Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a new measure is proposed from the combination of measures to cope with the global meaning of data set ratings. After conducting the experimental results, it is shown that the proposed measure achieves major objectives that maximize the accuracy Predictions.
The lead-acid battery has become so dependable in its used applications of automobile starting, emergency lighting and telecommunications, which left an impression that no further investigation is necessary or desirable. While there has been slow continuous improvements in lead-acid battery performance and mainly limited to design and material engineering. This work is mainly devoted to the properties of the active mass of the positive electrode and the acid/water ratio during the manufacturing process. A field study is carried out at the State Battery Manufacturing Company located in Baghdad, to prepare batches of lead mono-oxide with predefined quantities of liquid additives (i.e. sulfuric acid and water). Quality control and laborator
... Show MoreTHE PROBLEM OF TRANSLATING METAPHOR IN AN ARTISTIC TEXT (ON THE MATERIAL OF RUSSIAN AND ARABIC LANGUAGES)
Numerous drilling additives and materials are used continuously because they are necessary to support and give the required properties of the drilling fluid so that to ensure the stability of the borehole. This paper aspires to evaluate the rheological properties of bentonite (montmorillonite) Trefawey as an alternative to using commercial bentonite. Monitoring and evaluating of the rheological and filtration properties were prepared. This exertion aims to focus on the effect of hematite, and barite on the rheological properties of the three aforementioned bentonite types. An improvement in the rheological properties of bentonite (montmorillonite). Trefawey was observed after adding the previous heavy materials. Hematite has by some
... Show MoreThe current research is concerned with a pragmatic study of attack and defense acts that are used by President Donald Trump in the American Presidential Debate in 2020. Attack is an attempt to harm or defeat someone, and it is a bold message that the speaker or attacker does not like or disagree with the other antagonist. On the contrary, defense means a person responds to an attack of his or her opponent. After an attack, the politician either negates or fact-checks claims made by his opponents or tries to set the record straight. By the end of the study, it is expected to answer the following questions: What are the most frequent strategies of attack and defense that utilized by President Trump to formulate his speech? What are the reason
... Show MoreAbstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS
... Show More