4.5 Article

A survey on context-aware recommender systems based on computational intelligence techniques

期刊

COMPUTING
卷 97, 期 7, 页码 667-690

出版社

SPRINGER WIEN
DOI: 10.1007/s00607-015-0448-7

关键词

Computational intelligence; Context-aware recommendation personalization; User preferences

向作者/读者索取更多资源

The demand for ubiquitous information processing over the Web has called for the development of context-aware recommender systems capable of dealing with the problems of information overload and information filtering. Contemporary recommender systems harness context-awareness with the personalization to offer the most accurate recommendations about different products, services, and resources. However, such systems come across the issues, such as sparsity, cold start, and scalability that lead to imprecise recommendations. Computational Intelligence (CI) techniques not only improve recommendation accuracy but also substantially mitigate the aforementioned issues. Large numbers of context-aware recommender systems are based on the CI techniques, such as: (a) fuzzy sets, (b) artificial neural networks, (c) evolutionary computing, (d) swarm intelligence, and (e) artificial immune systems. This survey aims to encompass the state-of-the-art context-aware recommender systems based on the CI techniques. Taxonomy of the CI techniques is presented and challenges particular to the context-aware recommender systems are also discussed. Moreover, the ability of each of the CI techniques to deal with the aforesaid challenges is also highlighted. Furthermore, the strengths and weaknesses of each of the CI techniques used in context-aware recommender systems are discussed and a comparison of the techniques is also presented.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Hardware & Architecture

Blockchain-based decentralized workload and energy management of geo-distributed data centers

Sara Sajid, Muhammad Jawad, Kanza Hamid, Muhammad U. S. Khan, Sahibzada M. Ali, Assad Abbas, Samee U. Khan

Summary: The paper investigates the energy consumption cost optimization problem in cloud data centers and proposes a blockchain-based decentralized workload distribution and management model, which can effectively reduce power consumption costs.

SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS (2021)

Article Computer Science, Artificial Intelligence

Learning to rank: An intelligent system for person reidentification

Samee Ullah Khan, Ijaz Ul Haq, Noman Khan, Khan Muhammad, Mohammad Hijji, Sung Wook Baik

Summary: Person reidentification (P-Reid) is a growing research field aiming to identify individuals in multiview surveillance videos; current fully supervised learning techniques face scalability issues due to overfitting in real-world scenarios; LR-Net framework proposes a solution through fine-tuning, siamese network, and fusion strategy, achieving significant improvements in handling unlabeled data.

INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS (2022)

Article Chemistry, Analytical

Atrous Convolutions and Residual GRU Based Architecture for Matching Power Demand with Supply

Samee Ullah Khan, Ijaz Ul Haq, Zulfiqar Ahmad Khan, Noman Khan, Mi Young Lee, Sung Wook Baik

Summary: This study proposes an intelligent deep learning framework that integrates different neural network layers to match power demand with supply, accurately predict short-term energy demand, and provide effective communication methods. Through data acquisition, preprocessing, and feature extraction, the sequential learning model is utilized to optimize energy management, achieving better performance compared to existing approaches.

SENSORS (2021)

Article Mathematics

CL-Net: ConvLSTM-Based Hybrid Architecture for Batteries' State of Health and Power Consumption Forecasting

Noman Khan, Ijaz Ul Haq, Fath U. Min Ullah, Samee Ullah Khan, Mi Young Lee

Summary: The proposed CL-Net architecture based on ConvLSTM and LSTM significantly reduces root mean squared error (RMSE) on the NASA battery and IHEPC datasets compared to the state-of-the-arts, providing robust and accurate SOH and power consumption forecasting.

MATHEMATICS (2021)

Article Mathematics

AB-Net: A Novel Deep Learning Assisted Framework for Renewable Energy Generation Forecasting

Noman Khan, Fath U. Min Ullah, Ijaz Ul Haq, Samee Ullah Khan, Mi Young Lee, Sung Wook Baik

Summary: The article introduces a new architecture AB-Net for intelligent matching of renewable energy generation and consumption for efficient energy management. This method combines an autoencoder and bidirectional long short-term memory network in steps such as data acquisition, preprocessing, and feature extraction, achieving good prediction results.

MATHEMATICS (2021)

Article Chemistry, Analytical

SELWAK: A Secure and Efficient Lightweight and Anonymous Authentication and Key Establishment Scheme for IoT Based Vehicular Ad hoc Networks

Sagheer Ahmed Jan, Noor Ul Amin, Junaid Shuja, Assad Abbas, Mohammed Maray, Mazhar Ali

Summary: This paper proposes an efficient and secure lightweight anonymous mutual authentication and key establishment (SELWAK) scheme for IoT-based VANETs. Performance evaluation and security analysis demonstrate its effectiveness in terms of computational cost and communication overhead.

SENSORS (2022)

Article Agronomy

Compact Convolutional Transformer (CCT)-Based Approach for Whitefly Attack Detection in Cotton Crops

Aqeel Iftikhar Jajja, Assad Abbas, Hasan Ali Khattak, Gniewko Niedbala, Abbas Khalid, Hafiz Tayyab Rauf, Sebastian Kujawa

Summary: Cotton, as an economically significant agricultural product, is susceptible to pest and virus attacks. This study proposes a Compact Convolutional Transformer (CCT)-based approach for classifying cotton leaf images, achieving higher accuracy compared to existing models.

AGRICULTURE-BASEL (2022)

Article Computer Science, Information Systems

A modified secure hash design to circumvent collision and length extension attacks

Zeyad A. Al-Odat, Samee U. Khan, Eman Al-Qtiemat

Summary: This paper introduces an improved version of the secure hash algorithms SHA-1 and SHA-2. The proposed design strengthens the security of the algorithms by combining the standards of SHA-1 and SHA-2, and it has been verified through various test cases.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2022)

Article Automation & Control Systems

Deep Learning Assists Surveillance Experts: Toward Video Data Prioritization

Tanveer Hussain, Fath U. Min Ullah, Samee Ullah Khan, Amin Ullah, Umair Haroon, Khan Muhammad, Sung Wook Baik, Victor Hugo C. de Albuquerque

Summary: Video summarization is important for suppressing high-dimensional video data. However, prior research has not focused on the need for surveillance video summarization, and mainstream techniques lack event occurrence detection. Therefore, we propose a two-fold 3-D deep learning-assisted framework for video summarization.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2023)

Proceedings Paper Computer Science, Artificial Intelligence

Mining Influential Training Data by Tracing Influence on Hard Validation Samples

Qikai Zhang, Fan Zhang, Samee U. Khan

Summary: In this paper, we propose a method to co-prune the validation dataset and the training dataset by mining the most influential training data, which can effectively reduce training time and model complexity while maintaining accuracy.

2022 IEEE 34TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE, ICTAI (2022)

Proceedings Paper Computer Science, Information Systems

HCA Operator: A Hybrid Cloud Auto-scaling Tooling for Microservice Workloads

Yuyang Wang, Fan Zhang, Samee U. Khan

Summary: This paper presents a customized Kubernetes controller called HCA Operator, which can auto-scale microservice applications in a hybrid cloud environment. By load balancing, monitoring, and autoscaling, it achieves automatic expansion between destination clusters in different clouds.

2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN (2022)

Proceedings Paper Computer Science, Information Systems

Facial Expression Recognition System on a Distributed Edge-Cloud Infrastructure

Kai Cui, Guoting Zhang, Fan Zhang, Samee U. Khan

Summary: This paper discusses the deployment of facial expression recognition system on a distributed edge-cloud infrastructure and introduces a solution. By executing different algorithms on the edge and cloud separately, the performance can be improved and network overhead can be reduced.

2022 IEEE CLOUD SUMMIT (2022)

Proceedings Paper Computer Science, Information Systems

Quantitative Evaluation of Cloud Elasticity based on Fuzzy Analytic Hierarchy Process

Bo Yang, Fan Zhang, Samee U. Khan

Summary: This article proposes an assessment method for cloud elasticity based on fuzzy hierarchical analysis, aiming to quantify and compare the elastic features among different public cloud providers. The effectiveness of the method is verified through case studies and performance metric evaluations.

2022 IEEE CLOUD SUMMIT (2022)

Article Computer Science, Information Systems

Fingerprinting Technique for YouTube Videos Identification in Network Traffic

Waleed Afandi, Syed Muhammad Ammar Hassan Bukhari, Muhammad U. S. Khan, Tahir Maqsood, Samee U. Khan

Summary: Recently, the increased traffic from video streaming services like YouTube, Twitch, and Facebook raises concerns about the transmission of unwanted and inappropriate content to minors or individuals at workplaces. To address this issue, researchers propose a fingerprinting method that accommodates for Variable Bit-Rate (VBR) inconsistencies, and optimize a Convolutional Neural Network (CNN) to detect YouTube streams in various network traffic conditions.

IEEE ACCESS (2022)

Article Computer Science, Hardware & Architecture

Online Algorithms for the Interval Scheduling Problem in the Cloud: Affinity Pair Threshold Based Approaches

Panagiotis Oikonomou, Nikos Tziritas, Thanasis Loukopoulos, Georgios Theodoropoulos, Masatoshi Hanai, Samee U. Khan

Summary: This paper discusses the online version of the interval scheduling problem and proposes a novel algorithm for preprocessing bin packing schemes and providing job allocation recommendations based on job overlaps. Experimental results show the advantages of this approach compared to existing algorithms.

IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING (2022)

暂无数据