SlideShare a Scribd company logo
Learning and inference engine applied to
ubiquitous recommender system
Djallel Bouneffouf
Institut Telecom, Telecom SudParis, CNRS UMR Samovar
9, rue Charles Fourier, 75004 Evry
Djallel.bouneffouf@it-sudparis.eu
The need for adapting information systems to the user context has been accentuated
by the extensive development of mobile applications that provide a considerable
amount of data of all types (images, texts, sounds, videos, etc.). It becomes thus
crucial to help users by guiding them in their access to information.
Systems should be able to recommend information helping the user to fulfill his/her
goal. The information given by the system depends on the user’s situation, i.e. an
instance of the context. Possible situations and the associated actions reflect the
user’s work habits.
Major difficulties when applying techniques to adapt a system to the user follow:
- Avoiding the intervention of experts: on one hand, experts are not sure of the
interest of the user, may define wrong ideas about him; on the other hand, an expert
is not always available [9, 26].
- Starting from scratch: in the initial state, the system’s behavior should not be
incoherent for the user to not refuse it quickly [7, 27, 29].
- A slow learning process: the learning process has to be quick to avoid bothering
the user with incorrect recommendation [11, 22, 23, 24].
-The evolution of the user’s interest: the interest of the user may change with the
time. The system has to be continuously adapted to this dynamic change using the
user’s context information to provide the relevant recommendations because, if the
system behavior is incoherent, the user refuses it quickly [9, 19, 31].
We sum up all of these problems in the following scenario.
“Knowing the high mobility of its employees and their dependencies to the
information contained in their corporate databases, the Nomalys company has
equipped all mobile phones with the “NS” application. This application allows
them to adapt to the nomadic life by consulting the company’s database from their
mobile phones.
Knowing the high mobility of its employees and their dependencies to the
information contained in their corporate databases, the Nomalys company has
equipped all mobile phones with the “NS” application. This application allows them
to adapt to the nomadic life by consulting the company’s database from their mobile
phones. Because of the diversity of jobs existing in the company, Nomalys decides
provide the application with a generic recommender system, which has to retrieve
the relevant information to users without any set of actions predefined by an expert.
Paul, John and Lauren are new employees of the company integrating different teams
of the company (marketing, commercial, and technique resp.).
Regarding their agendas, they have a meeting with clients in Paris at midday. When
they arrive at their meetings, the system should recommend them the relevant
information which would help them to better manage their meetings. The system
recommends to Paul the register of complaints, to John the register of factures and to
Lauren the technical registers.
To do these recommendations without the need of an expert and avoiding starting
from scratch, the recommender system has to infer them from the actions of the
user’s team.
The recommender system finds that Paul often opens the register of complaints two
hours before his meeting and not at the meeting. Moreover, John always tries to find
companies which are near and do the same work as the one he will visit the next day.
Using this knowledge, one month later, the system is able to recommend the register
of complaints to Paul two hours before his meeting; it also recommends John
companies which are near and do the same work as the one he will visit the next
day”.
To do these recommendations, the learning process of the system has to be quick and
has to follow the evolution user’s interest.
In summary, to solve the problem of the scenario, I study during my PHD thesis the
possibility to start with a predefined set of actions, not defined by an expert, but by
the user’s social group (in the scenario we talk about job teams) and adapts it
progressively to a particular user. This default behavior allows the system to be
ready-to-use and the learning is a lifelong process. Thus, the system will, at first, be
only acceptable to the user, and will, as time passes, give more and more satisfying
results.
8. Bibliographie
[Assad et al., 2007] Mark Assad, David Carmichael, Judy Kay et Bob Kummerfeld. «
PersonisAD : Distributed, Active, Scrutable Model Framework for Context-Aware Services ».
Dans Anthony La-Marca, Marc Langheinrich et Khai N. Truong, rédacteurs, Proceedings of
the 5th International Conference on Pervasive Computing, PERVASIVE 2007, tome 4480 de
Lecture Notes in Computer Science, pages 55 - 72. Springer, Toronto, Ontario, Canada, mai
2007.
[Godoy et Amandi, 2005] Daniela Godoy et Analia Amandi. « User proling for Web page
filtering », Internet Computing, IEEE, tome 9, n° 4,pages 56-64, juillet - aout 2005.
[Christopher, 2006] Christopher M. Bishop, « Pattern Recognition And Machine Learning»,
Springer, 2006.

More Related Content

What's hot

Ce4201528546
Ce4201528546Ce4201528546
Ce4201528546
IJERA Editor
 
Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
paperpublications3
 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentation
Amina HAMEURLAINE
 
Principle to support usability
Principle to support usabilityPrinciple to support usability
Principle to support usability
Zeeshan598
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
IJSRD
 
IRJET- Personalize Travel Recommandation based on Facebook Data
IRJET- Personalize Travel Recommandation based on Facebook DataIRJET- Personalize Travel Recommandation based on Facebook Data
IRJET- Personalize Travel Recommandation based on Facebook Data
IRJET Journal
 
Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...
Joao Luis Tavares
 

What's hot (7)

Ce4201528546
Ce4201528546Ce4201528546
Ce4201528546
 
Friend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life StyleFriend Recommendation on Social Network Site Based on Their Life Style
Friend Recommendation on Social Network Site Based on Their Life Style
 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentation
 
Principle to support usability
Principle to support usabilityPrinciple to support usability
Principle to support usability
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
 
IRJET- Personalize Travel Recommandation based on Facebook Data
IRJET- Personalize Travel Recommandation based on Facebook DataIRJET- Personalize Travel Recommandation based on Facebook Data
IRJET- Personalize Travel Recommandation based on Facebook Data
 
Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...
 

Viewers also liked

Tipos de licencia
Tipos de licenciaTipos de licencia
Tipos de licencia
janq_1997slideshare
 
Different Marketing Packet
Different Marketing PacketDifferent Marketing Packet
Different Marketing Packet
oorubenoo
 
Potenciando experiencias
Potenciando experienciasPotenciando experiencias
Potenciando experiencias
sandra2121
 
PEM 2015
PEM 2015PEM 2015
PEM 2015
Amber Lattner
 
1_Języki w Ukrainie
1_Języki w Ukrainie1_Języki w Ukrainie
1_Języki w UkrainieTetiana Rak
 
Julia Heathcote 2016 February
Julia Heathcote 2016 FebruaryJulia Heathcote 2016 February
Julia Heathcote 2016 February
Julia Heathcote
 
Peer reviewed journals 14 04 16
Peer reviewed journals 14 04 16Peer reviewed journals 14 04 16
Peer reviewed journals 14 04 16
bal sanghera
 
Dolphins sleep with one eye open
Dolphins sleep with one eye openDolphins sleep with one eye open
Dolphins sleep with one eye open
Manish kumar sah
 
Austria
AustriaAustria
Austria
paolina70
 
Odisi Dance Hasta Mudras
Odisi Dance Hasta MudrasOdisi Dance Hasta Mudras
Odisi Dance Hasta Mudras
Minakshyrath
 
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...
syeda yasmeen
 
User Research in the Financial Space
User Research in the Financial SpaceUser Research in the Financial Space
User Research in the Financial Space
BentleyDUC
 
Nasscom Summary Report 2007
Nasscom Summary Report 2007Nasscom Summary Report 2007
Nasscom Summary Report 2007
Vijesh Sivadasan
 
Ujian Praktek SMA TIK
Ujian Praktek SMA TIKUjian Praktek SMA TIK
Ujian Praktek SMA TIK
Budi Purwanto
 
Habilitats socials
Habilitats socialsHabilitats socials
Habilitats socialshelenbcntrl
 

Viewers also liked (15)

Tipos de licencia
Tipos de licenciaTipos de licencia
Tipos de licencia
 
Different Marketing Packet
Different Marketing PacketDifferent Marketing Packet
Different Marketing Packet
 
Potenciando experiencias
Potenciando experienciasPotenciando experiencias
Potenciando experiencias
 
PEM 2015
PEM 2015PEM 2015
PEM 2015
 
1_Języki w Ukrainie
1_Języki w Ukrainie1_Języki w Ukrainie
1_Języki w Ukrainie
 
Julia Heathcote 2016 February
Julia Heathcote 2016 FebruaryJulia Heathcote 2016 February
Julia Heathcote 2016 February
 
Peer reviewed journals 14 04 16
Peer reviewed journals 14 04 16Peer reviewed journals 14 04 16
Peer reviewed journals 14 04 16
 
Dolphins sleep with one eye open
Dolphins sleep with one eye openDolphins sleep with one eye open
Dolphins sleep with one eye open
 
Austria
AustriaAustria
Austria
 
Odisi Dance Hasta Mudras
Odisi Dance Hasta MudrasOdisi Dance Hasta Mudras
Odisi Dance Hasta Mudras
 
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...
Dynamic Routing for Data Integrity and Delay Differentiated Services in Wirel...
 
User Research in the Financial Space
User Research in the Financial SpaceUser Research in the Financial Space
User Research in the Financial Space
 
Nasscom Summary Report 2007
Nasscom Summary Report 2007Nasscom Summary Report 2007
Nasscom Summary Report 2007
 
Ujian Praktek SMA TIK
Ujian Praktek SMA TIKUjian Praktek SMA TIK
Ujian Praktek SMA TIK
 
Habilitats socials
Habilitats socialsHabilitats socials
Habilitats socials
 

Similar to Learning and inference engine applied to ubiquitous recommender system

Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)
S3 Infotech IEEE Projects
 
260119 a digital approach towards market research upload
260119 a digital approach towards market research upload260119 a digital approach towards market research upload
260119 a digital approach towards market research upload
Syed Yeasef Akbar
 
Design and implementation of a web based student complaint system
Design and implementation of a web based student complaint systemDesign and implementation of a web based student complaint system
Design and implementation of a web based student complaint system
ResearchWap
 
Question20.docx
Question20.docxQuestion20.docx
Question20.docx
AhmadWarrich1
 
Daily attendance.pptx
Daily attendance.pptxDaily attendance.pptx
Daily attendance.pptx
ShivangiPriyaVlogs
 
Unleashing the Power of Survey Mobile Applications
Unleashing the Power of Survey Mobile ApplicationsUnleashing the Power of Survey Mobile Applications
Unleashing the Power of Survey Mobile Applications
NestForms
 
Knowledge-based working boosts customer excellence
Knowledge-based working boosts customer excellenceKnowledge-based working boosts customer excellence
Knowledge-based working boosts customer excellence
Knowledge Values
 
Certus Accelerate - User Centred Everything by Sam Williams
Certus Accelerate - User Centred Everything by Sam WilliamsCertus Accelerate - User Centred Everything by Sam Williams
Certus Accelerate - User Centred Everything by Sam Williams
Certus Solutions
 
zbeardUXportfolio816
zbeardUXportfolio816zbeardUXportfolio816
zbeardUXportfolio816
Zach Beard
 
Assignment 4 prototype and test
Assignment 4 prototype and testAssignment 4 prototype and test
Assignment 4 prototype and test
Francisco Gerardo Barroso Tanoira
 
National malaria control programme
National malaria control programmeNational malaria control programme
National malaria control programme
Gabriel Apeh
 
Acoustic event characterization for service robot using convolutional networks
Acoustic event characterization for service robot using convolutional networksAcoustic event characterization for service robot using convolutional networks
Acoustic event characterization for service robot using convolutional networks
IJECEIAES
 
Deep Tricorder
Deep TricorderDeep Tricorder
Deep Tricorder
Anand Sekar
 
Speech Based Search Engine System Control and User Interaction
Speech Based Search Engine System Control and User  InteractionSpeech Based Search Engine System Control and User  Interaction
Speech Based Search Engine System Control and User Interaction
IOSR Journals
 
Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...
InSTEDD
 
The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...
The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...
The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...
Francois Pouilloux
 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex Sensors
IRJET Journal
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
Kamal Acharya
 
Artificial Intelligence (AI) -> understanding what it is & how you can use it...
Artificial Intelligence (AI) -> understanding what it is & how you can use it...Artificial Intelligence (AI) -> understanding what it is & how you can use it...
Artificial Intelligence (AI) -> understanding what it is & how you can use it...
Adela VILLANUEVA
 
Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...
MannanBansal
 

Similar to Learning and inference engine applied to ubiquitous recommender system (20)

Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)Mca(.net & java) application projects abstracts(v)
Mca(.net & java) application projects abstracts(v)
 
260119 a digital approach towards market research upload
260119 a digital approach towards market research upload260119 a digital approach towards market research upload
260119 a digital approach towards market research upload
 
Design and implementation of a web based student complaint system
Design and implementation of a web based student complaint systemDesign and implementation of a web based student complaint system
Design and implementation of a web based student complaint system
 
Question20.docx
Question20.docxQuestion20.docx
Question20.docx
 
Daily attendance.pptx
Daily attendance.pptxDaily attendance.pptx
Daily attendance.pptx
 
Unleashing the Power of Survey Mobile Applications
Unleashing the Power of Survey Mobile ApplicationsUnleashing the Power of Survey Mobile Applications
Unleashing the Power of Survey Mobile Applications
 
Knowledge-based working boosts customer excellence
Knowledge-based working boosts customer excellenceKnowledge-based working boosts customer excellence
Knowledge-based working boosts customer excellence
 
Certus Accelerate - User Centred Everything by Sam Williams
Certus Accelerate - User Centred Everything by Sam WilliamsCertus Accelerate - User Centred Everything by Sam Williams
Certus Accelerate - User Centred Everything by Sam Williams
 
zbeardUXportfolio816
zbeardUXportfolio816zbeardUXportfolio816
zbeardUXportfolio816
 
Assignment 4 prototype and test
Assignment 4 prototype and testAssignment 4 prototype and test
Assignment 4 prototype and test
 
National malaria control programme
National malaria control programmeNational malaria control programme
National malaria control programme
 
Acoustic event characterization for service robot using convolutional networks
Acoustic event characterization for service robot using convolutional networksAcoustic event characterization for service robot using convolutional networks
Acoustic event characterization for service robot using convolutional networks
 
Deep Tricorder
Deep TricorderDeep Tricorder
Deep Tricorder
 
Speech Based Search Engine System Control and User Interaction
Speech Based Search Engine System Control and User  InteractionSpeech Based Search Engine System Control and User  Interaction
Speech Based Search Engine System Control and User Interaction
 
Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...Mobile technologies landscape and opportunity for civil society organizations...
Mobile technologies landscape and opportunity for civil society organizations...
 
The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...
The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...
The 2011 IEEE/WIC/ACM International Conference on Web Intelligence » industry...
 
IRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex SensorsIRJET- Human Activity Recognition using Flex Sensors
IRJET- Human Activity Recognition using Flex Sensors
 
Online crime reporting system project.pdf
Online crime reporting system project.pdfOnline crime reporting system project.pdf
Online crime reporting system project.pdf
 
Artificial Intelligence (AI) -> understanding what it is & how you can use it...
Artificial Intelligence (AI) -> understanding what it is & how you can use it...Artificial Intelligence (AI) -> understanding what it is & how you can use it...
Artificial Intelligence (AI) -> understanding what it is & how you can use it...
 
Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...Machine learning for the web explore the web and make smarter predictions usi...
Machine learning for the web explore the web and make smarter predictions usi...
 

Recently uploaded

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

Learning and inference engine applied to ubiquitous recommender system

  • 1. Learning and inference engine applied to ubiquitous recommender system Djallel Bouneffouf Institut Telecom, Telecom SudParis, CNRS UMR Samovar 9, rue Charles Fourier, 75004 Evry Djallel.bouneffouf@it-sudparis.eu The need for adapting information systems to the user context has been accentuated by the extensive development of mobile applications that provide a considerable amount of data of all types (images, texts, sounds, videos, etc.). It becomes thus crucial to help users by guiding them in their access to information. Systems should be able to recommend information helping the user to fulfill his/her goal. The information given by the system depends on the user’s situation, i.e. an instance of the context. Possible situations and the associated actions reflect the user’s work habits. Major difficulties when applying techniques to adapt a system to the user follow: - Avoiding the intervention of experts: on one hand, experts are not sure of the interest of the user, may define wrong ideas about him; on the other hand, an expert is not always available [9, 26]. - Starting from scratch: in the initial state, the system’s behavior should not be incoherent for the user to not refuse it quickly [7, 27, 29]. - A slow learning process: the learning process has to be quick to avoid bothering the user with incorrect recommendation [11, 22, 23, 24]. -The evolution of the user’s interest: the interest of the user may change with the time. The system has to be continuously adapted to this dynamic change using the user’s context information to provide the relevant recommendations because, if the system behavior is incoherent, the user refuses it quickly [9, 19, 31]. We sum up all of these problems in the following scenario. “Knowing the high mobility of its employees and their dependencies to the information contained in their corporate databases, the Nomalys company has equipped all mobile phones with the “NS” application. This application allows them to adapt to the nomadic life by consulting the company’s database from their mobile phones. Knowing the high mobility of its employees and their dependencies to the information contained in their corporate databases, the Nomalys company has equipped all mobile phones with the “NS” application. This application allows them to adapt to the nomadic life by consulting the company’s database from their mobile phones. Because of the diversity of jobs existing in the company, Nomalys decides provide the application with a generic recommender system, which has to retrieve the relevant information to users without any set of actions predefined by an expert.
  • 2. Paul, John and Lauren are new employees of the company integrating different teams of the company (marketing, commercial, and technique resp.). Regarding their agendas, they have a meeting with clients in Paris at midday. When they arrive at their meetings, the system should recommend them the relevant information which would help them to better manage their meetings. The system recommends to Paul the register of complaints, to John the register of factures and to Lauren the technical registers. To do these recommendations without the need of an expert and avoiding starting from scratch, the recommender system has to infer them from the actions of the user’s team. The recommender system finds that Paul often opens the register of complaints two hours before his meeting and not at the meeting. Moreover, John always tries to find companies which are near and do the same work as the one he will visit the next day. Using this knowledge, one month later, the system is able to recommend the register of complaints to Paul two hours before his meeting; it also recommends John companies which are near and do the same work as the one he will visit the next day”. To do these recommendations, the learning process of the system has to be quick and has to follow the evolution user’s interest. In summary, to solve the problem of the scenario, I study during my PHD thesis the possibility to start with a predefined set of actions, not defined by an expert, but by the user’s social group (in the scenario we talk about job teams) and adapts it progressively to a particular user. This default behavior allows the system to be ready-to-use and the learning is a lifelong process. Thus, the system will, at first, be only acceptable to the user, and will, as time passes, give more and more satisfying results. 8. Bibliographie [Assad et al., 2007] Mark Assad, David Carmichael, Judy Kay et Bob Kummerfeld. « PersonisAD : Distributed, Active, Scrutable Model Framework for Context-Aware Services ». Dans Anthony La-Marca, Marc Langheinrich et Khai N. Truong, rédacteurs, Proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, tome 4480 de Lecture Notes in Computer Science, pages 55 - 72. Springer, Toronto, Ontario, Canada, mai 2007. [Godoy et Amandi, 2005] Daniela Godoy et Analia Amandi. « User proling for Web page filtering », Internet Computing, IEEE, tome 9, n° 4,pages 56-64, juillet - aout 2005. [Christopher, 2006] Christopher M. Bishop, « Pattern Recognition And Machine Learning», Springer, 2006.