In regression testing, Test case prioritization (TCP) is a technique to arrange all the available test cases. TCP techniques can improve fault detection performance which is measured by the average percentage of fault detection (APFD). History-based TCP is one of the TCP techniques that consider the history of past data to prioritize test cases. The issue of equal priority allocation to test cases is a common problem for most TCP techniques. However, this problem has not been explored in history-based TCP techniques. To solve this problem in regression testing, most of the researchers resort to random sorting of test cases. This study aims to investigate equal priority in history-based TCP techniques. The first objective is to implement different history-based TCP techniques. The second objective is to explore the problem of equal priority in history-based TCP techniques. The third objective is to explore random sorting as a solution to the problem of equal priority in history-based TCP techniques. Datasets of historical records of test cases from conventional and modern sources were collected. History-based TCP techniques were applied to different datasets. The History-based TCP techniques were checked for the problem of equal priority. Then random sorting was used as a solution to the problem of equal priority. Finally, the results were elaborated in terms of APFD and execution time. The results indicate that history-based techniques also suffer from the problem of equal priority like other types of TCP techniques. Secondly, random sorting does not produce optimal results while trying to solve the problem of equal priority in history-based TCP. Furthermore, random sorting deteriorates the results of history-based TCP techniques when employed to solve the problem of equal priority. One should resort to random sorting if no other solution exists. The decision to choose the best solution requires a cost-benefit analysis keeping in view the context and solution under consideration.
The history of the Olympic movement in Iraq is a rich history that reflects the interest of Iraqi governments and society in sports, the social and economic conditions, and international relations, and highlights the intersection of sports and politics and the impact of global events on local sports development. Therefore, providing a valuable insight into the reality of the participation and results achieved by Iraq in the Olympic Games for the period under study helps in giving a broader understanding of Iraq’s position in the global sports community. The research aims to document the important events in the development of the Olympic movement in Iraq for the period (1929-2000) and explore the formation and development of the Iraqi Olym
... Show MoreBackground: Insulin resistance is associated with metabolic syndrome , type 2 diabetes and representing a risk factor for cardiovascular disease . This relationship may be modulated to some extent by age related changes in sex hormone status.. In particular, reduced total testosterone (TT) levels have been associated with insulin resistance and subsequent risk for developing type 2 diabetes. Aim of study: we examined whether low total testosterone level were associated with insulin resistance in young adult men. Methods: a total of 83 men (young adult men) divided into 2 group : (group1 ) 49 men with a risk factor for insu
... Show MoreHamdan tribe had considered one of the biggest tribe in Yemen. It contained many branches, thus, it had distributed in many cities and for this reason , it was different in their warship. it was one of the tribe that had many courageous men .
The importance of teaching methods and procedures comes from the nature and significance of the questions raised inside the classroom. That is, because questions, in fact, are the means of communication and interaction in the class situation. Therefore they are considered as indispensible elements in any teaching approach. Furthermore, it is noticeable that the majority of teachers fail in using them, for questions are often casted spontaneously and without pre-planning. Hence, a delay may occur in realizing the pre-set objectives, and let alone the dominance of stereotyped questions, especially when the teachers focus on a type of question which can be directly answered from the text-book.
&nb
... Show MoreHamdan tribe had considered one of the biggest tribe in Yemen. It contained many branches, thus, it had distributed in many cities and for this reason , it was different in their warship. it was one of the tribe that had many courageous men
The study aims to explore the effect of cognitive behavioral therapy on internet addiction among university students. The experimental method was used. The study population consisted of (100) university students (50 males, 50 females). The Research sample included (13) University students at Baghdad University addicted to the Internet (9 males, 4 females), divided into two groups: a control group consisting of (6) individuals (4 males, 2 females) and an experimental sample consisting of (6) individuals (4 males, 2 females). The Scale of Internet Addiction by Young (1996), which was translated and modified into the Arabic language by (Moegel and Prism, 2016), was administered to the study sample. The sample was subjected to two sess
... Show MoreTo achieve safe security to transfer data from the sender to receiver, cryptography is one way that is used for such purposes. However, to increase the level of data security, DNA as a new term was introduced to cryptography. The DNA can be easily used to store and transfer the data, and it becomes an effective procedure for such aims and used to implement the computation. A new cryptography system is proposed, consisting of two phases: the encryption phase and the decryption phase. The encryption phase includes six steps, starting by converting plaintext to their equivalent ASCII values and converting them to binary values. After that, the binary values are converted to DNA characters and then converted to their equivalent complementary DN
... Show MoreThe confirming of security and confidentiality of multimedia data is a serious challenge through the growing dependence on digital communication. This paper offers a new image cryptography based on the Chebyshev chaos polynomials map, via employing the randomness characteristic of chaos concept to improve security. The suggested method includes block shuffling, dynamic offset chaos key production, inter-layer XOR, and block 90 degree rotations to disorder the correlations intrinsic in image. The method is aimed for efficiency and scalability, accomplishing complexity order for n-pixels over specific cipher rounds. The experiment outcomes depict great resistant to cryptanalysis attacks, containing statistical, differential and brut
... Show MoreHM Al-Dabbas, RA Azeez, AE Ali, IRAQI JOURNAL OF COMPUTERS, COMMUNICATIONS, CONTROL AND SYSTEMS ENGINEERING, 2023
In this work a chemical sensor was built by using Plane Wave Expansion (PWE) modeling technique by filling the core of 1550 hollow core photonic crystal fiber with chloroform that has different concentrations after being diluted with distilled water. The minimum photonic bandgap width is.0003 and .0005 rad/sec with 19 and 7 cells respectively and a concentration of chloroform that filled these two fibers is 75%.