Preferred Language
Articles
/
ijs-6381
Design recommendation system in e-commerce site
...Show More Authors

In recent years it has spread the used of e-commerce sites quite dramatically. Thus, these sites have become display huge number of diverse products. It became difficulty for the customer to choose what he/she wants from this product. The recommender systems are used to help customers to finding the desired product of their interests and proved to be an important solution to information overload problem.
This paper, designed a recommendation system based on content, which is usually textual description. Furthermore, the proposed system uses cosine similarity function to find the similarities among the characteristics of various products, and nominate a suitable product closer to customer satisfaction. The experimental result shows that the proposed system can provide suitable product with accuracy up to 95%.

View Publication Preview PDF
Quick Preview PDF
Publication Date
Sun May 17 2020
Journal Name
Iraqi Journal Of Science
Multicomponent Inverse Lomax Stress-Strength Reliability
...Show More Authors

In this article we derive two reliability mathematical expressions of two kinds of s-out of -k stress-strength model systems; and . Both stress and strength are assumed to have an Inverse Lomax distribution with unknown shape parameters and a common known scale parameter. The increase and decrease in the real values of the two reliabilities are studied according to the increase and decrease in the distribution parameters. Two estimation methods are used to estimate the distribution parameters and the reliabilities, which are Maximum Likelihood and Regression. A comparison is made between the estimators based on a simulation study by the mean squared error criteria, which revealed that the maximum likelihood estimator works the best.

View Publication Preview PDF
Scopus (3)
Scopus Crossref
Publication Date
Fri Jul 01 2016
Journal Name
Journal Of Engineering
An Adaptive Multi-Objective Particle Swarm Optimization Algorithm for Multi-Robot Path Planning
...Show More Authors

This paper discusses an optimal path planning algorithm based on an Adaptive Multi-Objective Particle Swarm Optimization Algorithm (AMOPSO) for two case studies. First case, single robot wants to reach a goal in the static environment that contain two obstacles and two danger source. The second one, is improving the ability for five robots to reach the shortest way. The proposed algorithm solves the optimization problems for the first case by finding the minimum distance from initial to goal position and also ensuring that the generated path has a maximum distance from the danger zones. And for the second case, finding the shortest path for every robot and without any collision between them with the shortest time. In ord

... Show More
View Publication Preview PDF
Publication Date
Mon Jul 01 2024
Journal Name
Journal Of Engineering
Efficient Intrusion Detection Through the Fusion of AI Algorithms and Feature Selection Methods
...Show More Authors

With the proliferation of both Internet access and data traffic, recent breaches have brought into sharp focus the need for Network Intrusion Detection Systems (NIDS) to protect networks from more complex cyberattacks. To differentiate between normal network processes and possible attacks, Intrusion Detection Systems (IDS) often employ pattern recognition and data mining techniques. Network and host system intrusions, assaults, and policy violations can be automatically detected and classified by an Intrusion Detection System (IDS). Using Python Scikit-Learn the results of this study show that Machine Learning (ML) techniques like Decision Tree (DT), Naïve Bayes (NB), and K-Nearest Neighbor (KNN) can enhance the effectiveness of an Intrusi

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jun 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Different Methods for Estimating Location Parameter & Scale Parameter for Extreme Value Distribution
...Show More Authors

      In this study, different methods were used for estimating location parameter  and scale parameter for extreme value distribution, such as maximum likelihood estimation (MLE) , method of moment  estimation (ME),and approximation  estimators based on percentiles which is called white method in estimation, as the extreme value distribution is one of exponential distributions. Least squares estimation (OLS) was used, weighted least squares estimation (WLS), ridge regression estimation (Rig), and adjusted ridge regression estimation (ARig) were used. Two parameters for expected value to the percentile  as estimation for distribution f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 21 2023
Journal Name
Journal Of Electrochemical Science And Engineering
Phenol removal by electro-Fenton process using a 3D electrode with iron foam as particles and carbon fibre modified with graphene
...Show More Authors

The 3D electro-Fenton technique is, due to its high efficiency, one of the technologies suggested to eliminate organic pollutants in wastewater. The type of particle electrode used in the 3D electro-Fenton process is one of the most crucial variables because of its effect on the formation of reactive species and the source of iron ions. The electrolytic cell in the current study consisted of graphite as an anode, carbon fiber (CF) modified with graphene as a cathode, and iron foam particles as a third electrode. A response surface methodology (RSM) approach was used to optimize the 3D electro-Fenton process. The RSM results revealed that the quadratic model has a high R2 of 99.05 %. At 4 g L-1 iron foam particles, time of 5 h, and

... Show More
View Publication Preview PDF
Scopus Clarivate Crossref
Publication Date
Tue Jun 01 2021
Journal Name
Journal Of Engineering
Designing a Secure Software-Defined Radio Transceiver using the Logistic Map
...Show More Authors

The need to exchange large amounts of real-time data is constantly increasing in wireless communication. While traditional radio transceivers are not cost-effective and their components should be integrated, software-defined radio (SDR) ones have opened up a new class of wireless technologies with high security.  This study aims to design an  SDR  transceiver was built using one type of modulation, which is 16 QAM, and adding a  security subsystem using one type of chaos map, which is a  logistic map, because it is a very simple nonlinear dynamical equations that generate a random key and  EXCLUSIVE  OR with the originally transmitted data to protect data through the transmission. At th

... Show More
View Publication Preview PDF
Crossref
Publication Date
Thu Dec 02 2021
Journal Name
Iraqi Journal Of Science
An Approach Based on Decision Tree and Self-Organizing Map For Intrusion Detection
...Show More Authors

In modern years, internet and computers were used by many nations all overhead the world in different domains. So the number of Intruders is growing day-by-day posing a critical problem in recognizing among normal and abnormal manner of users in the network. Researchers have discussed the security concerns from different perspectives. Network Intrusion detection system which essentially analyzes, predicts the network traffic and the actions of users, then these behaviors will be examined either anomaly or normal manner. This paper suggested Deep analyzing system of NIDS to construct network intrusion detection system and detecting the type of intrusions in traditional network. The performance of the proposed system was evaluated by using

... Show More
View Publication Preview PDF
Publication Date
Sun Sep 01 2019
Journal Name
Al-dhad Book Store
Multivariate Analysis - First Edition
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro

... Show More
Preview PDF
Publication Date
Fri Feb 01 2019
Journal Name
Al-dhad - Book Store And Publishing
Multivariate Analysis (First Edition)
...Show More Authors

This Book is intended to be textbook studied for undergraduate course in multivariate analysis. This book is designed to be used in semester system. In order to achieve the goals of the book, it is divided into the following chapters. Chapter One introduces matrix algebra. Chapter Two devotes to Linear Equation System Solution with quadratic forms, Characteristic roots & vectors. Chapter Three discusses Partitioned Matrices and how to get Inverse, Jacobi and Hessian matrices. Chapter Four deals with Multivariate Normal Distribution (MVN). Chapter Five concern with Joint, Marginal and Conditional Normal Distribution, independency and correlations. Many solved examples are intended in this book, in addition to a variety of unsolved relied pro

... Show More
Publication Date
Tue Dec 12 2017
Journal Name
Al-khwarizmi Engineering Journal
Model Reference Adaptive Control based on a Self-Recurrent Wavelet Neural Network Utilizing Micro Artificial Immune Systems
...Show More Authors

Abstract 

This paper presents an intelligent model reference adaptive control (MRAC) utilizing a self-recurrent wavelet neural network (SRWNN) to control nonlinear systems. The proposed SRWNN is an improved version of a previously reported wavelet neural network (WNN). In particular, this improvement was achieved by adopting two modifications to the original WNN structure. These modifications include, firstly, the utilization of a specific initialization phase to improve the convergence to the optimal weight values, and secondly, the inclusion of self-feedback weights to the wavelons of the wavelet layer. Furthermore, an on-line training procedure was proposed to enhance the control per

... Show More
View Publication Preview PDF
Crossref (1)
Crossref