Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a new measure is proposed from the combination of measures to cope with the global meaning of data set ratings. After conducting the experimental results, it is shown that the proposed measure achieves major objectives that maximize the accuracy Predictions.
The lossy-FDNR based aclive fil ter has an important property among many design realizations. 'This includes a significant reduction in component count particularly in the number of OP-AMP which consumes power. However the· problem of this type is the large component spreads which affect the fdter performance.
In this paper Genetic Algorithm is applied to minimize the component spread (capacitance and resistance p,read). The minimization of these spreads allow the fil
... Show MoreVol. 6, Issue 1 (2025)
The Child is the first sedum for the human society performing, and we deal in our
research to explain the nature of the mutual relations in between the form and the medicine
social caring foundation. So the motherhood and the childhood nowadays become the most
dedicated in the researchers works, whom interesting in the social affairs, and that whom
work in the medicine field as scientists.
So the child is the future man and must be in wright body construction that need to great
care and interest to make him wright mind through capability of performing anything support
to him.
In our research we deal with the main factors in which lead to infect the child by the
creative malfunction, like the environmental and m
The solar energy is the major source of power for the future and an important source of renewable energy in Iraq and the world. Suitable climate conditions for solar energy are available in Iraq, especially the high temperature in the summer season which extends for more than six months in the year. Hence, the global solar radiation is abundant with high intensity, which is very essential in applicable models for researchers and solar applications. Therefore, nine first-order regression empirical equations of Angstrom-type correlations were used to estimate the more appropriate global solar radiation model for Baghdad city. Two equations were developed empirically in this work, using the most available and easy to get meteorological data
... Show MoreThis study aimed to identify the role of servant leadership in promoting organizational citizenship behaviors in a sample of faculties of the University of Alqadisiya .It tried to answer several questions represented its problem.
The most important questions are the followings:
1- Is there enough perception among administrative leaders in the aforementioned faculties toward the concept of servant leadership? And under what level? &
... Show MoreAbstract The strategic performance of the United States depends on dealing with the Middle East countries and its variants on several bases and motives that enabled them to achieve American hegemony and invest its interests at the expense of the region countries. Within this performance, the administration of the United State President Donald Trump presented the Strategic Document on December 18, 2017, which focused on the principle of "America First", to determine the direction of future US strategic performance in the formulation of means of cooperation and intersections or hostility in addition to interests and threats.The future vision of the Arab region and the Middle East as a whole, this strategy is based on the fact that
... Show MoreBackground: We aimed to investigate the accuracy of salivary matrix metalloproteinases (MMP)-8 and -9, and tissue inhibitor of metalloproteinase (TIMP)-1 in diagnosing periodontitis and in distinguishing periodontitis stages (S)1 to S3. Methods: This study was a case–control study that included patients with periodontitis S1 to S3 and subjects with healthy periodontia (controls). Saliva was collected, and then, clinical parameters were recorded, including plaque index, bleeding on probing, probing pocket depth, and clinical attachment level. Diagnosis was confirmed by assessing the alveolar bone level using radiography. Salivary biomarkers were assayed using an enzyme-linked immunosorbent assay. Results: A total of 45 patients (15
... Show MoreObjectives: to determine the effectiveness of an Education Program on Nurses' Knowledge regarding management of extravasation vesicant intravenous chemotherapy
Methodology: quiz-experimental study (single-group pretest-posttest1 and posttest2) was directed in Amal oncology center and national oncology center in Baghdad city from 13th, December 2018 to the 7 of February 2019. The program and tool have been created by the researcher for the purpose of the study. A non- probability purposive sample of (40) nurses who employed in Baghdad oncology centers. Validity and reliability of the instrument were determined through a pilot study. Data were analyzed through the use of Statistical Pack
... Show MoreOne of the most difficult issues in the history of communication technology is the transmission of secure images. On the internet, photos are used and shared by millions of individuals for both private and business reasons. Utilizing encryption methods to change the original image into an unintelligible or scrambled version is one way to achieve safe image transfer over the network. Cryptographic approaches based on chaotic logistic theory provide several new and promising options for developing secure Image encryption methods. The main aim of this paper is to build a secure system for encrypting gray and color images. The proposed system consists of two stages, the first stage is the encryption process, in which the keys are genera
... Show MoreThe Reasons behind the decadence of the studies concerning the evening school in Salah al Deen A field study