Preferred Language
Articles
/
ijs-282
The Proposed Collaborative Filtering Recommender System Based on Implicit and Explicit User's Preferences

The expansion of web applications like e-commerce and other services yields an exponential increase in offers and choices in the web. From these needs, the recommender system applications have arisen. This research proposed a recommender system that uses user's reviews as implicit feedback to extract user preferences from their reviews to enhance personalization in addition to the explicit ratings. Diversity also improved by using k-furthest neighbor algorithm upon user's clusters. The system tested using Douban movie standard dataset from Kaggle, and show good performance. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Nov 30 2022
Journal Name
Iraqi Journal Of Science
Prediction of Explicit Features for Recommendation System Using User Reviews

    With the explosive growth of data, it has become very difficult for a person to process the data and find the right information from it. So, to discover the right information from the colossal amount of data that is available online, we need information filtering systems. Recommendation systems (RS) help users find the most interesting information among the options that are available. Ratings given by the users play a vital role in determining the purposes of recommendations. Earlier, researchers used a user’s rating history to predict unknown ratings, but recently a user’s review has gained a lot of attention as it contains a lot of relevant information about a user’s decision. The proposed system makes an attempt to deal w

... Show More
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sat Jul 01 2023
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
A proposed audit program for a comprehensive electronic banking system based on business risks : applied research

The research seeks to identify the comprehensive electronic banking system and the role of the auditor in light of the customer's application of electronic systems that depend on the Internet in providing its services, as a proposed audit program has been prepared in accordance with international auditing controls and standards based on the study of the customer's environment and the analysis of external and internal risks in the light of financial and non-financial indicators, the research reached a set of conclusions, most notably, increasing the dependence of banks on the comprehensive banking system for its ability to provide new and diverse banking services, The researcher suggested several recommendations, the most important of whi

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 30 2024
Journal Name
Iraqi Journal Of Science
A Recent Trends in eBooks Recommender Systems: A Comparative Survey

     The great progress in information and communication technology has led to a huge increase in data available. Traditional systems can't keep up with this growth and can't handle this huge amount of data. Recommendation systems are one of the most important areas of research right now because they help people make decisions and find what they want among all this data. This study looked at the research trends published in Google Scholar within the period 2018-2022 related to recommending, reviewing, analysing, and comparing ebooks research papers. At first, the research papers were collected and classified based on the recommendation model used, the year of publication, and then they were compared in terms of techniques, datasets u

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Thu Aug 31 2023
Journal Name
Journal Of Legal Sciences
Evidence- Based Premature Termination Implicit: Comparative Study in Contract Theory

For the premature termination of the contract is the creditor’s ability to request the termination of the contract due to the debtor’s breach of the execution date based on the debtor’s explicitness not to perform upon the occurrence of this date or because of a presumption proving that breach. Or return it to the extent of the creditor’s ability to prove what he claims, and thus the burden of proof falls on the creditor.

There is no difficulty in proving the debtor's declaration of non-performance, but the difficulty lies in proving the perceived breach in the future, that is, the creditor concludes earlier on the date of implementation that the debtor will breach his obligation and therefore the creditor does not obtain

... Show More
View Publication Preview PDF
Publication Date
Sat Jan 01 2022
Journal Name
Journal Of Stomatology
Scopus (2)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Thu Dec 29 2016
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Proposed Steganography Method Based on DCT Coefficients

      In this paper an algorithm for Steganography using DCT for cover image and DWT for hidden image with an embedding order key is proposed. For more security and complexity the cover image convert from RGB to YIQ, Y plane is used and divided into four equally parts and then converted to DCT domain. The four coefficient of the DWT of the hidden image are embedded into each part of cover DCT, the embedding order based on the order key of which is stored with cover in a database table in both the sender and receiver sender. Experimental results show that the proposed algorithm gets successful hiding information into the cover image. We use Microsoft Office Access 2003 database as DBMS, the hiding, extracting algo

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 30 2018
Journal Name
Companion Of The 2018 Acm Conference On Computer Supported Cooperative Work And Social Computing
Collaborative Content Creation

Modern education incorporates strong elements of collaborative learning: activities that prompt students to collaborate on completing learning tasks. In this work we investigate the relationship between media type and student collaboration and attribution patterns during collaborative content creation. We run similarity analyses on text and video artifacts submitted by students as part of collaborative exercises in an undergraduate module. Our main finding is that the same cohort of students was significantly more likely to attribute non-original content to its sources when authoring text compared to video content and when this content is not produced by a peer student. Our preliminary results based on only two media suggest that media type

... Show More
Scopus (4)
Crossref (3)
Scopus Clarivate Crossref
View Publication
Publication Date
Sun Mar 17 2019
Journal Name
Baghdad Science Journal
A Study on the Accuracy of Prediction in Recommendation System Based on Similarity Measures

Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n

... Show More
Scopus (14)
Crossref (2)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Wed Mar 22 2017
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
COLLABORATIVE RELATIONSHIP BETWEEN CONSUMER RIGHTS IN THE ALGERIAN MARKET.: COLLABORATIVE RELATIONSHIP BETWEEN CONSUMER RIGHTS IN THE ALGERIAN MARKET.

The current study aimed to identify key consumer rights and the nature of the work of organizations and traders in the Algerian market through the opinions of the study sample. To prove the hypotheses the researcher depended on the data obtained by the questionnaire prepared for this purpose. She distributed 384 questionnaires out of which only 300 were returned.
The data were analyzed using several statistical techniques such as the Statistical Package for Social Studies system, in addition to percentages, frequencies, and standard deviation.
And a number of conclusions and recommendations were presented. The most important results are:
- There is a strong correlation between safety and compensation rights.
- There is a st

... Show More
View Publication Preview PDF
Publication Date
Sun Oct 30 2022
Journal Name
Iraqi Journal Of Science
Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA

     Modern ciphers are one of the more difficult to break cipher systems because these ciphers high security, high speed, non - propagation error and difficulty in breaking it. One of the most important weaknesses of stream cipher is a matching or correlation between the output key-stream and the output of shift registers.

     This work considers new investigation methods for cryptanalysis stream cipher using ciphertext only attack depending on Particle Swarm Optimization (PSO) for the automatic extraction for the key. It also introduces a cryptanalysis system based on PSO with suggestion for enhancement of the performance of PSO, by using Simulated Annealing (SA). Additionally, it presents a comparison for the cryptanal

... Show More
Scopus (5)
Crossref (1)
Scopus Crossref
View Publication Preview PDF