Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides information related to movies, television programs, home videos, video games, and streaming content that also collects many ratings and reviews from users. This paper also analyzed individual user data to extract the user’s features. Based on user characteristics, movie ratings/scores, and movie results, a UOP-RS model was built. In our experiment, 5000 IMDb movie datasets were used and 5 recommended movies for users. The results show that the system could return results on 3.86 s and has a 14% error on recommended goods when training data as . At the end of this paper concluded that the system could quickly recommend users of the goods which they needed. The proposed system will extend to connect with the Chatbot system that users can make queries faster and easier from their phones in the future.
This paper presents a proposed method for (CBIR) from using Discrete Cosine Transform with Kekre Wavelet Transform (DCT/KWT), and Daubechies Wavelet Transform with Kekre Wavelet Transform (D4/KWT) to extract features for Distributed Database system where clients/server as a Star topology, client send the query image and server (which has the database) make all the work and then send the retrieval images to the client. A comparison between these two approaches: first DCT compare with DCT/KWT and second D4 compare with D4/KWT are made. The work experimented over the image database of 200 images of 4 categories and the performance of image retrieval with respect to two similarity measures namely Euclidian distance (ED) and sum of absolute diff
... Show MoreAZ Khalaf, M kassim Haidir, LK Jasim, Iraqi Journal of Science, 2012
Face Identification system is an active research area in these years. However, the accuracy and its dependency in real life systems are still questionable. Earlier research in face identification systems demonstrated that LBP based face recognition systems are preferred than others and give adequate accuracy. It is robust against illumination changes and considered as a high-speed algorithm. Performance metrics for such systems are calculated from time delay and accuracy. This paper introduces an improved face recognition system that is build using C++ programming language with the help of OpenCV library. Accuracy can be increased if a filter or combinations of filters are applied to the images. The accuracy increases from 95.5% (without ap
... Show MoreVoting is one of the most fundamental components of a democratic society. In 2021 Iraq held the Council of Representatives (CoR) elections in 83 electoral constituencies in 19 governorates. Nonetheless, several significant issues arose during this election, including the problem of logistics distribution, the excessively long period of ballot counting, voters can't know if their votes were counted or if their ballots were tampered with, and the inconsistent regulation of vote counting. Blockchain technology, which was just invented, may offer a solution to these problems. This paper introduces an electronic voting system for the Iraq Council of Representatives elections that is based on a prototype of the permission hyperledger fabr
... Show MoreSteganography art is a technique for hiding information where the unsuspicious cover signal carrying the secret information. Good steganography technique must be includes the important criterions robustness, security, imperceptibility and capacity. The improving each one of these criterions is affects on the others, because of these criterions are overlapped each other. In this work, a good high capacity audio steganography safely method has been proposed based on LSB random replacing of encrypted cover with encrypted message bits at random positions. The research also included a capacity studying for the audio file, speech or music, by safely manner to carrying secret images, so it is difficult for unauthorized persons to suspect
... Show MoreIn this study, the response and behavior of machine foundations resting on dry and saturated sand was investigated experimentally. In order to investigate the response of soil and footing to steady state dynamic loading, a physical model was manufactured to simulate steady state harmonic load at different operating frequencies. Total of 84 physical models were performed. The footing parameters are related to the size of the rectangular footing and depth of embedment. Two sizes of rectangular steel model footing were tested at the surface and at 50 mm depth below model surface. Meanwhile the investigated parameters of the soil condition include dry and saturated sand for two relative densities 30% and 80%. The response of the footing was ela
... Show MoreThe internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will
... Show MoreThe rapid development of automation industries and technologies has shown incredible prospects for transforming our homes into a smart home automation system, which are more secure than a simple home. This paper proposes a home application based on voice and text called the Automated Control and Monitoring System (ASCM). This application can be utilized by both normal and vision-impaired people by using with a mobile phone.
The application allows users to send voice commands through Google Assistant installed on Android to control the appliances. They can also have complete monitoring by logging onto the ThingSpeak dashboard, which displays a device status indicator and sends alert messages in the event of dang
... Show More