Testing is a vital phase in software development, and having the right amount of test data is an important aspect in speeding up the process. As a result of the integrationist optimization challenge, extensive testing may not always be practicable. There is also a shortage of resources, expenses, and schedules that impede the testing process. One way to explain combinational testing (CT) is as a basic strategy for creating new test cases. CT has been discussed by several scholars while establishing alternative tactics depending on the interactions between parameters. Thus, an investigation into current CT methods was started in order to better understand their capabilities and limitations. In this study, 97 publications were evaluated based on a variety of criteria, including the generation technology, test strategy method, supported interactions, mixed coverage ,and support constraints between parameters. CT analysis had a wide range of interaction assistance options available to researchers. Since 2010, a unified interaction has been the most common style of interaction between the two parties. The year 2018 was hailed as the most successful in terms of CT by researchers. Researchers should focus on one test at a time and metaheuristic search strategies for t-way CT. There has also been a significant increase in the popularity of other trends, such as deep learning (DL). CT appears to be a useful testing technique for balancing and fault detection capabilities for a variety of systems and applications, according to our research. Future research and software development may benefit from this information. Index Terms— Combinatorial Testing, Test Case Generation, Optimization Algorithms, Software Testing, Artificial Intelligent.
Background: The pandemic crisis prompted the world to adopt unexpected approaches to continue life as normally as possible. The education sector, including professors, students, and the overall teaching system, has been particularly affected. Objective: This study seeks to evaluate the benefits, challenges, and strategies related to COVID-19 from the perspectives of college students, particularly those in higher education in Iraq. Method: The online survey questionnaire was distributed via Google Forms and specifically aimed at undergraduate dental students. Results: A total of 348 students participated in the survey. There was a significant correlation (P > 0.01) between student satisfaction with hybrid learning and their experi
... Show MoreIsolated Bacteria from the roots of barley were studied; two stages of processes Isolated and screening were applied in order to nd the best bacteria to remove kerosene from soil. The acve bacteria are isolated for kerosene degradaon process. It has been found that Klebsiella pneumoniae sp. have the highest kerosene degradaon which is 88.5%. The opmum condions of kerosene degradaon by Klebsiella pneumonia sp. are pH5, 48hr incubaon period, 35°C temperature and 10000ppm the best kerosene concentraon. The results 10000ppm showed that the maximum kerosene degradaon can reach 99.58% aer 48 h of incubaon. Higher Kerosene degradaon which was 99.83% was obtained at pH5. Kerosene degradaon was found
... Show MoreAbstract
The vegetative filter strips (VFS) are a useful tool used for reducing the movement of sediment and pesticide in therivers. The filter strip’s soil can help in reducing the runoff volume by infiltration. However, the characteristics of VFS (i.e., length) are not recently identified depending on the estimation of VFS modeling performance. The aim of this research is to study these characteristics and determine acorrelation between filter strip length and percent reduction (trapping efficiency) for sediment, water, and pesticide. Two proposed pesticides(one has organic carbon sorption coefficient, Koc, of 147 L/kg which is more moveable than XXXX, and another one
... Show MoreCompression is the reduction in size of data in order to save space or transmission time. For data transmission, compression can be performed on just the data content or on the entire transmission unit (including header data) depending on a number of factors. In this study, we considered the application of an audio compression method by using text coding where audio compression represented via convert audio file to text file for reducing the time to data transfer by communication channel. Approach: we proposed two coding methods are applied to optimizing the solution by using CFG. Results: we test our application by using 4-bit coding algorithm the results of this method show not satisfy then we proposed a new approach to compress audio fil
... Show MoreWith 549,393 new cases recorded in 2018, bladder cancer is one of the most common malignancies worldwide. Urinary bladder cancer is the cause of about 3 percent of all new cancer diagnoses and 2.1 percent of all cancer deaths. This study aims to evaluate the efficiency of the N-myc downstream-regulated gene 1(NDRG1) as a biomarker for bladder cancer patients in the Iraqi population. One hundred individuals in the case-control study were enrolled and divided into two groups. The first group included 50 patients diagnosed with a bladder mass and investigated by undergoing cystoscopy examination for transurethral resection of bladder tumor (TURB). The second group included 50 healthy individuals who had normal bladder tissue. The resul
... Show MoreA water resources management for earthen canal/stream is introduced through creating a combination procedure between a field study and the scientific analytical concepts that distinguish the hydraulic problems on this type of stream with using the facilities that are available in HECRAS software; aiming to point the solutions of these problems. Al Mahawil stream is an earthen canal which is subjected to periodic changes in cross sections due to scour, deposition, and incorrect periodic dredging processes due to growth of the Ceratophyllum plants and weeds on the bed and banks of the stream; which affect the characteristics of the flow. This research aims to present a strategy of water resources management through a field study that conducte
... Show MoreObjective: To evaluate the therapeutic activity of probiotics mixture of Lactobacillus plantarum and Lactobacillus acidophilus towards Cryptosporidium infection in experimentally infected mice. Oocysts of Cryptosporidium were separated from the stool of humans to infect mice. Methods: Forty male albino mice were split equally into four groups, every group contained 10 mice, the group I (early treated group), were treated from the 1st day from infection to the 11th post-infection, group II (late treated group), were treated from the 4th day from infection to the 15th post-infection, and group (III) (untreated group), were mice considered as a positive control group. Results: It was showed that daily application of a mixture of L. plantarum w
... Show MoreABSTRACT This study closely investigates the elements of Sigmund Freud’s theory “The Uncanny” in one of Larson’s most famous novels. Although the novel touches upon racial issues, the study explores the mysterious relationship between Irene and Clare based on the main features of Freud’s “The Uncanny,” which are represented by hidden sexual desire, envy, supernatural power, and double characters. The aspect of the sexual desire is indicated in the novel by sexual undertones expressed by Irene towards Clare’s physical features. Envy in the novel is expressed by Irene who shows resentful longing aroused by Clare’s possessions and qualities due to her passing to the white community. The aspect of omnipotence of thoughts is in
... Show MoreVideo steganography has become a popular option for protecting secret data from hacking attempts and common attacks on the internet. However, when the whole video frame(s) are used to embed secret data, this may lead to visual distortion. This work is an attempt to hide sensitive secret image inside the moving objects in a video based on separating the object from the background of the frame, selecting and arranging them according to object's size for embedding secret image. The XOR technique is used with reverse bits between the secret image bits and the detected moving object bits for embedding. The proposed method provides more security and imperceptibility as the moving objects are used for embedding, so it is difficult to notice the
... Show More