Preferred Language
Articles
/
bsj-5929
User-Oriented Preference Toward a Recommender System
...Show More Authors

            Nowadays, it is convenient for us to use a search engine to get our needed information. But sometimes it will misunderstand the information because of the different media reports. The Recommender System (RS) is popular to use for every business since it can provide information for users that will attract more revenues for companies. But also, sometimes the system will recommend unneeded information for users. Because of this, this paper provided an architecture of a recommender system that could base on user-oriented preference. This system is called UOP-RS. To make the UOP-RS significantly, this paper focused on movie theatre information and collect the movie database from the IMDb website that provides information related to movies, television programs, home videos, video games, and streaming content that also collects many ratings and reviews from users. This paper also analyzed individual user data to extract the user’s features. Based on user characteristics, movie ratings/scores, and movie results, a UOP-RS model was built. In our experiment, 5000 IMDb movie datasets were used and 5 recommended movies for users. The results show that the system could return results on 3.86 s and has a 14% error on recommended goods when training data as . At the end of this paper concluded that the system could quickly recommend users of the goods which they needed.  The proposed system will extend to connect with the Chatbot system that users can make queries faster and easier from their phones in the future.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Journal Of Advanced Research In Dynamical And Control Systems
Reliable and valid questionnaire for organizational, system, and individual factors to utilize cloud health information system
...Show More Authors

Scopus
Publication Date
Wed Aug 30 2023
Journal Name
Al-kindy College Medical Journal
Comparative Study between RIPASA Scoring System and ALVARADO Scoring System in Diagnosing Acute Appendicitis in Adults
...Show More Authors

Background: Acute appendicitis is regarded as one of the most common inflammation that needs surgical intervention. Different scoring systems have been used for diagnosing of acute appendicitis. ALVARADO score is one of the most widely used score in diagnosing of acute appendicitis, but the accuracy of the latter is insufficiently low in Middle-East patients. Thus a new scoring system called RIPASA score has been designed for diagnosing of acute appendicitis in those patients. The aim of this study is to use RIPASA score and compare its result with ALVARADO score in diagnosing of acute appendicitis.

Subjects and Methods: The study includes 200 patients with symptoms and signs of

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Sat Dec 16 2023
Journal Name
2023 14th International Renewable Energy Congress (irec)
Utilizing the Controlled Hydropower System to Harness the Collected Water in Drainage System for Power Generation
...Show More Authors

The variety of clean energy sources has risen, involving many resources, although their fundamental principles remain consistent in terms of energy generation and pollution reduction. The using of hydropower system for energy production also has a dynamic impact in which it utilizes to harness the water for the purpose of energy production. As it is important to overcome the problem of accidents in the highway and rural areas in the case of server rainfall and flood by implementation a smart system that used for energy production. This paper aims to develop a controlled hydropower system installed in the drainage sinks allocated in highway roads used for producing. The proposed system consists of storage unit represented by pipes used for t

... Show More
View Publication
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Mon Mar 15 2021
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of an Educational Program on Female Students’ Knowledge toward Premenstrual Syndrome in Secondary Schools in Third Al- Rusafa Education Directorate, Iraq
...Show More Authors

Objective: To evaluate the effectiveness of educational program on female students’ knowledge toward premenstrual syndrome.
Methodology: A quasi-experimental design study conducing on (140) student purposely in four secondary schools at Al-sadder city (70) student for study group and (70) for control group. The prevalence of PMS selected through American College of Obstetricians and Gynecologists (ACOG) (2015) criterias to select PMS students before program. The education program were set in four steps, the first step (pre-test) is to assess the knowledge , before the implementation of the program, the second step is implementing the program, following two steps post-test I and II between each test two weeks. Validity is determined

... Show More
View Publication Preview PDF
Publication Date
Wed Jul 01 2020
Journal Name
Indian Journal Of Forensic Medicine & Toxicology
Assessment of undergraduate critical care nursing students ‘ knowledge and attitudes toward caring of dying patients in colleges of nursing at Baghdad university
...Show More Authors

Scopus (18)
Scopus
Publication Date
Sun Sep 27 2020
Journal Name
Iraqi National Journal Of Nursing Specialties
Effectiveness of Health Education Program on Health Care Providers’ Knowledge toward Immunization of Children at Primary Health Care Centers in Kirkuk City
...Show More Authors

Objectives: The study aims to evaluate effectiveness of health education program on health care providers’ knowledge toward immunization of children at primary health care centers in Kirkuk city.

 

Methodology: A quasi –experimental study design two- group (pre-test, post-test 1 and post-test 2) conducted at primary health care centers in Kirkuk city during the period from 28 October 2019 to 10 August 2020. By collecting (50) samples divided into two groups, each one (25) participant as control & study group. The study group exposed to the education program only.

 

Results: Results showed a clear positive

... Show More
View Publication Preview PDF
Publication Date
Thu Dec 31 2020
Journal Name
Iraqi Journal Of Market Research And Consumer Protection
THE USE OF MICROENCAPSULATION TECHNOLOGY WITH COATING LAYER BY LAYER TO IMPROVE THE STABILITY OF THE Lactobacillus casei TOWARDS THE BILE SALTS AND TREATMENT HEAT.: THE USE OF MICROENCAPSULATION TECHNOLOGY WITH COATING LAYER BY LAYER TO IMPROVE THE STABILITY OF THE Lactobacillus casei TOWARDS THE BILE SALTS AND TREATMENT HEAT.
...Show More Authors

This study aimed to improve the microencapsulation technique using a type coating the encapsulation Layer by Layer, which provide the best protection for life Lactobacillus casei in the extrusion method and use the microencapsulation of materials of the protein concentrated by protein 80% and the coating with alginate and chitosan have the results showed the variation in the difference of the binding process encapsulation yield among the types of coating through. by studying of these the effect o stability of the bio probiotic free cell and the three types coated towards three different concentrations from bile salts 0, 0.3, 0.5 and 0.7% when the periods of time different of zero and two and three hours at incubation the recorded

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 01 2018
Journal Name
Journal Of Theoretical And Applied Information Technology
Matching Algorithms for Intrusion Detection System based on DNA Encoding
...Show More Authors

Pattern matching algorithms are usually used as detecting process in intrusion detection system. The efficiency of these algorithms is affected by the performance of the intrusion detection system which reflects the requirement of a new investigation in this field. Four matching algorithms and a combined of two algorithms, for intrusion detection system based on new DNA encoding, are applied for evaluation of their achievements. These algorithms are Brute-force algorithm, Boyer-Moore algorithm, Horspool algorithm, Knuth-Morris-Pratt algorithm, and the combined of Boyer-Moore algorithm and Knuth–Morris– Pratt algorithm. The performance of the proposed approach is calculated based on the executed time, where these algorithms are applied o

... Show More
Scopus (5)
Scopus
Publication Date
Thu Jul 01 2021
Journal Name
Journal Of Engineering
Proposed Security Framework for Mobile Data Management System
...Show More Authors

Portable devices such as smartphones, tablet PCs, and PDAs are a useful combination of hardware and software turned toward the mobile workers. While they present the ability to review documents, communicate via electronic mail,  appointments management, meetings, etc. They usually lack a variety of essential security features. To address the security concerns of sensitive data, many individuals and organizations, knowing the associated threats mitigate them through improving authentication of users, encryption of content, protection from malware, firewalls,  intrusion prevention, etc. However, no standards have been developed yet to determine whether such mobile data management systems adequately provide the fu

... Show More
View Publication Preview PDF
Crossref (4)
Crossref
Publication Date
Sun Sep 07 2008
Journal Name
Baghdad Science Journal
Hybrid Cipher System using Neural Network
...Show More Authors

The objective of this work is to design and implement a cryptography system that enables the sender to send message through any channel (even if this channel is insecure) and the receiver to decrypt the received message without allowing any intruder to break the system and extracting the secret information. In this work, we implement an interaction between the feedforward neural network and the stream cipher, so the secret message will be encrypted by unsupervised neural network method in addition to the first encryption process which is performed by the stream cipher method. The security of any cipher system depends on the security of the related keys (that are used by the encryption and the decryption processes) and their corresponding le

... Show More
View Publication Preview PDF
Crossref