RESEARCH AND DESIGN OF INTELLIGENT LEARNING SYSTEM BASED ON RECOMMENDATION TECHNOLOGY

Hui Li, Shu Zhang, Jun Shi, and Yun Hu

References

  1. [1] S. Lee and B.G. Kim, Users’ preferential factors in Web-basede-learning systems for ease of workplace learning in Korea,Learning & Individual Differences, 39, 2015, 96–104.
  2. [2] F. Zhao, F. Yan, H. Jin, et al., Personalized mobile searching approach based on combining content-based filtering andcollaborative filtering, IEEE Systems Journal, 11(1), 2017,324–332.
  3. [3] Y. Zuo, M. Gong, J. Zeng, et al., Personalized recommendationbased on evolutionary multi-objective optimization [researchfrontier], IEEE Computational Intelligence Magazine, 10(1),2015, 52–62.
  4. [4] X. Yang, C. Liang, M. Zhao, et al., Collaborative filtering-basedrecommendation of online social voting, IEEE Transactionson Computational Social Systems, 4(1), 2017, 1–13.
  5. [5] V. Faridani, M. Jalali, and M.V. Jahan, Collaborative filtering-based recommender systems by effective trust, InternationalJournal of Data Science & Analytics, 3(4), 2017, 297–307.
  6. [6] C. Yu and L. Huang, CluCF: a clustering CF algorithm toaddress data sparsity problem, Service Oriented Computing &Applications, 11(1), 2017, 33–45.
  7. [7] J. Ye, Improved cosine similarity measures of simplified neutrosophic sets for medical diagnoses, Artificial Intelligence inMedicine, 63(3), 2015, 171.
  8. [8] J.C. Hong, M.P. Lin, M.Y. Hwang, et al., Comparing animatedand static modes in educational gameplay on user interest,performance and gameplay anxiety, Computers & Education,88(C), 2015, 109–118.
  9. [9] N.D. Buono and G. Pio, Non-negative matrix tri-factorizationfor co-clustering: an analysis of the block matrix, InformationSciences, 301(C), 2015, 13–26.
  10. [10] B.K. Samanthula, Y. Elmehdwi, and W. Jiang, k-Nearest neighbor classification over semantically secure encrypted relationaldata, IEEE Transactions on Knowledge & Data Engineering,27(5), 2015 1261–1273.
  11. [11] J.S. Swathy, Review on k-nearest neighbor classification oversemantically secure encrypted relational data, InternationalJournal of Computer Applications, 133(8), 2016, 1–4.
  12. [12] A. Dramalidis and A. Markos, Subset Multiple CorrespondenceAnalysis as a tool for visualizing affiliation networks, Journalof Data Analysis & Information Processing, 04(2), 2016, 1–6.
  13. [13] Y. Deng, Y. Liu, and D. Zhou, An improved genetic algorithm with initial population strategy for symmetric TSP,Mathematical Problems in Engineering, 2015(3), 2015, 1–6.
  14. [14] L. Davis, Individual responsibility and economic development:Evidence from rainfall data, Kyklos, 69(3), 2016, 426–470.
  15. [15] M. Gowanlock and H. Casanova, Distance threshold similaritysearches: efficient trajectory indexing on the GPU, IEEETransactions on Parallel & Distributed Systems, 27(9), 2016,2533–2545.

Important Links:

Go Back