최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기한국융합학회논문지 = Journal of the Korea Convergence Society, v.11 no.11, 2020년, pp.19 - 24
Recently, due to the rapid increase of pets, there is a need for an integrated pet-related personalized product recommendation service such as feed recommendation using a health status check of pets and various collected data. This paper implements a product recommendation system that can perform va...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
C. Gurrin, A. F. Smeaton & A. R. Doherty. (2014). LifeLogging: Personal Big Data. Foundations and Trends in Information Retrieval, 8(2), 1-107.
S. Niwattanakul, J. Singthongchai, E. Naenudorn, & S. Wanapu. (2013). Using Jaccard Coefficient for Keywords Similarity. Proceedings of the International MultiConference of Engineers and Computer Scientists, 1(2202), 380-384.
G. Karypis. (2001). Evaluation of Item-Based Top-N Recommendation Algorithms. Proc. of CIKM '01 Conference, 247-254.
J. L Herlocker, J. A. Konstan, L. G. Terveen & J. Riedl. (2001). Evaluating Collaborative Filtering Recommender Systems. ACM Transactions on Information Systems, 22(1), 5-53.
J. Horey, E. Begoli, R. Gunasekaran, S. Lim & J. Nutaro (2012). Big Data Platforms as a Service: Challenges and Approach. USENIX Workshop on Hot Topics in Cloud Computing (HotCloud). https://www.usenix.org/system/files/conference/hotcloud12/hotcloud12-final61.pdf
S. S. Weng & M. J. Liu. (2004). Feature-based recommendations for one-to-one marketing. Expert Systems with Applications,26(4),493-508.
E. W. T. Ngai, Y. Hu, Y. H. Wong, Y. Chen & X. Sun. (2010). The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature. Decision Support Systems, 50, 559-569.
T. C. Fu. (2011). A Review on Time Series Data Mining. Engineering Application of Artificial Intelligence, 24(1), 164-181.
Y. Zhu, Y. Fu & H. Fu. (2010). A New Class of Attacks on Time Series Data Mining. Intelligent Data Analysis, 14(3), 405-418.
R. Agrawal & R. Srikant. (2000). Privacy-Preserving Data Mining. In Proc. of Conf. on Management of Data, ACM SIGMOD, Dallas, TX, 439-450.
S. M. Bea & V. Torra. (2011). Trajectory Anonymization from a Time Series Perspective. In Proc. of IEEE Int'l Conf. on Fuzzy Systems, Taipei, Taiwan, 401-408.
S. H. Namn & K. S. Noh. (2015). A Study on the Effective Approaches to Big Data Planning. Journal of digital Convergence, 13(1), 227-235.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.