This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially their utility in allocating a problem to a specific developer. An analysis was conducted on two key areas: first, the development of a model to represent developer prioritizing within the bug repository, and second, the use of hybrid machine learning techniques to select bug reports. Moreover, we use our model to facilitate developer assignment responsibilities. Moreover, we considered the developers’ backgrounds and drew upon their established knowledge and experience when formulating the pertinent objectives. An examination of two individuals’ experiences with software defects and how their actions impacted their rankings as developers in a software project is presented in this study. Researchers are implementing developer categorization techniques, assessing severity, and reopening bugs. A suitable number of bug reports is used to examine the model’s output. A developer’s bug assignment employee has been established, enabling the program to successfully address software maintenance issues with the highest accuracy of 78.38%. Best engine performance was achieved by optimizing and cleansing data, using relevant attributes, and processing it using deep learning.
<span lang="EN-US">Increase the in population and kindergarten number, especially in urban areas made it difficult to properly manage waste. Thus, this paper proposed a system dedicated to kindergartens to manage to dispose of waste, the system can be called smart garbage based on internet of things (SGI). To ensure a healthy environment and an intelligent waste in the kindergarten management system in an integrated manner and supported by the internet of things (IoT), we presented it in detail identification, the SGI system includes details like a display system, an automatic lid system, and a communication system. This system supplied capabilities to monitor the status of waste continuously and on IoT website can show the pe
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreRating systems for evaluating the sustainability of communities are an essential tool that is increasingly applied throughout the developed world to set criteria indicators to optimize the physical, social, economic, and environmental potential within such communities. Rating systems vary based on existing disparities among societies and their unique building and physical planning practices. Iraqi cities lacked the adaptation of a formal methodology or sustainability rating system to correctly measure the built environment’s sustainability indicators. This research attempts to review the most substantial rating systems to measure the sustainability of communities worldwide to form a
The work demonstrates the effect of cold atmospheric plasma (CAP) on adult female rats suffering from osteoporosis, the used plasma was generated by a floating electrode-dielectric barrier discharge system with an electrode diameter of 3 cm. The output power was from (12-20) watts. The effect of non-thermal plasma was observed on rats with various exposure times of 20, 30, and 40 sec. It was noted that the blood calcium percentage of animals exposed to cold plasma increased, as well as an increase in the level of vitamin D3 at the same time, it is noted that there is no effect on parathyroid hormone level. For the thyroid gland, it is noticed an increase in the level of T3, and T4 hormones in the blood during the period of induction for
... Show MoreAn assembled pulsed Nd:YAG laser-robot system for spot welding similar and dissimilar metals is presented in this paper. The study evaluates the performance of this system through investigating the possibility and accuracy of executing laser spot welding of 0.2 mm in thickness stainless steel grade AISI302 to 0.5 mm in thickness low carbon steel grade AISI1008. The influence of laser beam parameters (peak power, pulse energy, pulse duration, repetition rate, and focal plane position on the final gained best results are evaluated. Enhancement of the experimental results was carried by a computational simulation using ANSYS FLUENT 6.3 package code.
AZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
Steganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show More