Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (4)
  • Open Access

    ARTICLE

    Context-Aware Practice Problem Recommendation Using Learners’ Skill Level Navigation Patterns

    P. N. Ramesh1,*, S. Kannimuthu2

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3845-3860, 2023, DOI:10.32604/iasc.2023.031329 - 17 August 2022

    Abstract The use of programming online judges (POJs) has risen dramatically in recent years, owing to the fact that the auto-evaluation of codes during practice motivates students to learn programming. Since POJs have greater number of programming problems in their repository, learners experience information overload. Recommender systems are a common solution to information overload. Current recommender systems used in e-learning platforms are inadequate for POJ since recommendations should consider learners’ current context, like learning goals and current skill level (topic knowledge and difficulty level). To overcome the issue, we propose a context-aware practice problem recommender system… More >

  • Open Access

    ARTICLE

    User Interaction Based Recommender System Using Machine Learning

    R. Sabitha1, S. Vaishnavi2,*, S. Karthik1, R. M. Bhavadharini3

    Intelligent Automation & Soft Computing, Vol.31, No.2, pp. 1037-1049, 2022, DOI:10.32604/iasc.2022.018985 - 22 September 2021

    Abstract In the present scenario of electronic commerce (E-Commerce), the in-depth knowledge of user interaction with resources has become a significant research concern that impacts more on analytical evaluations of recommender systems. For staying in aggressive E-Commerce, various products and services regarding distinctive requirements must be provided on time. Moreover, because of the large amount of product information available online, Recommender Systems (RS) are required to analyze the availability of consumers, which improves the decision-making of customers with detailed product knowledge and reduces time consumption. With that note, this paper derives a new model called User… More >

  • Open Access

    ARTICLE

    Effective Hybrid Content-Based Collaborative Filtering Approach for Requirements Engineering

    Qusai Y. Shambour*, Abdelrahman H. Hussein, Qasem M. Kharma, Mosleh M. Abualhaj

    Computer Systems Science and Engineering, Vol.40, No.1, pp. 113-125, 2022, DOI:10.32604/csse.2022.017221 - 26 August 2021

    Abstract Requirements engineering (RE) is among the most valuable and critical processes in software development. The quality of this process significantly affects the success of a software project. An important step in RE is requirements elicitation, which involves collecting project-related requirements from different sources. Repositories of reusable requirements are typically important sources of an increasing number of reusable software requirements. However, the process of searching such repositories to collect valuable project-related requirements is time-consuming and difficult to perform accurately. Recommender systems have been widely recognized as an effective solution to such problem. Accordingly, this study proposes More >

  • Open Access

    ARTICLE

    Adversarial Attacks on Content-Based Filtering Journal Recommender Systems

    Zhaoquan Gu1, Yinyin Cai1, Sheng Wang1, Mohan Li1, *, Jing Qiu1, Shen Su1, Xiaojiang Du1, Zhihong Tian1

    CMC-Computers, Materials & Continua, Vol.64, No.3, pp. 1755-1770, 2020, DOI:10.32604/cmc.2020.010739 - 30 June 2020

    Abstract Recommender systems are very useful for people to explore what they really need. Academic papers are important achievements for researchers and they often have a great deal of choice to submit their papers. In order to improve the efficiency of selecting the most suitable journals for publishing their works, journal recommender systems (JRS) can automatically provide a small number of candidate journals based on key information such as the title and the abstract. However, users or journal owners may attack the system for their own purposes. In this paper, we discuss about the adversarial attacks More >

Displaying 1-10 on page 1 of 4. Per Page