Recommender systems are gaining a great popularity with the emergence of e-commerce and social media on the internet. These recommender systems enable users’ access products or services that they would otherwise not be aware of due to the wealth of information on the internet. Two traditional methods used to develop recommender systems are content-based and collaborative filtering. While both methods have their strengths, they also have weaknesses; such as sparsity, new item and new user problem that leads to poor recommendation quality. Some of these weaknesses can be overcome by combining two or more methods to form a hybrid recommender system. This paper deals with issues related to the design and evaluation of a personalized hybrid recommender system that combines content-based and collaborative filtering methods to improve the precision of recommendation. Experiments done using MovieLens dataset shows the personalized hybrid recommender system outperforms the two traditional methods implemented separately.
An Adaptive Framework for Enhancing Recommendation Using Hybrid Techniqueijcsit
Recommender systems provide useful recommendations to a collection of users for items or products that
might be of concern or interest to them. Several techniques have been proposed for recommendation such
as collaborative filtering, content-based, knowledge-based, and demographic filtering. Each of these
techniques suffers from scalability, data sparsity, and cold-start problems when applied individually
resulting in poor recommendations. This paper proposes an adaptive hybrid recommender system that
combines multiple techniques together to achieve some synergy between them. Collaborative filtering and
demographic techniques are combined in a weighted linear formula. Different experiments applied using
movieLen dataset confirm that the proposed adaptable hybrid framework outperforms the weaknesses
resulted when using traditional recommendation techniques.
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Recommendation system plays important role in Internet world and used in many applications. It has created the collection of many application, created global village and growth for numerous information. This paper represents the overview of Approaches and techniques generated in recommendation system. Recommendation system is categorized in three classes: Collaborative Filtering, Content based and hybrid based Approach. This paper classifies collaborative filtering in two types: Memory based and Model based Recommendation .The paper elaborates these approaches and their techniques with their limitations. The result of our system provides much better recommendations to users because it enables the users to understand the relation between their emotional states and the recommended movies.
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
Recommender systems are utilized to predict and recommend relevant items to system users. Item could be
in any forms such as documents, location, movie and articles. The mechanism of recommender system is
based on examination which includes users’ behaviors, item ratings, various logs (e.g. user’s history log)
and, social connections. The main objective of the examination is to predict items which have great potential to be liked by users. Although, traditional recommender systems have been very successful to predict what user might like, they did not take into consideration contextual information such as users’
location. In this paper, we propose a new framework with the aim of enhancing accuracy of recommendations in user-based collaborative filtering by considering about users’ locations.
A Study of Neural Network Learning-Based Recommender Systemtheijes
A recommender system sorts and recommends the information which meets personal preferences among a huge amount of data provided by e-commerce. In particular, collaborative filtering (CF) is the most widely used technique in these recommendation systems. This method finds neighboring users who have similar preferences with particular users and recommends the items preferred by the former. This study proposes a neural network learning model as a new technique to find neighboring users using the collaborative filtering method. This kind of neural network learning model takes care of a sparseness problem during the analysis stage among those related with target users. The proposed method was tested with MovieLens data sets, and the results showed that precision improved by 6.7%.
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDYJournal For Research
Recommender Systems have the ability to guide the users in a personalized way to interesting items in a large space of possible options. They have fundamental applications in e-commerce and information retrieval, providing suggestion that prune large information spaces so that users are directed towards those items that best meets the needs and preferences. A variety of approaches have been proposed but collaborative filtering has been the most popular and widely used which makes use of various similarity measures to calculate the similarity. Collaborative Filtering takes the user feedback in the form of ratings in an application area and uses it to find similarities and differences between user profiles to generate recommendations. Collaborative Filtering makes use of various similarity measures to calculate the similarity or difference between the users. This paper provides an overview on few important similarity measures that are currently being used. Different similarity measures provide different results against same input parameters. So, to understand how various similarity measures behave when they are put in different contexts but with same input, few observations are made. This paper also provides a comparison graph to help understand the results of different similarity measures.
An Adaptive Framework for Enhancing Recommendation Using Hybrid Techniqueijcsit
Recommender systems provide useful recommendations to a collection of users for items or products that
might be of concern or interest to them. Several techniques have been proposed for recommendation such
as collaborative filtering, content-based, knowledge-based, and demographic filtering. Each of these
techniques suffers from scalability, data sparsity, and cold-start problems when applied individually
resulting in poor recommendations. This paper proposes an adaptive hybrid recommender system that
combines multiple techniques together to achieve some synergy between them. Collaborative filtering and
demographic techniques are combined in a weighted linear formula. Different experiments applied using
movieLen dataset confirm that the proposed adaptable hybrid framework outperforms the weaknesses
resulted when using traditional recommendation techniques.
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Recommendation system plays important role in Internet world and used in many applications. It has created the collection of many application, created global village and growth for numerous information. This paper represents the overview of Approaches and techniques generated in recommendation system. Recommendation system is categorized in three classes: Collaborative Filtering, Content based and hybrid based Approach. This paper classifies collaborative filtering in two types: Memory based and Model based Recommendation .The paper elaborates these approaches and their techniques with their limitations. The result of our system provides much better recommendations to users because it enables the users to understand the relation between their emotional states and the recommended movies.
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
Recommender systems are utilized to predict and recommend relevant items to system users. Item could be
in any forms such as documents, location, movie and articles. The mechanism of recommender system is
based on examination which includes users’ behaviors, item ratings, various logs (e.g. user’s history log)
and, social connections. The main objective of the examination is to predict items which have great potential to be liked by users. Although, traditional recommender systems have been very successful to predict what user might like, they did not take into consideration contextual information such as users’
location. In this paper, we propose a new framework with the aim of enhancing accuracy of recommendations in user-based collaborative filtering by considering about users’ locations.
A Study of Neural Network Learning-Based Recommender Systemtheijes
A recommender system sorts and recommends the information which meets personal preferences among a huge amount of data provided by e-commerce. In particular, collaborative filtering (CF) is the most widely used technique in these recommendation systems. This method finds neighboring users who have similar preferences with particular users and recommends the items preferred by the former. This study proposes a neural network learning model as a new technique to find neighboring users using the collaborative filtering method. This kind of neural network learning model takes care of a sparseness problem during the analysis stage among those related with target users. The proposed method was tested with MovieLens data sets, and the results showed that precision improved by 6.7%.
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDYJournal For Research
Recommender Systems have the ability to guide the users in a personalized way to interesting items in a large space of possible options. They have fundamental applications in e-commerce and information retrieval, providing suggestion that prune large information spaces so that users are directed towards those items that best meets the needs and preferences. A variety of approaches have been proposed but collaborative filtering has been the most popular and widely used which makes use of various similarity measures to calculate the similarity. Collaborative Filtering takes the user feedback in the form of ratings in an application area and uses it to find similarities and differences between user profiles to generate recommendations. Collaborative Filtering makes use of various similarity measures to calculate the similarity or difference between the users. This paper provides an overview on few important similarity measures that are currently being used. Different similarity measures provide different results against same input parameters. So, to understand how various similarity measures behave when they are put in different contexts but with same input, few observations are made. This paper also provides a comparison graph to help understand the results of different similarity measures.
Recommender systems have grown to be a critical research subject after the emergence of the first paper on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems, has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation and classification of that research. Because of this, we reviewed articles on recommender structures, and then classified those based on sentiment analysis. The articles are categorized into three techniques of recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to find out the research papers related to sentimental analysis based recommender system. To classify research done by authors in this field, we have shown different approaches of recommender system based on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in recommender structures research, and gives practitioners and researchers with perception and destiny route on the recommender system using sentimental analysis. We hope that this paper enables all and sundry who is interested in recommender systems research with insight for destiny.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...IJDKP
Recommendation becomes a mainstream feature in nowadays e-commerce because of its significant
contributions in promoting revenue and customer satisfaction. Given hundreds of millions of user activity
logs and product items, accurate and efficient recommendation is a challenging computational task. This
paper introduces a new soft hierarchical clustering algorithm - Fuzzy Hierarchical Co-clustering (FHCC)
algorithm, and applies this algorithm to detect user-product joint groups from users’ behavior data for
collaborative filtering recommendation. Via FHCC, complex relations among different data sources can be
analyzed and understood comprehensively. Besides, FHCC is able to adapt to different types of
applications according to the accessibility of data sources by carefully adjust the weights of different data
sources. Experimental evaluations are performed on a benchmark rating dataset to extract user-product
co-clusters. The results show that our proposed approach provide more meaningful recommendation
results, and outperforms existing item-based and user-based collaborative filtering recommendations in
terms of accuracy and ranked position.
Scalable recommendation with social contextual informationeSAT Journals
Abstract Recommender systems are used to achieve effective and useful results in a social networks. The social recommendation will provide a social network structure but it is challenging to fuse social contextual factors which are derived from user’s motivation of social behaviors into social recommendation. Here, we introduce two contextual factors in recommender systems which are used to adopt a useful results namely a) individual preference and b) interpersonal influence. Individual preference analyze the social interests of an item content with user’s interest and adopt only users recommended results. Interpersonal influence is analyzing user-user interaction and their specific social relations. Beyond this, we propose a novel probabilistic matrix factorization method to fuse them in a latent space. The scalable algorithm provides a useful results by analyzing the ranking probability of each user social contextual information and also incrementally process the contextual data in large datasets. Keywords: social recommendation, individual preference, interpersonal influence, matrix factorization
Content-based and collaborative filtering methods are the most successful solutions in recommender
systems. Content-based method is based on item’s attributes. This method checks the features of user's
favourite items and then proposes the items which have the most similar characteristics with those items.
Collaborative filtering method is based on the determination of similar items or similar users, which are
called item-based and user-based collaborative filtering, respectively.In this paper we propose a hybrid
method that integrates collaborative filtering and content-based methods. The proposed method can be
viewed as user-based Collaborative filtering technique. However to find users with similar taste with active
user, we used content features of the item under investigation to put more emphasis on user’s rating for
similar items. In other words two users are similar if their ratings are similar on items that have similar
context. This is achieved by assigning a weight to each rating when calculating the similarity of two
users.We used movielens data set to access the performance of the proposed method in comparison with
basic user-based collaborative filtering and other popular methods.
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
Recommender Systems apply machine learning and data mining techniques for filtering unseen information and can predict whether a user would like a given resource. This paper proposes a novel Modified Fuzzy C-means (MFCM) clustering algorithm which is used for Hybrid Personalized Recommender System (MFCMHPRS). The proposed system works in two phases. In the first phase, opinions from the users are collected in the form of user-item rating matrix. They are clustered offline using MFCM into predetermined number clusters and stored in a database for future recommendation. In the second phase, the recommendations are generated online for active users using similarity measures by choosing the clusters with good quality rating. We propose coefficient parameter for similarity computation when weighting of the users’ similarity. This helps to get further effectiveness and quality of recommendations for the active users. The experimental results using Iris dataset show that the proposed MFCM performs better than Fuzzy C-means (FCM) algorithm. The performance of MFCMHPRS is evaluated using Jester database available on website of California University, Berkeley and compared with fuzzy recommender system (FRS). The results obtained empirically demonstrate that the proposed MFCMHPRS performs superiorly.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
A recommender system(RS) is an information filtering system that recommends the related suggestions as per the end users requirement. Applications of RS include recommendation of movies, music, serials, books, documents, websites, tourist places etc.
Benefits of RS: RSs are beneficial to both service providers and to the users. RSs reduce transaction costs of finding and selecting items.& RSs help in decision making. The proposed work DEMOGRAPHY BASED HYBRID SYSTEM FOR MOVIE RECOMMENDATIONS highlights the combination of collaborative, content based & demographic filtering to recommend movies to the end user. The model uses SVD++ technique available in Surprise Python library and achieves the MSE of 0.92 which is comparatively less than the other techniques.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
Costomization of recommendation system using collaborative filtering algorith...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
with current projections regarding the growth of
Internet sales, online retailing raises many questions about how
to market on the Net. A Recommender System (RS) is a
composition of software tools that provides valuable piece of
advice for items or services chosen by a user. Recommender
systems are currently useful in both the research and in the
commercial areas. Recommender systems are a means of
personalizing a site and a solution to the customer’s information
overload problem. Recommender Systems (RS) are software
tools and techniques providing suggestions for items and/or
services to be of use to a user. These systems are achieving
widespread success in ecommerce applications now a days, with
the advent of internet. This paper presents a categorical review
of the field of recommender systems and describes the state-ofthe-
art of the recommendation methods that are usually
classified into four categories: Content based Collaborative,
Demographic and Hybrid systems. To build our recommender
system we will use fuzzy logic and Markov chain algorithm.
Recommender systems have grown to be a critical research subject after the emergence of the first paper on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems, has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation and classification of that research. Because of this, we reviewed articles on recommender structures, and then classified those based on sentiment analysis. The articles are categorized into three techniques of recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to find out the research papers related to sentimental analysis based recommender system. To classify research done by authors in this field, we have shown different approaches of recommender system based on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in recommender structures research, and gives practitioners and researchers with perception and destiny route on the recommender system using sentimental analysis. We hope that this paper enables all and sundry who is interested in recommender systems research with insight for destiny.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...IJDKP
Recommendation becomes a mainstream feature in nowadays e-commerce because of its significant
contributions in promoting revenue and customer satisfaction. Given hundreds of millions of user activity
logs and product items, accurate and efficient recommendation is a challenging computational task. This
paper introduces a new soft hierarchical clustering algorithm - Fuzzy Hierarchical Co-clustering (FHCC)
algorithm, and applies this algorithm to detect user-product joint groups from users’ behavior data for
collaborative filtering recommendation. Via FHCC, complex relations among different data sources can be
analyzed and understood comprehensively. Besides, FHCC is able to adapt to different types of
applications according to the accessibility of data sources by carefully adjust the weights of different data
sources. Experimental evaluations are performed on a benchmark rating dataset to extract user-product
co-clusters. The results show that our proposed approach provide more meaningful recommendation
results, and outperforms existing item-based and user-based collaborative filtering recommendations in
terms of accuracy and ranked position.
Scalable recommendation with social contextual informationeSAT Journals
Abstract Recommender systems are used to achieve effective and useful results in a social networks. The social recommendation will provide a social network structure but it is challenging to fuse social contextual factors which are derived from user’s motivation of social behaviors into social recommendation. Here, we introduce two contextual factors in recommender systems which are used to adopt a useful results namely a) individual preference and b) interpersonal influence. Individual preference analyze the social interests of an item content with user’s interest and adopt only users recommended results. Interpersonal influence is analyzing user-user interaction and their specific social relations. Beyond this, we propose a novel probabilistic matrix factorization method to fuse them in a latent space. The scalable algorithm provides a useful results by analyzing the ranking probability of each user social contextual information and also incrementally process the contextual data in large datasets. Keywords: social recommendation, individual preference, interpersonal influence, matrix factorization
Content-based and collaborative filtering methods are the most successful solutions in recommender
systems. Content-based method is based on item’s attributes. This method checks the features of user's
favourite items and then proposes the items which have the most similar characteristics with those items.
Collaborative filtering method is based on the determination of similar items or similar users, which are
called item-based and user-based collaborative filtering, respectively.In this paper we propose a hybrid
method that integrates collaborative filtering and content-based methods. The proposed method can be
viewed as user-based Collaborative filtering technique. However to find users with similar taste with active
user, we used content features of the item under investigation to put more emphasis on user’s rating for
similar items. In other words two users are similar if their ratings are similar on items that have similar
context. This is achieved by assigning a weight to each rating when calculating the similarity of two
users.We used movielens data set to access the performance of the proposed method in comparison with
basic user-based collaborative filtering and other popular methods.
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
Recommender Systems apply machine learning and data mining techniques for filtering unseen information and can predict whether a user would like a given resource. This paper proposes a novel Modified Fuzzy C-means (MFCM) clustering algorithm which is used for Hybrid Personalized Recommender System (MFCMHPRS). The proposed system works in two phases. In the first phase, opinions from the users are collected in the form of user-item rating matrix. They are clustered offline using MFCM into predetermined number clusters and stored in a database for future recommendation. In the second phase, the recommendations are generated online for active users using similarity measures by choosing the clusters with good quality rating. We propose coefficient parameter for similarity computation when weighting of the users’ similarity. This helps to get further effectiveness and quality of recommendations for the active users. The experimental results using Iris dataset show that the proposed MFCM performs better than Fuzzy C-means (FCM) algorithm. The performance of MFCMHPRS is evaluated using Jester database available on website of California University, Berkeley and compared with fuzzy recommender system (FRS). The results obtained empirically demonstrate that the proposed MFCMHPRS performs superiorly.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
A recommender system(RS) is an information filtering system that recommends the related suggestions as per the end users requirement. Applications of RS include recommendation of movies, music, serials, books, documents, websites, tourist places etc.
Benefits of RS: RSs are beneficial to both service providers and to the users. RSs reduce transaction costs of finding and selecting items.& RSs help in decision making. The proposed work DEMOGRAPHY BASED HYBRID SYSTEM FOR MOVIE RECOMMENDATIONS highlights the combination of collaborative, content based & demographic filtering to recommend movies to the end user. The model uses SVD++ technique available in Surprise Python library and achieves the MSE of 0.92 which is comparatively less than the other techniques.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
Costomization of recommendation system using collaborative filtering algorith...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
with current projections regarding the growth of
Internet sales, online retailing raises many questions about how
to market on the Net. A Recommender System (RS) is a
composition of software tools that provides valuable piece of
advice for items or services chosen by a user. Recommender
systems are currently useful in both the research and in the
commercial areas. Recommender systems are a means of
personalizing a site and a solution to the customer’s information
overload problem. Recommender Systems (RS) are software
tools and techniques providing suggestions for items and/or
services to be of use to a user. These systems are achieving
widespread success in ecommerce applications now a days, with
the advent of internet. This paper presents a categorical review
of the field of recommender systems and describes the state-ofthe-
art of the recommendation methods that are usually
classified into four categories: Content based Collaborative,
Demographic and Hybrid systems. To build our recommender
system we will use fuzzy logic and Markov chain algorithm.
A Literature Survey on Recommendation System Based on Sentimental Analysisaciijournal
Recommender systems have grown to be a critical research subject after the emergence of the first paper
on collaborative filtering in the Nineties. Despite the fact that educational studies on recommender systems,
has extended extensively over the last 10 years, there are deficiencies in the complete literature evaluation
and classification of that research. Because of this, we reviewed articles on recommender structures, and
then classified those based on sentiment analysis. The articles are categorized into three techniques of
recommender system, i.e.; collaborative filtering (CF), content based and context based. We have tried to
find out the research papers related to sentimental analysis based recommender system. To classify
research done by authors in this field, we have shown different approaches of recommender system based
on sentimental analysis with the help of tables. Our studies give statistics, approximately trends in
recommender structures research, and gives practitioners and researchers with perception and destiny
route on the recommender system using sentimental analysis. We hope that this paper enables all and
sundry who is interested in recommender systems research with insight for destiny.
Recommendation systems, also known as recommendation engines, are a type of information system whose purpose is to suggest, or recommend items or actions to users.
The recommendations may consist of:
-> retail items (movies, books, etc.) or
-> actions, such as following other users in a social network.
It can be said that, Recommendation engines are nothing but an automated form of a “shop counter guy”. You ask him for a product. Not only he shows that product, but also the related ones which you could buy. They are well trained in cross selling and up selling. So, does our recommendation engines.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
A Study of Neural Network Learning-Based Recommender Systemtheijes
A recommender system sorts and recommends the information which meets personal preferences among a huge amount of data provided by e-commerce. In particular, collaborative filtering (CF) is the most widely used technique in these recommendation systems. This method finds neighboring users who have similar preferences with particular users and recommends the items preferred by the former. This study proposes a neural network learning model as a new technique to find neighboring users using the collaborative filtering method. This kind of neural network learning model takes care of a sparseness problem during the analysis stage among those related with target users. The proposed method was tested with MovieLens data sets, and the results showed that precision improved by 6.7%.
Improving collaborative filtering using lexicon-based sentiment analysisIJECEIAES
Since data is available increasingly on the Internet, efforts are needed to develop and improve recommender systems to produce a list of possible favorite items. In this paper, we expand our work to enhance the accuracy of Arabic collaborative filtering by applying sentiment analysis to user reviews, we also addressed major problems of the current work by applying effective techniques to handle the scalability and sparsity problems. The proposed approach consists of two phases: the sentiment analysis and the recommendation phase. The sentiment analysis phase estimates sentiment scores using a special lexicon for the Arabic dataset. The item-based and singular value decomposition-based collaborative filtering are used in the second phase. Overall, our proposed approach improves the experiments’ results by reducing average of mean absolute and root mean squared errors using a large Arabic dataset consisting of 63,000 book reviews.
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
Web is a rich domain of data and knowledge, which is spread over the world in unstructured manner. The
number of users is continuously access the information over the internet. Web mining is an application of data
mining where web related data is extracted and manipulated for extracting knowledge. The data mining is used
in the domain of web information mining is refers as web mining, that is further divided into three major
domains web uses mining, web content mining and web structure mining. The proposed work is intended to
work with web uses mining. The concept of web mining is to improve the user feedbacks and user navigation
pattern discovery for a CRM system. Finally a new algorithm HMM is used for finding the pattern in data,
which method promises to provide much accurate recommendation.
Study of Recommendation System Used In Tourism and Travelijtsrd
This study is based on Recommendation Systems and its Types used in Tourism and Travel Website. Recommendation Systems are used in websites so that it can recommend item to a user based on his her interest and on the basis of user profile. In this paper, I design a recommender system for recommending tourist places based on content based and collaborative filtering techniques. This method combines both behavioural and content aspects of recommendations. The flow for the research is that first of all using cosine similarity, weighted ratings and Location APIs we build a content based system. The process is carried out by comparing the features of the item with respect to the user’s preferences. Then followed by collaborative filtering techniques such as Correlation and K Nearest neighbour in which items predict the interest of the user on an activity considering the evaluation that a particular user has given to similar activities. Shikhar "Study of Recommendation System Used In Tourism and Travel" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47922.pdf Paper URL: https://www.ijtsrd.com/computer-science/other/47922/study-of-recommendation-system-used-in-tourism-and-travel/shikhar
Similar to A Hybrid Approach for Personalized Recommender System Using Weighted TFIDF on RSS Contents (16)
Text Mining in Digital Libraries using OKAPI BM25 ModelEditor IJCATR
The emergence of the internet has made vast amounts of information available and easily accessible online. As a result, most libraries have digitized their content in order to remain relevant to their users and to keep pace with the advancement of the internet. However, these digital libraries have been criticized for using inefficient information retrieval models that do not perform relevance ranking to the retrieved results. This paper proposed the use of OKAPI BM25 model in text mining so as means of improving relevance ranking of digital libraries. Okapi BM25 model was selected because it is a probability-based relevance ranking algorithm. A case study research was conducted and the model design was based on information retrieval processes. The performance of Boolean, vector space, and Okapi BM25 models was compared for data retrieval. Relevant ranked documents were retrieved and displayed at the OPAC framework search page. The results revealed that Okapi BM 25 outperformed Boolean model and Vector Space model. Therefore, this paper proposes the use of Okapi BM25 model to reward terms according to their relative frequencies in a document so as to improve the performance of text mining in digital libraries.
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
This study focused on the practice of using computing resources more efficiently while maintaining or increasing overall performance. Sustainable IT services require the integration of green computing practices such as power management, virtualization, improving cooling technology, recycling, electronic waste disposal, and optimization of the IT infrastructure to meet sustainability requirements. Studies have shown that costs of power utilized by IT departments can approach 50% of the overall energy costs for an organization. While there is an expectation that green IT should lower costs and the firm’s impact on the environment, there has been far less attention directed at understanding the strategic benefits of sustainable IT services in terms of the creation of customer value, business value and societal value. This paper provides a review of the literature on sustainable IT, key areas of focus, and identifies a core set of principles to guide sustainable IT service design.
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
Computers today are an integral part of individuals’ lives all around the world, but unfortunately these devices are toxic to the environment given the materials used, their limited battery life and technological obsolescence. Individuals are concerned about the hazardous materials ever present in computers, even if the importance of various attributes differs, and that a more environment -friendly attitude can be obtained through exposure to educational materials. In this paper, we aim to delineate the problem of e-waste in Nigeria and highlight a series of measures and the advantage they herald for our country and propose a series of action steps to develop in these areas further. It is possible for Nigeria to have an immediate economic stimulus and job creation while moving quickly to abide by the requirements of climate change legislation and energy efficiency directives. The costs of implementing energy efficiency and renewable energy measures are minimal as they are not cash expenditures but rather investments paid back by future, continuous energy savings.
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
Vehicular ad hoc networks (VANETs) are a favorable area of exploration which empowers the interconnection amid the movable vehicles and between transportable units (vehicles) and road side units (RSU). In Vehicular Ad Hoc Networks (VANETs), mobile vehicles can be organized into assemblage to promote interconnection links. The assemblage arrangement according to dimensions and geographical extend has serious influence on attribute of interaction .Vehicular ad hoc networks (VANETs) are subclass of mobile Ad-hoc network involving more complex mobility patterns. Because of mobility the topology changes very frequently. This raises a number of technical challenges including the stability of the network .There is a need for assemblage configuration leading to more stable realistic network. The paper provides investigation of various simulation scenarios in which cluster using k-means algorithm are generated and their numbers are varied to find the more stable configuration in real scenario of road.
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
The optimal sizing and placement of Distributed Generation units (DG) are becoming very attractive to researchers these days. In this paper a two stage approach has been used for allocation and sizing of DGs in distribution system with time varying load model. The strategic placement of DGs can help in reducing energy losses and improving voltage profile. The proposed work discusses time varying loads that can be useful for selecting the location and optimizing DG operation. The method has the potential to be used for integrating the available DGs by identifying the best locations in a power system. The proposed method has been demonstrated on 9-bus test system.
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
Early detection of diabetes mellitus (DM) can prevent or inhibit complication. There are several laboratory test that must be done to detect DM. The result of this laboratory test then converted into data training. Data training used in this study generated from UCI Pima Database with 6 attributes that were used to classify positive or negative diabetes. There are various classification methods that are commonly used, and in this study three of them were compared, which were fuzzy KNN, C4.5 algorithm and Naïve Bayes Classifier (NBC) with one identical case. The objective of this study was to create software to classify DM using tested methods and compared the three methods based on accuracy, precision, and recall. The results showed that the best method was Fuzzy KNN with average and maximum accuracy reached 96% and 98%, respectively. In second place, NBC method had respective average and maximum accuracy of 87.5% and 90%. Lastly, C4.5 algorithm had average and maximum accuracy of 79.5% and 86%, respectively.
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
Study in the Competitive field of Intelligent, and studies in the field of Web Scraping, have a symbiotic relationship mutualism. In the information age today, the website serves as a main source. The research focus is on how to get data from websites and how to slow down the intensity of the download. The problem that arises is the website sources are autonomous so that vulnerable changes the structure of the content at any time. The next problem is the system intrusion detection snort installed on the server to detect bot crawler. So the researchers propose the use of the methods of Mining Data Records and the method of Exponential Smoothing so that adaptive to changes in the structure of the content and do a browse or fetch automatically follow the pattern of the occurrences of the news. The results of the tests, with the threshold 0.3 for MDR and similarity threshold score 0.65 for STM, using recall and precision values produce f-measure average 92.6%. While the results of the tests of the exponential estimation smoothing using ? = 0.5 produces MAE 18.2 datarecord duplicate. It slowed down to 3.6 datarecord from 21.8 datarecord results schedule download/fetch fix in an average time of occurrence news.
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
Most of the existing semantic similarity measures that use ontology structure as their primary source can measure semantic similarity between concepts/classes using single ontology. The ontology-based semantic similarity techniques such as structure-based semantic similarity techniques (Path Length Measure, Wu and Palmer’s Measure, and Leacock and Chodorow’s measure), information content-based similarity techniques (Resnik’s measure, Lin’s measure), and biomedical domain ontology techniques (Al-Mubaid and Nguyen’s measure (SimDist)) were evaluated relative to human experts’ ratings, and compared on sets of concepts using the ICD-10 “V1.0” terminology within the UMLS. The experimental results validate the efficiency of the SemDist technique in single ontology, and demonstrate that SemDist semantic similarity techniques, compared with the existing techniques, gives the best overall results of correlation with experts’ ratings.
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
The techniques and tests are tools used to define how measure the goodness of ontology or its resources. The similarity between biomedical classes/concepts is an important task for the biomedical information extraction and knowledge discovery. However, most of the semantic similarity techniques can be adopted to be used in the biomedical domain (UMLS). Many experiments have been conducted to check the applicability of these measures. In this paper, we investigate to measure semantic similarity between two terms within single ontology or multiple ontologies in ICD-10 “V1.0” as primary source, and compare my results to human experts score by correlation coefficient.
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
This is an effective way to improve the storage access performance of small files in Openstack Swift by adding an aggregate storage module. Because Swift will lead to too much disk operation when querying metadata, the transfer performance of plenty of small files is low. In this paper, we propose an aggregated storage strategy (ASS), and implement it in Swift. ASS comprises two parts which include merge storage and index storage. At the first stage, ASS arranges the write request queue in chronological order, and then stores objects in volumes. These volumes are large files that are stored in Swift actually. During the short encounter time, the object-to-volume mapping information is stored in Key-Value store at the second stage. The experimental results show that the ASS can effectively improve Swift's small file transfer performance.
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
Efficient management and control of government's cash resources rely on government banking arrangements. Nigeria, like many low income countries, employed fragmented systems in handling government receipts and payments. Later in 2016, Nigeria implemented a unified structure as recommended by the IMF, where all government funds are collected in one account would reduce borrowing costs, extend credit and improve government's fiscal policy among other benefits to government. This situation motivated us to embark on this research to design and implement an integrated system for vehicle clearance and registration. This system complies with the new Treasury Single Account policy to enable proper interaction and collaboration among five different level agencies (NCS, FRSC, SBIR, VIO and NPF) saddled with vehicular administration and activities in Nigeria. Since the system is web based, Object Oriented Hypermedia Design Methodology (OOHDM) is used. Tools such as Php, JavaScript, css, html, AJAX and other web development technologies were used. The result is a web based system that gives proper information about a vehicle starting from the exact date of importation to registration and renewal of licensing. Vehicle owner information, custom duty information, plate number registration details, etc. will also be efficiently retrieved from the system by any of the agencies without contacting the other agency at any point in time. Also number plate will no longer be the only means of vehicle identification as it is presently the case in Nigeria, because the unified system will automatically generate and assigned a Unique Vehicle Identification Pin Number (UVIPN) on payment of duty in the system to the vehicle and the UVIPN will be linked to the various agencies in the management information system.
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
The Supermarket Management System deals with the automation of buying and selling of good and services. It includes both sales and purchase of items. The project Supermarket Management System is to be developed with the objective of making the system reliable, easier, fast, and more informative.
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
Energy is a key component in the Wireless Sensor Network (WSN)[1]. The system will not be able to run according to its function without the availability of adequate power units. One of the characteristics of wireless sensor network is Limitation energy[2]. A lot of research has been done to develop strategies to overcome this problem. One of them is clustering technique. The popular clustering technique is Low Energy Adaptive Clustering Hierarchy (LEACH)[3]. In LEACH, clustering techniques are used to determine Cluster Head (CH), which will then be assigned to forward packets to Base Station (BS). In this research, we propose other clustering techniques, which utilize the Social Network Analysis approach theory of Betweeness Centrality (BC) which will then be implemented in the Setup phase. While in the Steady-State phase, one of the heuristic searching algorithms, Modified Bi-Directional A* (MBDA *) is implemented. The experiment was performed deploy 100 nodes statically in the 100x100 area, with one Base Station at coordinates (50,50). To find out the reliability of the system, the experiment to do in 5000 rounds. The performance of the designed routing protocol strategy will be tested based on network lifetime, throughput, and residual energy. The results show that BC-MBDA * is better than LEACH. This is influenced by the ways of working LEACH in determining the CH that is dynamic, which is always changing in every data transmission process. This will result in the use of energy, because they always doing any computation to determine CH in every transmission process. In contrast to BC-MBDA *, CH is statically determined, so it can decrease energy usage.
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
In networks, the rapidly changing traffic patterns of search engines, Internet of Things (IoT) devices, Big Data and data centers has thrown up new challenges for legacy; existing networks; and prompted the need for a more intelligent and innovative way to dynamically manage traffic and allocate limited network resources. Software Defined Network (SDN) which decouples the control plane from the data plane through network vitalizations aims to address these challenges. This paper has explored the SDN architecture and its implementation with the OpenFlow protocol. It has also assessed some of its benefits over traditional network architectures, security concerns and how it can be addressed in future research and related works in emerging economies such as Nigeria.
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
Report handling on "LAPOR!" (Laporan, Aspirasi dan Pengaduan Online Rakyat) system depending on the system administrator who manually reads every incoming report [3]. Read manually can lead to errors in handling complaints [4] if the data flow is huge and grows rapidly, it needs at least three days to prepare a confirmation and it sensitive to inconsistencies [3]. In this study, the authors propose a model that can measure the identities of the Query (Incoming) with Document (Archive). The authors employed Class-Based Indexing term weighting scheme, and Cosine Similarities to analyse document similarities. CoSimTFIDF, CoSimTFICF and CoSimTFIDFICF values used in classification as feature for K-Nearest Neighbour (K-NN) classifier. The optimum result evaluation is pre-processing employ 75% of training data ratio and 25% of test data with CoSimTFIDF feature. It deliver a high accuracy 84%. The k = 5 value obtain high accuracy 84.12%
Hangul Recognition Using Support Vector MachineEditor IJCATR
The recognition of Hangul Image is more difficult compared with that of Latin. It could be recognized from the structural arrangement. Hangul is arranged from two dimensions while Latin is only from the left to the right. The current research creates a system to convert Hangul image into Latin text in order to use it as a learning material on reading Hangul. In general, image recognition system is divided into three steps. The first step is preprocessing, which includes binarization, segmentation through connected component-labeling method, and thinning with Zhang Suen to decrease some pattern information. The second is receiving the feature from every single image, whose identification process is done through chain code method. The third is recognizing the process using Support Vector Machine (SVM) with some kernels. It works through letter image and Hangul word recognition. It consists of 34 letters, each of which has 15 different patterns. The whole patterns are 510, divided into 3 data scenarios. The highest result achieved is 94,7% using SVM kernel polynomial and radial basis function. The level of recognition result is influenced by many trained data. Whilst the recognition process of Hangul word applies to the type 2 Hangul word with 6 different patterns. The difference of these patterns appears from the change of the font type. The chosen fonts for data training are such as Batang, Dotum, Gaeul, Gulim, Malgun Gothic. Arial Unicode MS is used to test the data. The lowest accuracy is achieved through the use of SVM kernel radial basis function, which is 69%. The same result, 72 %, is given by the SVM kernel linear and polynomial.
Application of 3D Printing in EducationEditor IJCATR
This paper provides a review of literature concerning the application of 3D printing in the education system. The review identifies that 3D Printing is being applied across the Educational levels [1] as well as in Libraries, Laboratories, and Distance education systems. The review also finds that 3D Printing is being used to teach both students and trainers about 3D Printing and to develop 3D Printing skills.
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
In underwater environment, for retrieval of information the routing mechanism is used. In routing mechanism there are three to four types of nodes are used, one is sink node which is deployed on the water surface and can collect the information, courier/super/AUV or dolphin powerful nodes are deployed in the middle of the water for forwarding the packets, ordinary nodes are also forwarder nodes which can be deployed from bottom to surface of the water and source nodes are deployed at the seabed which can extract the valuable information from the bottom of the sea. In underwater environment the battery power of the nodes is limited and that power can be enhanced through better selection of the routing algorithm. This paper focuses the energy-efficient routing algorithms for their routing mechanisms to prolong the battery power of the nodes. This paper also focuses the performance analysis of the energy-efficient algorithms under which we can examine the better performance of the route selection mechanism which can prolong the battery power of the node
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
The designing of routing algorithms faces many challenges in underwater environment like: propagation delay, acoustic channel behaviour, limited bandwidth, high bit error rate, limited battery power, underwater pressure, node mobility, localization 3D deployment, and underwater obstacles (voids). This paper focuses the underwater voids which affects the overall performance of the entire network. The majority of the researchers have used the better approaches for removal of voids through alternate path selection mechanism but still research needs improvement. This paper also focuses the architecture and its operation through merits and demerits of the existing algorithms. This research article further focuses the analytical method of the performance analysis of existing algorithms through which we found the better approach for removal of voids
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
In this paper we consider the initial value problem for a plate type equation with variable coefficients and memory in
1 n R n ), which is of regularity-loss property. By using spectrally resolution, we study the pointwise estimates in the spectral
space of the fundamental solution to the corresponding linear problem. Appealing to this pointwise estimates, we obtain the global
existence and the decay estimates of solutions to the semilinear problem by employing the fixed point theorem
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
A Hybrid Approach for Personalized Recommender System Using Weighted TFIDF on RSS Contents
1. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 764
A Hybrid Approach for Personalized
Recommender System Using Weighted TFIDF
on RSS Contents
Rebecca A. Okaka
SCIT, JKUAT
Nairobi, Kenya
Waweru Mwangi
SCIT, JKUAT
Nairobi, Kenya
George Okeyo
SCIT, JKUAT
Nairobi, Kenya
Abstract: Recommender systems are gaining a great popularity with the emergence of e-commerce and
social media on the internet. These recommender systems enable users’ access products or services that they
would otherwise not be aware of due to the wealth of information on the internet. Two traditional methods
used to develop recommender systems are content-based and collaborative filtering. While both methods
have their strengths, they also have weaknesses; such as sparsity, new item and new user problem that leads
to poor recommendation quality. Some of these weaknesses can be overcome by combining two or more
methods to form a hybrid recommender system. This paper deals with issues related to the design and
evaluation of a personalized hybrid recommender system that combines content-based and collaborative
filtering methods to improve the precision of recommendation. Experiments done using MovieLens dataset
shows the personalized hybrid recommender system outperforms the two traditional methods implemented
separately.
Keywords: recommender systems; collaborative filtering; content-based filtering; hybrid recommender
system; vector space model; term frequency inverse document frequency. Frequency.
1. INTRODUCTION
Changes in information seeking behavior can be
observed globally [1]. Rapid increase in blogs and
websites has led to an increase in information
overload and it has become extremely difficult for
users to locate current relevant information, with
vague ideas on where to get information, users
often get lost or feel uncertain when seeking
information on their own, giving rise to the need
for creating systems that are able to process the
existing information on one side, and help users by
suggesting products, services or articles that match
their tastes and preferences on the other side.
Recommender systems (RS) are promising tools to
deal with these issues.
There are lots of taxonomies of RS. They can be
divided according to the fact whether the created
recommendation is personalized or non-
personalized [2]. Some Research distinguishes
three main categories of personalized RS:
collaborative filtering (CF), content-based filtering
(CBF), and hybrid filtering (HF) [3]. Adomavicius
and Tuzhilin claim that these three categories are
the most popular and significant recommendation
methods. However, they pinpoint the shortcomings
of these methods when used individually such as
limited content analysis, new item problem, new
user problem, sparsity, scalability etc, which leads
to poor recommendation quality. They also propose
possible improvements; such as combining two or
more recommender filtering methods using
different hybridization techniques to overcome the
challenges of single recommender systems.
In CF, a user gets recommendations of items that
he or she hasn’t rated or liked before, but that were
2. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 765
already positively rated by users in his or her
neighborhood. In CBF, a user gets
recommendations of items he or she had not seen
or rated but similar to the ones he or she had rated
or liked earlier. HF combines two or more filtering
methods to overcome the limitations of each
method. According to Tuzhilin et al, [4] the
combination of two or more filtering methods
proceeds in different ways; creating a unified
model recommender system that brings all
approaches together, utilizing some rules of one
approach into a different approach and vice versa,
separate implementation of algorithms and then
joining results, developing one model that applies
the characteristics of both methods.
The hybrid approach presented in this paper uses
the weighted hybridization technique which
probably is the most straight forward architecture
for a hybrid system. Weighted hybridization
technique was successfully used by the winners of
the Netflix Prize competition [5]. Our approach
involves separate implementation of algorithms
then joining results, it is based on the idea of
merging predicted ratings computed by individual
recommenders to form a ranked list of items from
which top (top k, k=5) items are selected and
presented to the user as recommendations.
This hybrid approach combines CBF and CF
methods, while CBF are able to make predictions
on any item, CF only score an item if there are peer
users who have rated it, the combination of these
two methods therefore also helps eliminate the new
item problem in CF and new user problem in CBF.
This hybrid approach adapts the Vector Space
Model (VSM) in both CBF and CF, uses ranking
algorithm Term Frequency Inverse Document
Frequency (TFIDF) and cosine similarity measure
to find the relationships among users U, items I and
attributes A.
Generally, in a recommender system, there exists a
large number of m items I= {i1, i2….im}, which are
described by a set of l attributes, A= {a1, a2….al},
where each item is described by one attribute or
more, a number of n users, U= {u1, u2….un} and for
each user u, a set of rated items IRu
= {𝑢𝑖1, 𝑢𝑖2, … , 𝑢𝑖𝑛}. For u ϵ U and i ϵ I, the
recommender system predicts the rating 𝑟𝑢,𝑖
′
called
the predicted rating of the user u on the item i such
that𝑟𝑢,𝑖
′
is unknown. From this formulation, the
main problem is predicting the rating a user would
give an item he or she have not seen, then
computing the accuracy of the predicted rating.
The main contribution of this work is that it
provides a very straight forward hybrid architecture
that can be used to improve recommendation
precision as well as provide top most relevant items
to users as recommendations. Because of the two
methods used; content-based and collaborative
filtering, the new user and new item problems is
eliminated; the new user problem in content-based
filtering is eliminated by collaborative filtering and
the new item problem in collaborative filtering is
eliminated by content-based filtering. This hybrid
approach uses the most widely used effective
information retrieval model, the VSM, and a very
simple efficient ranking algorithm tfidf.
The rest of this paper is organized as follows;
section 2 reviews related work. Section 3 presents
the hybrid model and experimental results are
presented in section 4. Section 5 presents
conclusions and outlines of future research.
2. RELATED WORK
Hybrid recommender systems combine two or
more recommender systems. Depending on the
hybridization approach different types of systems
can be found [6]. There have been some works on
using boosting algorithms for hybrid
recommendations [7, 8]. These works attempt to
generate new synthetic ratings in order to improve
recommendation quality. The personalized hybrid
recommender system combines collaborative and
content-based information.
Spiegel [9] proposed a framework that combines
CBF, CF and demographic information for
recommending information sources such as web
pages or news articles. The author used home
HTML pages to gather demographic information of
users. The recommender system is tested on very
few numbers of users and items which cannot
guarantee the efficiency of the proposed system.
3. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 766
The author does not also give an explanation on
how the model is built.
Melville [10] proposed a model in which content-
based algorithm is used to enhance the existing user
data then the collaborative filtering is used for
rating prediction. But fails to justify how both
approaches combined improves prediction
accuracy. Another researcher [11] used a number
of collaborative filtering algorithms such as
Singular Value Decomposition (SVD),
Asymmetric Factor Model and neighborhood
based approaches to build a recommender system.
The author shows that linearly combining these
algorithms increases the accuracy of prediction, but
the use of all these models leads to significant
increase in training time.
Basu et al. [12] use Ripper, a rule induction system,
to learn a function that takes a user and movie and
predicts whether the movie will be liked or
disliked. They combine collaborative and content
information, by creating features such as comedies
liked by user and users who liked movies of genre
X. They however do not show how that approach
improved recommendation quality.
Several other hybrid approaches are based on
traditional CF, but also maintain a content-based
profile for each user. These content-based profiles,
rather than co-rated items, are used to find similar
users. In Pazzani’s approach [13], each user profile
is represented by a vector of weighted words
derived from positive training examples using the
Winnow algorithm. Predictions are made by
applying CF directly to the matrix of user profiles
as opposed to the user ratings matrix. An
alternative approach by; Fab [14] uses relevance
feedback to simultaneously mold a personal filter
along with a communal topic filter. Documents are
initially ranked by the topic filter and then sent to a
user’s personal filter. The user’s relevance
feedback is used to modify both the personal filter
and the originating topic filter. Good et al. [15] use
collaborative filtering along with a number of
personalized information filtering agents.
Predictions for a user are made by applying CF on
the set of other users and the active user’s
personalized agents.
The proposed hybrid approach adapts some
interesting features of the above systems; the use of
collaborative and content information. It however
uses the VSM, tfidf and cosine similarity measure
which are very simple efficient algorithms that
enable item ranking based on weights. Prediction
accuracy is computed by getting the deviation of
the predicted rating from the actual rating. Other
works on hybrid recommender systems can be
found in [16].
3. THE HYBRID FILTERING
MODEL
This section presents the HF approach; Item
database refers to the large amounts of data
User
Merge ratings
Select top K items
Ranked item list
Rated results
Recommendations
Rated results
(
Collaborative filteringContent based filtering
Items Database
Item features
and similarities
User behavior
and similarities
Figure 1. The hybrid filtering model
4. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 767
available on different domains, the model
implements both CBF and CF methods separately.
The two methods used (CBF and CF) complement
each other and contribute to each other’s
effectiveness [17]. This hybrid approach uses the
VSM on CBF and CF methods, tfidf and cosine
similarity measure to compute relationships among
items and users. CF and CBF methods are used to
obtain separate ratings or score for every item. The
more than one rating for every item are merged into
a single value. The items are then ranked to form a
single list of ranked items based on their scores, a
set of items (e.g. top K, where K equals 5, 10….)
topping the list (with highest scores or ratings) are
finally presented to the user as recommendations.
3.1.The Vector Space Model
The vector space model [18] (VSM) is a standard
algebraic model commonly used in information
retrieval (IR). It treats a textual document as a bag
of words, disregarding grammar and even word
order. It represents both documents and queries by
term sets and compares global similarities between
documents and queries. The VSM typically uses
tfidf (or a variant weighting scheme) to weight the
terms. Then each document is represented as a
vector of tfidf weights. Queries are also considered
as documents. Cosine similarity is used to compute
similarity between document vectors and the query
vector. The term frequency TFt,d of term t in
document d is defined as the number of times that
a term t occurs in a document d. Note that;
TFt,d = 1 if t exists in d (1)
TFt,d = 0 if t does not exist in d (2)
It positively contributes to the relevance of d to t.
The inverse document frequency IDFt of term t
measures the rarity of t in a given corpus. If t is rare,
then the documents containing tare more relevant
to t. IDFt is obtained by dividing N by DFt and then
taking the logarithm of that quotient, where N is the
total number of documents and DFt is the document
frequency of t or the number of documents
containing t. Formally;
IDFt =
log10 N
DFt
(3)
The TFIDF value of a term is commonly defined as
the product of its TF and IDF values.
TF-IDF t,d = TFt,d × IDFt (4)
The TF-IDF weight W, for each term in a document
d is given by;
Wt,d = (1 + log10 TFt,d ) ×
log10 N
DFt
(5)
Generally;
Wt,d =
1+log10 N
DFt
if TFt,d> 0 (6)
Wt,d = 0, otherwise (7)
3.1.1 The Vector Space Model in Content-
based filtering
Suppose a user profile is denoted by U and item
profiles by I. TFi,j is the number of times the term ti
occurs in item Ij∊ I, and the inverse document
frequency of a term ti∊ Ij ∊ I is calculated as;
IDFi = log10 I / DFi (8)
Where DFi is equal to the number of items
containing ti and I is equal to the total number of
items being considered. Therefore;
TFIDF = TFi,j × IDFi (9)
The TFIDF of each term is then calculated, and the
vector of each user profile and item profiles are
constructed based on their included terms. These
vectors have the same length, so the similarity of
these profiles can be calculated as;
Sim(U,I)=
U . I
|U|×|I|
=
∑ tfidfU×tfidfI
t
1
√∑ tfidfU
2t
1 +∑ tfidfI
2t
1
(10)
The resulting similarity should range between from
0 to 1. If Sim(U,I)=0,then the two profiles are
independent and if Sim(U,I) > 0, the profiles have
some similarity. Information about a set of items
5. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 768
with similar rating patterns compared to the item
under consideration is the basis for predicting the
rating a Ui would give the item. The prediction
formula is;
Pred(Ui, Ia) =
∑ similarity(Ui ,Ib)×rUi,Ia
∑ similarity(Ui ,Ib)
(11)
Normally, the predicted rating of a user u for an
item i in CBF is the average rating of the user on
items viewed, therefore equation 11 can also be
written as;
𝑟𝑢,𝑖
′
|CBF =
∑ similarity(Ui ,Ib)×rUi,Ia
∑ similarity(Ui ,Ib)
(12)
𝑟𝑢,𝑖
′
|CBF = 𝑟 𝑈𝑖,𝐼𝑎 (13)
Where 𝑟 𝑈𝑖,𝐼𝑎, isthe average rating of Ui on items
already is viewed, and 𝑟𝑢,𝑖
′
|CBFis the predicted
rating of a user on an item in CBF.
3.1.2 The Vector Space Model in
Collaborative filtering
The user profiles are represented as both
documents and queries in an n-dimensional matrix.
The weight for each term t in a user profile p is
given by:
Wi, j = TFi,j × IDFi which can also be written as;
Wi, j = TFi,j × log10 P / pi (14)
IDFi = log10 P / pi (15)
Where, TFi,j is the frequency of a term t in a profile
p, P is the total number of profile, pi is the total
number of profiles containing term t and Wi, j is the
weight of the ith
term in a profile j. The similarity
between user Ui and user Uj is calculated using
cosine similarity measure. The equation for
calculating the similarity is as follows;
Sim(Ui,Uj)=
Ui . Uj
|Ui|×|Uj|
=
∑ tfidfk,i×tfidfk,j
n
k=1
√∑ tfidfk,i
2n
k=1 +∑ tfidfk,j
2n
k=1
(16)
Again the resulting similarity should range
between from 0 to 1. If Sim(Ui,Uj)=0,then the two
users are independent and if Sim(Ui,Uj)=1,the users
are similar. The information about a set of users
with a similar rating behavior compared to the
current user is the basis for predicting the rating a
user Ui would give an item he or she has not rated.
Based on the nearest neighbor of user Ui it is easy
to determine the prediction of user Ui.
Pred(Ui, I)= ri
′
+
∑ similarity(Ui,Uj)×(rj,item−rj
′
)
∑ similarity(Ui,Uj)
(17)
Where, Uj is Ui nearest neighbor, ri
′
is the average
rating of Ui, rj,item is the rating of Uj on the given
item andrj
′
is the average rating of Uj. Also, given
that the predicted rating of a user u on an item I in
CF is given as𝑟𝑢,𝑖
′
|CF, equation 17 can therefore be
written as:
𝑟𝑢,𝑖
′
|CF = ri
′
+
∑ similarity(Ui,Uj)×(rj,item−rj
′
)
∑ similarity(Ui,Uj)
(18)
3.2 Hybridization Process
Table1. Extended user-item, user-user matrix
6. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 769
As stated earlier the HF model combines CBF and
CF which uses user-item matrix and user-user
matrix respectively. Table 1 shows the model
matrix with sample tfidf and cosine similarity
scores among users and items. This model is based
on the idea of deriving recommendation items by
combining predictions computed by each
individual recommenders CBF (Eq. 13) and CF
(Eq. 18), here the separate scores of an individual
recommender on an item i ϵ I recommended to a
user u ϵ U are merged into a single unit.
To take into account the difference in the
contribution of each predictor in the final rating
prediction, each predictor is assigned a parameter.
Such that the resulting rating prediction𝑟𝑢,𝑖
′
|HF of a
user u on an item i from HF is computed as follows;
𝑟𝑢,𝑖
′
|HF = µ𝑟𝑢,𝑖
′
|CBF + 𝛼𝑟𝑢,𝑖
′
|CF (19)
Where µ𝑟𝑢,𝑖
′
|CBF and 𝛼𝑟𝑢,𝑖
′
|CF are the predicted
rating of an item i ϵ I for user u ϵ U in CBF and CF
respectively.
To compute the value for each parameter, a
function S(n) that gives the weight of a user’s rating
n (n=|IRu|) is used. The sigmoid function satisfies
these constraints for S(n).
The parameters µ and α can be computed using the
sigmoid function as follows;
µ =
1
1+𝑒−𝑛 (20)
𝛼 = 1 −
1
1+ 𝑒−𝑛 (21)
Item User profile-Attribute tf-idf User-User cosine similarity
i1 i2 i3 … im a1 a2 a3 … al u1 u2 u3 … un
User u1 - - 4 … 3 0.04 0 0 … 0 1 0.1 0 … 0.2
u2 4 2 - … 5 0 0.01 0.02 … 0.02 0.1 1 0.1 … 0
u3 - - 3 … - 0.04 0 0 … 0.02 0 0.1 1 … 0
… … … … … … … … … … … … … … … …
un - 3 - … - 0.04 0.01 0.02 … 0.02 0.2 0 0 … 1
Item-
Attribute
tfiidf
a1 0.0 0.0 0.0 … 0.0
a2 0.0 0.01 0.0 … 0.01
a3 0.02 0.02 0.0 … 0.0
… … … … … …
al 0.02 0.0 0.0 … 0.0
User-
Item
cosine
similarity
u1 0.3 0.2 0.1 … 0.1
u2 0.3 0.0 0.0 … 0.0
u3 0.1 0.5 0.3 … 0.4
… … … … … …
un 0.0 0.2 0.4 … 0.2
Rated item
Unrated item
7. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 770
These parameters µ and α, represent the weight
confidence levels given to CBF and CF
respectively. The resulting rating predictions of
items from the hybrid approach are ranked based
on their prediction scores, from the ranked items
list the top scoring set of items (top k items) are
selected and provided to the user as
recommendations.
4. HYBRID DESIGN
4.1 System Physical Architecture
Figure 2 below shows the physical architecture of
the proposed hybrid recommender system; it shows
a set of simpler systems each with its own local
context that is independent but not inconsistent
with the context of the larger system as a whole.
Both servers could still be physically implemented
in a single network node.
4.2 System Component Diagram
Figure 3 shows a simple component viewpoint of
the Hybrid Recommender system. The Hybrid
Recommender module, while calculating the
accurate recommendation, uses the data stored in
the Database module via a RESTful API
(Representational Sate Transfer Application
Program Interface). The Hybrid Recommender
module executes the methods on the background. It
is connected to the User Interface module via the
RecommendationRetrieval interface that enables
the resulting recommendations to be shown to the
user.
Figure 3. The Component Diagram
4.3 System Activity Diagram
The following activity diagram shows the flow of
events within the proposed hybrid approach. It
shows how the user interacts with the system.
Database
Hybrid
Recommender
Engine Server
User Workstation
Web
Application
Server
Database
Figure 2. The Physical architecture
8. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 771
Figure 4. The Activity Diagram
5. EXPERIMENTS AND
RESULTS
5.1 Dataset
The MovieLens (http://www.grouplense.org) 100k
dataset was used. This data was collected by the
GroupLens Research Project at the University of
Minnesota during a seven-month period between
19th
September 1997 and 22nd
April 1998. The
MovieLens is used mainly because it is publicly
available and has been used in many hybrid
recommender systems and therefore considered a
good benchmark for this purpose. This dataset
contains 943 users, 1682 movie items and 100000
ratings. Each user rates a minimum of 20 movies
using integer values 1 to 5 and not all movies are
rated by all users. There are 19 movie genres. A
movie can belong to more than one genre. A binary
value of 1 and 0 is used to indicate whether a movie
belongs to a specific genre or not. The dataset is
split into 5 subsets, each having (80%) training and
(20%) test sets.
5.2 Evaluation metrics
The evaluation was done using prediction accuracy
metric: Mean Absolute Error (MAE), which is used
to represent how accurately a RS estimates a user’s
preference for an item. MAE is calculated by
averaging the absolute deviation of a user’s
predicted score and actual score. The smaller the
MAE the more precise the RS.
MAE =
∑ |𝑠𝑖−𝑝𝑖|𝑛
𝑖
𝑛
(22)
Where, n is the total number of items, i is the
current item, si is the actual score a user expressed
for item i, and pi is the RS’s predicted score a user
has for i.
In this experiment 5-fold cross validation was
performed on sub datasets 1 to 5 provided by
MovieLens 100k dataset, 80% training data and
20% test data on each sub dataset. This experiment
compares the results of the hybrid approach to CBF
and CF methods implemented separately.
5.3 Results
Even though the 5 sub data sets used have almost
the same number of users and items, they have
different rating patterns therefore a standard
number of users and items were used for
experiment across all the datasets. Results
presented here are the average of MAE across all
the sub data sets given the specified number of
users and items.
9. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 772
.
0
0.1
0.2
0.3
0.4
100 350 500 800
MAE
Number of Users
CF
CBF
HF
0
0.1
0.2
0.3
0.4
100 350 500 800
MAE
Number of Users
CF
CBF
HF
0
0.1
0.2
0.3
0.4
100 350 500 800
MAE
Number of Users
CF
CBF
HF
No of
Users
Filtering Methods
CF CBF HF
100 0.3686 0.3828 0.3433
350 0.3374 0.3632 0.3162
500 0.3398 0.3659 0.3161
800 0.3258 0.3555 0.3081
No of
Users
Filtering Methods
CF CBF HF
100 0.3396 0.3588 0.3043
350 0.3110 0.3560 0.2998
500 0.3016 0.3544 0.2954
800 0.2971 0.3519 0.2953
No of
Users
Filtering Methods
CF CBF HF
100 0.3326 0.3554 0.3029
350 0.3324 0.3690 0.3167
500 0.3203 0.3676 0.3122
800 0.3020 0.3564 0.2986
Figure 5. MAE given 100 items
Table 2. Average MAE given 100 items
Table 3. MAE given 500 items
Table 4. MAE given 700 items
Figure 6. MAE given 500 items
Figure 7. MAE given 700 items
10. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 773
Collaborative filtering contributes greatly in the
results of this approach more so where there are
large numbers of items; its performance becomes
better with increasing number or items and users
respectively, but does not perform as well with
large number of users and small number of items.
On the other hand, content-based filtering does not
make much contribution to this approach, its
performance worsens as the number of items
increases and its prediction is worse in cases where
there are small number of users and items
respectively.
However, across all of the evaluations, results show
that the hybrid filtering model achieves better
prediction accuracy than each of the traditional
filtering methods implemented separately.
Collaborative filtering and content-based filtering
performing on average 6% and 17% worse than the
hybrid approach respectively; the hybrid approach
achieves an average MAE of 0.3084 whereas
collaborative and content-based filtering achieve
0.3258 and 0.3622 respectively.
6. CONCLUSIONS AND
FURTHER WORK
In this paper a hybrid approach that combines
content-based and collaborative filtering methods
has been used to improve recommendation
accuracy. Both methods use the effective
information retrieval model the VSM, a very
simple efficient ranking algorithm TFIDF and
cosine similarity measure to find the relationships
among users, items and attributes. The evaluation
of the proposed hybrid model using real data has
proven it achieves better prediction accuracy
compared to a single content-based and single
collaborative based recommender system. Because
of this good performance, this hybrid
recommendation approach and the information
retrieval methods can therefore be adapted in
different domains for recommendation purposes.
The possible future work related to this study is
first to test the efficiency of this approach to other
larger datasets and secondly, to explore the
possibilities of experimenting with other variants
of tfidf, similarity measures and the vector space
model to see how well they perform in this kind of
hybrid recommender environment.
7. REFERENCES
[1] Gavgani V.Z. “Health Information Need and
Seeking Behavior of Patients in Developing
Countries' Context; an Iranian Experience,”
Proceedings of the 1st ACM International
Health Informatics Symposium, 2010, paper
11–12, pp. 575–579.
[2] Kazienko P., Kołodziejski P. 2005.
‘WindOwls – Adaptive Systems for the
Integration of Recommendation Methods in E
– commerce’, Springer Verlag, 218 – 224.
[3] Adomavicius G., Tuzhilin A. 2005. Toward
the next generation of recommender systems:
0
0.1
0.2
0.3
0.4
100 350 500 800
MAE
Number of Users
CF
CBF
HF
No of
Users
Filtering Methods
CF CBF HF
100 0.3374 0.3539 0.305
350 0.3386 0.3859 0.3245
500 0.3294 0.3745 0.3145
800 0.2997 0.3442 0.2883
Table 5. MAE given 1200 items
Figure 8. MAE given 1200 items
11. International Journal of Computer Applications Technology and Research
Volume 5–Issue 12, 764-774, 2016, ISSN:-2319–8656
www.ijcat.com 774
A survey of the state-of-the-art and possible
extensions. IEEE Trans. Knowl. Data Eng.
(2005); 17:734-749.
[4] Tuzhilin A., Adomavicius G., 2005. Towards
the next generation of recommender systems.
A survey of the state of the art and possible
extensions. IEEE Trans Knowl Data Eng,
17:734 – 749.
[5] Bell R., Koren Y., and Volinsky Ch. Chasing
$1,000,000: How we won the Netflix Progress
Prize. ASA Statistical and Computing
Graphics Newsletter, 18(2):4–12, 2007.
[6] Burke R. Hybrid recommender systems:
survey and experiments, User Modeling and
User Adapted Interaction 12 (4) (2002) 331 –
370.
[7] Melville P., Mooney R., Nagarajan R.
Content-boosted collaborative filtering for
improved recommendations, in:18th
National
Conference on Artificial Intelligence (AAAI-
02), 2002, PP. 187-192.
[8] Park S. T., Pennock D., Madani O., Good N.,
DeCoste D. Naïve filterbots for robust cold
start recommendations, in: KDD ’06:
Proceedings of the 12th
ACM SIGKDD
International Conference on Knowledge
Discovery and Data Minning, 2006, pp. 669-
705.
[9] Spiegel S., Kunegis J., Li F. ”Hydra: a hybris
recommender system [cross-linked rating and
content information] in CIKM-CNIKM, 2009,
pp. 75-80.
[10] Pazzani M. J. “A framework for collaborative,
content based and demographic filtering,”
Artfi.Intell. Rev., vol. 13, no. 5-6, 1999, pp.
393-408.
[11] Melville P., Mooney R. J. Nagarajan R.
“Content boosted collaborative filtering for
improved recommendation,” in proceedings
of AAAI/IAAI, 2002, pp.187 – 193.
[12] Basu C., Hirsh H., Cohen C.
Recommendation as classification: Using
social and content-based information in
recommendation. In Proceedingsof the
Fifteenth National Conference on Artificial
Intelligence (AAAI-98), 1998, pp 714–720.
[13] Pazzani A., Michael J. A framework for
collaborative, content-based and demographic
filtering. Artificial Intelligence Review, 1999,
13(5-6):393–408.
[14] Marko B., Yoav S. Fab: Content-based,
collaborative recommendation.
Communications of the Association for
Computing Machinery, 1997,40(3):66–72.
[15] Good N., Schafer J. B., Konstan J.A.,
Borchers A., Sarwar B., Herlocker J., Riedl J.
Combining collaborative filtering with
personal agents for better recommendations.
In Proceedings of the Sixteenth National
Conference on Artificial Intelligence (AAAI-
99), 1999, pp 439–446.
[16] Jahrer M., Toscher A., Legenstein R.
“Combining predictions for accurate
recommender systems,” in Proceedings of the
SIGKDD conference. New York, NY, USA:
ACM 2010, pp. 693-702.
[17] Burke R. D. “Hybrid recommender systems”
survey and experiments,” User Model, User-
Adapt. Interact, vol 12, no. 4, 2002, pp. 331-
370.
[18] Montaner, M., Lopez, B. and De la Rosa
J.L.2003. ‘A Taxonomy of Recommender
Agents on the Internet’, Artificial Intelligence
Review, Kluwer Academic Publisher, 19, 285
– 330.