Preferred Language
Articles
/
bsj-9675
Natural Language Processing For Requirement Elicitation In University Using Kmeans And Meanshift Algorithm
...Show More Authors

 Data Driven Requirement Engineering (DDRE) represents a vision for a shift from the static traditional methods of doing requirements engineering to dynamic data-driven user-centered methods. Data available and the increasingly complex requirements of system software whose functions can adapt to changing needs to gain the trust of its users, an approach is needed in a continuous software engineering process. This need drives the emergence of new challenges in the discipline of requirements engineering to meet the required changes. The problem in this study was the method in data discrepancies which resulted in the needs elicitation process being hampered and in the end software development found discrepancies and could not meet the needs of stakeholders and the goals of the organization. The research objectives in this research to the process collected and integrating data from multiple sources and ensuring interoperability. Conclusion in this research is determining is the clustering algorithm help the collection data and elicitation process has a somewhat greater impact on the ratings provided by professionals for pairs that belong to the same cluster. However, the influence of POS tagging on the ratings given by professionals is relatively consistent for pairs within the same cluster and pairs in different clusters.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Apr 12 2019
Journal Name
Journal Of Economics And Administrative Sciences
The effectiveness of the Iraqi banking system in dealing with the effects of fiscal austerity policy
...Show More Authors

Abstract:

    Under the state scenario, fiscal policy will not be able to use the oil surpluses optimally and economically and society, as long as these surpluses are not directed by public expenditure towards new productive investments and by following the path of fiscal policy after one year 2003 and until 2013 we note that it is based on the method of spending (excessive) consumption, and did not take any action towards the budget deficit planned at the beginning of the fiscal year, and the actual surplus at the end of the fiscal year, which represents the highest expenditure in the budget, Salaries and wages of workers in various government agencies with the expansion of spending on the security side.&n

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jan 01 2025
Journal Name
Iv. International Rimar Congress Of Pure, Applied Sciences
A New Intrusion Detection Approach Based on RNA Encoding and K-Means Clustering Algorithm Using KDD-Cup99 Dataset
...Show More Authors

Intrusion detection systems (IDS) are useful tools that help security administrators in the developing task to secure the network and alert in any possible harmful event. IDS can be classified either as misuse or anomaly, depending on the detection methodology. Where Misuse IDS can recognize the known attack based on their signatures, the main disadvantage of these systems is that they cannot detect new attacks. At the same time, the anomaly IDS depends on normal behaviour, where the main advantage of this system is its ability to discover new attacks. On the other hand, the main drawback of anomaly IDS is high false alarm rate results. Therefore, a hybrid IDS is a combination of misuse and anomaly and acts as a solution to overcome the dis

... Show More
Preview PDF
Publication Date
Mon Jun 01 2015
Journal Name
Journal Of Economics And Administrative Sciences
The phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the interna
...Show More Authors

The phenomenon of negative behavior has studied as a social and psychological phenomenon that effect on the performance and life of workers inside and outside the organization. The adoption of this phenomenon is studied in terms of the role of the internal environment of the organization in addressing this behavior, being the variables belong to the field of organizational behavior to see the results of those variables on the Iraqi organizations, since the specificities of it differ from the rest of the Arab and foreign environments. Therefore, this study focused on testing the relationship of the internal environment of the organization and its role in addressing the negative behavior of the workers.

thi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jan 02 2022
Journal Name
Journal Of The College Of Languages (jcl)
Linguistic and extralinguistic problems of the translation of polysemic terms in the legal language from Spanish to Arabic: Problemas lingüísticos y extralingüísticos de la traducción de los términos polisémicos en el lenguaje jurídico del español al árabe
...Show More Authors

       Legislative language is characterized by its complexity, specifically in the process of translating statutory terms from two quite different languages, and from totally two different legal systems as from Spanish into Arabic. The present study stresses the process of translating legislative terms used in Spanish wills into Arabic through high lightening the polysemy of such mentioned terms and explaining their use in other legislative grounds.  Additionally, the present study elucidates, analyzes, underlines the difficulty and looks for the most appropriate procedures and techniques of translating some of the prominent inheritance expressions taking in account the legislative dif

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Apr 01 2018
Journal Name
Al–bahith Al–a'alami
Addressing the Palestinian Cause by Talk shows of Russia Today and Alhurra June 2014- May 2015
...Show More Authors

The purpose of this analytical study is to showcase how Russia Today and U.S Alhurra channels addressed the Palestinian Cause between the periods of mid-2014 and mid-2015. In addition, the study aims to highlight the “significance levels” of the Palestinian Cause in both channels.
The study is based on a rigorous survey methodology adopted by the researcher and based on the content analysis of Russia Today’s “Panorama” talk show and Alhurra’s “Free Hour show”.
First level examination included the content analysis of 398 talk show episodes broadcasted by both channels during the period through which the study was conducted.
Second level examination featured a detailed analysis of 38 episodes covering Palestinian A

... Show More
View Publication Preview PDF
Crossref
Publication Date
Fri Jun 30 2017
Journal Name
Journal Of Engineering
Aluminium Matrix Composites Fabricated by Friction Stir Processing A Review
...Show More Authors

      Aluminum alloys widely use in production of the automobile and the aerospace because
they have low density, attractive mechanical properties with respect to their weight, better
corrosion and wear resistance, low thermal coefficient of expansion comparison with traditional
metals and alloys. Recently, researchers have shifted from single material to composite materials
to reduce weight and cost, improve quality, and high performance in structural materials.
Friction stir processing (FSP) has been successfully researched for manufacturing of metal
matrix composites (MMCs) and functional graded materials (FGMs), find out new possibilities
to chemically change the surfaces. It is shown th

... Show More
View Publication Preview PDF
Publication Date
Mon Aug 01 2022
Journal Name
Baghdad Science Journal
An Analytic Solution for Riccati Matrix Delay Differential Equation using Coupled Homotopy-Adomian Approach
...Show More Authors

An efficient modification and a novel technique combining the homotopy concept with  Adomian decomposition method (ADM) to obtain an accurate analytical solution for Riccati matrix delay differential equation (RMDDE) is introduced  in this paper  . Both methods are very efficient and effective. The whole integral part of ADM is used instead of the integral part of homotopy technique. The major feature in current technique gives us a large convergence region of iterative approximate solutions .The results acquired by this technique give better approximations for a larger region as well as previously. Finally, the results conducted via suggesting an efficient and easy technique, and may be addressed to other non-linear problems.

View Publication Preview PDF
Scopus (5)
Scopus Clarivate Crossref
Publication Date
Mon Apr 03 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of Using Cubing Technique in the Iraqi EFL Secondary Students' Composition Writing, Vocabulary, and Meta-Cognitive Awareness
...Show More Authors

Abstract

The aim of this research is to determine how well the Cubing Technique affects the Iraqi EFL students' composition writing, vocabulary, and meta-cognitive awareness of writing strategies. The sample of (64) secondary-school female students in the fifth grade is drawn from two classrooms and split into two equal groups: the experimental group and the control group, each of which consists of (32) students. A quasi-experimental design is applied. The performance test and Meta-cognitive Writing Strategies questionnaire are given as a pre-test for equalizing the two groups after ensuring their validity and reliability. Then, they are administrated as a posttest in both groups. According to the results, the si

... Show More
View Publication Preview PDF
Publication Date
Tue Feb 01 2022
Journal Name
Baghdad Science Journal
An Enhanced Approach of Image Steganographic Using Discrete Shearlet Transform and Secret Sharing
...Show More Authors

Recently, the internet has made the users able to transmit the digital media in the easiest manner. In spite of this facility of the internet, this may lead to several threats that are concerned with confidentiality of transferred media contents such as media authentication and integrity verification. For these reasons, data hiding methods and cryptography are used to protect the contents of digital media. In this paper, an enhanced method of image steganography combined with visual cryptography has been proposed. A secret logo (binary image) of size (128x128) is encrypted by applying (2 out 2 share) visual cryptography on it to generate two secret share. During the embedding process, a cover red, green, and blue (RGB) image of size (512

... Show More
View Publication Preview PDF
Scopus (15)
Crossref (9)
Scopus Clarivate Crossref
Publication Date
Thu Nov 16 2023
Journal Name
International Journal Of Emerging Technologies In Learning (ijet)
The Importance of Using Metaverse Technology in Education from the Point of View of University Teachers
...Show More Authors

The study aims to demonstrate the significance of metaverse technology across various disciplines, academic degrees, scientific fields, and academic titles. It also aims to assess the level of knowledge and understanding of university teachers (research sample) regarding metaverse technology. Hence, the descriptive research methodology was based on the method of statistical survey in the sample. It involved a set of organized scientific steps to deduce data from the reality of the statistical sample and its nature in order to achieve the objectives of the study. In this study, a questionnaire was used as a tool to collect data from a random sample of approximately 121 teachers and instructors from the University of Baghdad. This app

... Show More
View Publication Preview PDF
Crossref (3)
Crossref