Preferred Language
Articles
/
bsj-9675
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the needs of stakeholders and the goals of the organization. The research objectives in this research to the process collected and integrating data from multiple sources and ensuring interoperability. Conclusion in this research is determining is the clustering algorithm help the collection data and elicitation process has a somewhat greater impact on the ratings provided by professionals for pairs that belong to the same cluster. However, the influence of POS tagging on the ratings given by professionals is relatively consistent for pairs within the same cluster and pairs in different clusters.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Apr 01 2017
Journal Name
Iracst – International Journal Of Computer Networks And Wireless Communications (ijcnwc)
Optimizing Network Security Considerations with Transition to IPv6 in University of Baghdad, A Prototype
...Show More Authors

It is believed that Organizations around the world should be prepared for the transition to IPv6 and make sure they have the " know how" to be able to succeed in choosing the right migration to start time. This paper focuses on the transition to IPv6 mechanisms. Also, this paper proposes and tests a deployment of IPv6 prototype within the intranet of the University of Baghdad (BUniv) using virtualization software. Also, it deals with security issues, improvements and extensions of IPv6 network using firewalls, Virtual Private Network ( VPN), Access list ( ACLs). Finally, the performance of the obtainable intrusion detection model is assessed and compared with three approaches.

Publication Date
Thu Mar 01 2018
Journal Name
Journal Of Engineering And Sustainable Development
MEASURING THE URBAN INTEGRAL SUSTAINABILITY IN “MUSTANSIRIYA UNIVERSITY “ACCORDING TO THE INTEGRAL DESIGN THEORY
...Show More Authors

View Publication
Crossref
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
Predominant Beliefs toward Coronavirus of Baghdad University Students
...Show More Authors

Abstract

The current research aims to identify the most prominent beliefs about coronavirus of Baghdad University students, as well as to identify the prominent beliefs toward coronavirus of male and female students. To achieve the research objectives, a questionnaire of (15) items was administered to a sample of (600) male and female students collected from ten different colleges at the university of Baghdad. The findings of the research illustrated that item (8) took priority as students believe there is a misleading about coronavirus spreading by governments, item (2) which indicated that coronavirus is man-made took level two, followed by item (10), it proposes that coronavirus emerged from the American milit

... Show More
View Publication Preview PDF
Publication Date
Sat Oct 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
The use of standard rates in the test of the financial stability for the banking sector in Iraq For the period 2009-2013
...Show More Authors

ABSTRACT

The research focuses on the key issue concerning the use of the best ways to test the financial stability in the banking sector, considering that financial stability cannot be achieved unless  the financial sector in general and the banking sector  in particular are able to perform its key role in addressing the economic and social development requirements, under the laws and regulations that control  banking sector , as the only way that increases its ability to deal with any risks or negative effects experienced by banks and other financial institutions. The research goal is  to evaluate the stability of the banking system in Iraq, through the use of a set of econometrics an

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of The College Of Languages (jcl)
The article deals with the marked vocabulary of Russian and Arabic language, extrapolated to the phraseological: Маркировка арабского и русского языков: На примере фразеологии
...Show More Authors

  The paper deals with the marked vocabulary of Russian and Arabic language, and the extrapolated to the phraseological layer of the mentioned language systems. Specificity of the functioning of this process is presented against the backdrop of the peculiarities of the existence of Russian and Arabic languages. Attention is focused on the fact that linguistic markers should be considered as a kind of keys that represent the specificity of the experience of being experienced by an individual in ontological reality. It is asserted that marking can be revealed practically at all levels of the language polysystem, but it is especially productive on its lexical layer, in particular, on the basis of lexicology and ph

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 01 2020
Journal Name
Baghdad Science Journal
A Modified Support Vector Machine Classifiers Using Stochastic Gradient Descent with Application to Leukemia Cancer Type Dataset
...Show More Authors

Support vector machines (SVMs) are supervised learning models that analyze data for classification or regression. For classification, SVM is widely used by selecting an optimal hyperplane that separates two classes. SVM has very good accuracy and extremally robust comparing with some other classification methods such as logistics linear regression, random forest, k-nearest neighbor and naïve model. However, working with large datasets can cause many problems such as time-consuming and inefficient results. In this paper, the SVM has been modified by using a stochastic Gradient descent process. The modified method, stochastic gradient descent SVM (SGD-SVM), checked by using two simulation datasets. Since the classification of different ca

... Show More
View Publication Preview PDF
Scopus (11)
Crossref (6)
Scopus Clarivate Crossref
Publication Date
Thu Dec 09 2021
Journal Name
Iraqi Journal Of Pharmaceutical Sciences ( P-issn 1683 - 3597 E-issn 2521 - 3512)
Preparation and In vitro Characterization of Aceclofenac Nanosuspension (ACNS) for Enhancement of Percutaneous Absorption using Hydrogel Dosage Form
...Show More Authors

         Aceclofenac (AC) is an orally active phenyl acetic acid derivative, non-steroidal anti-inflammatory drug with exceptional anti-inflammatory, analgesic and antipyretic properties. It has low aqueous solubility, leading to slow dissolution, low permeability and inadequate bioavailability. The aim of the current study was to prepare and characterize AC-NS-based gel to enhance the dissolution rate and then percutaneous permeability. NS.s were prepared using solvent/antisovent precipitation method at different drug to polymer ratios (1:1, 1:2, and 1:3) using different polymers such as poly vinyl pyrrolidone (PVP-K25), hydroxy propyl methyl cellulose (HPMC-E5) and poloxamer® (388) as stabilizer

... Show More
View Publication Preview PDF
Scopus (10)
Crossref (3)
Scopus Crossref
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Geological Journal
Estimation of Initial Oil in Place for Buzurgan Oil Field by Using Volumetric Method and Reservoir Simulation Method
...Show More Authors

The estimation of the initial oil in place is a crucial topic in the period of exploration, appraisal, and development of the reservoir. In the current work, two conventional methods were used to determine the Initial Oil in Place. These two methods are a volumetric method and a reservoir simulation method. Moreover, each method requires a type of data whereet al the volumetric method depends on geological, core, well log and petrophysical properties data while the reservoir simulation method also needs capillary pressure versus water saturation, fluid production and static pressure data for all active wells at the Mishrif reservoir. The petrophysical properties for the studied reservoir is calculated using neural network technique

... Show More
View Publication
Scopus (6)
Scopus Crossref
Publication Date
Sun Sep 24 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Using The Ultrasonic Waves For Studying Thermal And Elastic Properties as a Function of Porosity in Sintered ceramic
...Show More Authors

Ultrasonic pulse echo measurements on porous alumina as ceramic

material with porosities ranging from (20-40)% showed effect of volume

fraction of porosity on both thermal and elastic properties. A quadratic relationships, by using a least squares method, is deduced for the dependence of the shear velocity, longitudinal velocity, shear modulus, Young's modulus,  bulk  modulus, Poisson 's ratio, Debye temperature, specific heat, and thermal conductivity on the total  porosity. By these relationships,  the  thermal  and  elastic  properties  results  of  pore-free alumina  were  calculated.  The  elastic  properties  results  of  

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Journal Of Engineering
Securing Physical Layer for FHSS Communication System Using Code andPhase Hopping Techniques in CDMA, System Design and Implementation
...Show More Authors

The Frequency-hopping Spread Spectrum (FHSS) systems and techniques are using in military and civilianradar recently and in the communication system for securing the information on wireless communications link channels, for example in the Wi-Fi 8.02.X IEEE using multiple number bandwidth and frequencies in the wireless channel in order to hopping on them for increasing the security level during the broadcast, but nowadays FHSS problem, which is, any Smart Software Defined Radio (S-SDR) can easily detect a wireless signal at the transmitter and the receiver for the hopping sequence in both of these, then duplicate this sequence in order to hack the signal on both transmitter and receiver messages using the order of the se

... Show More
View Publication Preview PDF
Crossref (1)
Crossref