2022
DOI: 10.21203/rs.3.rs-1615797/v2
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Recommended System Optimization in Social Networks based on Cooperative Filter with Deep MVR Algorithm

Abstract: Today, social networks have become very popular due to their high usage in communicating with each other. But this popularity requires the development of backend to communicate with each other. Hence, a topic called identifying users is created by making recommendations or propositional systems, and so on, link prediction. The most important issue is the new users' social networks, so that they can offer suggestions. In this research, we tried to provide a system of recommendations for introducing new users to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…To prove the strong efficiency of the presented approach, the proposed approach of this paper is compared with advanced models. These methods are: SVM in [41], RF in [42], AdaBoost in [43], HAST-IDS in [44], CNN-BiLSTM in [45], LuNet in [46] and Pelican in [47]. These methods are trained and tested with a similar data partition and, with the strategy of the cross-validation with equal to .…”
Section: B the Acquired Resultsmentioning
confidence: 99%
“…To prove the strong efficiency of the presented approach, the proposed approach of this paper is compared with advanced models. These methods are: SVM in [41], RF in [42], AdaBoost in [43], HAST-IDS in [44], CNN-BiLSTM in [45], LuNet in [46] and Pelican in [47]. These methods are trained and tested with a similar data partition and, with the strategy of the cross-validation with equal to .…”
Section: B the Acquired Resultsmentioning
confidence: 99%
“…This section compares the effectiveness of the proposed strategy with four different ways of preventing denial-ofservice attacks. The four options are as follows: Ryu controller [40] without any protection method, Ryu controller [41] with MLFQ mechanism, Ryu controller [18] with Flood Defender mechanism, and Ryu controller [40] with FMD-ARA system. The method used by the researchers in [19] provides the basis for this comparison.…”
Section: Comparing the Effectiveness Of The Proposed Solution To Thos...mentioning
confidence: 99%