<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X (O. Hordiichuk-Bublivska);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modified Funk SVD-Augmented Recommender Systems for Advancing Visual Data Processing in Industrial IoT</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Olena Hordiichuk-Bublivska</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halyna Beshley</string-name>
          <email>halyna.v.beshlei@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Iryna Ivanochko</string-name>
          <email>irene.ivanochko@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykola</string-name>
          <email>mykola.i.beshlei@lpnu.ua</email>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Beshley</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Orest Kochan</string-name>
          <email>orestvk@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Comenius University in Bratislava</institution>
          ,
          <addr-line>82005 Bratislava 25</addr-line>
          ,
          <country country="SK">Slovakia</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Lviv Polytechnic National University</institution>
          ,
          <addr-line>Bandera Str. 12, Lviv, 79013</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>1936</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0001</lpage>
      <abstract>
        <p>Industrial recommender systems are currently an active area of research and development, with many businesses across various industries leveraging them to improve their customer experience and increase their revenue. The growth of 5G industrial networks has led to a massive increase in the volume of visual data (images, video information) generated from various sources, making it challenging to process and analyze the data. Additionally, traditional recommendation systems used in these networks may not be able to handle the massive amount of data and provide accurate recommendations. This article proposes a modified Funk Singular-Value Decomposition (SVD) approach for enhancing collaborative filtering in recommendation systems for 5G industrial networks. The proposed approach can effectively reduce the dimensionality of the data and capture the underlying patterns and relationships between users and items, thereby enhancing the performance of the recommendation system. According to the study results, it was determined that when using less data about users, the speed of providing recommendations increases. It was also established that the accuracy of calculations improves when additional item features are included. The simultaneous use of two modifications allows to improve the accuracy of providing recommendations by 2%, as well as to reduce the duration of calculations by an average of 10-15%. The proposed modifications of the FunkSVD algorithm can improve the level of providing user recommendations according to their requirements. The research results can be used to optimize the operation of industrial and 5G systems with dynamic parameter changes.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;recommender systems</kwd>
        <kwd>collaborative filtering</kwd>
        <kwd>big data</kwd>
        <kwd>funk singular-value decomposition algorithm</kwd>
        <kwd>5G industrial network paper1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The modernization of industrial systems has brought significant changes to the way
production processes are managed. The Industry 4.0 concept has enabled the digitization of
manufacturing, leading to the implementation of modern information systems that solve
several problems to deliver the appropriate quality of service. In the industrial system, the
problem of data collection from various end devices, storage, and analysis for further
decisionmaking must be solved [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. The quality of user service is one of the most important criteria for
evaluating the efficiency of industrial systems. Defined characteristics of service provision for
one user can be used to improve it for others. The more sources of information are analyzed,
the easier it is to determine general patterns and possible problems in the operation of
industrial systems. At the same time, the overabundance of data constantly arriving from
various end devices is not always critical for computing. Data analysis and optimization
methods should be used [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Storing and processing data received from various distributed sources is extremely
important for modern industrial systems. Cloud technologies are used to improve the
efficiency of big data analysis. Cloud manufacturing (CMfg) is an important component of the
Industry 4.0 concept [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. CMfg allows an industrial system to monitor its resources and
quickly access them. Also, users can exchange data with other and global control nodes,
saving them on cloud servers [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Recommender systems are widely used in various industries, including industrial
networks, to provide personalized recommendations to users [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. In industrial networks,
recommender systems can be used to recommend products, services, and suppliers to
businesses, based on their past purchases, interests, and behavior [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Overall, recommender
systems have the potential to provide significant benefits to businesses in industrial networks
by improving the efficiency of purchasing and reducing the time and effort required to find
suppliers and products. In an industrial setting, recommender systems can be used in various
ways, such as recommending maintenance schedules for machines, optimizing production
processes, recommending suppliers for raw materials, and more. With the high bandwidth and
low latency of 5G networks, these systems can provide real-time recommendations to users,
allowing them to make decisions quickly and efficiently [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. However, implementing
recommender systems in this context requires careful consideration of the unique challenges
and limitations of industrial networks. Since most endpoints in the Industrial Internet of
Things (IIoT) are located remotely from each other, data is transmitted over wireless
communication channels. 5G mobile communication systems allow serving users quickly and
efficiently, providing them with a wide range of communication services [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. It often
happens that the amount of information significantly exceeds the 5G bandwidth, which leads
to delays or the need to reduce the quality of the transmitted content. Thus, it is necessary to
solve the problem of data transmission to users, data optimization, resource allocation and
system load.
      </p>
      <p>It is also important to consider the specific needs of the industrial setting when developing
a recommender system. This may involve identifying the most relevant data sources, selecting
appropriate algorithms for data analysis, and incorporating domain-specific knowledge into
the recommender system. In 5G industrial networks, there can be a large number of users and
items, which can result in sparse data. Sparse data refers to situations where there are few
ratings or interactions between users and items. This can make it challenging to generate
accurate recommendations using traditional collaborative filtering algorithms.</p>
      <p>The collection of data on sales statistics and the use of services by different categories of
users allows us to better understand their needs and adapt production processes to them
[1012]. The list of goods and services is constantly expanding, and the requirements for the
quality of service are growing, so it is necessary to constantly look for new methods of data
processing.</p>
      <p>The novelty of this work lies in the proposal of modifications to the Funk SVD algorithm
for processing big data in industrial settings, with the aim of developing effective 5G
industrial recommender systems. The main contribution of the study is in two aspects. First,
we propose to use only a part of the user's data to generate recommendations, which reduces
the load on 5G channels and the duration of calculations, while maintaining a high level of
accuracy in data processing. Second, we demonstrate the effectiveness of incorporating
additional item features to improve the accuracy of recommender systems.</p>
      <p>Overall, the proposed data optimization techniques have the potential to revolutionize the
way 5G industrial networks operate, by enabling the development of more accurate and fast
recommender systems. The study's results highlight the prospect of using modified FunkSVD
algorithms to improve the quality of service for different types of 5G systems users, leading to
increased efficiency, reduced costs, and optimized processes</p>
      <p>The rest of the paper is organized as follows. In Section 2, we provide a literature review of
collaborative filtering and its variants. In Section 3, we introduce the challenges and solutions
for 5G industrial recommendation systems. In Section 4, we compare the SVD and Funk SVD
algorithms for data optimization in industrial 5G recommender systems. In Section 5 and
Section 6, we describe the proposed enhanced collaborative filtering approach using
modifications of the Funk SVD. Section 7 contains the results and discussion, while the
conclusion of the paper is presented in Section 8.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related Works</title>
      <p>
        We will analyze current research in this field. E.P. Xing et al. [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] defined the problem of big
data processing in ML and proposed a framework for systematizing information. In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], V.
Vashishth et al. analyzed the internment of cloud technologies and IIoT and proposed a
method for optimal access to remote resources. D. Tarek et al. proposed a distributed protocol
for managing large traffic volumes in IoT systems [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], S. Sennan et al. studied the
problem of data clustering in IoT systems and proposed an optimization algorithm for Cluster
Head (CH) selection. In [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], M.C. Adikari and T.P Amalan proposed a software model with
optimal operating parameters for big data analytics and ML (ML) in FMCG (Fast Moving
Consumer Goods).
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ], B. Raviteja et al. investigated the relevance of using ML algorithms to improve the
efficiency of Supply Chain Management (SCM) systems. G.K. Singh et al. in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] considered
the importance of Big Data analysis for solving business and logistics management problems.
H. Fan et al. analyze the operation of IIoT systems as a component of the Industry 4.0 concept
and propose a federated learning-based privacy-preserving data aggregation scheme [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In
[
        <xref ref-type="bibr" rid="ref21">21</xref>
        ] W. Gao et al. determine the importance of applying federated learning in IIoT systems
and propose a resource allocation scheme that allows for choosing the best learning devices.
Liang et al. in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] also investigate the problem of big data processing in IIoT systems and the
selection of optimal end devices for training. The authors also propose a Deep Q-Network
(DQN)-based scheme for optimal resource allocation.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], K. Shah et al. analyze the features of the application of recommender systems for
intelligent user selection of goods and services. Z. Guo et al. in [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ] investigate the use of
recommender systems for IIoT. The authors offer their own implicit feedback-based group
recommender system. B. Wu et al. consider the problem of determining the relationships
between users and goods in IoT systems and provide a framework for improving item
recommendation [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], S.M. Kasongo investigated the importance of intrusion
detection in IIoT systems and proposed their Intrusion Detection Systems (IDSs), which are
more efficient and reliable than existing ones. A. Simeone et al. in [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] analyze the service of
users of intelligent production and proposed the provision of personal recommendations using
an intelligent decision-making recommender system.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ], T. Vafeiadis et al. offer a smart recommender system that analyzes data from
various IoT devices and enhances decision support. Y. Fu et al. investigate the problem of
intelligent resource management in 5G networks [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ], A. Vulpe et al. consider
performance indicators of the LTE RAN network to detect possible malfunctions of the
terminal equipment. The authors also offer their analytics framework that can be used for 5G
networks. Yongchang Wang and L. Zhu [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] investigate and compare different big data
optimization methods. The authors note the advantages of the SVD algorithm for determining
the most important information for processing. C. Zhang et al. [
        <xref ref-type="bibr" rid="ref32">32</xref>
        ] investigate the methods of
automated processing of big data and propose a feature extraction method that uses SVD and
PCA (Principal component analysis) algorithms.
      </p>
      <p>
        K. Birul offers a modified Funk SVD that uses data on all products and only one user to
form recommendations [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ]. S. Guo et al. consider the Funk SVD algorithm for improving the
performance of recommender systems [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ]. As is clear from the analyzed sources, processing
big data in industrial and 5G systems is still an actual problem. However, user data analysis
using recommender systems, considering dynamic changes in service quality requirements,
system performance indicators, etc., have not been sufficiently researched.
      </p>
      <p>
        In our previous work [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ], we investigated improving the performance of recommender
systems and proposed a modified federated SVD, which demonstrated the accuracy and
reliability of the results. Extending the research, we used the FunkSVD algorithm to process
sparse data in this work. We also proposed modifying the Funk SVD algorithm for its more
efficient use under different system parameters and loads in 5G systems. The proposed
modifications improve both the accuracy and speed of providing recommendations to users
and the analytics of production processes.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Challenges and Solutions for 5G Industrial Recommendation</title>
    </sec>
    <sec id="sec-4">
      <title>Systems</title>
      <p>5G industrial recommendation systems have the potential to revolutionize the way factories
and industrial plants operate, by enabling real-time data collection and analysis, predictive
maintenance, and optimized production processes. Overall, the successful implementation of
5G industrial recommendation systems requires a combination of advanced technologies,
secure data transmission protocols, and efficient data processing and analysis algorithms.</p>
      <p>
        For the efficient operation of ML algorithms, it is necessary to use large amounts of
information. The development of information technologies and rapid digitalization contribute
to the daily generation of significant data sets from various sources. Thanks to such data, it is
possible to better identify features characteristic of individual tasks to accurately determine
the result. However, the excess of information still complicates the work of computational
algorithms. The processing and storage of large data arrays lead to the consumption of
computing resources and the slowing down of calculations. The diversity of information
sources also requires the adaptation of ML algorithms and distributed data processing [
        <xref ref-type="bibr" rid="ref36">36-38</xref>
        ].
      </p>
      <p>Federated learning is one of the methods of effective organization of distributed data
processing using ML [39]. Instead of sending all the data from different distributed nodes to
each other, they are processed on local nodes. Only the results of the calculations are sent to
the controller, which updates the entire machine-learning system. Federated learning is
effectively used in industrial systems, as it solves the problem of processing data collected
from different end devices. This improves the reliability and privacy of users' private
information, as it does not need to be transmitted over the network [40-42].</p>
      <p>Statistical analysis is extremely important for operating commercial systems that provide
users with certain goods or services. Based on the previous actions of customers, it is possible
to determine how satisfied they are with the services they use. Recommender systems (RS),
are used to establish relationships between users and goods or services, which are generally
called items. We can often see examples of recommender systems in everyday life. When
visiting websites or applications, users are offered advertisements for items that may interest
them in some way. For example, when searching for a certain object on the site, the
recommender system also identifies similar ones according to certain parameters. Similar
products or services are designated as “you may like this,” “other products you may like,” etc.
There are different approaches to determining the most appropriate items for users.
Recommendations can be personalized, that is, determined by taking into account the
characteristics of a specific user. Non-personalized recommendations common to a certain
group of users can also be calculated.</p>
      <p>For the work of recommender systems, special methods are used for processing data from
users. The result of RS is suggestions to users about new products or services they are most
probably to like. The most common approaches to the work of recommender systems are:</p>
      <p>Content-based, which analyzes the similarity of different products to each other. If a user
liked a certain product or service before, there is a high probability that he will highly rate
similar ones in the future. The advantage of this approach is the simplicity of implementation.
The disadvantage is that new and unlike other products have little chance of getting into the
recommendations;</p>
      <p>Collaborative filtering forms recommendations by analyzing user profiles. In case of
finding similarities between two or more users, they are recommended products or services
previously chosen by other group members. This approach demonstrates high efficiency. At
the same time, preparing a recommender system in advance is necessary, providing
information about users and their preferences. In the absence of information, problems arise
in the formation of recommendations;</p>
      <p>A hybrid approach to the formation of recommendations, combining the above [43].</p>
      <p>Intelligent production systems focus not only on producing certain products but also on
their sale to end users. Determining the level of interest in certain goods or services is
extremely important for the system's effective functioning [44, 45]. A situation often arises
when a product is not in demand among users due to its features. As a result of monitoring
feedback and sales statistics, possible modifications and improvements of services and goods
can be identified and immediately implemented. Automating the management of the
intelligent production system contributes to the prompt resolution of existing problems and
the prevention of new ones. 5G Wireless Network is an important component of smart
manufacturing. Since many final IoT devices are located at a considerable distance from each
other, wireless communication allows to combine them into a single data exchange system.
End users can connect to the network when they need to send or receive information. 5G
technology makes it possible to provide various communication services at high speed and
ensure the required quality of service. However, large amounts of data exchanged between
users and the system create a significant load on communication channels and processing
devices. As a result, some of the services may be of lower quality or may not be available at
all.</p>
      <p>The architecture of the industrial system using the 5G network for visual data
communication from IIoT devices is shown in Fig.1.</p>
      <p>ML and artificial intelligence methods are used to optimize the operation of 5G networks.
Analysis of the provided services and load changes depending on various parameters helps to
better adjust the system parameters. ML methods make it possible to distribute network
resources according to user needs and quickly solve problem situations. Thus, the mobile
network can flexibly adapt to different operating conditions and determine priorities in user
service. Having determined the areas of the mobile communication system that are the most
loaded, it can be automatically attracted additional resources. For this purpose, constant
monitoring of the load and performance indicators of the system is carried out. The process of
processing user requests in 5G systems is shown in Fig.2.</p>
      <p>The different types of traffic provided to users of 5G systems also require special attention
to the provision of service priorities and allocating necessary communication resources [46].
Multimedia data transmission uses more power than voice messages. The reliability and
confidentiality of user data should also be ensured when forwarding them for processing. ML
methods solve the problems of big data optimization, analysis, and decision-making. Due to
many end users, ML algorithms receive much information to train. However, since the data
often contains redundancy and is too cumbersome to calculate, it should be pre-processed, and
the most important ones should be selected.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Comprehensive Study of SVD and Funk SVD Algorithms for</title>
    </sec>
    <sec id="sec-6">
      <title>Visual Data Optimization in Industrial 5G Recommender</title>
    </sec>
    <sec id="sec-7">
      <title>Systems</title>
      <p>The improvement of industrial systems made it necessary to process huge data sets. The
information coming from different devices is often of various types, unstructured, and of large
volume. Big data processing devices usually cannot process it efficiently, so users do not get
timely results. For faster calculations, data should be pre-prepared and brought to a clear and
concise form. Optimizing big data and discarding redundancy is one of the most relevant for
modern industrial systems.</p>
      <p>ML, Deep Learning, and Data Mining methods are used for intelligent information
processing. There are many ways to transform data of a higher dimension into a smaller one
while preserving its properties with a certain level of accuracy. For example, one of the most
popular methods is Principal component analysis (PCA), which solves the problem of
dimensionality reduction while preserving as many properties of the original data as possible.
PCA represents data sequences as a set of interdependent variables, the principal components
(PCs). Then, the most informative variables are searched, and unimportant ones are discarded.
The Latent semantic analysis (LSA) algorithm is similar to PCA, but it is used more to analyze
text sequences. Both methods can be extended to the Singular value decomposition (SVD)
algorithm, an improved way to identify the most important data and discard redundancy.</p>
      <p>SVD decomposes the original matrix into the product of three mutually orthogonal
submatrices. This method is optimal for processing and optimizing matrices that are not
rectangular. Compared to the PCA algorithm, SVD more effectively determines the
fundamental properties in data arrays and considers their diversity. Singular Value
Decomposition involves representing the initial data matrix A ( m , n ) as:</p>
      <p>A = P × Δ × Q,
(1)
where matrix P has dimension ( m , m ), matrix Q has dimension ( n , n ), matrix Δ has
dimension ( m , n ) and demonstrates the relationship between P and Q.</p>
      <p>
        SVD is widely used for recommender systems and has repeatedly proven its effectiveness
[
        <xref ref-type="bibr" rid="ref31">31</xref>
        ]. However, in real systems where large data from various devices are processed, several
problems arise. First, the information should be brought to a form suitable for forming
recommendations. Thus, all data on the interaction of users and items should be presented as
a numerical score. Methods of pre-processing and optimization of information are used to
solve this problem. It is also important to consider that only under ideal conditions we can get
almost all the data on the evaluations of each item from all users and form the
recommendations matrix. In such a table, the rows correspond to users, the columns
correspond to items, and at the intersection, there are ratings, that is, evaluations.
      </p>
      <p>In real recommender systems, we receive only part of the information about users' interest
in certain products. Many products have not yet received customer reviews, and recently
registered users do not have a purchase history. Recommender systems are designed to fill
empty cells in recommendation tables but should also process data more compactly and
efficiently. Recommendation tables usually have dimensions (m,n), where m is the number of
users, and n is the items. Due to the sparseness of the data matrices, it does not make sense to
process them all since they do not carry information for forming recommendations but use a
lot of computing resources.</p>
      <p>For determining the most relevant services for specific categories, recommender systems
should be used that establish correspondences between users and products. Thus, the
efficiency of service delivery is improved. 5G recommender systems have the problem of
processing extremely large data, which are often not extremely important for forming
recommendations. Recommendation matrices look like this:</p>
      <p>A ( n , m )= a21
…
a11
an1</p>
      <p>N / A
a22
…
N / A
…
…
…
…
a1m
N / A
…
anm
,
where aij is a value of interaction between user i and item j, N/A is a data Not Available or
unknown.</p>
      <p>
        An excess of information leads to a slowing down of calculations and an overloading of
devices. Sparse data matrices are better optimized by discarding empty cells or those
containing unimportant information. For sparse data processing, the paper proposes to
improve the existing Funk SVD algorithm, which decomposes the initial matrix A into the
product of two submatrices [
        <xref ref-type="bibr" rid="ref34 ref35">34, 35</xref>
        ]:
where k &lt; n and k &lt; m.
      </p>
      <p>The FunkSVD algorithm uses the Stochastic Gradient Descent method to gradually reduce
the error between the original matrix and the resulting one. Thus, it is possible to determine
the Sum of the Squared Error for each decomposition:</p>
      <p>A ( n , m )= M ( n , k )× N ( k , m )T ,
min</p>
      <p>∑
i∈ n , j∈ m
( ai , j−m × nTj )2+(|mi|2+|nTj|2 ),
i
where ai , j is the elements of the original recommendation matrix, ni , m j is the elements of
matrices N and M accordingly.</p>
      <p>The values of the element of the initial matrix a'i , j are obtained by multiplying the rows
and columns with the corresponding indices:
The calculation error can be defined as follows:</p>
      <p>Err =ai , j−a'i , j</p>
      <p>We can update the matrix M element, using learning coefficient ε and correction
coefficient θ:
m' =mi+ ε ( Err × 2 × n j+θ × m ),
i i
(2)
(3)
(4)
(5)
(6)
(7)
Let's also calculate the element of the matrix N :
Then the users recommendation is determined as:
di , j is the total coefficient of deviation of user and product indicators from the total:
The accuracy of providing recommendations can be calculated:
(8)
(9)
(10)
(11)
(12)
n'j=n j+ ε ( Err × 2 × mi+θ × n j ).
a'i , j=m' × n'jT + di , j ,</p>
      <p>i
di , j=di+ d j+ ∆ ,</p>
      <p>K true¿=
where di is the deviation from the average value for the user, d j the same for item, ∆ is the
regularization factor.</p>
      <p>The accuracy and efficiency of the recommender system can be determined by presenting
its confusion matrix (Table 1):</p>
      <p>According to Table 1, K truepositive is the probability that the recommended item interested the
user;</p>
      <p>K falsepositive is the corresponds to the probability of a positive recommendation for an
uninteresting item;</p>
      <p>K falsenegative is the probability of the negative recommendation for the interesting item;
K truenegative is the probability of the negative recommendation for the uninteresting item.</p>
      <p>The probability of giving a positive recommendation if the item is not interesting to the
user can be represented as:</p>
      <p>Probability of giving a negative recommendation if the product is not interesting to the
user:</p>
      <p>However, to evaluate the effectiveness of the FunkSVD algorithm, recommendations can
be directly determined Mean Absolute Error (MAE) for matrix Awith dimension N :</p>
      <p>In the work, we use the Root Mean Square Error, (RMS Error, RMSE) to check the accuracy
of the recommendation calculations:</p>
      <p>K positive¿=
K truepositive+ K falsepositive
(13)
(14)
(15)
K rmse ( Accuracy )=√ i , j=1</p>
      <p>N
∑ ( ai , j−a'i , j )2
|N|
.</p>
      <p>For studying the effectiveness of data processing by the FunkSVD algorithm, a program
model was created in the Python programming language, and data from an open
recommender system was used. For a better understanding of the algorithm's operation, data
of different volumes and with different levels of sparseness were extracted.</p>
      <p>A comparison of data calculation durations by SVD and Funk SVD algorithms is shown in
Fig. 3. Data matrices with different degrees of sparseness, i.e., cells filled with information,
were studied.</p>
      <p>900
800
s700
c
,m600
e
tmi500
no400
ti
ceu300
x
E200
100
0
SVD
5 10 15 20 30 50 75</p>
      <p>Data sparsity, %
Figure 3: The comparison of execution time by SVD and Funk SVD algorithms.</p>
      <p>As we can see from Fig. 3, SVD works longer, while the difference with Funk SVD
increases with the increase in the percentage of data sparsity. If the system processes a lot of
redundant data, Funk SVD allows to discard part of it and speed up the calculation.</p>
    </sec>
    <sec id="sec-8">
      <title>5. Modified Funk SVD Approach for Improving the execution time of Recommendation Systems</title>
      <p>Although FunkSVD works quite well with sparse data, it can still be improved to speed up the
calculations. According to eq. (5) the Funk SVD algorithm uses data about all users and
products to determine the unknown cell value of the initial data matrix. In the paper, we
proposed using different number of users δ in the calculations to modify the existing Funk
SVD algorithm:
where δ &lt; k.</p>
      <p>The number of users whose data is considered in the calculations is chosen arbitrarily and
can be modified to achieve a better result. Thus, it is possible to form recommendations by
processing a smaller amount of data, which will undoubtedly speed up the work of
recommender systems. The results of the comparison of calculation durations are shown in</p>
      <p>According to Fig.4, a pattern of calculation acceleration can be observed when using less
information about users. Now let's compare the calculations' accuracy, i.e., the difference
between the original data matrix and the one restored after decomposition (Fig.5).
2500
Funk SVD, n = 30%
Funk SVD, n = 50%
Funk SVD, n = 70%
Funk SVD, n = 100%
200
500
750
1000
1500</p>
      <p>2000</p>
      <p>Research results show a slight deterioration in the accuracy of calculations when using a
smaller number of users. This approach allows to select different systems' optimal data
processing parameters. We can attract fewer user data if it needs to process information
quickly. More data can be used to make recommendations in newly created or dynamically
updated systems.</p>
    </sec>
    <sec id="sec-9">
      <title>6. Enhancing Accuracy of Recommendation Systems in 5G</title>
    </sec>
    <sec id="sec-10">
      <title>Industrial Networks using Modified Funk SVD Algorithm</title>
      <p>The next modification of the FunkSVD algorithm proposed in this work is to improve the
accuracy of recommendations. For improving the calculation accuracy of the Funk SVD
algorithm, we suggest using more features about the items added to the matrix of goods after
the layout by the standard algorithm. Such feautures are data on the dependencies of items
and users, which affect the accuracy of the formation of recommendations. In 5G systems,
additional data can be collected about groups of users, their interaction with goods, and
features of interest in a certain service. There are no such features in the initial
recommendation matrix, which contains only product ratings. Instead, we can use them to
improve the quality of providing recommendations, if there is such a need (Fig. 6).</p>
      <p>Thus, to calculate a recommendation to the user for a certain product, we form a new
items matrix N mod after FunkSVD decomposition containing additional features:</p>
      <p>In 5G mobile communication systems, users are divided into groups. For example, special
services are provided for business needs, collecting additional statistics. Such clients need
high-quality recommendations according to individual characteristics. We conducted
performance studies for the proposed algorithm. A comparison of calculation durations for the
non-modified and modified algorithms is shown in Fig.7.</p>
      <sec id="sec-10-1">
        <title>Funk SVD</title>
      </sec>
      <sec id="sec-10-2">
        <title>Mod Funk SVD</title>
        <p>As shown in Fig.8, the modified Funk SVD demonstrates better calculation accuracy, so it
can be used to form effective recommendations. As a result of the use of additional properties
of products, it is possible to better determine their value for users.</p>
      </sec>
    </sec>
    <sec id="sec-11">
      <title>7. Results and Discussion</title>
      <p>Overall, the challenge of processing large amounts of data quickly and accurately is a key
consideration in developing effective 5G industrial recommendation systems. As we can see
from the obtained results, two modifications of the FunkSVD algorithm allow more flexible
organization of the calculation of recommendations. If it is necessary to reduce the duration of
the algorithm, we use the first modification. To improve the accuracy of calculations, we use
the second. Now let's compare the effectiveness of simultaneously using two modifications of
the FunkSVD algorithm in comparison with the non-modified one. Thus, we define the
recommendations:</p>
      <p>
        Let's calculate the error of the recommendations according to Eq.6. and update the matrices
M and N :
n'jmod=n jmod+ ε ( Err × 2 × mi+θ × n jmod ).
(18)
(20)
requirements and system load to achieve the best efficiency of user data calculations in 5G
systems. For improving the reliability and privacy of data collection from end users, we
recommend the modified federated SVD algorithm, which was considered in our previous
study [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ]. Improving the reliability of the modified FunkSVD method proposed in this work
will be the subject of our future research.
      </p>
      <p>The speed and accuracy of data processing contribute to a better understanding of client
needs and prompt provision of appropriate services. Thus, the proposed modifications
contribute to the modernization of 5G systems, expanding the range of their services and
improving interaction with users. Given the constant appearance of new services for users in
5G mobile communication networks, the problem of flexible resource allocation is already
relevant. Depending on the needs and status of customers, the level of services they need, and
the state of the mobile network, we can choose the appropriate recommendation algorithm.
Also, the simultaneous use of two modifications improves both the accuracy and duration of
calculations.</p>
    </sec>
    <sec id="sec-12">
      <title>8. Conclusions</title>
      <p>We found that with the development of the IIoT and the use of a large number of visual
sensors, the amount of visual data is growing rapidly. This creates the challenge of effectively
processing, analyzing, and using this data to ensure productivity and optimize processes in
industrial environments. We concluded that the 5G industrial recommender systems can help
manufacturing companies optimize their processes and increase efficiency. Collaborative
filtering is a popular technique used in recommendation systems, but there are several
challenges associated with it that need to be addressed in order to develop effective 5G
recommendation systems. In particular, collaborative filtering relies on user-item interactions
to make recommendations. However, in many industrial settings, data can be sparse and
incomplete, making it difficult to accurately capture user preferences and generate meaningful
recommendations. That's why we analyzed big data optimization algorithms and
recommendation systems. The advantages of the Funk SVD algorithm for processing big data
in industrial systems are determined. For improving the efficiency of processing information
from users, modifications of Funk SVD are proposed. First, not all data from users is used to
form recommendations, but part of it. The study results showed that the duration of
calculations with this approach decreases, and the accuracy of data processing remains
relatively high, which can be effectively used for systems with a high load. Secondly,
additional items’ features are used for more accurate work of recommender systems. The
study's results demonstrate the prospect of using the proposed methods to optimize the work
of industrial recommender systems. Modified FunkSVD algorithms can be applied to improve
the quality of service for different types of 5G systems users. Overall, the proposed data
optimization is a critical aspect for developing effective recommender systems in future 5G
industrial networks. By ensuring that the system is working with high-quality data that is
relevant to the specific needs of the industrial setting, it is possible to generate accurate and
useful recommendations that can improve productivity, reduce costs, and optimize processes.</p>
    </sec>
    <sec id="sec-13">
      <title>Acknowledgements</title>
      <p>This paper is supported by the National Research Foundation of Ukraine, project number
0123U103529 (2022.01/0009) “Assessing and forecasting threats to the reconstruction and
sustainable operation of objects of critical infrastructure” from the contest “Science for
reconstruction of Ukraine in the war and post war periods.
[37] T. Z. Emara and J. Z. Huang, "Distributed Data Strategies to Support Large-Scale Data
Analysis Across Geo-Distributed Data Centers," in IEEE Access, vol. 8, pp. 178526-178538,
2020, doi: 10.1109/ACCESS.2020.3027675.
[38] X. Zheng, L. Tian, B. Hui and X. Liu, "Distributed and Privacy Preserving Graph Data
Collection in Internet of Thing Systems," in IEEE Internet of Things Journal, vol. 9, no. 12,
pp. 9301-9309, 15 June15, 2022, doi: 10.1109/JIOT.2021.3112186.
[39] F. Yin et al., "FedLoc: Federated Learning Framework for Data-Driven Cooperative
Localization and Location Data Processing," in IEEE Open Journal of Signal Processing,
vol. 1, pp. 187-215, 2020, doi: 10.1109/OJSP.2020.3036276.
[40] K. Yin et al., “DLDP-FL: Dynamic local differential privacy federated learning method
based on mesh network edge devices,” J. Comput. Sci., vol. 63, no. 101789, p. 101789, 2022,
https://doi.org/10.1016/j.jocs.2022.101789.
[41] K. Xu, W. Zhang, and Z. Yan, “A privacy-preserving mobile application recommender
system based on trust evaluation,” J. Comput. Sci., vol. 26, pp. 87–107, 2018,
https://doi.org/10.1016/j.jocs.2018.04.001.
[42] Z. Wang and S. Ulukus, "Symmetric Private Information Retrieval at the Private
Information Retrieval Rate," in IEEE Journal on Selected Areas in Information Theory,
vol. 3, no. 2, pp. 350-361, June 2022, doi: 10.1109/JSAIT.2022.3188610.
[43] C. Das, A. K. Sahoo, and C. Pradhan, “Multicriteria recommender system using different
approaches,” in Cognitive Big Data Intelligence with a Metaheuristic Approach, S.
Mishra, H. K. Tripathy, P. K. Mallick, A. K. Sangaiah, and G.-S. Chae, Eds. San Diego, CA:
Elsevier, 2022, pp. 259–277, https://doi.org/10.1016/B978-0-323-85117-6.00011-X.
[44] Xie, F., Zhang, Y., Przystupa, K., &amp; Kochan, O. (2023). A Knowledge Graph Embedding
Based Service Recommendation Method for Service-Based System
Development. Electronics, 12(13), 2935.
[45] Xu, X., Przystupa, K., &amp; Kochan, O. (2023). Social Recommendation Algorithm Based on</p>
      <p>Self-Supervised Hypergraph Attention. Electronics, 12(4), 906.
[46] M. Beshley, N. Kryvinska and H. Beshley, "Energy-Efficient QoE-Driven Radio Resource
Management Method for 5G and Beyond Networks," in IEEE Access, vol. 10, pp.
131691131710, 2022, doi: 10.1109/ACCESS.2022.3228758.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>T.</given-names>
            <surname>Steclik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Cupek</surname>
          </string-name>
          , and
          <string-name>
            <given-names>M.</given-names>
            <surname>Drewniak</surname>
          </string-name>
          , “
          <article-title>Automatic grouping of production data in Industry 4.0: The use case of internal logistics systems based on</article-title>
          <source>Automated Guided Vehicles,” J. Comput. Sci.</source>
          , vol.
          <volume>62</volume>
          , no.
          <issue>101693</issue>
          , p.
          <fpage>101693</fpage>
          ,
          <year>2022</year>
          , doi: 10.1016/j.jocs.
          <year>2022</year>
          .
          <volume>101693</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>L.</given-names>
            <surname>Tang</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Meng</surname>
          </string-name>
          , “
          <article-title>Data analytics and optimization for smart industry</article-title>
          ,” Front. Eng. Manag., vol.
          <volume>8</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>157</fpage>
          -
          <lpage>171</lpage>
          ,
          <year>2021</year>
          , doi: 10.1007/s42524-020-0126-0.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Xin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Liu</surname>
          </string-name>
          and
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          ,
          <article-title>"Evolutionary Analysis of Cloud Manufacturing Platform Service Innovation Based on a Multiagent Game Perspective,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>10</volume>
          , pp.
          <fpage>104543</fpage>
          -
          <lpage>104554</lpage>
          ,
          <year>2022</year>
          , doi: 10.1109/ACCESS.
          <year>2022</year>
          .
          <volume>3208915</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Fu</surname>
          </string-name>
          , and
          <string-name>
            <given-names>P.</given-names>
            <surname>Zhou</surname>
          </string-name>
          , “
          <article-title>A multi-objective service composition method considering the interests of tri-stakeholders in cloud manufacturing based on an enhanced jellyfish search optimizer</article-title>
          ,”
          <source>J. Comput. Sci.</source>
          , vol.
          <volume>67</volume>
          , no.
          <issue>101934</issue>
          , p.
          <fpage>101934</fpage>
          ,
          <year>2023</year>
          , doi: 10.1016/j.jocs.
          <year>2022</year>
          .
          <volume>101934</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>B.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ortega</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bobadilla</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Gutiérrez</surname>
          </string-name>
          , “
          <article-title>Assigning reliability values to recommendations using matrix factorization</article-title>
          ,
          <source>” J. Comput. Sci.</source>
          , vol.
          <volume>26</volume>
          , pp.
          <fpage>165</fpage>
          -
          <lpage>177</lpage>
          ,
          <year>2018</year>
          , doi: 10.1016/j.jocs.
          <year>2018</year>
          .
          <volume>04</volume>
          .009
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Huang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Rao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Irissappane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhang</surname>
          </string-name>
          and
          <string-name>
            <given-names>H.</given-names>
            <surname>Qu</surname>
          </string-name>
          ,
          <article-title>"A Deep Reinforcement Learning Recommender System With Multiple Policies for Recommendations,"</article-title>
          <source>in IEEE Transactions on Industrial Informatics</source>
          , vol.
          <volume>19</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>2049</fpage>
          -
          <lpage>2061</lpage>
          , Feb.
          <year>2023</year>
          , doi: 10.1109/TII.
          <year>2022</year>
          .3209290
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>W.</given-names>
            <surname>Ruoxi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Beshley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Lingyu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Urikova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Beshley</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Kuzmin</surname>
          </string-name>
          ,
          <article-title>"Industrial 5G Private Network: Architectures, Resource Management</article-title>
          , Challenges, and
          <string-name>
            <given-names>Future</given-names>
            <surname>Directions</surname>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>2022 IEEE 16th International Conference on Advanced Trends in Radioelectronics</source>
          , Telecommunications and Computer Engineering (TCSET),
          <source>Lviv-Slavske, Ukraine</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>780</fpage>
          -
          <lpage>784</lpage>
          , doi: 10.1109/TCSET55632.
          <year>2022</year>
          .
          <volume>9766945</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>R.</given-names>
            <surname>Wang</surname>
          </string-name>
          et al.,
          <article-title>"Radio Resource Management Methods for Ultra-Reliable Low-Latency Communications in 5G LTE Narrowband Industrial Internet of Things,"</article-title>
          <source>2021 IEEE 4th International Conference on Advanced Information and Communication Technologies (AICT)</source>
          , Lviv, Ukraine,
          <year>2021</year>
          , pp.
          <fpage>239</fpage>
          -
          <lpage>244</lpage>
          , doi: 10.1109/AICT52120.
          <year>2021</year>
          .
          <volume>9628913</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beshley</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Przystupa</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , et al. (
          <year>2022</year>
          ).
          <article-title>5G multi-tier radio access network planning based on Voronoi diagram</article-title>
          . Measurement, 
          <volume>192</volume>
          ,
          <fpage>110814</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Xiong</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Przystupa</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Teng</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          , et al. (
          <year>2021</year>
          ).
          <article-title>Online measurement error detection for the electronic transformer in a smart grid</article-title>
          . Energies, 
          <volume>14</volume>
          (
          <issue>12</issue>
          ),
          <fpage>3551</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Przystupa</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          , et al. (
          <year>2022</year>
          ).
          <article-title>Forecasting short-term electric load using extreme learning machine with improved tree seed algorithm based on Lévy flight</article-title>
          .
          <source>Eksploatacja i Niezawodność - Maintenance and Reliability</source>
          ,
          <volume>24</volume>
          (
          <issue>1</issue>
          ),
          <fpage>153</fpage>
          -
          <lpage>162</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sun</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qin</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Przystupa</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Majka</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          , &amp;
          <string-name>
            <surname>Kochan</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          (
          <year>2022</year>
          ).
          <article-title>Individualized short-term electric load forecasting using data-driven meta-heuristic method based on LSTM network</article-title>
          . Sensors, 
          <volume>22</volume>
          (
          <issue>20</issue>
          ),
          <fpage>7900</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>E. P.</given-names>
            <surname>Xing</surname>
          </string-name>
          et al.,
          <article-title>"Petuum: A New Platform for Distributed ML on Big Data,"</article-title>
          <source>in IEEE Transactions on Big Data</source>
          , vol.
          <volume>1</volume>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>49</fpage>
          -
          <issue>67</issue>
          , 1 June 2015, doi: 10.1109/TBDATA.
          <year>2015</year>
          .
          <volume>2472014</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V.</given-names>
            <surname>Vashishth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Chhabra</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Sood</surname>
          </string-name>
          ,
          <article-title>"A predictive approach to task scheduling for Big Data in cloud environments using classification algorithms,"</article-title>
          <source>2017 7th International Conference on Cloud Computing</source>
          , Data Science &amp; Engineering - Confluence, Noida, India,
          <year>2017</year>
          , pp.
          <fpage>188</fpage>
          -
          <lpage>192</lpage>
          , doi: 10.1109/CONFLUENCE.
          <year>2017</year>
          .
          <volume>7943147</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>D.</given-names>
            <surname>Tarek</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Benslimane</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Darwish</surname>
          </string-name>
          and
          <string-name>
            <given-names>A. M.</given-names>
            <surname>Kotb</surname>
          </string-name>
          ,
          <article-title>"Distributed Packets Scheduling Technique for Cognitive Radio Internet of Things Based on Discrete Permutation Particle Swarm Optimization," 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and</article-title>
          IEEE Cyber,
          <article-title>Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), Rhodes</article-title>
          , Greece,
          <year>2020</year>
          , pp.
          <fpage>142</fpage>
          -
          <lpage>151</lpage>
          , doi: 10.1109/
          <string-name>
            <surname>iThingsGreenCom-CPSCom-SmartData-Cybermatics50389</surname>
          </string-name>
          .
          <year>2020</year>
          .
          <volume>00040</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>Sennan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ramasubbareddy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Balasubramaniyam</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Nayyar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Abouhawwash</surname>
          </string-name>
          and
          <string-name>
            <given-names>N. A.</given-names>
            <surname>Hikal</surname>
          </string-name>
          ,
          <article-title>"T2FL-PSO: Type-2 Fuzzy Logic-Based Particle Swarm Optimization Algorithm Used to Maximize the Lifetime of Internet of Things,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>9</volume>
          , pp.
          <fpage>63966</fpage>
          -
          <lpage>63979</lpage>
          ,
          <year>2021</year>
          , doi: 10.1109/ACCESS.
          <year>2021</year>
          .
          <volume>3069455</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>M. C.</given-names>
            <surname>Adikari</surname>
          </string-name>
          and
          <string-name>
            <given-names>T. P.</given-names>
            <surname>Amalan</surname>
          </string-name>
          ,
          <article-title>"Distribution cost optimization using Big Data Analytics, ML and Computer Simulation for FMCG Sector,"</article-title>
          <source>2019 International Research Conference on Smart Computing and Systems</source>
          Engineering (SCSE), Colombo, Sri Lanka,
          <year>2019</year>
          , pp.
          <fpage>63</fpage>
          -
          <lpage>69</lpage>
          , doi: 10.23919/SCSE.
          <year>2019</year>
          .
          <volume>8842697</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>B.</given-names>
            <surname>Raviteja</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Pandya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z. Tufail</given-names>
            <surname>Khan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Prajwal</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Kekatpure</surname>
          </string-name>
          ,
          <article-title>"Smart Supply Chain Management using Big Data Analysis</article-title>
          and
          <string-name>
            <surname>ML</surname>
          </string-name>
          ,
          <article-title>" 2022 International Conference on Edge Computing and Applications (ICECAA), Tamilnadu</article-title>
          , India,
          <year>2022</year>
          , pp.
          <fpage>190</fpage>
          -
          <lpage>193</lpage>
          , doi: 10.1109/ICECAA55415.
          <year>2022</year>
          .
          <volume>9936359</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>G. K.</given-names>
            <surname>Singh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Dadhich</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chouhan</surname>
          </string-name>
          and
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharma</surname>
          </string-name>
          ,
          <article-title>"Impact of Big Data Analytics &amp; Capabilities on Supply Chain Management (SCM) - An Analysis of Indian Cement Industry,"</article-title>
          <source>2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)</source>
          , Greater Noida, India,
          <year>2021</year>
          , pp.
          <fpage>313</fpage>
          -
          <lpage>318</lpage>
          , doi: 10.1109/ICAC3N53548.
          <year>2021</year>
          .
          <volume>9725531</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Huang</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <article-title>"Federated Learning-Based Privacy-Preserving Data Aggregation Scheme for IIoT,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>11</volume>
          , pp.
          <fpage>6700</fpage>
          -
          <lpage>6707</lpage>
          ,
          <year>2023</year>
          , doi: 10.1109/ACCESS.
          <year>2022</year>
          .
          <volume>3226245</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>W.</given-names>
            <surname>Gao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Min</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Ni</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jiang</surname>
          </string-name>
          ,
          <article-title>"Resource Allocation for Latency-Aware Federated Learning in Industrial Internet of Things,"</article-title>
          <source>in IEEE Transactions on Industrial Informatics</source>
          , vol.
          <volume>17</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>8505</fpage>
          -
          <lpage>8513</lpage>
          , Dec.
          <year>2021</year>
          , doi: 10.1109/TII.
          <year>2021</year>
          .
          <volume>3073642</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>F.</given-names>
            <surname>Liang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Griffith</surname>
          </string-name>
          and
          <string-name>
            <given-names>N.</given-names>
            <surname>Golmie</surname>
          </string-name>
          ,
          <article-title>"Toward Deep Q-Network-Based Resource Allocation in Industrial Internet of Things,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>9</volume>
          , no.
          <issue>12</issue>
          , pp.
          <fpage>9138</fpage>
          -
          <lpage>9150</lpage>
          ,
          <fpage>15</fpage>
          <lpage>June15</lpage>
          ,
          <year>2022</year>
          , doi: 10.1109/JIOT.
          <year>2021</year>
          .
          <volume>3093346</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Shah</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Salunke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Dongare</surname>
          </string-name>
          and
          <string-name>
            <given-names>K.</given-names>
            <surname>Antala</surname>
          </string-name>
          ,
          <article-title>"Recommender systems: An overview of different approaches to recommendations,"</article-title>
          <source>2017 International Conference on Innovations in Information, Embedded and Communication Systems (ICIIECS)</source>
          , Coimbatore, India,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/ICIIECS.
          <year>2017</year>
          .
          <volume>8276172</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Yu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Guo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A. K.</given-names>
            <surname>Bashir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Imran</surname>
          </string-name>
          and
          <string-name>
            <given-names>M.</given-names>
            <surname>Guizani</surname>
          </string-name>
          ,
          <article-title>"Implicit Feedback-based Group Recommender System for Internet of Things Applications,"</article-title>
          <source>GLOBECOM</source>
          <year>2020</year>
          - 2020
          <string-name>
            <given-names>IEEE</given-names>
            <surname>Global Communications</surname>
          </string-name>
          <string-name>
            <surname>Conference</surname>
          </string-name>
          , Taipei, Taiwan,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/GLOBECOM42002.
          <year>2020</year>
          .
          <volume>9348091</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>B.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhong</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Yao</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ye</surname>
          </string-name>
          ,
          <article-title>"EAGCN: An Efficient Adaptive Graph Convolutional Network for Item Recommendation in Social Internet of Things,"</article-title>
          <source>in IEEE Internet of Things Journal</source>
          , vol.
          <volume>9</volume>
          , no.
          <issue>17</issue>
          , pp.
          <fpage>16386</fpage>
          -
          <issue>16401</issue>
          , 1 Sept.1,
          <year>2022</year>
          , doi: 10.1109/JIOT.
          <year>2022</year>
          .
          <volume>3151400</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>S. M.</given-names>
            <surname>Kasongo</surname>
          </string-name>
          ,
          <article-title>"An Advanced Intrusion Detection System for IIoT Based on GA and Tree Based Algorithms,"</article-title>
          <source>in IEEE Access</source>
          , vol.
          <volume>9</volume>
          , pp.
          <fpage>113199</fpage>
          -
          <lpage>113212</lpage>
          ,
          <year>2021</year>
          , doi: 10.1109/ACCESS.
          <year>2021</year>
          .
          <volume>3104113</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Simeone</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zeng</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          &amp;
          <string-name>
            <surname>Caggiano</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <article-title>Intelligent decision-making support system for manufacturing solution recommendation in a cloud framework</article-title>
          . 
          <string-name>
            <surname>Int J Adv Manuf Technol</surname>
          </string-name>
           
          <volume>112</volume>
          ,
          <fpage>1035</fpage>
          -
          <lpage>1050</lpage>
          (
          <year>2021</year>
          ), https://doi.org/10.1007/s00170-020-06389-1
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>T.</given-names>
            <surname>Vafeiadis</surname>
          </string-name>
          et al.,
          <article-title>"Intelligent Information Management System for Decision Support: Application in a Lift Manufacturer's Shop Floor," 2019 IEEE International Symposium on INnovations in Intelligent SysTems and Applications</article-title>
          (INISTA), Sofia, Bulgaria,
          <year>2019</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/INISTA.
          <year>2019</year>
          .
          <volume>8778290</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Fu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. -X.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Hong</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>McLaughlin</surname>
          </string-name>
          ,
          <article-title>"Artificial Intelligence to Manage Network Traffic of 5G Wireless Networks,"</article-title>
          <source>in IEEE Network</source>
          , vol.
          <volume>32</volume>
          , no.
          <issue>6</issue>
          , pp.
          <fpage>58</fpage>
          -
          <lpage>64</lpage>
          , November/December 2018, doi: 10.1109/MNET.
          <year>2018</year>
          .
          <volume>1800115</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>A.</given-names>
            <surname>Vulpe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Idu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Gheorghe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Martian</surname>
          </string-name>
          and
          <string-name>
            <given-names>O.</given-names>
            <surname>Fratu</surname>
          </string-name>
          ,
          <article-title>"ML-based Analytics Framework for beyond 5G Mobile Communication Systems," 2020 28th Telecommunications Forum (TELFOR</article-title>
          ), Belgrade, Serbia,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/TELFOR51502.
          <year>2020</year>
          .
          <volume>9306534</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31] YongchangWang and
          <string-name>
            <given-names>L.</given-names>
            <surname>Zhu</surname>
          </string-name>
          ,
          <article-title>"Research and implementation of SVD in ML,"</article-title>
          <source>2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)</source>
          , Wuhan, China,
          <year>2017</year>
          , pp.
          <fpage>471</fpage>
          -
          <lpage>475</lpage>
          , doi: 10.1109/ICIS.
          <year>2017</year>
          .
          <volume>7960038</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>C.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Mou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Li</surname>
          </string-name>
          and
          <string-name>
            <given-names>R.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <article-title>"Digital Text Feature Extraction Using Singular Value Decomposition and Principal Component Analysis,"</article-title>
          <source>2019 2nd International Conference on Information Systems and Computer Aided Education (ICISCAE)</source>
          , Dalian, China,
          <year>2019</year>
          , pp.
          <fpage>10</fpage>
          -
          <lpage>13</lpage>
          , doi: 10.1109/ICISCAE48440.
          <year>2019</year>
          .
          <volume>221578</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kumar</surname>
          </string-name>
          , “
          <article-title>A novel latent factor model for recommender system,”</article-title>
          <string-name>
            <given-names>J.</given-names>
            <surname>Inf</surname>
          </string-name>
          . Syst. Technol. Manag., vol.
          <volume>13</volume>
          , no.
          <issue>3</issue>
          ,
          <year>2016</year>
          , https://doi.org/10.4301/S1807-17752016000300008.
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>S.</given-names>
            <surname>Guo</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          , “
          <article-title>Hybrid Recommendation Algorithm based on User Behavior,</article-title>
          ” in
          <source>2020 IEEE 9th Joint International Information Technology and Artificial Intelligence Conference (ITAIC)</source>
          ,
          <year>2020</year>
          , https://doi.org/10.1109/ITAIC49862.
          <year>2020</year>
          .9339083
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Hordiichuk-Bublivska</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beshley</surname>
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kyryk</surname>
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pyrih</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Urikova</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beshley</surname>
            <given-names>M.</given-names>
          </string-name>
          <article-title>A Modified Federated Singular Value Decomposition Method for Big Data and ML Optimization in IIoT Systems</article-title>
          . In: Mikhailo Klymash, Andriy Luntovskyy, Mykola Beshley, Igor Melnyk, Alexander Schill. (eds)
          <article-title>Emerging Networking in the Digital Transformation Age: Approaches</article-title>
          , Protocols, Platforms,
          <source>Best Practices, and Energy Efficiency. Lecture Notes in Electrical Engineering</source>
          ,
          <year>2023</year>
          , Springer, Cham. 965, P.
          <fpage>246</fpage>
          -
          <lpage>268</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [36]
          <string-name>
            <given-names>P.</given-names>
            <surname>Wu</surname>
          </string-name>
          et al., “
          <article-title>Fast data assimilation (FDA): Data assimilation by ML for faster optimize model state</article-title>
          ,
          <source>” J. Comput. Sci.</source>
          , vol.
          <volume>51</volume>
          , no.
          <issue>101323</issue>
          , p.
          <fpage>101323</fpage>
          ,
          <year>2021</year>
          , https://doi.org/10.1016/j.jocs.
          <year>2021</year>
          .
          <volume>101323</volume>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>