scholarly journals The State of the Art in Methodologies of Course Recommender Systems—A Review of Recent Research

Data ◽  
2021 ◽  
Vol 6 (2) ◽  
pp. 18
Author(s):  
Deepani B. Guruge ◽  
Rajan Kadel ◽  
Sharly J. Halder

In recent years, education institutions have offered a wide range of course selections with overlaps. This presents significant challenges to students in selecting successful courses that match their current knowledge and personal goals. Although many studies have been conducted on Recommender Systems (RS), a review of methodologies used in course RS is still insufficiently explored. To fill this literature gap, this paper presents the state of the art of methodologies used in course RS along with the summary of the types of data sources used to evaluate these techniques. This review aims to recognize emerging trends in course RS techniques in recent research literature to deliver insights for researchers for further investigation. We provide a systematic review process followed by research findings on the current methodologies implemented in different course RS in selected research journals such as: collaborative, content-based, knowledge-based, Data Mining (DM), hybrid, statistical and Conversational RS (CRS). This study analyzed publications between 2016 and June 2020, in three repositories; IEEE Xplore, ACM, and Google Scholar. These papers were explored and classified based on the methodology used in recommending courses. This review has revealed that there is a growing popularity in hybrid course RS and followed by DM techniques in recent publications. However, few CRS-based course RS were present in the selected publications. Finally, we discussed future avenues based on the research outcome, which might lead to next-generation course RS.

1986 ◽  
Author(s):  
Simon S. Kim ◽  
Mary Lou Maher ◽  
Raymond E. Levitt ◽  
Martin F. Rooney ◽  
Thomas J. Siller

2021 ◽  
Vol 15 (5) ◽  
pp. 1-32
Author(s):  
Quang-huy Duong ◽  
Heri Ramampiaro ◽  
Kjetil Nørvåg ◽  
Thu-lan Dam

Dense subregion (subgraph & subtensor) detection is a well-studied area, with a wide range of applications, and numerous efficient approaches and algorithms have been proposed. Approximation approaches are commonly used for detecting dense subregions due to the complexity of the exact methods. Existing algorithms are generally efficient for dense subtensor and subgraph detection, and can perform well in many applications. However, most of the existing works utilize the state-or-the-art greedy 2-approximation algorithm to capably provide solutions with a loose theoretical density guarantee. The main drawback of most of these algorithms is that they can estimate only one subtensor, or subgraph, at a time, with a low guarantee on its density. While some methods can, on the other hand, estimate multiple subtensors, they can give a guarantee on the density with respect to the input tensor for the first estimated subsensor only. We address these drawbacks by providing both theoretical and practical solution for estimating multiple dense subtensors in tensor data and giving a higher lower bound of the density. In particular, we guarantee and prove a higher bound of the lower-bound density of the estimated subgraph and subtensors. We also propose a novel approach to show that there are multiple dense subtensors with a guarantee on its density that is greater than the lower bound used in the state-of-the-art algorithms. We evaluate our approach with extensive experiments on several real-world datasets, which demonstrates its efficiency and feasibility.


Sensors ◽  
2021 ◽  
Vol 21 (15) ◽  
pp. 5248
Author(s):  
Aleksandra Pawlicka ◽  
Marek Pawlicki ◽  
Rafał Kozik ◽  
Ryszard S. Choraś

This paper discusses the valuable role recommender systems may play in cybersecurity. First, a comprehensive presentation of recommender system types is presented, as well as their advantages and disadvantages, possible applications and security concerns. Then, the paper collects and presents the state of the art concerning the use of recommender systems in cybersecurity; both the existing solutions and future ideas are presented. The contribution of this paper is two-fold: to date, to the best of our knowledge, there has been no work collecting the applications of recommenders for cybersecurity. Moreover, this paper attempts to complete a comprehensive survey of recommender types, after noticing that other works usually mention two–three types at once and neglect the others.


1987 ◽  
Vol 60 (3) ◽  
pp. 381-416 ◽  
Author(s):  
B. S. Nau

Abstract The understanding of the engineering fundamentals of rubber seals of all the various types has been developing gradually over the past two or three decades, but there is still much to understand, Tables V–VII summarize the state of the art. In the case of rubber-based gaskets, the field of high-temperature applications has scarcely been touched, although there are plans to initiate work in this area both in the U.S.A. at PVRC, and in the U.K., at BHRA. In the case of reciprocating rubber seals, a broad basis of theory and experiment has been developed, yet it still is not possible to design such a seal from first principles. Indeed, in a comparative series of experiments run recently on seals from a single batch, tested in different laboratories round the world to the same test procedure, under the aegis of an ISO working party, a very wide range of values was reported for leakage and friction. The explanation for this has still to be ascertained. In the case of rotary lip seals, theories and supporting evidence have been brought forward to support alternative hypotheses for lubrication and sealing mechanisms. None can be said to have become generally accepted, and it remains to crystallize a unified theory.


Author(s):  
Vít Bukač ◽  
Vashek Matyáš

In this chapter, the reader explores both the founding ideas and the state-of-the-art research on host-based intrusion detection systems. HIDSs are categorized by their intrusion detection method. Each category is thoroughly investigated, and its limitations and benefits are discussed. Seminal research findings and ideas are presented and supplied with comments. Separate sections are devoted to the protection against tampering and to the HIDS evasion techniques that are employed by attackers. Existing research trends are highlighted, and possible future directions are suggested.


Resources ◽  
2020 ◽  
Vol 9 (2) ◽  
pp. 15
Author(s):  
Juan Uribe-Toril ◽  
José Luis Ruiz-Real ◽  
Jaime de Pablo Valenciano

Sustainability, local development, and ecology are keywords that cover a wide range of research fields in both experimental and social sciences. The transversal nature of this knowledge area creates synergies but also divergences, making a continuous review of the existing literature necessary in order to facilitate research. There has been an increasing number of articles that have analyzed trends in the literature and the state-of-the-art in many subjects. In this Special Issue of Resources, the most prestigious researchers analyzed the past and future of Social Sciences in Resources from an economic, social, and environmental perspective.


AI Magazine ◽  
2008 ◽  
Vol 29 (4) ◽  
pp. 93 ◽  
Author(s):  
Pearl Pu ◽  
Li Chen

We address user system interaction issues in product search and recommender systems: how to help users select the most preferential item from a large collection of alternatives. As such systems must crucially rely on an accurate and complete model of user preferences, the acquisition of this model becomes the central subject of our paper. Many tools used today do not satisfactorily assist users to establish this model because they do not adequately focus on fundamental decision objectives, help them reveal hidden preferences, revise conflicting preferences, or explicitly reason about tradeoffs. As a result, users fail to find the outcomes that best satisfy their needs and preferences. In this article, we provide some analyses of common areas of design pitfalls and derive a set of design guidelines that assist the user in avoiding these problems in three important areas: user preference elicitation, preference revision, and explanation interfaces. For each area, we describe the state-of-the-art of the developed techniques and discuss concrete scenarios where they have been applied and tested.


Author(s):  
Lorenzo Munari

An overview of the major zoogeographical gaps in our knowledge of the world beach flies (subfamilies Apetaeninae, Horaismopterinae, Pelomyiinae, and Tethininae) is provided. The identified areas treated in this work are as follows: the subarctic Beringia, the South American circum-Antarctic islands, the Neotropical Region south of the equator, most of the West African seacoasts, the huge area ranging from India, across the Bay of Bengal, to Sumatra and Java, and most of Australia. Apart from the inhospitable northernmost and southernmost areas of the planet, which feature a real very low biodiversity, the remaining vast areas dealt with in this work woefully suffer a dramatic paucity of field collections, as well as of previously collected materials preserved in scientific institutions. This might seem a truism that, however, must be emphasized in order to unequivocally identify the geographic areas that need to be further investigated


Terminology ◽  
1994 ◽  
Vol 1 (1) ◽  
pp. 181-192 ◽  
Author(s):  
Lynne Bowker

Two recently published collections of articles that provide an overview of the state of the art in applied terminology are discussed from the point of view of two themes recurring throughout them: comparative terminology and knowledge engineering. Comparative terminology is one of the most traditional forms of terminology and is still among the most prevalent practiced today. New necessary approaches to handling problems in this area are outlined. One of the newest areas of research is knowledge-based terminology. The growing interest in exploring the potential benefits of a relationship between terminology and knowledge-engineering methods is shown by the discussion of various articles on this subject.


2011 ◽  
Vol 2011 ◽  
pp. 1-16 ◽  
Author(s):  
Ewan A. Gibb ◽  
Katey S. S. Enfield ◽  
Ivy F. L. Tsui ◽  
Raj Chari ◽  
Stephen Lam ◽  
...  

Squamous cell carcinomas (SqCCs) arise in a wide range of tissues including skin, lung, and oral mucosa. Although all SqCCs are epithelial in origin and share common nomenclature, these cancers differ greatly with respect to incidence, prognosis, and treatment. Current knowledge of genetic similarities and differences between SqCCs is insufficient to describe the biology of these cancers, which arise from diverse tissue origins. In this paper we provide a general overview of whole genome approaches for gene and pathway discovery and highlight the advancement of integrative genomics as a state-of-the-art technology in the study of SqCC genetics.


Sign in / Sign up

Export Citation Format

Share Document