{"title":"Improving Recommender Systems using Hybrid Techniques of Collaborative Filtering and Content-Based Filtering","authors":"Riya Widayanti","doi":"10.47738/jads.v4i3.115","DOIUrl":"https://doi.org/10.47738/jads.v4i3.115","url":null,"abstract":"This innovative study introduces a novel enhancement to recommendation systems through a synergistic integration of Collaborative Filtering (CF) and Content-Based Filtering (CBF) techniques, termed the hybrid CF-CBF approach. By seamlessly amalgamating the strengths of CF's user interaction insights and CBF's content analysis prowess, this approach pioneers a more refined and personalized recommendation paradigm. The research encompassed meticulous phases, including comprehensive data acquisition, efficient storage management, meticulous data refinement, and the skillful application of CF and CBF methodologies. The findings markedly highlight the prowess of the hybrid approach in generating recommendations that exhibit enhanced diversity and precision, surpassing the outcomes obtained from either technique in isolation. Remarkably, the hybrid CF-CBF approach effectively addresses the inherent shortcomings of individual methods, such as CF's vulnerability to the \"cold start\" problem and CBF's limitation in fostering recommendation diversity. By fostering a harmonious synergy, this novel approach transcends these limitations and provides a holistic solution. Furthermore, the interplay of CF and CBF augments the recommender system's cognitive grasp of user preferences, subsequently enriching the quality of recommendations provided. In conclusion, this research stands as a pioneering contribution to the evolution of recommendation systems by championing the hybrid CF-CBF approach. By ingeniously fusing two distinct techniques, the study engenders a breakthrough in personalized recommendations, thereby propelling the advancement of more sophisticated and effective recommendation systems.","PeriodicalId":479720,"journal":{"name":"Journal of Applied Data Sciences","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135782631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and Realization of Computer Image Intelligent Recognition System","authors":"Guibing Xu","doi":"10.47738/jads.v4i2.76","DOIUrl":"https://doi.org/10.47738/jads.v4i2.76","url":null,"abstract":"The application of intelligent image recognition technology in life is more and more extensive, especially in the field of computer and multimedia, the research of machine vision system is becoming more and more mature, and the demand of human society for information processing is constantly increasing.This article first analyzes the basic knowledge of digital images based on computer technology, including basic knowledge of digital images, basic knowledge of image filtering and image recognition algorithms. Secondly, this paper studies the design and implementation of computer image intelligent recognition system.","PeriodicalId":479720,"journal":{"name":"Journal of Applied Data Sciences","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136251511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Application of Adaptive UKF Algorithm in Multi-target Tracking and Positioning System","authors":"Guofang Liu","doi":"10.47738/jads.v4i2.81","DOIUrl":"https://doi.org/10.47738/jads.v4i2.81","url":null,"abstract":"Adaptive filtering algorithm (FIR) is a design method of adaptive variable target tracking system based on probability density distribution model. The algorithm realizes the target movement in the global range by estimating the parameters of different regions in the image, which improves the real-time performance and effectiveness.","PeriodicalId":479720,"journal":{"name":"Journal of Applied Data Sciences","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136251513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software Defect Fault Intelligent Location and Identification Method Based on Data Mining","authors":"Fang Wang","doi":"10.47738/jads.v4i2.92","DOIUrl":"https://doi.org/10.47738/jads.v4i2.92","url":null,"abstract":"With the advancement of the times, computer technology is also constantly improving, and people's requirements for software functions are also constantly improving, and as software functions become more and more complex, developers are technically limited and teamwork is not tacitly coordinated. And so on, so in the software development process, some errors and problems will inevitably lead to software defects. The purpose of this paper is to study the intelligent location and identification methods of software defects based on data mining. This article first studies the domestic and foreign software defect fault intelligent location technology, analyzes the shortcomings of traditional software defect detection and fault detection, then introduces data mining technology in detail, and finally conducts in-depth research on software defect prediction technology. Through in-depth research on several technologies, it reduces the accidents of software equipment and delays its service life. According to the experiments in this article, the software defect location proposed in this article uses two methods to compare. The first error set is used as a unit to measure the subsequent error set software error location cost. The first error set 1F contains 19 A manually injected error program, and the average positioning cost obtained is 3.75%.","PeriodicalId":479720,"journal":{"name":"Journal of Applied Data Sciences","volume":"153 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135658676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Deep Learning-Based Algorithm and Model for Personalized Recommendation of Resources","authors":"Yu'e Liu","doi":"10.47738/jads.v4i2.85","DOIUrl":"https://doi.org/10.47738/jads.v4i2.85","url":null,"abstract":"Resource recommendation system is a new type of management system, which uses personalized information to solve business needs such as customer consultation and product recommendation, and provides users with high quality services and achieves accurate marketing, so nowadays resource recommendation system has a pivotal role in modern resource management. In this paper, I study the algorithm and model of resource personalized recommendation based on deep learning, taking human resource recommendation as an example.","PeriodicalId":479720,"journal":{"name":"Journal of Applied Data Sciences","volume":"150 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135504221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on New Virtualization Security Protection Management System Based on Cloud Platform","authors":"Zhihong Li","doi":"10.47738/jads.v4i2.89","DOIUrl":"https://doi.org/10.47738/jads.v4i2.89","url":null,"abstract":"As an emerging product under the condition of informatization, the utilization of cloud platform in many industries has brought fundamental changes to the production and business model in related fields. The cloud platform provides rich and diverse utilization services to terminals through multi-dimensional integration of different IT resources. With the in-depth utilization of cloud platform, the security problems it faces are becoming more and more prominent. The traditional network security protection means have been difficult to effectively adapt to and deal with the security threats under the new situation of cloud platform utilization. As a prominent part of building cloud platform, the construction level of virtualization security protection system will have an intuitive impact on the security of cloud platform. At present, the virtualization security protection management system under cloud platform is facing direct threats from virtual machine deployment, virtual machine communication and virtual machine migration. Based on this, this paper studies the virtualization security protection management system of cloud platform from the perspective of virtualization security tech, so as to ameliorate the stability, reliability and security of cloud platform.","PeriodicalId":479720,"journal":{"name":"Journal of Applied Data Sciences","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136251512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}