Review of Recommendation System Methodologies
DOI:
https://doi.org/10.61841/sc5r5j51Keywords:
Customization, Audio Recognition, Deep Learning.Abstract
Recommender systems became extraordinarily common in recent years. Companies, such as Amazon or eBay, developed an outsized variety of products to fulfill totally different desires of customers. There is an increasing variety of choices, measured out to the customers. Thus, during this new level of customization, so as to search out what they actually need, customers should frame a model or method from an outsized quantity of data provided by businesses. One answer to ease this drawback is recommender systems. On one hand, traditional systems recommend things supported by totally different criteria, such as the past preferences of users or user profiles. On the other hand, deep learning techniques deliver the goods promising performance in numerous areas, like PC vision, audio recognition, and language processing. However, applications of deep learning in recommender systems haven't been well explored. Many progressive deep recommendation systems are discussed in this analysis.
Downloads
References
[1] Resnick P Varian H R. “Recommender Systems” ACM 1997.
[2] Prem Melville, Raymond J Mooney, and Ramadass Nagarajan, “Content-boosted
collaborative filtering for improved recommendations” In AAAI/IAAI, pages 187-192, 2002.
[3] Yehuda Koren, “Factorization meets the neighborhood: a multifaceted collaborative
filtering model” In Proceedings of the 14th ACM SIGKDD international conference
on Knowledge discovery and data mining, pages 426-434. ACM, 2008.
[4] Yehuda Koren, Robert Bell, and Chris Volinsky, “Matrix factorization techniques for recommender
systems” Computer, (8):30-37, 2009.
[5] Xiaoyuan Su and Taghi M Khoshgoftaar. A survey of collaborative filtering techniques. Advances in
artificial intelligence, 2009:4, 2009.
[6] Chong Wang and David M Blei., “Collaborative topic modeling for recommending scientific articles” In
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining,
pages 448-456. ACM, 2011.
[7] Yao Wu and Martin Ester. “FLAME: A probabilistic model combining aspect based opinion mining and
collaborative filtering” In WSDM, pages 199-208. ACM, 2015.
[8] Qiming Diao, Minghui Qiu, Chao-Yuan Wu, Alexander J. Smola, Jing Jiang, and Chong Wang, “Jointly
modeling aspects, ratings and sentiments for movie recommendation (JMARS)” In KDD, pages 193-202.
ACM, 2014
[9] Yang Bao, Hui Fang, and Jie Zhang, “Topicmf: Simultaneously exploiting ratings and reviews for
recommendation” In AAAI, pages 2-8. AAAI Press, 2014.
[10] Zunping Cheng, Neil Hurley,” Effective Diverse and Obfuscated Attacks on Model-based Recommender
Systems” 2009 ACM.
[11] Meenakshi Sharma and Sandeep Mann, “A Survey of Recommender Systems: Approaches and
Limitations”, ICAECE 2013.
[12] Hendrik Drachsler, Hans G.K. Hummeland Rob Koper, “Personal recommender systems for learners in
lifelong learning networks: the requirements, techniques and model”.
[13] Lei C, Liu D, Li W, et al. Comparative deep learning of hybrid representations for image
recommendations[C]// IEEE Conference on Computer Vision and Pattern Recognition. IEEE, 2016:2545-
2553.
[14] Chiliguano P, Fazekas G. Hybrid music recommender using content-based and social information[C]// IEEE
International Conference on Acoustics, Speech and Signal Processing. IEEE, 2016:2618-2622.
[15] Mcfee B, Bertin-Mahieux T, Ellis D P W, et al. The million song dataset challenge[C]// International
Society for Music Information Retrieval Conference, Ismir 2011, Miami, Florida, Usa, October. DBLP,
2012:909-916.
[16] Wu S, Ren W, Yu C, et al. Personal recommendation using deep recurrent neural networks in NetEase[C]//
IEEE, International Conference on Data Engineering. IEEE, 2016:1218-1229.
[17] Zuo Y, Zeng J, Gong M, et al. Tag-aware recommender systems based on deep neural networks [J]. Neuro
computing, 2016, 204:51-60.
[18] Prabhadevi S., Javavel S., Kapoor R., “Algorithm of sentiment analysis for computing machines”, Journal
of Scientific and Industrial Research, Volume 74, Issue 12, Pages 670 - 674, December.
[19] Yathisha, L., Pavithra, A.C.,& ShasidharGokhale, S. (2014). Novel Optimal LQR Switching Control
Method for the Speed Control of DC Motor, International Journal of Advances in Engineering and
Emerging Technology,5(6), 248-257.
[20] Rajagopala Krishnan, N. (2014). Asynchronous FPGA Cell‟s Design with Autonomous Power Gating
and LEDR Encoding. Excel International Journal of Technology, Engineering and Management,1(3), 84-
90.
[21] Slimani, T. (2014). RST Approach for Efficient CARs Mining. Bonfring International Journal of Data
Mining, 4(4), 34-40.
[22] Moradi, H., Namdaran, T., Gooran, P.R., Pouradad, E., &Aivazie, M.R. (2015). Design and Analysis of
Equivalent Circuit Model Laser VSCEL Parameters Using Photonics. International Academic Journal of
Innovative Research, 2(8), 20-37.
[23] Ramahrishnan, S., Geetha, B.E.R., & P. Vasuki, (2014). Image Encryption Using Chaotic Maps in Hybrid
Domain. International Journal of Communication and Computer Technologies, 2(2), 74-78.
[24] Vani E., Rengarajan N. (2017). Improving the power quality of the wind power system using low cost
topology. International Journal of Modelling and Simulation, 37(2).
[25] Jagan K., Sivasankaran S., Bhuvaneswari M., Rajan S. (2018). Effect of thermal radiation and slip on
unsteady 3D MHD nanofluid flow over a non-linear stretching sheet in a porous medium with convective
boundary condition. Journal of Physics: Conference Series, 1139(1).
[26] Jamuna P., Ramesh S. (2018). Experimental Validation of Impedance Source Network Based Active Power
Filter for Interconnection of PV System into Grid. Journal of Circuits, Systems and Computers, 27(14).
[27] Kumar S.S., Karthick M. (2018). An Secured Data Transmission in Manet Networks with Optimizing Link
State Routing Protocol Using ACO-CBRP Protocols. ICSNS 2018 - Proceedings of IEEE International
Conference on Soft-Computing and Network Security.
[28] Rameshkumar, T., Rajendran, I., &Latha, A. D. (2010). Investigation on the mechanical and tribological
properties of aluminium-tin based plain bearing material. Tribology in industry, 32(2), 3-10.
[29] E. Latha Mercy, R. Karthick and S. Arumugam, (2010). Fuzzy Controlled Shunt Active Power Filter for
Power Quality Improvement. International Journal of Soft Computing, 5(2), 35-41.
[30] Sivasankaran, S., Sivakumar, V., & Prakash, P. (2010). Numerical study on mixed convection in a lid-driven
cavity with non-uniform heating on both sidewalls. International journal of heat and mass transfer, 53(19-
20), 4304-4315.
[31] Kavitha, S., Karthikeyan, S., &Duraiswamy, K. (2010, July). Early detection of glaucoma in retinal images
using cup to disc ratio. In 2010 Second International conference on Computing, Communication and
Networking Technologies (pp. 1-5). IEEE.
[32] Sengottaiyan, N., Somasundaram, R., &Arumugam, S. (2010, October). A modified approach for measuring
TCP performance in wireless adhoc network. In 2010 International Conference on Advances in Recent
Technologies in Communication and Computing (pp. 267-270). IEEE.
[33] Ravi, S., &Balakrishnan, P. A. (2010, October). Modelling and control of an anfis temperature controller for
plastic extrusion process. In 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL
AND COMPUTING TECHNOLOGIES (pp. 314-320). IEEE.
[34] Senthilkumar, J., Chandrasekaran, M., Suresh, Y., Arumugam, S., &Mohanraj, V. (2011). Advertisement
timeout driven bee's mating approach to maintain fair energy level in sensor networks. Applied Soft
Computing, 11(5), 4029-4035.
[35] Peter, K. J., Glory, G. G. S., Arguman, S., Nagarajan, G., Devi, V. S., &Kannan, K. S. (2011, April).
Improving ATM security via face recognition. In 2011 3rd International Conference on Electronics
Computer Technology (Vol. 6, pp. 373-376). IEEE.
[36] Samikannu, R., &Poonamallie, B. A. (2011). Design of synthetic optimizing neuro fuzzy temperature
controller for dual screw profile plastic extruder using labview. Journal of Computer Science, 7(5), 671-677.
[37] Kavitha, S., &Duraiswamy, K. (2011). Adaptive neuro-fuzzy inference system approach for the automatic
screening of diabetic retinopathy in fundus images.
[38] Ravi, S., Sudha, M., &Balakrishnan, P. A. (2011). Design of intelligent self-tuning GA ANFIS temperature
controller for plastic extrusion system. Modelling and Simulation in Engineering, 2011.
[39] Anto Bennet, M. Jacob Raglend.(2012) „A Novel Method Of Reduction Of Blocking Artifact Using
Machine Learning Metric approach‟. Journal of Applied Sciences Research, 8(5), 2429-2438.
[40] Senthilkumar, J., Chandrasekaran, M., Suresh, Y., Arumugam, S., &Mohanraj, V. (2011). Advertisement
timeout driven bee's mating approach to maintain fair energy level in sensor networks. Applied Soft
Computing, 11(5), 4029-4035.
[41] Karthikeswaran, D., Sudha, V. M., Suresh, V. M., & Sultan, A. J. (2012, March). A Pattern based
framework for privacy preservation through Association rule Mining. In IEEE-International Conference On
Advances In Engineering, Science And Management (ICAESM-2012) (pp. 816-821). IEEE.
[42] Suresh, V. M., Karthikeswaran, D., Sudha, V. M., &Chandraseker, D. M. (2012, March). Web server load
balancing using SSL back-end forwarding method. In IEEE-International Conference On Advances In
Engineering, Science And Management (ICAESM-2012) (pp. 822-827). IEEE.
[43] Bennet, M. A., &Raglend, I. J. (2012). Performance, Analysis of Filtering Schedule Using Deblocking Filter
for the Reduction of Block Artifacts from MPEQ Compressed Document Images.
[44] Vijayakumar, J., &Arumugam, S. (2013, October). Certain investigations on foot rot disease for betelvine
plants using digital imaging technique. In 2013 International Conference on Emerging Trends in
Communication, Control, Signal Processing and Computing Applications (C2SPCA) (pp. 1-4). IEEE.
[45] Gnanasaravanan, S., &Rajkumar, P. (2013). Characterization of minerals in natural and manufactured sand
in Cauvery River belt, Tamilnadu, India. Infrared Physics & Technology, 58, 21-31.
[46] Kumar, T. S., &Sampath, V. R. (2013). Prediction of dimensional properties of weft knitted cardigan fabric
by artificial neural network system. Journal of Industrial Textiles, 42(4), 446-458.
[47] AntoBennet M., Jacob Raglend I. (2013). Performance and analysis of compression artifacts reduction for
Mpeq-2 moving pictures using TV regularization method. Life Science Journal, 10(2):102-110.
[48] Kumar, V., &Sampath, V.R. (2013). Investigation on the physical and dimensional properties of single
jersey fabrics made from cotton sheath-elastomeric core spun. Fibres& Textiles in Eastern Europe, (3 (99)),
73-75.
[49] Ravi, S., Balakrishnan, P. A., Marimuthu, C. N., &Sujitha, C. (2014). Design of synthetic optimizing neuro
fuzzy temperature controller for twin screw profile plastic extruder using labview. Intelligent Automation &
Soft Computing, 20(1), 92-100.
[50] Reka, M., &Shanthi, N. (2014). Relation based mining model for enhancing web document clustering. Int J
EngTechnol, 6(2).
[51] Peter, K. J., Arumugam, S., &Kannan, K. S. (2014). Inter Channel Correlation based Demosaicking
Algorithm for Enhanced Bayer Color Filter Array. Research Journal of Applied Sciences, Engineering and
Technology, 7(15), 3049-3055.
[52] Chandrasekar A., &Arumugam S.A fuzzy approach for representative node selection in cross layer TCP.
Journal of Theoretical and Applied Information Technology, 64(1), 1-15.
[53] Shankar, S., Manikandan, M., &Kalayarasan, M. (2014). Dynamic contact analysis of total hip prosthesis
during normal active walking cycle. International Journal of Biomedical Engineering and Technology,
15(2), 114-127.
[54] Mohankumar G.B., &Manoharan S. (2015). Performance analysis of multi converter unified power quality
conditioner with dual feeder system using Fuzzy logic control. International Journal of Control and
Automation, 8(3), 251-270.
[55] Sophia S., BoselinPrabhu S.R., DhakshinaMoorthi P., Senthil Raja D., Arun Kumar N. (2015). Distributed
clustering using enhanced hierarchical methodology for dense WSN fields. International Journal of Applied
Engineering Research 10(6):15581-15591.
[56] Sukumar P., &Gnanamurthy R.K. (2015). Computer Aided Detection of Cervical Cancer Using Pap Smear
Images Based on Hybrid Classifier. International Journal of Applied Engineering Research 10(8):21021-
21032.
[57] Deepa S., Marimuthu C.N., &Dhanvanthri V. (2015). Enhanced Q-LEACH routing protocol for wireless
sensor networks. ARPN Journal of Engineering and Applied Sciences 10(9).
[58] Siva C., &Arumugam S. (2015). Route reliability ranking algorithm for prefix hijacking attacks in border
gateway protocol. ARPN Journal of Engineering and Applied Sciences 10(10).
[59] Krishna Gandhi P., Prabhakaran S. (2015). An intelligent power meter system. International Journal of
Applied Engineering Research 10(10): 26435-26446.
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Author
This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.