162,505 Hits in 5.8 sec

Robust Social Recommendation Techniques: A Review [chapter]

Feng Jiang, Min Gao, Qingyu Xiong, Junhao Wen, Yi Zhang
2016 IFIP Advances in Information and Communication Technology  
Furthermore, it proposes a future research framework for robust social recommendations including modeling and feature extraction of multidimensional relationships, social recommendation shilling attack  ...  models based on social relationships, the analysis of the relationships in social networks as well as the roles of relationships on recommendation, and robust social recommendation approaches taking multiple  ...  The social recommendations in this paper belong to a narrowly-defined social recommendation [9] : a kind of item recommendation technique combining the social relationships.  ... 
doi:10.1007/978-3-319-42102-5_6 fatcat:ilukv2qywjgdzfxyxcdds4umte

Filtering Techniques in Recommendation Systems: A Review

S. Shargunam, G. Rajakumar
2021 Asian Journal of Science and Applied Technology  
As a result, recommendation systems were necessary to reduce the amount of time spent looking for the best and most essential items.  ...  Recommendation systems are not new to the world, they have rapidly become prevalent, appearing in almost every type of technology on a daily basis.  ...  Robustness of RSs Another important issue with RSs is their resistance to attacks. RSs' robustness is a performance metric.  ... 
doi:10.51983/ajsat-2021.10.2.3059 fatcat:ftfwsfcnqregrhvri5hjn65era

A Review on Text Steganography Techniques

Mohammed Abdul Majeed, Rossilawati Sulaiman, Zarina Shukur, Mohammad Kamrul Hasan
2021 Mathematics  
The techniques related to each class are analyzed, and particularly the manner in which a unique strategy is provided for hiding secret data.  ...  Furthermore, we review the existing works in the development of approaches and algorithms related to text steganography; this review is not exhaustive, and covers research published from 2016 to 2021.  ...  In similar work suggested by [52] , a zero-width character (ZWC) algorithm-based technique was employed to hide secret data in social media messages.  ... 
doi:10.3390/math9212829 doaj:b8cb29df8ae44b2fb8aab4173ec498b3 fatcat:xudvbcx6hzfnxbskvbekr3xjqa

Facial emotion recognition techniques: a review

Piyush Saraswat, Manoj Kumar Pandey, Rajat Butola
2017 International Journal of Recent Scientific Research  
How to cite this article: Piyush Saraswat et al.2017, Facial Emotion Recognition Techniques: A Review. Int J Recent Sci Res. 8(5), pp. 16890-16892.  ...  In 2015, Leo Pauly and Deepa Sankar presented a new system of recommendation based on facial recognition and sensation detection. Chakraborty et al.  ... 
doi:10.24327/ijrsr.2017.0805.0238 fatcat:rt3jkpvbcbdvldjlsxn5baaa6i

Text Classification Techniques: A Literature Review

2018 Interdisciplinary Journal of Information, Knowledge, and Management  
Recommendations for Practitioners: Frame analysis, deception detection, narrative science where data expresses a story, healthcare applications to diagnose illnesses and conversation analysis are some  ...  of the recommendations suggested for practitioners.  ...  RECOMMENDATIONS FOR RESEARCHERS AND PRACTITIONERS Frame analysis for news articles, deception detection in social media data with respect to rumors, narrative science where data expresses a story, healthcare  ... 
doi:10.28945/4066 fatcat:6dio5bpajjf77lkrs7xdtciveu

A Review of Capital Budgeting Techniques

Oluseun Paseda
2020 Issues in Social Science  
This paper is a review of the literature on capital budgeting procedures.  ...  are reviewed here.  ...  Conclusion This paper has attempted a review of capital budgeting techniques in theory and practice. The material captured is far from complete.  ... 
doi:10.5296/iss.v8i2.18034 fatcat:y7l3775mejghljcvh7anhhe7ce

Recommender systems based on graph embedding techniques: A review

Yue Deng
2022 IEEE Access  
As the focus, this article systematically retrospects graph embedding-based recommendation from embedding techniques for bipartite graphs, general graphs and knowledge graphs, and proposes a general design  ...  Not until after the prevalence of machine learning did graph embedding techniques be a recent concentration, which can efficiently utilize complex and large-scale data.  ...  Citation information: DOI 10.1109/ACCESS.2022.3174197, IEEE Access Yue Deng: Recommender systems based on graph embedding techniques: A review TABLE 7.  ... 
doi:10.1109/access.2022.3174197 fatcat:s267xaasovh6ffaomi7l32pqyi

A review of clustering techniques and developments

Amit Saxena, Mukesh Prasad, Akshansh Gupta, Neha Bharill, Om Prakash Patel, Aruna Tiwari, Meng Joo Er, Weiping Ding, Chin-Teng Lin
2017 Neurocomputing  
This paper presents a comprehensive study on clustering: exiting methods and developments made at various times.  ...  Acknowledgement The authors would like to thank the anonymous reviewers for their valuable suggestions and comments to improve the quality of the paper.  ...  (ii) Clustering Using Representatives (CURE) CURE [35] is a clustering technique for dealing with large-scale databases, which is robust towards outliers and accepts clusters of various shapes and sizes  ... 
doi:10.1016/j.neucom.2017.06.053 fatcat:z2yzjsdwgnbzbam5bg3s4lu6ny

Reinforcement Learning and Modeling Techniques: A Review

H. R. Abdulqadir, A. M. Abdulazeez
2021 Zenodo  
The Reinforcement learning (RL) algorithms solve a wide range of problems we faced. The topic of RL has achieved a new, complete standard of public opinion.  ...  Q-learning (QL), by learning a conservative Q function that allows a policy to be below the predicted value of the Q function, is introduced by us, which aims to circumvent these restrictions.  ...  It enables one to extract planning techniques and recommendations to design a sustainable campus.  ... 
doi:10.5281/zenodo.4542638 fatcat:znj6mk274vfp3npqwm3mkm6rd4

Vigilance Decrement and Enhancement Techniques: A Review

Al-Shargie, Tariq, Mir, Alawar, Babiloni, Al-Nashash
2019 Brain Sciences  
Meanwhile, a discussion on the challenges of enhancement techniques is presented, with several suggested recommendations and alternative strategies to maintain an adequate level of vigilance for the task  ...  This paper presents the first comprehensive review on vigilance enhancement using both conventional and unconventional means, and further discusses the resulting contradictory findings.  ...  General Recommendation Testing for developed cognitive enhancement techniques is usually conducted in a quiet and controlled environment, such as a laboratory.  ... 
doi:10.3390/brainsci9080178 pmid:31357524 pmcid:PMC6721323 fatcat:pqczi4ovuzhkrpr6x4wlfulpuy

Android Security using NLP Techniques: A Review [article]

Sevil Sen, Burcu Can
2021 arXiv   pre-print
This study reviews these proposals and aim to explore possible research directions for future studies by presenting state-of-the-art in this domain.  ...  While attackers are improving their techniques, traditional solutions based on static and dynamic analysis have been also evolving.  ...  CLAP (Collaborative App Permission Recommendation) ] is a recommender system that recommends a list of potential requirements for the permission explanation.  ... 
arXiv:2107.03072v1 fatcat:yo3qc3w5jbhu7kb6db76hq2d2e

Sentiment Analysis Based on Movie Reviews using Various Classification Techniques : A Review

Karishma Kaushik, Mahesh Parmar
2021 International Journal of Scientific Research in Computer Science Engineering and Information Technology  
Since the perceptions of humans improve the effectiveness of products & since a movie'ssuccess or failure depending on its review, costs are rising, and a good sentiment analysis model needs to be developed  ...  A huge amount of data is created with the rapid growth of web technologies. Social networking sites are now popular and normal places where feelings can be shared by short messages.  ...  SENTIMENT ANALYSIS Social media was a part of people's lives; people use social media to study some areas of politics, film review, and commercialization.There are several websites such as Twitter  ... 
doi:10.32628/cseit217329 fatcat:lirfbmzznng6bjqj44uqasmmqa

Vision-Based Human Detection Techniques: A Descriptive Review

Shahriar Shakir Sumit, Dayang Rohaya Awang Rambli, Seyedali Mirjalili
2021 IEEE Access  
In contrast to other improved techniques, DPM is slower in speed. Consequently, a new dynamic technique has been recommended to make DPM faster and more accurate.  ...  Zhou et al. have given a brief review on the human detection and tracking techniques from a diagnostic and clinical perspective.  ... 
doi:10.1109/access.2021.3063028 fatcat:bklvpd5sqraq7pb3xe7w5sueli

Statistical Techniques for Environmental Sciences: A Review

Lishamol Tomy, Christophe Chesneau, Amritha K. Madhav
2021 Mathematical and Computational Applications  
This paper reviews the interdisciplinary collaboration between Environmental Sciences and Statistics.  ...  The usage of statistical methods as a problem-solving tool for handling environmental problems is the key element of this approach.  ...  Acknowledgments: We thank the two reviewers for the important remarks on the paper, completing the review in a thorough way. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/mca26040074 fatcat:wpk7mwc7zjd3fbo7yi66itumqe

A Review on Predictive Modeling Technique for Student Academic Performance Monitoring

Mat Asiah, Khidzir Nik Zulkarnaen, Deris Safaai, Mat Yaacob Nik Nurul Hafzan, Mohamad Mohd Saberi, Safaai Siti Syuhaida, Lim Meng Hee
2019 MATEC Web of Conferences  
To harvest an effective predictive model, it requires a good input data and variables, suitable predictive method as well as powerful and robust prediction model. , 0 (2019) MATEC Web of Conferences  ...  The objective of this paper is to review current research activities related to academic analytics focusing on predicting student academic performance.  ...  To predict student performance, methodological approach has been reviewed in this paper based on a few stages. H.  ... 
doi:10.1051/matecconf/201925503004 fatcat:ii56clkd75hexibokrueiix6dq
« Previous Showing results 1 — 15 out of 162,505 results