Preferred Language
Articles
/
bsj-9710
Hybrid Framework To Exclude Similar and Faulty Test Cases In Regression Testing
...Show More Authors

 

Regression testing is a crucial phase in the software development lifecycle that makes sure that new changes/updates in the software system don’t introduce defects or don’t affect adversely the existing functionalities. However, as the software systems grow in complexity, the number of test cases in regression suite can become large which results into more testing time and resource consumption. In addition, the presence of redundant and faulty test cases may affect the efficiency of the regression testing process. Therefore, this paper presents a new Hybrid Framework to Exclude Similar & Faulty Test Cases in Regression Testing (ETCPM) that utilizes automated code analysis techniques and historical test execution data to identity and exclude redundant, similar and faulty test cases from the given regression suite. Our experimental results clearly show the benefits of the ETCPM framework in terms of reduction in the testing time, optimization of the resource allocation, and improvement in the overall quality of regression test suite. ETCPM enables software development teams to achieve faster and reliable regression testing by intelligent exclusion of similar and fault test cases, which yields in reduction in the software delivery cycles and better end user satisfaction.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon May 22 2023
Journal Name
Bangladesh Journal Of Medical Science
Genotyping of Escherichia coli isolated from diarrhea cases in children under five years of age using the PFGE method
...Show More Authors

Preview PDF
Scopus
Publication Date
Wed Sep 20 2023
Journal Name
Journal Of Applied And Natural Science
Detection of some virulence genes (esp, agg, gelE, CylA) in Enterococcus faecalis isolated from different clinical cases at Baghdad
...Show More Authors

The virulent genes are the key players in the ability of the bacterium to cause disease. The products of such genes that facilitate the successful colonization and survival of the bacterium in or cause damage to the host are pathogenicity determinants. This study aimed to investigate the prevalence of virulence factors (esp, agg, gelE, CylA) in E. faecalis isolated from diverse human clinical collected in Iraqi patient , as well as to assess their ability to form biofilm and to determine their haemolytic and gelatinase activities. Thirty-two isolates of bacteria Enterococcus faecalis were obtained, including 15 isolates (46.87%) of the urine, 6 isolates (18.75%) for each of the stool and uterine secretions, and 5 isolates (15.62%) of the wo

... Show More
Preview PDF
Publication Date
Tue Sep 30 2025
Journal Name
Journal Of The College Of Basic Education
Rationing two test in strength endurance for young under the age of 16
...Show More Authors

View Publication
Publication Date
Thu Jul 01 2010
Journal Name
Clinical And Experimental Rheumatology
RE-EVALUATION OF PATHERGY TEST IN IRAQI PATIENTS WITH BEHCET'S DISEASE
...Show More Authors

KE Sharquie, R Hayani, J Al-Rawi, A Noaimi, SH Radhy, CLINICAL AND EXPERIMENTAL RHEUMATOLOGY, 2010

View Publication
Publication Date
Thu Feb 01 2024
Journal Name
Journal Of Photochemistry And Photobiology A: Chemistry
Construction of co-zeolitic imidazolate framework/Bi2WO6 heterojunction photocatalyst with improved adsorption and photodegradation of ciprofloxacin
...Show More Authors

View Publication
Scopus (32)
Crossref (34)
Scopus Clarivate Crossref
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
Clinicopathological and Immunohistochemical Analysis of 21 cases of Traumatic Ulcerative Granuloma with Stromal Eosinophilia Using CD30, CD68 and TGF-β1
...Show More Authors

Background: Traumatic ulcerative granuloma with stromal eosinophilia is an impressive benign chronic ulcerative lesion of the oral mucosa with vague etiopathogenesis. It was supposed to represent an oral counterpart of primary cutaneous CD30+ lymphoproliferative disorder. Histopathologically, it is characterized by mixed inflammatory infiltrate predominated by histiocytes, lymphocytes and eosinophils along with presence of scattered large atypical mononuclear cells. It has worrisome clinical presentation. It may heal spontaneously, but in most occasions it persists and never heal unless removed surgically (incisional or excisional biopsy). A rare subset may show worrisome immunohistochemical features. Follow up is highly recommended. Mat

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 29 2022
Journal Name
Journal Of Al-rafidain University College For Sciences ( Print Issn: 1681-6870 ,online Issn: 2790-2293 )
The Use Of Genetic Algorithm In Estimating The Parameter Of Finite Mixture Of Linear Regression
...Show More Authors

The estimation of the parameters of linear regression is based on the usual Least Square method, as this method is based on the estimation of several basic assumptions. Therefore, the accuracy of estimating the parameters of the model depends on the validity of these hypotheses. The most successful technique was the robust estimation method which is minimizing maximum likelihood estimator (MM-estimator) that proved its efficiency in this purpose. However, the use of the model becomes unrealistic and one of these assumptions is the uniformity of the variance and the normal distribution of the error. These assumptions are not achievable in the case of studying a specific problem that may include complex data of more than one model. To

... Show More
View Publication
Crossref
Publication Date
Tue Feb 28 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

. In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction a

... Show More
View Publication
Scopus (10)
Scopus Crossref
Publication Date
Wed Feb 01 2023
Journal Name
Periodicals Of Engineering And Natural Sciences (pen)
Bitcoin Prediction with a hybrid model
...Show More Authors

In recent years, Bitcoin has become the most widely used blockchain platform in business and finance. The goal of this work is to find a viable prediction model that incorporates and perhaps improves on a combination of available models. Among the techniques utilized in this paper are exponential smoothing, ARIMA, artificial neural networks (ANNs) models, and prediction combination models. The study's most obvious discovery is that artificial intelligence models improve the results of compound prediction models. The second key discovery was that a strong combination forecasting model that responds to the multiple fluctuations that occur in the bitcoin time series and Error improvement should be used. Based on the results, the prediction acc

... Show More
Scopus (10)
Scopus
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref