Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering

PDF

Institution
Keyword
Publication Year
Publication
Publication Type

Articles 1 - 30 of 23426

Full-Text Articles in Entire DC Network

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad Jun 2024

Sustaining Digital Assets Through Mobile Estate Planning, Norliza Katuk, Asvinitha Muniandy, Norazlina Abd. Wahab, Ijaz Ahmad

An-Najah University Journal for Research - B (Humanities)

Many people own online accounts, with some having financial values like Internet banking, e-wallet and cryptocurrency. In the case of sudden death, their heirs are unaware of the digital assets possessed by the deceased person, which causes the assets to be lost forever, and the heirs might not receive the assets. If an estate plan did not account for digital assets properly, the beneficiaries would not be able to access them. Therefore, this paper addresses this issue by implementing a software development approach in designing a suitable model for sustaining digital assets through smartphones to allow the inheritance of digital …


Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar May 2024

Expanding The Horizon: Blockchain Technology Beyond The Bounds Of Cryptocurrency, Hassan Azhar

SMU Data Science Review

Blockchain technology has extended beyond its initial role as the infrastructure for cryptocurrencies to transform various industries with its decentralized and transparent ledger system. This paper examines the broad spectrum of blockchain applications beyond cryptocurrency. It explores its potential to innovate and drive change across finance, supply chain management, healthcare, real estate, and voting systems. We review recent literature, detail specific use cases, and discuss blockchain's challenges and opportunities, aiming to provide a comprehensive overview of its transformative impact. Integrating emerging technologies, scalability, regulatory considerations, and energy consumption are critical challenges to its adoption. Our findings underscore the need for …


Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan May 2024

Signer-Independent Sign Language Recognition With Feature Disentanglement, İnci̇ Meli̇ha Baytaş, İpek Erdoğan

Turkish Journal of Electrical Engineering and Computer Sciences

Learning a robust and invariant representation of various unwanted factors in sign language recognition (SLR) applications is essential. One of the factors that might degrade the sign recognition performance is the lack of signer diversity in the training datasets, causing a dependence on the singer’s identity during representation learning. Consequently, capturing signer-specific features hinders the generalizability of SLR systems. This study proposes a feature disentanglement framework comprising a convolutional neural network (CNN) and a long short-term memory (LSTM) network based on adversarial training to learn a signer-independent sign language representation that might enhance the recognition of signs. We aim to …


Joint Control Of A Flying Robot And A Ground Vehicle Using Leader-Follower Paradigm, Ayşen Süheyla Bağbaşi, Ali Emre Turgut, Kutluk Bilge Arikan May 2024

Joint Control Of A Flying Robot And A Ground Vehicle Using Leader-Follower Paradigm, Ayşen Süheyla Bağbaşi, Ali Emre Turgut, Kutluk Bilge Arikan

Turkish Journal of Electrical Engineering and Computer Sciences

In this study, a novel control framework for the collaboration of an aerial robot and a ground vehicle that is connected via a taut tether is proposed. The framework is based on a leader-follower paradigm. The leader follows a desired trajectory while the motion of the follower is controlled by an admittance controller using an extended state observer to estimate the tether force. Additionally, a velocity estimator is also incorporated to accurately assess the leader’s velocity. An essential feature of our system is its adaptability, enabling role switching between the robots when needed. Furthermore, the synchronization performance of the robots …


Stereo-Image-Based Ground-Line Prediction And Obstacle Detection, Emre Güngör, Ahmet Özmen May 2024

Stereo-Image-Based Ground-Line Prediction And Obstacle Detection, Emre Güngör, Ahmet Özmen

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, vision systems have become essential in the development of advanced driver assistance systems or autonomous vehicles. Although deep learning methods have been the center of focus in recent years to develop fast and reliable obstacle detection solutions, they face difficulties in complex and unknown environments where objects of varying types and shapes are present. In this study, a novel non-AI approach is presented for finding the ground-line and detecting the obstacles in roads using v-disparity data. The main motivation behind the study is that the ground-line estimation errors cause greater deviations at the output. Hence, a novel …


Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r May 2024

Unveiling Anomalies: A Survey On Xai-Based Anomaly Detection For Iot, Esin Eren, Feyza Yildirim Okay, Suat Özdemi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

In recent years, the rapid growth of the Internet of Things (IoT) has raised concerns about the security and reliability of IoT systems. Anomaly detection is vital for recognizing potential risks and ensuring the optimal functionality of IoT networks. However, traditional anomaly detection methods often lack transparency and interpretability, hindering the understanding of their decisions. As a solution, Explainable Artificial Intelligence (XAI) techniques have emerged to provide human-understandable explanations for the decisions made by anomaly detection models. In this study, we present a comprehensive survey of XAI-based anomaly detection methods for IoT. We review and analyze various XAI techniques, including …


Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r May 2024

Deep Learning-Based Breast Cancer Diagnosis With Multiview Of Mammography Screening To Reduce False Positive Recall Rate, Meryem Altın Karagöz, Özkan Ufuk Nalbantoğlu, Derviş Karaboğa, Bahriye Akay, Alper Baştürk, Halil Ulutabanca, Serap Doğan, Damla Coşkun, Osman Demi̇r

Turkish Journal of Electrical Engineering and Computer Sciences

Breast cancer is the most prevalent and crucial cancer type that should be diagnosed early to reduce mortality. Therefore, mammography is essential for early diagnosis owing to high-resolution imaging and appropriate visualization. However, the major problem of mammography screening is the high false positive recall rate for breast cancer diagnosis. High false positive recall rates psychologically affect patients, leading to anxiety, depression, and stress. Moreover, false positive recalls increase costs and create an unnecessary expert workload. Thus, this study proposes a deep learning based breast cancer diagnosis model to reduce false positive and false negative rates. The proposed model has …


Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek May 2024

Text-To-Sql: A Methodical Review Of Challenges And Models, Ali Buğra Kanburoğlu, Faik Boray Tek

Turkish Journal of Electrical Engineering and Computer Sciences

This survey focuses on Text-to-SQL, automated translation of natural language queries into SQL queries. Initially, we describe the problem and its main challenges. Then, by following the PRISMA systematic review methodology, we survey the existing Text-to-SQL review papers in the literature. We apply the same method to extract proposed Text-to-SQL models and classify them with respect to used evaluation metrics and benchmarks. We highlight the accuracies achieved by various models on Text-to-SQL datasets and discuss execution-guided evaluation strategies. We present insights into model training times and implementations of different models. We also explore the availability of Text-to-SQL datasets in non-English …


Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou May 2024

Security Fusion Method Of Physical Fitness Training Data Based On The Internet Of Things, Bin Zhou

Turkish Journal of Electrical Engineering and Computer Sciences

Physical fitness training, an important way to improve physical fitness, is the basic guarantee for forming combat effectiveness. At present, the evaluation types of physical fitness training are mostly conducted manually. It has problems such as low efficiency, high consumption of human and material resources, and subjective factors affecting the evaluation results. ”Internet+” has greatly expanded the traditional network from the perspective of technological convergence and network coverage objects. It has expedited and promoted the rapid development of Internet of Things (IoT) technology and its applications. The IoT with many sensor nodes shows the characteristics of acquisition information redundancy, node …


Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng May 2024

Dpafy-Gcaps: Denoising Patch-And-Amplify Gabor Capsule Network For The Recognition Of Gastrointestinal Diseases, Henrietta Adjei Pokuaa, Adeboya Felix Adekoya, Benjamin Asubam Weyori, Owusu Nyarko-Boateng

Turkish Journal of Electrical Engineering and Computer Sciences

Deep learning (DL) models have performed tremendously well in image classification. This good performance can be attributed to the availability of massive data in most domains. However, some domains are known to have few datasets, especially the health sector. This makes it difficult to develop domain-specific high-performing DL algorithms for these fields. The field of health is critical and requires accurate detection of diseases. In the United States Gastrointestinal diseases are prevalent and affect 60 to 70 million people. Ulcerative colitis, polyps, and esophagitis are some gastrointestinal diseases. Colorectal polyps is the third most diagnosed malignancy in the world. This …


Learning Proximal Operators With Gaussian Process And Adaptive Quantization In Distributed Optimization, Aldo Duarte Vera Tudela May 2024

Learning Proximal Operators With Gaussian Process And Adaptive Quantization In Distributed Optimization, Aldo Duarte Vera Tudela

LSU Doctoral Dissertations

In networks consisting of agents communicating with a central coordinator and working together to solve a global optimization problem in a distributed manner, the agents are often required to solve private proximal minimization subproblems. Such a setting often requires a further decomposition method to solve the global distributed problem, resulting in extensive communication overhead. In networks where communication is expensive, it is crucial to reduce the communication overhead of the distributed optimization scheme. Integrating Gaussian processes (GP) as a learning component to the Alternating Direction Method of Multipliers (ADMM) has proven effective in learning each agent's local proximal operator to …


Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D. May 2024

Effects Of A Wi-Fi Link On The Performance Of A Path Following Autonomous Ground Vehicle, Anthony Iwejuo, Austin Cagle, Billy Kihei, Ph.D.

Symposium of Student Scholars

As vehicles become more automated and connected, the future of safe and efficient travel will be dependent on efficient wireless networks. Artificial intelligence (AI) demands high power resources and computing resources that can be resource-intensive for mobile robotic systems. A new paradigm involving the remote computing of A.I. can enable robotics that are built lighter and more power efficient. In this study, we compare a locally run artificial intelligence algorithm for autonomous ground vehicle navigation against remote computation through various wireless links to highlight the need for low-latency access to remote computing resources over Wi-Fi network calls. Our findings show …


Mosaic Swarm Robotics: Emulating Natural Collective Behaviors For Efficient Task Execution With Custom Mobile Robots, Jonathan Ridley, Arielle Charles, Charles Koduru, Muhammad Hassan Tanveer, Razvan Voicu May 2024

Mosaic Swarm Robotics: Emulating Natural Collective Behaviors For Efficient Task Execution With Custom Mobile Robots, Jonathan Ridley, Arielle Charles, Charles Koduru, Muhammad Hassan Tanveer, Razvan Voicu

Symposium of Student Scholars

Mosaics, as an artistic expression, involves the meticulous arrangement of diverse tiles to form a unified composition. Drawing inspiration from this concept, the field of swarm robotics seeks to emulate nature’s collective behaviors observed in ant colonies, fish schools, and bird flocks, employing multiple agents to accomplish tasks efficiently. Our research explores the concept of mosaic swarm robotics, where numerous nodes with specialized functions are deployed across various domains, including applications for outdoor data capture and environment mapping. We utilized custom mobile robots operated by Raspberry Pi microcontrollers. By establishing an elaborate web of client-to-client communications to enable true localized …


Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker May 2024

Computer Security Lab Experiment, Orit D. Gruber, Herbert Schanker

Open Educational Resources

This is a basic experiment for all students of all majors to explore Computer Security. Each instruction included in this experiment is conducted online via a Web Browser; Firefox or Chrome is recommended. Software does not need to be downloaded nor installed. The step by step instructions in this experiment include interactive questions and observations which are then included in the (student's) final report.


Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu May 2024

Generalized Model To Enable Zero-Shot Imitation Learning For Versatile Robots, Yongshuai Wu

Master's Theses

The rapid advancement in Deep Learning (DL), especially in Reinforcement Learning (RL) and Imitation Learning (IL), has positioned it as a promising approach for a multitude of autonomous robotic systems. However, the current methodologies are predominantly constrained to singular setups, necessitating substantial data and extensive training periods. Moreover, these methods have exhibited suboptimal performance in tasks requiring long-horizontal maneuvers, such as Radio Frequency Identification (RFID) inventory, where a robot requires thousands of steps to complete.

In this thesis, we address the aforementioned challenges by presenting the Cross-modal Reasoning Model (CMRM), a novel zero-shot Imitation Learning policy, to tackle long-horizontal robotic …


Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton May 2024

Brain Computer Interface-Based Drone Control Using Gyroscopic Data From Head Movements, Ikaia Cacha Melton

Honors College Theses

This research explores the potential of using gyroscopic data from a person’s head movement to control a DJI Tello quadcopter via a Brain-Computer Interface (BCI). In this study, over 100 gyroscopic recordings capturing the X, Y and Z columns (formally known as GyroX, GyroY, GyroZ) between 4 volunteers with the Emotiv Epoc X headset were collected. The Emotiv Epoc X data captured (left, right, still, and forward) head movements of each participant associated with the DJI Tello quadcopter navigation. The data underwent thorough processing and analysis, revealing distinctive patterns in charts using Microsoft Excel. A Python condition algorithm was then …


Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert May 2024

Flexible Strain Gauge Sensors As Real-Time Stretch Receptors For Use In Biomimetic Bpa Muscle Applications, Rochelle Jubert

Student Research Symposium

This work presents a novel approach to real-time length sensing for biomimetic Braided Pneumatic Actuators (BPAs) as artificial muscles in soft robotics applications. The use of artificial muscles enables the development of more interesting robotic designs that no longer depend on single rotation joints controlled by motors. Developing robots with these capabilities, however, produces more complexities in control and sensing. Joint encoders, the mainstay of robotic feedback, can no longer be used, so new methods of sensing are needed to get feedback on muscle behavior to implement intelligent controls. To address this need, flexible strain gauge sensors from Portland company, …


Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan May 2024

Evaluating The Effect Of Noise On Secure Quantum Networks, Karthick Anbalagan

Master's Theses

This thesis focuses on examining the resilience of secure quantum networks to environmental noise. Specifically, we evaluate the effectiveness of two well-known quantum key distribution (QKD) protocols: the Coherent One-Way (COW) protocol and Kak’s Three-Stage protocol (Kak06). The thesis systematically evaluates these protocols in terms of their efficiency, operational feasibility, and resistance to noise, thereby contributing to the progress of secure quantum communications. Using simulations, this study evaluates the protocols in realistic scenarios that include factors such as noise and decoherence. The results illustrate each protocol’s relative benefits and limitations, highlighting the three-stage protocol’s superior security characteristics, resistance to interference, …


Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei May 2024

Machine Learning For Intrusion Detection Into Unmanned Aerial System 6g Networks, Faisal Alrefaei

Doctoral Dissertations and Master's Theses

Progress in the development of wireless network technology has played a crucial role in the evolution of societies and provided remarkable services over the past decades. It remotely offers the ability to execute critical missions and effective services that meet the user's needs. This advanced technology integrates cyber and physical layers to form cyber-physical systems (CPS), such as the Unmanned Aerial System (UAS), which consists of an Unmanned Aerial Vehicle (UAV), ground network infrastructure, communication link, etc. Furthermore, it plays a crucial role in connecting objects to create and develop the Internet of Things (IoT) technology. Therefore, the emergence of …


Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel May 2024

Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel

Military Cyber Affairs

Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …


Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu May 2024

Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu

Military Cyber Affairs

Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …


Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin May 2024

Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin

Military Cyber Affairs

Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.


Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu May 2024

Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu

Military Cyber Affairs

Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.


Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar May 2024

Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar

Military Cyber Affairs

Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.


Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora May 2024

Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora

Military Cyber Affairs

In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.


Simulating Information And Communication Applications In Employee Interaction Network Models, Matthew Kanter May 2024

Simulating Information And Communication Applications In Employee Interaction Network Models, Matthew Kanter

Student Research Submissions

Information and communication technology (ICT) use has been identified throughout its development and evolution with the Internet boom as a net positive tool for most employees and organizations in the working world. Only recently have studies regarding employees’ well-being begun to come to the forefront of research regarding these rapidly evolving technologies, however these are important issues to discuss in the context of work-life boundary management, emotional exhaustion, overwhelming stress levels, and moral disengagement among other employee well-being dimensions. To explore how employees’ well being might be influenced by ICT use, this study conducted a quantitative survey and analyzed a …


The School Of Engineering And Computer Science Class Of 2024 Academic Celebration Program, Cedarville University May 2024

The School Of Engineering And Computer Science Class Of 2024 Academic Celebration Program, Cedarville University

Engineering and Computer Science Academic Celebrations

No abstract provided.


Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko May 2024

Star-Based Reachability Analysis Of Binary Neural Networks On Continuous Input, Mykhailo Ivashchenko

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Deep Neural Networks (DNNs) have become a popular instrument for solving various real-world problems. DNNs’ sophisticated structure allows them to learn complex representations and features. However, architecture specifics and floating-point number usage result in increased computational operations complexity. For this reason, a more lightweight type of neural networks is widely used when it comes to edge devices, such as microcomputers or microcontrollers – Binary Neural Networks (BNNs). Like other DNNs, BNNs are vulnerable to adversarial attacks; even a small perturbation to the input set may lead to an errant output. Unfortunately, only a few approaches have been proposed for verifying …


A Smart Hybrid Enhanced Recommendation And Personalization Algorithm Using Machine Learning, Aswin Kumar Nalluri May 2024

A Smart Hybrid Enhanced Recommendation And Personalization Algorithm Using Machine Learning, Aswin Kumar Nalluri

Electronic Theses, Projects, and Dissertations

In today’s age of streaming services, the effectiveness and precision of recommendation systems are crucial in improving user satisfaction. This project introduces the Smart Hybrid Enhanced Recommendation and Personalization Algorithm (SHERPA) a cutting-edge machine learning approach aimed at transforming how movie suggestions are made. By combining Term Frequency Inverse Document Frequency (TF-IDF) for content based filtering and Alternating Squares (ALS) with Weighted Regularization for filtering SHERPA offers a sophisticated method for delivering tailored recommendations.

The algorithm underwent evaluation using a dataset that included over 50 million ratings from 480,000 Netflix users encompassing 17,000 movie titles. The performance of SHERPA was …