{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,7]],"date-time":"2025-05-07T13:47:21Z","timestamp":1746625641206,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T00:00:00Z","timestamp":1691539200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,9]]},"DOI":"10.1109\/icit58056.2023.10226133","type":"proceedings-article","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T17:26:12Z","timestamp":1693329972000},"page":"794-799","source":"Crossref","is-referenced-by-count":1,"title":["A Roadmap for Artificial Intelligence Augmented Software Development Life Cycle: Aspects of Knowledge Vaporization"],"prefix":"10.1109","author":[{"given":"Wael","family":"Alzyadat","sequence":"first","affiliation":[{"name":"Alzaytoonah University of Jordan,Faculty of Science and IT,Department of Software Engineering,Amman,Jordan"}]},{"given":"Mohammad","family":"Al-Madi","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Computer Science,Amman,Jordan"}]},{"given":"Mohammad","family":"Muhairat","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Faculty of Science and IT,Department of Software Engineering,Amman,Jordan"}]},{"given":"Nagham","family":"Al-Madi","sequence":"additional","affiliation":[{"name":"Alzaytoonah University of Jordan,Artificial Intelligence, Faculty of Science and IT,Amman,Jordan"}]},{"given":"Feras","family":"Altarawneh","sequence":"additional","affiliation":[{"name":"Al-Zaytoonah University of Jordan,Faculty of Science and IT,Department of Software Engineering,Amman,Jordan"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S1574-6526(07)03025-8"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-7601-3.ch016"},{"key":"ref15","first-page":"198","article-title":"MOKA-A Methodology and tools Oriented to Knowledge-based engineering Applications","author":"oldham","year":"0","journal-title":"Proceedings of the Conference on Integration in Manufacturing"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/dsd.2020.313"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2015.7363987"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.06.046"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.72"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/3870147"},{"journal-title":"A Survey J Knowledge-Based Systems","year":"2019","author":"ahmed","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIT52682.2021.9491733"},{"key":"ref16","first-page":"5633","article-title":"Securitizing big data characteristics used tall array and mapreduce","volume":"7","author":"al_zyadat","year":"2018","journal-title":"International Journal of Engineering & Technology"},{"key":"ref19","first-page":"3112","article-title":"Fuzzy map approach for accruing velocity of big data","volume":"8","author":"alzyadat","year":"2019","journal-title":"COMPUSOFT"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2969204"},{"key":"ref8","article-title":"Discovering the Kano model","author":"verduyn","year":"2014","journal-title":"Kano model"},{"journal-title":"Respect-IT","article-title":"Objectiver - A power tool to engineer your technical and business requirements","year":"2017","key":"ref7"},{"key":"ref9","first-page":"2021","article-title":"Atomic Requirements: where the rubber hits the road","volume":"16","author":"robertson","year":"2009","journal-title":"Retrieved"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/4860704"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.008"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018976708691"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1984.1659076"}],"event":{"name":"2023 International Conference on Information Technology (ICIT)","start":{"date-parts":[[2023,8,9]]},"location":"Amman, Jordan","end":{"date-parts":[[2023,8,10]]}},"container-title":["2023 International Conference on Information Technology (ICIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10225686\/10225751\/10226133.pdf?arnumber=10226133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T17:43:29Z","timestamp":1695059009000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10226133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/icit58056.2023.10226133","relation":{},"subject":[],"published":{"date-parts":[[2023,8,9]]}}}