This paper discussed the most commonly used similarity measures in Collaborative Filtering(CF) recommender system. In addition, the author introduced some recommendations related to CF system quality improvement which...
详细信息
This paper discussed the most commonly used similarity measures in Collaborative Filtering(CF) recommender system. In addition, the author introduced some recommendations related to CF system quality improvement which should be considered in the process of formulating similarity measure that may lead to alleviating the issue of data sparsity and some existing measures shortcomings. Generally, CF approach is one of the most widely used and most successful methods for the recommendation system, such as e-commerce. CF system introduced items to the user based on his/her previous ratings and the ratings of his/her neighbors. Therefore, the most important stage in CF system is locating the successful neighbor. Nevertheless, the sparsity of data is the major issue faced by the memory-based CF. The reason behind this is that many of the users rated a few number of items from the huge number of available items. This has encouraged many researchers to provide solutions. One of these solutions was by proposing or updating similarities measures take in considerations the global information preference, all ratings provided by users, the size of common ratings, and so on. In this work, the researcher discussed these measures alongside with their limitations. In addition, the researcher also listed some advices that are important in the process of locating successful neighbors, which may help researchers to improve the quality of CF system.
The performance of Ad hoc routing protocol always has been measured by using free-space model and Two-ray ground model. But these two models are very simple and can't represent real world propagation, because they...
详细信息
ISBN:
(纸本)9781479938599
The performance of Ad hoc routing protocol always has been measured by using free-space model and Two-ray ground model. But these two models are very simple and can't represent real world propagation, because they ignored the effect of obstacles in their environment representation. So the most real models is shadowing propagation model which has taken all these factors in account. This paper explains the effect of using two types of propagation models which are: Two Ray Ground model and shadowing model for two important protocols such as Destination Sequenced Distance Vector (DSDV) and Optimized Link Status Routing (OLSR), which are considered a proactive and Table Driven routing protocols and then different performance metrics has been measured. The simulations results have shown that the type of the propagation model has great impact on routing protocol, and it has effected severely on its performance.
The newly admitted students for the undergraduate programmes in the institutions of higher learning sometimes experience some academic adjustment that is associated with stress;many factors have been attributed to thi...
详细信息
The newly admitted students for the undergraduate programmes in the institutions of higher learning sometimes experience some academic adjustment that is associated with stress;many factors have been attributed to this, which most times, results in the high percentage of failure and low Grade Point Average(GPA). Computing the earlier academic achievements for these sets of students would make one to be abreast of their level of knowledge academically, in order to be well-informed of their areas of weakness and strength. In this paper, an enhancement of Feed-forward Neural Network for the creation of a network model to predict the students' performance based on their historical data is proposed. In the course of experimentations with Matlab software, two network models are created using the existing and enhanced feed-forward neural network techniques. The ability of these models to generalize is measured using simulation methods. The enhanced network model consistently shows a high degree of accuracy and predicts well. The performance of students predicted as outstanding, can also be supported financially in the form of scholarship;while those that are found to be academically weak can be encouraged and rightly counseled at the early stage of their studies.
Adopted to solve optimization problems, meta-heuristic algorithms aim to judiciously explore the search space in search of the good optimal solution. As such, the effectiveness of any particular meta-heuristic algorit...
详细信息
Adopted to solve optimization problems, meta-heuristic algorithms aim to judiciously explore the search space in search of the good optimal solution. As such, the effectiveness of any particular meta-heuristic algorithm is heavily dependent on their control parameters, that is, to ensure balance exploration and exploitation. In the field of t-way testing, much work has been done to adopt meta-heuristic algorithms for generating interaction test suite(where t indicates the interaction strength). In this paper, we propose an Adaptive Flower Pollination Algorithm(AFPA) for pairwise testing. Unlike the original Flower Pollination Algorithm(FPA), our AFPA removes the static probability dependency inherent in FPA(i.e. for selection of local and global search operator). Specifically, we allow a dynamic and adaptive probability instead. The experimental results show that AFPA can produce the optimum results in many cases. AFPA also demonstrates its capacity to dynamically control global and local search based on the system configuration.
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion sys...
详细信息
Intrusion detection is a problem of great significance to protecting information systems security, especially in view of the worldwide increasing incidents of cyber-attacks. This paper focus on improving intrusion system in wireless local area network by using Support Vector Machines (SVM). The data that are used in our experiments originated from a computer Lab. SVM performs intrusion detection based on recognized attack patterns. Simulation result show that proposed detection system can recognizes anomalies and raises an alarm. In addition, evaluation produced a better result in terms of the detection efficiency and false alarm rate which may give better coverage, and make the detection more effective.
In modern distributed systems, replication receives particular awareness to provide high data availability, reliability and enhance the performance of the system. Replication becomes as significant mechanism since it ...
详细信息
This paper presents an approach of modeling a relational data by graphs using a specific open source format named Graph Exchange XML Format (GEXF), this approach can take us from a random data stored in a relational m...
详细信息
Verlhust logistic map f(x) = r x (1 - x) is a widely studied and applicable model in discrete dynamical system. Its behavior has been, extensively, studied in Picard orbit and recently studied in superior orbit. Rani ...
详细信息
A network with critical data streams, where the timing of incoming and outgoing data is a necessity, is called a deterministic network. These networks are mostly used in association with real-time systems that use per...
详细信息
Yoking-proofs show an interesting application in Radio Frequency Identification (RFID) that a verifier can check whether two tags are simultaneously scanned by a reader. We consider a scenario that multi-group of tags...
详细信息
暂无评论