{"title":"Do Trust based Social Recommendation Algorithms Work as Intended?","authors":"Chaitanya Krishna Kasaraneni, Mahima Agumbe Suresh","doi":"10.14419/ijet.v12i2.32328","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32328","url":null,"abstract":"Recommender systems are powerful tools that filter and recommend content/information relevant to a given user. Collaborative filtering is the most popular technique used in building recommender systems and it has been successfully incorporated in many applications. These conventional recommendation systems require a minimum number of users, items, and ratings in order to provide effective recommendations. This results in the infamous cold-start problem where the system is not able to produce effective recommendations for new users. Recently, there has been an escalation in the popularity and usage of social networks, which persuades people to share their experiences in the form of reviews and ratings on social media. The components of social media such as the influence of friends, interests, and enjoyment create the opportunities to develop solutions for sparsity and cold start problems of recommendation systems. This paper aims to observe these patterns and analyze three of the existing social recommendation systems, SocialMF, SocialFD, and GraphRec. SocialMF and SocialFD algorithms are based on matrix factorization and distance metric learning respectively whereas GraphRec is an attention based deep learning model. Through extensive experimentation with the datasets that these algorithms were tested on and one new dataset, we compared the results based on evaluation metrics including Root Mean Squared Error (RMSE) and Mean Absolute Error (MAE). To investigate how trust impacts the performance of these models, we evaluated them by modifying the trust and social component. Experimental results show that there is no conclusive evidence that trust propagation plays a major part in these models. Moreover, these models show a slightly improved performance in the absence of trust statements.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135546987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data integration: “Seamless data harmony: The art and science of effective data integration”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i2.32335","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32335","url":null,"abstract":"The idea of data integration has evolved as a key strategy in today's data-driven environment, as data is supplied from various and heterogeneous sources. This article explores the relevance, methodology, difficulties, and transformative possibilities of data integration, delving into its multidimensional world. Data integration serves as the cornerstone for well-informed decision-making by connecting heterogeneous datasets and fostering unified insights. This article gives readers a sneak preview of the in-depth investigation into data integration, illuminating its technical complexities and strategic ramifications for companies and organizations looking to maximize the value of their data as-sets.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135647533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visual Modeling: “Unlocking Ideas and Enhancing Understanding: The Power of Visual Modeling”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i2.32334","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32334","url":null,"abstract":"To make ideas, concepts, or systems easier to comprehend and explain, visual modelling is the act of putting them into visual form. A range of methods and tools, including mind maps, flowcharts, diagrams, and wireframes, can be used to do this. In a range of settings, including business, education, and software development, visual models can be used to organize and clarify information, uncover links and patterns, and improve communication and teamwork. This paper discusses the SWOT analysis, the concept of use cases, the organization chart and its tiers, the stakeholder map, the scoring matrix, process flowcharts, and user stories.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135647532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improve the quality of service through secure routing networks secured in the mail","authors":"Aseil Nadhum Kadhum","doi":"10.14419/ijet.v12i2.32367","DOIUrl":"https://doi.org/10.14419/ijet.v12i2.32367","url":null,"abstract":"A mobile ad hoc network (MANET) is a stand-alone system with mobile nodes. Nodes can move around at will. Communication is subject to security breaches without a centralized, secure infrastructure, and the nodes are the biggest offenders. Since security has become one of the most important issues for data transfer via wired and wireless networks, many security-enhanced solutions have been created to enhance the security of data transmission over public networks. The goal of this project is to make routing safer. Proactive routing, as is well known, involves finding alternative routes and requiring packets to choose one at random from their immediate neighbors. Sending hello packets allows us to maintain track of each node's neighbors. The delivery path is then selected from nearby nodes, with the prior hop which is retained as the history node having been arbitrarily excluded. To randomize delivery channels, the proactive routing protocols DSDV and RDSDV were contrasted for various node counts. The Simulation employs this project. The rapid development of mobile computing appli-cations and distant systems has raised awareness of quality of service (QoS) for mobile ad hoc networks (MANETs). In the MANET sce-nario, security is a key component of Qos provisioning. Attacks on the system could result in problems with direction, asset reservations, or even the collapse of the QoS structure if no security tool is used. In this study, two new plans will be provided from the perspectives of two alternative techniques to manage the updating of the organizational idea and allay the worries caused by interface annoyances in order to handle the security challenges of MANET Qos and the actual commitments of this investigation.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135647531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity and access management: \"Elevating security and efficiency: Unveiling the crucial aspects of identity and access management”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i1.32333","DOIUrl":"https://doi.org/10.14419/ijet.v12i1.32333","url":null,"abstract":"The foundation of the software is the identity and access management system. A fundamental and essential cybersecurity competency is ensuring that the right parties have timely access to the right resources. The IAM has four domains: IAAA stands for identification, authentication, authorization, and accounting, the second is Privileged Access Management (PAM), third-party Identity Governance and Administration, data governance and protection. In this article, the concepts of identification, authentication, authorization, and accounting are discussed, as well as how IAAA works in an online setting.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of coupling on the performance a periodic leaky wave patch antenna","authors":"Charmolavy G.L, Nkouka Moukengue, Barol Mafouna Kiminou","doi":"10.14419/ijet.v12i1.32289","DOIUrl":"https://doi.org/10.14419/ijet.v12i1.32289","url":null,"abstract":"This article demonstrates the effect of coupling between two metal strips and the substrate width of a periodic leaky wave patch antenna operating at 80 GHz. Increasing the width of the substrate and the distance between the metal patches results in directional radiation and a good reflection coefficient in the 72-86 GHz band.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big data: \"Navigating the Hadoop ecosystem: Unraveling the potential of big data”","authors":"None Saloni Kumari","doi":"10.14419/ijet.v12i1.32332","DOIUrl":"https://doi.org/10.14419/ijet.v12i1.32332","url":null,"abstract":"Big data refers to extremely large data sets that can be analyzed to reveal patterns, trends, and associations, particularly those relating to hu-man behavior and interactions. This data is too large and complex to be processed using traditional data processing methods, necessitating the use of specialized software and systems to manage and analyze it. This paper discusses about the Big Data Architecture, Hadoop Ecosystem, HDFS, Map reduce, Yarn, Hive, and many other components of Hadoop ecosystem.","PeriodicalId":13979,"journal":{"name":"International Journal of Engineering & Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135205209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}