Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a new measure is proposed from the combination of measures to cope with the global meaning of data set ratings. After conducting the experimental results, it is shown that the proposed measure achieves major objectives that maximize the accuracy Predictions.
The evaluation of banks plays an important role in maintaining the interests of customers with the bank as well as providing continuous supervision and control by the Central Bank. The Central Bank of Iraq conducted an assessment of the Iraqi banks through the implementation of the CAMEL model during a certain period. This evaluation did not continue. The research provides continuity to the Central Bank's assessment and as a step to continue the evaluation process for all banks through the use of the CAMEL model. ROA and ROE by using the regression model for four Iraqi banks registered in the Iraqi market for securities during the period 2010-2016. The results showed that the capital and profitability indicators have a significan
... Show MoreThis study focusses on the effect of using ICA transform on the classification accuracy of satellite images using the maximum likelihood classifier. The study area represents an agricultural area north of the capital Baghdad - Iraq, as it was captured by the Landsat 8 satellite on 12 January 2021, where the bands of the OLI sensor were used. A field visit was made to a variety of classes that represent the landcover of the study area and the geographical location of these classes was recorded. Gaussian, Kurtosis, and LogCosh kernels were used to perform the ICA transform of the OLI Landsat 8 image. Different training sets were made for each of the ICA and Landsat 8 images separately that used in the classification phase, and used to calcula
... Show MoreImproving speaking skills of Iraqi EFL students was the main purpose of the current research. Thirty EFL students were selected as the research participants for achieving this aim. All students completed the pretest and then spent the next 25 weeks meeting for 90 minutes each to present their nine lectures, answer difficult questions, and get feedback on their use of language in context. Progressive-tests, posttests and delayed post-tests followed every three courses. The researcher utilized SPSS 22 to anal Analyze the data descriptively and inferentially after doing an ANOVA on repeated measurements. It has been shown that using the ideas of sociocultural theory in the classroom has an important and positive impact on students of
... Show MoreUntil recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15
... Show MoreHand gestures are currently considered one of the most accurate ways to communicate in many applications, such as sign language, controlling robots, the virtual world, smart homes, and the field of video games. Several techniques are used to detect and classify hand gestures, for instance using gloves that contain several sensors or depending on computer vision. In this work, computer vision is utilized instead of using gloves to control the robot's movement. That is because gloves need complicated electrical connections that limit user mobility, sensors may be costly to replace, and gloves can spread skin illnesses between users. Based on computer vision, the MediaPipe (MP) method is used. This method is a modern method that is discover
... Show MoreThis research aims to knowledge the extent of the application of Tuz General Hospital to the concept of tacit knowledge dimensions (mental models, intuition, experience, skill) and methods of acquiring knowledge dimensions (training, job rotation, work teams) and the measurement and analysis of the link and the kind of impact between the methods of acquiring knowledge and tacit knowledge of the Angels nursing in the researched hospital, and was the questionnaire primary means of collecting information adopted by the researcher that, the research sample of (90) individuals, including the Angels nursing, has been using the statistical program spss for the purpose of conducting statistical treatments, and through the diagnosis and m
... Show MoreStrategy Descrtibes How an Organization Matches its own Capabilites With Opportunities in Environment , in Order to Accomplish its Overall Objectives , So That The Organization is Considering Responding to Challenges by Adopting one or More of Strategies, Like Differentioning its Product, or Achieving Cost Leadership.
The Key Role of Management Accountant is to Evlaute The Successful it Has Been in Implementing Organization Strategy.
This Research Target to Explain The Key Role of Management Accountant in Evaluate of Organization Strategy. by Strategic Analysis of Operating Income From Specific Sources Such as Cost Savings and Growth in Stead of Emphasizing Only The Aggrega
... Show MoreThe present research had dealt with preparing bars with the length of about (13 cm) and adiametar of (1.5 cm) of composite materials with metal matrix represented by (Al-Cu-Mg) alloy cast enforced by (ZrO2) particles with chosen weight percentages (1.5, 2.5 ,3.5, 5.5 %). The base cast and the composite materials were prepared by casting method by uses vortex Technique inorder to fix up (ZrO2) particles in homogeneous way on the base cast. In addition to that, two main groups of composite materials were prepared depending on the particles size of (ZrO2) , respectively. &n
... Show MoreThe advancements in Information and Communication Technology (ICT), within the previous decades, has significantly changed people’s transmit or store their information over the Internet or networks. So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. The proposed algorithm generate 2-Dimensional key matrix having the same dimensions of the original image that includes random numbers obtained from the 1-Dimensional logistic chaotic map for given con
... Show More