Preferred Language
Articles
/
bsj-3690
CTJ: Input-Output Based Relation Combinatorial Testing Strategy Using Jaya Algorithm
...Show More Authors

Software testing is a vital part of the software development life cycle. In many cases, the system under test has more than one input making the testing efforts for every exhaustive combination impossible (i.e. the time of execution of the test case can be outrageously long). Combinatorial testing offers an alternative to exhaustive testing via considering the interaction of input values for every t-way combination between parameters. Combinatorial testing can be divided into three types which are uniform strength interaction, variable strength interaction and input-output based relation (IOR). IOR combinatorial testing only tests for the important combinations selected by the tester. Most of the researches in combinatorial testing applied the uniform and the variable interaction strength, however, there is still a lack of work addressing IOR. In this paper, a Jaya algorithm is proposed as an optimization algorithm engine to construct a test list based on IOR in the proposed combinatorial test list generator strategy into a tool called CTJ. The result of applying the Jaya algorithm in input-output based combinatorial testing is acceptable since it produces a nearly optimum number of test cases in a satisfactory time range.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jun 29 2018
Journal Name
Journal Of Engineering
Finite Element Modeling and Parametric Study on Floor Steel Beam Concrete Slab System in Non-Composite Action.
...Show More Authors

This study aims to show, the strength of steel beam-concrete slab system without using shear connectors (known as a non-composite action), where the effect of the friction force between the concrete slab and the steel beam has been investigated, by using finite element simulation.

The proposed finite element model has been verified based on comparison with an experimental work. Then, the model was adopted to study the system strength with a different steel beam and concrete slab profile. ABAQUS has been adopted in the preparation of all numerical models for this study.

After validation of the numerical models, a parametric study was conducted, with linear and non-linear Regression analysis. An equation re

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Fri Dec 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
مقارنة مقدر بيز مع طريقة الامكان الاعظم لتقدير معلمتي معكوس التوزيع الاسي المعمم في حالة ضبابية البيانات
...Show More Authors

In this paper, the generalized inverted exponential distribution is considered as one of the most important distributions in studying failure times. A shape and scale parameters of the distribution have been estimated after removing the fuzziness that characterizes its data because they are triangular fuzzy numbers. To convert the fuzzy data to crisp data the researcher has used the centroid method. Hence the studied distribution has two parameters which show a difficulty in separating and estimating them directly of the MLE method. The Newton-Raphson method has been used.

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Mar 31 2018
Journal Name
Journal Of Engineering
Estimating Angle of Arrival (AOA) for Wideband Signal by Sensor Delay Line (SDL) and Tapped Delay Line (TDL) Processors
...Show More Authors

Angle of arrival (AOA) estimation for wideband signal becomes more necessary for modern communication systems like Global System for Mobile (GSM), satellite, military applications and spread spectrum (frequency hopping and direct sequence). Most of the researchers are focusing on how to cancel the effects of signal bandwidth on AOA estimation performance by using a transversal filter (tap delay line) (TDL). Most of the researchers were using two elements array antenna to study these effects. In this research, a general case of proposed (M) array elements is used. A transversal filter (TDL) in phase adaptive array antenna system is used to calculate the optimum number of taps required to compensate these effect. The propo

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Sep 01 2025
Journal Name
International Journal Of Renewable Energy Research
A Comparative Study of Optimal Fuzzy Logic Controllers for Blade Pitch Angle in Horizontal-axis Wind Turbines
...Show More Authors

The blade pitch angle (BPA) in wind turbine (WT) is controlled to maximize output power generation above the rated wind speed (WS). In this paper, four types of controllers are suggested and compared for BPA controller in WT: PID controller (PIDC), type-1 fuzzy logic controller (T1-FLC), type-2 fuzzy logic controller (T2-FLC), and hybrid fuzzy-PID controller (FPIDC). The Mamdani and Sugeno fuzzy inference systems (FIS) have been compared to find the best inference system used in FLC. Genetic algorithm (GA) and Particle swarm optimization algorithm (PSO) are used to find the optimal tuning of the PID parameter. The results of500-kw horizontal-axis wind turbine show that PIDC based on PSO can reduced 2.81% in summation error of power

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Jan 02 2020
Journal Name
Journal Of The College Of Languages (jcl)
Principles of modeling a dictionary article in the «Dictionary of the Russian Folklore: lexicon epics» (M.A. Bobunova, A.T. Khro: Принципы моделирования словарной статьи В «словаре языка русского фольклора: Лексика былины» (М. А. Бобунова, А. Т. Хроленко)
...Show More Authors

The article describes the basic principles of modeling a dictionary article in the “Dictionary of the Language of Russian Folklore Lexicon epics” (M. A. Bobunova, A. T. Khrolenko). Among such principles are the principle of linguocentrism (representation of universal cognitions in strict observance of the traditions of lexicographic science), the principle of anthropocentrism (language learning as a means of human consciousness / subconsciousness), the principle of expansionism (attracting material from various knowledge bases), the principle of explanatory ("explanatory moment"), and fractal principle (synergistic potential of the presented material: nonlinearity and self-similarity; hierarchical organizati

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Feb 08 2016
Journal Name
International Journal Of Research In Humanities, Arts And Literature
WESTERN MODERNISM TRANSLATED AND RETRANSLATED IN IRAQI POETRY: AL SAYYAB BETWEEN ELIOT AND SITWELL
...Show More Authors

This article is part of the bigger project of my PhD thesis which investigates the influence of the British war poetry of the twentieth century on the development of Iraqi poetry in the century/Plymouth University/UK. The article examines the influences of British poetry on the development of the forms of poetry in Iraq after the Second World War. The aim is to shed the light on the creation of the ‘third product’ or the Iraqi poetry that shows the influences of the translated British poetry or the ‘second product’; which was written in prose for it is almost impossible to transfer the rhyme and rhythm of poetry from one language to another. Those who translated the poetry where also the pioneers of the major formal revolution in Ar

... Show More
Publication Date
Fri Mar 01 2013
Journal Name
Journal Of Economics And Administrative Sciences
Robust Two-Step Estimation and Approximation Local Polynomial Kernel For Time-Varying Coefficient Model With Balance Longitudinal Data
...Show More Authors

      In this research, the nonparametric technique has been presented to estimate the time-varying coefficients functions for the longitudinal balanced data that characterized by observations obtained through (n) from the independent subjects, each one of them is measured repeatedly by group of  specific time points (m). Although the measurements are independent among the different subjects; they are mostly connected within each subject and the applied techniques is the Local Linear kernel LLPK technique. To avoid the problems of dimensionality, and thick computation, the two-steps method has been used to estimate the coefficients functions by using the two former technique. Since, the two-

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed Dec 01 2021
Journal Name
Journal Of Economics And Administrative Sciences
Comparison Between Nelson-Olson Method and Two-Stage Limited Dependent Variables (2SLDV ) Method for the Estimation of a Simultaneous Equations System (Tobit Model)
...Show More Authors

This study relates to  the estimation of  a simultaneous equations system for the Tobit model where the dependent variables  ( )  are limited, and this will affect the method to choose the good estimator. So, we will use new estimations methods  different from the classical methods, which if used in such a case, will produce biased and inconsistent estimators which is (Nelson-Olson) method  and  Two- Stage limited dependent variables(2SLDV) method  to get of estimators that hold characteristics the good estimator .

That is , parameters will be estim

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 01 2022
Journal Name
Iaes International Journal Of Artificial Intelligence
Reduced hardware requirements of deep neural network for breast cancer diagnosis
...Show More Authors

Identifying breast cancer utilizing artificial intelligence technologies is valuable and has a great influence on the early detection of diseases. It also can save humanity by giving them a better chance to be treated in the earlier stages of cancer. During the last decade, deep neural networks (DNN) and machine learning (ML) systems have been widely used by almost every segment in medical centers due to their accurate identification and recognition of diseases, especially when trained using many datasets/samples. in this paper, a proposed two hidden layers DNN with a reduction in the number of additions and multiplications in each neuron. The number of bits and binary points of inputs and weights can be changed using the mask configuration

... Show More
View Publication Preview PDF
Scopus (5)
Crossref (1)
Scopus Crossref