scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Modern Trends in Engineering and Research in 2018"











Journal Article
TL;DR: A novel solution for cross-site cold-start product recommendation, which aims to recommend products from e-commerce websites to users at convivial networking sites inCold-start situations, a quandary which has infrequently been explored afore.
Abstract: In recent years, the boundaries between e-commerce and convivial networking have become increasingly blurred. Many e-commerce websites support the mechanism of gregarious authenticate where users can sign on the websites utilizing their gregarious network identities such as their Face book or Twitter accounts. Users can withal post their incipiently purchased products on micro blogs with links to the ecommerce product web pages. In this paper, we propose a novel solution for cross-site cold-start product recommendation, which aims to recommend products from e-commerce websites to users at convivial networking sites in cold-start situations, a quandary which has infrequently been explored afore. A major challenge is how to leverage cognizance extracted from gregarious networking sites for cross-site cold-start product recommendation. We propose to use the linked users across gregarious networking sites and e-commerce websites (users who have gregarious networking accounts and have made purchases on e-commerce websites) as a bridge to map users’ gregarious networking features to another feature representation for product recommendation. In categorical, we propose learning both users’ and products’ feature representations (called utilizer embedding and product embedding, respectively) from data accumulated from e-commerce websites utilizing recurrent neural networks and then apply a modified gradient boosting trees method to transform users’ gregarious networking features into utilizer embedding. Related Work: In our recommendation system for recommending colleges, we decided to take a different approach to the problem. Existing approaches tend to focus on user-item matrix techniques and neighbourhood approach, and their models reflect this line of thinking. We still do similarity calculations, but in a different way for recommending colleges as venues. There are some concepts that we use, which are common to most currently existing recommendation colleges. our project systems rely on information derived from the online of users, such as opinions or ratings, to form predictions, or produce recommendation of colleges . Existing collaborative filtering techniques involve generating a user item in fake matrix, from which recommendation results could be derived.

1 citations














Journal Article
TL;DR: A new control algorithm for the Power distribution systems, ideally, should DVR is proposed in this paper to regulate provide their customers with an the load terminal voltage during sag, swell uninterrupted flow of energy at smooth in the voltage at the point of common sinusoidal Voltage at the contracted coupling (PCC).




Journal Article
TL;DR: This paper explores big data mining and the privacy preserving data mining practices and techniques and states that the success of enterprises in future depends on the intelligent mining of big data for comprehensive business intelligence.
Abstract: Data mining gradually became big data mining as the enterprises are causing exponential growth of data. Comprehensive mining of such data can bestow accurate business intelligence. Towards this end big data mining has become a new buzz word in the mining paradigm. The emergence of technologies such as virtualization and cloud computing paved way for the processing of big data which is characterized by Volume, Velocity and Variety. For big data processing, a new programming model, Map Reduce is used. This framework runs in distributed environment to process huge amount of data. There are many distributed programming frameworks such as Hadoop, Dryad, Sailfish, and AROM that are based on MapReduce and equivalent programming paradigms. The success of enterprises in future depends on the intelligent mining of big data for comprehensive business intelligence. At the same time privacy preserving data mining also important as the data mining should not be taken place at the cost of privacy. In this paper we explore big data mining and the privacy preserving data mining practices and techniques.