E-learning is one of the information and communication technology products used for teaching
and learning process [35]. An efficient and effective way to construct trust relationship among peer users in
e-learning environment is ranking. User-driven ranking systems are based only on the feedback or rating
provided by the users. In [46-48] the authors provide a variety of trust and reputation methods. Certified
Belief in Strength (CBS) [45] is a novel trust measurement method based on reputation and strength . In
[38] author presents a recommendation system based on the relevant feedback review to predict the
user's interests, that are ranked based on the recommendations history they provide previously. Users with
higher rating obtain high reputation compared to less scored users. In question answering websites like
StackOverflow, new or low scored users are ignored by the community. This discourage them and their
involvement with the community reduces further down, as power law states, alleged low users are pu shed
to the bottom of the ranking list. Avoid this condition by encouraging less reputed users and prevent them
from moving further down in ranking level. Thus, low reputed users are provided with few more chances to
participate actively in the e-learning environments. A splay tree is a Binary Search Tree with self-balancing
skill. The splay tree brings the recently accessed item to the top of the tree, thus active users are always
on the top of the tree. A splay tree is used to represent user's ranks, and to semi-splay low ranked users
again in the tree thus preventing them from further drowning in the ranking list. The focus of this research
work is to find and enhance low reputed users in reputation system by providing few more chances to take
part actively in the e-learning environment using the splay tree. Normalized discounted cumulative gain
(NDCG) acts as a decision part for identifying drowning users.
This document summarizes a research paper that proposes a novel approach for dynamic personalized recommendation. It utilizes information from user ratings and profiles to develop dynamic features that describe user preferences over multiple phases of interest. An adaptive weighting algorithm then makes recommendations by weighting these dynamic features based on the amount of rating data available. The proposed approach was tested on public datasets and performed well for dynamic recommendation compared to existing algorithms.
Contextual model of recommending resources on an academic networking portalcsandit
Artificial Intelligence techniques have been instrumental in helping users to handle the large
amount of information on the Internet. The idea of recommendation systems, custom search
engines, and intelligent software has been widely accepted among users who seek assistance in
searching, sorting, classifying, filtering and sharing this vast quantity of information. In this
paper, we present a contextual model of recommendation engine which keeping in mind the
context and activities of a user, recommends resources in an academic networking portal. The
proposed method uses the implicit method of feedback and the concepts relationship hierarchy
to determine the similarity between a user and the resources in the portal. The proposed
algorithm has been tested on an academic networking portal and the results are convincing.
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALcscpconf
Artificial Intelligence techniques have been instrumental in helping users to handle the large amount of information on the Internet. The idea of recommendation systems, custom search engines, and intelligent software has been widely accepted among users who seek assistance insearching, sorting, classifying, filtering and sharing this vast quantity of information. In thispaper, we present a contextual model of recommendation engine which keeping in mind the context and activities of a user, recommends resources in an academic networking portal. Theproposed method uses the implicit method of feedback and the concepts relationship hierarchy to determine the similarity between a user and the resources in the portal. The proposed algorithm has been tested on an academic networking portal and the results are convincing
Context Based Classification of Reviews Using Association Rule Mining, Fuzzy ...journalBEEI
The Internet has facilitated the growth of recommendation system owing to the ease of sharing customer experiences online. It is a challenging task to summarize and streamline the online textual reviews. In this paper, we propose a new framework called Fuzzy based contextual recommendation system. For classification of customer reviews we extract the information from the reviews based on the context given by users. We use text mining techniques to tag the review and extract context. Then we find out the relationship between the contexts from the ontological database. We incorporate fuzzy based semantic analyzer to find the relationship between the review and the context when they are not found therein. The sentence based classification predicts the relevant reviews, whereas the fuzzy based context method predicts the relevant instances among the relevant reviews. Textual analysis is carried out with the combination of association rules and ontology mining. The relationship between review and their context is compared using the semantic analyzer which is based on the fuzzy rules.
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...IJDKP
This summary provides the key details about a new soft hierarchical clustering algorithm called Fuzzy Hierarchical Co-clustering (FHCC) that is proposed for collaborative filtering recommendation. FHCC simultaneously generates hierarchical clusters of users and products based on a user-product rating matrix to detect potential user-product joint groups. It uses a fuzzy set approach to allow each user and product to belong to multiple clusters rather than a single cluster. The algorithm works by initially forming singleton co-clusters of individual users and products, then repeatedly merging the most similar pair of co-clusters until a single cluster remains. A hybrid similarity measure is used to calculate similarity between co-clusters based on their user, product, and rating components. The algorithm is intended to provide
A Study of Neural Network Learning-Based Recommender Systemtheijes
This document summarizes a study that proposes a neural network learning model for recommender systems. The study aims to improve collaborative filtering methods by estimating user preferences based on learned correlations between users through a neural network. The proposed method was tested on MovieLens data and showed improved precision of 6.7% compared to other techniques. Additionally, the study found that precision and recall improved further, by 3.5% and 2.4% respectively, when including film genre information in the neural network learning. The document concludes the proposed technique can utilize diverse data sources and perform well regardless of data complexity compared to other recommender system methods.
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
This document proposes a framework to improve the accuracy of recommendations in collaborative filtering recommender systems by considering users' locations. The framework enhances traditional collaborative filtering in several ways: 1) It increases the similarity score of users located in the same place as the active user; 2) It filters peers to remove non-related users; 3) It selects the top peers and recommends items based on those peers' ratings. The framework aims to provide more local recommendations by incorporating geographic location data throughout the recommendation process.
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...IJSRD
This document proposes a novel approach for travel package recommendation using probabilistic matrix factorization (PMF). It discusses how existing recommendation systems are usually classification-based and supervised, whereas the proposed approach uses an unsupervised E-TRAST (Efficient-Tourist Relation Area Season Topic) model. The E-TRAST model represents travel packages and tourists using different topics modeled through PMF. It analyzes travel data characteristics and introduces a cocktail approach considering features like seasonal tourist performance to recommend customized travel packages.
This document summarizes a research paper that proposes a novel approach for dynamic personalized recommendation. It utilizes information from user ratings and profiles to develop dynamic features that describe user preferences over multiple phases of interest. An adaptive weighting algorithm then makes recommendations by weighting these dynamic features based on the amount of rating data available. The proposed approach was tested on public datasets and performed well for dynamic recommendation compared to existing algorithms.
Contextual model of recommending resources on an academic networking portalcsandit
Artificial Intelligence techniques have been instrumental in helping users to handle the large
amount of information on the Internet. The idea of recommendation systems, custom search
engines, and intelligent software has been widely accepted among users who seek assistance in
searching, sorting, classifying, filtering and sharing this vast quantity of information. In this
paper, we present a contextual model of recommendation engine which keeping in mind the
context and activities of a user, recommends resources in an academic networking portal. The
proposed method uses the implicit method of feedback and the concepts relationship hierarchy
to determine the similarity between a user and the resources in the portal. The proposed
algorithm has been tested on an academic networking portal and the results are convincing.
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALcscpconf
Artificial Intelligence techniques have been instrumental in helping users to handle the large amount of information on the Internet. The idea of recommendation systems, custom search engines, and intelligent software has been widely accepted among users who seek assistance insearching, sorting, classifying, filtering and sharing this vast quantity of information. In thispaper, we present a contextual model of recommendation engine which keeping in mind the context and activities of a user, recommends resources in an academic networking portal. Theproposed method uses the implicit method of feedback and the concepts relationship hierarchy to determine the similarity between a user and the resources in the portal. The proposed algorithm has been tested on an academic networking portal and the results are convincing
Context Based Classification of Reviews Using Association Rule Mining, Fuzzy ...journalBEEI
The Internet has facilitated the growth of recommendation system owing to the ease of sharing customer experiences online. It is a challenging task to summarize and streamline the online textual reviews. In this paper, we propose a new framework called Fuzzy based contextual recommendation system. For classification of customer reviews we extract the information from the reviews based on the context given by users. We use text mining techniques to tag the review and extract context. Then we find out the relationship between the contexts from the ontological database. We incorporate fuzzy based semantic analyzer to find the relationship between the review and the context when they are not found therein. The sentence based classification predicts the relevant reviews, whereas the fuzzy based context method predicts the relevant instances among the relevant reviews. Textual analysis is carried out with the combination of association rules and ontology mining. The relationship between review and their context is compared using the semantic analyzer which is based on the fuzzy rules.
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...IJDKP
This summary provides the key details about a new soft hierarchical clustering algorithm called Fuzzy Hierarchical Co-clustering (FHCC) that is proposed for collaborative filtering recommendation. FHCC simultaneously generates hierarchical clusters of users and products based on a user-product rating matrix to detect potential user-product joint groups. It uses a fuzzy set approach to allow each user and product to belong to multiple clusters rather than a single cluster. The algorithm works by initially forming singleton co-clusters of individual users and products, then repeatedly merging the most similar pair of co-clusters until a single cluster remains. A hybrid similarity measure is used to calculate similarity between co-clusters based on their user, product, and rating components. The algorithm is intended to provide
A Study of Neural Network Learning-Based Recommender Systemtheijes
This document summarizes a study that proposes a neural network learning model for recommender systems. The study aims to improve collaborative filtering methods by estimating user preferences based on learned correlations between users through a neural network. The proposed method was tested on MovieLens data and showed improved precision of 6.7% compared to other techniques. Additionally, the study found that precision and recall improved further, by 3.5% and 2.4% respectively, when including film genre information in the neural network learning. The document concludes the proposed technique can utilize diverse data sources and perform well regardless of data complexity compared to other recommender system methods.
A LOCATION-BASED RECOMMENDER SYSTEM FRAMEWORK TO IMPROVE ACCURACY IN USERBASE...ijcsa
This document proposes a framework to improve the accuracy of recommendations in collaborative filtering recommender systems by considering users' locations. The framework enhances traditional collaborative filtering in several ways: 1) It increases the similarity score of users located in the same place as the active user; 2) It filters peers to remove non-related users; 3) It selects the top peers and recommends items based on those peers' ratings. The framework aims to provide more local recommendations by incorporating geographic location data throughout the recommendation process.
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...IJSRD
This document proposes a novel approach for travel package recommendation using probabilistic matrix factorization (PMF). It discusses how existing recommendation systems are usually classification-based and supervised, whereas the proposed approach uses an unsupervised E-TRAST (Efficient-Tourist Relation Area Season Topic) model. The E-TRAST model represents travel packages and tourists using different topics modeled through PMF. It analyzes travel data characteristics and introduces a cocktail approach considering features like seasonal tourist performance to recommend customized travel packages.
Data Collection Methods for Building a Free Response Training SimulationMelissa Moody
Master of Science in Data Science capstone project researchers Vaibhav Sharma, Beni Shpringer, and Michael Yang, along with UVA School of Engineering M.S. student Martin Bolger and Ph.D. students Sodiq Adewole and Erfaneh Gharavi, sought to develop new methods for collecting, generating, and labeling data to aid in the creation of educational, free-input dialogue simulations.
Ontological and clustering approach for content based recommendation systemsvikramadityajakkula
This document proposes a novel content-based recommendation system that uses ontological graphs and dynamic weighted ranking. It builds an adaptive ranking mechanism based on user selections and preferences to improve recommendation accuracy over time. The system segments data into ontological groups and identifies relationships between entities. It then calculates similarity between entities using feature vectors and ranks entities based on weights assigned to their connections in the ontological graph. These weights are updated dynamically based on user feedback to personalize recommendations for each user. The paper describes testing this approach in a recipe recommendation tool called RecipeMiner, which produced coherent recommendations that adapted to user preferences.
Automatic detection of online abuse and analysis of problematic users in wiki...Melissa Moody
For their 2019 capstone project, DSI Master of Science in Data Science students Charu Rawat, Arnab Sarkar, and Sameer Singh proposed a framework to understand and detect such abuse in the English Wikipedia community.
Rawat, Sarkar, and Singh received the award for Best Paper in the Data Science for Society category at the 2019 Systems & Information Design Symposium (SIEDS). In "Automatic Detection of Online Abuse and Analysis of Problematic Users in Wikipedia," the team presented an analysis of user misconduct in Wikipedia and a system for the automated early detection of inappropriate behavior.
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
The increasing interest in developing efficient and effective optimization techniques has conducted researchers to turn their attention towards biology. It has been noticed that biology offers many clues for designing novel optimization techniques, these approaches exhibit self-organizing capabilities and permit the reachability of promising solutions without the existence of a central coordinator. In this paper we handle the problem of dynamic web service composition, by using the clonal selection algorithm. In order to assess the optimality rate of a given composition, we use the QOS attributes of the services involved in the workflow as well as, the semantic similarity between these components. The experimental evaluation shows that the proposed approach has a better performance in comparison with other approaches such as the genetic algorithm.
Integrated expert recommendation model for online communitiesst02IJwest
Online communities have become vital places for Web 2.0 users to share knowledg
e and experiences.
Recently, finding expertise user in community has become an important research issue. This paper
proposes a novel cascaded model for expert recommendation using aggregated knowledge extracted from
enormous contents and social network fe
atures. Vector space model is used to compute the relevance of
published content with respect
to a specific query while PageRank
algorithm is applied to rank candidate
experts. The experimental results sho
w that the proposed model is
an effective recommen
dation which can
guarantee that the most candidate experts are both highly relevant to the specific queries and highly
influential in corresponding areas
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET Journal
This document summarizes and analyzes existing methodologies for user service rating prediction systems. It discusses recommendation systems including collaborative filtering, content-based filtering, and hybrid approaches. Collaborative filtering predicts user ratings based on opinions of other similar users but faces challenges of cold start, scalability, and sparsity. Content-based filtering relies on item profiles and user preferences to recommend similar items but requires detailed item information. Hybrid systems combine collaborative and content-based filtering to address their individual limitations. The document also examines social recommender systems and how they can account for relationship strength, expertise, and user similarity within social networks.
IRJET- An Integrated Recommendation System using Graph Database and QGISIRJET Journal
This document presents a recommendation system that uses a graph database and QGIS to find the shortest path for a user to shop at the nearest mall. It analyzes product reviews stored in the Neo4j graph database to determine which products the user may be interested in. It then uses QGIS to calculate the shortest distance from the user's current location to the nearest mall with the recommended products. The system aims to minimize the time a user spends shopping by providing personalized recommendations and routing them to the closest appropriate location. It discusses how graph databases and hybrid recommendation approaches can be used to integrate different recommendation techniques for improved performance.
A Hybrid Approach for Personalized Recommender System Using Weighted TFIDF on...Editor IJCATR
Recommender systems are gaining a great popularity with the emergence of e-commerce and social media on the internet. These recommender systems enable users’ access products or services that they would otherwise not be aware of due to the wealth of information on the internet. Two traditional methods used to develop recommender systems are content-based and collaborative filtering. While both methods have their strengths, they also have weaknesses; such as sparsity, new item and new user problem that leads to poor recommendation quality. Some of these weaknesses can be overcome by combining two or more methods to form a hybrid recommender system. This paper deals with issues related to the design and evaluation of a personalized hybrid recommender system that combines content-based and collaborative filtering methods to improve the precision of recommendation. Experiments done using MovieLens dataset shows the personalized hybrid recommender system outperforms the two traditional methods implemented separately.
An Adaptive Framework for Enhancing Recommendation Using Hybrid Techniqueijcsit
Recommender systems provide useful recommendations to a collection of users for items or products that
might be of concern or interest to them. Several techniques have been proposed for recommendation such
as collaborative filtering, content-based, knowledge-based, and demographic filtering. Each of these
techniques suffers from scalability, data sparsity, and cold-start problems when applied individually
resulting in poor recommendations. This paper proposes an adaptive hybrid recommender system that
combines multiple techniques together to achieve some synergy between them. Collaborative filtering and
demographic techniques are combined in a weighted linear formula. Different experiments applied using
movieLen dataset confirm that the proposed adaptable hybrid framework outperforms the weaknesses
resulted when using traditional recommendation techniques.
Personalized recommendation for cold start usersIRJET Journal
The document discusses personalized recommendation methods for cold start users. It describes several recommendation techniques including content-based filtering, collaborative filtering, and hybrid recommendation. It also discusses challenges like cold start problems and data sparsity. Trust-based recommendation systems are described that incorporate social relationships between users. Matrix factorization techniques are discussed for modeling user-item interactions and incorporating additional contextual factors. The use of probabilistic matrix factorization models to address cold start and sparsity problems is also covered.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
IRJET- Review on Different Recommendation Techniques for GRS in Online Social...IRJET Journal
This document reviews different recommendation techniques for group recommender systems (GRS) in online social networks. It discusses traditional recommender approaches like content-based filtering and collaborative filtering. It also reviews related work applying opinion dynamics models and weight matrices to GRS. The document concludes that using a smart weights matrix to consider relationships between group members' preferences in a recommendation process improves aggregation and ensures consensus, providing the best way to recommend items to a complete group.
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Recommendation system plays important role in Internet world and used in many applications. It has created the collection of many application, created global village and growth for numerous information. This paper represents the overview of Approaches and techniques generated in recommendation system. Recommendation system is categorized in three classes: Collaborative Filtering, Content based and hybrid based Approach. This paper classifies collaborative filtering in two types: Memory based and Model based Recommendation .The paper elaborates these approaches and their techniques with their limitations. The result of our system provides much better recommendations to users because it enables the users to understand the relation between their emotional states and the recommended movies.
IRJET- Analysis of Rating Difference and User InterestIRJET Journal
This document summarizes a research paper that proposes a collaborative filtering recommendation algorithm that incorporates rating differences and user interests. It first adds a rating difference factor to the traditional collaborative filtering algorithm. It then calculates user interests based on item attributes and the similarity between user interests. Recommendations are made by weighting user rating differences and interest similarities. The proposed algorithm is shown to reduce error rates and improve accuracy compared to traditional collaborative filtering.
Structural Balance Theory Based Recommendation for Social Service PortalYogeshIJTSRD
There is enormous data present in our world. Therefore in order to access the most accurate information is becoming more difficult and complicated. As a result many relevant information gets missed which leads to much duplication of work and effort. Due to the huge search results, the user will generally have difficulty in identifying the relevant ones. To solve this problem, a recommendation system is used. A recommendation system is nothing but a filtering information system, which is used to predict the relevance of retrieved information according to the user’s needs for some criteria. Hence, it can provide the user with the results that best fit their needs. The services provided through the web normally provide huge records about any requested item or service. A proper recommendation system is used to separate this information result. A recommendation system can be improved further if supported with a level of trust information. That is, recommendations are prioritized according to their level of trust. Recommending appropriate needs social service to the target volunteers will become the key to ensure continuous success of social service. Today, many social service systems does not adopt any recommendation techniques. They provide advertisement or highlights request for a small commission. G. Banupriya | M. Anand "Structural Balance Theory-Based Recommendation for Social Service Portal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41216.pdf Paper URL: https://www.ijtsrd.comengineering/software-engineering/41216/structural-balance-theorybased-recommendation-for-social-service-portal/g-banupriya
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
Social groups in the form of different discussion forums are proliferating rapidly. Most of these
forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore,
recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members’ needs and favorites. It is noteworthy that not only the users’
comments and posts can have valuable information, but also there are some other valuable
information which can be obtained from social data; moreover, it could be extracted from
relations and interactions among users. Hence, association rules mining techniques are one of
the techniques which can be applied in order to extract more implicit data as input to the
recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have
defined new hybrid rules by considering both users and posts’ content data. Each of the defined
rules has been examined on an asynchronous discussion group in this study. In addition, the
impact of the defined rules on the precision and recall values of the recommender system has
been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and
usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising.
a, u ) =
∑ w (r − r )(r − r )
∑ w (r − r ) ∑ w (r − r )
i
i
a ,i
a
i
u ,i
u
i
a ,i
a
i
2
u ,i
2
u
(4)
The proposed method enhances user-based collaborative filtering by using content features of items to assign weights. When finding similar users to an active user, it emphasizes similarities in ratings for items with similar content features. This is done by weighting each rating based on
On the benefit of logic-based machine learning to learn pairwise comparisonsjournalBEEI
This document describes a study that used a logic-based machine learning approach called APARELL to learn user preferences from pairwise comparisons in a recommender system. APARELL learns description logic rules from examples of users' pairwise item preferences and background knowledge about item properties. It was implemented in a used car recommender system. A user study evaluated the pairwise preference elicitation method compared to a standard list interface. Results showed the pairwise interface was significantly better in recommending items that matched users' preferences.
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...IRJET Journal
The document describes a proposed hybrid recommendation algorithm that incorporates content filtering, collaborative filtering, and demographic filtering. It begins with an overview of recommendation systems and different filtering techniques. Then, it discusses related work incorporating various filtering approaches. The methodology section outlines the original algorithm, which develops user profiles based on browsing history and ratings. It provides recommendations by calculating similarities between user and item profiles. The proposed methodology enhances this by incorporating demographic attributes into user profiles and using fuzzy logic to validate recommendations. It claims this integrated approach can provide more accurate and personalized recommendations.
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...IJTET Journal
This document describes a proposed algorithm for improving recommendation systems for e-services. It involves the following key steps:
1. Clustering customer transaction histories to group similar purchase patterns and derive customer-based recommendations.
2. Using incremental association rule mining on the transaction data to detect frequently purchased item sets and relationships between items.
3. Developing a fuzzy model to classify customers and provide dynamic recommendations tailored to different customer types. The recommendations will be based on matching customer preferences and purchase histories to specific product sets.
4. The algorithm clusters transactions, mines association rules incrementally as new data is added, and generates recommendations by classifying customers and matching them to relevant product clusters. This provides a personalized and
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
Data Collection Methods for Building a Free Response Training SimulationMelissa Moody
Master of Science in Data Science capstone project researchers Vaibhav Sharma, Beni Shpringer, and Michael Yang, along with UVA School of Engineering M.S. student Martin Bolger and Ph.D. students Sodiq Adewole and Erfaneh Gharavi, sought to develop new methods for collecting, generating, and labeling data to aid in the creation of educational, free-input dialogue simulations.
Ontological and clustering approach for content based recommendation systemsvikramadityajakkula
This document proposes a novel content-based recommendation system that uses ontological graphs and dynamic weighted ranking. It builds an adaptive ranking mechanism based on user selections and preferences to improve recommendation accuracy over time. The system segments data into ontological groups and identifies relationships between entities. It then calculates similarity between entities using feature vectors and ranks entities based on weights assigned to their connections in the ontological graph. These weights are updated dynamically based on user feedback to personalize recommendations for each user. The paper describes testing this approach in a recipe recommendation tool called RecipeMiner, which produced coherent recommendations that adapted to user preferences.
Automatic detection of online abuse and analysis of problematic users in wiki...Melissa Moody
For their 2019 capstone project, DSI Master of Science in Data Science students Charu Rawat, Arnab Sarkar, and Sameer Singh proposed a framework to understand and detect such abuse in the English Wikipedia community.
Rawat, Sarkar, and Singh received the award for Best Paper in the Data Science for Society category at the 2019 Systems & Information Design Symposium (SIEDS). In "Automatic Detection of Online Abuse and Analysis of Problematic Users in Wikipedia," the team presented an analysis of user misconduct in Wikipedia and a system for the automated early detection of inappropriate behavior.
Immune-Inspired Method for Selecting the Optimal Solution in Semantic Web Ser...IJwest
The increasing interest in developing efficient and effective optimization techniques has conducted researchers to turn their attention towards biology. It has been noticed that biology offers many clues for designing novel optimization techniques, these approaches exhibit self-organizing capabilities and permit the reachability of promising solutions without the existence of a central coordinator. In this paper we handle the problem of dynamic web service composition, by using the clonal selection algorithm. In order to assess the optimality rate of a given composition, we use the QOS attributes of the services involved in the workflow as well as, the semantic similarity between these components. The experimental evaluation shows that the proposed approach has a better performance in comparison with other approaches such as the genetic algorithm.
Integrated expert recommendation model for online communitiesst02IJwest
Online communities have become vital places for Web 2.0 users to share knowledg
e and experiences.
Recently, finding expertise user in community has become an important research issue. This paper
proposes a novel cascaded model for expert recommendation using aggregated knowledge extracted from
enormous contents and social network fe
atures. Vector space model is used to compute the relevance of
published content with respect
to a specific query while PageRank
algorithm is applied to rank candidate
experts. The experimental results sho
w that the proposed model is
an effective recommen
dation which can
guarantee that the most candidate experts are both highly relevant to the specific queries and highly
influential in corresponding areas
IRJET- Analysis on Existing Methodologies of User Service Rating Prediction S...IRJET Journal
This document summarizes and analyzes existing methodologies for user service rating prediction systems. It discusses recommendation systems including collaborative filtering, content-based filtering, and hybrid approaches. Collaborative filtering predicts user ratings based on opinions of other similar users but faces challenges of cold start, scalability, and sparsity. Content-based filtering relies on item profiles and user preferences to recommend similar items but requires detailed item information. Hybrid systems combine collaborative and content-based filtering to address their individual limitations. The document also examines social recommender systems and how they can account for relationship strength, expertise, and user similarity within social networks.
IRJET- An Integrated Recommendation System using Graph Database and QGISIRJET Journal
This document presents a recommendation system that uses a graph database and QGIS to find the shortest path for a user to shop at the nearest mall. It analyzes product reviews stored in the Neo4j graph database to determine which products the user may be interested in. It then uses QGIS to calculate the shortest distance from the user's current location to the nearest mall with the recommended products. The system aims to minimize the time a user spends shopping by providing personalized recommendations and routing them to the closest appropriate location. It discusses how graph databases and hybrid recommendation approaches can be used to integrate different recommendation techniques for improved performance.
A Hybrid Approach for Personalized Recommender System Using Weighted TFIDF on...Editor IJCATR
Recommender systems are gaining a great popularity with the emergence of e-commerce and social media on the internet. These recommender systems enable users’ access products or services that they would otherwise not be aware of due to the wealth of information on the internet. Two traditional methods used to develop recommender systems are content-based and collaborative filtering. While both methods have their strengths, they also have weaknesses; such as sparsity, new item and new user problem that leads to poor recommendation quality. Some of these weaknesses can be overcome by combining two or more methods to form a hybrid recommender system. This paper deals with issues related to the design and evaluation of a personalized hybrid recommender system that combines content-based and collaborative filtering methods to improve the precision of recommendation. Experiments done using MovieLens dataset shows the personalized hybrid recommender system outperforms the two traditional methods implemented separately.
An Adaptive Framework for Enhancing Recommendation Using Hybrid Techniqueijcsit
Recommender systems provide useful recommendations to a collection of users for items or products that
might be of concern or interest to them. Several techniques have been proposed for recommendation such
as collaborative filtering, content-based, knowledge-based, and demographic filtering. Each of these
techniques suffers from scalability, data sparsity, and cold-start problems when applied individually
resulting in poor recommendations. This paper proposes an adaptive hybrid recommender system that
combines multiple techniques together to achieve some synergy between them. Collaborative filtering and
demographic techniques are combined in a weighted linear formula. Different experiments applied using
movieLen dataset confirm that the proposed adaptable hybrid framework outperforms the weaknesses
resulted when using traditional recommendation techniques.
Personalized recommendation for cold start usersIRJET Journal
The document discusses personalized recommendation methods for cold start users. It describes several recommendation techniques including content-based filtering, collaborative filtering, and hybrid recommendation. It also discusses challenges like cold start problems and data sparsity. Trust-based recommendation systems are described that incorporate social relationships between users. Matrix factorization techniques are discussed for modeling user-item interactions and incorporating additional contextual factors. The use of probabilistic matrix factorization models to address cold start and sparsity problems is also covered.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Framework for Product Recommandation for Review Datasetrahulmonikasharma
In the social networking era, product reviews have a significant influence on the purchase decisions of customers so the market has recognized this problem The problem with this is that the customers do not know how these systems work which results in trust issues. Therefore a different system is needed that helps customers with their need to process the information in product reviews. There are different approaches and algorithms of data filtering and recommendation .Most existing recommender systems were developed for commercial domains with millions of users. In this paper we have discussed the recommendation system and its related research and implemented different techniques of the recommender system .
IRJET- Review on Different Recommendation Techniques for GRS in Online Social...IRJET Journal
This document reviews different recommendation techniques for group recommender systems (GRS) in online social networks. It discusses traditional recommender approaches like content-based filtering and collaborative filtering. It also reviews related work applying opinion dynamics models and weight matrices to GRS. The document concludes that using a smart weights matrix to consider relationships between group members' preferences in a recommendation process improves aggregation and ensures consensus, providing the best way to recommend items to a complete group.
A REVIEW PAPER ON BFO AND PSO BASED MOVIE RECOMMENDATION SYSTEM | J4RV4I1015Journal For Research
Recommendation system plays important role in Internet world and used in many applications. It has created the collection of many application, created global village and growth for numerous information. This paper represents the overview of Approaches and techniques generated in recommendation system. Recommendation system is categorized in three classes: Collaborative Filtering, Content based and hybrid based Approach. This paper classifies collaborative filtering in two types: Memory based and Model based Recommendation .The paper elaborates these approaches and their techniques with their limitations. The result of our system provides much better recommendations to users because it enables the users to understand the relation between their emotional states and the recommended movies.
IRJET- Analysis of Rating Difference and User InterestIRJET Journal
This document summarizes a research paper that proposes a collaborative filtering recommendation algorithm that incorporates rating differences and user interests. It first adds a rating difference factor to the traditional collaborative filtering algorithm. It then calculates user interests based on item attributes and the similarity between user interests. Recommendations are made by weighting user rating differences and interest similarities. The proposed algorithm is shown to reduce error rates and improve accuracy compared to traditional collaborative filtering.
Structural Balance Theory Based Recommendation for Social Service PortalYogeshIJTSRD
There is enormous data present in our world. Therefore in order to access the most accurate information is becoming more difficult and complicated. As a result many relevant information gets missed which leads to much duplication of work and effort. Due to the huge search results, the user will generally have difficulty in identifying the relevant ones. To solve this problem, a recommendation system is used. A recommendation system is nothing but a filtering information system, which is used to predict the relevance of retrieved information according to the user’s needs for some criteria. Hence, it can provide the user with the results that best fit their needs. The services provided through the web normally provide huge records about any requested item or service. A proper recommendation system is used to separate this information result. A recommendation system can be improved further if supported with a level of trust information. That is, recommendations are prioritized according to their level of trust. Recommending appropriate needs social service to the target volunteers will become the key to ensure continuous success of social service. Today, many social service systems does not adopt any recommendation techniques. They provide advertisement or highlights request for a small commission. G. Banupriya | M. Anand "Structural Balance Theory-Based Recommendation for Social Service Portal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41216.pdf Paper URL: https://www.ijtsrd.comengineering/software-engineering/41216/structural-balance-theorybased-recommendation-for-social-service-portal/g-banupriya
AN EXTENDED HYBRID RECOMMENDER SYSTEM BASED ON ASSOCIATION RULES MINING IN DI...csandit
Social groups in the form of different discussion forums are proliferating rapidly. Most of these
forums have been created to exchange and share members’ knowledge in various domains.
Members in these groups may need to use and retrieve other members’ knowledge. Therefore,
recommender systems are one of the techniques which can be employed in order to extract
knowledge based on the members’ needs and favorites. It is noteworthy that not only the users’
comments and posts can have valuable information, but also there are some other valuable
information which can be obtained from social data; moreover, it could be extracted from
relations and interactions among users. Hence, association rules mining techniques are one of
the techniques which can be applied in order to extract more implicit data as input to the
recommender system. Our objective in this study is to improve the performance of a hybrid
recommender system by defining new hybrid rules. In this regard, for the first time, we have
defined new hybrid rules by considering both users and posts’ content data. Each of the defined
rules has been examined on an asynchronous discussion group in this study. In addition, the
impact of the defined rules on the precision and recall values of the recommender system has
been examined. We found that according to this impact, a classification of the defined rules can
be considered and a number of weights can be assigned to each rule based on their impact and
usability in the specific domain or application. It is noteworthy that the results of the
experiments have been promising.
a, u ) =
∑ w (r − r )(r − r )
∑ w (r − r ) ∑ w (r − r )
i
i
a ,i
a
i
u ,i
u
i
a ,i
a
i
2
u ,i
2
u
(4)
The proposed method enhances user-based collaborative filtering by using content features of items to assign weights. When finding similar users to an active user, it emphasizes similarities in ratings for items with similar content features. This is done by weighting each rating based on
On the benefit of logic-based machine learning to learn pairwise comparisonsjournalBEEI
This document describes a study that used a logic-based machine learning approach called APARELL to learn user preferences from pairwise comparisons in a recommender system. APARELL learns description logic rules from examples of users' pairwise item preferences and background knowledge about item properties. It was implemented in a used car recommender system. A user study evaluated the pairwise preference elicitation method compared to a standard list interface. Results showed the pairwise interface was significantly better in recommending items that matched users' preferences.
Mixed Recommendation Algorithm Based on Content, Demographic and Collaborativ...IRJET Journal
The document describes a proposed hybrid recommendation algorithm that incorporates content filtering, collaborative filtering, and demographic filtering. It begins with an overview of recommendation systems and different filtering techniques. Then, it discusses related work incorporating various filtering approaches. The methodology section outlines the original algorithm, which develops user profiles based on browsing history and ratings. It provides recommendations by calculating similarities between user and item profiles. The proposed methodology enhances this by incorporating demographic attributes into user profiles and using fuzzy logic to validate recommendations. It claims this integrated approach can provide more accurate and personalized recommendations.
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental A...IJTET Journal
This document describes a proposed algorithm for improving recommendation systems for e-services. It involves the following key steps:
1. Clustering customer transaction histories to group similar purchase patterns and derive customer-based recommendations.
2. Using incremental association rule mining on the transaction data to detect frequently purchased item sets and relationships between items.
3. Developing a fuzzy model to classify customers and provide dynamic recommendations tailored to different customer types. The recommendations will be based on matching customer preferences and purchase histories to specific product sets.
4. The algorithm clusters transactions, mines association rules incrementally as new data is added, and generates recommendations by classifying customers and matching them to relevant product clusters. This provides a personalized and
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
This document presents a project proposal for a Recommendation System for Technical Learning. It includes:
1. The names of the team members and project guide.
2. The objectives are to create a recommendation system to recommend relevant courses and books to users based on popularity and interests using collaborative and content-based filtering.
3. The literature review discusses previous recommendation system problems and solutions using collaborative filtering on Hadoop and considering location as an attribute.
4. The solution approach uses two types of filtering - collaborative and content-based - to build the recommendation system and analyze user ratings to train an ML model to make recommendations.
Evaluating and Enhancing Efficiency of Recommendation System using Big Data A...IRJET Journal
This document discusses evaluating and enhancing the efficiency of recommendation systems using big data analytics. It begins with an abstract that outlines recommendation systems, collaborative filtering, and the need for big data analytics due to large datasets. It then discusses specific collaborative filtering techniques like user-based, item-based, and matrix factorization. It describes challenges like scalability that big data analytics can help address. The document evaluates recommendation algorithms using metrics like MAE, RMSE, precision and time taken on movie recommendation datasets. It aims to design an efficient recommendation system using the best techniques.
IRJET- A Survey on Recommender Systems used for User Service Rating in Social...IRJET Journal
This document summarizes research on recommender systems used for user service ratings in social networks. It first discusses how recommender systems predict user ratings using collaborative, content-based, and hybrid filtering techniques. It then reviews related work on collaborative, content-based, and hybrid recommendation approaches. Challenges like cold starts are also discussed. The document concludes that combining personal interests, social similarities and influences into a unified framework can improve rating predictions.
A Survey on Recommendation System based on Knowledge Graph and Machine LearningIRJET Journal
This document provides an overview of recommendation systems based on knowledge graphs and machine learning. It first defines key concepts like recommendation systems, knowledge graphs, meta paths, and knowledge graph embedding. It then discusses standard recommendation approaches like content-based filtering, collaborative filtering, and hybrid filtering. The document focuses on knowledge graph-based recommendation systems, how they address issues with traditional approaches, and how machine learning can be used alongside knowledge graphs. It reviews several papers on using knowledge graphs for recommendations and proposes a comparative study. The document also outlines a proposed recommendation system and potential future research directions in the domain.
An Unsupervised Approach For Reputation GenerationKayla Jones
This document describes a proposed unsupervised approach for generating reputation values based on opinion clustering and semantic analysis. The approach involves collecting opinion data, preprocessing it, applying latent semantic analysis and k-means clustering to group opinions into clusters, and then aggregating statistics from the clusters to generate a single reputation value for an entity. The approach is evaluated on a dataset of movie reviews from IMDB by comparing the generated reputation values to IMDB's weighted average user ratings. The results show the approach can accurately generate reputation values when choosing an optimal number of clusters.
A Study of Neural Network Learning-Based Recommender Systemtheijes
A recommender system sorts and recommends the information which meets personal preferences among a huge amount of data provided by e-commerce. In particular, collaborative filtering (CF) is the most widely used technique in these recommendation systems. This method finds neighboring users who have similar preferences with particular users and recommends the items preferred by the former. This study proposes a neural network learning model as a new technique to find neighboring users using the collaborative filtering method. This kind of neural network learning model takes care of a sparseness problem during the analysis stage among those related with target users. The proposed method was tested with MovieLens data sets, and the results showed that precision improved by 6.7%.
This document summarizes an approach to improve personalized ranking using associated edge weights. The key points are:
1) Personalized ranking aims to improve traditional search and retrieval by tailoring results to a user's interests. Authority flow approaches like PageRank and ObjectRank can be used for personalized ranking on entity-relationship graphs.
2) Edge-based personalization assigns different weights to edge types based on the user, affecting authority flow. The paper focuses on improving edge-based personalization by hybridizing the ScaleRank algorithm with k-means clustering.
3) ScaleRank approximates the DataApprox algorithm for ranking. The hybrid approach uses k-means clustering on ScaleRank output to further group related nodes,
IRJET - Recommendation of Branch of Engineering using Machine LearningIRJET Journal
This document describes a machine learning system that recommends engineering branches to students based on their scores. It uses K-nearest neighbors and collaborative filtering techniques. The system aims to help students select an engineering branch that matches their abilities and reduces confusion. It analyzes student data like marks to make personalized recommendations. The document reviews similar existing recommendation systems and the techniques they use. The proposed system seeks to guide students towards suitable engineering fields and reduce the workload on counselors.
IRJET- Analysis of Question and Answering Recommendation SystemIRJET Journal
This document discusses a literature review on question and answering recommendation systems. It analyzes various techniques used in QA systems including recommendation engines, identifying leading users, frequently asked question detection, and open information extraction. The review identifies the merits and limitations of different approaches to help develop an efficient QA system. Technologies considered for building the system are Flutter, machine learning, Flask, and Dart. The ideal process is identified to make the forum effective across devices.
Query- And User-Dependent Approach for Ranking Query Results in Web DatabasesIOSR Journals
This document presents a new approach for ranking query results from web databases called Query and User Dependent Ranking. The approach considers two aspects: query similarity, which accounts for different users having similar queries, and user similarity, which accounts for different queries having similar user preferences. A prototype application was built to test the model. Empirical results found the approach to be efficient and suitable for real-world applications. The approach uses a workload file that is updated with ranking functions as new queries are made to track user and query similarities over time.
IRJET- Book Recommendation System using Item Based Collaborative FilteringIRJET Journal
This document describes an item-based collaborative filtering approach for a book recommendation system. It discusses different recommendation system techniques including collaborative filtering, content-based filtering, and hybrid filtering. It then focuses on item-based collaborative filtering, explaining how it calculates item similarities using adjusted cosine similarity and makes predictions using weighted sums. The document tests the approach on the Goodbooks10k dataset and evaluates it using mean absolute error, finding lower error rates with more neighbor items. In conclusion, item-based collaborative filtering is an effective approach for book recommendations.
History and Overview of the Recommender Systems.pdfssuser5b0f5e
This chapter provides an overview of recommender systems, including their history and classification methods. Recommender systems aim to filter and recommend useful items to users based on their preferences and the preferences of similar users. The chapter discusses the five main categories of recommender systems: content-based, collaborative-based, knowledge-based, demographic-based, and hybrid systems. It also outlines the general requirements and processes for building recommender systems and provides examples of content-based recommendation techniques.
Scalable recommendation with social contextual informationeSAT Journals
Abstract Recommender systems are used to achieve effective and useful results in a social networks. The social recommendation will provide a social network structure but it is challenging to fuse social contextual factors which are derived from user’s motivation of social behaviors into social recommendation. Here, we introduce two contextual factors in recommender systems which are used to adopt a useful results namely a) individual preference and b) interpersonal influence. Individual preference analyze the social interests of an item content with user’s interest and adopt only users recommended results. Interpersonal influence is analyzing user-user interaction and their specific social relations. Beyond this, we propose a novel probabilistic matrix factorization method to fuse them in a latent space. The scalable algorithm provides a useful results by analyzing the ranking probability of each user social contextual information and also incrementally process the contextual data in large datasets. Keywords: social recommendation, individual preference, interpersonal influence, matrix factorization.
Scalable recommendation with social contextual informationeSAT Journals
Abstract Recommender systems are used to achieve effective and useful results in a social networks. The social recommendation will provide a social network structure but it is challenging to fuse social contextual factors which are derived from user’s motivation of social behaviors into social recommendation. Here, we introduce two contextual factors in recommender systems which are used to adopt a useful results namely a) individual preference and b) interpersonal influence. Individual preference analyze the social interests of an item content with user’s interest and adopt only users recommended results. Interpersonal influence is analyzing user-user interaction and their specific social relations. Beyond this, we propose a novel probabilistic matrix factorization method to fuse them in a latent space. The scalable algorithm provides a useful results by analyzing the ranking probability of each user social contextual information and also incrementally process the contextual data in large datasets. Keywords: social recommendation, individual preference, interpersonal influence, matrix factorization
SIMILARITY MEASURES FOR RECOMMENDER SYSTEMS: A COMPARATIVE STUDYJournal For Research
Recommender Systems have the ability to guide the users in a personalized way to interesting items in a large space of possible options. They have fundamental applications in e-commerce and information retrieval, providing suggestion that prune large information spaces so that users are directed towards those items that best meets the needs and preferences. A variety of approaches have been proposed but collaborative filtering has been the most popular and widely used which makes use of various similarity measures to calculate the similarity. Collaborative Filtering takes the user feedback in the form of ratings in an application area and uses it to find similarities and differences between user profiles to generate recommendations. Collaborative Filtering makes use of various similarity measures to calculate the similarity or difference between the users. This paper provides an overview on few important similarity measures that are currently being used. Different similarity measures provide different results against same input parameters. So, to understand how various similarity measures behave when they are put in different contexts but with same input, few observations are made. This paper also provides a comparison graph to help understand the results of different similarity measures.
Custom-Made Ranking in Databases Establishing and Utilizing an Appropriate Wo...ijsrd.com
Custom Rating System which provides a facility to the users, that they can search and download best articles or anything on the system in the database. The article or anything can be any text content which can describe a product, a book, an institution, an application, a company or anything. This system consists of two set of users, one is the normal user and another is the administrator. The users have to register and login to the system first, in order to use the system. The users have the following privileges. Write Article and Upload Relevant Files, Post Related URL to each article for other users reference, Search and Read Article posted by other users, Rate the articles posted by other users. The articles which are written by any user are sent to the Administrator for Approval. After approval of the articles by the administrator, they are available for the users to search and download. Based on the Description provided in an article, it can be searched by any registered user on the system. The user can see the article, download a file if available and the user can rate the article based on the article. Rating can be given in terms of 1 Star to 5 Star. The users can search the article. The list of articles displayed can be sorted based on following parameters: Rating, Popularity (Number of Clicks on the Article),Relevance (Based on number of matching keywords provided),All Articles uploaded by a specific user.
Profile Analysis of Users in Data Analytics DomainDrjabez
Data Analytics and Data Science is in the fast forward
mode recently. We see a lot of companies hiring people for data
analysis and data science, especially in India. Also, many
recruiting firms use stackoverflow to fish their potential
candidates. The industry has also started to recruit people based
on the shapes of expertise. Expertise of a personal is
metaphorically outlined by shapes of letters like I, T, M and
hyphen betting on her experiencein a section (depth) and
therefore the variety of areas of interest (width).This proposal
builds upon the work of mining shapes of user expertise in a
typical online social Question and Answer (Q&A) community
where expert users often answer questions posed by other
users.We have dealt with the temporal analysis of the expertise
among the Q&A community users in terms how the user/ expert
have evolved over time.
Keywords— Shapes of expertise, Graph communities, Expertise
evolution, Q&A community
Similar to Enhanced User-driven Ranking System with Splay Tree (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesChristina Lin
Traditionally, dealing with real-time data pipelines has involved significant overhead, even for straightforward tasks like data transformation or masking. However, in this talk, we’ll venture into the dynamic realm of WebAssembly (WASM) and discover how it can revolutionize the creation of stateless streaming pipelines within a Kafka (Redpanda) broker. These pipelines are adept at managing low-latency, high-data-volume scenarios.
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...University of Maribor
Slides from talk presenting:
Aleš Zamuda: Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapter and Networking.
Presentation at IcETRAN 2024 session:
"Inter-Society Networking Panel GRSS/MTT-S/CIS
Panel Session: Promoting Connection and Cooperation"
IEEE Slovenia GRSS
IEEE Serbia and Montenegro MTT-S
IEEE Slovenia CIS
11TH INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTING ENGINEERING
3-6 June 2024, Niš, Serbia
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Using recycled concrete aggregates (RCA) for pavements is crucial to achieving sustainability. Implementing RCA for new pavement can minimize carbon footprint, conserve natural resources, reduce harmful emissions, and lower life cycle costs. Compared to natural aggregate (NA), RCA pavement has fewer comprehensive studies and sustainability assessments.
2. TELKOMNIKA ISSN: 1693-6930
Enhanced User- Driven Ranking System with Splay Tree (R. Jayashree)
433
leaves the tree more or less balanced as a whole. Move active (recently accessed) user
towards the root and inactive users slowly far-off from the root. Let user X is not a maximum-
Ranked-User, that is, X has, at least, one ancestor, then just rotate X once [24]. Zig and Zag are
single rotation operation in a splay tree. "Zig-Zig"/ "Zag-Zag” consists of two single rotations of
the same type, and "Zig-Zag"/ "Zag-Zig" consists of two rotations of the opposite type, similar to
an LR imbalance correction [24]. This guarantees that even if the depths of some nodes get
huge, a long sequence of searches does not occur because each search operation causes a
rebalance. StackOverflow is a well known Question-Answering website that allows registered
users to post their questions and to post answers to others' questions [23]. In general, users
with good answers are ranked high. In all Question-Answering websites users with the highest
reputation scores are marked as highly reputed users. Overall rating depends on the ratings of
users with low reputation. The higher the vote weight of a user with great reputation compared
to a vote of a low reputation user, the less the overall reputation will change due to the low
reputation votes. In this paper, users with the fewer score are shuffled for a limited number of
times so that they do not get ignored in the top reputation list. In other words, moderately
reputed or less active users are given few more chances to participate actively and thus,
postponing them from getting eliminated from top scored list.
In our earlier work, we presented an online rating calculation method for reputation
management which approximates expectation of contributors‟ performances to derive simple
update rules for online ranking using Bayesian approximation method and Normalized
Discounted Cumulative Gain as a metric for measuring ranking correctness [13]. DCG
measures the quality of the results in a ranked list [17]. Contributors‟ reputations are predicted.
Calculate users‟ overall rating and ranking and verify ranked contributors and their reputation
scores using NDCG algorithm [17]. In this paper, we discuss user reputation-based ranking
system with the splay tree and NDCG as a significant concept and develop the re-ranking with
the semi-splay algorithm to prevent weak users from downfall thus, improve their ranks. The
paper is organized as follows: Section 2 describes motivation and background, Section 3
discusses splay tree and NDCG in the reputation system. NDCG is to identify less active users.
Section 4 describes how to break power law by increasing user level in the splay tree using
semi-splay and present re-ranking-with-semi-splay algorithm. Section 5 describes and
discusses experimental results and finally, section 6 concludes and describes future work.
2. Motivation and Background
In general, the study of the evaluation of ICT-based learning in SMA [26] and the
effectiveness of learning with the help of internet in SMK [36] resulted in the fact that community
awareness of the use of e-learning improved the qualifications and the attitude of co-learners.
Reusability and maintainability qualities of FUOLC‟s e-learning [35] helps in the development of
a software to anticipate the co-learners‟ need. Fuzzy based context method predicts the
relevant instances among the relevant reviews and the combination of association rules and
ontology mining carries out textual analysis [37]. Semantic analyzer compares the relationship
between review and their context based on the fuzzy rules [37]. Over the data taxonomies,
review comparison on distributed data can be efficiently carried out with association rules like
Apriori [39]. In [37] the authors discusses on different types of association rule mining and the
category of databases on which way the association rules are assigned.
Personalized summarization [10] proposes to customize the user's review history based
on the customer‟s previous browsing history or by user‟s credentials. Click through
approach [37] extracts the features of the users. In [37] the author finds the reviews related to
the desired products for the current user and classify their opinions (positive or negative). Based
on the user behavior [40] propose a user based contextual recommendation system in which
author extracts the user behavior based on their preference cart by constructing clustered trees
for items. In [41] the author analyzes the e-commerce websites and provides the
recommendation to users based on the comparative results of the products. The result shows
that context-aware systems mostly provide better recommendation than the available
benchmark system. In [37] propose a service-based framework using hierarchical ontology
which distributes the concepts of services hierarchically. In the review of literature [37] analysis
the extracting features of context and the opinion of the given context. In this study, ontology
helps in predicting the implicit knowledge of users. Context-based recommendation system [37]
3. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 432 – 444
434
mines the context from the user‟s reviews and discovers the level of associations between the
reviews and links them. Evaluating Amazon dataset in [37] with the benchmark performance
measures, precision, and recall, shows that the association rules are quite appropriate for
review recommendation systems to provide the efficient classification. An ensemble model [43]
reaches a more accurate decision by combining the decisions of a group of individual
classifiers. As reported in the literature, using multiple individual classifiers (or base classifiers)
in an ensemble model [49, 50], multiple base classifiers produce reliable and accurate
predictions. The CBS method [45] proves to improve the accuracy rates of a number of base
classifiers, FMM network [44]. Application of the ensemble model (MACS-CBS) in [45] is further
evaluated using a group of EFMM classifiers [43]. Deploying a group of classifiers for decision
making in an ensemble model allows to produce a more reliable and accurate
predictions [49]-[50].
According to the power law, small occurrences are extremely common, whereas large
instances are extremely rare [34]. The quality and quantity of user‟s contributions compute their
reputations. The good quality contribution preserves the introduced changes in subsequent
revisions [30]-[32]. User status is evaluated to predict the quality of future user
contributions [30]. The predictive ability of the content reputation system is used to measure its
performance [27]. The design space characteristics influence the structure of a reputation
system. D Movshovitz described the different experts versus non-experts activity patterns and
highlighted the importance of detecting anomalous users in his work. The potential expert users
are identified based on their business in the first few months of activity on the site. An Initial
activity of a user when joining the site is indicative of his/her long-term contribution [29].
Enhancing or reducing the influences of the large-degree users could produce accurate
reputation ranking lists [28]. SChord [1] is based on splay tree and implements Chord finger
table with improved resource locating efficiency. Nodes hierarchy is related to the access
frequency. Routing and caching are the two operations in Schord ring[1] where the routing
process is to look up the closest preceding node and caching is searching and inserting (key,
node) to its splay tree. Each node contains a splay tree. Insert node n with s successors
(n.id+2i), 0<=i<=s-1 into splay tree [1]. Stefan et al. [2] explored fully decentralized and self-
adjusting network that minimizes the routing cost between arbitrary communication pairs. They
proved by the empirical entropies of the sources and destinations that the overall cost is upper
bounded. A new content authentication scheme proposed by Liangbin et. al, in which Merkle
hash tree (MHT) is constructed based on an OBST [3]. The basic idea in MHT is to produce a
short cryptographic description of a large data set. Parent node stores the concatenated
children node values. An element is verified using node‟s siblings in the path from the
associated node to the root. An element‟s authentication cost depends on the computation time
which is a linear to node‟s depth in MHT.
In [4], Randomized splay tree version is presented with chain splay technique for
compressing data. An adaptive data compression algorithm called as the splay-prefix algorithm
on the prefix code, where the code tree is restructured using semi-splaying. In semi-splaying
technique leaf corresponding to the transmitted symbol is splayed so that it moves halfway to
the root, thus moving other symbols automatically to the bottom of the tree. Comparing
randomized with non-randomized versions based on rotations and time proves that randomized
algorithm is much smaller than the deterministic text of the algorithm. Randomized version [4]
achieves up to 3% reduction in the rotations and is preferable for the application of relatively
small sequences of accesses on a large amount of data. The splay tree is very suitable for
caching the recently accessed content to provide quick access again. The splay tree has good
performance [14] since it is self-optimizing. For quick access, move frequently accessed nodes
closer to the root. Packets sorted as binary search tree and then balanced tree [12] and self-
adjusting tree [13, 21] ideas are implemented to design a cache management for Content-
Centric Networking (CCN) [5]. The download time is related to the class popularity that is, the
download time is very short for the content with high probability to access. The frequency of
visits and the recent visit are considered to evaluate the content popularity [5]. Overall packets
matching time reduces with Splay tree by rejecting unwanted traffic in early stages and by
accepting repeated packets with fewer memory accesses [6]. Splay tree changes dynamically
according to the flow of traffic and is used to the store length of the prefixes. The level of access
determines binary search on prefix lengths [15]. Statistical Splay Tree Policy Filters
(SSF-BSPL) [6] optimize the early rejection of unwanted flows, and the acceptance of repeated
4. TELKOMNIKA ISSN: 1693-6930
Enhanced User- Driven Ranking System with Splay Tree (R. Jayashree)
435
wanted traffic through splaying properties. Filtering processing time for the unwanted packets
reduces by arranging policy fields in descending order starting from the area with the highest
rejection statistics.
Normalized Discounted Cumulative Gain is a metric for measuring ranking
correctness [17]. In software documentation retrieval environment application the place of
recommended items in the list is important for the recommendation and normalized discounted
cumulative gain (NDCG) is a frequently used metric for measuring ranking correctness,
considering item ranking position [33]. Reputation is the sum of scores given by peer
contributors of the website which later ordered to find ranking among users [17]. The registered
users gain more mean points than anonymous users and registered users are more trusted [17].
In Splay Tree Packet Classification Technique (ST-PC) [7] integer values with their
matching rules are stored in splay trees. Whereas in Self-Adjusting Binary Search on Prefix
Length (SA-BSPL) [22], the prefix lengths and their corresponding hash tables with matching
rules are stored which gives better-amortized analysis. System performance is affected
significantly by default-deny rule [7] which increases filtering processing time. Early packet
rejection techniques reject the maximum number of packets as soon as possible; thereby
filtering processing time is reduced. Key Insertion and Splay Tree encryption (KIST) [8]
algorithms use the splay tree for encryption. Key injection algorithm in the cipher text is to
compress and move inner nodes which are higher than the specified layer. In cloud environment
key insertion and splay tree-based outsourcing key management [8] provides an approach that
is highly secure and flexible. SplayNet [9] is a distributed generalization of the splay tree where
frequently communicating nodes are moved closer together. Sleator and Trajan [21] proposed
splay tree as optimized binary search tree which reduces average access time by moving more
popular nodes closer to the root. In [16] introduce Minimum Linear Arrangement (MLA) problem
to design error-correcting codes with minimum average absolute errors. The domains such as
job scheduling [20] and nervous activity in the cortex [19] use MLA concept. Leitao et al. [18]
study self-optimizing overlay networks with dynamic topology. Chen Avin et al. [9] designed a
double splay algorithm to perform splaying in subtrees, Zouheir Trabelsi and Safaa Zeidan [10]
proposed a mechanism based on multilevel filtering modules using the splay tree, to optimize
filtering fields order according to traffic statistics. In this scheme, unwantedly traffics are rejected
in the early stages and thus decrease overall packets matching time. Statistical Splay Tree
Policy Filters (SSF-BSPL) [10] system uses a mathematical model to decide statistical policy
fields order for the next packet segment. Learning objects in the repository are ranked based on
the citation numbers similar to Google page rank [11]. In Slivkins et al.‟s [25] work, relevant
documents are selected so as to obey the expected relevance rate μ(x), distributed according to
a power-law, for each document x.
3. Splay Tree and NDCG in Reputation System
Splay trees are the self-adjusting tree with amortized time bounds. In this tree move
frequently accessed users towards highly reputed users, Uppermost_User. In this strategy, the
highly active users stay close to the Uppermost_User and thus quickly found. Construct a splay
tree t according to the users‟ active participation in the website; thus, the lastly accessed user is
at the position „Uppermost_User‟. Let UserN(Y) be the some users ranked below the user Y
then,
rank(Y)=log(userN(Y))
Let rank`(Y) be the user Y‟s rank before splaying. The time taken for searching a user is
proportional to the depth of the user Y in t before splaying, that is, the number of links L from
Uppermost-User to user Y. For “m” number of users, searching operations run in θ(log m) worst-
case time. Let ℓ be the reputation-based sorted list of users where the highly reputed user is in
the top of the list and least reputed is in the bottom. Searching time of user x in t is directly
proportional to the searching time of user x in ℓ. If the user x is both active and highly reputed,
then position user x about at the same level or depth, in both the t and ℓ. But sometimes, users
are more active at the beginning with the highest reputation and then they become inactive. In
other cases, though users are active they score destitute status. Calculate users‟ reputation with
their positive or negative votes. Inactive users may be pushed to more inactive/dead state and
5. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 432 – 444
436
poorly reputed users to poorest/eliminated state. Avoid this situation by improving the level of
users in the splay tree, thus proving chances for weak users to become active again and to gain
more reputation.
3.1. Normalized Discounted Cumulative Gain (NDCG) in Reputation Syste m
Considering users‟ ranking place, calculate normalized discounted cumulative gain
which is a metric for measuring ranking correctness by comparing Discounted Cumulative Gain
(DCG) to the ideal ranking. DCG measures the correctness of a ranked list based on users'
reputation discounted by their place in the splay tree. Higher values of NDCG indicate better-
ranked lists and therefore better correctness [33]. DCG measures the results' quality in a
ranked list provided by the StackOverflow community. Computed metrics represent true
differences in performance between users. The cumulative gain is the sum of the scores for
each user‟s position in the splay tree. The Discounted part of NDCG sum up the score divided
by the rank. In practice, the score is often divided by the log of the rank, which seems to better
match the user reputation. Cumulative Gain (CG) is the predecessor of DCG and does not
include a result position in the usefulness of a result set consideration. Changes in the ordering
of search results unaffected the value computed with the CG function. DCG is in place of CG for
a more exact measure.
3.1.1. Discounted Cumulative Gain
The premise of DCG is to penalize the highly reputed users appearing lower in a search
result list as the graded reputation value reduces which is logarithmically proportional to the
result position.
DCGk=∑ i=1
k
2repi−1/log2(i+1)
The Normalized part in NDCG allows comparing DCG values between different users.
The best ranking is known as the “ideal DCG,” or iDCG. iDCGk is the most possible (ideal)
DCG for a given set of reputation,
nDCGk=DCGk / iDCGk
Normalized_Discounted_Cumulative_Gain (user_id, user_position)
/* Measure the gain of a user (contributor) based on his/her place, in the splay tree.
OptimalDCG is the ideal (greatest possible) dcg. The ndcg varies from 0.0 to 1.0, with 1.0
representing the ideal ranking of the entities. Let k be the maximum number of users ranked */
{dcg=CalculateDcg(parameters.K,user_ position);
optimal=CalculateOptimalDCG(parameters.K, user_position);
ndcg=dcg / optimal;
if (optimal <=0) {
ndcg=(dcg==optimal) ? 1.0 : 0.0;}
}
function CalculateOptimalDCG(int k, user_reputation){
return CalculateDcg(k, user_ position.Values.OrderByPosition (i=> i)); }
function CalculateDcg(int k, user_ position) {
i=1;
dcg=0.0d;
foreach (user_ position in range k) {
dcg +=(Math.Pow(2, user_ position) - 1.0) / Math.Log(1 + i, 2);
i++; }
return dcg; }
}
Compute NDCG for users in the splay tree. Select users whose rank drops from their
earlier position when ndcg of that ranking list is less than 0.5. That is if ndcg<0.5 then select
users with the difference between current and previous user_position is greater than a fixed
value, say n. Semi-splay the selected users. Select low ranked users using NDCG method as
stated above, considering n as 3. Rotate tree so that selected users‟ are taken up two steps
6. TELKOMNIKA ISSN: 1693-6930
Enhanced User- Driven Ranking System with Splay Tree (R. Jayashree)
437
forward in ranking. Breaking_Power_Law algorithm improves these user positions in t by
rotating the tree assuming that user‟s parent as the root. Let Ƭ be a splayed tree, then Ƭi(u) is
the subtree of node u in step i. Rank of u in level i of splaying,
Ri(u)=log2 (SizeOf(Ƭi(u)) (1)
where SizeOf(Ƭi(u)) is the sum of weights of all elements in the subtree rooted in u. In other
words,
2Ri(u)=SizeOf(Ƭi(u))
if u=leaf then R1(u)=0;
if u=root then Rn(u)=log2 n (2)
Where n is the total number of nodes in Ƭi. Time complexity depends on the height of the Ƭ and
amortized time complexity depends on the rank of the Ƭ. The potential of a Ƭ, Pt(Ƭ), is the sum
of ranks of all its nodes.
Pt(Ƭ)=∑i=0 to nRi (3)
Let d be the depth of the node before and after splaying,
d=|splayi-splay (i-1)| (4)
splayi and splay(i-1) are user move before and after the splay operation respectively.
Searching a key takes d time. Splaying node x consist of d/2 splaying sub steps. Change in the
user move after the splay operation is [splayi - splay(i-1)]. This is computed only for u, parent u
and grandparent u.
Amortized Complexity,
Aci=wi+splayi-splay(i-1) (5)
Aci=wi+d (From Equation 4) (6)
Here wi is work done for the splay operation, which is computed as number of levels the
target node rises or falls during a splay operation. Total user move of a Ƭ in i
th
step of splaying,
splayi=∑ uϵƬi Ri(u)=∑ uϵƬi log2 (SizeOf(Ƭi(u)) [from (1)] (7)
If step i initiates semi-splay operation then Amortized Complexity of splay tree is,
Aci< 1+(Ri(u)–Ri-1(u))
In Ƭ with n nodes, Amortized cost C(n) of a search with splaying does not exceed
(1+3log2 n) upward moves from the specific node. C(n) is the number of rotation and C(n)=1 if
no rotation occurs.
Amortized Cost of a semi-splay is at most 1+3d, if it takes only one rotation.
Amortized time to splay a tree with root t at a node x is at most,
3 (R(t)-R(x))+1=O(log(SizeOf(Ƭn(u))/SizeOf(Ƭx(u)))), 1<=x<=d/2
Therefore, total access time is O((m+n) log n+m)=C(n)+ Pt(Ƭ) [From (2) and (3)]
That is the sum of amortized cost and potential difference, where n is the number of
elements in the Ƭ and m is the number of accesses.
If a,b>0 and c>a+b then log a +log b <=2 log c-2. Total Amortized complexity <=∑
(Ri(x)–Ri-1(x))+1, 1<=i<=d/2. For semi-splay,
3(R(t) –R(x)) +1<=3(R(t))+1=3 log n +1
7. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 432 – 444
438
Thus splaying operation m1 and semi-splaying operation m2 takes O((m1+m2) log n)
time complexity which is better than O(mn) or O(n) worst case complexity of traditional ranking
algorithm.
4. Breaking Power Law
Power law implies that very few users are ranked high, and a large number of users are
listed at the middle level and very huge at the low level. Power distribution shows that very low
scored elements are massive in numbers, in other words, small occurrences are extremely
common, whereas significant instances are extremely rare. A power law is a pragmatic relation
between the frequency of an event „f‟ and size of the event „S‟ with fixed power „p‟ and constant
„c‟. That is, f=cS
-p
.
Break the power law by boosting up low ranked users through the rotation that pushes
those users‟ two steps forward in ranking. Breaking_Power_Law algorithm improves the weak
user position in t by rotating the tree assuming that user‟s parent as the root. The grace-upper
and grace-lower are the upper and lower levels in t with constant values. The grace-depth is the
range between the grace-upper and grace-lower. The tolerate-factor represents the number of
times to do a Zig/Zag operation to improve a weak user‟s rank.
(a)
(b)
Figure 1. (a) Position of User x in ℓ (b) Zig Rotation to Increase the Ranking of
User x in t
The tolerate-factor depends on the rank of the user in ℓ (pos1) and t (pos2) as shown in
Figure 1.
a. If pos2 is in between the grace-upper and grace-lower values, then calculate 'mean'
value of grace-upper and grace-lower.
b. If pos2 is lesser than mean value and pos1 is lesser than grace-lower value, then the
tolerate-factor is the max-tolerate-factor.
c. If pos2 is lesser than mean value and pos1 is greater than grace-lower value, then
tolerate-factor is mid-tolerate-factor.
d. Otherwise, tolerate-factor is min-tolerate-factor.
Let us consider max-tolerate-factor=3, mid-tolerate-factor=2 and min-tolerate-factor=1.
Increase the ranking of a user by doing an additional splay operation, as shown in Figure 1 (b),
considering user x‟s parent as a maximum ranked user with subtree. The tolerate factor is the
8. TELKOMNIKA ISSN: 1693-6930
Enhanced User- Driven Ranking System with Splay Tree (R. Jayashree)
439
number of times to rotate the x. Calculate the tolerate factor for the x using grace-upper and
grace-lower values, where grace-upper is the upper limit and grace-lower is the lower limit of the
ranks. Let a[] be a list of weak users and „count‟ counts the number of times the element
appears in the weak user list. Store user x in the weak user list.
Breaking_Power_law(user x)
if (t.Normalized_Discounted_Cumulative_Gain(Id, Pos) <0.5) then
for each user x in t do
if ((x.currentPosition –x.previousPosition) >3) then
pos1=Searching(ℓ,x)
pos2=Searching(t,x)
tolarate-factor=0, max-tolerate-factor=3, mid-tolerate-factor=2, min-tolerate-factor=1
if pos2 >=grace-lower and pos2 <=grace-upper then
mean=(grace-upper + grace-lower)/2
if pos2<=mean and pos1 <=grace-lower then tolarate-factor=max-tolerate-factor
if pos2<=mean and pos1 > grace-lower then tolarate-factor=mid-tolerate-factor
if pos2>mean then tolarate-factor=min-tolerate-factor
a[i]=x; i++;
for j=0 to i do
if a[j]=x then count=count+1
if count>tolerate-factor then
print "The element cannot be rotated anymore"
/*Move parent below child and one of child's children below parent using „Zig/Zag‟ operation for
the splay tree t. Let ‘parent-of-x’ be the parent of user x*/
else { if parent-of-x.left=x then
parent-of-x.Left=x.right
x.Right=parent
else parent-of-x.Right=x.left
x.Left=parent}
The splay time at a node „n‟ is proportional to the time to reach an item in node „n‟.
Though the size of the tree grows as the number of active users‟ increases, the depth of the tree
is based on the grace-depth value. In other words, Zig/Zag operation occurs only when the
searching user‟s position is within the specified grace-depth. Search user „x‟ in t1 within grace-
depth in a top-down approach and in t2 through in-order tree traversal method. The grace-
upper represents the maximum level in the splay tree, t1, to consider for searching „x‟. The
largest number of nodes in a binary tree of depth grace-upper is 2(grace-upper) −1 where
grace-upper ≥1. The splay tree with 2(grace-upper)−1 nodes take at least O(log (2(grace-
upper)−1)) comparisons to find a particular node and the total amortized time for a sequence of
m operations is O(m log (2(grace-upper)−1)).
5. Experimental Results and Discussions
Reputation is a user‟s identity that reflects user‟s familiarity with the website, the amount
of users‟ subject knowledge and the level of respect peers have on the user. Sometimes
reputation also determines a user‟s privileges within the system. Gaining more reputation and
trust can make a user access give new functionality. As user gain reputation, they gain abilities
and responsibilities. The primary factors that determine reputations are users‟ voting. Up-voted
posts increase users‟ status; the reverse is true for posts which are down-voted. User‟s up-votes
are more heavily weighted than down-votes. Reputation lost from the reputation cap is not
awarded on the following days in the Question-Answering websites such as StackOverflow.
Reputation cap is to prevent users from gaining privileges and trust too quickly. StackOverflow
badges are similar to ranking, awarded to users for achieving an individual score in a specific
tag. Tag score is the combined total number of up-votes and down-votes accumulated on
answers under that particular tag. Tumbleweed badge in StackOverflow is to bring attention to a
neglected user and this encourages people to stay on the website. Our Breaking_Power_Law
algorithm is much similar to the tumbleweed badge, but neglected users‟ ranking increases
unknowingly to other users/voters. Data collected from the StackOverflow website with user id,
9. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 432 – 444
440
reputations, latest answered/questioned time and level. Live data collected from the
StackOverflow website for 25 users as shown in Table 1, with first 4 digits of user reputation
scores and their level (position) in the splay tree. Compute NDCG for collected data with users‟
position in the splay tree. Calculated NDCG indicates the quality of ranking.
When ndcg<0.5, as shown in the Figure 2, then pick weak users based on their position
in the splay tree. Find the difference between the current and previous position of users when
ndcg<0.5. If this difference is greater than n, in our experiment we considered n=3, then semi-
splay these users using Zig/Zag rotation. Figure 2 displays NDCG for all collected data before
and after semi-splay. Below table shows the user performance improves remarkably after
applying semi-splay (zig/zag) operations through the Breaking_Power_Law algorithm. User F
level in the tree has not increased as user M and S. This proves that early application of
Breaking_Power_Law algorithm improves users‟ performance and participation interest in a
better way. Calculated ndcg is 0.405797<0.5 for collected data '4'. Construct a splay tree based
on reputation list 4 and users‟ response/activity time, that is, hours ago. In the ranking list 4,
ndcg is less than 0.5, thus find the differences among present and previous users position in the
splay tree and spot users with [(current_position)-(previous_position)]>3. Users satisfying the
above conditions in our data are F, M, N, P and S. Semi-splaying these users‟ shows that their
ranking quality is much improved.
Figure 2. NDCG of Users Before and After Semi-Splay
In our work, the Breaking_Power_Law algorithm is implemented and compared with the
existing Question-Answering ranking algorithm. Finding weak users and boost up their levels to
break power law is the main goal of our algorithm. The implementation result shows that the
poor users are identified using NDCG and saved from further drowning to the lower level of the
splay tree. Boosting up of participants‟ degree in the splay tree yields them the chances to get
active. Thus, these users may become active again. In the traditional ranking methods, the
weak participants are not in the limelight and result in high ranked members alone to grab
voter‟s attention, and thus, only those groups of participants alone stay in the top-level of the
ranking lists, that is, in the ranking cap. Our algorithm overcomes this and breaks power law.
The studied statistical data of StackOverflow from the tail of top 50 weekly ranked users' list
conclude that nearly 75% of users‟ weekly ranks drop down to the lower levels. Users ranked
35, and above are in the critical place of dropping steep into the ranking list. Figure 4 (a) shows
StackOverflow users‟ weekly rank report for the months January and February 2016. This
clearly proves that if users get low reputation or ranking they fall steeply into the ranking list.
Consider grace-lower as 35 and grace-upper as 45. The users in grace-depth are zig-
zig or zag-zag rotated as they are the left or right child of their parents respectively. So that they
can be moved two levels high from their current position, just above their parent node, thus
preventing them from dropping steep into the list for a limited number of times as shown in
figure.3. If user „x‟ is within the grace-depth then the user is zig/zag rotated. Thus, her parent „y‟
becomes her child in the splay tree. Though the rank changes, the parent‟s reputation, and trust
10. TELKOMNIKA ISSN: 1693-6930
Enhanced User- Driven Ranking System with Splay Tree (R. Jayashree)
441
values remain unchanged, thus, the chances of losing up-votes and voters trust are very less. In
other words, y‟s probability to get pushed down in the ranking list is very less. Now, user y‟s
expected reputation value in the next move becomes x‟s expected reputation value.
Table 1. Live Data Collected from StackOverflow Website with User Level in Splay
Tree Before and After Semi-Splay
User
ID
Collected data before semi-splay Collected data after semi-splay
Data 1 Data 2 Data 3 Data 4 Zig/Zag Data 5
A 4 1 3 6 6 7
B 5 4 6 8 8 10
C 6 2 2 1 1 3
D 12 9 6 4 4 5
E 9 8 7 8 8 4
F 2 4 5 9 7 10
G 5 5 6 9 9 3
H 8 7 4 6 6 6
I 11 7 7 5 5 6
J 10 8 1 4 4 2
K 5 4 3 2 2 4
L 12 8 3 3 3 4
M 3 4 4 9 7 5
N 4 3 5 10 8 9
O 5 6 8 10 10 5
P 8 9 6 10 8 6
Q 6 6 5 7 7 5
R 7 9 9 11 11 6
S 4 5 3 7 5 4
T 11 9 4 3 3 1
U 10 8 5 2 2 2
V 2 2 4 7 7 8
W 5 3 5 8 8 9
X 4 5 2 5 5 6
Y 7 8 5 8 8 7
Figure 3. Splay Tree of Stackoverflow Users‟ Reputation Values
The experimental results show that our algorithm has increased weak users‟
performance by increasing their chances to remain in the ranking cap by breaking the power
law. Figure 4 depicts the changes in user ranks before and after breaking the power law through
semi-splay. In our work, 85% of users retain in higher ranks which are almost 60% more than
the existing traditional ranking system in question-answering websites.
11. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 432 – 444
442
(a) (b)
Figure 4. Weekly rank of StackOverflow Users from JAN to Feb ‟16 (a) Before Applying
Breaking_Power_law Algorithm (b) After Applying Breaking_Power_law Algorithm
6. Conclusion and Future Work
The collaboration activities in e-learning environment require trust relationships among
co-learners that obtained through reputation and ranking. The splay tree is a self-adjusting
binary search tree where highly active/ranked users are near the root node. In our paper, the
splay tree represents user reputation. Arrange users in the splay tree based on their
participation frequency. Highly active user occupies the root node. Calculate NDCG and identify
weak users, who are all in the critical level of getting ignored or losing the trust of voters. To
break the power law, do zig/zag rotation which raises their grade levels to save them from
getting very low ranks. In our work, we examined existing StackOverflow ranking system with
our algorithm and proved that 60% of users get saved from drowning. In our future activities,
group users based on the subject of expertise and accordingly ranked using multiple splay
trees. One user may have more than one subject of interest. Thus, represent a user as a node
in more than one splay tree. These users connect the splay trees forming a splaynet. Ranking in
splaynet is our future goal.
Acknowledgment
The authors would like to thank StackOverflow for providing the data used in this paper.
References
[1] Wei Zhou, Zilong Tan, Shaowen Yao, Shipu Wang. A Splay Tree-Based Approach for Efficient
Resource Location in P2P Networks. The Scientific World Journal. Article ID 830682.
http://dx.doi.org/10.1155/2014/830682. Research Article. 2014; 11 pages.
[2] Stefan Schmid, Chen Avin, Christian Scheideler, Michael Borokhovich, Bernhard Haeupler and Zvi
Lotker. SplayNet: Towards Locally Self-Adjusting Networks. IEEE/ACM Transactions on Networking.
IEEE. 1063-6692. 2015.
[3] Liangbin Li, Jinlin Wang, Erli Niu, Xue Liu. Improving Content Authentication Efficiency of Online
Multimedia Service. Second International Conference on Networks Security. Wireless
Communications and Trusted Computing. 978-0-7695-4011-5/10 IEEE. DOI
10.1109/NSWCTC.2010.171. 2010.
[4] Dimitris Antoniou,Ioannis Kampouris,Evangelos Theodoridis and Athanasios Tsakalidis. Splaying for
Compression:An Experimental Study.Panhellenic Conference on Informatics 978-0-7695-4389-5/11.
IEEE.DOI 10.1109/PCI.2011.19. 2011
[5] Haopei Wang,Zhen Chen,Feng Xie and Fuye Han. A Data Structure for Content Cache Management
in Content-Centric Networking. Third International Conference on Networking and Distributed
Computing. 2165-5006/12 IEEE. DOI 10.1109/ICNDC.2012.11. 2012.
12. TELKOMNIKA ISSN: 1693-6930
Enhanced User- Driven Ranking System with Splay Tree (R. Jayashree)
443
[6] Zouheir Trabelsi, Safaa Zeidan. Splay Trees based Early Packet Rejection Mechanism against DoS
Traffic Targeting Firewall Default Security rule. Iguacu Falls. Brazil. ISBN: 978-1-4577-1017-9. DOI
http://doi.ieeecomputersociety.org/10.1109/WIFS.2011.6123123. 2011: 1-6
[7] Safaa Zeidan, Zouheir Trabelsi. A Survey on Firewall’s Early Packet Rejection Techniques.
International Conference on Innovations in Information Technology. 978-1-4577-0314-0/11 IEEE.
2011.
[8] A Mercy Gnana Rani, A Marimuthu. Key Insertion and Splay Tree Encryption Algorithm for Secure
Data Outsourcing in Cloud.World Congress on Computing and Communication Technologies. 978-1-
4799-2877-4/14 IEEE. DOI 10.1109/WCCCT.2014.14. 2014.
[9] Chen Avin, Bernhard Haeupler, Zvi Lotker, Christian Scheideler and Stefan Schmid Ben Gurion.
Locally Self-Adjusting Tree Networks. IEEE Computer Society. DOI 10.1109/IPDPS.2013.40. 2013:
395-406.
[10] Zouheir Trabelsi,Safaa Zeidan. Multilevel Early PacketFiltering Technique based on Traffic Statistics
and Splay Trees for Firewall Performance Improvement. IEEE ICC - Communication and Information
Systems Security Symposium. 978-1-4577-2053-6/12 IEEE. 2012.
[11] Neil Y. Yen, Franz F. Hou, Louis R. Chao and Timothy K. Shih. Weighting & Ranking the E-Learning
Resources. Ninth IEEE International Conference on Advanced Learning Technologies. 978-0-7695-
3711-5/09 IEEE. DOI 10.1109/ICALT.2009.36. 2009.
[12] Somaya Arianfar, Pekka Nikanderm, Jörg Ott. On content-centric router design and implications. ACM
CoNext Workshop ReARCH‟10 Proceedings ofthe Re-Architecting the Internet Workshop. ISBN: 978-
1-4503-0469-6 DOI 10.1145/1921233.1921240. 2010; 5:20-24
[13] Jayashree R, Christy A. Privacy and Reputation in ContextAware e-Learning,International Journal of
Computer Applications. 3rd National Conference on Future Computing. 0975–8887. 2014: 27-31.
[14] Daniel Dominic Sleator, Robert Endre Tarjan. Self-Adjusting Binary Search Trees. Journal of the
Association for Computing Machinery.A T&T Bell Laboratories.Murray Hill. NJ 0 1985 ACM 0004-541
1/85/0700-0652. 1985; 32(3): 652-686.
[15] M. Waldvogel. G. Varghese. 1. Turner. B. Plattner. Scalable High Speed IP Routing Lookups. In
Proceedings of the ACM SIGCOMM (SIGCOMM '97). ISBN: 0-89791-905-X DOI:
10.1145/263105.263136. 1997: 25-36.
[16] J. Dıaz, J. Petit and M. Serna. A survey of graph layout problems. Journal ACM Computing Surveys
(CSUR) Surveys Homepage archive. ACM New York. NY. USA DOI: 10.1145/568522.568523. 2002;
34(3): 313-356.
[17] Jayashree R, Christy A. Improving the Enhanced Recommended System Using Bayesian
Approximation Method and Normalized Discounted Cumulative Gain. Procedia Computer science,
Elsevier. 2015; 50: 216-222.
[18] J Leitao, J Marques,J Pereira,L Rodrigues.X-bot: A protocol for resilientoptimization of unstructured
overlay net-works. IEEE Transactions on Parallel and Distributed Systems. 2012; 23: 2175-2188.
[19] G Mitchison, R Durbin. Optimal numberings of an N X N array. SIAM J. Algebraic Discrete Methods.
1986; 7(4): 571–582.
[20] R. Ravi, A Agrawal, PN Klein. Ordering problems approximated: Single-processor scheduling and
interval graph completion. In Proc. ICALP. 1991.
[21] T Srinivasan, M Nivedita, V Mahadevan. Efficient Packet Classification Using Splay Tree Models.
IJCSNS International Journal of Computer Science and Network Security. 2006; 6(5): 28-35.
[22] Viraj Anchan, Sarang Deshpande, Deep Doshi and Akshat Kedia. Ranking Algorithm. International
Journal of Advanced Research in Computer and Communication Engineering. DOI
10.17148/IJARCCE.2015.4456 248. 2015; 4(4).
[23] Muralidhar Medidi And Narsingh Deo. Parallel dictionaries on AVL trees. Parallel Processing
Symposium. Proceedings. Eighth International. IEEE ISBN:0-8186-5602-6. DOI:
10.1109/IPPS.1994.288203. 1994: 878–882.
[24] Aleksandrs Slivkins, Filip Radlinski and Sreenivas Gollapudi. Ranked Bandits in Metric Spaces:
Learning Diverse Rankings over Large DocumentCollections. Journal ofMachine Learning Research.
2013; 14: 399-436.
[25] Robert Kleinberg, Aleksandrs Slivkins and Eli Upfal. Multi-armed bandits in metric spaces. In 40th
ACM Symposium on Theory of Computing (STOC). 2008: 681–690.
[26] Ferdinand S Leuwol.Evaluasi Manajemen Pembelajaran Berbasis ICT di SMA se kota Ambon. Tesis:
PPs UNY Yogyakarta. 2008.
[27] Luca de Alfaro, Thomas Adler, Ashutosh Kulshreshtha, Ian Pye. Reputation system for open
collaboration. Communications of the ACM. doi: 10.1145/1978542.1978560. 2011; 54(8): 81–87.
[28] XL Liu. Ranking online quality and reputation via the user activity. Research Center of Complex
Systems Science. University of Shanghai for Science and Technology. Shanghai 200093. PR China.
http://dx.doi.org/10.1016/j.physa.2015.05.043. 2015
[29] D. Movshovitz. Analysis of the reputation system and user contribution on a question answering
website: stack overflow. IEEE/ACM International Conference on Advances in Social Networks
Analysis and Mining. ASONAM'13. Niagara. Ontario. ACM 978-1-4503-2240-9 /13/08. 2013.
13. ISSN: 1693-6930
TELKOMNIKA Vol. 16, No. 1, February 2018 : 432 – 444
444
[30] Adler B, de Alfaro L. A content-driven reputation system for the Wikipedia. Proceedings of the 16th
International World Wide Web Conference, (WWW 2007), ACM Press. 2007.
[31] Adler B, de Alfaro L Pye I, Raman V. Measuring author contributions to the Wikipedia.Proceedings of
WikiSym 08, International Symposium on Wikis, ACM Press. 2008.
[32] Druck G, Miklau G, McCallum A. Learning to predict the quality of contributions to Wikipedia.
Proceedings of AAAI: 23rd Conference on Artificial Intelligence. 2008.
[33] Martin P Robillard, Walid Maalej, Robert J Walker, Thomas Zimmermann. Springer-Verlag Berlin
Heidelberg. Recommendation Systems in Software Engineering.ISBN 978-3-642-45134-8 ISBN 978-
3-642-45135-5 (eBook). DOI 10.1007/978-3-642-45135-5. 2013
[34] Lada A Adamic. zipf, power-laws and pareto-a ranking tutorial. Information Dynamics Lab, HP Labs.
Palo Alto, CA 94304. 2002.
[35] Irma Salamah, M Aris Ganiardi. Development of E-learning Software Based Multiplatform
Components. Bulletin of Electrical Engineering and Informatics (BEEI). ISSN: 2302-9285, DOI:
10.11591/eei.v6i3.647. 2017; 6(3): 228~234
[36] Rasyid Hardi Wirasasmita.Keefektifan Pembelajaran Berbantuan Internet di SMk Muhamammadiyah
Yogyakarta. Tesis: Program PPs UNY Yogyakarta. 2009.
[37] Razia Sulthana A, Subburaj Ramasamy.Context Based Classification of Reviews Using Association
Rule Mining, Fuzzy Logics and Ontology. Bulletin of Electrical Engineering and Informatics (BEEI).
ISSN: 2302-9285. DOI: 10.11591/eei.v6i3.682. 2017; 6(3): 250~255.
[38] Ramesh LS,GanapathyS, Bhuvaneshwari R, Kulothungan K, Pandiyaraju V, Kannan A. Prediction of
User Interests for Providing Relevant Information Using Relevance Feedback and Re-ranking.
International Journal of Intelligent Information Technologies (IJIIT). 2015; 11(4): 55-71.
[39] Kotsiantis S, Kanellopoulos D. Association Rules Mining: A Recent Overview. GESTS International
Transactions on Computer Science and Engineering. 2006; 32(1):71-82.
[40] Song L, Tekin C, van der Schaar M. Online Learning in Large-scale Contextual Recommender
Systems. IEEE Transactions on Services Computing. 2016; 9(3): 433-45.
[41] Shi F, Ghedira C, Marini JL. Context Adaptation for Smart Recommender Systems. IT Professional.
2015; 17(6): 18-26.
[42] Gang LV, Sheng-bing C. An Improved Entity Similarity Measurement Method. TELKOMNIKA
(Telecommunication Computing Electronics and Control). 2014; 12(4): 1017-22.
[43] Mohammed Falah Mohammed, Taha H. Rassem. An Ensemble of Enhanced Fuzzy Min Max Neural
Networks for Data Classification. TELKOMNIKA (Telecommunication Computing Electronics and
Control). ISSN: 1693-6930,Decree No: 58/DIKTI/Kep/2013 DOI: 10.12928/TELKOMNIKA.v15i2.6149.
2017; 15(2): 942~948.
[44] Simpson PK.Fuzzy min-maxneural networks–I:Classification. IEEE Transaction on Neural Networks.
1992; 3(5): 776-786.
[45] Mohammed MF, Lim CP, Quteishat A. A Novel Trust Measurement Method Based on Certified Belief
in Strength for a Multi-Agent Classifier System. Neural Computing and Applications.2012;24 (2): 421-
429.
[46] Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation. Hawaii
International Conference on System Sciences-HICSS. 2002; 2431-2439.
[47] Boukerche A, Xu L. An Agent-Based Trust and Reputation Management Scheme for Wireless Sensor
Networks. IEEE Global Telecommunications Conference-GLOBECOM. 2005; 3: 5.
[48] Wang P, Zhang Z. A Computation Trust Model with Trust Network in Multi-Agent Systems.
International Conference on Active Media Technology (AMT). 2005; 389-392.
[49] Polikar R. Ensemble Based Systems in Decision Making. IEEE Circuits and Systems Magazine.2006;
6: 21-45.
[50] QuteishatA, Lim CP, Saleh JM. A neural network-based multi-agentclassifier system with a Bayesian
formalism for trust measurement. Soft Computing. 2011; 15(2): 221–231.