Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the needs of stakeholders and the goals of the organization. The research objectives in this research to the process collected and integrating data from multiple sources and ensuring interoperability. Conclusion in this research is determining is the clustering algorithm help the collection data and elicitation process has a somewhat greater impact on the ratings provided by professionals for pairs that belong to the same cluster. However, the influence of POS tagging on the ratings given by professionals is relatively consistent for pairs within the same cluster and pairs in different clusters.
Some of the main challenges in developing an effective network-based intrusion detection system (IDS) include analyzing large network traffic volumes and realizing the decision boundaries between normal and abnormal behaviors. Deploying feature selection together with efficient classifiers in the detection system can overcome these problems. Feature selection finds the most relevant features, thus reduces the dimensionality and complexity to analyze the network traffic. Moreover, using the most relevant features to build the predictive model, reduces the complexity of the developed model, thus reducing the building classifier model time and consequently improves the detection performance. In this study, two different sets of select
... Show MoreSpace is considered as an important element in constructing artwork, it can be a dominant and fulfilled part that adds new existence to the content. Each artwork must have a space artistically or analytically. The internal and eternal space of artwork have associated with each other in order to be ann important connected unit that establishes the work epressions and helps the audience to understand it. Such kind of works can be represented by the works of the potter (Sheinyor Abdu Allah) which have uarious expressions of space which this study is based on.The study aims at finding out the treatment of apace in the ceramic sculpture works of the potter (Sheinyar Abdu Allah).The second chapter has many sections. T
... Show MoreBackground: Pyogenic granuloma is a hyperplastic benign tumor. The most common intra-oral site is marginal gingiva. It is often occurred in the second decade of life, it has a strong tendency to recur after simple excision.
The aim of study: to evaluate the therapeutic advantages of diode laser (810-980 nm) in intraoral Pyogenic granuloma management.
Materials and method: A total of 28 patients (14 men and 14 females) were enrolled in this study and had their pyogenic granuloma surgically removed using a diode laser. All of the patients were given local anesthetic and went through the identical surgical procedure (cartridge containing 1 percent lidocaine with epinephrine 1:
... Show MoreThis research aims at identifying the nature of addressing the Middle East issues in the talk shows in the foreign channels speaking in Arabic "France 24, a model", and identifying the extent of interest of the channel in addressing middle east issues in the talk shows, the nature of the guests and the hosts, methods of addressing the issues, and the technical features that characterize the presenter of the research sample program. This research is considered an analytical descriptive study. It depends on the analysis of the content of the series of the weekly talk show "a week from the world" on the French channel (France 24) during the period (August 1/July 31 2018).
The most important results indicated that the foreign channels sp
The cross section evaluation for (α,n) reaction was calculated according to the available International Atomic Energy Agency (IAEA) and other experimental published data . These cross section are the most recent data , while the well known international libraries like ENDF , JENDL , JEFF , etc. We considered an energy range from threshold to 25 M eV in interval (1 MeV). The average weighted cross sections for all available experimental and theoretical(JENDL) data and for all the considered isotopes was calculated . The cross section of the element is then calculated according to the cross sections of the isotopes of that element taking into account their abundance . A mathematical representative equation for each of the element
... Show MoreRecently emerging pandemic SARS CoV-2 conquered our world since December 2019. Continuous efforts have been done to find out effective immunization and precise treatment stetratigies A way from therapeutic options that were tried in SARS CoV-2, an increased attention is directed to predict natural products and mainly phytochemicals as collaborative measures for this crisis. In this review, most of the mentioned compounds specially flavonoids (biacalin, hesperidin, quercetin, luteolin,, and phenolic (resveratrol, curcumin, and theaflavin) exert their effect through interfering with the action of one or more of this proteins (spike protein, papain like protease, 3 chymotrypsin like cysteine protease, and RNA dependent RNA
... Show MoreWith the development of communication technologies for mobile devices and electronic communications, and went to the world of e-government, e-commerce and e-banking. It became necessary to control these activities from exposure to intrusion or misuse and to provide protection to them, so it's important to design powerful and efficient systems-do-this-purpose. It this paper it has been used several varieties of algorithm selection passive immune algorithm selection passive with real values, algorithm selection with passive detectors with a radius fixed, algorithm selection with passive detectors, variable- sized intrusion detection network type misuse where the algorithm generates a set of detectors to distinguish the self-samples. Practica
... Show MoreAnal fistula is an anorectal condition with over 90% of cases being
cryptoglandular in origin and occurring after anorectal abscesses. The traditional method of
treatment of an anal fistula is by excision or de roofing the tract awaiting complete healing.. Aim:
The aim of this study is to assess the efficacy of diode laser 980 nm in the treatment of low fistula in
ano. Methods: The study was performed between June 2019 to end of September 2019, at the
institute of laser for postgraduate study in Baghdad university. A cohort of ten male patients with a
provisional diagnosis of low type anal fistula were selected for this study and treated by interstitial
photothermal therapy of fistula epithelium by diode laser 980nm