Improving Customer Behaviour Prediction with the Item2Item model in Recommender Systems
Journal Title: EAI Endorsed Transactions on Industrial Networks and Intelligent Systems - Year 2018, Vol 5, Issue 17
Abstract
Recommender Systems are the most well-known applications in E-commerce sites. However, the trade-off between runtime and the accuracy in making recommendations is a big challenge. This work combines several traditional techniques to reduce the limitation of each single technique and exploits the Item2Item model to improve the prediction accuracy. As a case study, this paper focuses on user behaviour prediction in restaurant recommender systems and uses a public dataset including restaurant information and user sessions. Within this dataset, user behaviour can be discovered for the collaborative filtering, and restaurant information is extracted for the content-based filtering. The idea of the pre-trained word embedding in Natural Language Processing is utilized in the item-based collaborative filtering to find the similarity between restaurants based on user sessions. Experimental results have shown that the combination of these techniques makes valuable recommendations.
Authors and Affiliations
T. T. S. Nguyen, P. M. T. Do, T. T. Nguyen
A networkless data exchange and control mechanism for virtual testbed devices
Virtualization has become a key component of network testbeds. However, transmitting data or commands to the test nodes is still either a complicated task or makes use of the nodes' network interfaces, which may interfer...
Securing Smart Grid In-Network Aggregation through False Data Detection
Existing prevention-based secure in-network data aggregation schemes for the smart grids cannot eectively detect accidental errors and falsified data injected by malfunctioning or compromised meters. In this work, we de...
Towards an augmented reality guiding system for assisted indoor remote vehicle navigation
Scientific facilities usually require the use of vehicles controlled remotely by an operator relying on the information provided by a camera. However, the operator lacks of depth perception, which makes difficult the nav...
Security-Reliability Analysis of Multi-hop LEACH Protocol with Fountain Codes and Cooperative Jamming
In this paper, we investigate trade-off between security and reliability of Fountain codes (FCs) based low-energy adaptive clustering hierarchy (LEACH) networks, where the encoded packets are sent to the destination by u...
Multi-Radio 5G Architecture for Connected and Autonomous Vehicles: Application and Design Insights
Connected and Autonomous Vehicles (CAVs) will play a crucial role in next-generation Cooperative Intelligent Transportation Systems (C-ITSs). Not only is the information exchange fundamental to improve road safety and ef...