A Review of Machine Learning-Based Recommendation Algorithms in Information Technology Systems
DOI:
https://doi.org/10.71222/gvtd3173Keywords:
recommendation systems, machine learning, deep learning, content-based filtering, collaborative filtering, hybrid models, data sparsity, fairness, transparency, quantum computingAbstract
This review explores the evolving landscape of recommendation systems, focusing on the integration of machine learning techniques to enhance personalization and effectiveness. It high-lights various approaches, including content-based filtering, collaborative filtering, and hybrid models, while examining the role of advanced machine learning methods such as deep learning and reinforcement learning. The discussion addresses the challenges faced by current algorithms, including data sparsity, scalability issues, and biases. Future directions for research are proposed, emphasizing the integration of emerging technologies like quantum computing, the enhancement of fairness and transparency, and the development of real-time adaptive systems. This re-view aims to provide insights into the current state of recommendation systems and their potential advancements, contributing to more effective and user-centric applications across diverse domains.
References
1. Y. Ding, "Application and performance evaluation of DES data encryption algorithm in computer information security technology," J. Artif. Intell. Pract., vol. 7, no. 3, 2024, doi: 10.23977/jaip.2024.070301.
2. G. Bektemyssova and A. Sabdenov, "Building a semantic knowledge graph search model for finding a causal answer," Revue d'Intell. Artif., vol. 38, no. 1, 2024, doi: 10.18280/ria.380125.
3. Q. Zhai and X. Chen, "RETRACTED ARTICLE: Design and application of optical communication technology based on ma-chine learning algorithms in physical education teaching information management system," Opt. Quantum Electron., vol. 56, no. 1, p. 111, 2024, doi: 10.1007/s11082-023-05717-5.
4. L. Montull, A. Slapšinskaitė-Dackevičienė, J. Kiely, R. Hristovski, and N. Balagué, "Integrative proposals of sports monitoring: subjective outperforms objective monitoring," Sports Med. Open, vol. 8, no. 1, p. 41, 2022, doi: 10.1186/s40798-022-00432-z.
5. B. E. Larson, J. D. Ezell, and C. G. Cegielski, "From personal to professional: impacts of trust in information systems and analytics," Int. J. Soc. Hum. Comput., vol. 4, no. 1, pp. 29-52, 2021, doi: 10.1504/IJSHC.2021.116872.
6. L. Yu, Z. Guo, G. Chen, X. Zhang, Y. Tang, and H. Wei, "Question answering system based on knowledge graph in air defense field," J. Phys. Conf. Ser., vol. 1693, no. 1, p. 012033, Dec. 2020, doi: 10.1088/1742-6596/1693/1/012033.
7. Y. S. Tverskoy, A. V. Golubev, I. K. Muravev, A. N. Nikonorov, I. A. Kolesov, and Y. A. Gajdina, "Systemic issues of the power plants APCS development technology and performance paradigm," J. Phys. Conf. Ser., vol. 1683, no. 4, p. 042057, Dec. 2020, doi: 10.1088/1742-6596/1683/4/042057.
8. K. Sundara Krishnan, B. Jaison, and S. P. Raja, "An efficient novel color image encryption algorithm based on 3D Lü chaotic dynamical system and SHA-512," Int. J. Wavelets Multiresolut. Inf. Process., vol. 18, no. 05, p. 2050042, 2020, doi: 10.1142/S0219691320500423.
9. L. Zeng, S. Cheng, Q. Han, and L. Ye, "A vehicular service-oriented dynamical routing searching algorithm in soft-ware-defined BusNet," Mobile Inf. Syst., vol. 2020, p. 8856130, 2020, doi: 10.1155/2020/8856130.
10. Z. Hu and J. Huang, "Re-detection object tracking algorithm in the cyber-physical system," IET Cyber-Phys. Syst. Theory Appl., vol. 5, no. 3, pp. 253-262, 2020, doi: 10.1049/iet-cps.2019.0086.
11. L. Mu, V. Sugumaran, and F. Wang, "A hybrid genetic algorithm for software architecture re-modularization," Inf. Syst. Front., vol. 22, no. 5, pp. 1133-1161, 2020, doi: 10.1007/s10796-019-09906-0.
12. M. G. Asuti and P. I. Basarkod, "TLSA: A two-level scheduling algorithm for multiple packets arrival in TSCH networks," KSII Trans. Internet Inf. Syst., vol. 14, no. 8, pp. 3201-3223, 2020, doi: 10.3837/tiis.2020.08.003.
13. Y. G. Yang, B. W. Guan, Y. H. Zhou, and W. M. Shi, "Double image compression-encryption algorithm based on fractional order hyper chaotic system and DNA approach," Multimedia Tools Appl., vol. 80, pp. 691-710, 2021, doi: 10.1007/s11042-020-09779-5.
14. C. Hou and S. Guo, "Automatic carrier phase delay synchronization of PGC demodulation algorithm in fiber-optic inter-ferometric sensors," KSII Trans. Internet Inf. Syst. (TIIS), vol. 14, no. 7, pp. 2891-2903, 2020, doi: 10.3837/tiis.2020.07.009.
15. T. Li, W. Yan, and Z. Chi, "A new image encryption algorithm based on optimized Lorenz chaotic system," Concurrency Comput. Pract. Exp., vol. 34, no. 13, p. e5902, 2022, doi: 10.1002/cpe.5902.
16. S. Wang, X. Jia, and Q. Sang, "A dual privacy preserving algorithm in spatial crowdsourcing," Mobile Inf. Syst., vol. 2020, p. 1960368, 2020, doi: 10.1155/2020/1960368.
17. S. Ferrada Aliaga, B. Bustos Cárdenas, and N. Reyes, "An efficient algorithm for approximated self-similarity joins in metric spaces," Inf. Syst., vol. 91, p. 101510, 2020, doi: 10.1016/j.is.2020.101510.
18. C. Alaimo and J. Kallinikos, "Managing by data: Algorithmic categories and organizing," Organ. Stud., vol. 42, no. 9, pp. 1385-1407, 2021, doi: 10.1177/01708406209340.
19. P. N. Huu and Q. T. Minh, "An ANN-based gesture recognition algorithm for smart-home applications," KSII Trans. Internet Inf. Syst. (TIIS), vol. 14, no. 5, pp. 1967-1983, 2020, doi: 10.3837/tiis.2020.05.006.
20. S. Wang, R. Yang, R. Wang, X. Xiao, Z. Wei, W. Lin, Y. Yang, and N. Tang, "Efficient algorithms for approximate sin-gle-source personalized PageRank queries," ACM Trans. Database Syst. (TODS), vol. 44, no. 4, Art. no. 18, pp. 1-37, Oct. 2019, doi: 10.1145/3360902.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Libo Sun, Dongjin Fu (Author)

This work is licensed under a Creative Commons Attribution 4.0 International License.