{"title":"Improving Collaborative Filter Using BERT","authors":"Riyam Rwedhi, Salam Al-augby","doi":"10.31642/jokmc/2018/100204","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100204","url":null,"abstract":"With the increasing number of books published and the difficulty of obtaining appropriate research attention, the recommendation systems can increase the affordability and availability of these books. In this work, we expand our work to enhance the accuracy of book collaborative filtering by applying semantic similarity to book summaries, in addition to that addressing major problems of the current work by applying effective techniques to handle the scalability and sparsity problems. The proposed approach consists of three stages: preprocessing, building the system, and evaluation. The technologies used in the pre-processing stage included reduction and normalization. The construction system is divided into two phases: semantic similarity and recommendation. The semantic similarity is done by using BERT for sentence embedding and cosine similarity to calculate the similarity between sentences. During the recommendation phase by using CF based on KNN. In the evaluation stage, classification accuracy metrics had been used. The proposed approach improved the accuracy of the book recommendation system and increased the accuracy to 0.89 compared to previous works on a dataset of 271,000 book summaries. The proposed approach yielded better results due to avoiding problems in previous work, such as scalability and sparsity, by using BERT with CF based KNN. Filtering the data using BERT and the KNN algorithm in the CF added strength to the recommendation, which led to an increase in the accuracy rate.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123322945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of the Two Rowed Weyl Module in the Case of Partitions (7,5) and Skew-Partition (7, 5) / (1, 0)","authors":"H. Hassan, Ghsoon Rabeea Raheem","doi":"10.31642/jokmc/2018/100217","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100217","url":null,"abstract":"The main purpose of this paper is to study the application of Weyl module and it’s resolution in the case of two rows which way be specified in the partitions (7, 5) and skew-partition (7, 5)/(1, 0), using the homological way (i.e. the contracting homotopy, place polarization.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122404286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Jasim, A. Imran, Huda Amer Abdul Ameer, Sh.K.Said Husain
{"title":"Category Theory and New Classes of Semi Bornological Group","authors":"N. Jasim, A. Imran, Huda Amer Abdul Ameer, Sh.K.Said Husain","doi":"10.31642/jokmc/2018/100214","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100214","url":null,"abstract":"Because, the new knowledge put every new structure in category theory. So, became a source of interest for many researchers, to put every new structure in category theory. This motivates us to put the new structures of semibornological group in category. Furthermore, new classes of semibornological group was constructed, which it is a semibornological group with respect to S-bounded maps and semibornological groups with respect to S**-bounded maps. The main important results, every semi bornological group is S-semi bornological group and S**-semi bornological group but the converse is not true. Also, we gave the certain condition for any codomain of S-semi bornological group to be S**-semi bornological group. Additionally, every left (right) translation is S-bornological isomorphism and S**-bornological isomorphism, every bornological isomorphism is S-bornological isomorphism and S**-bornological isomorphism.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121941196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Integral Transform :INEM - Transform","authors":"Intidhar Zamil, Emad A. Kuffi","doi":"10.31642/jokmc/2018/100218","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100218","url":null,"abstract":"In this paper, we present a novel transform namely INEM – Transform , involving a lot of potential new or known transform basic characteristics of the new transform were examined in this work as special cases., authors first derived the INEM – transform of basic mathematical functions ,theorem of linearity ,theorem of derivatives and the definition of inverse formula .a novel transformation used to address specific initial value problems of higher order ,some illustrative examples, and use of application in two applications: finding the blood glucose concentration and finding the aortic pressure presented in this work.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126192931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Syndetic proximal set in topological transformation group","authors":"Enas Abdullah","doi":"10.31642/jokmc/2018/100206","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100206","url":null,"abstract":" In this paper will study the syndetic set in topological transformation group. It represents one of the most important sets in topological dynamics that Gottschak referred .We Introduce dynamical relationship between syndetic set and translation (left-right) ,In topological dynamics group present semi replet set and extensive set .We referred to the relationship of semi replet set and extensive set on the one hand, and their relationship to syndetic set on the other hand . We introduced a new concept syndetic proximal point that depended on syndetic set we indicated a relationship syndetic proximal point with proximal point and extensive proximal point , conclude a number of relationships and concepts","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129118871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributive Semimodules: Theory, Properties, and Extensions","authors":"A. Abdulkhaliq, Asaad M. A. Alhossaini","doi":"10.31642/jokmc/2018/100215","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100215","url":null,"abstract":"This article explores the properties and theorems pertaining to subtractive and distributive semimodules. The focus is on understanding the relations between these characteristics and their implications within the context of semimodules. The investigated propositions establish conditions for distributivity in semimodules. It is shown that under certain circumstances, the preimages of subsemimodules under homomorphisms exhibit specific additive properties. Furthermore, the study introduced definitions and propositions related to supplements, principally supplemented semimodules and H-supplemented semimodules. The findings reveal the importance of supplements in understanding the structure and properties of semimodules, particularly in relation to their distributive nature","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116576614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Survey in Image and Audio Steganography by using the Deep Learning Methods","authors":"Zeina Al Hadad, Ibtisam Hassoun Ali","doi":"10.31642/jokmc/2018/100222","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100222","url":null,"abstract":"Steganography is the practise of secretly encoding information into another medium (called a cover media) such that its existence cannot be identified. Steganography is the method that is utilised to successfully do this task. Through the use of digital image steganography, one is able to achieve the capacity of secure communication, which is vital in the bulk of the applications that are now being created. The use of steganography is applicable in a wide variety of advantageous settings. Its ascent to the forefront of current security systems may be attributed to a confluence of factors, including a phenomenal rise in processing power and a heightened awareness among individuals of the need of safeguarding their personal information. When it comes to the creation of a steganographic method, the most significant challenge that must be surmounted is finding the optimal balance between quality and quantity. The method is distinguished from linked systems like encryption and watermarking by its ability to embed information, as well as by the fact that it cannot be seen by the human eye. This article presents a thorough examination and analysis of some contemporary steganographic methods that are regarded as state-of-the-art approaches. In addition, we have included an in-depth discussion of the most important steganographic technologies now available. Recent steganographic techniques that are based on deep learning have been enhanced, which has enabled the resolution of issues that were previously present","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121648565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prediction Model based on Iris Dataset Via Some Machine Learning Algorithms","authors":"Chya Fatah Aziz, B. Awrahman","doi":"10.31642/jokmc/2018/100210","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100210","url":null,"abstract":"Abstract— Supervised Machine Learning algorithm has an important approach to Classification. We are predicting the deal type of the Iris plant using various algorithms of machine learning. Iris plants are determined by numerous factors such as the size of the length and width of the property. A horticultural skill announces that some of the plants are different in some physical appearances like size, shape, and color. Hence it is difficult to recognize any species. Versicolor, Setosa, and Virginica have three identical subspecies of The Iris flower species. This paper uses machine learning algorithms to recognize all classes of the flower with an accuracy degree of %100 for KNN, %95 for RF, %97 for DT, and %98 for LR. The Iris dataset is frequently available, and it is implemented using Scikit tools. and build the prediction model for Plants. Here, algorithms of machine learning such as Logistic Regression (LR), Decision Tree (DT), K Nearest Neighbor (KNN), and Random Forest (RF) are employed to construct a predictive model.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120836993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Instantaneous Frequency and Chirp Rate Estimation for Noisy Quadratic FM Signals by CNN","authors":"Huda Saleem, Zahir M. Hussain","doi":"10.31642/jokmc/2018/100201","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100201","url":null,"abstract":"Deep learning and machine learning are widely employed in various domains. In this paper, Artificial Neural Network (ANN) and Convolution Neural Network (CNN) are used to estimate the Instantons Frequency (IF), Linear Chirp Rate (LCR), and Quadratic Chirp Rate (QCR) for Quadratic Frequency Modulated (QFM) signals under Additive White Gaussian (AWG) noise and Additive Symmetric alpha Stable (ASαS) noise. SαS distributions are impulsive noise disturbances except for a few circumstances, lack a closed-form Probability Density Function (PDF), and an infinite second-order statistic. Geometric SNR (GSNR) is used to determine the impulsiveness of mixture noise for Gaussian and SαS noise. ANN is a machine learning classifier with few layers that reduce FE, LCRE, and QCRE complexity and achieve high accuracy. CNN is a deep learning classifier that is built with multiple layers of FE, LCRE, and QCRE. CNN is more accurate than ANN when dealing with large amounts of data and determining optimal features. The results reveal that SαS noise is substantially more damaging to FE, LCRE, and QCRE than Gaussian noise, even when the magnitude is modest, and it is less damaging when alpha is greater than one. After training DCNN for FE, LCRE, and QCRE estimation of QFM signals. The 2D-CNN model accuracy achieved 98.7603 and 1D-CNN is 75.8678 for ten epochs. ANN model accuracy achieved 37.5 for 1000 epochs. The accuracy of TFD (spectrogram & pspectrum) for frequency estimation of QFM signals was 38.4254 by spectrogram and 38.6746 by pspectrum.","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127690861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bayes estimators with extension of Jeffery prior information for Time censored data and Failure censored data","authors":"Haneen Reed Sahib, Hadeel Salim Al-Kutubi","doi":"10.31642/jokmc/2018/100208","DOIUrl":"https://doi.org/10.31642/jokmc/2018/100208","url":null,"abstract":"In this research, the Bayes estimator was derived based on Time censored data of the first type, and the Failure censored data of the second type. Reliance has been made on extension of Jeffery prior information. Finally, the simulation was used based on the MATLAB program and with different inputs to find the best estimator among Maximum Likelihood estimator and Bayes estimators with extension that has the least mean percentage error","PeriodicalId":115908,"journal":{"name":"Journal of Kufa for Mathematics and Computer","volume":"447 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123387092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}