Preferred Language
Articles
/
ijs-6381
Design recommendation system in e-commerce site
...Show More Authors

In recent years it has spread the used of e-commerce sites quite dramatically. Thus, these sites have become display huge number of diverse products. It became difficulty for the customer to choose what he/she wants from this product. The recommender systems are used to help customers to finding the desired product of their interests and proved to be an important solution to information overload problem.
This paper, designed a recommendation system based on content, which is usually textual description. Furthermore, the proposed system uses cosine similarity function to find the similarities among the characteristics of various products, and nominate a suitable product closer to customer satisfaction. The experimental result shows that the proposed system can provide suitable product with accuracy up to 95%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Thu May 10 2018
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
New Steganography System Based on Huffman Coding and Fibonacci Decomposition
...Show More Authors

   Hiding secret information in the image is a challenging and painstaking task in computer security and steganography system. Certainly, the absolute intricacy of attacks to security system makes it more attractive.in this research on steganography system involving information hiding,Huffman codding used to compress the secret code before embedding which provide high capacity and some security. Fibonacci decomposition used to represent the pixels in the cover image, which increase the robustness of the system. One byte used for mapping all the pixels properties. This makes the PSNR of the system higher due to random distribution of embedded bits. Finally, three kinds of evaluation are applied such as PSNR, chi-square attack, a

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (2)
Scopus
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
The dynamics of two harmful phytoplankton and herbivorous zooplankton system
...Show More Authors

In this paper, a mathematical model consisting of the two harmful
phytoplankton interacting with a herbivorous zooplankton is proposed and studied.
The existence of all possible equilibrium points is carried out. The dynamical
behaviors of the model system around biologically feasible equilibrium points are
studied. Suitable Lyapunov functions are used to construct the basins of attractions
of those points. Conditions for which the proposed model persists are established.
The occurrence of local bifurcation and a Hopf bifurcation are investigated. Finally,
to confirm our obtained analytical results and specify the vital parameters, numerical
simulations are used for a hypothetical set of parameter values.

View Publication Preview PDF
Publication Date
Sat Mar 19 2022
Journal Name
Al-khwarizmi Engineering Journal
Enhancement of System Security by Using LSB and RSA Algorithms
...Show More Authors

A steganography hides information within other information, such as file, message, picture, or video. A cryptography is the science of converting the information from a readable form to an unreadable form for unauthorized person. The main problem in the stenographic system is embedding in cover-data without providing information that would facilitate its removal. In this research, a method for embedding data into images is suggested which employs least significant bit Steganography (LSB) and ciphering (RSA algorithm) to protect the data. System security will be enhanced by this collaboration between steganography and cryptography.

View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Wed May 25 2022
Journal Name
Iraqi Journal Of Science
High optical correction system based 800x600 analog spatial light modulator
...Show More Authors

      In this work, a modern optical system based on modulation technique is constructed to achieve the retrieval of optical defects and distortions of the images behind dark barriers.  A 800x600 analog spatial light modulator (SLM) is used in this technique with a 632.8nm He-Ne laser, a circular metallic mesh (CMM) is imaged and disturbed and then dealing with our system. The SLM was confirmed for irregularity improvement such as variable diffracted optical element (DOE) control. The obtained results showed that the effect of distortion has been treated and reduced to be minimum by controlling phase and amplitude modulation of the scattered wave front utilizing the SLM. The obtained images showed identical to the original image wi

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Jul 22 2023
Journal Name
Journal Of Engineering
Data Acquisition System for Wind Speed, Direction and Temperature Measurements
...Show More Authors

This paper describes the use of microcomputer as a laboratory instrument system. The system is focused on three weather variables measurement, are temperature, wind speed, and wind direction. This instrument is a type of data acquisition system; in this paper we deal with the design and implementation of data acquisition system based on personal computer (Pentium) using Industry Standard Architecture (ISA)bus. The design of this system involves mainly a hardware implementation, and the software programs that are used for testing, measuring and control. The system can be used to display the required information that can be transferred and processed from the external field to the system. A visual basic language with Microsoft foundation cl

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2022
Journal Name
Baghdad Science Journal
Darboux Integrability of a Generalized 3D Chaotic Sprott ET9 System
...Show More Authors

In this paper, the first integrals of Darboux type of the generalized Sprott ET9 chaotic system will be studied. This study showed that the system has no polynomial, rational, analytic and Darboux first integrals for any value of . All the Darboux polynomials for this system were derived together with its exponential factors. Using the weight homogenous polynomials helped us prove the process.

View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Wed Aug 03 2016
Journal Name
Technology Reports Of Kansai University
Some statistical results for solution type of the Inequalities system
...Show More Authors

Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
Petroleum System Modeling of Halfaya Oil Field South of Iraq
...Show More Authors

The petroleum system of Halfaya oil field shows that the hydrocarbon generation of these Formations such as Sha′uiba and Nahr Umr are immature and have generated few oil TR ≤ 50% which are neglected as compared to Formations below them which are very rich source rock. The Formations of Yamama, Ratawi and Sulaiy are mature with TR ≤ 100%. Other Formations such as Sargelu ,Najma,Zubair and Gotnia are with very high maturity with TR ≥ 100% and completely generated hydrocarbon and depleted after hydrocarbon are expelled and migrate to reservoir rock of structure traps and this study indicates that the major seals of Upper Jurassic are Gotnia and Allan Formations and of Middle Miocene is LowerFars fatha Formation.

View Publication Preview PDF
Publication Date
Tue Dec 01 2020
Journal Name
Al-khwarizmi Engineering Journal
Remote Patient Healthcare surveillance system based real-time vital signs
...Show More Authors

Today many people suffering from health problems like dysfunction in lungs and cardiac. These problems often require surveillance and follow up to save a patient's health, besides control diseases before progression. For that, this work has been proposed to design and developed a remote patient surveillance system, which deals with 4 medical signs (temperature, SPO2, heart rate, and Electrocardiogram ECG. An adaptive filter has been used to remove any noise from the signal, also, a simple and fast search algorithm has been designed to find the features of  ECG signal such as Q,R,S, and T waves.  The system performs analysis for medical signs that are used to detected abnormal values. Besides, it sends data to the Base-Stati

... Show More
View Publication Preview PDF
Crossref (3)
Crossref