2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Triyanna Widiyaningtyas ◽  
Indriana Hidayah ◽  
Teguh B. Adji

AbstractCollaborative filtering is one of the most widely used recommendation system approaches. One issue in collaborative filtering is how to use a similarity algorithm to increase the accuracy of the recommendation system. Most recently, a similarity algorithm that combines the user rating value and the user behavior value has been proposed. The user behavior value is obtained from the user score probability in assessing the genre data. The problem with the algorithm is it only considers genre data for capturing user behavior value. Therefore, this study proposes a new similarity algorithm – so-called User Profile Correlation-based Similarity (UPCSim) – that examines the genre data and the user profile data, namely age, gender, occupation, and location. All the user profile data are used to find the weights of the similarities of user rating value and user behavior value. The weights of both similarities are obtained by calculating the correlation coefficients between the user profile data and the user rating or behavior values. An experiment shows that the UPCSim algorithm outperforms the previous algorithm on recommendation accuracy, reducing MAE by 1.64% and RMSE by 1.4%.


2007 ◽  
Vol 11 (6) ◽  
pp. 36-45 ◽  
Author(s):  
Paul Heymann ◽  
Georgia Koutrika ◽  
Hector Garcia-Molina

2021 ◽  
pp. 1-8
Author(s):  
P. Shanmuga Sundari ◽  
M. Subaji

The recommendation system is affected with attacks when the users are given liberty to rate the items based on their impression about the product or service. Some malicious user or other competitors’ try to inject fake rating to degrade the item’s graces that are mostly adored by several users. Attacks in the rating matrix are not executed just by a single profile. A group of users profile is injected into rating matrix to decrease the performance. It is highly complex to extract the fake ratings from the mixture of genuine profile as it resides the same pattern. Identifying the attacked profile and the target item of the fake rating is a challenging task in the big data environment. This paper proposes a unique method to identify the attacks in collaborating filtering method. The process of extracting fake rating is carried out in two phases. During the initial phase, doubtful user profile is identified from the rating matrix. In the following phase, the target item is analysed using push attack count to reduce the false positive rates from the doubtful user profile. The proposed model is evaluated with detection rate and false positive rates by considering the filler size and attacks size. The experiment was conducted with 6%, 8% and 10% filler sizes and with different attack sizes that ranges from 0%–100%. Various classification techniques such as decision tree, logistic regression, SVM and random forest methods are used to classify the fake ratings. From the results, it is witnessed that SVM model works better with random and bandwagon attack models at an average of 4% higher accuracy. Similarly the decision tree method performance better at an average of 3% on average attack model.


2016 ◽  
Vol 1 (2) ◽  
pp. 77-87
Author(s):  
Hanaa Radwan ◽  
Sorayia Abd El Fattah ◽  
Maaly El Malky ◽  
Gehan Abed ◽  
Lamiaa Eita,

Author(s):  
Ana Carolina Tomé Klock ◽  
Isabela Gasparini ◽  
Marcelo Soares Pimenta ◽  
José Palazzo M. de Oliveira

Adaptive hypermedia systems are systems that modify the different visible aspects based on the user profile. To provide this adaptation, the system is modeled according to a user model, which stores the information about each user. This information can include knowledge, interests, goals and tasks, background and skills, behavior, interaction preferences, individual traits, and context of the user. This chapter's goal is to introduce adaptive hypermedia systems fundamentals and trends. In this context, this chapter identifies some methods and techniques used to adapt the content, the presentation, and the navigation of the system. In the end, some applications (ELM-ART, Interbook, AHA!, AdaptWeb®) and trends (standardization, data mining, social web, device adaptation, and gamification) are exposed. As a result, this chapter highlights the importance of the improvement and the use of adaptive systems.


Author(s):  
Agostino Poggi ◽  
Michele Tomaiuolo

Social web sites are used daily by many millions of users. They have attracted users with very weak interest in technology, including absolute neophytes of computers in general. Common users of social web sites often have a carefree attitude in sharing information. Moreover, some system operators offer sub-par security measures, which are not adequate for the high value of the published information. For all these reasons, online social networks suffer more and more attacks by sophisticated crackers and scammers. To make things worse, the information gathered from social web sites can trigger attacks to even more sensible targets. This work reviews some typical social attacks that are conducted on social networking systems, describing real-world examples of such violations and analyzing in particular the weakness of password mechanisms. It then presents some solutions that could improve the overall security of the systems.


Author(s):  
Rabi Narayan Behera ◽  
Sujata Dash

Due to rapid digital explosion user shows interest towards finding suggestions regarding a particular topic before taking any decision. Nowadays, a movie recommendation system is an upcoming area which suggests movies based on user profile. Many researchers working on supervised or semi-supervised ensemble based machine learning approach for matching more appropriate profiles and suggest related movies. In this paper a hybrid recommendation system is proposed which includes both collaborative and content based filtering to design a profile matching algorithm. A nature inspired Particle Swam Optimization technique is applied to fine tune the profile matching algorithm by assigning to multiple agents or particle with some initial random guess. The accuracy of the model will be judged comparing with Genetic algorithm.


Sign in / Sign up

Export Citation Format

Share Document