This study aims to develop a recommendation engine methodology to enhance the model’s effectiveness and efficiency. The proposed model is commonly used to assign or propose a limited number of developers with the required skills and expertise to address and resolve a bug report. Managing collections within bug repositories is the responsibility of software engineers in addressing specific defects. Identifying the optimal allocation of personnel to activities is challenging when dealing with software defects, which necessitates a substantial workforce of developers. Analyzing new scientific methodologies to enhance comprehension of the results is the purpose of this analysis. Additionally, developer priorities were discussed, especially their utility in allocating a problem to a specific developer. An analysis was conducted on two key areas: first, the development of a model to represent developer prioritizing within the bug repository, and second, the use of hybrid machine learning techniques to select bug reports. Moreover, we use our model to facilitate developer assignment responsibilities. Moreover, we considered the developers’ backgrounds and drew upon their established knowledge and experience when formulating the pertinent objectives. An examination of two individuals’ experiences with software defects and how their actions impacted their rankings as developers in a software project is presented in this study. Researchers are implementing developer categorization techniques, assessing severity, and reopening bugs. A suitable number of bug reports is used to examine the model’s output. A developer’s bug assignment employee has been established, enabling the program to successfully address software maintenance issues with the highest accuracy of 78.38%. Best engine performance was achieved by optimizing and cleansing data, using relevant attributes, and processing it using deep learning.
Image of landsate-7 taken by thematic mapper was used and classified using supervised method. Results of supervised classification indicated presence of nine land cover classes. Salt-soils class shows the highest reflectance value while water bodies' class shows the lowest values. Also the results indicated that soil properties show different effects on reflectance. There was a high significant positive relation of carbonate, gypsum, electric conductivity and silt content, while there was a week positive relation with sand and negative relation with organic matter, water content, bulk density and cataion exchange capacity.
This paper investigates the performance evaluation of two state feedback controllers, Pole Placement (PP) and Linear Quadratic Regulator (LQR). The two controllers are designed for a Mass-Spring-Damper (MSD) system found in numerous applications to stabilize the MSD system performance and minimize the position tracking error of the system output. The state space model of the MSD system is first developed. Then, two meta-heuristic optimizations, Simulated Annealing (SA) optimization and Ant Colony (AC) optimization are utilized to optimize feedback gains matrix K of the PP and the weighting matrices Q and R of the LQR to make the MSD system reach stabilization and reduce the oscillation of the response. The Matlab softwar
... Show MoreA Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated visualization
... Show MoreImage steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p
... Show MoreDocument source identification in printer forensics involves determining the origin of a printed document based on characteristics such as the printer model, serial number, defects, or unique printing artifacts. This process is crucial in forensic investigations, particularly in cases involving counterfeit documents or unauthorized printing. However, consistent pattern identification across various printer types remains challenging, especially when efforts are made to alter printer-generated artifacts. Machine learning models are often used in these tasks, but selecting discriminative features while minimizing noise is essential. Traditional KNN classifiers require a careful selection of distance metrics to capture relevant printing
... Show MoreMassive multiple-input multiple-output (massive-MIMO) is a promising technology for next generation wireless communications systems due to its capability to increase the data rate and meet the enormous ongoing data traffic explosion. However, in non-reciprocal channels, such as those encountered in frequency division duplex (FDD) systems, channel state information (CSI) estimation using downlink (DL) training sequence is to date very challenging issue, especially when the channel exhibits a shorter coherence time. In particular, the availability of sufficiently accurate CSI at the base transceiver station (BTS) allows an efficient precoding design in the DL transmission to be achieved, and thus, reliable communication systems can be obtaine
... Show MoreIn this work, the performance of the receiver in a quantum cryptography system based on BB84 protocol is scaled by calculating the Quantum Bit Error Rate (QBER) of the receiver. To apply this performance test, an optical setup was arranged and a circuit was designed and implemented to calculate the QBER. This electronic circuit is used to calculate the number of counts per second generated by the avalanche photodiodes set in the receiver. The calculated counts per second are used to calculate the QBER for the receiver that gives an indication for the performance of the receiver. Minimum QBER, 6%, was obtained with avalanche photodiode excess voltage equals to 2V and laser diode power of 3.16 nW at avalanche photodiode temperature of -10
... Show MorePulsed laser ablation in liquid (PLAL) has become an increasingly important technique for metals production and metal oxides nanoparticles (NPs) and others. This technique has its many advantages compared with other conventional techniques (physical and chemical). This work was devoted for production of zirconia (ZrO2) nanoparticles via PLAL technique from a solid zirconium target immersed in a wet environment in order to study the effect of this environment on the optical properties and structure of ZrO2 nanoparticles. The solutions which used for this purpose is distilled water (D.W). The produces NPs were characterized by mean of many tests such as UV-visible (UV-Vis.), transmission electron microscope (TEM) and Z-Potential. The UV-Vis.
... Show MoreThis work concerned on nanocrystalline NiAl2O4 and ZnAl2O4 having spinel structure prepared by Sol–gel technique. The structural and characterization properties for the obtained samples were examined using different measurements such as X-ray diffraction (XRD), Fourier transform infrared spectroscopy (FTIR), finally, Field emission scanning electron microscope (FESEM).The Spinel-type for two prepared compound (NiAl2O4) and (ZnAl2O4) at different calcination temperature examined by XRD. Williamson-Hall Methods used to estimate crystallite size, Average distribution crystallite size of two compound were, 34.2 nm for NiAl2O4 and32.6 for ZnAl2O4, the increase in crystallite size affecting by increasing in calcination temperature for both comp
... Show MoreIn this study, the effect of pumping power on the conversion efficiency of nonlinear crystal (KTP) was investigated using laser pump-power technique. The results showed that the higher the pumping power values, the greater the conversion efficiency (η) and, as the crystal thickness increases within limitations, the energy conversion efficiency increases at delay time of (0.333 ns) and at room temperature. Efficiency of 80% at length of KTP crystal (L = 1.75 X 10-3 m) and Pin = 28MW, and also, compare the experimental results with numerical results by using MATLAB program.