Preferred Language
Articles
/
bsj-9675
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the needs of stakeholders and the goals of the organization. The research objectives in this research to the process collected and integrating data from multiple sources and ensuring interoperability. Conclusion in this research is determining is the clustering algorithm help the collection data and elicitation process has a somewhat greater impact on the ratings provided by professionals for pairs that belong to the same cluster. However, the influence of POS tagging on the ratings given by professionals is relatively consistent for pairs within the same cluster and pairs in different clusters.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 06 2007
Journal Name
كلية التربية البدنية وعلوم الرياضة/جامعة بغداد .
تأثير التمرينات الاوكسجينية واللاأوكسجينية في الوحدة التدريبية لتطوير بعض القدرات الوظيفية والبدنية للاعبي كر ة القدم بعمر (13-14)سنة. رسالة ماجستير
...Show More Authors

Publication Date
Sun Apr 02 2017
Journal Name
Journal Of Educational And Psychological Researches
معوقات تطبيق الإدارة الإلكترونية في وزارة التربية والتعليم بسلطنة عمان(البوابة التعليمية الإلكترونية أنموذجاً) من وجهة نظر موظفي المديرية العامة لتقنية المعلومات
...Show More Authors

Drawbacks of Implementing Electronic Management in the Ministry of Education (A sample: Oman Educational Portal) from the Point of View of IT Staff. The study aimed at discovering the drawbacks of implementing electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff, and that is by answering the following questions: - What are the main drawbacks (administrative, financial, technical and drawbacks related to human resources) that hinder implementing the electronic management in the Ministry of Education (a sample: Oman Educational Portal) from the point of view of IT staff? - Are there any statistical significance differences at the level (0.05) between study samples on the

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 26 2023
Journal Name
Arab Science Heritage Journal
الاديب الكاتب والمؤرخ الفقيه يحيى بن خلدون (ت 780هـ/ 1379م) كاتب ديوان الانشاء في دولة بني زيان (633-962هـ/ 1235-1554م) بتلمسان
...Show More Authors

    A prominent figure such as Yahya bin Khaldoun and a scholar of the moroccan countries in the medieval era, and had a special place in the history of the country and the state of Bani Zayan, and the positions he occupied in it and left his scientific, literary and historical traces, leaving him an imprint in the course of history and its events, and in this study
I dealt with the research: his personal life : his name and lineage, then his upbringing and his family.

    The aim of the study is to know this character in the details of his personal and scientific life, according to the historical descriptive research method, including description and presentation of events, and linking them in a

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 04 2018
Journal Name
Iraqi Journal Of Science
Improving Detection Rate of the Network Intrusion Detection System Based on Wrapper Feature Selection Approach
...Show More Authors

Regarding the security of computer systems, the intrusion detection systems (IDSs) are essential components for the detection of attacks at the early stage. They monitor and analyze network traffics, looking for abnormal behaviors or attack signatures to detect intrusions in real time. A major drawback of the IDS is their inability to provide adequate sensitivity and accuracy, coupled with their failure in processing enormous data. The issue of classification time is greatly reduced with the IDS through feature selection. In this paper, a new feature selection algorithm based on Firefly Algorithm (FA) is proposed. In addition, the naïve bayesian classifier is used to discriminate attack behaviour from normal behaviour in the network tra

... Show More
View Publication Preview PDF
Publication Date
Mon Feb 01 2016
Journal Name
Journal Of Engineering
Environment Friendly Eco - City
...Show More Authors

The World witnessed over the past few decades a clear change in the urban existence map, where the number of cities' residents has increased and the cities geographic area expanded, also networks of roads and electric power stations were spread. This extraordinary events caused the drawing of a different identity to the world, race with itself in the field of energy and raw materials consumption. Therefore, the research issue individualizes in the lack of available knowledge concerning the subject of environment friendly ecological urban desiging and planning.So the research aims to define the environmentally friendly eco-city' structural elements and to clarify their most important planning and design foundations. To In

... Show More
View Publication Preview PDF
Publication Date
Thu Nov 29 2018
Journal Name
Iraqi Journal Of Science
A new Color image Encryption based on multi Chaotic Maps
...Show More Authors

     This paper presents a new RGB image encryption scheme using multi chaotic maps. Encrypting an image is performed via chaotic maps to confirm the properties of secure cipher namely confusion and diffusion are satisfied. Also, the key sequence for encrypting an image is generated using a combination of   1D logistic and Sine chaotic maps. Experimental results and the compassion results indicate that the suggested scheme provides high security against several types of attack, large secret keyspace and highly sensitive.   

View Publication Preview PDF
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: AlMuthanna \ Iraq)
...Show More Authors

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi

... Show More
View Publication Preview PDF
Crossref (3)
Crossref
Publication Date
Fri Feb 10 2023
Journal Name
Journal Of Applied Mathematics
The Dynamics of a Delayed Ecoepidemiological Model with Nonlinear Incidence Rate
...Show More Authors

In this paper, the general framework for calculating the stability of equilibria, Hopf bifurcation of a delayed prey-predator system with an SI type of disease in the prey population, is investigated. The impact of the incubation period delay on disease transmission utilizing a nonlinear incidence rate was taken into account. For the purpose of explaining the predation process, a modified Holling type II functional response was used. First, the existence, uniform boundedness, and positivity of the solutions of the considered model system, along with the behavior of equilibria and the existence of Hopf bifurcation, are studied. The critical values of the delay parameter for which stability switches and the nature of the Hopf bifurcat

... Show More
View Publication Preview PDF
Scopus (3)
Scopus Clarivate Crossref
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
The Dynamics of Biological Models with Optimal Harvesting
...Show More Authors

      This paper aims to introduce a concept of an equilibrium point of a dynamical system which will call it almost global asymptotically stable. We also propose and analyze a prey-predator model with a suggested  function growth in prey species. Firstly the existence and local stability of all its equilibria are studied. After that the model is extended to an optimal control problem to obtain an optimal harvesting strategy. The discrete time version of Pontryagin's maximum principle is applied to solve the optimality problem. The characterization of the optimal harvesting variable and the adjoint variables are derived. Finally these theoretical results are demonstrated with numerical simulations.

View Publication Preview PDF
Scopus (10)
Crossref (4)
Scopus Crossref
Publication Date
Thu Jan 06 2022
Journal Name
Al-adab Journal
اتجاهات العمود السياسي في جريدة الزمان الدولية ازاء الشأن العراقي دراسة تحليلية لعمود (توقيع) انموذجا للمدة من 1/12/2004 ولغاية1/2/2005
...Show More Authors

ءأرﻘﻟا ةﺎﯾﺣﺑ ًﺎﻘﯾﺛو ًﻻﺎﺻﺗا لﺻﺗﺗ. نﻣ ﮫﺑﺗﺎﮐﻟﻟ ﻲﺻﺧﺷﻟا ﻊﺑﺎطﻟا ﻲﻔﺣﺻﻟا دوﻣﻌﻟا لﻣﺣﯾ ا فﻟﺗﺧﻣﻟ ﮫﻟوﺎﻧﺗ لﻼﺧ وا ﮫﺋارا وا هرظﻧ ﺔﮭﺟو لﻣﺣﺗ ﻲﺗﻟا ﺔﯾﻣوﯾﻟا ثادﺣﻻاو ﺎﯾﺎﺿﻘﻟ ﺢﺿﻔﺑ موﻘﯾو ثادﺣﻻاو ﺔﯾﺑﻟﺳﻟا رھاوظﻟﻟ ىدﺻﺗﯾ وا، ءيرﺎﻘﻟا ﯽﻟا ﮫﺑرﺎﺟﺗ وا هرﺎﮐﻓا ءﺎطﺧﻻا دﺻرﯾ بﯾﻗرﺑ ﮫﺑﺷا وھو، ءيرﺟﻟا دﻘﻧﻟا نﻋ مﻧﯾ بوﻟﺳﺎﺑ ﺔﺋطﺎﺧﻟا تﺎﺳرﺎﻣﻣﻟا ﺎﮭﺣدﻣﯾو تﺎﯾﺑﺎﺟﯾﻻا ﯽﻟﻋ

... Show More
View Publication
Crossref