...A GRAPH BASED COLLABORATIVE AND CONTEXT AWARE RECOMMENDATION SYSTEM FOR TV PROGRAMS A THESIS SUBMITTED TO THE GRADUATE SCHOOL OF NATURAL AND APPLIED SCIENCES OF MIDDLE EAST TECHNICAL UNIVERSITY BY EMRAH ŞAMDAN IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER ENGINEERING SEPTEMBER 2014 Approval of the thesis: A GRAPH BASED COLLABORATIVE AND CONTEXT AWARE RECOMMENDATION SYSTEM FOR TV PROGRAMS submitted by EMRAH ŞAMDAN in partial fulfillment of the requirements for the degree of Master of Science in Computer Engineering Department, Middle East Technical University by, Prof. Dr. Canan Özgen Dean, Graduate School of Natural and Applied Sciences _____________ Prof. Dr. Adnan Yazıcı Head of Department, Computer Engineering _____________ Prof. Dr. Nihan Kesim Çiçekli Supervisor, Computer Engineering Dept, METU _____________ Examining Committee Members: Prof. Dr. Ferda Nur Alpaslan Computer Engineering Dept., METU _____________ Prof. Dr. Nihan Kesim Çiçekli Computer Engineering Dept., METU _____________ Prof. Dr. Ali Doğru Computer Engineering Dept., METU _____________ Prof. Dr. Ahmet Coşar Computer Engineering Dept., METU _____________ M.Sc. Deniz Kaya Arçelik A.Ş. _____________ Date: 05.09.2014 I hereby declare that all information in this document has been obtained and presented in accordance with academic rules and ethical conduct. I also declare ...
Words: 13697 - Pages: 55
...Personalized recommendation based on overlapping communities using time-weighted association rules Haoyuan Feng1, Jin Tian1, Harry Jiannan Wang2, Minqiang Li1, Fuzan Chen1, Nan Feng1 1 2 Tianjin University, Tianjin, 300072, P.R. China University of Delaware, Newark, DE, 19716, USA jtian@tju.edu.cn Abstract Modeling users’ ever-changing interests has been a critical topic in recommender system research. In this paper, we propose a new personalized recommendation framework by leveraging and enhancing overlapping community concepts from complex network analysis literature and developing a time-weighted association rule mining method. Experiment results show that our proposed approach outperforms several existing methods in recommendation precision and diversity. Keywords: personalized recommendation; overlapping community; time-weighted association rules; user interests 1. Introduction Recommender systems have been implemented by many commercial websites, such as Amazon and eBay, to help users discover products of their interests. High-quality recommender algorithms and strategies can greatly increase profits and improve user loyalty. One of the most important aspects in personalized recommendation is the user interest modeling. Most of the conventional user interest models are static models, such as the user-based collaborative filter model, assuming that the users’ interests do not change over time. However, users’ interests are rather dynamic, e.g., users may prefer different...
Words: 3244 - Pages: 13
...RECOMMENDER SYSTEMS MAN562 February 18, 2015 Abstract. In the recent years, the web searches have witnessed a dramatic change where the people have had so much on the internet such that the searches have become extremely difficult. The users of the internet on a regular basis have found it difficult to use and find the required information. There has been also the claim that some of the data sources are unpopular which makes the finding of the information very difficult. The personal recommender system is responsible for building the gap between the objects and the users. The system recommends to the users the areas they might be interested in during browsing. The system is responsible for solving the problem that is being experienced today of information overload (Hang, Hsiao, 2013). There are different algorithms, and they are responsible for producing the different systems. There is the system that collaborates and filters, the system that is based on content, the hybrid system, and the structure based system. All the four systems are determined by the different algorithms operating in each (Pu, Chen, & Hu, 2012). Introduction This recommender system is a subclass of the information filtering system that is responsible for predicting and rating the weight of an item as per the user requirements. In the recent years, the systems have become extremely...
Words: 2587 - Pages: 11
...WEB 3.0 FOR MASTERS IN APPLIED SCIENCE Information Communication and Technology MONIKA NEKKANTI UNIVERSITY OF DENVER UNIVERSITY COLLEGE FACULTY: STEVE STARLIPER DIRECTOR: TOM TIERNEY ICT 4005 Technical Foundations. October28, 2014 ABSTRACT Web systems are the fast growing and more demanded ones these days. Everyone rely upon it daily for any of their work that might be study, business, personal or entertainment purpose. Whatever the purpose is user expects a well organized, fast and intelligent communication with the system he/she uses. That is where web 3.0 comes into picture. This paper gives a clear idea about web 3.0 which can be easily understood by a newbie too. How intelligent web systems work and what all components and methods, how they work and make the web system intelligent. It even covers about some fallacies people make while choosing an algorithm for their web system and also discusses how it benefits the user and makes his/her work easy. This gives a quick idea about the internal functioning of the web system and limitations. TABLE OF CONTENT 1. INTRODUCTION 1 2. EVOLUTION OF WEB 2 a. WEB 1.0 2 b. WEB 2...
Words: 3973 - Pages: 16
...Location Recommendation for Location-based Social Networks Mao Ye Peifeng Yin Wang-Chien Lee Department of Computer Science and Engineering The Pennsylvania State University University Park, PA 16802, USA {mxy177,pzy102,wlee}@cse.psu.edu ABSTRACT In this paper, we study the research issues in realizing location recommendation services for large-scale location-based social networks, by exploiting the social and geographical characteristics of users and locations/places. Through our analysis on a dataset collected from Foursquare, a popular location-based social networking system, we observe that there exists strong social and geospatial ties among users and their favorite locations/places in the system. Accordingly, we develop a friend-based collaborative filtering (FCF) approach for location recommendation based on collaborative ratings of places made by social friends. Moreover, we propose a variant of FCF technique, namely Geo-Measured FCF (GM-FCF), based on heuristics derived from observed geospatial characteristics in the Foursquare dataset. Finally, the evaluation results show that the proposed family of FCF techniques holds comparable recommendation effectiveness against the state-of-the-art recommendation algorithms, while incurring significantly lower computational overhead. Meanwhile, the GM-FCF provides additional flexibility in tradeoff between recommendation effectiveness and computational overhead. networking services allow users to connect with friends, explore places...
Words: 3973 - Pages: 16
...working on different applications and ensure that each application's cryptographic capability meets minimum requirements and best practices. Identify the cryptographic and key management requirements for your application and map all components that process or store cryptographic key material. Use only reputable crypto libraries that are well maintained and updated, as well as tested and validated by 3rd party organizations (e.g., NIST/FIPS) Key Selection Selection of the cryptographic and key management algorithms to use within a given application should begin with an understanding of the objectives of the application. For example, if the application is required to store data securely, then the developer should select an algorithm suite that supports the objective of Data-At-Rest (DAR) security. Applications that are required to transmit and receive data would select an algorithm suite that supports the objective of Data-in-Transit security. We have provided recommendations on the selection of crypto suites within an application based on application and security objectives. Application developers oftentimes begin the development of crypto and key management capabilities by examining what is available in a library. However, an analysis of the real needs of the application should be...
Words: 1040 - Pages: 5
...Genetic Algorithm Approach to Solve the Shortest Path Problem for Road Maps Sachith Abeysundara*, Baladasan Giritharan+, Saluka Kodithuwakku◊ *Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka Email: sachith@email.com Telephone: (+94) 81 2374652 + Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka Email: bgiri@pdn.ac.lk ◊ Department of Statistics and Computer Science, Faculty of Science, University of Peradeniya, Sri Lanka Email: salukak@pdn.ac.lk Telephone: (+94) 81 2394260 Abstract—This paper presents a new genetic algorithm approach to solve the shortest path problem for road maps. This is based on the analogy of finding the shortest possible distance between two towns or cities in a graph or a map with potential connection, which means that the path distances are always positive. Typically this is represented by a graph with each node representing a city and each edge being a path between two cities and there exist some traditional algorithms that produce solutions for the problem. A new method is found to solve the shortest path problem using GAs. The algorithm has been tested for a road map containing more than 125 cities and the experimental results guarantee to provide acceptably good solutions for the given search space. HE shortest path problem is typical in the world of combinatorial systems. This research will attempt to apply a Genetic algorithm to solve...
Words: 2513 - Pages: 11
...more configurations to meet consumer interests. However the supply chain managers wanted less complexity and were interested in more predictable order cycle times. HP needed to implement a fact-based, data-driven tool to improve decision making. HP developed a team of individuals internally and externally from consultancies and universities to help with the challenges the company faced. This team developed a process for evaluating new products for introduction, created a tool for prioritizing existing products in a portfolio, and developed an algorithm that solved problems faster than previous technologies (Turban, Sharda, Delen. (2011)). The team developed a pre-launch and post-launch plan to assess whether product ideas were great enough investments to bring forth returns and maximize profits. The team also developed a Revenue Coverage Optimization (RCO) tool to manage product portfolios as sales data became available. The RCO algorithm...
Words: 1705 - Pages: 7
...I choose Netflix for my final project because the Netflix brand itself has continued to rise and become a household name for all ages and I am and continue to be impressed with the dynamics of Netflix as they have developed their own series and movies that are specific to only their brand. In this project, I will address Netflix’s history timeline and some aspects of the business and technology. First of all, my project will be based on Netflix’s history timeline. Netflix has done what most technology companies have not. It went beyond its original capabilities and business developed skills to win in online streaming. I would describe Netflix’s unique selling proposition as simply “the future and convenience at your fingertips.” The tweet...
Words: 589 - Pages: 3
...appropriate difficulty level for the number of students named above. Note:Advisor can’t be changed without prior permission of the Manager Projects and the duration for completion of the Project is 2 regular semesters (approx.) from the date of Registration of Research Project. | Signatures and Date | Advisor | EVALUATOR/REFEREE 1 I have carefully read the project proposal and feel that the proposed project is a useful one and of a sufficient difficulty level to justify 2 regular semesters workload for above mentioned students. I have made recommendations in the evaluation form to improve the scope and quality of the project. | | Signatures and Date | | | | | | | | | | EVALUATOR/REFEREE 2 I have carefully read the project proposal and feel that the proposed project is a useful one and of a sufficient difficulty level to justify 2 regular semesters workload for above mentioned students. I have made recommendations in...
Words: 1146 - Pages: 5
...(Name) (Tutor) (Course) (Date) Google 2012 Overview An overview of Gamble’s work demonstrates an in-depth understanding of the history of Google, which started from Stanford and ended up with the creation of a company. The company is no longer a simple search engine, but it supports other services such as cloud computing web services, social media such as Google +, and web browser. This venture was made possible by the creation of the company’s principles, which guide its activities at all time. For instance, they believe the client must be first and every other matter will follow. Ever since the company announced its first IPO in 2004, the institute has experienced continuous success in the stock market. Indeed. Even when the market crushed in 2008, many people thought the crush would affect all sectors, but Google continued to increase its annual revenue, stock holder’s equity, and net assets. The analysis, nevertheless, demonstrates that some readers find Google’s growth rather alarming. It would be difficult for the company to continue in the same way without contracting some “evil” deals and breaking law number 6. Analysis A clearer analysis of the company shows that as Google grew, most of its services extended from simply being a search engine to providing other services to its users. Initially, Google focused on a market niche of people that were looking for information. Consequently, they created a search engine, which would act superior to all other competition. Indeed...
Words: 1168 - Pages: 5
...Optimization Manual Key words: MOS, interference, BER, C/I, power control, DTX, frequency hopping, PESQ, PSQM /PSQM+, PAMS Abstract: With the development of the radio network, mobile operators become more focused on end users’ experience instead of key performance indicators (KPIs). The improvement of the end users’ experience and the improvement of the network capacity are regarded as KPIs. Therefore, Huawei must pay close attention to the improvement of the soft capability of the network quality as well as the fulfillment of KPIs. At present, there are three methods of evaluating the speech quality: subjective evaluation, objective evaluation, and estimation. Among the three methods, objective evaluation is the most accurate. The PESQ algorithm defined by the ITU can objectively evaluate the speech quality of the communication network. This document uses the mean opinion score (MOS) to label the speech quality after objective evaluation. This...
Words: 9686 - Pages: 39
...I. Goal The aim of this project is to analyze the output of the Transit Time System and recommend changes to improve the reliability of its estimates. II. Background By the current definition, Transit Time (TT) is the number of hours it takes for a package to get delivered to the customer from the moment it was tendered at the FC. It excludes the non-processing time (e.g. weekends) of the carriers. (Refer Appendix IIA for an example of UPS transit times from LEX1) Transit Times are used to predict whether a given ship method can meet a given promise to the customer. Also, inconsistencies in measured/estimated transit times may expose issues or opportunities in the shipping processes. Transit Time is a function of a 3-tuple: (source, ship method,...
Words: 3556 - Pages: 15
...................................................................................................... 3 2- History .............................................................................................................................. 4 3- Ramp Metering Algorithms .......................................................................................... 5 3-1- S ystem Architecture .............................................................................................. 5 3-2- Release Algorithm .................................................................................................. 6 3-3- A rbitration Algorithm .............................................................................................. 7 3-4- S witch On- Off Algorithm ....................................................................................... 8 3-5- Q ueue Override Algorithm .................................................................................... 9 3-6- Q ueue Management Algorithm ........................................................................... 9 3-7- Ramp Metering Algorithm ...................................................................................10 3-8- Data Filtering Algorithm: .....................................................................................10 4- Types of Ramp Metering ............................................................................................11 4-1- Local Ramp Metering ..........................
Words: 2688 - Pages: 11
...solve the issue of cloud computing service security; including SmartCryptor, Trend Micro SecureCloud, and CloudPassage Halo. These three products were selected because they contain the similar features to protect the hacker or data lose on the cloud network. The features of their products are compared and contrasted to identify the most benefits to the users. I set the selection criteria including cost, features, how to use, security level, and company-fit. The CloudPassage Halo products shows the most powerful products, however, I found many features are duplicated to the network security features that may implemented together with the servers. The cost is considered high. I recommended the Trend Micro SecureCloud with powerful encryption algorithm (AES –standard) and be controlled by policy –driven KEY that can self-adjust to any organisation. The price is reasonable with their features. Moreover, in small company who uses the third-party cloud service, SmartCryptor is chosen as very budget (just $6/months), the use can add another level of security in file encryption and do not worry that others will access your file. To sum up, every products has their own advantage and disadvantage, the way of product selection should consider what we really need, the product feature is solve the problem, and the price should be reasonable. 2. Introduction Cloud Computing services are provided by the third party company who developed the infrastructure. The main advantage of using Cloud Computing...
Words: 2036 - Pages: 9