The technological development in the devices and services provided via the Internet and the availability of modern devices and their advanced applications, for most people, have led to an increase in the expansion and a trend towards electronic commerce. The large number and variety of goods offered on e-commerce websites sometimes make the customers feel overwhelmed and sometimes make it difficult to find the right product. These factors increase the amount of competition between global commercial sites, which increases the need to work efficiently to increase financial profits. The recommendation systems aim to improve the e-commerce systems performance by facilitating the customers to find the appropriate products according to their preferences. There are lots of recommendation system algorithms that are implemented for this purpose. However, most of these algorithms suffer from several problems, including: cold start, sparsity of user-item matrix, scalability, and changes in user interest. This paper aims to develop a recommendation system to solve the problems mentioned before and to achieve high realistic prediction results this is done by building the system based on the customers’ behavior and cooperating with the statistical analysis to support decision making, to be employed on an e-commerce site and increasing its performance. The project contribution can be shown by the experimental results using precision, recall, F-function, mean absolute error (MAE), and root mean square error (RMSE) metrics, which are used to evaluate system performance. The experimental results showed that using statistical methods improves the decision-making that is employed to increase the accuracy of recommendation lists suggested to the customers.
Digital Video authentication is very important issue in day to day life. A lot of devices have got the ability of recording or capturing digital videos and all these videos can be passed through the internet as well as many other non-secure channels. There is a problem of illegal updating or manipulation of digital video because of the development in video editing software. Therefore, video authentication techniques are required in order to ensure trustworthiness of the video. There are many techniques used to prevent this issue like Digital Signature and Watermarking, these solutions are successfully included in copyright purposes but it's still really difficult to implement in many other situations especially in video surveillance. In this paper, a new method called PLEXUS is proposed for digital video authentication on temporal attacks. In authentication process, the sender will generate a signature according to the method steps using a video and private key. In verification process, the receiver will also generate a signature using the same video and private key then each signature will be compared. If the two signatures are matched then the video is not tampered otherwise the video is tampered. This method is implemented using 10 different videos and proved to be an efficient method.
Recently, three Dimension (3D) multimedia technology has grown over a wide range, where the 3D used in many applications such as medical, television, cinema, game, education, etc. The developments also include the computer network, these evaluations make the store and distribute the media very easy and at the same time very critical, where any person can access these data and manipulate it or redistribute it with illegal copyrights. Therefore, it is necessary to find a watermarking technique to keep the security of these media. 3D multimedia, especially 3D Video contains a huge amount of data, trying achievement copyright protection for all these data consumes the computation, and slow down securing process, thus 3D video key frame extraction process is necessary. In this paper, the histogram-based key frame extraction technique is applied to extract essential and important data of the 3D video. A modified invisible, and blind watermark system is suggested in this research for 3D Video copyrights and authentication protection using Dual-Tree Complex Wavelet Transform (DTCWT). The experiment results show that 3D video key extraction system has given high compression ratio ( from 4:1 to 5:1) and the protection system could put an invisible watermark while keeping the quality of the 3D video, as well as the proposed watermark system, is robust where the watermark extracted successfully after applying a different types of attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.