scholarly journals A Survey of Long-Tail Item Recommendation Methods

2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Jing Qin

Recommender systems represent a critical field of AI technology applications. The core function of a recommender system is to recommend items of interest to users, but if it is only user history-based (purchasing or browsing data), it can only recommend similar products to a user, which makes the user feel fatigued (creating so-called “Information Cocoons”). Besides, transaction data (purchasing or browsing data) in various fields usually follow Pareto distributions. Accordingly, 20% of products are purchased or viewed a greater number of times (short-head items), while the remaining 80% of products are purchased or viewed less frequently (long-tail items). Using the traditional recommendation method, considering only the accuracy of recommendations, the coverage rate is relatively low, and most of the recommended items are short-head items. The long-tail item recommendation method not only considers the recommendation of short-head items but also considers recommending more long-tail items to users, thus improving the coverage and diversity of the recommendation results. Long-tail item recommendation research has become a frontier issue in recommendation systems in recent years. While the current research paper is still scarce, there have been related research achievements in top-level conferences in the field of computers, such as VLDB and IJCAI. Due to the fact that there is no review literature in this field, to allow readers to better understand the research status of the long-tail item recommendation method, this paper summarizes the progress of the research on long-tail item recommendation methods (from clustering-based, which began in 2008, to deep learning-based methods, which began in 2020) and the future directions associated with this research.

2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Nitipong Pichetpan ◽  
Mark W. Post

Abstract This article provides a comprehensive analysis of the little-known “bare classifier phrase” construction in Modern Standard Thai. It describes the syntax, semantics and discourse functions of Thai bare classifier phrases, and further proposes a diachronic account of their origin in reduction of post-posed numeral ‘one’. Following this synchronic and diachronic description, this article attempts to locate Thai within a working typology of bare classifier constructions in mainland Asian languages, and further argues for the importance of bare classifier constructions to the theory of classifiers more generally. Following Bisang (1999) and others, it argues that bare classifier constructions reveal the core function of classifiers in Asian languages to be individuation – a referential function. It therefore cautions against some recent proposals to merge classifiers and gender markers within a single categorical space defined on the semantic basis of nominal classification, and in favour of continuing to treat classifiers as a discrete linguistic category – in mainland Asian languages, at least.


2017 ◽  
Vol 6 (3) ◽  
pp. 303 ◽  
Author(s):  
José Eduardo Sierra Nieto ◽  
Nieves Blanco García

Despite the fact that listening is at the core of teaching, pedagogical literature has paid very little attention to listening. In this paper, we echo this absence of research and try to explore some of listening’s pedagogical and training possibilities. We move away from the kind of listening that underlies relationships of power, trying to find a pattern of listening in which our presence becomes important and related research activity is seen as a transformational experience. We address these matters on the basis of some learning experiences arising from a recent study in which we analyzed, by means of a narrative methodology, the experiences of academic failure of three adolescents. The article concludes with proposals of some principles which served as the basis and guidelines for our conduct in the course of the study, and which are an example of our concept of listening for educational research.


Author(s):  
Muhammad Aliyu ◽  
Murali M. ◽  
Abdulsalam Y. Gital ◽  
Souley Boukari ◽  
Rumana Kabir ◽  
...  

As cloud resource demand grows, supply chain management (SCM), which is the core function of cloud computing, faces serious challenges. Quite a number of techniques have been proposed by many researchers for such a challenge. As such, numerous proposed strategies are still under reckoning and modification so as to enhance its potential. An optimized dynamic scheme that combined several algorithms' characteristics was proposed to map out such a challenge. The hybridized proposed scheme involved the meta-heuristic swarm mechanism of ant colony optimization (ACO) and deterministic spanning tree (SPT) algorithm as it obtained faster convergence chain, ensured resource utilization in least time and cost. Extensive experiments conducted in cloudsim simulator provided an efficient result in terms of minimized makespan time and throughput as compared to SPT, round robin (RR), and pre-emptive fair scheduling algorithm (PFSA) as it significantly improves performance.


2020 ◽  
Vol 51 (1) ◽  
pp. 63-78
Author(s):  
Gertrud Schneider-Blum ◽  
Birgit Hellwig

Abstract In this paper, we investigate the interplay between the morphosyntactic class of adjectives, the semantics of property concepts, and the function of noun modification in Tabaq, a Kordofan Nubian language (Nilo-Saharan phylum) spoken in the north-west of the Nuba Mountains in Sudan. Tabaq has a small class of adjectives containing few semantic types, and playing only a limited role with respect to the core function of adjectives: the modification of nouns. By contrast, a large number of descriptive modifiers is derived from two other word classes, verbs and nouns, and this paper describes the different ways of coding property concepts in Tabaq.


Author(s):  
Ian Barba ◽  
James Brewer ◽  
Brenda Swinford

This chapter summarizes information gathered in the first two phases of research being conducted at Texas Tech University (TTU) Libraries on the feasibility and potential benefits of using stereoscopic 3D content in a classroom or library. The authors share background information gathered during the first phase of the research, including an overview of stereoscopic 3D technology and a review of related research. They then discuss findings and recommendations from the second phase of the research, including detailed coverage of 3D equipment, practical advice for using 3D technology, and results from demonstration and survey sessions conducted with TTU faculty, staff, and students. The authors also share options for accessing and creating stereoscopic 3D content. They end with a discussion of some future directions of stereoscopic 3D.


Author(s):  
David Mills

Course management systems will unquestionably become one of the most critical enterprise systems in higher education. This is because these systems are more closely aligned with the core mission of teaching and learning than any others. Although these systems have already undergone extraordinary transformation in just a few short years, we are at only the very beginning of the evolutionary process. It is critical that CMS vendors look to the students, educators, and administrators that interact with these systems to identify what new tools and features they need. Consequently, the next stage of innovation in course management systems should therefore focus more on features specifically related to promoting better and more efficient processes for teaching and learning online. More flexible administration options should make these systems easier to maintain. Emerging standards will continue to simplify communications and data exchange with other systems. Finally, the infusion of sound principles of instructional design and learning theory into the tools themselves promises to transform today’s course management systems into tomorrow’s expert systems for teaching and learning.


Author(s):  
Andew Neil Gibbons

The philosophy of technology underlies how people view and use technology. The historic relationship of humans to technology is important to explore when developing a context for current technology applications. Within such a context, this chapter outlines the core components, philosophy and debate contributing to sessions run with early childhood education student teachers and early childhood educators.


2019 ◽  
Vol 299 ◽  
pp. 05006 ◽  
Author(s):  
Pavlina Toteva–Lyutova ◽  
Krasimira Koleva ◽  
Nadezhda Tsoneva

Today's economic development is dynamic, closely connected with high technology applications, a growth in intellectual capital and widespread innovations. Most economically developed countries realise the need to create new solutions to present or upcoming problems. Creating a modern innovative, educational, scientific and technological infrastructure becomes an important issue. The 21st century sets new challenges to future engineering specialists. The paper analyses the currently demanded engineering competencies and modern requirements to engineer training in order to prepare reliable specialists for the labour market. The purpose of this paper is to present a brief analysis of the syllabi and the content of the separate disciplines which ensure qualified student education. An attempt to include geometrical dimensioning and tolerance in design education at TU – Varna was reported in this paper, standards which are the core of geometrical product specifications inevitably required in the age of globalization of industry. The paper gives some hints how to teach efficiently the new generation of GPS standards at the mechanical engineering faculty.


Author(s):  
E. Yu ◽  
L. Liu ◽  
J. Mylopoulous

As software becomes more and more entrenched in everyday life in today’s society, security looms large as an unsolved problem. Despite advances in security mecha-nisms and technologies, most software systems in the world remain precarious and vulnerable. There is now widespread recognition that security cannot be achieved by technology alone. All software systems are ultimately embedded in some human social environment. The effectiveness of the system depends very much on the forces in that environment. Yet there are few systematic techniques for treating the social context of security together with technical system design in an integral way. In this chapter, we argue that a social ontology at the core of a requirements engineering process can be the basis for integrating security into a requirements driven software engineering process. We describe the i* agent-oriented modelling framework and show how it can be used to model and reason about security concerns and responses. A smart card example is used to illustrate. Future directions for a social paradigm for security and software engineering are discussed.


Sign in / Sign up

Export Citation Format

Share Document