Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (23)
  • Open Access

    ARTICLE

    Graph Convolutional Network-Based Repository Recommendation System

    Zhifang Liao1, Shuyuan Cao1, Bin Li1, Shengzong Liu2,*, Yan Zhang3, Song Yu1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.137, No.1, pp. 175-196, 2023, DOI:10.32604/cmes.2023.027287

    Abstract GitHub repository recommendation is a research hotspot in the field of open-source software. The current problems with the repository recommendation system are the insufficient utilization of open-source community information and the fact that the scoring metrics used to calculate the matching degree between developers and repositories are developed manually and rely too much on human experience, leading to poor recommendation results. To address these problems, we design a questionnaire to investigate which repository information developers focus on and propose a graph convolutional network-based repository recommendation system (GCNRec). First, to solve insufficient information utilization in open-source communities, we construct a Developer-Repository… More >

  • Open Access

    ARTICLE

    IoT-Deep Learning Based Activity Recommendation System

    Sharmilee Kannan1,*, R. U. Anitha2, M. Divayapushpalakshmi3, K. S. Kalaivani4

    Computer Systems Science and Engineering, Vol.45, No.2, pp. 2001-2016, 2023, DOI:10.32604/csse.2023.031965

    Abstract The rising use of mobile technology and smart gadgets in the field of health has had a significant impact on the global community. Health professionals are increasingly making use of the benefits of these technologies, resulting in a major improvement in health care both in and out of clinical settings. The Internet of Things (IoT) is a new internet revolution that is a rising research area, particularly in health care. Healthcare Monitoring Systems (HMS) have progressed rapidly as the usage of Wearable Sensors (WS) and smartphones have increased. The existing framework of conventional telemedicine’s store-and-forward method has some issues, including… More >

  • Open Access

    ARTICLE

    Automatic Clustering of User Behaviour Profiles for Web Recommendation System

    S. Sadesh1,*, Osamah Ibrahim Khalaf2, Mohammad Shorfuzzaman3, Abdulmajeed Alsufyani3, K. Sangeetha4, Mueen Uddin5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3365-3384, 2023, DOI:10.32604/iasc.2023.030751

    Abstract Web usage mining, content mining, and structure mining comprise the web mining process. Web-Page Recommendation (WPR) development by incorporating Data Mining Techniques (DMT) did not include end-users with improved performance in the obtained filtering results. The cluster user profile-based clustering process is delayed when it has a low precision rate. Markov Chain Monte Carlo-Dynamic Clustering (MC2-DC) is based on the User Behavior Profile (UBP) model group’s similar user behavior on a dynamic update of UBP. The Reversible-Jump Concept (RJC) reviews the history with updated UBP and moves to appropriate clusters. Hamilton’s Filtering Framework (HFF) is designed to filter user data… More >

  • Open Access

    ARTICLE

    Content-Based Movie Recommendation System Using MBO with DBN

    S. Sridhar1,*, D. Dhanasekaran2, G. Charlyn Pushpa Latha3

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3241-3257, 2023, DOI:10.32604/iasc.2023.030361

    Abstract The content-based filtering technique has been used effectively in a variety of Recommender Systems (RS). The user explicitly or implicitly provides data in the Content-Based Recommender System. The system collects this data and creates a profile for all the users, and the recommendation is generated by the user profile. The recommendation generated via content-based filtering is provided by observing just a single user’s profile. The primary objective of this RS is to recommend a list of movies based on the user’s preferences. A content-based movie recommendation model is proposed in this research, which recommends movies based on the user’s profile… More >

  • Open Access

    ARTICLE

    Effective Customer Review Analysis Using Combined Capsule Networks with Matrix Factorization Filtering

    K. Selvasheela1,*, A. M. Abirami2, Abdul Khader Askarunisa3

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2537-2552, 2023, DOI:10.32604/csse.2023.029148

    Abstract Nowadays, commercial transactions and customer reviews are part of human life and various business applications. The technologies create a great impact on online user reviews and activities, affecting the business process. Customer reviews and ratings are more helpful to the new customer to purchase the product, but the fake reviews completely affect the business. The traditional systems consume maximum time and create complexity while analyzing a large volume of customer information. Therefore, in this work optimized recommendation system is developed for analyzing customer reviews with minimum complexity. Here, Amazon Product Kaggle dataset information is utilized for investigating the customer review.… More >

  • Open Access

    ARTICLE

    Deep Learning Enabled Social Media Recommendation Based on User Comments

    K. Saraswathi1,*, V. Mohanraj2, Y. Suresh2, J. Senthilkumar2

    Computer Systems Science and Engineering, Vol.44, No.2, pp. 1691-1702, 2023, DOI:10.32604/csse.2023.027987

    Abstract Nowadays, review systems have been developed with social media Recommendation systems (RS). Although research on RS social media is increasing year by year, the comprehensive literature review and classification of this RS research is limited and needs to be improved. The previous method did not find any user reviews within a time, so it gets poor accuracy and doesn’t filter the irrelevant comments efficiently. The Recursive Neural Network-based Trust Recommender System (RNN-TRS) is proposed to overcome this method’s problem. So it is efficient to analyse the trust comment and remove the irrelevant sentence appropriately. The first step is to collect… More >

  • Open Access

    ARTICLE

    XGBRS Framework Integrated with Word2Vec Sentiment Analysis for Augmented Drug Recommendation

    Shweta Paliwal1, Amit Kumar Mishra2,*, Ram Krishn Mishra3, Nishad Nawaz4, M. Senthilkumar5

    CMC-Computers, Materials & Continua, Vol.72, No.3, pp. 5345-5362, 2022, DOI:10.32604/cmc.2022.025858

    Abstract Machine Learning is revolutionizing the era day by day and the scope is no more limited to computer science as the advancements are evident in the field of healthcare. Disease diagnosis, personalized medicine, and Recommendation system (RS) are among the promising applications that are using Machine Learning (ML) at a higher level. A recommendation system helps inefficient decision-making and suggests personalized recommendations accordingly. Today people share their experiences through reviews and hence designing of recommendation system based on users’ sentiments is a challenge. The recommendation system has gained significant attention in different fields but considering healthcare, little is being done… More >

  • Open Access

    ARTICLE

    An Intelligent Recommendation System for Real Estate Commodity

    Tsung-Yin Ou1, Guan-Yu Lin2, Hsin-Pin Fu1, Shih-Chia Wei1, Wen-Lung Tsai3,*

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 881-897, 2022, DOI:10.32604/csse.2022.022637

    Abstract Most real estate agents develop new objects by visiting unfamiliar clients, distributing leaflets, or browsing other real estate trading website platforms, whereas consumers often rely on websites to search and compare prices when purchasing real property. In addition to being time consuming, this search process renders it difficult for agents and consumers to understand the status changes of objects. In this study, Python is used to write web crawler and image recognition programs to capture object information from the web pages of real estate agents; perform data screening, arranging, and cleaning; compare the text of real estate object information; as… More >

  • Open Access

    ARTICLE

    Fusion Recommendation System Based on Collaborative Filtering and Knowledge Graph

    Donglei Lu1, Dongjie Zhu2,*, Haiwen Du3, Yundong Sun3, Yansong Wang2, Xiaofang Li4, Rongning Qu4, Ning Cao1, Russell Higgs5

    Computer Systems Science and Engineering, Vol.42, No.3, pp. 1133-1146, 2022, DOI:10.32604/csse.2022.021525

    Abstract The recommendation algorithm based on collaborative filtering is currently the most successful recommendation method. It recommends items to the user based on the known historical interaction data of the target user. Furthermore, the combination of the recommended algorithm based on collaborative filtration and other auxiliary knowledge base is an effective way to improve the performance of the recommended system, of which the Co-Factorization Model (CoFM) is one representative research. CoFM, a fusion recommendation model combining the collaborative filtering model FM and the graph embedding model TransE, introduces the information of many entities and their relations in the knowledge graph into… More >

  • Open Access

    ARTICLE

    Generating A New Shilling Attack for Recommendation Systems

    Pradeep Kumar Singh1, Pijush Kanti Dutta Pramanik1, Madhumita Sardar1, Anand Nayyar2,3,*, Mehedi Masud4, Prasenjit Choudhury1

    CMC-Computers, Materials & Continua, Vol.71, No.2, pp. 2827-2846, 2022, DOI:10.32604/cmc.2022.020437

    Abstract A collaborative filtering-based recommendation system has been an integral part of e-commerce and e-servicing. To keep the recommendation systems reliable, authentic, and superior, the security of these systems is very crucial. Though the existing shilling attack detection methods in collaborative filtering are able to detect the standard attacks, in this paper, we prove that they fail to detect a new or unknown attack. We develop a new attack model, named Obscure attack, with unknown features and observed that it has been successful in biasing the overall top-N list of the target users as intended. The Obscure attack is able to… More >

Displaying 1-10 on page 1 of 23. Per Page  

Share Link