With the rapid development of the information technologies in the financial field, extracting meaningful information from a massive amount of data is hugely significant for efficient business decision making. The reco...
With the rapid development of the information technologies in the financial field, extracting meaningful information from a massive amount of data is hugely significant for efficient business decision making. The recommendation system is an intelligent system that applies historical knowledge of users to infer their preferences and make a personalized recommendation. However, it suffers from the problem of time effect of user's behaviour, which means a user's interests may change over time. To overcome this problem, we propose a time effect based collaborative filtering approach to adaptively statistics the change of user preferences. Firstly, Item-based collaborative filtering is used to calculate rating similarity between items. Since an Item-based collaborative filtering algorithm doesn't consider the time effect; next, the time decay function is proposed to statistics the change of user interests. Experimental results show that the proposed scheme retained higher accuracy compare to traditional collaborative filtering method.
With the recent remarkable and fast evolution in telecommunication and computing technologies, great amounts of individuals' tabular-formatted data are collected and used by several organizations in the society. I...
详细信息
To model the interdependent couplings of multiple topics, we develop a set of rules for opinion updates of a group of agents. The rules are used to design or assign values to the elements of interdependent weighting m...
详细信息
Were analyzed different conceptual models that apply identity management for authentication, authorization, auditing (AAA) with confidentiality, integrity and availability (CIA) to mitigate information security. The a...
详细信息
Were analyzed different conceptual models that apply identity management for authentication, authorization, auditing (AAA) with confidentiality, integrity and availability (CIA) to mitigate information security. The aim is to develop a conceptual model to determine the organizational structure and define security levels in the next phase to develop or adopt algorithms and security protocols. It was used deductive method in exploratory research to verify trends in security models. Turned out the conceptual model for identity management for civil registration of Ecuador in a distributed environment. It was determined the conceptual model to identify vulnerabilities in the security of information.
Cooperation is the backbone of modern human societies, making it a priority to understand how successful cooperation-sustaining mechanisms operate. Cyclic dominance, a non-transitive setup comprising at least three st...
详细信息
Login System is the important process to identify the right for accessing the application by identifying and authenticating. Usually, username and password are the personal details of user for accessing the system. Ho...
详细信息
In this paper we present the fundamental concept, as well as, the objectives and the architecture of HarmonicSS EU project. The proposed architecture envisages to address (i) the lack of patient stratification in larg...
详细信息
The problem of distributed function computation is studied, where functions to be computed is not necessarily symbol-wise. A new method to derive a converse bound for distributed computing is proposed;from the structu...
详细信息
暂无评论