<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Comparative Analysis of Basic Approaches to Implementing Model-Based Recommendation Systems Based on Implicit Economic Information</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yurii Kryvenchuk</string-name>
          <email>yurkokryvenchuk@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Lakiza</string-name>
          <email>viktoriia.v.lakiza@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Bidak</string-name>
          <email>yuliia.bidak.knm.2019@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Myskiv</string-name>
          <email>myskiviryna@i.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Profesorska Street 1, Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>63</fpage>
      <lpage>72</lpage>
      <abstract>
        <p>The paper considers ways to solve the problem of Internet congestion.Analogs of recommendation systems of different researchers are also given. The main algorithms in recommendation systems are analyzed: Content based, demographic based, Coloborative filter. Two types of data are considered, which help to form an overall assessment in the recommendation system. The main problems that shape the work with recommendation systems are considered.The tasks of recommendation systems are analyzed in detail. The paper provides a step-by-step creation of a recommendation system and identifies the main requirements that it must meet.The study presents a similarity matrix, which is calculated from the entire recommendation vector. The personalization of the recommendation is also calculated.The matrix factorization method is analyzed (Matrixfactorization). The evaluation that follows from the user profile is considered.In the work, to get results on the proposed models, offers its own web service for finding movies, where the user can search for movies, as well as view detailed information about them or the movie rating. Recommendations in this system are based on implicit feedback, and it is possible to receive information about the user's id to make personalized recommendations are also analyzed:Linear Regression Prediction, Content-Based Prediction, Collaborative-Filtering Prediction User-Based, Collaborative-Filtering Prediction Item ORCID: 0000-0002-2504-5833 (Yu. Kryvenchuk); 0000-0002-6764-8536 (V. Lakiza); 0000-0002-9780-1546 (Yu.Bidak); 0000-00023761-2276 (I. Myskiv); 0000-0002-7139-5623 (Yu. Malynovskyy)</p>
      </abstract>
      <kwd-group>
        <kwd>1</kwd>
        <kwd>Machine Learning</kwd>
        <kwd>Artificial Intelligence</kwd>
        <kwd>neural network</kwd>
        <kwd>intelligent technologies</kwd>
        <kwd>sum of</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Based.</title>
      <sec id="sec-1-1">
        <title>1. Introduction</title>
        <p>
          accurate data [
          <xref ref-type="bibr" rid="ref4 ref8">4, 8</xref>
          ].
given.
        </p>
        <p>
          Today, the problem of Internet congestion remains open. The amount of information on the
Internet is growing exponentially every day [
          <xref ref-type="bibr" rid="ref1 ref18 ref5">1, 5, 18</xref>
          ]. Recommendation systems are a relatively
young field. It all started in 2006 when Netflix launched the Netflix Prize data analysis competition.
Around the same time, the annual RecSys conference on referral systems began, which is still held
        </p>
        <p>
          The study aims to describe models where the components for translating the characteristics of user
behaviour are his assessments, which are used for his content recommendations [
          <xref ref-type="bibr" rid="ref2 ref6">6, 2</xref>
          ]. If the problem
is attributed to the difficulties of classification or regression, the list of required algorithms is quite
comprehensive. Therefore, the study should pay attention to the work of several algorithms based on
        </p>
        <p>Before starting the study, a list of characteristics that can describe any recommendation system is
EMAIL:</p>
        <p>2022 Copyright for this paper by its authors.
 Subject of recommendations - what is recommended. It can be anything: movies, music,
products, news, articles, books, products, videos, people and more.
 Purpose of recommendations - the navigator is recommended. They are gathering, providing
information, training, meeting new people.
 Recommendation context - what the user is doing at the moment. You are browsing products,
listening to music, communicating with people.
 Source of recommendation - who recommends. Audience-like users, experts.
 Degree of personalization. Non-personal recommendations - when you are recommended all
the same as other users. They allow targeting by region or time but do not consider their
preferences. Additional enhancements include the number of recommendations for your current
session. You have reviewed several products and recommended similar products for you.
Personal recommendations contain all available information about customers, including the
history of their purchases.
 Transparency. People trust recommendations more when they understand what they are based
on. So there is less chance of coming across a system that recommends offering goods or
services.
 Recommendation format. This can be included in a window, a sorted list found in certain parts
of the site, a bar that opens the screen, or something else.
 Algorithms. Despite many available algorithms, they all come down to a few basic approaches.</p>
        <p>The most classic is:
 Summary (non-personal);
 Based on content (models based on the product description);
 Collaborative (collaborative filtering);
 Matrix factorization (methods based on matrix schedules).</p>
        <p>To define recommendations, standard filtering systems must correlate two fundamentally different
objects: elements and users. Therefore, the aim of this study is to compare two main approaches,
which are the two main methods of joint filtering: the neighborhood approach and the model of
hidden factors. Neighbourhood methods focus on relationships between objects or between users.</p>
        <p>
          The relevance of this study is the process of modeling user preferences based on assessments of
similar aspects of the same user [
          <xref ref-type="bibr" rid="ref12 ref9">9, 12</xref>
          ].
        </p>
        <p>Hidden factor models, such as matrix factorization (SVD), contain an alternative approach, turning
both elements and users into the same confidential factor space. Latent space explains ratings by
characterizing products and users by factors that automatically follow from user feedback.</p>
        <p>
          Matrix decomposition methods [
          <xref ref-type="bibr" rid="ref10 ref8">8, 10</xref>
          ] combine ease of implementation with relatively high
accuracy. This made them the best technique for solving the most extensive public data set - Netflix
data. Hidden factor models (LFMs) are suitable for co-filtering with the holistic purpose of
identifying latent features that explain the observed estimates; examples include pLSA, neural
networks, latent Dirichlet distribution, and models induced by factoring the evaluation matrix of user
elements (also known as SVD models) [
          <xref ref-type="bibr" rid="ref11 ref15">11, 15</xref>
          ]. Recently, models based on matrix extensions have
gained popularity due to their attractive accuracy and scalability.
        </p>
      </sec>
      <sec id="sec-1-2">
        <title>2. Materials and methods</title>
        <p>
          When searching for information, matrix decomposition methods are used to identify hidden
semantic factors. However, its application to precise estimates in co-filtering is complex due to the
large proportion of missing values [
          <xref ref-type="bibr" rid="ref13 ref16">13, 16</xref>
          ]. The usual matrix decomposition method is not determined
when knowledge of the matrix is incomplete. Moreover, the careless attitude towards only a few
wellknown records is prone to excessive placement. Previous work has relied on imputation, filling in the
gaps and making the rating matrix dense [
          <xref ref-type="bibr" rid="ref14 ref17">14, 17</xref>
          ]. However, the hint can be very expensive, as it
significantly increases the amount of data. In addition, data can be distorted considerably due to false
imputations. Thus, newer works suggest directly modelling only the observed ratings, avoiding
adjustable model branches.
        </p>
      </sec>
      <sec id="sec-1-3">
        <title>2.1. Tasks of the recommendation system</title>
        <p>
          The task of the recommendation system is to inform the user about the product that may interest
him most at a particular time. The customer receives recommendations about the product he needs,
and the service earns, depending on the business model, recommendation systems can be profitable in
different ways [
          <xref ref-type="bibr" rid="ref12 ref7">7, 12</xref>
          ]. The first option is the direct sale of goods. The following can affect the number
of users and in turn the revenue from advertising and so on.
        </p>
        <p>
          In the previous section, the main principles, problems and objectives of recommendation systems
were discussed. This should focus on preparing for practical implementation [
          <xref ref-type="bibr" rid="ref10 ref16">10, 16</xref>
          ]. The first step is
to define the requirements that the recommendation system must meet.
        </p>
        <p>1. Coverage. Coverage is the percentage of test items that a test set recommendation system may
recommend..
2. Personalization. Personalization shows how many identical things the recommendation system
shows to different users. Personalization is calculated in Table 1.</p>
        <p>Binary variables define two states (1 – the subject was recommended to the user. 0 – was not). The
next step is to calculate the similarity matrix for users in Table 2.</p>
        <p>In the Table 3 defined features about the object - the film, which are determined by the user using
the recommendation system. So, in Table 3 genres for recommended movies for the first user. In
Figure 2 shows an assessment of similar films received by the user of the recommendation system.</p>
        <p>The higher the rating, the more similar movies the user will receive. Therefore, the metrics that
determine the quality of the recommendation system should be considered. Recall and Precision at k.
This metric was commonly used in binary classification algorithms. Now this is one of the effective
ways to determine the quality of the recommendation system. In this case, it is necessary to say
whether the recommendation interested the user or not. A rating of 1-5 is usually used for this.</p>
      </sec>
      <sec id="sec-1-4">
        <title>3. Experiments</title>
        <p>The main part of working with recommendation systems is data. To review the algorithms, use the
Deskdrop dataset, which includes 12-month records from CI &amp; T's Internal Communication platform
(DeskDrop). It includes information about 73 thousand users who interacted with 3000 articles
distributed on the platform and includes 2 files: shared_articles.csv; users_interactions.csv.</p>
        <p>Their structure should be considered for analysis. For the Shared_articles.csv file, which contains
information about common files on the platform, where each article has its original url, title, content
as plain text, language, and information about the user who published the article. Also, each time
stamp has two possible events: Content is distributed and available to users; Content has been deleted
and is not available to users. In the Table 4 shows data with timestamp, type of interaction, movie ID,
user ID, user session ID.</p>
        <p>The users_interaction.csvfile stores information about user interaction with articles. This dataset
includes the following types of interactions: Views, Preferences, Comments, Tracking (user will be
notified of new comments on this article), Saved (the user saved the article to return to it in the
future). In the Table 5 users_interaction.csva dataset with a timestamp, type of interaction, movie ID,
user ID, user session ID.</p>
        <p>The next stage is the transformation of data, where for each type of interaction is given a certain
weight (Figure 3), which will reflect the user's interest in a particular article.</p>
        <p>Author
UserAgent
Nan
Nan
Nan
Nan
Nan</p>
        <p>Also a common problem in referral systems is the cold start problem, so you should only work
with users who have 5 or more interactions.. On the DeskDrop platform, the user can view articles
several times and interact with them each time, which is why you should create a new column that
will reflect the user's interaction with this article by summing up all types of interactions.</p>
        <p>In the Table 6 presents data on user interaction with the recommendation system. Let's see what
the columns with which the user interacts will look like.</p>
      </sec>
      <sec id="sec-1-5">
        <title>3.1. Overview of basic alorithms and models in recommendation systems</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>1. Model by popularity</title>
      <p>The most common model because of its simplicity. This model is not personalized at all. It simply
recommends to the user the most popular (with the highest rating) items or content. In general, it
offers good recommendations that are liked and will be interesting to most.</p>
      <p>It shows in the metric Recall @ 5, where the figures are about 24%, which means that 24 percent
with which the user interacted, the system was able to predict the ranking in the top 5. And with
Recall @ 10, the figures generally reach 37% (Figure 4).</p>
      <p>2. Content based filtering model.</p>
      <p>This model uses content attributes that can be recommended to the user of the article, similar to
those with which he has already interacted. TF-IDF, a popular technique in search engines, is
commonly used to work with text. This technique converts unstructured text into a vector, where each
word is represented by a word and the position of that word in the vector. To prepare a user profile,
take all the articles he interacted with and display the main words in them and multiply them by the
weight of each article relative to the user (The more the user interacted with the article, the more
important the keywords in it will be).</p>
      <p>This method received a score of Recall @ 5 = 0.162 ~ 16.2 percent. Recall @ 10 = 0.261 ~ 26
percent (Figure 5). As you can see in Figure 6, this model, despite the fact that it is more difficult to
implement showed worse results than a simpler model in popularity.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Collaborative model.</title>
      <p>This model is divided into two types:
 Memory-based - this model uses previous user interactions with articles to find a user with
similar preferences and use it for recommendations in the future.
 Model baseduses different methods and models of machine learning (neural networks,</p>
      <p>Bayesian networks) to cluster users and find common preferences between them.</p>
      <p>Next, you need to evaluate a system based on the Matrixfactorization model. In this case, in Figure
6 ratings for Recall @ 5 (33%) and for Recall @ 10 (46%).</p>
    </sec>
    <sec id="sec-4">
      <title>4. Hybrid model The last and most progressive model, which combines the two previous models (colloborative and content-basedfiltering). This model showed the best results, namely Recall @ 5 = 34.2%, Recall @ 10 = 47.9% (Figure 7).</title>
      <p>In the Table 7 shows the results of comparison of the main models in the recommendation
systems.</p>
      <p>After the results given in Table 7, it can be concluded that for further development of the system it
is necessary to use a hybrid model for the best results. We should also give an example of a more
modern method that has gained popularity, namely the factorization of the matrix
(Matrixfactorization). To begin with, let's learn what factorization is. Factorization is the
decomposition of a matrix into principal components. Take for example a table where the columns
correspond to the names of the films, and the rows of user ratings for these films (Table 8).</p>
      <p>If there is a dash at the place of evaluation, it means that the user has not watched this movie and
the task is to predict his impressions after watching.</p>
      <p>Accordingly, in Figure 9 the initial matrix is marked in blue, let's call it V , and the next two
matrices, on which the initial matrix should be decomposed, are called W and H . Thus it is possible
to deduce the general kind of expression: V (m * n)  W (m * k ) * H (k * n) , where k – count of
components. This means that when multiplying matrices W and H we obtain an approximate matrix
V in which empty values will take on a certain meaning that will correspond to the predicted
estimates of users for certain products. There are three main methods of decomposing matrices and
their comparison is shown in Figure 8.</p>
      <p>As can be seen from Figure 8 SVD and NNMF methods work best. The choice between them
depends only on the data set, but they have one significant difference. When SVD works with a range
of numbers from minus infinity to plus infinity, the result of the method can give the same range of
numbers. And in the analysis, the NNMF method works only with positive numbers.</p>
      <sec id="sec-4-1">
        <title>4. Work results</title>
        <p>To get results on the proposed models, the work created a web service for finding movies, where
the user can search for movies, as well as view detailed information about them, as well as the movie
rating. Based on this data about the user's interaction with the site, you can create recommendations.
MovieLensDataset was used to build the service. Recommendations should be based on implicit
feedback. To do this, the client side collects information about user clicks, while recording
information in the object, which consists of the name of the movie, the number of clicks on this
movie, as well as its evaluation. After the user has watched several movies, the information is sent to
the server where the object was used as test data (Figure 9). As can be seen from Figure 10, the server
also receives user id information to make personalized recommendations. As initial data on object the
client with 10 films which can be interesting to the user is sent and we receive the list of
recommendations. In general, the system implements several methods of recommendations, so you
need to call a certain, of your choice, to get results. The following methods of recommendations are
implemented in the proposed system: Linear Regression Prediction, Content-Based Prediction,
Collaborative-Filtering Prediction User-Based, Collaborative-Filtering Prediction Item –Based.</p>
      </sec>
      <sec id="sec-4-2">
        <title>5. Discussion of results</title>
        <p>In an information-saturated world, referral systems play an essential role in the user's interaction
only with potentially exciting information. In this paper, a comparative analysis of the main
approaches to implementing procedures of this kind. Several basic methods were compared during the
study. The most popular are basic, subject-basic, hybrid-basic and matrix factorization. Figure 11
shows the results of this study. On the results shown in Figure 11, it can be seen that models give the
best accuracy based on the hybrid approach and matrix factorization. If there are opportunities and
necessary personalized recommendations, then the best ones are the ones that are different from
neural networks and other approaches. After all, they remain transparent and easy to implement. If
personalization is not required, using a popularity system is sufficient for most tasks. They also
significantly simplify the procedure.</p>
      </sec>
      <sec id="sec-4-3">
        <title>6. Conclusions</title>
        <p>Today, during a pandemic, many businesses have their recommendation pages. For example, we
can name such giants as Amazon, Google, Linkedin. In this paper, much attention was paid to
methods based on matrix expansions for recommendation systems, namely for the reconstruction of
the rating table. Based on these methods, data analysis for the selected dataset was performed. Each of
the studied methods has its characteristics and is worth noting because it is helpful for a specific range
of goals set by the developer of recommendation systems. Thus, the proposed models allow us to
focus on the characteristics of the object, which determine the rating of the product or service it is
looking for. The application of the proposed algorithms allowed you to choose the best option for
creating your recommendation system, which offers the user a behaviour model.</p>
      </sec>
      <sec id="sec-4-4">
        <title>7. References</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>S.</given-names>
            <surname>Bo</surname>
          </string-name>
          , Ch. Haiyan,
          <article-title>A Survey of k Nearest Neighbor Algorithms for Solving the Class Imbalanced Problem</article-title>
          ,
          <source>Wireless Communications and Mobile Computing</source>
          , Vol.
          <year>2021</year>
          ,
          <year>2021</year>
          . https://doi.org/10.1155/
          <year>2021</year>
          /5520990.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Trabelsi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Elouedi</surname>
          </string-name>
          , and
          <string-name>
            <given-names>E.</given-names>
            <surname>Lefevre</surname>
          </string-name>
          ,
          <article-title>Decision tree classifiers for evidential attribute values and class labels</article-title>
          ,
          <source>Fuzzy Sets and Systems</source>
          , vol.
          <volume>366</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>46</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>M. T.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <article-title>Recommender systems, Introduction to approaches and algorithms</article-title>
          .
          <source>Retrieved November 25</source>
          ,
          <year>2017</year>
          .https://www.ibm.com/developerworks/library/os-recommender1/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>N.</given-names>
            <surname>Shakhovska</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Boyko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Pukach</surname>
          </string-name>
          ,
          <article-title>The information model of cloud data warehouses</article-title>
          .
          <source>Advances in Intelligent Systems and Computing (AISC)</source>
          ,
          <volume>871</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>182</fpage>
          -
          <lpage>191</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>N.</given-names>
            <surname>Kunanets</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Vasiuta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Boikо</surname>
          </string-name>
          ,
          <source>Advanced Technologies of Big Data Research in Distributed Information Systems, in: Proceedings of the 14th International conference "Computer sciences and Information technologies"</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>71</fpage>
          -
          <lpage>76</lpage>
          . DOI:
          <volume>10</volume>
          .1109/STC-CSIT.
          <year>2019</year>
          .8929756
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tejeda-Lorente</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Porcel</surname>
          </string-name>
          , E. Peis,
          <string-name>
            <given-names>R.</given-names>
            <surname>Sanz</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E.</given-names>
            <surname>Herrera-Viedma</surname>
          </string-name>
          ,
          <article-title>A quality-based recommender system to disseminate information ina university digital library</article-title>
          ,
          <source>Information Sciences</source>
          ,
          <volume>266</volume>
          ,
          <year>2014</year>
          , pp.
          <fpage>52</fpage>
          -
          <lpage>69</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>C.</given-names>
            <surname>Aggarwal</surname>
          </string-name>
          ,
          <source>Recommender Systems</source>
          . Springer,
          <year>2016</year>
          , p.
          <fpage>498</fpage>
          . doi: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -29659-3
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>B.</given-names>
            <surname>Hallinan</surname>
          </string-name>
          , T. Striphas,
          <article-title>Recommended for you: The Netf lix Prize and the production of algorithmic culture</article-title>
          .
          <source>New Media &amp; Society</source>
          ,
          <volume>18</volume>
          (
          <issue>1</issue>
          ),
          <year>2014</year>
          , pp.
          <fpage>117</fpage>
          -
          <lpage>137</lpage>
          . doi: https://doi.org/10.1177/1461444814538646
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Adomavicius</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bockstedt</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Curley</surname>
          </string-name>
          , J. Zhang,
          <string-name>
            <surname>De-Biasing User</surname>
          </string-name>
          <article-title>Preference Ratings in Recommender Systems</article-title>
          ,
          <source>in: Proceedings of the Joint Workshop on Interfaces and Human Decision Making for Recommender Systems co-located with ACM Conference on Recommender Systems</source>
          ,
          <volume>2</volume>
          -
          <fpage>9</fpage>
          . Available at: http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>1253</volume>
          /paper1.pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kaleli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bilge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Polat</surname>
          </string-name>
          ,
          <article-title>Shilling attacks against recommender systems: a comprehensive survey</article-title>
          .
          <source>Arti-ficial Intelligence Review</source>
          ,
          <volume>42</volume>
          (
          <issue>4</issue>
          ),
          <year>2014</year>
          , pp.
          <fpage>767</fpage>
          -
          <lpage>799</lpage>
          . doi: https://doi.org/10.1007/s10462-012-9364-9
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Qian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <surname>A Comparative</surname>
          </string-name>
          <article-title>Study on Shilling Detection Methods for Trustworthy Recommen-dations</article-title>
          .
          <source>Journal of Systems Science and Systems Engineering</source>
          ,
          <volume>27</volume>
          (
          <issue>4</issue>
          ),
          <year>2018</year>
          , pp.
          <fpage>458</fpage>
          -
          <lpage>478</lpage>
          . doi: https://doi.org/10.1007/s11518-018-5374-8
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Patel</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Thakkar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Makvana</surname>
          </string-name>
          ,
          <article-title>A State of Art Survey on Shilling Attack in Collaborative Filtering Based Recommendation System</article-title>
          .
          <source>Smart Innovation, Systems and Technologies</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>377</fpage>
          -
          <lpage>385</lpage>
          . doi: https://doi.org/10.1007/978-3-
          <fpage>319</fpage>
          -30933-0_
          <fpage>38</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>W.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Ren</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <article-title>Abnormal Profiles Detection Based on Time Series and Target Item Analysis for Recommender Systems</article-title>
          . Mathematical Problems in Engineering,
          <year>2015</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>9</lpage>
          . doi: https://doi.org/10.1155/
          <year>2015</year>
          /490261
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Yuan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <article-title>Detection of Abnormal Item Based on Time Intervals for Recommender Sys-tems</article-title>
          .
          <source>The Scientific World Journal</source>
          ,
          <year>2014</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi: https://doi.org/10.1155/
          <year>2014</year>
          /845897
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>M.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Tian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Xiong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Ling</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <source>Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems. PLOS ONE</source>
          ,
          <volume>10</volume>
          (
          <issue>8</issue>
          ),
          <year>2015</year>
          , pp.
          <fpage>135</fpage>
          -
          <lpage>155</lpage>
          . doi: https://doi.org/10.1371/journal.pone.0135155
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>O.</given-names>
            <surname>Chala</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Novikova</surname>
          </string-name>
          , L. Chernyshova,
          <article-title>Method for detecting shilling attacks in e-commerce systems using weighted temporal rules</article-title>
          .
          <source>EUREKA: Physics and Engineering</source>
          ,
          <volume>5</volume>
          ,
          <year>2017</year>
          , pp.
          <fpage>29</fpage>
          -
          <lpage>36</lpage>
          . doi: https://doi.org/10.21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2019</year>
          .00983
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Levykin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Chala</surname>
          </string-name>
          ,
          <article-title>Method of determining weights of temporal rules in Markov logic network for building knowledge base in information control systems</article-title>
          .
          <source>EUREKA: Physics and Engineering</source>
          ,
          <volume>5</volume>
          ,
          <year>2018</year>
          , pp.
          <fpage>3</fpage>
          -
          <lpage>10</lpage>
          . doi: https://doi.org/10.21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2018</year>
          .00713
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Chalyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Leshchynskyi</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Leshchynska</surname>
          </string-name>
          ,
          <article-title>Method of forming recommendations using temporal constraints in a situation of cyclic cold start of the recommender system</article-title>
          .
          <source>EUREKA: Physics and Engineering</source>
          ,
          <volume>4</volume>
          ,
          <year>2019</year>
          , pp.
          <fpage>34</fpage>
          -
          <lpage>40</lpage>
          . doi: https://doi.org/10.21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2019</year>
          .00952
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>