SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Downloaden Sie, um offline zu lesen
A MODEL OF RECOMMENDER SYSTEM FOR A DIGITAL LIBRARY
      Hangsapholyna Sar1 , Saokosal Oum2

  ARTICLE INFO                   ABSTRACT

      Recommender System          The number of digital contents and books in a university-size digital library is enormous and better
                                  than ever. Readers find it more and more difficult to locate their favorite books. Even though they
      Collaborative filtering
                                  could possibly find a favorite book, finding another similar book to the first favorite book seems as if
      Content- based              finding a nail in the sea. That is because the second favorite book might be at the very last edge of a
      Personalizing               long tail. So a recommender system is often a requirement in a digital library that should be
                                  considered and needed to come in to make the above finding simpler. This research proposes and
      Digital library             describes a service to provide a model of recommendation, which is part of a networking digital
                                  library project whose principal goal is to develop technologies for supporting digital services. The
                                  researcher uses collaborative filtering, content- based, and personalizing approaches for a model of a
                                  recommender system a digital library and Data was collected from users and librarian in Norton
                                  University, Cambodia, who had explaining in recommender system a digital library. The goal of this
                                  research is to propose the Model of Recommender System for a Digital Library. Finally, a series of
                                  experiments is performed, and the results indicate that the proposed methodology produces high-
                                  quality recommendations.

 I.       INTRODUCTION                                                       retrieval systems that attempt to present information that
           Digital libraries gain more and more importance in                would be of interest to the user. A recommender system
      the modern world, although the concept behind digital                  would compare the user‟s profile with that of his or her
      libraries existed before the term was introduced. There is             previous history or the similar profiles of other users with
      no clear consensus on the definition of digital libraries,             similar interests or background and provide top
      but, in general, they can be defined as collections of                 references that are relevant to the current item of interest.
      information that have associated services delivered to                 Recommender systems attempt to reduce information
      user using a variety of technologies (Callan, et al. 2003).            overload and retain customers by selecting a subset of
      The collections of information can be scientific, business             items from a universal set based on user preferences. A
      or personal data and can be represented as a digital text,             preference may reflect an individual mental state
      image, audio, video or other media. The information can                concerning a subset of items from the universe of
      be digitized paper or born digital material and the                    alternatives. Individuals form preferences based on their
      services offered on such information can be varied,                    experience with the relevant items, such as book, article,
      ranging from content operations to rights management,                  music etc (Palani, A., et al 2009).
      and can be offered to individuals or user (Variou, 2001).                   Recommender systems are a particular type of
      Moreover internet access has resulted in digital libraries             personalization that learn about a person‟s needs and
      that are increasingly used by different user for diverse               then proactively identify and recommend information
      purposes, and in which sharing and collaboration have                  that meets those needs. Recommender systems are
      become important social elements. As digital libraries                 especially useful when they identify information a person
      become commonplace, ask their contents and services                    was previously unaware of (Callan & Smeaton, 2001).
      become more varied, and as their customers become                      2.2 Challenges in Recommender Systems
      more experienced with computer technology, user expect                      Interface Design: The recommender systems should
      more complicated services from their digital libraries                 have an interface design which provides a good user
      (Callan & Smeaton, 2001). A traditional search function is             experience. The user interface should be modeled in such
      normally an integral part of any digital library, but user‟s           a way the user does not get tired providing explicit
      aggravations with this increase as their needs become                  feedback and also the recommendation list should be
      more complex and as the volume of information                          displayed in an uncluttered manner which not only
      managed by digital libraries increases. Thus digital                   captures the attention of the user but also provides it in a
      libraries must move from being passive, with little                    nonintrusive fashion(Lindem et al., 2003).
      adaptation to individual users, to being more proactive in                  Amount of Data: One of the issues facing
      offering and tailoring information for individuals and in              recommender systems is that they need a lot of data to
      supporting efforts to capture, structure, and share                    effectively make recommendations. The industry leaders in
      knowledge. Digital libraries that are not personalized for             recommendations like Google, Amazon, Netflix, etc are
      individuals will be seen as defaulting on their obligation             those with a lot of consumer user data: A good
      to offer the best service possible. Just as people patronize           recommender system initially needs item data (from a
      stores in which they and their preferences are known,                  catalog or other form), then it captures and analyzes user
      and their needs anticipated, so too will they patronize                data (behavioral events), and then the appropriate
      digital libraries that remember them and anticipate their              algorithm is carried out. The more item and user data a
      needs.                                                                 recommender system has to work with, the stronger the
II.       REVIEW OF RELATED ITERATURE AND STUDIES                            chances of getting good recommendations (Palani, A., et al
      2.1 Recommender System                                                 2009).
               Recommender Systems are part of information                        Unpredictable Items: There are some items that
                                                                        1
        1Email:   lyna_it_eng73@yahoo.com Tel: (+855) 16 506 873
        2Email:   oumsaokosal@gmail.com Tel: (+855) 12 252 752
people either love or hate in equally strong terms. There                  Users know in advance that, in a virtual e-learning
are books that the puritans rubbish but the commoner‟s                   environment (or any other web based environment), all
love. These types of items are difficult to make                         actions are logged;
recommendations on, because the user reaction to them                      The recommendation system must be designed in a
tends to be diverse and unpredictable. Music especially has              non-intrusive manner and be user-friendly, including
lot of cases like this where the uses like both soft rock and            the possibility of disconnecting it or minimizing its
heavy metal bands (MacManus, R. 2009).                                   participation in the browsing or searching activities; and.
      Dynamically Changing Data: Recommender systems                       The participation of each individual user in the final
mostly do a long term profiling of users and hence biased            recommendation system is completely anonymous( Enric,
towards the old and have difficulty showing new. The past            M., & Julia, M. 2005)
behavior of users would not always be a good tool because                 In sum up a recommender system must protect the
the trends are always changing. Hence a simple algorithmic           individual‟s right to privacy and protect him/her against
approach would find it difficult to keep up with current             malicious identity hackers.
trends in fast changing domains such as fashion.                     2.3 Standards and Policies in Digital libraries
      Scalability: A recommender system would need to                     Information is a main component of a government.
make millions of recommendations to millions of users                As digital information becomes more popular, and as
across the globe especially in the case of collaborative             competition over the velocity of information
filtering algorithms which might need to compute the K               dissemination sometimes overshadows integrity, the
nearest neighbors at runtime and hence recommender                   regulations and policies that govern the circulation of
systems should be scalable across various sizes and types            information have also become more complex.
of data and users( Karatzoglou, A., Smola, A., & Weimer, M.          Hence, an information professional‟s role is to provide
2010).                                                               accurate information in a timely manner and ensure that
     Changing User Preferences: While a user may have a              the integrity of that information is not compromised.
particular intention when browsing a portal like                     Copyright laws, such as the American Copyright
amazon.com, the next day the user might have a different             Revision Act of 1976 and the Software Copyright Act of
intention. A classic example is that one day the user might          1980, are in place to protect software.
be searching books, but the next day the same user could be          As extensive databases and storage systems are being
searching for house hold appliances. Hence a                         developed to preserve digital information, standards and
recommender systems should not take all decisions based              policies should be enforced to protect the security and
on prior content and also should be able to make an                  privacy of users. The digital revolution has made
intelligent choice based on current context (MacManus, R.            information more accessible; it has also affected society‟s
2009).                                                               morals by altering the perception of standards and
     Shilling Attacks: An underhanded and cheap way to               policies of retrieving information or downloading media
increase recommendation frequency is to manipulate or                from the Internet. It is sometimes perceived the same as
trick the system into doing so. This can be done by having a         borrowing electronic devices from a friend. Information
group of users (human or agent) use the recommender                  seekers are often found to put laws and moral
system and provide specially crafted opinions that cause it          implications aside when they “choose” to pirate or rectify
to make the desired recommendation more often. For                   information for their own illicit purposes based on their
example, it has been shown that a number of book reviews             own “ethical” standards. For instance, 1997 records
published on Amazon.com are actually written by the                  confirm instances of commercial software being copied
author of the book being reviewed. A consumer trying to              not only by customers but the programmers themselves.
decide which book to purchase could be misled by such                According to Seadle (2004), even “a reasonable fair use in
reviews into believing that the book is better than it really        ethical terms could still be an infringement in strict legal
is. This is known as shilling attack and recommender                 judgment”. Hence, there is a need to have an enforcement
systems should protect against these attacks (Lam, S.,               mechanism in place, instead of the current trends where
Frankowski, D., & Riedl, J. 2006). Two simple type of shilling       peer pressure ethical judgments are enabling or
attacks are Random Bot and Average Bot.                              discouraging intellectual property infringements. That is
      A Random Bot is filterbot who randomly rate items             why the guidelines set by law need to be enforced on
          outside of the target item-set with either the             how digital criminal behaviour shall be dealt with. Many
          minimum rating (for nuke attack) or maximum                governments have created protection stipulations in the
          rating (for push attack).                                  form of copyrights, but such stipulations protect only an
      An AverageBot is filterbot where the rating is based          intellectual thought, leaving information in physical and
          on the average rating of each item following a             digital forms as victims of chance.
          normal distribution with a mean equal to the               The information superhighway, epitomized by the World
          average rating for that item.                              Wide Web and digital libraries, is constantly faced with
     Privacy Issues: a very important aspect that cannot be          security issues, such as identity theft, data corruption,
ignored is the fact that users are always under control, in          illegal downloads, and piracy. These moral issues could
the sense that all taken actions are monitored and                   be seen as the result of easy access to vast information,
registered. This might seem a very invasive setup which              which opens easy opportunities for slack security, which
harms user privacy and, therefore, undesirable.                      consequently invokes a possibility of wrong doing. The
Nevertheless, there are several remarkable facts that need           Information Age is generating more reasons for security-
to be clarified:                                                     consciousness with the Internet and digital libraries. This
                                                                 2
is essential for the access and control of digital                   for a certain period of time. Aslesen (1998) has classified
information in order to prevent all from being lost to our           the former as usage rights, and the latter two as
own plunders as we raid the information superhighway.                marketing rights (which include selling and distribution
2.4 Important Issues on Digital libraries                            processes).
The main innovation in the field of digital libraries is             2.5 Type of Recommender System
apparent in the fact that most of resources are in                        2.5.1     Collaborative Approach
electronic format. In this format, there is no need for              The first type of recommendation technique, the
physical resources linked to loan, access, and reservation.          collaborative approach (sometimes called the social-based
Resources are ideally held in a distributed database                 approach), takes into account the given user‟s interests
which should be accessed over the Internet. The user,                profile and the profiles of other users with similar
instead of taking a hard copy of the document in the                 interests (Shardanand & Maes, 1995). The collaborative
library, downloads a new copy. The quality of the data               approach looks for relevance among users by observing
can become more difficult to assess if the Internet is used          their ratings assigned to products in a training set of
not only as a client access to the library but also as a             limited size. The „„nearest neighbour‟‟ users are those that
repository of information. Following some researchers‟               exhibit the strongest similarity to the target user. These
definitions of the term digital library, which advocate that         users then act as „„recommendation partners‟‟ for the
the Internet can be viewed as a huge digital library, the            target user, and collaborative approaches recommend to
problem of data quality erupts (Arms, 2001). As a                    the target user items that appear in the profiles of these
consequence of this, there should be concerns about data             recommendation partners (but not in the target user‟s
accuracy, originator, and integrity, once they are not               profile). It has been observed in several practical settings
easily measured (as they are in traditional libraries).              that the collaborative approach generally achieves more
There are difficulties in determining how to charge for              effective recommendations than its content-based
the library services, and especially, how to guarantee               counterpart (Alspector et al., 1998; Breese et al., 1998;
copyrights on the data which are downloaded by users.                Mooney and Roy, 2000; Pazzani, 1999).
Moreover, security is a great issue with the increasing                    2.5.2    Content-Based Approach:
influx of new viruses and hacker attacks. This issue will                  Another type of recommendation technique was
be addressed later in this chapter. Social and                       called the content-based approach (Loeb & Terry, 1992).
psychological aspects must be taken into consideration in            A content-based approach characterizes recommendable
the move to a digital format, given that everything is now           items by a set of content features and represents a user‟s
accessible via a computer system, and less human                     interests by a similar feature set. Then, the relevance of a
interaction is therefore required. This can result in                given content item to the user‟s interest profile is
difficulties on making effective use of the library, as              measured as the similarity of this recommendable item to
usability issues must be thoroughly addressed. Further,              the user‟s interest profile. Content-based approaches
multi- language interfaces and facilities, such as thesauri          select recommendable items that have a high degree of
and translators, should also be provided. One the other              similarity to the user‟s interest profile. Systems
hand, a reservation service becomes useless, since                   implementing a content based recommendation approach
indefinite soft copies are allowed from a document.                  analyze a set of documents and descriptions of items
Security is a major problem in digital libraries,                    previously rated by a user, and build a model or profile
particularly with reference to unauthorized use of library           of user interests based on the features of the objects rated
resources. The usual security approach that has been                 by that user (Mladenic, D. 1999).
adopted is to establish an access control to the library                   The profile is a structured representation of user
resources. Under this arrangement, data consumers                    interests, adopted to recommend new interesting items.
should have a registration record with their contact                 The recommendation process basically consists in
information, and should be given a login name for                    matching up the attributes of the user profile against the
authorization and a password for authentication. A                   attributes of a content object. The result is a relevance
security log recording all access made should exist in               judgment that represents the user‟s level of interest in
order to enable effective auditing. Ethical policies should          that object. If a profile accurately reflects user preferences,
be explained to all users in order to make sure they use             it is of tremendous advantage for the effectiveness of an
the library appropriately.                                           information access process. For instance, it could be used
Copyright is another important issue in digital libraries,           to filter search results by deciding whether a user is
as governments have not yet agreed a method by which                 interested in a specific Web page or not and, in the
to effectively establish copyright laws for digital data             negative case, preventing it from being displayed.
(Onsrud & Lopez, 1998). The problem of copyright                           2.5.3    Personalized Recommendation
legislation is more evident now that data can be                           Personalization is about building customer reliability
downloaded, and each country may have its own specific               by creating a meaningful one-to-one relationship; by
legislation. Guaranteeing that the user will not alter data          accepting the needs of each individual and helping satisfy
and resell them is a high priority. Spatial data is usually          a goal that efficiently and knowledgeably addresses each
very expensive to capture and generate, so it is highly              individual‟s need in a given context (Riecken, 2000). The
important that intellectual property rights be imposed               key element of a personalized environment is the user
and obeyed. Moreover, users are usually interested in a              model. A user model is a data structure that represents
specific part of the spatial data set. Copyright is related to       user interests, goals and behaviors. The more information
the use, replication and update of data and usually lasts            a user model has, the better the content and presentation
                                                                 3
will be adapted for each individual user. A user model is
    created through a user modeling process in which                                     Collect User Information's




                                                                                                                                                                                                             Response
                                                                                                                          Priofile
                                                                                                                                         Library Rules
    unobservable information about a user is inferred from                                   Explicit


    observable information from that user; for instance, using                               Implicit
                                                                                                                                                                                Admin
    the interactions with the system (Zukerman, et al., 1999).
                                                                                                                                         Filtering
                                                                                                                                                                           Select content         Retrieve content
                                                                                         Use legacy data                                                                     and make            and assemble page
                                                                          User
    User models can be created using a user-guided
                                                                                                                      Create Mata Data          Simple                    Recommentation            for Display


    approach, in which the models are directly created using                                                                               Content-Based

    the information provided by each user, or an automatic
    approach, in which the process of creating a user model is
                                                                                                                                            Collaborative
                                                                                                                                                                                            Content Server              Cached Content
                                                                                               User Profiles

    hidden from the user. The hypermedia systems
    constructed using the user-guided approach are called                                                                                   Meta data attributes

    adaptable, while the ones produced using an automatic                                                                                     and Ratings of
                                                                                                                                             content and user
                                                                                                                                                 grouping

    approach are called adaptive (Fink, et al., 1997; Brusilovsky
                                                                                 Figure 1 Architecture of the proposed digital library
    & Schwarz, 1997).Within the context of digital library, up
                                                                        The architecture as show in Figure 1 consisted of the
    to now, user modeling has been implemented using
                                                                        following main components:
    mainly user guided approaches, which has produced
                                                                         User
    adaptable digital library. However the problem of user
                                                                        The user concept covers the various actors (whether
    modeling in digital library can be easily implemented
                                                                        human or machine) entitled to interact with digital
    using an automatic approach because a typical user
                                                                        libraries.
    exhibits patterns when accessing digital libraries and the           Collecting User Information
    information containing these patterns is already usually            The objective of collecting visitor information is to
    stored in databases. For this purpose, machine learning             develop a profile that describes a site user's interests, role
    techniques can be applied to recognize such regularities            in an organization, entitlements, purchases, or some other
    in order to integrate them as part of the user model.               set of descriptors important to the site owner. The most
    Machine learning encompasses techniques where                       common techniques are explicit profiling, implicit
    machine acquires knowledge from its previous                        profiling, and using legacy data:
    experience (Witten & Frank, 1999). The output of machine            Explicit profiling asks each user to fill out information or
    learning technique is a structural description of what has          questionnaires.
    been learned that can be used to explain the original data          Implicit profiling tracks the user's behavior. This
    and to make predictions. From this perspective, machine             technique is generally transparent to the user. Browsing
    learning techniques make it possible to automatically               and buying patterns are the behaviors most often
    create user models for the implementation of                        assessed.
    personalized digital library services.                              Using legacy data accesses legacy data for valuable
    Personalization has become an important topic for digital           profile information, such as credit applications and
    libraries to take a more active role in dynamically                 previous purchases. For existing customers and known
    tailoring their information and service offers to                   user, legacy data often provides the richest source of
    individuals in order to better meet their needs (Callan &           profile information.
    Smeaton, 2003). Most of the work on personalized                     Analyzing User Profiles
    information access focuses on the use of machine learning           When the profile is available, the next step is to analyze
    algorithms for the automated induction of a structured              the profile information in order to present or recommend
    model of a user‟s interests, referred to as user profile,           documents, purchases, or actions specific to the user.
    from labeled text documents (Mladenic, 1999). Keyword-              Making such recommendations is the most challenging
    based user profiles suffer from problems of polysemy and            step. Many techniques for presenting content and making
    synonymy. The result is that, due to synonymy, relevant             recommendations are in use or under development.
    information can be missed if the profile does not contain
    the exact keywords occurring in the documents and, due                                                                                                           User Profiles

    to polysemy, wrong documents could be deemed as                                                                                                                   ID, Password,
                                                                                                                                                                   Interests Role, etc...
    relevant. This work explores a possible solution for this
    kind of issue: the adoption of semantic user profiles that
                                                                                        Identify site user
    capture key concepts representing users‟ interests from
                                                                                                                                                                   books, articles, or
    relevant documents. Semantic profiles will contain                                                                                                                 journals
                                                                                      Retrieve user’s profile
    references to concepts defined in lexicons like Word Net
    (Miller, 1995) or ontologies. The solution is implemented                           Select content that
    in the item recommender (ITR) system which induces                                    matches user’s                                                    Suggested items of Interest:
                                                                                           preferences
    semantic user profiles from documents represented by                                                                                                             Applications I am
    using Word Net (Degemmis, Lops, & Semeraro, 2007).                                 Retrieve content and                                                          authorized to use:
                                                                                        assemble page for
III.     ARCHITECTURE ANDCOMPONENTS                                                      display to user                                                       Library policy manuals I
                                                                                                                                                                    have access to:
    In this section researcher discuss the overall architecture
    of the proposed digital library system                                                     Figure 2 Analyzing User profiles
                                                                         Filtering Techniques: Filtering techniques employ
                                                                         algorithms to analyze meta-data and drive presentation
                                                                        and recommendations. The three most common filtering
                                                                    4
techniques simple filtering, content-based filtering, and                                      time applications, such as dynamically constructing web
collaborative filtering are introduced below.                                                  pages based on the visitor‟s profile, affects system
Simple filtering relies on predefined groups, or classes,                                      performance.
of user to determine what content is displayed or what                                          Content Server: The content concept encompasses
service is provided.                                                                           the data and information that the digital library handles
Content-based filtering works by analyzing the content                                         and makes available to its users. It is composed of a set of
of the objects to form a representation of the user's                                          information objects organized in collections.
interests.                                                                                  IV.     RESULTS
                                |        |                   ∑                                 Analysis of the Finings
                (       )                                                                           According to the survey conducted, about 95% of
                                    (| | | |)                (∑     ∑           )
     Where X is the set of keywords extracted from the                                         questionnaire taking from students and 5% of
book, or article and Y is the set of keywords in the user‟s                                    questionnaire taking from librarians. Therefore, this
profile. The coefficient, Overlap(X, Y), is not influenced                                     study collected preference data from 200 student‟s at
by the sizes of X and Y, which is desirable as the number                                      Norton University who were in year four and year three
of book or article key-words could be much larger than                                         at the time of the survey. In addition, the top ten books
the key words in the user‟s explicit keyword list or much                                      were used: The researcher choose only top 5 books out of
smaller than the keywords in a user‟s implicit key word                                        top 10 books based on the top reading from library since
list (Dietmar, J., Markus, Z., Aleexander, F., & Gerhard, F.,                                  September 2012.
2011).                                                                                        Book 1: PHP, MySQL, JavaScript, and CSS
     If set X is a subset of Y or the converse then the                                       Book 2: Professional Java E-Commerce
                                                                                              Book 3: Cloud Computing
overlap coefficient is equal to one. The value of
                                                                                              Book4: Oracle Database 11g & MySQL 5.6 Developer Handbook
          (    ) is ranges between 0 and 1.
                                                                                              Book5: Object-Oriented and Classical Software Engineering It
Collaborative filtering collects users' opinions on a set of
                                                                                              was included as items to be ranked by users in a leading
objects, using either explicit or implicit ratings, to form                                   books store. Each user will be provided with a ranked list
like-minded peer groups and then learns from the peer                                         of all items where ties are allowed.
groups to predict a particular visitor's interest in an item.                                                      Table 1 Ratings Database
Instead of finding objects similar to those a user liked in                                                       Book 1       Book 2       Book 3       Book 4        Book 5

the past, as in content-based filtering, collaborative                                            Group 1          86           33            60          146             ?
filtering develops recommendations by finding users
                                                                                                  Group 2          85           62            69          139            124
with similar tastes. Researcher build upon the work of the
pure collaborative filtering algorithms published that                                            Group 3          110          90           125          118            90
compute similarities between users using a Parson
                                                                                                  Group 4          62           146          142          124            184
Correlation Coefficient (Dietmar, J., Markus, Z.,
                                                                                                  Group 5          97           136          170          45             135
Aleexander, F., & Gerhard, F., 2011). Predictions for an
item are than computed as the weighted average of the                                         Analysis of Collaborative Filtering
ratings for the items from those users which are similar,                                                 Table 2 Ratings Database of similarity
where the weight is the computed coefficient. The general                                                 Book 1     Book 2       Book 3       Book 4       Book 5            Sim

formula for a prediction for an item for user u is:                                            Group 1      86           33           60           146            ?
                                      ∑               (       ) (                   )
                (       )                                                                                   85           62           69           139          124           0.98
                                                  ∑            (  )                            Group 2
Where     is the mean rating for the user in question,                                         Group 3      110          90           125          118          90            0.53
    (    ) is the Pearson‟s correlation coefficient of user i
                                                                                               Group 4      62           146          142          124          184           -0.31
with the user for whom the prediction is being computed,
    represents the rating submitted by user i for the                                          Group 5      97           136          170          45           135           -0.87

article for which the prediction is being computed, is the
average rating (the average of the user ratings for the                                         160
books, articles in common) for user i and n is the total                                        140
number of the user in the system that have some                                                 120
correlation with the user and have rated the item.                                              100
                                       ∑      (       ̅ )(        ̅ )
                    (       )                                                                    80
                                √∑        (       ̅ ) √∑      (         ̅   )
                                                                                                 60
  a, b : User
  r a,b : Rating of user a for item p                                                            40
  P      : Set of items, rated both by user a and user b                                         20               Group 1                   Group 2                   Group 3
 ̅̅̅ , ̅̅̅ : User's average ratings                                                               0
 Possible similarity value between -1 and +1                                                             Book1             Book2               Book3                  Book4
 Content Caching Providing personalization for real
                                                                                                      Figure 3 Comparing Group 1 with two other Groups
                                                                                        5
Table 3 Prediction of Group 1 and Group 2 by Pearson Correlation                                 in the digital age has becoming almost impossible since
                                 Coefficient                                                           the availability of sources is enormous. Even though good
                   Group 1     Group 2       Y-Y     Sim(x, y)*(Y-Y)                                   search engines have been made, the type of tools is not
       Book 1                  86                  85          -3.75           -3.674                  going to tell you what books favor you the most.
                                                                                                              The main goal of this research, hence, is to find a
       Book 2                  33                  62          -26.75          -26.205                 model of a recommender system for a digital library
       Book 3                  60                  69          -19.75          -19.347                 while this research has chosen Norton University‟s digital
                                                                                                       library as a case study. The specific objectives of this
       Book 4               146                    139         50.25           49.226                  research are 1) to identify the type of recommender
       Book 5                                      124         35.25           34.531                  system available for digital libraries 2) to illustrate how
                                                                                                       the „collaborative filtering‟, „content-based‟, and
                                                                               34.531
                                                                                                       „personalizing‟ approaches are used in a digital library,
                                        = Mean of Group 1= 88.75                                       and 3) to introduce a model of a recommender system a
                                        = Mean of Group 2= 81.25                                       digital library.
                                                          ∑          (      ) (
                                                                                                              This research also introduces what recommender
                                                                                         )
                                    (      )
                                                                ∑            (  )
                                                                                                       system is as well as the challenges in the recommender
                                                                                                       system and the importance of digital library. Chosen
                                               (     )                                                 techniques of the recommender system were evaluated.
                                                                                                       A survey technique was used. 200 random samples were
     Analysis of Content-Based
                                                                                                       collected from the third year and four year students
                           Table 4 Ratings Database of Overlap                                         studying in Computer Science, Information Management,
                    Book 1          Book 2          Book 3       Book 4      Book 5      Overlap       Software Management, and Software Engineering, for
                                                                                                       this research.
     Group 1          86                 33              60         146        ?                              Based on the findings shown in the chapter IV, the
                      85                 62              69         139       124            1         result showed that the three techniques chosen were
     Group 2
                                                                                                       working        well     and      produced       considerable
     Group 3          110                90              125        118        90            09        recommendation improvement, as shown in figure 6.
                                                                                             0.8
                                                                                                       Hence the new proposed model answered to the research
     Group 4          62                146              142        124       184
                                                                                                       questions.
     Group 5          97                136              170        45        135            0.7              In summary, this research has contributed in two
                                                                                                       ways. Firstly, a model of a recommender system for a
                                                                                                       digital library is discovered. Secondly, „Collaborative
       160                                                                                             filtering‟, „content-based‟ and „personalized‟ techniques
       140                      Group 1              Group 2                                           are proved to work together well.
       120
                                                                                                              The implications of the research can be beneficial for
                                                                                                       practitioners, both readers and librarians. By applying
       100
                                                                                                       this model to the existing digital library system at Norton
        80
                                                                                                       University, students would simply find their favorite
        60                                                                                             books or article and a series of similar taste of books
        40                                                                                             easier and faster. They would waste less time for finding
        20                                                                                             and gain more time for reading. The busyness of the
            0                                                                                          University‟s Internet bandwidth would be no longer
                    Book1           BooK2            Book3       Book4        Book5                    wasted. And for the librarian as well as management
                    Figure 4 Overlap of Group 1 and Group 2                                            team would understand the students‟ taste better.
                                                                                                       Recommendations
      200                                                                                                     Even though this research has developed a model of
                                                                                                       a recommender system for a digital library and found
                                                                                                       significant results from a combination of the three chosen
      150
                                                                                                       techniques, this is limited to the research scope. That is,
                                                                                                       an actual web-based system needs to be made to test the
      100                                                                                              actual data. The actual data differs significantly from this
                                                                                                       small sample data. In real system, new techniques may be
                                                                                                       discovered and may need to assist these existing
       50
                                                                                                       techniques in order to improve the quality of
                                                                                                       recommendation. The future research would do with
        0                                                                                              actual data collected from a real system.
                0          1               2               3            4       5             6        Limitations
                    Figure 6 Scatter Plot with Line of best fit                                               The body of work aimed at empirically studying the
                                                                                                       determinants of the intention to participate in a model of
V.          CONCLUSION                                                                                 a recommender system for a digital library. A survey
           As shown in the statement of problem, it is clear                                           technique was used to collect data. First, a pilot study on
     that finding an article or book which interests the readers                                       recommender system for digital libraries users and
                                                                                                   6
librarian was run to find out any different type of                      second DELOS network of excellence workshop on
recommender system. And then pre-test included eight                     Personalization and Recommender Systems in Digital
user and two librarians who were experienced in                          Libraries. ERCIM Workshop proceedings No01/W03.
recommender system for digital libraries.                                Dublin City University.
       According to scope and limitation of this research               Degemmis, M., Lops, P., & Semeraro, G. (2007). A
that have been stated, there are four major in Computer                  content-collaborative recommender that exploits
Science, Information and Communication Technology,                       WordNet-based user profiles for neighborhood
                                                                         formation.     User    Modeling     and     User-Adapted
Network and Security, and Software Development were
                                                                         Interaction: The Journal of Personalization Re-search,
selected to study on this research. To be correctly and
                                                                         17(3), 217-255.
effectively study, students of Computer Science and
                                                                        Fink, J., Kobsa, A., & Nill, A. (1997). Adaptable and
Information Management that are totally around 195                       Adaptive Information Access for All Users, Including
students and 05 librarian of Norton University were                      the Disabled and the Elderly. A. Jamesson, C. Paris and
chose to complete the surveys from 15th to 30th of                       C. Tasso (Eds.), User Modeling: Proceedings of the Sixth
September 2012 so that             recommender system is                 International Conference, UM97, pp.171-173.
applicable.                                                             Loeb, S. & Terry, D. (1992). Information filtering,
Acknowledgements                                                         Communications of the ACM, Special Issue on
I would like to pay my highly appreciation and thankful                  Information Filtering, Vol. 35 No. 12, pp. 26-8.
for those people who have helped and contributed so                     Linden G., Smith B. & York J. (2003). Amazon.com
many useful resource, ideas, and time toward the                         Recommendations: Item-to-Item Collaborative Filtering,
completion of this thesis. Without their help, I could not               IEEE Internet Computing, v.7 n.1, pages 76-80, January
be able to finish it. Firstly, I would like to pay my highly             2003
respect to my parents who have been supporting me in                    Miller, G. A. (1995). WordNet: A lexical data-base for
every way they can in order to ease my study. Without                    English. Communications of the ACM, 38(11), 39-41.
their help and guidance, I would not have finished my                   Mladenic, D .(1999). Text-learning and Related
master degree. Secondly, I would like pay my highly                      Intelligent Agents, A Survey. IEEE Intelligent Systems
appreciation to my advisor, Prof. Oum Saokosal, who                      14(4), pp.44–54.
                                                                        Mooney, R. & Roy, L. (2000). Content-based book
have supported me in generating good ideas as well as
                                                                         recommending using learning for text categorization ,
provided some critical insight related to the thesis so that
                                                                         Proceedings of the 5th ACM Conference on Digital
I could did it smoothly into the right direction. Without
                                                                         Libraries, San Antonio, ACM Press, New York, NY, pp.
his guidance and patience, the thesis will not be done                   195-204.
correctly. Thirdly, I would like to give my appreciation to             Onsrud, H., & Lopez, X. (1998). Intellectual property
all teachers and lecturers at Norton University who have                 rights in disseminating digital geo-graphic data,
been actively support to all 2nd year students including                 products and services: Conflicts and commonalities
me in our thesis writing. Last but not least, I would like to            among EU and U.S. approaches. In P. Burrough, & I.
thanks to all the students at Norton University who                      Masser (Eds.), European Geographic Infrastructures:
helped one another both in terms of knowledge sharing                    Opportunities and Pitfalls, GISDATA 5 (pp. 127–135).
and direction pointing toward a successful thesis.                       Taylor & Francis.
Without these mentioned people, this thesis would not                   Palani, A., Fox, E., Yang, S., & Ganesan, V. (2009).
have been existed. So, I would like to pay my highly                     Digital Library/ Recommender Systems Curriculum
appreciation to these people. May all the best things come               Development.
to all of us.                                                           Riecken,     D.    (2000).   Personalized      Views  of
                          References                                     Personalization. Communications of the ACM, 43 (8),
   Arms, W. (2001). Digital libraries (2nd ed.). MIT Press.             pp.27-28.
   Aslesen, L. (1998). Intellectual property and map-ping:             Shardanand, U.,& Maes, P.(1995).Social Information
    A European perspective. In P. Burrough, & I. Masser                  Filtering: Algorithms for Automating “Word of Mouth”.
    (Eds.), European Geographic Infra-structures:                        In: Proceedings of ACM CHI‟95 Conference on Human
    Opportunities and Pitfalls, GISDATA 5 (pp. 127–135).                 Factors in Computing Systems, vol. 1, pp. 210–217
    Taylor & Francis.                                                   Various. (2001). Special issue on the theme digital
   Breese, J., Heckerman, D. & Kadie, C. (1998), Empirical              libraries. Communications of the ACM, 44(5).
    analysis of predictive algorithms for collaborative                 Witten, I.H., & Frank E. (1999). Data Mining. Practical
    filtering , Technical Report MSR-TR-98-12, Microsoft                 Machine Learning Tools and Techniques with JAVA
    Research, Seattle, CA.                                               Implementations. Morgan Kaufman Publishers.
   Brusilovsky, P., & Schwarz, E. (1997). User as Student:             Zukerman, I., Albrecht, D.W., & Nicholson, A.E. (1999).
    Towards an Adaptive Interface for Advanced Web-                      Predicting Users Request on the WWW. Proceedings of
    Based Applications. A. Jamesson, C. Paris and C. Tasso               the 7th International Conference on User Modeling,
    (Eds.), User Modeling: Proceedings of the Sixth                      UM99, pp.275-284.
    International Conference, UM97, pp.177-188.
   Callan, J., Smeaton, A., Beaulieu, M., Borlund, P.,
    Brusilovsky, P., Chalmers, M., Lynch, C., Riedl, J.,
    Smyth, B., Straccia, U., & Toms E. (2003). Personalization
    and Recommender Systems in Digital Libraries, Joint
    NSF-EU DELOS Working Group Report.
   Callan, J., & Smeaton, A. (2001). Proceedings of the
                                                                 7
Questionnaire for Student
I. Students General Information:

   1. Age:     A. 18-21               B. 22-25               C. 26- 29              D. 30-33               E. more than 33

   2. Sex:     A. M                   B. F
   3. College of Science, which majoring is you in?
               A. Information and Communication Technology
               B. Computer Science                                        C. Software Development
               D. Network and Security                                    E. Other……………………..
   4. Do you have any online shopping experience?(like Amazon.com)
               A. Yes                 B. No
   5. Do you have any experience finding books, articles, and journals E-library?
               A. Yes                 B. No
              if yes, How it work?................................................................................
              .................................................................................................................
              if No, Why ?............................................................................................
              ................................................................................................................
   6. Does Norton University have recommender system for digital library?
                 A. Yes
                if yes, What kind of recommender system is used?
                .................................................................................................................
                 B. No
                if No, Do you want to have ? Like: www.yahoo.com, www.youtube.com,
                and, www.amazon.com.
II. Students Recommender System Technique:

      Answer each statement by ticking each answer box. Use these ratings as a guide when
      you answer each statement:

      សូមធ្វើការធ្រើ សធរ ើសនូ វធសៀវធៅចំ នួន៥ក្បាលក្បនុងចំ ធោម១០ក្បាល ធ ើធសៀវធៅោខ្លះ?

      ដែលអ្នក្បចូ លចិ តអាន និ ងធ្ើ វការស្រាវ្ាវ ធ                       ើយធអាយពិ នុទែូចខាងធ្កាមៈ

      1= It is useless ឥ ្រធោរន៍                              2= Not very useful មិនសូវមាន្រធោរន៍

      3= Neutral អ្ពា្ក្បឹ

      4=Nice to have លអដែរធរើមាន                              5= Excellent លអោស់ធរើមានធសៀវធៅធនះ
Statement                 Title                   1   2   3   4   5




                  Cisco CCNA in 60 Days

 1.


            Practical Database Programming with
                      Visual Basic.NET
 2.




             PHP, MySQL, JavaScript, and CSS
3.



                     Professional Java
                       E-Commerce
4.



            Network Analysis, Architecture, and
                        Design
5.




              Oracle Programming with Visual
                           Basic
6.



              Microsoft Visual Basic 2010 for
            Windows, Web, Office, and Database
                       Applications
7.
Cloud Computing
       8.



                                  Oracle Database 11g & MySQL 5.6
                                         Developer Handbook

       9.




                                      Object-Oriented and Classical
                                         Software Engineering
       10.


Please add below any other comments: --------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------

                                       Thank you for your time?
Questionnaire for Librarian

  I.    Librarian General Information:

        1) Age:  A. 18-21  B. 22-25                            C. 26- 29              D. 30-33               E. more than 33

        2) Sex:  A. M                   B. F
        3) What kind of library does Norton University has?
                   A. Library
                        if yes, How it work?................................................................................
                        .................................................................................................................
                        if No, Why ?............................................................................................
                        .................................................................................................................
                   B. E-library
                        if yes, How it work?................................................................................
                        .................................................................................................................
                        if No, Why ?............................................................................................
                        .................................................................................................................
                   C. Library Managements
                        if yes, How it work?................................................................................
                        .................................................................................................................
                        if No, Why ?............................................................................................
                        .................................................................................................................
                   E. Other…………………………………………………………………..
        4) Does Norton University have recommender system for digital library?
                   A. Yes
                  if yes, What kind of recommender system is used?
                  .................................................................................................................
                   B. No
                  if No, Do you want to have the tools and services of recommender system for
                  digital library of Norton University? Like: www.yahoo.com,
                  www.youtube.com, and www.amazon.com.
Please add below any other comments: --------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------------

                                             Thank you for your time?

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesIntroduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesKnoldus Inc.
 
Economic Analysis: cloud_computing
Economic Analysis: cloud_computingEconomic Analysis: cloud_computing
Economic Analysis: cloud_computingPravin Asar
 
Delphix Platform Overview
Delphix Platform OverviewDelphix Platform Overview
Delphix Platform OverviewFranco_Dagosto
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Big Data technology Landscape
Big Data technology LandscapeBig Data technology Landscape
Big Data technology LandscapeShivanandaVSeeri
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesEueung Mulyana
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computinghuda2018
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud ArchitectureDerek Keats
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing pptMehul Patel
 
Snowflake: The most cost-effective agile and scalable data warehouse ever!
Snowflake: The most cost-effective agile and scalable data warehouse ever!Snowflake: The most cost-effective agile and scalable data warehouse ever!
Snowflake: The most cost-effective agile and scalable data warehouse ever!Visual_BI
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a CloudDivya S
 
Snowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the UglySnowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the UglyTyler Wishnoff
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Tyrone Systems
 
VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual Sanjeev Kumar
 

Was ist angesagt? (20)

Introduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesIntroduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure Services
 
IBM Cloud pak for data brochure
IBM Cloud pak for data   brochureIBM Cloud pak for data   brochure
IBM Cloud pak for data brochure
 
Economic Analysis: cloud_computing
Economic Analysis: cloud_computingEconomic Analysis: cloud_computing
Economic Analysis: cloud_computing
 
Delphix Platform Overview
Delphix Platform OverviewDelphix Platform Overview
Delphix Platform Overview
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Big Data technology Landscape
Big Data technology LandscapeBig Data technology Landscape
Big Data technology Landscape
 
Network Virtualization
Network VirtualizationNetwork Virtualization
Network Virtualization
 
Cloud Computing: Overview and Examples
Cloud Computing: Overview and ExamplesCloud Computing: Overview and Examples
Cloud Computing: Overview and Examples
 
Data-Intensive Technologies for Cloud Computing
Data-Intensive Technologies for CloudComputingData-Intensive Technologies for CloudComputing
Data-Intensive Technologies for Cloud Computing
 
Paravirtualization
ParavirtualizationParavirtualization
Paravirtualization
 
Private Cloud Architecture
Private Cloud ArchitecturePrivate Cloud Architecture
Private Cloud Architecture
 
Oracle Cloud Infrastructure
Oracle Cloud InfrastructureOracle Cloud Infrastructure
Oracle Cloud Infrastructure
 
Virtualization in cloud computing ppt
Virtualization in cloud computing pptVirtualization in cloud computing ppt
Virtualization in cloud computing ppt
 
Snowflake: The most cost-effective agile and scalable data warehouse ever!
Snowflake: The most cost-effective agile and scalable data warehouse ever!Snowflake: The most cost-effective agile and scalable data warehouse ever!
Snowflake: The most cost-effective agile and scalable data warehouse ever!
 
Cloud computing architectures
Cloud computing architecturesCloud computing architectures
Cloud computing architectures
 
Migration into a Cloud
Migration into a CloudMigration into a Cloud
Migration into a Cloud
 
Datacenter overview
Datacenter overviewDatacenter overview
Datacenter overview
 
Snowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the UglySnowflake: The Good, the Bad, and the Ugly
Snowflake: The Good, the Bad, and the Ugly
 
Cloud Computing and Its Service Models
Cloud Computing and Its Service Models Cloud Computing and Its Service Models
Cloud Computing and Its Service Models
 
VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual
 

Andere mochten auch

Application of memletics and grasha riechmann learing style
Application of memletics and grasha riechmann learing styleApplication of memletics and grasha riechmann learing style
Application of memletics and grasha riechmann learing styleSar Lyna
 
Library Survey 2015 Final Report
Library Survey 2015 Final ReportLibrary Survey 2015 Final Report
Library Survey 2015 Final ReportDavid Purdy
 
Calfornia Community Colleges Library & Technology Survey: Open Access Templat...
Calfornia Community Colleges Library & Technology Survey: Open Access Templat...Calfornia Community Colleges Library & Technology Survey: Open Access Templat...
Calfornia Community Colleges Library & Technology Survey: Open Access Templat...char booth
 
Digital library
Digital libraryDigital library
Digital libraryparvathykj
 
ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015
ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015
ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015Fides Rojo
 
Questionnaire Feedback Analysis
Questionnaire Feedback AnalysisQuestionnaire Feedback Analysis
Questionnaire Feedback AnalysisSophCole
 
California Community College Student Library & Technology Engagement Survey: ...
California Community College Student Library & Technology Engagement Survey: ...California Community College Student Library & Technology Engagement Survey: ...
California Community College Student Library & Technology Engagement Survey: ...char booth
 
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP ProjectsA Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP ProjectsVaruna Harshana
 
Library Management System
Library Management SystemLibrary Management System
Library Management SystemPankaj Kumar
 

Andere mochten auch (11)

Application of memletics and grasha riechmann learing style
Application of memletics and grasha riechmann learing styleApplication of memletics and grasha riechmann learing style
Application of memletics and grasha riechmann learing style
 
Library Survey 2015 Final Report
Library Survey 2015 Final ReportLibrary Survey 2015 Final Report
Library Survey 2015 Final Report
 
Calfornia Community Colleges Library & Technology Survey: Open Access Templat...
Calfornia Community Colleges Library & Technology Survey: Open Access Templat...Calfornia Community Colleges Library & Technology Survey: Open Access Templat...
Calfornia Community Colleges Library & Technology Survey: Open Access Templat...
 
Digital library
Digital libraryDigital library
Digital library
 
ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015
ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015
ASSESSMENT OF THE MIDSAYAP MUNICIPAL PUBLIC LIBRARY FISCAL YEAR 2014-2015
 
Project PPT
Project PPTProject PPT
Project PPT
 
Questionnaire Feedback Analysis
Questionnaire Feedback AnalysisQuestionnaire Feedback Analysis
Questionnaire Feedback Analysis
 
California Community College Student Library & Technology Engagement Survey: ...
California Community College Student Library & Technology Engagement Survey: ...California Community College Student Library & Technology Engagement Survey: ...
California Community College Student Library & Technology Engagement Survey: ...
 
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP ProjectsA Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
A Questionnaire for Identify Failures in Business Analysis Phase of ERP Projects
 
Library Management System
Library Management SystemLibrary Management System
Library Management System
 
Sample Questionnaire
Sample QuestionnaireSample Questionnaire
Sample Questionnaire
 

Ähnlich wie A model of recommender system for a digital library

Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systemsvivatechijri
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsBouneffouf Djallel
 
From Access to Use: the quality of human-archives interactions as a research ...
From Access to Use: the quality of human-archives interactions as a research ...From Access to Use: the quality of human-archives interactions as a research ...
From Access to Use: the quality of human-archives interactions as a research ...Pierluigi Feliciati
 
Investing in a time of desruptive change
Investing in a time of desruptive changeInvesting in a time of desruptive change
Investing in a time of desruptive changeJisc
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
 
A recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filteringA recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filteringIAESIJAI
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
 
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALCONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALcscpconf
 
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalContextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalcsandit
 
Scholarly Information Practices In The Online Environment
Scholarly Information Practices In The Online EnvironmentScholarly Information Practices In The Online Environment
Scholarly Information Practices In The Online EnvironmentOCLC Research
 
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...NSW State Archives
 
Digital libraries: successfully designing developing and implementing your d...
Digital libraries:  successfully designing developing and implementing your d...Digital libraries:  successfully designing developing and implementing your d...
Digital libraries: successfully designing developing and implementing your d...Beatrice Amollo
 
Use of a follow-up survey for improvement of a digital library
Use of a follow-up survey for improvement of a digital libraryUse of a follow-up survey for improvement of a digital library
Use of a follow-up survey for improvement of a digital libraryKathryn Brockmeier
 
Socially Collaborative Filtering
Socially Collaborative FilteringSocially Collaborative Filtering
Socially Collaborative FilteringMike Chen
 
Towards collaboration at scale: Libraries, the social and the technical
Towards collaboration at scale:  Libraries, the social and the technicalTowards collaboration at scale:  Libraries, the social and the technical
Towards collaboration at scale: Libraries, the social and the technicallisld
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Ähnlich wie A model of recommender system for a digital library (20)

ALA NISO-BISG Forum - Patron Privacy
ALA NISO-BISG Forum - Patron PrivacyALA NISO-BISG Forum - Patron Privacy
ALA NISO-BISG Forum - Patron Privacy
 
Al26234241
Al26234241Al26234241
Al26234241
 
Recommender Systems
Recommender SystemsRecommender Systems
Recommender Systems
 
Following the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systemsFollowing the user’s interests in mobile context aware recommender systems
Following the user’s interests in mobile context aware recommender systems
 
From Access to Use: the quality of human-archives interactions as a research ...
From Access to Use: the quality of human-archives interactions as a research ...From Access to Use: the quality of human-archives interactions as a research ...
From Access to Use: the quality of human-archives interactions as a research ...
 
243
243243
243
 
Investing in a time of desruptive change
Investing in a time of desruptive changeInvesting in a time of desruptive change
Investing in a time of desruptive change
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMM
 
A recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filteringA recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filtering
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
Review on Document Recommender Systems Using Hierarchical Clustering Techniques
Review on Document Recommender Systems Using Hierarchical Clustering TechniquesReview on Document Recommender Systems Using Hierarchical Clustering Techniques
Review on Document Recommender Systems Using Hierarchical Clustering Techniques
 
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTALCONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
CONTEXTUAL MODEL OF RECOMMENDING RESOURCES ON AN ACADEMIC NETWORKING PORTAL
 
Contextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portalContextual model of recommending resources on an academic networking portal
Contextual model of recommending resources on an academic networking portal
 
Scholarly Information Practices In The Online Environment
Scholarly Information Practices In The Online EnvironmentScholarly Information Practices In The Online Environment
Scholarly Information Practices In The Online Environment
 
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
Presentation by Christine Yeats for Information Awareness Month 2010 "Referen...
 
Digital libraries: successfully designing developing and implementing your d...
Digital libraries:  successfully designing developing and implementing your d...Digital libraries:  successfully designing developing and implementing your d...
Digital libraries: successfully designing developing and implementing your d...
 
Use of a follow-up survey for improvement of a digital library
Use of a follow-up survey for improvement of a digital libraryUse of a follow-up survey for improvement of a digital library
Use of a follow-up survey for improvement of a digital library
 
Socially Collaborative Filtering
Socially Collaborative FilteringSocially Collaborative Filtering
Socially Collaborative Filtering
 
Towards collaboration at scale: Libraries, the social and the technical
Towards collaboration at scale:  Libraries, the social and the technicalTowards collaboration at scale:  Libraries, the social and the technical
Towards collaboration at scale: Libraries, the social and the technical
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 

Kürzlich hochgeladen

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

A model of recommender system for a digital library

  • 1. A MODEL OF RECOMMENDER SYSTEM FOR A DIGITAL LIBRARY Hangsapholyna Sar1 , Saokosal Oum2 ARTICLE INFO ABSTRACT Recommender System The number of digital contents and books in a university-size digital library is enormous and better than ever. Readers find it more and more difficult to locate their favorite books. Even though they Collaborative filtering could possibly find a favorite book, finding another similar book to the first favorite book seems as if Content- based finding a nail in the sea. That is because the second favorite book might be at the very last edge of a Personalizing long tail. So a recommender system is often a requirement in a digital library that should be considered and needed to come in to make the above finding simpler. This research proposes and Digital library describes a service to provide a model of recommendation, which is part of a networking digital library project whose principal goal is to develop technologies for supporting digital services. The researcher uses collaborative filtering, content- based, and personalizing approaches for a model of a recommender system a digital library and Data was collected from users and librarian in Norton University, Cambodia, who had explaining in recommender system a digital library. The goal of this research is to propose the Model of Recommender System for a Digital Library. Finally, a series of experiments is performed, and the results indicate that the proposed methodology produces high- quality recommendations. I. INTRODUCTION retrieval systems that attempt to present information that Digital libraries gain more and more importance in would be of interest to the user. A recommender system the modern world, although the concept behind digital would compare the user‟s profile with that of his or her libraries existed before the term was introduced. There is previous history or the similar profiles of other users with no clear consensus on the definition of digital libraries, similar interests or background and provide top but, in general, they can be defined as collections of references that are relevant to the current item of interest. information that have associated services delivered to Recommender systems attempt to reduce information user using a variety of technologies (Callan, et al. 2003). overload and retain customers by selecting a subset of The collections of information can be scientific, business items from a universal set based on user preferences. A or personal data and can be represented as a digital text, preference may reflect an individual mental state image, audio, video or other media. The information can concerning a subset of items from the universe of be digitized paper or born digital material and the alternatives. Individuals form preferences based on their services offered on such information can be varied, experience with the relevant items, such as book, article, ranging from content operations to rights management, music etc (Palani, A., et al 2009). and can be offered to individuals or user (Variou, 2001). Recommender systems are a particular type of Moreover internet access has resulted in digital libraries personalization that learn about a person‟s needs and that are increasingly used by different user for diverse then proactively identify and recommend information purposes, and in which sharing and collaboration have that meets those needs. Recommender systems are become important social elements. As digital libraries especially useful when they identify information a person become commonplace, ask their contents and services was previously unaware of (Callan & Smeaton, 2001). become more varied, and as their customers become 2.2 Challenges in Recommender Systems more experienced with computer technology, user expect Interface Design: The recommender systems should more complicated services from their digital libraries have an interface design which provides a good user (Callan & Smeaton, 2001). A traditional search function is experience. The user interface should be modeled in such normally an integral part of any digital library, but user‟s a way the user does not get tired providing explicit aggravations with this increase as their needs become feedback and also the recommendation list should be more complex and as the volume of information displayed in an uncluttered manner which not only managed by digital libraries increases. Thus digital captures the attention of the user but also provides it in a libraries must move from being passive, with little nonintrusive fashion(Lindem et al., 2003). adaptation to individual users, to being more proactive in Amount of Data: One of the issues facing offering and tailoring information for individuals and in recommender systems is that they need a lot of data to supporting efforts to capture, structure, and share effectively make recommendations. The industry leaders in knowledge. Digital libraries that are not personalized for recommendations like Google, Amazon, Netflix, etc are individuals will be seen as defaulting on their obligation those with a lot of consumer user data: A good to offer the best service possible. Just as people patronize recommender system initially needs item data (from a stores in which they and their preferences are known, catalog or other form), then it captures and analyzes user and their needs anticipated, so too will they patronize data (behavioral events), and then the appropriate digital libraries that remember them and anticipate their algorithm is carried out. The more item and user data a needs. recommender system has to work with, the stronger the II. REVIEW OF RELATED ITERATURE AND STUDIES chances of getting good recommendations (Palani, A., et al 2.1 Recommender System 2009). Recommender Systems are part of information Unpredictable Items: There are some items that 1 1Email: lyna_it_eng73@yahoo.com Tel: (+855) 16 506 873 2Email: oumsaokosal@gmail.com Tel: (+855) 12 252 752
  • 2. people either love or hate in equally strong terms. There  Users know in advance that, in a virtual e-learning are books that the puritans rubbish but the commoner‟s environment (or any other web based environment), all love. These types of items are difficult to make actions are logged; recommendations on, because the user reaction to them  The recommendation system must be designed in a tends to be diverse and unpredictable. Music especially has non-intrusive manner and be user-friendly, including lot of cases like this where the uses like both soft rock and the possibility of disconnecting it or minimizing its heavy metal bands (MacManus, R. 2009). participation in the browsing or searching activities; and. Dynamically Changing Data: Recommender systems  The participation of each individual user in the final mostly do a long term profiling of users and hence biased recommendation system is completely anonymous( Enric, towards the old and have difficulty showing new. The past M., & Julia, M. 2005) behavior of users would not always be a good tool because In sum up a recommender system must protect the the trends are always changing. Hence a simple algorithmic individual‟s right to privacy and protect him/her against approach would find it difficult to keep up with current malicious identity hackers. trends in fast changing domains such as fashion. 2.3 Standards and Policies in Digital libraries Scalability: A recommender system would need to Information is a main component of a government. make millions of recommendations to millions of users As digital information becomes more popular, and as across the globe especially in the case of collaborative competition over the velocity of information filtering algorithms which might need to compute the K dissemination sometimes overshadows integrity, the nearest neighbors at runtime and hence recommender regulations and policies that govern the circulation of systems should be scalable across various sizes and types information have also become more complex. of data and users( Karatzoglou, A., Smola, A., & Weimer, M. Hence, an information professional‟s role is to provide 2010). accurate information in a timely manner and ensure that Changing User Preferences: While a user may have a the integrity of that information is not compromised. particular intention when browsing a portal like Copyright laws, such as the American Copyright amazon.com, the next day the user might have a different Revision Act of 1976 and the Software Copyright Act of intention. A classic example is that one day the user might 1980, are in place to protect software. be searching books, but the next day the same user could be As extensive databases and storage systems are being searching for house hold appliances. Hence a developed to preserve digital information, standards and recommender systems should not take all decisions based policies should be enforced to protect the security and on prior content and also should be able to make an privacy of users. The digital revolution has made intelligent choice based on current context (MacManus, R. information more accessible; it has also affected society‟s 2009). morals by altering the perception of standards and Shilling Attacks: An underhanded and cheap way to policies of retrieving information or downloading media increase recommendation frequency is to manipulate or from the Internet. It is sometimes perceived the same as trick the system into doing so. This can be done by having a borrowing electronic devices from a friend. Information group of users (human or agent) use the recommender seekers are often found to put laws and moral system and provide specially crafted opinions that cause it implications aside when they “choose” to pirate or rectify to make the desired recommendation more often. For information for their own illicit purposes based on their example, it has been shown that a number of book reviews own “ethical” standards. For instance, 1997 records published on Amazon.com are actually written by the confirm instances of commercial software being copied author of the book being reviewed. A consumer trying to not only by customers but the programmers themselves. decide which book to purchase could be misled by such According to Seadle (2004), even “a reasonable fair use in reviews into believing that the book is better than it really ethical terms could still be an infringement in strict legal is. This is known as shilling attack and recommender judgment”. Hence, there is a need to have an enforcement systems should protect against these attacks (Lam, S., mechanism in place, instead of the current trends where Frankowski, D., & Riedl, J. 2006). Two simple type of shilling peer pressure ethical judgments are enabling or attacks are Random Bot and Average Bot. discouraging intellectual property infringements. That is  A Random Bot is filterbot who randomly rate items why the guidelines set by law need to be enforced on outside of the target item-set with either the how digital criminal behaviour shall be dealt with. Many minimum rating (for nuke attack) or maximum governments have created protection stipulations in the rating (for push attack). form of copyrights, but such stipulations protect only an  An AverageBot is filterbot where the rating is based intellectual thought, leaving information in physical and on the average rating of each item following a digital forms as victims of chance. normal distribution with a mean equal to the The information superhighway, epitomized by the World average rating for that item. Wide Web and digital libraries, is constantly faced with Privacy Issues: a very important aspect that cannot be security issues, such as identity theft, data corruption, ignored is the fact that users are always under control, in illegal downloads, and piracy. These moral issues could the sense that all taken actions are monitored and be seen as the result of easy access to vast information, registered. This might seem a very invasive setup which which opens easy opportunities for slack security, which harms user privacy and, therefore, undesirable. consequently invokes a possibility of wrong doing. The Nevertheless, there are several remarkable facts that need Information Age is generating more reasons for security- to be clarified: consciousness with the Internet and digital libraries. This 2
  • 3. is essential for the access and control of digital for a certain period of time. Aslesen (1998) has classified information in order to prevent all from being lost to our the former as usage rights, and the latter two as own plunders as we raid the information superhighway. marketing rights (which include selling and distribution 2.4 Important Issues on Digital libraries processes). The main innovation in the field of digital libraries is 2.5 Type of Recommender System apparent in the fact that most of resources are in 2.5.1 Collaborative Approach electronic format. In this format, there is no need for The first type of recommendation technique, the physical resources linked to loan, access, and reservation. collaborative approach (sometimes called the social-based Resources are ideally held in a distributed database approach), takes into account the given user‟s interests which should be accessed over the Internet. The user, profile and the profiles of other users with similar instead of taking a hard copy of the document in the interests (Shardanand & Maes, 1995). The collaborative library, downloads a new copy. The quality of the data approach looks for relevance among users by observing can become more difficult to assess if the Internet is used their ratings assigned to products in a training set of not only as a client access to the library but also as a limited size. The „„nearest neighbour‟‟ users are those that repository of information. Following some researchers‟ exhibit the strongest similarity to the target user. These definitions of the term digital library, which advocate that users then act as „„recommendation partners‟‟ for the the Internet can be viewed as a huge digital library, the target user, and collaborative approaches recommend to problem of data quality erupts (Arms, 2001). As a the target user items that appear in the profiles of these consequence of this, there should be concerns about data recommendation partners (but not in the target user‟s accuracy, originator, and integrity, once they are not profile). It has been observed in several practical settings easily measured (as they are in traditional libraries). that the collaborative approach generally achieves more There are difficulties in determining how to charge for effective recommendations than its content-based the library services, and especially, how to guarantee counterpart (Alspector et al., 1998; Breese et al., 1998; copyrights on the data which are downloaded by users. Mooney and Roy, 2000; Pazzani, 1999). Moreover, security is a great issue with the increasing 2.5.2 Content-Based Approach: influx of new viruses and hacker attacks. This issue will Another type of recommendation technique was be addressed later in this chapter. Social and called the content-based approach (Loeb & Terry, 1992). psychological aspects must be taken into consideration in A content-based approach characterizes recommendable the move to a digital format, given that everything is now items by a set of content features and represents a user‟s accessible via a computer system, and less human interests by a similar feature set. Then, the relevance of a interaction is therefore required. This can result in given content item to the user‟s interest profile is difficulties on making effective use of the library, as measured as the similarity of this recommendable item to usability issues must be thoroughly addressed. Further, the user‟s interest profile. Content-based approaches multi- language interfaces and facilities, such as thesauri select recommendable items that have a high degree of and translators, should also be provided. One the other similarity to the user‟s interest profile. Systems hand, a reservation service becomes useless, since implementing a content based recommendation approach indefinite soft copies are allowed from a document. analyze a set of documents and descriptions of items Security is a major problem in digital libraries, previously rated by a user, and build a model or profile particularly with reference to unauthorized use of library of user interests based on the features of the objects rated resources. The usual security approach that has been by that user (Mladenic, D. 1999). adopted is to establish an access control to the library The profile is a structured representation of user resources. Under this arrangement, data consumers interests, adopted to recommend new interesting items. should have a registration record with their contact The recommendation process basically consists in information, and should be given a login name for matching up the attributes of the user profile against the authorization and a password for authentication. A attributes of a content object. The result is a relevance security log recording all access made should exist in judgment that represents the user‟s level of interest in order to enable effective auditing. Ethical policies should that object. If a profile accurately reflects user preferences, be explained to all users in order to make sure they use it is of tremendous advantage for the effectiveness of an the library appropriately. information access process. For instance, it could be used Copyright is another important issue in digital libraries, to filter search results by deciding whether a user is as governments have not yet agreed a method by which interested in a specific Web page or not and, in the to effectively establish copyright laws for digital data negative case, preventing it from being displayed. (Onsrud & Lopez, 1998). The problem of copyright 2.5.3 Personalized Recommendation legislation is more evident now that data can be Personalization is about building customer reliability downloaded, and each country may have its own specific by creating a meaningful one-to-one relationship; by legislation. Guaranteeing that the user will not alter data accepting the needs of each individual and helping satisfy and resell them is a high priority. Spatial data is usually a goal that efficiently and knowledgeably addresses each very expensive to capture and generate, so it is highly individual‟s need in a given context (Riecken, 2000). The important that intellectual property rights be imposed key element of a personalized environment is the user and obeyed. Moreover, users are usually interested in a model. A user model is a data structure that represents specific part of the spatial data set. Copyright is related to user interests, goals and behaviors. The more information the use, replication and update of data and usually lasts a user model has, the better the content and presentation 3
  • 4. will be adapted for each individual user. A user model is created through a user modeling process in which Collect User Information's Response Priofile Library Rules unobservable information about a user is inferred from Explicit observable information from that user; for instance, using Implicit Admin the interactions with the system (Zukerman, et al., 1999). Filtering Select content Retrieve content Use legacy data and make and assemble page User User models can be created using a user-guided Create Mata Data Simple Recommentation for Display approach, in which the models are directly created using Content-Based the information provided by each user, or an automatic approach, in which the process of creating a user model is Collaborative Content Server Cached Content User Profiles hidden from the user. The hypermedia systems constructed using the user-guided approach are called Meta data attributes adaptable, while the ones produced using an automatic and Ratings of content and user grouping approach are called adaptive (Fink, et al., 1997; Brusilovsky Figure 1 Architecture of the proposed digital library & Schwarz, 1997).Within the context of digital library, up The architecture as show in Figure 1 consisted of the to now, user modeling has been implemented using following main components: mainly user guided approaches, which has produced  User adaptable digital library. However the problem of user The user concept covers the various actors (whether modeling in digital library can be easily implemented human or machine) entitled to interact with digital using an automatic approach because a typical user libraries. exhibits patterns when accessing digital libraries and the  Collecting User Information information containing these patterns is already usually The objective of collecting visitor information is to stored in databases. For this purpose, machine learning develop a profile that describes a site user's interests, role techniques can be applied to recognize such regularities in an organization, entitlements, purchases, or some other in order to integrate them as part of the user model. set of descriptors important to the site owner. The most Machine learning encompasses techniques where common techniques are explicit profiling, implicit machine acquires knowledge from its previous profiling, and using legacy data: experience (Witten & Frank, 1999). The output of machine Explicit profiling asks each user to fill out information or learning technique is a structural description of what has questionnaires. been learned that can be used to explain the original data Implicit profiling tracks the user's behavior. This and to make predictions. From this perspective, machine technique is generally transparent to the user. Browsing learning techniques make it possible to automatically and buying patterns are the behaviors most often create user models for the implementation of assessed. personalized digital library services. Using legacy data accesses legacy data for valuable Personalization has become an important topic for digital profile information, such as credit applications and libraries to take a more active role in dynamically previous purchases. For existing customers and known tailoring their information and service offers to user, legacy data often provides the richest source of individuals in order to better meet their needs (Callan & profile information. Smeaton, 2003). Most of the work on personalized  Analyzing User Profiles information access focuses on the use of machine learning When the profile is available, the next step is to analyze algorithms for the automated induction of a structured the profile information in order to present or recommend model of a user‟s interests, referred to as user profile, documents, purchases, or actions specific to the user. from labeled text documents (Mladenic, 1999). Keyword- Making such recommendations is the most challenging based user profiles suffer from problems of polysemy and step. Many techniques for presenting content and making synonymy. The result is that, due to synonymy, relevant recommendations are in use or under development. information can be missed if the profile does not contain the exact keywords occurring in the documents and, due User Profiles to polysemy, wrong documents could be deemed as ID, Password, Interests Role, etc... relevant. This work explores a possible solution for this kind of issue: the adoption of semantic user profiles that Identify site user capture key concepts representing users‟ interests from books, articles, or relevant documents. Semantic profiles will contain journals Retrieve user’s profile references to concepts defined in lexicons like Word Net (Miller, 1995) or ontologies. The solution is implemented Select content that in the item recommender (ITR) system which induces matches user’s Suggested items of Interest: preferences semantic user profiles from documents represented by Applications I am using Word Net (Degemmis, Lops, & Semeraro, 2007). Retrieve content and authorized to use: assemble page for III. ARCHITECTURE ANDCOMPONENTS display to user Library policy manuals I have access to: In this section researcher discuss the overall architecture of the proposed digital library system Figure 2 Analyzing User profiles  Filtering Techniques: Filtering techniques employ algorithms to analyze meta-data and drive presentation and recommendations. The three most common filtering 4
  • 5. techniques simple filtering, content-based filtering, and time applications, such as dynamically constructing web collaborative filtering are introduced below. pages based on the visitor‟s profile, affects system Simple filtering relies on predefined groups, or classes, performance. of user to determine what content is displayed or what  Content Server: The content concept encompasses service is provided. the data and information that the digital library handles Content-based filtering works by analyzing the content and makes available to its users. It is composed of a set of of the objects to form a representation of the user's information objects organized in collections. interests. IV. RESULTS | | ∑ Analysis of the Finings ( ) According to the survey conducted, about 95% of (| | | |) (∑ ∑ ) Where X is the set of keywords extracted from the questionnaire taking from students and 5% of book, or article and Y is the set of keywords in the user‟s questionnaire taking from librarians. Therefore, this profile. The coefficient, Overlap(X, Y), is not influenced study collected preference data from 200 student‟s at by the sizes of X and Y, which is desirable as the number Norton University who were in year four and year three of book or article key-words could be much larger than at the time of the survey. In addition, the top ten books the key words in the user‟s explicit keyword list or much were used: The researcher choose only top 5 books out of smaller than the keywords in a user‟s implicit key word top 10 books based on the top reading from library since list (Dietmar, J., Markus, Z., Aleexander, F., & Gerhard, F., September 2012. 2011). Book 1: PHP, MySQL, JavaScript, and CSS If set X is a subset of Y or the converse then the Book 2: Professional Java E-Commerce Book 3: Cloud Computing overlap coefficient is equal to one. The value of Book4: Oracle Database 11g & MySQL 5.6 Developer Handbook ( ) is ranges between 0 and 1. Book5: Object-Oriented and Classical Software Engineering It Collaborative filtering collects users' opinions on a set of was included as items to be ranked by users in a leading objects, using either explicit or implicit ratings, to form books store. Each user will be provided with a ranked list like-minded peer groups and then learns from the peer of all items where ties are allowed. groups to predict a particular visitor's interest in an item. Table 1 Ratings Database Instead of finding objects similar to those a user liked in Book 1 Book 2 Book 3 Book 4 Book 5 the past, as in content-based filtering, collaborative Group 1 86 33 60 146 ? filtering develops recommendations by finding users Group 2 85 62 69 139 124 with similar tastes. Researcher build upon the work of the pure collaborative filtering algorithms published that Group 3 110 90 125 118 90 compute similarities between users using a Parson Group 4 62 146 142 124 184 Correlation Coefficient (Dietmar, J., Markus, Z., Group 5 97 136 170 45 135 Aleexander, F., & Gerhard, F., 2011). Predictions for an item are than computed as the weighted average of the Analysis of Collaborative Filtering ratings for the items from those users which are similar, Table 2 Ratings Database of similarity where the weight is the computed coefficient. The general Book 1 Book 2 Book 3 Book 4 Book 5 Sim formula for a prediction for an item for user u is: Group 1 86 33 60 146 ? ∑ ( ) ( ) ( ) 85 62 69 139 124 0.98 ∑ ( ) Group 2 Where is the mean rating for the user in question, Group 3 110 90 125 118 90 0.53 ( ) is the Pearson‟s correlation coefficient of user i Group 4 62 146 142 124 184 -0.31 with the user for whom the prediction is being computed, represents the rating submitted by user i for the Group 5 97 136 170 45 135 -0.87 article for which the prediction is being computed, is the average rating (the average of the user ratings for the 160 books, articles in common) for user i and n is the total 140 number of the user in the system that have some 120 correlation with the user and have rated the item. 100 ∑ ( ̅ )( ̅ ) ( ) 80 √∑ ( ̅ ) √∑ ( ̅ ) 60 a, b : User r a,b : Rating of user a for item p 40 P : Set of items, rated both by user a and user b 20 Group 1 Group 2 Group 3 ̅̅̅ , ̅̅̅ : User's average ratings 0 Possible similarity value between -1 and +1 Book1 Book2 Book3 Book4  Content Caching Providing personalization for real Figure 3 Comparing Group 1 with two other Groups 5
  • 6. Table 3 Prediction of Group 1 and Group 2 by Pearson Correlation in the digital age has becoming almost impossible since Coefficient the availability of sources is enormous. Even though good Group 1 Group 2 Y-Y Sim(x, y)*(Y-Y) search engines have been made, the type of tools is not Book 1 86 85 -3.75 -3.674 going to tell you what books favor you the most. The main goal of this research, hence, is to find a Book 2 33 62 -26.75 -26.205 model of a recommender system for a digital library Book 3 60 69 -19.75 -19.347 while this research has chosen Norton University‟s digital library as a case study. The specific objectives of this Book 4 146 139 50.25 49.226 research are 1) to identify the type of recommender Book 5 124 35.25 34.531 system available for digital libraries 2) to illustrate how the „collaborative filtering‟, „content-based‟, and 34.531 „personalizing‟ approaches are used in a digital library, = Mean of Group 1= 88.75 and 3) to introduce a model of a recommender system a = Mean of Group 2= 81.25 digital library. ∑ ( ) ( This research also introduces what recommender ) ( ) ∑ ( ) system is as well as the challenges in the recommender system and the importance of digital library. Chosen ( ) techniques of the recommender system were evaluated. A survey technique was used. 200 random samples were Analysis of Content-Based collected from the third year and four year students Table 4 Ratings Database of Overlap studying in Computer Science, Information Management, Book 1 Book 2 Book 3 Book 4 Book 5 Overlap Software Management, and Software Engineering, for this research. Group 1 86 33 60 146 ? Based on the findings shown in the chapter IV, the 85 62 69 139 124 1 result showed that the three techniques chosen were Group 2 working well and produced considerable Group 3 110 90 125 118 90 09 recommendation improvement, as shown in figure 6. 0.8 Hence the new proposed model answered to the research Group 4 62 146 142 124 184 questions. Group 5 97 136 170 45 135 0.7 In summary, this research has contributed in two ways. Firstly, a model of a recommender system for a digital library is discovered. Secondly, „Collaborative 160 filtering‟, „content-based‟ and „personalized‟ techniques 140 Group 1 Group 2 are proved to work together well. 120 The implications of the research can be beneficial for practitioners, both readers and librarians. By applying 100 this model to the existing digital library system at Norton 80 University, students would simply find their favorite 60 books or article and a series of similar taste of books 40 easier and faster. They would waste less time for finding 20 and gain more time for reading. The busyness of the 0 University‟s Internet bandwidth would be no longer Book1 BooK2 Book3 Book4 Book5 wasted. And for the librarian as well as management Figure 4 Overlap of Group 1 and Group 2 team would understand the students‟ taste better. Recommendations 200 Even though this research has developed a model of a recommender system for a digital library and found significant results from a combination of the three chosen 150 techniques, this is limited to the research scope. That is, an actual web-based system needs to be made to test the 100 actual data. The actual data differs significantly from this small sample data. In real system, new techniques may be discovered and may need to assist these existing 50 techniques in order to improve the quality of recommendation. The future research would do with 0 actual data collected from a real system. 0 1 2 3 4 5 6 Limitations Figure 6 Scatter Plot with Line of best fit The body of work aimed at empirically studying the determinants of the intention to participate in a model of V. CONCLUSION a recommender system for a digital library. A survey As shown in the statement of problem, it is clear technique was used to collect data. First, a pilot study on that finding an article or book which interests the readers recommender system for digital libraries users and 6
  • 7. librarian was run to find out any different type of second DELOS network of excellence workshop on recommender system. And then pre-test included eight Personalization and Recommender Systems in Digital user and two librarians who were experienced in Libraries. ERCIM Workshop proceedings No01/W03. recommender system for digital libraries. Dublin City University. According to scope and limitation of this research  Degemmis, M., Lops, P., & Semeraro, G. (2007). A that have been stated, there are four major in Computer content-collaborative recommender that exploits Science, Information and Communication Technology, WordNet-based user profiles for neighborhood formation. User Modeling and User-Adapted Network and Security, and Software Development were Interaction: The Journal of Personalization Re-search, selected to study on this research. To be correctly and 17(3), 217-255. effectively study, students of Computer Science and  Fink, J., Kobsa, A., & Nill, A. (1997). Adaptable and Information Management that are totally around 195 Adaptive Information Access for All Users, Including students and 05 librarian of Norton University were the Disabled and the Elderly. A. Jamesson, C. Paris and chose to complete the surveys from 15th to 30th of C. Tasso (Eds.), User Modeling: Proceedings of the Sixth September 2012 so that recommender system is International Conference, UM97, pp.171-173. applicable.  Loeb, S. & Terry, D. (1992). Information filtering, Acknowledgements Communications of the ACM, Special Issue on I would like to pay my highly appreciation and thankful Information Filtering, Vol. 35 No. 12, pp. 26-8. for those people who have helped and contributed so  Linden G., Smith B. & York J. (2003). Amazon.com many useful resource, ideas, and time toward the Recommendations: Item-to-Item Collaborative Filtering, completion of this thesis. Without their help, I could not IEEE Internet Computing, v.7 n.1, pages 76-80, January be able to finish it. Firstly, I would like to pay my highly 2003 respect to my parents who have been supporting me in  Miller, G. A. (1995). WordNet: A lexical data-base for every way they can in order to ease my study. Without English. Communications of the ACM, 38(11), 39-41. their help and guidance, I would not have finished my  Mladenic, D .(1999). Text-learning and Related master degree. Secondly, I would like pay my highly Intelligent Agents, A Survey. IEEE Intelligent Systems appreciation to my advisor, Prof. Oum Saokosal, who 14(4), pp.44–54.  Mooney, R. & Roy, L. (2000). Content-based book have supported me in generating good ideas as well as recommending using learning for text categorization , provided some critical insight related to the thesis so that Proceedings of the 5th ACM Conference on Digital I could did it smoothly into the right direction. Without Libraries, San Antonio, ACM Press, New York, NY, pp. his guidance and patience, the thesis will not be done 195-204. correctly. Thirdly, I would like to give my appreciation to  Onsrud, H., & Lopez, X. (1998). Intellectual property all teachers and lecturers at Norton University who have rights in disseminating digital geo-graphic data, been actively support to all 2nd year students including products and services: Conflicts and commonalities me in our thesis writing. Last but not least, I would like to among EU and U.S. approaches. In P. Burrough, & I. thanks to all the students at Norton University who Masser (Eds.), European Geographic Infrastructures: helped one another both in terms of knowledge sharing Opportunities and Pitfalls, GISDATA 5 (pp. 127–135). and direction pointing toward a successful thesis. Taylor & Francis. Without these mentioned people, this thesis would not  Palani, A., Fox, E., Yang, S., & Ganesan, V. (2009). have been existed. So, I would like to pay my highly Digital Library/ Recommender Systems Curriculum appreciation to these people. May all the best things come Development. to all of us.  Riecken, D. (2000). Personalized Views of References Personalization. Communications of the ACM, 43 (8),  Arms, W. (2001). Digital libraries (2nd ed.). MIT Press. pp.27-28.  Aslesen, L. (1998). Intellectual property and map-ping:  Shardanand, U.,& Maes, P.(1995).Social Information A European perspective. In P. Burrough, & I. Masser Filtering: Algorithms for Automating “Word of Mouth”. (Eds.), European Geographic Infra-structures: In: Proceedings of ACM CHI‟95 Conference on Human Opportunities and Pitfalls, GISDATA 5 (pp. 127–135). Factors in Computing Systems, vol. 1, pp. 210–217 Taylor & Francis.  Various. (2001). Special issue on the theme digital  Breese, J., Heckerman, D. & Kadie, C. (1998), Empirical libraries. Communications of the ACM, 44(5). analysis of predictive algorithms for collaborative  Witten, I.H., & Frank E. (1999). Data Mining. Practical filtering , Technical Report MSR-TR-98-12, Microsoft Machine Learning Tools and Techniques with JAVA Research, Seattle, CA. Implementations. Morgan Kaufman Publishers.  Brusilovsky, P., & Schwarz, E. (1997). User as Student:  Zukerman, I., Albrecht, D.W., & Nicholson, A.E. (1999). Towards an Adaptive Interface for Advanced Web- Predicting Users Request on the WWW. Proceedings of Based Applications. A. Jamesson, C. Paris and C. Tasso the 7th International Conference on User Modeling, (Eds.), User Modeling: Proceedings of the Sixth UM99, pp.275-284. International Conference, UM97, pp.177-188.  Callan, J., Smeaton, A., Beaulieu, M., Borlund, P., Brusilovsky, P., Chalmers, M., Lynch, C., Riedl, J., Smyth, B., Straccia, U., & Toms E. (2003). Personalization and Recommender Systems in Digital Libraries, Joint NSF-EU DELOS Working Group Report.  Callan, J., & Smeaton, A. (2001). Proceedings of the 7
  • 8. Questionnaire for Student I. Students General Information: 1. Age:  A. 18-21  B. 22-25  C. 26- 29  D. 30-33  E. more than 33 2. Sex:  A. M  B. F 3. College of Science, which majoring is you in?  A. Information and Communication Technology  B. Computer Science  C. Software Development  D. Network and Security  E. Other…………………….. 4. Do you have any online shopping experience?(like Amazon.com)  A. Yes  B. No 5. Do you have any experience finding books, articles, and journals E-library?  A. Yes  B. No if yes, How it work?................................................................................ ................................................................................................................. if No, Why ?............................................................................................ ................................................................................................................ 6. Does Norton University have recommender system for digital library?  A. Yes if yes, What kind of recommender system is used? .................................................................................................................  B. No if No, Do you want to have ? Like: www.yahoo.com, www.youtube.com, and, www.amazon.com. II. Students Recommender System Technique: Answer each statement by ticking each answer box. Use these ratings as a guide when you answer each statement: សូមធ្វើការធ្រើ សធរ ើសនូ វធសៀវធៅចំ នួន៥ក្បាលក្បនុងចំ ធោម១០ក្បាល ធ ើធសៀវធៅោខ្លះ? ដែលអ្នក្បចូ លចិ តអាន និ ងធ្ើ វការស្រាវ្ាវ ធ ើយធអាយពិ នុទែូចខាងធ្កាមៈ 1= It is useless ឥ ្រធោរន៍ 2= Not very useful មិនសូវមាន្រធោរន៍ 3= Neutral អ្ពា្ក្បឹ 4=Nice to have លអដែរធរើមាន 5= Excellent លអោស់ធរើមានធសៀវធៅធនះ
  • 9. Statement Title 1 2 3 4 5 Cisco CCNA in 60 Days 1. Practical Database Programming with Visual Basic.NET 2. PHP, MySQL, JavaScript, and CSS 3. Professional Java E-Commerce 4. Network Analysis, Architecture, and Design 5. Oracle Programming with Visual Basic 6. Microsoft Visual Basic 2010 for Windows, Web, Office, and Database Applications 7.
  • 10. Cloud Computing 8. Oracle Database 11g & MySQL 5.6 Developer Handbook 9. Object-Oriented and Classical Software Engineering 10. Please add below any other comments: -------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------- Thank you for your time?
  • 11. Questionnaire for Librarian I. Librarian General Information: 1) Age:  A. 18-21  B. 22-25  C. 26- 29  D. 30-33  E. more than 33 2) Sex:  A. M  B. F 3) What kind of library does Norton University has?  A. Library if yes, How it work?................................................................................ ................................................................................................................. if No, Why ?............................................................................................ .................................................................................................................  B. E-library if yes, How it work?................................................................................ ................................................................................................................. if No, Why ?............................................................................................ .................................................................................................................  C. Library Managements if yes, How it work?................................................................................ ................................................................................................................. if No, Why ?............................................................................................ .................................................................................................................  E. Other………………………………………………………………….. 4) Does Norton University have recommender system for digital library?  A. Yes if yes, What kind of recommender system is used? .................................................................................................................  B. No if No, Do you want to have the tools and services of recommender system for digital library of Norton University? Like: www.yahoo.com, www.youtube.com, and www.amazon.com. Please add below any other comments: -------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------- Thank you for your time?