• Title/Summary/Keyword: user similarity

Search Result 491, Processing Time 0.025 seconds

Gated Recurrent Unit Architecture for Context-Aware Recommendations with improved Similarity Measures

  • Kala, K.U.;Nandhini, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.538-561
    • /
    • 2020
  • Recommender Systems (RecSys) have a major role in e-commerce for recommending products, which they may like for every user and thus improve their business aspects. Although many types of RecSyss are there in the research field, the state of the art RecSys has focused on finding the user similarity based on sequence (e.g. purchase history, movie-watching history) analyzing and prediction techniques like Recurrent Neural Network in Deep learning. That is RecSys has considered as a sequence prediction problem. However, evaluation of similarities among the customers is challenging while considering temporal aspects, context and multi-component ratings of the item-records in the customer sequences. For addressing this issue, we are proposing a Deep Learning based model which learns customer similarity directly from the sequence to sequence similarity as well as item to item similarity by considering all features of the item, contexts, and rating components using Dynamic Temporal Warping(DTW) distance measure for dynamic temporal matching and 2D-GRU (Two Dimensional-Gated Recurrent Unit) architecture. This will overcome the limitation of non-linearity in the time dimension while measuring the similarity, and the find patterns more accurately and speedily from temporal and spatial contexts. Experiment on the real world movie data set LDOS-CoMoDa demonstrates the efficacy and promising utility of the proposed personalized RecSys architecture.

A Weighted Preliminary Cut-off Indoor Positioning Scheme Based on Similarity between Peaks of RSSI (최대 RSSI 간의 유사도를 기반으로 한 가중치 부여 사전 컷-오프 실내 위치 추정 방식)

  • Kim, Dongjun;Son, Jooyoung
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.7
    • /
    • pp.772-778
    • /
    • 2018
  • We have previously proposed a preliminary cut-off indoor positioning scheme considering the reference point with the same signal similarity. This scheme estimates the position using the relative rank of the peak of received signal strength from the beacons around user. However, this scheme has a weak point with lower accuracy when there are more than one nearest reference points having the same signal similarity. In order to tackle this, we propose a weighted preliminary cut-off indoor positioning scheme. Firstly, if the above problem occurs, the similarity to the peak of signal strength is considered as well as the relative rank. Next, weights are assigned to the nearest reference points using the similarity to the peak of the received signal strength. Finally, the user's position is estimated by applying the weights. As a result, the weighted preliminary cut-off scheme improves the positioning accuracy by about 7.9% compared to the previous scheme.

A Behavior-based Authentication Using the Measuring Cosine Similarity (코사인 유사도 측정을 통한 행위 기반 인증)

  • Gil, Seon-Woong;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.17-22
    • /
    • 2020
  • Behavior-based authentication technology, which is currently being researched a lot, requires a long extraction of a lot of data to increase the recognition rate of authentication compared to other authentication technologies. This paper uses the touch sensor and the gyroscope embedded in the smartphone in the Android environment to measure five times to the user to use only the minimum data that is essential among the behavior feature data used in the behavior-based authentication study. By requesting, a total of six behavior feature data were collected by touching the five touch screen, and the mean value was calculated from the changes in data during the next touch measurement to measure the cosine similarity between the value and the measured value. After generating the allowable range of cosine similarity by performing, we propose a user behavior based authentication method that compares the cosine similarity value of the authentication attempt data. Through this paper, we succeeded in demonstrating high performance from the first EER of 37.6% to the final EER of 1.9% by adjusting the threshold applied to the cosine similarity authentication range even in a small number of feature data and experimenter environments.

An Analysis Scheme Design of Customer Spending Pattern using Text Mining (텍스트 마이닝을 이용한 소비자 소비패턴 분석 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.2
    • /
    • pp.181-188
    • /
    • 2018
  • In this paper, we propose an analysis scheme of customer spending pattern using text mining. In proposed consumption pattern analysis scheme, first we analyze user's rating similarity using Pearson correlation, second we analyze user's review similarity using TF-IDF cosine similarity, third we analyze the consistency of the rating and review using Sendiwordnet. And we select the nearest neighbors using rating similarity and review similarity, and provide the recommended list that is proper with consumption pattern. The precision of recommended list are 0.79 for the Pearson correlation, 0.73 for the TF-IDF, and 0.82 for the proposed consumption pattern. That is, the proposed consumption pattern analysis scheme can more accurately analyze consumption pattern because it uses both quantitative rating and qualitative reviews of consumers.

The Effect of Co-rating on the Recommender System of User Base

  • Lee, Hee-Choon;Lee, Seok-Jun;Chung, Young-Jun
    • Journal of the Korean Data and Information Science Society
    • /
    • v.17 no.3
    • /
    • pp.775-784
    • /
    • 2006
  • This study is to investigate the effect of the number of co-rated users to the MAE. User based collaborative algorithm generally uses similarity weight to compute the relation of active user and other users. The original estimation algorithm of the GroupLens used the Pearson's correlation coefficient, soon after other researchers used various weighting. The Pearson’s correlation coefficient and Vector similarity, which is used in the field of information retrieval, are commonly used to the estimation algorithm. In prediction, we analyze the effect of the number of co-rated users on the user based recommender system.

  • PDF

A Trajectory Substitution Privacy Protection Scheme in location-based services

  • Song, Cheng;Zhang, Yadong;Gu, Xinan;Wang, Lei;Liu, Zhizhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4771-4787
    • /
    • 2019
  • Aimed at the disclosure risk of mobile terminal user's location privacy in location-based services, a location-privacy protection scheme based on similar trajectory substitution is proposed. On the basis of the anonymized identities of users and candidates who request LBS, this scheme adopts trajectory similarity function to select the candidate whose trajectory is the most similar to user's at certain time intervals, then the selected candidate substitutes user to send LBS request, so as to protect user's privacy like identity, query and trajectory. Security analyses prove that this scheme is able to guarantee such security features as anonymity, non-forgeability, resistance to continuous query tracing attack and wiretapping attack. And the results of simulation experiment demonstrate that this scheme remarkably improve the optimal candidate' trajectory similarity and selection efficiency.

Adaptive User Profile for Information Retrieval from the Web

  • Srinil, Phaitoon;Pinngern, Ouen
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1986-1989
    • /
    • 2003
  • This paper proposes the information retrieval improvement for the Web using the structure and hyperlinks of HTML documents along with user profile. The method bases on the rationale that terms appearing in different structure of documents may have different significance in identifying the documents. The method partitions the occurrence of terms in a document collection into six classes according to the tags in which particular terms occurred (such as Title, H1-H6 and Anchor). We use genetic algorithm to determine class importance values and expand user query. We also use this value in similarity computation and update user profile. Then a genetic algorithm is used again to select some terms from user profile to expand the original query. Lastly, the search engine uses the expanded query for searching and the results of the search engine are scored by similarity values between each result and the user profile. Vector space model is used and the weighting schemes of traditional information retrieval were extended to include class importance values. The tested results show that precision is up to 81.5%.

  • PDF

A Study of IPTV-VOD Program Recommendation System using Collaborative Filtering (협업 필터링을 이용한 IPTV-VOD 프로그램 추천 시스템에 대한 연구)

  • Sun, Chul-Yong;Kang, Yong-Jin;Park, Kyu-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.10
    • /
    • pp.1453-1462
    • /
    • 2010
  • In this paper, a new program recommendation system is proposed to recommend user preferred VOD program in IPTV environment. A proposed system is implemented with collaborative filtering method. For a user profile which describes user program preference, a program preference, sub-genre preference, and US(user similarity) weight of the user neighborhood is averaged and updated every week. In order to evaluate system performance, real 24-weeks cable TV watching data provided by Nilson Research Corp. are modified to fit for IPTV broadcasting environment and the simulation result shows quite comparative quality of recommendation. The experimental results optimum performance when user similarity based weighting, five person per group and five recommendation programs are used.

Similarity Criteria in GUI and Icon Design - with an Emphasis on the Quantitative Evaluation using Checklists - (화상디자인의 유사성 판단기준에 대한 연구 - 체크리스트를 활용한 정량적인 평가 방법을 중심으로-)

  • 김소영;최민영;임창영
    • Archives of design research
    • /
    • v.16 no.4
    • /
    • pp.101-110
    • /
    • 2003
  • This paper is focused on the similarity of GUI design and proposes checklists for evaluating similarity of GUI design in quantitative way and more important factors in this checklists. On the first, consideration of similarity and analysis of GUI properties are made, and from these results, the categories that affect the evaluation of similarity are extracted. The categories are consisted of 5 factors, which are concept, shape, color, relation, and multimedia. The checklists from above 5 categories are tested in 3-stage, and in this paper, 11 checklists from shape, color, and relation factor of the second stage are verified by online survey. The purpose of this survey is to find out the difference between user groups(designer, computer related, etc) and more important factors in the checklists that affect the total results of similarity. In the results of survey, the checklists have no relation with the user groups and among the checklists, external shape, composition element, and design methods have impact factors on the evaluation of similarity.

  • PDF

Customized Knowledge Creation Framework using Context- and intensity-based Similarity (상황과 정보 집적도를 고려한 유사도 기반의 맞춤형 지식 생성프레임워크)

  • Sohn, Mye M.;Lee, Hyun-Jung
    • Journal of Internet Computing and Services
    • /
    • v.12 no.5
    • /
    • pp.113-125
    • /
    • 2011
  • As information resources have become more various and the number of the resources has increased, knowledge customization on the social web has been becoming more difficult. To reduce the burden, we offer a framework for context-based similarity calculation for knowledge customization using ontology on the CBR. Thereby, we newly developed context- and intensity-based similarity calculation methods which are applied to extraction of the most similar case considered semantic similarity and syntactic, and effective creation of the user-tailored knowledge using the selected case. The process is comprised of conversion of unstructured web information into cases, extraction of an appropriate case according to the user requirements, and customization of the knowledge using the selected case. In the experimental section, the effectiveness of the developed similarity methods are compared with other edge-counting similarity methods using two classes which are compared with each other. It shows that our framework leads higher similarity values for conceptually close classes compared with other methods.