We propose a novel strategy to optimize the test suite required for testing both hardware and software in a production line. Here, the strategy is based on two processes: Quality Signing Process and Quality Verification Process, respectively. Unlike earlier work, the proposed strategy is based on integration of black box and white box techniques in order to derive an optimum test suite during the Quality Signing Process. In this case, the generated optimal test suite significantly improves the Quality Verification Process. Considering both processes, the novelty of the proposed strategy is the fact that the optimization and reduction of test suite is performed by selecting only mutant killing test cases from cumulating t-way test cases. As such, the proposed strategy can potentially enhance the quality of product with minimal cost in terms of overall resource usage and time execution. As a case study, this paper describes the step-by-step application of the strategy for testing a 4-bit Magnitude Comparator Integrated Circuits in a production line. Comparatively, our result demonstrates that the proposed strategy outperforms the traditional block partitioning strategy with the mutant score of 100% to 90%, respectively, with the same number of test cases.
The study aims to identify the impact of the implementation of the integrated education strategy in the curriculum of the Arabic language for the seventh grade on the academic achievement in the schools of the capital Amman. The researcher adopted the experimental method, where two divisions of the seventh grade students were chosen from the secondary school for girls. The sample of the study was 60 students divided into two equal groups: 30 students represented the experimental group (A) and (30) students represented the control group. To collect the needed data, a test of (40) Multiple Choices was used. The results showed statistically significant differences between the mean scores of the experimental group who were taught acc
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show MoreKetoprofen has recently been proven to offer therapeutic potential in preventing cancers such as colorectal and lung tumors, as well as in treating neurological illnesses. The goal of this review is to show the methods that have been used for determining ketoprofen in pharmaceutical formulations. Precision product quality control is crucial to confirm the composition of the drugs in pharmaceutical use. Several analytical techniques, including chromatographic and spectroscopic methods, have been used for determining ketoprofen in different sample forms such as a tablet, capsule, ampoule, gel, and human plasma. The limit of detection of ketoprofen was 0.1 ng/ ml using liquid chromatography with tandem mass spectrometry, while it was 0
... Show MoreMany academics have concentrated on applying machine learning to retrieve information from databases to enable researchers to perform better. A difficult issue in prediction models is the selection of practical strategies that yield satisfactory forecast accuracy. Traditional software testing techniques have been extended to testing machine learning systems; however, they are insufficient for the latter because of the diversity of problems that machine learning systems create. Hence, the proposed methodologies were used to predict flight prices. A variety of artificial intelligence algorithms are used to attain the required, such as Bayesian modeling techniques such as Stochastic Gradient Descent (SGD), Adaptive boosting (ADA), Decision Tre
... Show MoreA- The research problem: the research problem which is the garments industry, as a
whole it does not rely on a single system in the sizes of the clothing and the working
companies, see that it is not plausible that the sizes be unificd and consistent in all companies.
The current sizes in the domestic Iraqi markets are not suitable for some females ,on the other
hand the Iraqi industry suffers the lack of a modern standard for some Iraqis female bodies.
B- The Signifiance of the research: lies in the study of the diversity of the human body
sizes and naming them to reflect the desires and requirements of the consumer and try to find
a method to meet their expectations as well as to raise the level of garments industr
Globally, the COVID-19 pandemic’s development has presented significant societal and economic challenges. The carriers of COVID-19 transmission have also been identified as asymptomatic infected people. Yet, most epidemic models do not consider their impact when accounting for the disease’s indirect transmission. This study suggested and investigated a mathematical model replicating the spread of coronavirus disease among asymptomatic infected people. A study was conducted on every aspect of the system’s solution. The equilibrium points and the basic reproduction number were computed. The endemic equilibrium point and the disease-free equilibrium point had both undergone local stability analyses. A geometric technique was used
... Show MoreImplementation of TSFS (Transposition, Substitution, Folding, and Shifting) algorithm as an encryption algorithm in database security had limitations in character set and the number of keys used. The proposed cryptosystem is based on making some enhancements on the phases of TSFS encryption algorithm by computing the determinant of the keys matrices which affects the implementation of the algorithm phases. These changes showed high security to the database against different types of security attacks by achieving both goals of confusion and diffusion.
There are many studies dealt with handoff management in mobile communication systems and some of these studies presented handoff schemes to manage this important process in cellular network. All previous schemes used relative signal strength (RSS) measurements. In this work, a new proposed handoff scheme had been presented depending not only on the RSS measurements but also used the threshold distance and neighboring BSS power margins in order to improve the handoff management process. We submitted here a threshold RSS as a condition to make a handoff when a mobile station moves from one cell to another this at first, then we submitted also a specified margin between the current received signal and the ongoing BS's received signal must be s
... Show More