Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreHistorical scripts and Academic studies have bestrewed almost all the events of the movement of march 1941 . Yet the need was present to shine more light on important sides . These important sides were neglected due to some reasons among which came the absence of the historical material which can make a new historical detection. Then there were historical topics concerning our research which comes within context of sanitarily conditions , rarely seizes the attention of the researchers for many reasons some of them were not subjective.
The spread of Malaria among the British force was one of the sanitarily conditions that were related to the movement of march since their arrival to Basra city and its continuous spread after the second
Idioms are a very important part of the English language: you are told that if you want to go far (succeed) you should pull your socks up (make a serious effort to improve your behaviour, the quality of your work, etc.) and use your grey matter (brain).1 Learning and translating idioms have always been very difficult for foreign language learners. The present paper explores some of the reasons why English idiomatic expressions are difficult to learn and translate. It is not the aim of this paper to attempt a comprehensive survey of the vast amount of material that has appeared on idioms in Adams and Kuder (1984), Alexander (1984), Dixon (1983), Kirkpatrick (2001), Langlotz (2006), McCarthy and O'Dell (2002), and Wray (2002), among others
... Show MoreExperiment was conducted in Baghdad, three factor were used in this research included Two types of Plows included moldboard and disk plows which represented the main plot, Three forward speeds of the tillage was the second factor included 1.85, 3.75 and 5.62 km / h which represented sup plot , and Three levels of Soil Moisture was third factor included 21, 18 and 14 % in all of Vertical and Lateral Plowing Deviation, Practical and specific productivity, actual time for plowing one donam and appearance (goodness) of Tillage represented by the number of clods > 10 cm in silt clay loam soil with depth 22 cm were studied. the experiment was used Split – split plot design under randomized complete block design with three replications and Le
... Show MoreDue to its importance in physics and applied mathematics, the non-linear Sturm-Liouville problems
witnessed massive attention since 1960. A powerful Mathematical technique called the Newton-Kantorovich
method is applied in this work to one of the non-linear Sturm-Liouville problems. To the best of the authors’
knowledge, this technique of Newton-Kantorovich has never been applied before to solve the non-linear
Sturm-Liouville problems under consideration. Accordingly, the purpose of this work is to show that this
important specific kind of non-linear Sturm-Liouville differential equations problems can be solved by
applying the well-known Newton-Kantorovich method. Also, to show the efficiency of appl
This study was conducted to identify the health status of children's nurseries in the city of Baghdad and to identify improper dietary habits practiced by these children have shown the results of this study that the same proportion of childhood diarrhea disease research and infections
In information security, fingerprint verification is one of the most common recent approaches for verifying human identity through a distinctive pattern. The verification process works by comparing a pair of fingerprint templates and identifying the similarity/matching among them. Several research studies have utilized different techniques for the matching process such as fuzzy vault and image filtering approaches. Yet, these approaches are still suffering from the imprecise articulation of the biometrics’ interesting patterns. The emergence of deep learning architectures such as the Convolutional Neural Network (CNN) has been extensively used for image processing and object detection tasks and showed an outstanding performance compare
... Show MoreThe present research aims at identifying the educational problems and psychological problems of distinguished students at the intermediate level. The research sample consists of (246) students who are randomly selected from four distinguished schools (2) in the Karkh\1 and (2) in the Rusafa\2.
The researcher has constructed two scales for measuring the educational and psychological problems. She ensures the psychometric characteristics of the two scales. Alph-Cronbach and test-retest methodsare used to ensure reliability. Some statistical treatments are used to find out the aims of research. These treatments include the one-sample T-test, two independent samples T-test, and the Pearson correlation coefficient. The results show th
... Show More