In recent years it has spread the used of e-commerce sites quite dramatically. Thus, these sites have become display huge number of diverse products. It became difficulty for the customer to choose what he/she wants from this product. The recommender systems are used to help customers to finding the desired product of their interests and proved to be an important solution to information overload problem.
This paper, designed a recommendation system based on content, which is usually textual description. Furthermore, the proposed system uses cosine similarity function to find the similarities among the characteristics of various products, and nominate a suitable product closer to customer satisfaction. The experimental result shows that the proposed system can provide suitable product with accuracy up to 95%.
The study involved preparing a new compound by combining between 2- hydroxybenzaldehyde and (Z)-3-hydrazineylideneindolin-2-one resulting in Schiff bases and metal ions: Mn(II), Co(II), Ni(II), Cu(II), and Zn(II) forming stable minerals-based-Schiff complexes. The formation of resulting Schiff bases is detected spectrally using LC-Mss which gave corresponding results with theoretical results, 1H-NMR proves the founding of N=CH signal, FT-IR indicates the occurrence of imine band and UV-VIs mean is proved the ligand formation. On the other hand, minerals-based-Schiff was characterized using the same spectral means that relied with ligand (Schiff bases). Those means gave satisfactory results and proved the suggested distinguishable geometries
... Show MoreThis paper presents an approach to license plate localization and recognition. A proposed method is designed to control the opening of door gate based on the recognition of the license plates number in Iraq. In general the system consists of four stages; Image capturing, License plate cropping, character segmentation and character recognition. In the first stage, the vehicle photo is taken from standard camera placed on the door gate with a specific distance from the front of vehicle to be processed by our system. Then, the detection method searches for the matching of the license plate in the image with a standard plate. The segmentation stage is performed by is using edge detection. Then character recognition, done by comparing with templ
... Show MoreResearchers are increasingly using multimodal biometrics to strengthen the security of biometric applications. In this study, a strong multimodal human identification model was developed to address the growing problem of spoofing attacks in biometric security systems. Through the use of metaheuristic optimization methods, such as the Genetic Algorithm(GA), Ant Colony Optimization(ACO), and Particle Swarm Optimization (PSO) for feature selection, this unique model incorporates three biometric modalities: face, iris, and fingerprint. Image pre-processing, feature extraction, critical image feature selection, and multibiometric recognition are the four main steps in the workflow of the system. To determine its performance, the model wa
... Show MoreAbstract— The growing use of digital technologies across various sectors and daily activities has made handwriting recognition a popular research topic. Despite the continued relevance of handwriting, people still require the conversion of handwritten copies into digital versions that can be stored and shared digitally. Handwriting recognition involves the computer's strength to identify and understand legible handwriting input data from various sources, including document, photo-graphs and others. Handwriting recognition pose a complexity challenge due to the diversity in handwriting styles among different individuals especially in real time applications. In this paper, an automatic system was designed to handwriting recognition
... Show MoreThis paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagno
... Show MoreThe research aims to extrapolate the repercussions of the use of expert systems in the work of the external auditor on the quality of audit, as the research problem was that despite the use of these techniques in audit work, there is a problem related to the efficiency and effectiveness of these technological systems used in audit work, the feasibility of their use and the extent of their impact: The quality of the audit process.
The researchers adopted the questionnaire as a tool for collecting study data from a community composed of auditors in auditing offices and companies in Iraq, and the auditors of the Iraqi Federal Financial Supervision Bureau. The number of recovered and valid qu
... Show MoreLow incoming discharge upstream of Samarra-Al Tharthar System leads to sediment accumulation and forming islands, especially an island upstream of Al Tharthar Regulator. This island and the sedimentation threaten the stability of the structure and reduce the efficiency of the system. This study aims to hydraulically identify the sedimentation problem mentioned above, to find solutions of how to control the sediment problems, and to develop the capacity of
the system for 500 years return period flood of 15060 m3/s. Surface Water Modeling System (SMS10.1) with two dimensional depth average models (RMA-2) software were used to simulate and analyze the system. The results of analysis showed that the maximum permissible discharge through t
Face detection systems are based on the assumption that each individual has a unique face structure and that computerized face matching is possible using facial symmetry. Face recognition technology has been employed for security purposes in many organizations and businesses throughout the world. This research examines the classifications in machine learning approaches using feature extraction for the facial image detection system. Due to its high level of accuracy and speed, the Viola-Jones method is utilized for facial detection using the MUCT database. The LDA feature extraction method is applied as an input to three algorithms of machine learning approaches, which are the J48, OneR, and JRip classifiers. The experiment’s
... Show More