Preferred Language
Articles
/
ijs-282
The Proposed Collaborative Filtering Recommender System Based on Implicit and Explicit User's Preferences

The expansion of web applications like e-commerce and other services yields an exponential increase in offers and choices in the web. From these needs, the recommender system applications have arisen. This research proposed a recommender system that uses user's reviews as implicit feedback to extract user preferences from their reviews to enhance personalization in addition to the explicit ratings. Diversity also improved by using k-furthest neighbor algorithm upon user's clusters. The system tested using Douban movie standard dataset from Kaggle, and show good performance. 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Nov 29 2021
Journal Name
Iraqi Journal Of Science
An Accurate Handwritten Digits Recognition system Based on DWT and FCT

In this paper an accurate Indian handwritten digits recognition system is
proposed. The system used three proposed method for extracting the most effecting
features to represent the characteristic of each digit. Discrete Wavelet Transform
(DWT) at level one and Fast Cosine Transform (FCT) is used for features extraction
from the thinned image. Besides that, the system used a standard database which is
ADBase database for evaluation. The extracted features were classified with KNearest
Neighbor (KNN) classifier based on cityblock distance function and the
experimental results show that the proposed system achieved 98.2% recognition
rate.

Crossref
View Publication Preview PDF
Publication Date
Sun Mar 19 2023
Journal Name
Journal Of Educational And Psychological Researches
The Effect of the Idea Filtering Strategy on the Achievement of the Second Year Middle School Female Students in Science

Abstract

The current research aims to identify the effect of the idea filtering strategy on the achievement of second-intermediate school female students in science. The two researchers adopted the experimental method and the experimental design with partial control in the two groups (experimental group and control group). The two researchers applied the research experience to a sample of students of the second intermediate grade in the school Martyrs of (Jiser  Al Aimma for Girls) affiliated with the Baghdad Education Directorate / Rusafa /1 for the academic year (2021/2022), which was chosen intentionally. The number of female students in the research sample was (70) students, with (35) students for the ex

... Show More
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
Journal Of Applied Engineering Science
Design and implementation of a smart home automation system based on global system for mobile communications

Recently, there has been an increasing advancement in the communications technology, and due to the increment in using the cellphone applications in the diverse aspects of life, it became possible to automate home appliances, which is the desired goal from residences worldwide, since that provides lots of comfort by knowing that their appliances are working in their highest effi ciency whenever it is required without their knowledge, and it also allows them to control the devices when they are away from home, including turning them on or off whenever required. The design and implementation of this system is carried out by using the Global System of Mobile communications (GSM) technique to control the home appliances – In this work, an ele

... Show More
Scopus (4)
Crossref (4)
Scopus Crossref
View Publication
Publication Date
Thu Sep 30 2021
Journal Name
Iraqi Journal Of Science
A Proposed Algorithm for Encrypted Data Hiding in Video Stream Based on Frame Random Distribution

     The science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Mon Jan 01 2018
Journal Name
International Journal Of Advanced Computer Science And Applications
Scopus (7)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Mon Jul 01 2019
Journal Name
Journal Of Engineering
Development of Bridges Maintenance Management System based on Geographic Information System Techniques (Case study: AlMuthanna \ Iraq)

A Geographic Information System (GIS) is a computerized database management system for accumulating, storage, retrieval, analysis, and display spatial data. In general, GIS contains two broad categories of information, geo-referenced spatial data and attribute data. Geo-referenced spatial data define objects that have an orientation and relationship in two or three-dimensional space, while attribute data is qualitative data that can be counted for recording and analysis. The main aim of this research is to reveal the role of GIS technology in the enhancement of bridge maintenance management system components such as the output results, and make it more interpretable through dynamic colour coding and more sophisticated vi

... Show More
Crossref (3)
Crossref
View Publication Preview PDF
Publication Date
Mon Apr 04 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Proposed Study Unit Based on the Funds of Knowledge Theory in Developing the Attitudes Towards Cultural Identity and the Proposed Study Unit among Students of Basic Education in the Sultanate of Oman

The present study aims to explore the effectiveness of a proposed study unit based on the funds of knowledge theory in developing the attitudes towards cultural identity and the proposed study unit. In order to achieve the goal of the study, the two researchers followed the quasi-experimental approach, where the study sample consisted of (28) female students of the fifth-grade at Al-Jeelah Basic Education School, Al-Dakhiliyah Governorate in the Sultanate of Oman. The data were collected by two scales: the first is a scale of attitudes towards cultural identity consisting of (26) items. The second was a scale of attitudes towards the proposed study unit, which consisted of (24) items. The results of the study revealed that the effect of

... Show More
View Publication Preview PDF
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Engineering
Three-Dimensional Explicit Finite Element Simulation of Piled-Raft Foundation

This paper aims to validate a proposed finite element model to be adopted in predicting displacement and soil stresses of a piled-raft foundation. The proposed model adopts the solid element to simulate the raft, piles, and soil mass. An explicit integration scheme has been used to simulate nonlinear static aspects of the piled-raft foundation and to avoid the computational difficulties associated with the implicit finite element analysis.

The validation process is based on comparing the results of the proposed finite element model with those of a scaled-down experimental work achieved by other researchers. Centrifuge apparatus has been used in the experimental work to generate the required stresses to simulate t

... Show More
Crossref (1)
Crossref
View Publication Preview PDF
Publication Date
Wed Jan 01 2020
Journal Name
Fme Transactions
Development of automated liquid filling system based on the interactive design approach

The automatic liquid filling system is used in different applications such as production of detergents, liquid soaps, fruit juices, milk products, bottled water, etc. The automatic bottle filling system is highly expensive. Where, the common filling systems required to complex changes in hardware and software in order to modify volume of liquid. There are many important variables in the filling process such as volume of liquid, the filling time, etc. This paper presents a new approach to develop an automatic liquid filling system. The new proposed system consists of a conveyor subsystem, filling stations, and camera to detect the level of the liquid at any instant during the filling process. The camera can detect accurately the leve

... Show More
Scopus (17)
Crossref (14)
Scopus Clarivate Crossref
View Publication
Publication Date
Thu Jan 20 2022
Journal Name
Webology
Hybrid Intrusion Detection System based on DNA Encoding, Teiresias Algorithm and Clustering Method

Until recently, researchers have utilized and applied various techniques for intrusion detection system (IDS), including DNA encoding and clustering that are widely used for this purpose. In addition to the other two major techniques for detection are anomaly and misuse detection, where anomaly detection is done based on user behavior, while misuse detection is done based on known attacks signatures. However, both techniques have some drawbacks, such as a high false alarm rate. Therefore, hybrid IDS takes advantage of combining the strength of both techniques to overcome their limitations. In this paper, a hybrid IDS is proposed based on the DNA encoding and clustering method. The proposed DNA encoding is done based on the UNSW-NB15

... Show More
Crossref (2)
Crossref
View Publication