a non-linear structure, and for this reason, K/DSA (Knutt Durstenfeld Shuffle Algorithm), which is one of the pseudo-random techniques, is used to generate S-boxes dynamically. The biggest advantage of this approach is the production of the inverted S-box with the S-box. Compared to the methods in the literature, the need to store the S-box is eliminated. Also, the fabr
... Show MoreIn this work, an investigation for the dynamic analysis of thin composite cylindrical and spherical shells is presented. The analytical solution is based upon the higher order shear deformation theory of elastic shells from which the developed equations are derived to deal with orthotropic layers. This will cover the determination of the fundamental natural frequencies and mode shapes for simply supported composites cylindrical and spherical shells.
The analytical results obtained by using the derived equations were confirmed by the finite element technique using the well known Ansys package. The results have shown a good agreement with a maximum percentage of discrepancy, which gives a confidence o
... Show More