Preferred Language
Articles
/
EBeNQ48BVTCNdQwC02is
Enhancement of Recommendation Engine Technique for Bug System Fixes
...Show More Authors

This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially their utility in allocating a problem to a specific developer. An analysis was conducted on two key areas: first, the development of a model to represent developer prioritizing within the bug repository, and second, the use of hybrid machine learning techniques to select bug reports. Moreover, we use our model to facilitate developer assignment responsibilities. Moreover, we considered the developers’ backgrounds and drew upon their established knowledge and experience when formulating the pertinent objectives. An examination of two individuals’ experiences with software defects and how their actions impacted their rankings as developers in a software project is presented in this study. Researchers are implementing developer categorization techniques, assessing severity, and reopening bugs. A suitable number of bug reports is used to examine the model’s output. A developer’s bug assignment employee has been established, enabling the program to successfully address software maintenance issues with the highest accuracy of 78.38%. Best engine performance was achieved by optimizing and cleansing data, using relevant attributes, and processing it using deep learning.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Oct 01 2018
Journal Name
Journal Of Educational And Psychological Researches
The ability of solving a mathematical problem and its relation to system thinking among fifth preparatory students
...Show More Authors

The research seeks to examine the ability of fifth preparatory students in solving a mathematical problem in relation to system thinking. To this end, the researcher chose (140) fifth preparatory students from four-different secondary schools in Kirkuk city for the academic year (2016-2017). Two tests were adopted to collect study data: a test of (5) items about skills in solving math problem designed by (Al-raihan, 2006); and a test of system thinking skills designed by the researcher himself consisted of (14) items. It was divided into four skills (analyzing the main system to subsystems, eliminating all inner gaps of system, identifying the inner connection of system, and reorganizing the system). The findings indicated a good ability

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Indonesian Journal Of Electrical Engineering And Computer Science
Construct an efficient distributed denial of service attack detection system based on data mining techniques
...Show More Authors

<span>Distributed denial-of-service (DDoS) attack is bluster to network security that purpose at exhausted the networks with malicious traffic. Although several techniques have been designed for DDoS attack detection, intrusion detection system (IDS) It has a great role in protecting the network system and has the ability to collect and analyze data from various network sources to discover any unauthorized access. The goal of IDS is to detect malicious traffic and defend the system against any fraudulent activity or illegal traffic. Therefore, IDS monitors outgoing and incoming network traffic. This paper contains a based intrusion detection system for DDoS attack, and has the ability to detect the attack intelligently, dynami

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (2)
Scopus Crossref
Publication Date
Fri Nov 01 2019
Journal Name
Indian Journal Of Natural Sciences
The Numerical and Experimental Work of Chaos System in Three Dimensions Phase Spaceusing Rossler Circuit
...Show More Authors

In this paper, we deal with a dynamical system that can demonstrate a chaotic attractor of Rossleroscillator. We simulate the Rosslerequations numerically then we investigate the model experimentally. Numerically, the Rossler parameter a and b were fixed and c was changed.The evolution of the system exhibits period, period-doubling, second period doubling, and chaos when control parameters are changed. This evolution can be seen by analyze the time series, the bifurcation diagrams and phase space. Experimentally, the evolution of the system exhibited the same numerical behavior by changing the resistance (Rv) in Rossler circuit that represent as control parameter.

Publication Date
Sun Sep 02 2007
Journal Name
Iraqi Postgraduate Medical Journal
The Efficacy of Dextran 70 on Reticuloendothelial System in Systemically Infected Mice with Klebsiella Pneumoniae
...Show More Authors

The reticuloendothelial system (RES) play an important role in immunity against bacterial infection and Klebsiella pneumoniae one of the most common causes of hospital-acquired infections. Dextran70 (D70), a polysaccharide, may alter functions of this system through changing many biological activities in the tissues.

Publication Date
Mon Jun 01 2015
Journal Name
Conference: 8th International Conference And Exhibition On Design And Production Of Machines And Dies/molds
Design, Construction, and Controlling of A Shaped Metal Deposition Machine Using Arc Metal-Wire System
...Show More Authors

Publication Date
Sat Sep 12 2020
Journal Name
Al-kindy College Medical Journal
Spectrum of central nervous system infections in neurosciences hospital in two years : a retrospective study
...Show More Authors

Background :Infectious disorders in general have high morbidity and mortality.. CNS infections include many disorders like bacterial meningitis, tuberculous and other subacute and chronic meningitis, viral meningitis, cerebral abscess, spinal cord infections, and others.
Objective: To assess our locality about prevalence of CNS infections , to have more awareness regarding CNS infections, and to try to find the proper way to reduce their prevalence and to treat them in appropriate way.
Method :We revised the records of all the cases of CNS infections excluding cases of spinal cord infections who were admitted in the wards of neuroscience hospital over the previous two years ( from July/2010 to June 2012 ),those were 132 cases.Seaso

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Sep 15 2019
Journal Name
Al-academy
The Mark transformation of the Visual Display System in the Children's Theater: رامي سامح زكي
...Show More Authors

    The mark at the Children's Theater did not receive as much attention as in the adult theater, despite the great attention given to its visual system, but some of the directors of the Children's Theater approached the application of the same system of marking in the adult theater, without limiting  a certain mechanism  that identifies the mechanisms of mark operation and the modalities of its transformation in the visual display system, which called on the  researcher to shed light in this study on the scientific shift in the visual display system and its functions in the children's theater. The researcher formulated a title for his research (the mark transformation of the visual display system in the chi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 28 2023
Journal Name
Mathematics
The Impact of Fear on a Harvested Prey–Predator System with Disease in a Prey
...Show More Authors

A mathematical eco-epidemiological model consisting of harvested prey–predator system involving fear and disease in the prey population is formulated and studied. The prey population is supposed to be separated into two groups: susceptible and infected. The susceptible prey grows logistically, whereas the infected prey cannot reproduce and instead competes for the environment’s carrying capacity. Furthermore, the disease is transferred through contact from infected to susceptible individuals, and there is no inherited transmission. The existence, positivity, and boundedness of the model’s solution are discussed. The local stability analysis is carried out. The persistence requirements are established. The global behavior of th

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Fri Jun 20 2025
Journal Name
Baghdad Science Journal
The Role of Fear and Predator Dependent Refuge on a Stage Structure Prey-Predator System
...Show More Authors

The present paper investigates the role of fear and predator dependent refuge in the prey-predator system. The system describes the interaction between prey and a stage structure of predator that incorporates Holling II functional response. The predator splits into two compartments immature (juvenile) and mature (adult). The mature predators can hunt and reproduce but this capability is not found in the immature predators, the immature depend on their parents. The growth rate of prey decreases due to the existence of mature predators. The existence, uniqueness, and boundedness of the solution of the system are investigated. Three equilibrium points of the system are determined. The local stability of the system is studied. The global stabil

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Mon Aug 01 2011
Journal Name
International Journal Of Research And Reviews In Computer Science
Detection of the photon number splitting attack by using decoy states quantum key distribution system
...Show More Authors

The goal of this work is to check the presence of PNS (photon number splitting) attack in quantum cryptography system based on BB84 protocol, and to get a maximum secure key length as possible. This was achieved by randomly interleaving decoy states with mean photon numbers of 5.38, 1.588 and 0.48 between the signal states with mean photon numbers of 2.69, 0.794 and 0.24. The average length for a secure key obtained from our system discarding the cases with Eavesdropping was equal to 125 with 20 % decoy states and 82 with 50% decoy states for mean photon number of 0.794 for signal states and 1.588 for decoy states.