2019
DOI: 10.5373/jardcs/v11i11/20193173
|View full text |Cite
|
Sign up to set email alerts
|

A Comparative Evaluation on Different Types of Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 0 publications
0
5
0
Order By: Relevance
“…The comparative analysis of the proposed improved hybrid recommender system is conducted against the existing content and collaborative recommender systems. These existing methods include content-based recommender system (CBRS), Pearson correlation based collaborative recommender system (PCRS), Frequencyweighted Pearson Correlation (FPC), Weighted Pearson Correlation (WPC), and hybrid recommender systems (HRS) [9] are compared. In this section, the configuration of each experiment is defined in a single table.…”
Section: Analysis Resultsmentioning
confidence: 99%
“…The comparative analysis of the proposed improved hybrid recommender system is conducted against the existing content and collaborative recommender systems. These existing methods include content-based recommender system (CBRS), Pearson correlation based collaborative recommender system (PCRS), Frequencyweighted Pearson Correlation (FPC), Weighted Pearson Correlation (WPC), and hybrid recommender systems (HRS) [9] are compared. In this section, the configuration of each experiment is defined in a single table.…”
Section: Analysis Resultsmentioning
confidence: 99%
“…The Internet of Things has broad application prospects, but due to its unique composition, its application in the Internet of Things is increasing, and its threat to information security is also becoming increasingly serious. Therefore, how to effectively implement security protection for the Internet of Things has become an urgent task [15]. On the basis of in-depth research on the attack patterns and security requirements faced by the perception layer of the Internet of Things, this article adopts an intelligent and lightweight GRU-LSTM algorithm intrusion detection technology.…”
Section: Intrusion Detection Technologymentioning
confidence: 99%
“…The next extension is the Internet of Nano Things (IoNT) which uses NanoTechnology to connect objects at nano scale. Disaster management, Rescue operations, battlefields, and other critical missions uses Internet of Mission-Critical Things (IoMCT), is the next evolution thereof, and the devices equipped with integrated mobile sensors establish communication among themselves through the Internet of Mobile Things (IoMT) [66].…”
Section: )mentioning
confidence: 99%