A fault is an error that has effects on system behaviour. A software metric is a value that represents the degree to which software processes work properly and where faults are more probable to occur. In this research, we study the effects of removing redundancy and log transformation based on threshold values for identifying faults-prone classes of software. The study also contains a comparison of the metric values of an original dataset with those after removing redundancy and log transformation. E-learning and system dataset were taken as case studies. The fault ratio ranged from 1%-31% and 0%-10% for the original dataset and 1%-10% and 0%-4% after removing redundancy and log transformation, respectively. These results impacted directly the number of classes detected, which ranged between 1-20 and 1-7 for the original dataset and 1-7 and 0-3) after removing redundancy and log transformation. The Skewness of the dataset was deceased after applying the proposed model. The classified faulty classes need more attention in the next versions in order to reduce the ratio of faults or to do refactoring to increase the quality and performance of the current version of the software.
Objective: To identify the effectiveness of instruction oriented intervention for primipara women upon episiotomy and self
perineal care.
Methodology: A quasi-experimental study was carried out to determine the effectiveness of instruction-oriented
intervention for primipara women upon episiotomy and self-perineal care. A purposive "non-probability" sample of (60)
primipara mothers was selected from Ibn AL-Balady Pediatric and Maternity Hospital, Al-russafa, Baghdad. The sample
has been divided into two groups; (30) primipara women who were considered as a study group, and another (30) primipara
women who were considered as a control one. The study group was exposed to an instruction-oriented intervention. While,
the
The security of message information has drawn more attention nowadays, so; cryptography has been used extensively. This research aims to generate secured cipher keys from retina information to increase the level of security. The proposed technique utilizes cryptography based on retina information. The main contribution is the original procedure used to generate three types of keys in one system from the retina vessel's end position and improve the technique of three systems, each with one key. The distances between the center of the diagonals of the retina image and the retina vessel's end (diagonal center-end (DCE)) represent the first key. The distances between the center of the radius of the retina and the retina vessel's end (ra
... Show MoreA new tool geometry was used to achieve friction stir spot welding (FSSW) in which the shoulder was designed separately from the rotating pin, and in order to examine weldment strength through the modified tool, a lap joints of AA2024 aluminum alloy plate 1 mm thick were welded successfully by using 6 mm pin diameter and varying process parameters (rotational speeds, tool nose geometry, and depth of tool penetration in the lower welded plate). Experimental tests indicate that the maximum average tensile shear load was 3100 N at the best selected condition. Microstructure examination and micro hardness test along the spot zones were investigated as well as measuring pin penetration load. Visual inspection of the welded spot surface shows a g
... Show MoreBobbin friction stir welding (BFSW) is a variant of the conventional friction stir welding (CFSW); it can weld the upper and lower surface of the work-piece in the same pass. This technique involves the bonding of materials without melting. In this work, the influence of tool design on the mechanical properties of welding joints of 6061-T6 aluminum alloy with 6.25 mm thickness produced by FSW bobbin tools was investigated and the best bobbin tool design was determined. Five different probe shapes (threaded straight cylindrical, straight cylindrical with 3 flat surfaces, straight cylindrical with 4 flat surfaces, threaded straight cylindrical with 3 flat surface and threaded straight cylindrical with 4 flat surfaces) with various dimensio
... Show MoreThe estimation of the stressÙ€ strength reliability of Invers Kumaraswamy distribution will be introduced in this paper based on the maximum likelihood, moment and shrinkage methods. The mean squared error has been used to compare among proposed estimators. Also a Monte Carlo simulation study is conducted to investigate the performance of the proposed methods in this paper.
Mobile-based human emotion recognition is very challenging subject, most of the approaches suggested and built in this field utilized various contexts that can be derived from the external sensors and the smartphone, but these approaches suffer from different obstacles and challenges. The proposed system integrated human speech signal and heart rate, in one system, to leverage the accuracy of the human emotion recognition. The proposed system is designed to recognize four human emotions; angry, happy, sad and normal. In this system, the smartphone is used to record user speech and send it to a server. The smartwatch, fixed on user wrist, is used to measure user heart rate while the user is speaking and send it, via Bluetooth,
... Show MoreThe rapid development of automation industries and technologies has shown incredible prospects for transforming our homes into a smart home automation system, which are more secure than a simple home. This paper proposes a home application based on voice and text called the Automated Control and Monitoring System (ASCM). This application can be utilized by both normal and vision-impaired people by using with a mobile phone.
The application allows users to send voice commands through Google Assistant installed on Android to control the appliances. They can also have complete monitoring by logging onto the ThingSpeak dashboard, which displays a device status indicator and sends alert messages in the event of dang
... Show MoreSeveral recent approaches focused on the developing of traditional systems to measure the costs to meet the new environmental requirements, including Attributes Based Costing (ABCII). It is method of accounting is based on measuring the costs according to the Attributes that the product is designed on this basis and according to achievement levels of all the Attribute of the product attributes. This research provides the knowledge foundations of this approach and its role in the market-oriented compared to the Activity based costing as shown in steps to be followed to apply for this Approach. The research problem in the attempt to reach the most accurate Approach in the measurement of the cost of products from th
... Show More