25 research outputs found
A Collaborative Location Based Travel Recommendation System through Enhanced Rating Prediction for the Group of Users
Rapid growth of web and its applications has created a colossal importance for recommender systems. Being applied in various domains, recommender systems were designed to generate suggestions such as items or services based on user interests. Basically, recommender systems experience many issues which reflects dwindled effectiveness. Integrating powerful data management techniques to recommender systems can address such issues and the recommendations quality can be increased significantly. Recent research on recommender systems reveals an idea of utilizing social network data to enhance traditional recommender system with better prediction and improved accuracy. This paper expresses views on social network data based recommender systems by considering usage of various recommendation algorithms, functionalities of systems, different types of interfaces, filtering techniques, and artificial intelligence techniques. After examining the depths of objectives, methodologies, and data sources of the existing models, the paper helps anyone interested in the development of travel recommendation systems and facilitates future research direction. We have also proposed a location recommendation system based on social pertinent trust walker (SPTW) and compared the results with the existing baseline random walk models. Later, we have enhanced the SPTW model for group of users recommendations. The results obtained from the experiments have been presented
A Secure Recommendation System for Providing Context-Aware Physical Activity Classification for Users
Advances in Wireless Body Area Networks, where embedded accelerometers, gyroscopes, and other sensors empower users to track real-time health data continuously, have made it easier for users to follow a healthier lifestyle. Various other apps have been intended to choose suitable physical exercise, depending on the current healthcare environment. A Mobile Application (Mobile App) based recommendation system is a technology that allows users to select an apt activity that might suit their preferences. However, most of the current applications require constant input from end-users and struggle to include those who have hectic schedules or are not dedicated and self-motivated. This research introduces a methodology that uses a �Selective Cluster Cube� recommender system to intelligently monitor and classify user behavior by collecting accelerometer data and synchronizing with its calendar. We suggest customized daily workouts based on historical user and related user habits, interests, physical status, and accessibility. Simultaneously, the exposure of customer requirements to the server is also a significant concern. Developing privacy-preserving protocols with basic cryptographic techniques (e.g., protected multi-party computing or HE) is a standard solution to address privacy issues, but in combination with state-of-the-art advising frameworks, it frequently provides far-reaching solutions. This paper proposes a novel framework, a Privacy Protected Recommendation System (PRIPRO), that employs HE for securing private user data. The PRIPRO model is compared for accuracy and robustness using standard evaluation parameters against three datasets
A Secure Big Data Storage Framework Based on Blockchain Consensus Mechanism With Flexible Finality
Data security and integrity are becoming increasingly important as the volume of data being created and stored grows. A controlled third party that provides most of the existing big data security systems makes them susceptible to several security risks. By resolving current technology challenges, including scalability, non-tampering, trustworthiness, data governance, and transparency, blockchain technology plays a vital role and has a significant potential to safeguard personal information. Therefore, this work focuses on addressing real-time big data storage issues based on a transdisciplinary research approach. This study introduces a brand-new approach to big data storage security that leverages blockchain technology and applies highway protocol to generate new blocks. The proposed highway protocol works based on the flexible finality condition to overcome issues of baseline models. The highway allows blocks to run the consensus mechanism to configure security thresholds more freely. The proposed protocol also allows blocks with lower thresholds to reach finality more quickly than blocks requiring greater degrees of confidence. Therefore, the proposed big data framework can dynamically control data manipulation and continuously support individuals to participate in the data-sharing process. A comparison was performed with the number of data requests in terms of hit ratio, and a highway protocol provides better results than baseline models. The proposed model provides a data processing period of 13 to 30 ms and an energy consumption of 32 to 41 mJ
Real-Time Automatic Investigation of Indian Roadway Animals by 3D Reconstruction Detection Using Deep Learning for R-3D-YOLOv3 Image Classification and Filtering
Statistical reports say that, from 2011 to 2021, more than 11,915 stray animals, such as cats, dogs, goats, cows, etc., and wild animals were wounded in road accidents. Most of the accidents occurred due to negligence and doziness of drivers. These issues can be handled brilliantly using stray and wild animals-vehicle interaction and the pedestrians’ awareness. This paper briefs a detailed forum on GPU-based embedded systems and ODT real-time applications. ML trains machines to recognize images more accurately than humans. This provides a unique and real-time solution using deep-learning real 3D motion-based YOLOv3 (DL-R-3D-YOLOv3) ODT of images on mobility. Besides, it discovers methods for multiple views of flexible objects using 3D reconstruction, especially for stray and wild animals. Computer vision-based IoT devices are also besieged by this DL-R-3D-YOLOv3 model. It seeks solutions by forecasting image filters to find object properties and semantics for object recognition methods leading to closed-loop ODT