<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Comparative Analysis of Basic Approaches to Implementing Model-Based Recommendation Systems Based on Implicit Economic Information</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Yurii</forename><surname>Kryvenchuk</surname></persName>
							<email>yurkokryvenchuk@gmail.com</email>
						</author>
						<author>
							<persName><forename type="first">Viktoriia</forename><surname>Lakiza</surname></persName>
							<email>viktoriia.v.lakiza@lpnu.ua</email>
						</author>
						<author>
							<persName><forename type="first">Yuliia</forename><surname>Bidak</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Iryna</forename><surname>Myskiv</surname></persName>
							<email>myskiviryna@i.ua</email>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Lviv Polytechnic National University</orgName>
								<address>
									<addrLine>Profesorska Street 1</addrLine>
									<postCode>79013</postCode>
									<settlement>Lviv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Information Technology and Implementation (IT&amp;I</orgName>
								<address>
									<addrLine>2021), December 01-03</addrLine>
									<postCode>2021</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Comparative Analysis of Basic Approaches to Implementing Model-Based Recommendation Systems Based on Implicit Economic Information</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">FF5981A13D1985BC6C0612F47DF4479B</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T22:03+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Linear Regression Prediction, Content-Based Prediction, Collaborative-Filtering Prediction User-Based, Collaborative-Filtering Prediction Item -Based Machine Learning, Artificial Intelligence, neural network, intelligent technologies, sum of error squares, recommendation system, content-based approach Yu. Malynovskyy) ORCID: 0000-0002-2504-5833 (Yu. Kryvenchuk)</term>
					<term>0000-0002-6764-8536 (V. Lakiza)</term>
					<term>0000-0002-9780-1546 (Yu.Bidak)</term>
					<term>0000-0002-3761-2276 (I. Myskiv)</term>
					<term>0000-0002-7139-5623 (Yu. Malynovskyy)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>The paper considers ways to solve the problem of Internet congestion.Analogs of recommendation systems of different researchers are also given. The main algorithms in recommendation systems are analyzed: Content based, demographic based, Coloborative filter. Two types of data are considered, which help to form an overall assessment in the recommendation system. The main problems that shape the work with recommendation systems are considered.The tasks of recommendation systems are analyzed in detail. The paper provides a step-by-step creation of a recommendation system and identifies the main requirements that it must meet.The study presents a similarity matrix, which is calculated from the entire recommendation vector. The personalization of the recommendation is also calculated.The matrix factorization method is analyzed (Matrixfactorization). The evaluation that follows from the user profile is considered.In the work, to get results on the proposed models, offers its own web service for finding movies, where the user can search for movies, as well as view detailed information about them or the movie rating. Recommendations in this system are based on implicit feedback, and it is possible to receive information about the user's id to make personalized recommendations.The implemented methods of recommendations are also analyzed:</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Today, the problem of Internet congestion remains open. The amount of information on the Internet is growing exponentially every day <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b17">18]</ref>. Recommendation systems are a relatively young field. It all started in 2006 when Netflix launched the Netflix Prize data analysis competition. Around the same time, the annual RecSys conference on referral systems began, which is still held today <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b6">7]</ref>.</p><p>The study aims to describe models where the components for translating the characteristics of user behaviour are his assessments, which are used for his content recommendations <ref type="bibr" target="#b5">[6,</ref><ref type="bibr" target="#b1">2]</ref>. If the problem is attributed to the difficulties of classification or regression, the list of required algorithms is quite comprehensive. Therefore, the study should pay attention to the work of several algorithms based on accurate data <ref type="bibr" target="#b3">[4,</ref><ref type="bibr" target="#b7">8]</ref>.</p><p>Before starting the study, a list of characteristics that can describe any recommendation system is given.</p><p> Subject of recommendations -what is recommended. It can be anything: movies, music, products, news, articles, books, products, videos, people and more.  Purpose of recommendations -the navigator is recommended. They are gathering, providing information, training, meeting new people.  Recommendation context -what the user is doing at the moment. You are browsing products, listening to music, communicating with people.  Source of recommendation -who recommends. Audience-like users, experts.  Degree of personalization. Non-personal recommendations -when you are recommended all the same as other users. They allow targeting by region or time but do not consider their preferences. Additional enhancements include the number of recommendations for your current session. You have reviewed several products and recommended similar products for you.</p><p>Personal recommendations contain all available information about customers, including the history of their purchases.  Transparency. People trust recommendations more when they understand what they are based on. So there is less chance of coming across a system that recommends offering goods or services.  Recommendation format. This can be included in a window, a sorted list found in certain parts of the site, a bar that opens the screen, or something else.  Algorithms. Despite many available algorithms, they all come down to a few basic approaches.</p><p>The most classic is:  Summary (non-personal);  Based on content (models based on the product description);  Collaborative (collaborative filtering);  Matrix factorization (methods based on matrix schedules). To define recommendations, standard filtering systems must correlate two fundamentally different objects: elements and users. Therefore, the aim of this study is to compare two main approaches, which are the two main methods of joint filtering: the neighborhood approach and the model of hidden factors. Neighbourhood methods focus on relationships between objects or between users.</p><p>The relevance of this study is the process of modeling user preferences based on assessments of similar aspects of the same user <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b11">12]</ref>.</p><p>Hidden factor models, such as matrix factorization (SVD), contain an alternative approach, turning both elements and users into the same confidential factor space. Latent space explains ratings by characterizing products and users by factors that automatically follow from user feedback.</p><p>Matrix decomposition methods <ref type="bibr" target="#b7">[8,</ref><ref type="bibr" target="#b9">10]</ref> combine ease of implementation with relatively high accuracy. This made them the best technique for solving the most extensive public data set -Netflix data. Hidden factor models (LFMs) are suitable for co-filtering with the holistic purpose of identifying latent features that explain the observed estimates; examples include pLSA, neural networks, latent Dirichlet distribution, and models induced by factoring the evaluation matrix of user elements (also known as SVD models) <ref type="bibr" target="#b10">[11,</ref><ref type="bibr" target="#b14">15]</ref>. Recently, models based on matrix extensions have gained popularity due to their attractive accuracy and scalability.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Materials and methods</head><p>When searching for information, matrix decomposition methods are used to identify hidden semantic factors. However, its application to precise estimates in co-filtering is complex due to the large proportion of missing values <ref type="bibr" target="#b12">[13,</ref><ref type="bibr" target="#b15">16]</ref>. The usual matrix decomposition method is not determined when knowledge of the matrix is incomplete. Moreover, the careless attitude towards only a few wellknown records is prone to excessive placement. Previous work has relied on imputation, filling in the gaps and making the rating matrix dense <ref type="bibr" target="#b13">[14,</ref><ref type="bibr" target="#b16">17]</ref>. However, the hint can be very expensive, as it significantly increases the amount of data. In addition, data can be distorted considerably due to false imputations. Thus, newer works suggest directly modelling only the observed ratings, avoiding adjustable model branches.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">Tasks of the recommendation system</head><p>The task of the recommendation system is to inform the user about the product that may interest him most at a particular time. The customer receives recommendations about the product he needs, and the service earns, depending on the business model, recommendation systems can be profitable in different ways <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b11">12]</ref>. The first option is the direct sale of goods. The following can affect the number of users and in turn the revenue from advertising and so on.</p><p>In the previous section, the main principles, problems and objectives of recommendation systems were discussed. This should focus on preparing for practical implementation <ref type="bibr" target="#b9">[10,</ref><ref type="bibr" target="#b15">16]</ref>. The first step is to define the requirements that the recommendation system must meet.</p><p>1. Coverage. Coverage is the percentage of test items that a test set recommendation system may recommend.. 2. Personalization. Personalization shows how many identical things the recommendation system shows to different users. Personalization is calculated in Table <ref type="table">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 1</head><p>Requirement for the recommendation system -personalization</p><formula xml:id="formula_0">A B C D X Z 0 1 1 1 1 0 0 1 1 1 1 0 1 0 2 1 1 1 0 0 1</formula><p>Binary variables define two states (1the subject was recommended to the user. 0was not). The next step is to calculate the similarity matrix for users in Table <ref type="table">2</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>Similarity matrix for users 0 1 2 0 1 0,75 0,75 1 0,75 1 0,75 2 0,75 0,75 1</p><p>The similarity matrix is calculated from the whole recommendation vector. Personalization= 1 -0,75 = 0,25. The next step is to calculate the average of the upper triangle and subtract from the unit. A high score means that the model provides highly personalized recommendations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Estimation of similarity</head><p>The similarity assessment determines how much similar items are advised to the user. This uses feature features (such as genres in movies) to calculate similarity. Let's look at an example of Figure <ref type="figure">1</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Figure 1: Example of defining movie id</head><p>In the Table <ref type="table">3</ref> defined features about the object -the film, which are determined by the user using the recommendation system. So, in Table <ref type="table">3</ref> genres for recommended movies for the first user. In Figure <ref type="figure" target="#fig_0">2</ref> shows an assessment of similar films received by the user of the recommendation system.</p><p>The higher the rating, the more similar movies the user will receive. Therefore, the metrics that determine the quality of the recommendation system should be considered. Recall and Precision at k. This metric was commonly used in binary classification algorithms. Now this is one of the effective ways to determine the quality of the recommendation system. In this case, it is necessary to say whether the recommendation interested the user or not. A rating of 1-5 is usually used for this.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 3</head><p>Representation of features on the film using To translate the rating into the binary system, suffice it to say that all values above a certain level should be considered positive. For example, take the value of 3.5 (these can be absolute values depending on the problem). The next step is to determine the 'k'. Since recommendation systems usually return a list of recommended products, only the first 'k' should be considered.. This metric shows the percentage of recommendations from the top 'k' items that were correct and relevant to the user.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Experiments</head><p>The main part of working with recommendation systems is data. To review the algorithms, use the Deskdrop dataset, which includes 12-month records from CI &amp; T's Internal Communication platform (DeskDrop). It includes information about 73 thousand users who interacted with 3000 articles distributed on the platform and includes 2 files: shared_articles.csv; users_interactions.csv.</p><p>Their structure should be considered for analysis. For the Shared_articles.csv file, which contains information about common files on the platform, where each article has its original url, title, content as plain text, language, and information about the user who published the article. Also, each time stamp has two possible events: Content is distributed and available to users; Content has been deleted and is not available to users. In the Table <ref type="table" target="#tab_0">4</ref> shows data with timestamp, type of interaction, movie ID, user ID, user session ID. The users_interaction.csvfile stores information about user interaction with articles. This dataset includes the following types of interactions: Views, Preferences, Comments, Tracking (user will be notified of new comments on this article), Saved (the user saved the article to return to it in the future). In the Table <ref type="table" target="#tab_1">5</ref> users_interaction.csva dataset with a timestamp, type of interaction, movie ID, user ID, user session ID.</p><p>The next stage is the transformation of data, where for each type of interaction is given a certain weight (Figure <ref type="figure" target="#fig_1">3</ref>), which will reflect the user's interest in a particular article.  Also a common problem in referral systems is the cold start problem, so you should only work with users who have 5 or more interactions.. On the DeskDrop platform, the user can view articles several times and interact with them each time, which is why you should create a new column that will reflect the user's interaction with this article by summing up all types of interactions.</p><p>In the Table <ref type="table" target="#tab_2">6</ref> presents data on user interaction with the recommendation system. Let's see what the columns with which the user interacts will look like. The following is a list of the most popular algorithms.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Overview of basic alorithms and models in recommendation systems</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Model by popularity</head><p>The most common model because of its simplicity. This model is not personalized at all. It simply recommends to the user the most popular (with the highest rating) items or content. In general, it offers good recommendations that are liked and will be interesting to most.</p><p>It shows in the metric Recall @ 5, where the figures are about 24%, which means that 24 percent with which the user interacted, the system was able to predict the ranking in the top 5. And with Recall @ 10, the figures generally reach 37% (Figure <ref type="figure" target="#fig_2">4</ref>).</p><p>2. Content based filtering model. This model uses content attributes that can be recommended to the user of the article, similar to those with which he has already interacted. TF-IDF, a popular technique in search engines, is commonly used to work with text. This technique converts unstructured text into a vector, where each word is represented by a word and the position of that word in the vector. To prepare a user profile, take all the articles he interacted with and display the main words in them and multiply them by the weight of each article relative to the user (The more the user interacted with the article, the more important the keywords in it will be). This method received a score of Recall @ 5 = 0.162 ~ 16.2 percent. Recall @ 10 = 0.261 ~ 26 percent (Figure <ref type="figure" target="#fig_3">5</ref>). As you can see in Figure <ref type="figure" target="#fig_4">6</ref>, this model, despite the fact that it is more difficult to implement showed worse results than a simpler model in popularity.  Memory-based -this model uses previous user interactions with articles to find a user with similar preferences and use it for recommendations in the future.  Model baseduses different methods and models of machine learning (neural networks, Bayesian networks) to cluster users and find common preferences between them. Next, you need to evaluate a system based on the Matrixfactorization model. In this case, in Figure <ref type="figure" target="#fig_4">6</ref> ratings for Recall @ 5 (33%) and for Recall @ 10 (46%). </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Hybrid model</head><p>The last and most progressive model, which combines the two previous models (colloborative and content-basedfiltering). This model showed the best results, namely Recall @ 5 = 34.2%, Recall @ 10 = 47.9% (Figure <ref type="figure" target="#fig_5">7</ref>). In the Table <ref type="table">7</ref> shows the results of comparison of the main models in the recommendation systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 7</head><p>Comparison of basic models in recommendation systems recall@5 recall@10 Conten-based 0,16 0,26 Popularity 0,24 0,37 Colloborative filtering 0,33 0,46</p><p>After the results given in Table <ref type="table">7</ref>, it can be concluded that for further development of the system it is necessary to use a hybrid model for the best results. We should also give an example of a more modern method that has gained popularity, namely the factorization of the matrix (Matrixfactorization). To begin with, let's learn what factorization is. Factorization is the decomposition of a matrix into principal components. Take for example a table where the columns correspond to the names of the films, and the rows of user ratings for these films (Table <ref type="table" target="#tab_3">8</ref>). If there is a dash at the place of evaluation, it means that the user has not watched this movie and the task is to predict his impressions after watching. Accordingly, in Figure <ref type="figure">9</ref> the initial matrix is marked in blue, let's call it V , and the next two matrices, on which the initial matrix should be decomposed, are called W and H we obtain an approximate matrix V in which empty values will take on a certain meaning that will correspond to the predicted estimates of users for certain products. There are three main methods of decomposing matrices and their comparison is shown in Figure <ref type="figure">8</ref>.</p><p>As can be seen from Figure <ref type="figure">8</ref> SVD and NNMF methods work best. The choice between them depends only on the data set, but they have one significant difference. When SVD works with a range of numbers from minus infinity to plus infinity, the result of the method can give the same range of numbers. And in the analysis, the NNMF method works only with positive numbers.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Work results</head><p>To get results on the proposed models, the work created a web service for finding movies, where the user can search for movies, as well as view detailed information about them, as well as the movie rating. Based on this data about the user's interaction with the site, you can create recommendations. MovieLensDataset was used to build the service. Recommendations should be based on implicit feedback. To do this, the client side collects information about user clicks, while recording information in the object, which consists of the name of the movie, the number of clicks on this movie, as well as its evaluation. After the user has watched several movies, the information is sent to the server where the object was used as test data (Figure <ref type="figure">9</ref>). As can be seen from Figure <ref type="figure" target="#fig_8">10</ref>, the server also receives user id information to make personalized recommendations. As initial data on object the client with 10 films which can be interesting to the user is sent and we receive the list of recommendations. In general, the system implements several methods of recommendations, so you need to call a certain, of your choice, to get results. The following methods of recommendations are implemented in the proposed system: Linear Regression Prediction, Content-Based Prediction, Collaborative-Filtering Prediction User-Based, Collaborative-Filtering Prediction Item -Based.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion of results</head><p>In an information-saturated world, referral systems play an essential role in the user's interaction only with potentially exciting information. In this paper, a comparative analysis of the main approaches to implementing procedures of this kind. Several basic methods were compared during the study. The most popular are basic, subject-basic, hybrid-basic and matrix factorization. Figure <ref type="figure" target="#fig_9">11</ref> shows the results of this study. On the results shown in Figure <ref type="figure" target="#fig_9">11</ref>, it can be seen that models give the best accuracy based on the hybrid approach and matrix factorization. If there are opportunities and necessary personalized recommendations, then the best ones are the ones that are different from neural networks and other approaches. After all, they remain transparent and easy to implement. If personalization is not required, using a popularity system is sufficient for most tasks. They also significantly simplify the procedure. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6.">Conclusions</head><p>Today, during a pandemic, many businesses have their recommendation pages. For example, we can name such giants as Amazon, Google, Linkedin. In this paper, much attention was paid to methods based on matrix expansions for recommendation systems, namely for the reconstruction of the rating table. Based on these methods, data analysis for the selected dataset was performed. Each of the studied methods has its characteristics and is worth noting because it is helpful for a specific range of goals set by the developer of recommendation systems. Thus, the proposed models allow us to focus on the characteristics of the object, which determine the rating of the product or service it is</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Score for films offered by the recommendation system</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Giving certain weights for interaction</figDesc><graphic coords="5,72.00,170.15,463.90,123.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: Metrics Recall @ 5 for the model by popularity</figDesc><graphic coords="6,72.00,72.00,458.90,75.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: Metrics met Recall @ 5 at Content based filtering model 3. Collaborative model. This model is divided into two types:</figDesc><graphic coords="6,76.80,226.10,441.10,86.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Metric indicators Recall@5 при colloborative model</figDesc><graphic coords="6,79.70,456.00,435.60,82.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: Metrics Recall @ 5 in the hybrid model</figDesc><graphic coords="6,72.70,623.50,449.55,81.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>W</head><label></label><figDesc>and H . Thus it is possible to deduce the general kind of expression: means that when multiplying matrices</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 8 :Figure 9 :</head><label>89</label><figDesc>Figure 8: Comparison of basic decomposition methods</figDesc><graphic coords="8,179.30,437.30,250.55,171.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 10 :</head><label>10</label><figDesc>Figure 10: Output of movies that are offered to the user through personalized analysis</figDesc><graphic coords="9,161.50,72.00,307.45,152.15" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 11 :</head><label>11</label><figDesc>Figure 11: Evaluation of the results of the use of methods in the construction of recommendation systems</figDesc><graphic coords="9,148.55,417.35,312.00,181.70" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 4 Representation</head><label>4</label><figDesc></figDesc><table><row><cell></cell><cell cols="2">of file features Shared_articles.csv</cell><cell></cell></row><row><cell>timestamp</cell><cell>eventType</cell><cell>contentId</cell><cell cols="2">authorPersonId authorSessionId Author</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell>UserAgent</cell></row><row><cell>1459411468</cell><cell cols="3">ContentShared -4011547382 38732923901</cell><cell>243872438932 Nan</cell></row><row><cell>1459411469</cell><cell cols="3">ContentShared -3834093833 37239832892</cell><cell>894173187267 Nan</cell></row><row><cell>1459411470</cell><cell cols="3">ContentShared -3736267384 56712348938</cell><cell>-21378327824</cell><cell>Nan</cell></row><row><cell>1459411471</cell><cell cols="3">ContentShared -3284737777 23923802332</cell><cell>327632872398 Nan</cell></row><row><cell>1459411471</cell><cell cols="3">ContentShared -5671839300 23983298320</cell><cell>23932893232</cell><cell>Nan</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head>Table 5</head><label>5</label><figDesc>Representation of file featuresusers_interaction.csv</figDesc><table><row><cell>timestamp</cell><cell>eventType</cell><cell>PersonId</cell><cell>SessionId</cell><cell>contentId</cell><cell>userAgent</cell></row><row><cell>12782187</cell><cell>View</cell><cell>-2383298233</cell><cell cols="2">1872414232 3223898921</cell><cell>Nan</cell></row><row><cell>14789898</cell><cell>Follow</cell><cell>83893722323</cell><cell cols="2">3213313132 2392841894</cell><cell>Mozilla</cell></row><row><cell>12873891</cell><cell>View</cell><cell>31839212323</cell><cell cols="2">2298283933 8023974873</cell><cell>Nan</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 6</head><label>6</label><figDesc></figDesc><table><row><cell cols="3">Representation of interaction between users and certain content</cell><cell></cell></row><row><cell></cell><cell>personId</cell><cell>ContentId</cell><cell>EventStrength</cell></row><row><cell>0</cell><cell>-231789239</cell><cell>-89762372</cell><cell>1.00000</cell></row><row><cell>1</cell><cell>-998327887</cell><cell>-83478183</cell><cell>1.00000</cell></row><row><cell>2</cell><cell>-932834343</cell><cell>-23873277</cell><cell>3.16943</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 8</head><label>8</label><figDesc></figDesc><table><row><cell cols="3">User ratings for specific movies</cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>Avenger</cell><cell>Thor</cell><cell>DeadPool</cell><cell>Avatar</cell><cell>Rocky</cell><cell>Titanic</cell></row><row><cell>Pumba</cell><cell>4</cell><cell>5</cell><cell>3</cell><cell>3</cell><cell>1</cell><cell>-</cell></row><row><cell>Henry</cell><cell>5</cell><cell>-</cell><cell>3</cell><cell>2</cell><cell>-</cell><cell>4</cell></row><row><cell>Jerry</cell><cell>1</cell><cell>2</cell><cell>2</cell><cell>-</cell><cell>4</cell><cell>2</cell></row><row><cell>Tom</cell><cell>3</cell><cell>4</cell><cell>-</cell><cell>2</cell><cell>4</cell><cell>1</cell></row><row><cell>Timon</cell><cell>4</cell><cell>2</cell><cell>3</cell><cell>5</cell><cell>3</cell><cell>-</cell></row></table></figure>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><p>looking for. The application of the proposed algorithms allowed you to choose the best option for creating your recommendation system, which offers the user a behaviour model.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A Survey of k Nearest Neighbor Algorithms for Solving the Class Imbalanced Problem</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bo</surname></persName>
		</author>
		<author>
			<persName><surname>Ch</surname></persName>
		</author>
		<author>
			<persName><surname>Haiyan</surname></persName>
		</author>
		<idno type="DOI">10.1155/2021/5520990</idno>
		<ptr target="https://doi.org/10.1155/2021/5520990" />
	</analytic>
	<monogr>
		<title level="j">Wireless Communications and Mobile Computing</title>
		<imprint>
			<biblScope unit="volume">2021</biblScope>
			<date type="published" when="2021">2021</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Decision tree classifiers for evidential attribute values and class labels</title>
		<author>
			<persName><forename type="first">A</forename><surname>Trabelsi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Elouedi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Lefevre</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Fuzzy Sets and Systems</title>
		<imprint>
			<biblScope unit="volume">366</biblScope>
			<biblScope unit="page" from="46" to="62" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<title level="m" type="main">Recommender systems, Introduction to approaches and algorithms</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">T</forename><surname>Jones</surname></persName>
		</author>
		<ptr target="https://www.ibm.com/developerworks/library/os-recommender1/" />
		<imprint>
			<date type="published" when="2017-11-25">November 25, 2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">The information model of cloud data warehouses</title>
		<author>
			<persName><forename type="first">N</forename><surname>Shakhovska</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Boyko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Pukach</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Advances in Intelligent Systems and Computing (AISC)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">871</biblScope>
			<biblScope unit="page" from="182" to="191" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Advanced Technologies of Big Data Research in Distributed Information Systems</title>
		<author>
			<persName><forename type="first">N</forename><surname>Kunanets</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Vasiuta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Boikо</surname></persName>
		</author>
		<idno type="DOI">10.1109/STC-CSIT.2019.8929756</idno>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 14th International conference &quot;Computer sciences and Information technologies</title>
				<meeting>the 14th International conference &quot;Computer sciences and Information technologies</meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="71" to="76" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A quality-based recommender system to disseminate information ina university digital library</title>
		<author>
			<persName><forename type="first">A</forename><surname>Tejeda-Lorente</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Porcel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Peis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sanz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Herrera-Viedma</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Sciences</title>
		<imprint>
			<biblScope unit="volume">266</biblScope>
			<biblScope unit="page" from="52" to="69" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Recommender Systems</title>
		<author>
			<persName><forename type="first">C</forename></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-29659-3</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1007/978-3-319-29659-3" />
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>Springer</publisher>
			<biblScope unit="page">498</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Recommended for you: The Netf lix Prize and the production of algorithmic culture</title>
		<author>
			<persName><forename type="first">B</forename><surname>Hallinan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Striphas</surname></persName>
		</author>
		<idno type="DOI">10.1177/1461444814538646</idno>
	</analytic>
	<monogr>
		<title level="j">New Media &amp; Society</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="117" to="137" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">De-Biasing User Preference Ratings in Recommender Systems</title>
		<author>
			<persName><forename type="first">G</forename><surname>Adomavicius</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bockstedt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Curley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhang</surname></persName>
		</author>
		<ptr target="http://ceur-ws.org/Vol-1253/paper1.pdf" />
	</analytic>
	<monogr>
		<title level="m">Proceedings of the Joint Workshop on Interfaces and Human Decision Making for Recommender Systems co-located with ACM Conference on Recommender Systems</title>
				<meeting>the Joint Workshop on Interfaces and Human Decision Making for Recommender Systems co-located with ACM Conference on Recommender Systems</meeting>
		<imprint>
			<biblScope unit="page" from="2" to="9" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Shilling attacks against recommender systems: a comprehensive survey</title>
		<author>
			<persName><forename type="first">I</forename><surname>Gunes</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Kaleli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Bilge</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Polat</surname></persName>
		</author>
		<idno type="DOI">10.1007/s10462-012-9364-9</idno>
	</analytic>
	<monogr>
		<title level="j">Arti-ficial Intelligence Review</title>
		<imprint>
			<biblScope unit="volume">42</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="767" to="799" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Comparative Study on Shilling Detection Methods for Trustworthy Recommen-dations</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Qian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11518-018-5374-8</idno>
	</analytic>
	<monogr>
		<title level="j">Journal of Systems Science and Systems Engineering</title>
		<imprint>
			<biblScope unit="volume">27</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="458" to="478" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">A State of Art Survey on Shilling Attack in Collaborative Filtering Based Recommendation System</title>
		<author>
			<persName><forename type="first">K</forename><surname>Patel</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Thakkar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Shah</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Makvana</surname></persName>
		</author>
		<idno type="DOI">10.1007/978-3-319-30933-0_38</idno>
		<idno>3-319-30933-0_38</idno>
		<ptr target="org/10.1007/978-" />
	</analytic>
	<monogr>
		<title level="m">Smart Innovation</title>
				<imprint>
			<publisher>Systems and Technologies</publisher>
			<date type="published" when="2018">2018</date>
			<biblScope unit="page" from="377" to="385" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Abnormal Profiles Detection Based on Time Series and Target Item Analysis for Recommender Systems</title>
		<author>
			<persName><forename type="first">W</forename><surname>Zhou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Ren</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Li</surname></persName>
		</author>
		<idno type="DOI">10.1155/2015/490261</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1155/2015/490261" />
	</analytic>
	<monogr>
		<title level="j">Mathematical Problems in Engineering</title>
		<imprint>
			<biblScope unit="page" from="1" to="9" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Detection of Abnormal Item Based on Time Intervals for Recommender Sys-tems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Xiong</surname></persName>
		</author>
		<idno type="DOI">10.1155/2014/845897</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1155/2014/845897" />
	</analytic>
	<monogr>
		<title level="j">The Scientific World Journal</title>
		<imprint>
			<biblScope unit="page" from="1" to="8" />
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Item Anomaly Detection Based on Dynamic Partition for Time Series in Recommender Systems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Gao</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Tian</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Xiong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Yang</surname></persName>
		</author>
		<idno type="DOI">10.1371/journal.pone.0135155</idno>
		<idno>doi:</idno>
		<ptr target="https://doi.org/10.1371/journal.pone.0135155" />
	</analytic>
	<monogr>
		<title level="j">PLOS ONE</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="135" to="155" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Method for detecting shilling attacks in e-commerce systems using weighted temporal rules</title>
		<author>
			<persName><forename type="first">O</forename><surname>Chala</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Novikova</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Chernyshova</surname></persName>
		</author>
		<idno type="DOI">10.21303/2461-4262.2019.00983</idno>
		<idno>-4262.2019.00983</idno>
		<ptr target="https://doi.org/10.21303/2461" />
	</analytic>
	<monogr>
		<title level="j">EUREKA: Physics and Engineering</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="29" to="36" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Method of determining weights of temporal rules in Markov logic network for building knowledge base in information control systems</title>
		<author>
			<persName><forename type="first">V</forename><surname>Levykin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Chala</surname></persName>
		</author>
		<idno type="DOI">10.21303/2461-4262.2018.00713</idno>
		<idno>-4262.2018.00713</idno>
		<ptr target="https://doi.org/10.21303/2461" />
	</analytic>
	<monogr>
		<title level="j">EUREKA: Physics and Engineering</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="3" to="10" />
			<date type="published" when="2018">2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Method of forming recommendations using temporal constraints in a situation of cyclic cold start of the recommender system</title>
		<author>
			<persName><forename type="first">S</forename><surname>Chalyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Leshchynskyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Leshchynska</surname></persName>
		</author>
		<idno type="DOI">10.21303/2461-4262.2019.00952</idno>
		<idno>- 4262.2019.00952</idno>
		<ptr target="https://doi.org/10.21303/2461" />
	</analytic>
	<monogr>
		<title level="j">EUREKA: Physics and Engineering</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="34" to="40" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
