• Title/Summary/Keyword: Recommended Algorithm

Search Result 271, Processing Time 0.029 seconds

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.

A New Item Recommendation Procedure Using Preference Boundary

  • Kim, Hyea-Kyeong;Jang, Moon-Kyoung;Kim, Jae-Kyeong;Cho, Yoon-Ho
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.81-99
    • /
    • 2010
  • Lately, in consumers' markets the number of new items is rapidly increasing at an overwhelming rate while consumers have limited access to information about those new products in making a sensible, well-informed purchase. Therefore, item providers and customers need a system which recommends right items to right customers. Also, whenever new items are released, for instance, the recommender system specializing in new items can help item providers locate and identify potential customers. Currently, new items are being added to an existing system without being specially noted to consumers, making it difficult for consumers to identify and evaluate new products introduced in the markets. Most of previous approaches for recommender systems have to rely on the usage history of customers. For new items, this content-based (CB) approach is simply not available for the system to recommend those new items to potential consumers. Although collaborative filtering (CF) approach is not directly applicable to solve the new item problem, it would be a good idea to use the basic principle of CF which identifies similar customers, i,e. neighbors, and recommend items to those customers who have liked the similar items in the past. This research aims to suggest a hybrid recommendation procedure based on the preference boundary of target customer. We suggest the hybrid recommendation procedure using the preference boundary in the feature space for recommending new items only. The basic principle is that if a new item belongs within the preference boundary of a target customer, then it is evaluated to be preferred by the customer. Customers' preferences and characteristics of items including new items are represented in a feature space, and the scope or boundary of the target customer's preference is extended to those of neighbors'. The new item recommendation procedure consists of three steps. The first step is analyzing the profile of items, which are represented as k-dimensional feature values. The second step is to determine the representative point of the target customer's preference boundary, the centroid, based on a personal information set. To determine the centroid of preference boundary of a target customer, three algorithms are developed in this research: one is using the centroid of a target customer only (TC), the other is using centroid of a (dummy) big target customer that is composed of a target customer and his/her neighbors (BC), and another is using centroids of a target customer and his/her neighbors (NC). The third step is to determine the range of the preference boundary, the radius. The suggested algorithm Is using the average distance (AD) between the centroid and all purchased items. We test whether the CF-based approach to determine the centroid of the preference boundary improves the recommendation quality or not. For this purpose, we develop two hybrid algorithms, BC and NC, which use neighbors when deciding centroid of the preference boundary. To test the validity of hybrid algorithms, BC and NC, we developed CB-algorithm, TC, which uses target customers only. We measured effectiveness scores of suggested algorithms and compared them through a series of experiments with a set of real mobile image transaction data. We spilt the period between 1st June 2004 and 31st July and the period between 1st August and 31st August 2004 as a training set and a test set, respectively. The training set Is used to make the preference boundary, and the test set is used to evaluate the performance of the suggested hybrid recommendation procedure. The main aim of this research Is to compare the hybrid recommendation algorithm with the CB algorithm. To evaluate the performance of each algorithm, we compare the purchased new item list in test period with the recommended item list which is recommended by suggested algorithms. So we employ the evaluation metric to hit the ratio for evaluating our algorithms. The hit ratio is defined as the ratio of the hit set size to the recommended set size. The hit set size means the number of success of recommendations in our experiment, and the test set size means the number of purchased items during the test period. Experimental test result shows the hit ratio of BC and NC is bigger than that of TC. This means using neighbors Is more effective to recommend new items. That is hybrid algorithm using CF is more effective when recommending to consumers new items than the algorithm using only CB. The reason of the smaller hit ratio of BC than that of NC is that BC is defined as a dummy or virtual customer who purchased all items of target customers' and neighbors'. That is centroid of BC often shifts from that of TC, so it tends to reflect skewed characters of target customer. So the recommendation algorithm using NC shows the best hit ratio, because NC has sufficient information about target customers and their neighbors without damaging the information about the target customers.

The Design of Service Quality Information Systems for Telephone Communication (전화통신 서비스품질정보시스템 설계에 관한 연구)

  • 염창선
    • Journal of Korean Society for Quality Management
    • /
    • v.29 no.3
    • /
    • pp.97-108
    • /
    • 2001
  • The information system for measuring and analyzing service quality of telephone network is designed on the service quality scheme recommended by ITU(International Telecommunication Union) in this study. The information system is composed of the equipments which measure service quality and the systems which analyze the measured data. The schedule algorithm for effectively operating measurement equipments which are located over public switched telephone network is proposed. The functions of the Information system are Introduced. The information system improves the service quality effectively.

  • PDF

Filter design for the improvement of robustness in adaptive control systems

  • Kim, Kook-Hun;Hur, Myung-Joon;Yang, Heung-Suk
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.866-870
    • /
    • 1989
  • Direct application of adaptive algorithm to the actual I/O is not a good strategy. The importance of using a kind of filter for estimation or control is strongly recommended. Simple pre-filtering method and pseudo-plant method is introduced. And, the properties of each methods are compared by analysis and/or simulations. A guideline for the choice of filters are proposed.

  • PDF

Globally Optimal Recommender Group Formation and Maintenance Algorithm using the Fitness Function (적합도 함수를 이용한 최적의 추천자 그룹 생성 및 유지 알고리즘)

  • Kim, Yong-Ku;Lee, Min-Ho;Park, Soo-Hong;Hwang, Cheol-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.50-56
    • /
    • 2009
  • This paper proposes a new algorithm of clustering similar nodes defined as nodes having similar characteristic values in pure P2P environment. To compare similarity between nodes, we introduce a fitness function whose return value depends only on the two nodes' characteristic values. The higher the return value is, the more similar the two nodes are. We propose a GORGFM algorithm newly in conjunction with the fitness function to recommend and exchange nodes' characteristic values for an interest group formation and maintenance. With the GORGFM algorithm, the interest groups are formed dynamically based on the similarity of users, and all nodes will highly satisfy with the information recommended and received from nodes of the interest group. To evaluate of performance of the GORGFM algorithm, we simulated a matching rate by the total number of nodes of network and the number of iterations of the algorithm to find similar nodes accurately. The result shows that the matching rate is highly accurate. The GORGFM algorithm proposed in this paper is highly flexible to be applied for any searching system on the web.

A Development of an Automatic Itinerary Planning Algorithm based on Expert Recommendation (전문가 추천 경로 패턴화 방법을 활용한 자동여정생성 알고리듬)

  • Kim, Jae Kyung;Oh, So Jin;Song, Hee Seok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.1
    • /
    • pp.31-40
    • /
    • 2020
  • In this study, we developed an algorithm for automatic travel itinerary planning based on expert recommendation. The proposed algorithm generates an itinerary by patterning a number of travel routes based on the automatic itinerary generation method based on the routes recommended by travel experts. To evaluate the proposed algorithm, we generated 30 itinerary for Singapore, Bankok, and Da Nang using both algorithms and analyzed the mean difference of trip distances with t-test and interater reliability of those itineraries. The result shows that the itineraries based on the proposed algorithm is not different from that of VRP(Vehicle routing problem) algorithm and interater reliability is high enough to show that the proposed algorithm is effective enough for real-world usage.

EHL Analysis of connecting Rod Bearings Considering Effects of Temperature Variation (온도 변화의 영향을 고려한 커넥팅 로드 베어링의 EHL 해석)

  • 김병직;김경웅
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2000.06a
    • /
    • pp.114-120
    • /
    • 2000
  • EHL analysis of connecting rod bearing is proposed which includes effects of temperature variation in lubrication film. Lubrication film temperature is treated as a time-dependent, two-dimensional variable which is averaged over the film thickness, while connecting rod big end temperature is assumed to be time-independent and three-dimensional. It is assumed that a portion of the heat generated by viscous dissipation in the lubrication Him is absorbed by the film itself, and the remainder flows into the bearing surface. Mass-conserving cavitation algorithm is applied and the effect of variable viscosity is included to solve the Reynolds equation. Simulation results of the connecting rod bearing of internal combustion engine are presented. It is shown that the temperature variation has remarkable effects on the bearing performance. It is concluded that the EHL analysis considering effects of the temperature variation is strongly recommended to predict the bearing performance of connecting rod big end On internal combustion engine.

  • PDF

Improvement of Packet Loss Concealment Algorithm by Utilizing Next Good Frame Info. (손실이후 프레임 정보에 의한 패킷손실은닉 알고리즘 개선)

  • Kim Jae-Hyun;Hahn Min-Soo
    • MALSORI
    • /
    • no.43
    • /
    • pp.101-112
    • /
    • 2002
  • In real time packetized voice application, missing packets are major source of voice quality degradation. Thus packet loss concealment (PLC) algorithms are needed to guarantee QoS of VoIP. In this paper, we describe packet loss concealment scheme utilizing the next good frame which follows loss packets. When this scheme is combined with other PLC algorithms, such as G.711 pitch waveform replication recommended by ITU-T LP based PLC algorithm, additional voice quality improvement is obtained for consecutive packet loss larger than 60 msec.

  • PDF

One-time Traversal Algorithm to Search Modules in a Fault Tree for the Risk Analysis of Safety-critical Systems (안전필수 계통의 리스크 평가를 위한 일회 순회 고장수목 모듈 검색 알고리즘)

  • Jung, Woo Sik
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.3
    • /
    • pp.100-106
    • /
    • 2015
  • A module or independent subtree is a part of a fault tree whose child gates or basic events are not repeated in the remaining part of the fault tree. Modules are necessarily employed in order to reduce the computational costs of fault tree quantification. This quantification generates fault tree solutions such as minimal cut sets, minimal path sets, or binary decision diagrams (BDDs), and then, calculates top event probability and importance measures. This paper presents a new linear time algorithm to detect modules of large fault trees. It is shown through benchmark tests that the new method proposed in this study can very quickly detect the modules of a huge fault tree. It is recommended that this method be implemented into fault tree solvers for efficient probabilistic safety assessment (PSA) of nuclear power plants.

Conversion of the Sonic Conductance C and the Critical Pressure Ratio b into the Airflow Coefficient ${\mu}$

  • Grymek Szymon;Kiczkowiak Tomasz
    • Journal of Mechanical Science and Technology
    • /
    • v.19 no.9
    • /
    • pp.1706-1710
    • /
    • 2005
  • In a case of computer simulation used for the verification of pneumatic system performance one of the main problems is that various parameters can be used to describe flow characteristics of the system components. The Standard ISO 6358 offers two parameters: the sonic conductance C and the critical static pressure ratio b, but the parameters can not be directly utilised in an analysis of a pneumatic system. In the standard analysis there is applied the airflow coefficient ${\mu}$, but it is not presented in the vendors' catalogues. In the paper the numerical algorithm for calculation of the airflow coefficient ${\mu}$. (which is required for computer simulation) as a function of sonic conductance C and a critical pressure ratio b (recommended by the standard) is presented. Additionally, because of the iterative character of the described algorithm, an artificial neural network approach to solve the problem is proposed.