Preferred Language
Articles
/
bsj-3690
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing applied the uniform and the variable interaction strength, however, there is still a lack of work addressing IOR. In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. The result of applying the Jaya algorithm in input-output based combinatorial testing is acceptable since it produces a nearly optimum number of test cases in a satisfactory time range.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jul 01 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on distributed denial of service attack detection using deep learning: A review
...Show More Authors

Distributed Denial of Service (DDoS) attacks on Web-based services have grown in both number and sophistication with the rise of advanced wireless technology and modern computing paradigms. Detecting these attacks in the sea of communication packets is very important. There were a lot of DDoS attacks that were directed at the network and transport layers at first. During the past few years, attackers have changed their strategies to try to get into the application layer. The application layer attacks could be more harmful and stealthier because the attack traffic and the normal traffic flows cannot be told apart. Distributed attacks are hard to fight because they can affect real computing resources as well as network bandwidth. DDoS attacks

... Show More
View Publication
Publication Date
Mon Mar 30 2020
Journal Name
Iraqi Journal Of Chemical And Petroleum Engineering
Simulation of Two Phase Flow Mixing Co – Current in T Junction Using Comsol
...Show More Authors

The analysis, behavior of two-phase flow incompressible fluid in T-juction is done by using "A Computational Fluid Dynamic (CFD) model" that application division of different in industries. The level set method was based in “Finite Element method”. In our search the behavior of two phase flow (oil and water) was studed. The two-phase flow is taken to simulate by using comsol software 4.3. The multivariable was studying such as velocity distribution, share rate, pressure and the fraction of volume at various times.  The velocity was employed at the inlet (0.2633, 0.1316, 0.0547 and 0.0283 m/s) for water and (0.1316 m/s) for oil, over and above the pressure set at outlet as a boundary condition. It was observed through the program

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 17 2017
Journal Name
International Journal Of Computer Applications
Improving of Photovoltaic Cell Performance by Cooling using Two different Types of Fins
...Show More Authors

View Publication
Crossref (5)
Crossref
Publication Date
Mon Mar 20 2023
Journal Name
2023 International Conference On Information Technology, Applied Mathematics And Statistics (icitams)
Hybrid Color Image Compression Using Signals Decomposition with Lossy and Lossless Coding Schemes
...Show More Authors

View Publication
Scopus (1)
Scopus Crossref
Publication Date
Fri May 02 2014
Journal Name
International Journal Of Scientific & Technology Research
Synthesis, Structure And Characterization Of Zns Qds And Using It In Photocatalytic Reaction
...Show More Authors

ZnS nanoparticles were prepared by a simple microwave irradiation method under mild condition. The starting materials for the synthesis of ZnS quantum dots were zinc acetate (R & M Chemical) as zinc source, thioacetamide as a sulfur source and ethylene glycol as a solvent. All chemicals were analytical grade products and used without further purification. The quantum dots of ZnS with cubic structure were characterized by X-ray powder diffraction (XRD), the morphology of the film is seen by scanning electron microscopy (SEM). The particle size is determined by field effect scanning electron microscopy (FESEM), UV-Visible absorption spectroscopy and XRD. UV-Visible absorption spectroscopy analysis shows that the absorption peak of the as-prep

... Show More
Publication Date
Sun May 11 2025
Journal Name
Iraqi Statisticians Journal
Estimating General Linear Regression Model of Big Data by Using Multiple Test Technique
...Show More Authors

View Publication
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Annals Of Tropical Medicine And Public Health
SPECTROPHOTOMETRIC DETERMINATION OF DIPHENHYDRAMINE HCL IN PURE AND PHARMACEUTICAL FORMULATIONS USING THYMOL BLUE
...Show More Authors

This approach was developed to achieve an accurate, fast, economic and sensitivity to estimation of diphenhydramine Hydrochloride. The dye that produced via reaction between diphenhydramine HCl with thymol blue in acidic medium pH ≈ 4.0. The ion pair method include an optimization study to formed yellowcolored that extraction by liquid – liquid method. The product separated of complexes by using by chloroform solution measured spectrophotometry at 400 nm. The analysis data at optimum conditions showed that linearity concentration in a range of calibration curve 1.0 – 50 μg /mL, limit of detectionand limit of quantification 0.0786 and 0.2358 μg/mL respectively. The molar absorptivity and Sandell’s sensitivity were 1.8 × 10 -4 L/mo

... Show More
View Publication
Crossref
Publication Date
Fri Feb 28 2025
Journal Name
The Iraqi Geological Journal
Structural Interpretation of Najaf Basin Using the Magnetic and Gravity Data, Central Iraq
...Show More Authors

Potential data interpretation is significant for subsurface structure characterization. The current study is an attempt to explore the magnetic low lying between Najaf and Diwaniyah Cities, In central Iraq. It aims to understand the subsurface structures that may result from this anomaly and submit a better subsurface structural image of the region. The study area is situated in the transition zone, known as the Abu Jir Fault Zone. This tectonic boundary is an inherited basement weak zone extending towards the NW-SE direction. Gravity and magnetic data processing and enhancement techniques; Total Horizontal Gradient, Tilt Angle, Fast Sigmoid Edge Detection, Improved Logistic, and Theta Map filters highlight source boundaries and the

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Thu Feb 01 2018
Journal Name
Journal Of Computational And Theoretical Nanoscience
Development of Wireless Controlling and Monitoring System for Robotic Hand Using Zigbee Protocol
...Show More Authors

Nowadays, the robotic arm is fast becoming the most popular robotic form used in the industry among others. Therefore, the issues regarding remote monitoring and controlling system are very important, which measures different environmental parameters at a distance away from the room and sets various condition for a desired environment through a wireless communication system operated from a central room. Thus, it is crucial to create a programming system which can control the movement of each part of the industrial robot in order to ensure it functions properly. EDARM ED-7100 is one of the simplest models of the robotic arm, which has a manual controller to control the movement of the robotic arm. In order to improve this control s

... Show More
View Publication
Scopus (5)
Crossref (4)
Scopus Crossref
Publication Date
Sun Mar 31 2013
Journal Name
Inventi Impact: Artificial Intelligence
SIMULATION OF IDENTIFICATION AND CONTROL OF SCARA ROBOT USING MODIFIED RECURRENT NEURAL NETWORKS
...Show More Authors

This paper presents a modified training method for Recurrent Neural Networks. This method depends on the Non linear Auto Regressive (NARX) model with Modified Wavelet Function as activation function (MSLOG) in the hidden layer. The modified model is known as Modified Recurrent Neural (MRN). It is used for identification Forward dynamics of four Degrees of Freedom (4-DOF) Selective Compliance Assembly Robot Arm (SCARA) manipulator robot. This model is also used in the design of Direct Inverse Control (DIC). This method is compared with Recurrent Neural Networks that used Sigmoid activation function (RS) in the hidden layer and Recurrent Neural Networks with Wavelet activation function (RW). Simulation results shows that the MRN model is bett

... Show More
View Publication