A Survey of Recommendation Algorithms
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Recommender system can be defined as the subclass of information filtering system which attemptsto give the guidance to the users regarding the useful services based on their personalized preferences, pastbehavior or based on their similar likings with other users. The various approaches of recommendation systems,like content-based, collaborative filtering, hybrid, etc, can further be classified according to their algorithmictechnique as memory-based (heuristic) or model-based recommendation algorithms. Service recommendersystems provides appropriate recommendations of services like movies, hotels, gadgets, etc, leading to anincrease in the amount of data on the web, known as Big Data. It is becoming difficult to capture, store, manageand analyze such big data that affects the service recommender systems with issues like scalability andinefficiency. Also many existing service recommender system provides the same recommendations to differentusers based on ratings and rankings only, without considering the taste and preference of an individual user.This paper presents a survey on various recommendation algorithms, elaborating all its types along with itsdrawbacks. The paper also focuses on the solutions to overcome these drawbacks and provide aptrecommendations to the users. It also deals with the solution to provide apt recommendations of the services tothe users in big data environment. The issues of scalability and inefficiency while managing big data can besolved by using a distributed computing platform known as Hadoop.
Authors and Affiliations
Ruchita V. Tatiya , Prof. Archana S. Vaidya
Identify the surgically altered face images using granular-PCA approach
Abstract: Plastic surgery provide a way to enhance the facial appearance. The non-linear variations introduced by the plastic surgery has raised a challenge for face recognition algorithms. In this research we ma...
Secured Source Anonymous Message Authentication UsingWireless Sensor Network
Abstract: The secured exchange of message was the main concern. To overcome this, message authenticationschemes were developed, to maintain the privacy of message. Message authentication schemes are based onsymmetric key...
Detection of Clone Attack in Wsn
Abstract: One of the most vexing problems in wireless sensor network security is the node Clone attack. In thisattack, an adversary breaks into a sensor node, reprograms it, and inserts several copies of the node b...
Implementing High Performance Retrieval Process by Max-Score Ranking
This paper presents a comparison report of two different processes of retrieving a keyword or data’s from a given database or from a multiple databases. The process1 known as Extended Boolean Retrieval (EBR)model...
Machine Translation Approaches and Design Aspects
Machine translation is a sub-field of computational linguistics that investigates the use of software to translate text or speech from one natural language to another. On a basic level, MT performs simple subst...