Britain found itself at the end of the nineteenth century in front of many obstacles within Europe, it is to hold the coalition Russian Franco in 1894, and what form of threat to the interests of Britain in its colonies outside Europe, as well as the development of other European countries in military and economic aspects such as Germany and the United States and others. As she was defying the fleet of Britain, Germany, and the last has a naval fleet was able to protect all the way Britain and its colonies throughout the nineteenth century
Recommender Systems are tools to understand the huge amount of data available in the internet world. Collaborative filtering (CF) is one of the most knowledge discovery methods used positively in recommendation system. Memory collaborative filtering emphasizes on using facts about present users to predict new things for the target user. Similarity measures are the core operations in collaborative filtering and the prediction accuracy is mostly dependent on similarity calculations. In this study, a combination of weighted parameters and traditional similarity measures are conducted to calculate relationship among users over Movie Lens data set rating matrix. The advantages and disadvantages of each measure are spotted. From the study, a n
... Show MoreWatermelon is known to be infested by multiple insect pests both simultaneously and in sequence. Interactions by pests have been shown to have positive or negative, additive or non additive, compensatory or over compensatory effects on yields. Hardly has this sort of relationship been defined for watermelon vis-à-vis insect herbivores. A 2-year, 2-season (4 trials) field experiments were laid in the Research Farm of Federal University Wukari, to investigate the interactive effects of key insect pests of watermelon on fruit yield of Watermelon in 2016 and 2017 using natural infestations. The relationship between the dominant insect pests and fruit yield were determined by correlation (r) and linear regression (simple and multiple) analys
... Show Moreت نايبتسلاا ثحابلا مدختسا دقو ,ةيداصتقلاا تادحولا ةميق ىلع انوروك ةحئاج لظ يف يلخادلا قيقدتلا ريثأت ةيداصتقلاا تادحولا فادها قيقحت يف مهسي يلخادلا قيقدتلا نا ثحبلا تاجاتنتسا مها تناكو , ثحبلا تاريغتم نيب ةقلاعلا نايبل رطاخملا ةرادأو اهتءافكو اهتيلعاف نيسحتو قيقدتلا عقوم زيزعت ىلع لمعلا تايصوتلا مها تناكو امك, ةمكوحلا تايلمعو ةباقرلاو قيقحتل رارمتسأب ئراوطلا ططخ ثيدحتو ةبقارمو ةحضاو تازفحم ءاشناو ةلمتحم
... Show MoreA discussion about the repercussions of the exchange rate on the behavior of stock markets became one of the basic principles of financial economics. The Istanbul Stock Exchange , considered one of the fastest financial markets growing in the region, driven by solid economic activity, for a diversified economy which classified as one of the the fastest growing economies in the world. However, the aforementioned market witnessed sharp fluctuations in the past few months, coinciding with the continuous fluctuations in the exchange rate of the Turkish lira, posing a serious challenge to the economic and investment environment in a c
... Show MoreSome great families in England had competed for the sake of getting authority and power in England.
This competition turned to be a bloody civil war which extended till 1455 and ended with the victory of Henry Tudor whose judgment in England started from 28th of August 1458, consequently a new dynast which is known as (the Tudor)has established
Abstract
Knowing the amount of residual stresses and find technological solutions to minimize and control them during the production operation are an important task because great levels of deformation which occurs in single point incremental forming (SPIF), this induce highly non-uniform residual stresses. In this papera propose of a method for multilayer single point incremental forming with change in thickness of the top plate (0.5, 0.7, 0.9) mm and lubrication or material between two plates(polymer, grease, grease with graphite, mos2) to knowing an effect of this method and parameters on residual stresses for the bottom plates. Also compare these results for the
... Show MoreThe paper aims to propose Teaching Learning based Optimization (TLBO) algorithm to solve 3-D packing problem in containers. The objective which can be presented in a mathematical model is optimizing the space usage in a container. Besides the interaction effect between students and teacher, this algorithm also observes the learning process between students in the classroom which does not need any control parameters. Thus, TLBO provides the teachers phase and students phase as its main updating process to find the best solution. More precisely, to validate the algorithm effectiveness, it was implemented in three sample cases. There was small data which had 5 size-types of items with 12 units, medium data which had 10 size-types of items w
... Show MoreMarriage is considered one of the strongest ties that links between two human beings , but after the evolutions that happened in our Arab communities and specifically in the Iraqi community , marriage through the internet websites appeared . this kind of marriage is considered one of the new phenomena that appeared in the present time in many societies. That was through internet websites like yahoo , Facebook and other websites that have chat features.
The Islamic sharia looks negatively at marriage through the internet announcing that this way is harmful for both the man and the woman
A substantial matter to confidential messages' interchange through the internet is transmission of information safely. For example, digital products' consumers and producers are keen for knowing those products are genuine and must be distinguished from worthless products. Encryption's science can be defined as the technique to embed the data in an images file, audio or videos in a style which should be met the safety requirements. Steganography is a portion of data concealment science that aiming to be reached a coveted security scale in the interchange of private not clear commercial and military data. This research offers a novel technique for steganography based on hiding data inside the clusters that resulted from fuzzy clustering. T
... Show More