Preferred Language
Articles
/
ijs-3714
Prediction of Explicit Features for Recommendation System Using User Reviews

    With the explosive growth of data, it has become very difficult for a person to process the data and find the right information from it. So, to discover the right information from the colossal amount of data that is available online, we need information filtering systems. Recommendation systems (RS) help users find the most interesting information among the options that are available. Ratings given by the users play a vital role in determining the purposes of recommendations. Earlier, researchers used a user’s rating history to predict unknown ratings, but recently a user’s review has gained a lot of attention as it contains a lot of relevant information about a user’s decision. The proposed system makes an attempt to deal with the problem of uncertainty in the rating histories by using textual reviews. Two datasets are used to experimentally analyze the proposed framework. In this approach, clustering techniques are used with natural language processing (NLP) for prediction. It also compares how different algorithms, such as K-mean, spectral, and hierarchical clustering algorithms, produce a varied outcome and concludes which method is appropriate for the given recommendation scenarios. We also validate how the proposed method outperforms the non-clustering-based methods.

Scopus Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu Sep 01 2022
Journal Name
Computers And Electrical Engineering
Scopus (2)
Scopus Clarivate Crossref
View Publication
Publication Date
Sat Apr 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
Measuring the level of unemployment in Iraq by using the user / product schedule for 2010

Economic performance is one of the most important indicators of economic activity and with the performance of the economy progress varied sources of output and increase economic growth rates and per capita national income, and to recover the business environment and increase investment rates and rising effectiveness of the financial and monetary institutions and credit market. Which leads to increased employment rates and reducing unemployment rates and the elimination of many of the social problems and improve the average per capita income as well as improve the level of national income.

The input / output tables is a technique mathematical indicates economic performance

... Show More
Crossref
View Publication Preview PDF
Publication Date
Wed Sep 01 2021
Journal Name
International Journal Of Nonlinear Analysis And Application
Suggested methods for prediction using semiparametric regression function

Ferritin is a key organizer of protected deregulation, particularly below risky hyperferritinemia, by straight immune-suppressive and pro-inflammatory things. , We conclude that there is a significant association between levels of ferritin and the harshness of COVID-19. In this paper we introduce a semi- parametric method for prediction by making a combination between NN and regression models. So, two methodologies are adopted, Neural Network (NN) and regression model in design the model; the data were collected from مستشفى دار التمريض الخاص for period 11/7/2021- 23/7/2021, we have 100 person, With COVID 12 Female & 38 Male out of 50, while 26 Female & 24 Male non COVID out of 50. The input variables of the NN m

... Show More
Scopus
Preview PDF
Publication Date
Thu Aug 02 2012
Journal Name
International Journal Of Advanced Research In Computer Science
User Authentication based on Keystroke Dynamics Using Backpropagation Network

Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi

... Show More
Publication Date
Sun Nov 01 2020
Journal Name
Systematic Reviews In Pharmacy
Systematic Reviews in Pharmacy | open access Journals

Systematic Reviews in Pharmacy is a monthly Peer-review open access Journal,different scientists involved in Pharmaceutical research and development

View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
Thesis
User Authentication Based on Keystroke Dynamics Using Artificial Neural Networks

Computer systems and networks are being used in almost every aspect of our daily life, the security threats to computers and networks have increased significantly. Usually, password-based user authentication is used to authenticate the legitimate user. However, this method has many gaps such as password sharing, brute force attack, dictionary attack and guessing. Keystroke dynamics is one of the famous and inexpensive behavioral biometric technologies, which authenticate a user based on the analysis of his/her typing rhythm. In this way, intrusion becomes more difficult because the password as well as the typing speed must match with the correct keystroke patterns. This thesis considers static keystroke dynamics as a transparent layer of t

... Show More
Publication Date
Fri Apr 30 2021
Journal Name
Iraqi Journal Of Science
Analysis of Morphological Features of Sargalu Region in Sulaymaniyah Governorate, North of Iraq, by using Geographic Information System

It is an ideal area of research to examine related indicators to anticipate relative tectonic activities, where there is a broad range of geological formations with elements of different sedimentary rocks. This study includes assessing and evaluating the relative tectonic activities within the Sargalu area by using a morphometric approach, which involved the use of different indices that can explain and help understanding the geometry, development level, lithology, and structural disturbance on a sub-basinal level. The research was accomplished by using ArcGIS 10.5 hydrology tools to design the drainage system of each studied stream. The Advanced Spaceborne Thermal Emission Radiometer (ASTER) satellite imagery data and the Digital Elevat

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Jun 20 2021
Journal Name
Baghdad Science Journal
A Scoping Study on Lightweight Cryptography Reviews in IoT

The efforts in designing and developing lightweight cryptography (LWC) started a decade ago. Many scholarly studies in literature report the enhancement of conventional cryptographic algorithms and the development of new algorithms. This significant number of studies resulted in the rise of many review studies on LWC in IoT. Due to the vast number of review studies on LWC in IoT, it is not known what the studies cover and how extensive the review studies are. Therefore, this article aimed to bridge the gap in the review studies by conducting a systematic scoping study. It analyzed the existing review articles on LWC in IoT to discover the extensiveness of the reviews and the topics covered. The results of the study suggested that many re

... Show More
Scopus (12)
Crossref (4)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Jan 01 2013
Journal Name
International Journal Of Application Or Innovation In Engineering & Management (ijaiem)
Probabilistic Neural Network for User Authentication Based on Keystroke Dynamics

Computer systems and networks are increasingly used for many types of applications; as a result the security threats to computers and networks have also increased significantly. Traditionally, password user authentication is widely used to authenticate legitimate user, but this method has many loopholes such as password sharing, brute force attack, dictionary attack and more. The aim of this paper is to improve the password authentication method using Probabilistic Neural Networks (PNNs) with three types of distance include Euclidean Distance, Manhattan Distance and Euclidean Squared Distance and four features of keystroke dynamics including Dwell Time (DT), Flight Time (FT), mixture of (DT) and (FT), and finally Up-Up Time (UUT). The resul

... Show More
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
User Oriented Calibration Method for Stonex X300 Terrestrial Laser Scanner

    Terrestrial laser scanners (TLSs) are 3D imaging systems that provide the most powerful 3D representation and practical solutions for various applications. Hence this is due to effective range measurements, 3D point cloud reliability, and rapid acquisition performance. Stonex X300 TOF scanner delivered better certainty in far-range than in close-range measurements due to the high noise level inherent within the data delivered from Time of Flight (TOF) scanning sensors. However, if these errors are manipulated properly using a valid calibration model, more accurate products can be obtained even from very close-range measurements. Therefore, to fill this gap, this research presents a user-oriented target-based calibration routine to

... Show More
Scopus (1)
Scopus Crossref
View Publication Preview PDF