Regression testing being expensive, requires optimization notion. Typically, the optimization of test cases results in selecting a reduced set or subset of test cases or prioritizing the test cases to detect potential faults at an earlier phase. Many former studies revealed the heuristic-dependent mechanism to attain optimality while reducing or prioritizing test cases. Nevertheless, those studies were deprived of systematic procedures to manage tied test cases issue. Moreover, evolutionary algorithms such as the genetic process often help in depleting test cases, together with a concurrent decrease in computational runtime. However, when examining the fault detection capacity along with other parameters, is required, the method falls short. The current research is motivated by this concept and proposes a multifactor algorithm incorporated with genetic operators and powerful features. A factor-based prioritizer is introduced for proper handling of tied test cases that emerged while implementing re-ordering. Besides this, a Cost-based Fine Tuner (CFT) is embedded in the study to reveal the stable test cases for processing. The effectiveness of the outcome procured through the proposed minimization approach is anatomized and compared with a specific heuristic method (rule-based) and standard genetic methodology. Intra-validation for the result achieved from the reduction procedure is performed graphically. This study contrasts randomly generated sequences with procured re-ordered test sequence for over '10' benchmark codes for the proposed prioritization scheme. Experimental analysis divulged that the proposed system significantly managed to achieve a reduction of 35-40% in testing effort by identifying and executing stable and coverage efficacious test cases at an earlier phase.
To maintain the security and integrity of data, with the growth of the Internet and the increasing prevalence of transmission channels, it is necessary to strengthen security and develop several algorithms. The substitution scheme is the Playfair cipher. The traditional Playfair scheme uses a small 5*5 matrix containing only uppercase letters, making it vulnerable to hackers and cryptanalysis. In this study, a new encryption and decryption approach is proposed to enhance the resistance of the Playfair cipher. For this purpose, the development of symmetric cryptography based on shared secrets is desired. The proposed Playfair method uses a 5*5 keyword matrix for English and a 6*6 keyword matrix for Arabic to encrypt the alphabets of
... Show MoreIn the current digitalized world, cloud computing becomes a feasible solution for the virtualization of cloud computing resources. Though cloud computing has many advantages to outsourcing an organization’s information, but the strong security is the main aspect of cloud computing. Identity authentication theft becomes a vital part of the protection of cloud computing data. In this process, the intruders violate the security protocols and perform attacks on the organizations or user’s data. The situation of cloud data disclosure leads to the cloud user feeling insecure while using the cloud platform. The different traditional cryptographic techniques are not able to stop such kinds of attacks. BB84 protocol is the first quantum cry
... Show MoreThis research aims to explain the effect of the imported inflation (which moves through the raise of global prices to Iraqi economy) over local prices, besides, the recognition the most important channels of imported inflation moving, its causes, effects, ways and policies that reduce the negative effects. To achieve the research aim, the deductive approach was adopted through using descriptive method to describe and determine phenomenon. The most important conclusion is that the research found out that there are two channels to transmission imported inflation in world. The first channel is the direct channel (prices) and the second channel is the indirect (income). The most important recommendation is to create sovereign fund (O
... Show MorePorosity is important because it reflects the presence of oil reserves. Hence, the number of underground reserves and a direct influence on the essential petrophysical parameters, such as permeability and saturation, are related to connected pores. Also, the selection of perforation interval and recommended drilling additional infill wells. For the estimation two distinct methods are used to obtain the results: the first method is based on conventional equations that utilize porosity logs. In contrast, the second approach relies on statistical methods based on making matrices dependent on rock and fluid composition and solving the equations (matrices) instantaneously. In which records have entered as equations, and the matrix is sol
... Show MoreThe current work is focused on the rock typing and flow unit classification for reservoir characterization in carbonate reservoir, a Yamama Reservoir in south of Iraq (Ratawi Field) has been selected, and the study is depending on the logs and cores data from five wells which penetrate Yamama formation. Yamama Reservoir was divided into twenty flow units and rock types, depending on the Microfacies and Electrofacies Character, the well logs pattern, Porosity–Water saturation relationship, flow zone indicator (FZI) method, capillary pressure analysis, and Porosity–Permeability relationship (R35) and cluster analysis method. Four rock types and groups have been identified in the Yamama formation de
The purpose of the current study was to explore the standards that teachers take into consideration when selecting and using assistive technology (AT), in addition to their knowledge and skills in this area. A quantitative, descriptive survey design was used and a convenience sample of 79 teachers of students with intellectual disabilities and autism spectrum disorder (ASD) participated in the current study. Based on the four main areas of the SETT Framework—student, environment, tasks, and tools—, teachers reported a lack consideration for most of the standards in each area. Among other findings, statistically significant differences were found between teachers’ standards of the SETT Framework, with teachers who had previous profe
... Show MoreThe increasing availability of computing power in the past two decades has been use to develop new techniques for optimizing solution of estimation problem. Today's computational capacity and the widespread availability of computers have enabled development of new generation of intelligent computing techniques, such as our interest algorithm, this paper presents one of new class of stochastic search algorithm (known as Canonical Genetic' Algorithm ‘CGA’) for optimizing the maximum likelihood function strategy is composed of three main steps: recombination, mutation, and selection. The experimental design is based on simulating the CGA with different values of are compared with those of moment method. Based on MSE value obtained from bot
... Show MoreIn this paper, an algorithm for binary codebook design has been used in vector quantization technique, which is used to improve the acceptability of the absolute moment block truncation coding (AMBTC) method. Vector quantization (VQ) method is used to compress the bitmap (the output proposed from the first method (AMBTC)). In this paper, the binary codebook can be engender for many images depending on randomly chosen to the code vectors from a set of binary images vectors, and this codebook is then used to compress all bitmaps of these images. The chosen of the bitmap of image in order to compress it by using this codebook based on the criterion of the average bitmap replacement error (ABPRE). This paper is suitable to reduce bit rates
... Show MoreA robust video-bitrate adaptive scheme at client-aspect plays a significant role in keeping a good quality of video streaming technology experience. Video quality affects the amount of time the video has turned off playing due to the unfilled buffer state. Therefore to maintain a video streaming continuously with smooth bandwidth fluctuation, a video buffer structure based on adapting the video bitrate is considered in this work. Initially, the video buffer structure is formulated as an optimal control-theoretic problem that combines both video bitrate and video buffer feedback signals. While protecting the video buffer occupancy from exceeding the limited operating level can provide continuous video str
... Show MoreThis paper discussed the solution of an equivalent circuit of solar cell, where a single diode model is presented. The nonlinear equation of this model has suggested and analyzed an iterative algorithm, which work well for this equation with a suitable initial value for the iterative. The convergence of the proposed method is discussed. It is established that the algorithm has convergence of order six. The proposed algorithm is achieved with a various values of load resistance. Equation by means of equivalent circuit of a solar cell so all the determinations is achieved using Matlab in ambient temperature. The obtained results of this new method are given and the absolute errors is demonstrated.