The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective se...The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.展开更多
Proper waste management models using recent technologies like computer vision,machine learning(ML),and deep learning(DL)are needed to effectively handle the massive quantity of increasing waste.Therefore,waste classif...Proper waste management models using recent technologies like computer vision,machine learning(ML),and deep learning(DL)are needed to effectively handle the massive quantity of increasing waste.Therefore,waste classification becomes a crucial topic which helps to categorize waste into hazardous or non-hazardous ones and thereby assist in the decision making of the waste management process.This study concentrates on the design of hazardous waste detection and classification using ensemble learning(HWDC-EL)technique to reduce toxicity and improve human health.The goal of the HWDC-EL technique is to detect the multiple classes of wastes,particularly hazardous and non-hazardous wastes.The HWDC-EL technique involves the ensemble of three feature extractors using Model Averaging technique namely discrete local binary patterns(DLBP),EfficientNet,and DenseNet121.In addition,the flower pollination algorithm(FPA)based hyperparameter optimizers are used to optimally adjust the parameters involved in the EfficientNet and DenseNet121 models.Moreover,a weighted voting-based ensemble classifier is derived using three machine learning algorithms namely support vector machine(SVM),extreme learning machine(ELM),and gradient boosting tree(GBT).The performance of the HWDC-EL technique is tested using a benchmark Garbage dataset and it obtains a maximum accuracy of 98.85%.展开更多
Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle ...Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle recognition from RSIs remained a challenging process because of the difficulty of background data and the redundancy of recognition regions.The latest advancements in deep learning(DL)approaches permit the design of effectual OD approaches.This study develops an Artificial Ecosystem Optimizer with Deep Convolutional Neural Network for Vehicle Detection(AEODCNN-VD)model on Remote Sensing Images.The proposed AEODCNN-VD model focuses on the identification of vehicles accurately and rapidly.To detect vehicles,the presented AEODCNN-VD model employs single shot detector(SSD)with Inception network as a baseline model.In addition,Multiway Feature Pyramid Network(MFPN)is used for handling objects of varying sizes in RSIs.The features from the Inception model are passed into theMFPNformultiway andmultiscale feature fusion.Finally,the fused features are passed into bounding box and class prediction networks.For enhancing the detection efficiency of the AEODCNN-VD approach,AEO based hyperparameter optimizer is used,which is stimulated by the energy transfer strategies such as production,consumption,and decomposition in an ecosystem.The performance validation of the presentedmethod on benchmark datasets showed promising performance over recent DL models.展开更多
Internet of things(IoT)and cloud computing(CC)becomes widespread in different application domains such as business,e-commerce,healthcare,etc.The recent developments of IoT technology have led to an increase in large a...Internet of things(IoT)and cloud computing(CC)becomes widespread in different application domains such as business,e-commerce,healthcare,etc.The recent developments of IoT technology have led to an increase in large amounts of data from various sources.In IoT enabled cloud environment,load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization.The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics.In this view,this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling(C3SOA-LS)technique for IoT enabled cloud environment.The proposed C3SOA-LS technique intends to effectually schedule the tasks and balance the load uniformly in such a way that maximum resource utilization can be accomplished.Besides,the presented C3SOA-LS model involves the design of circle chaotic mapping(CCM)with the traditional chameleon swarm optimization(CSO)algorithm for improving the exploration process,shows the novelty of the work.The proposed C3SOA-LS model computes an objective with the minimization of energy consumption and makespan.The experimental outcome implied that the C3SOA-LS model has showcased improved performance and uniformly balances the load over other approaches.展开更多
Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL...Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL)models can be utilized to design efficient security solutions for IoT healthcare applications.In this aspect,this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning(BPPIEODL)technique for IoT healthcare applications.The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm(DFA)with signcryption technique to encrypt the medical images captured by the IoT devices.Besides,blockchain(BC)can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.In addition,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.The usage of Nadam model helps to optimally regulate the hyperparameters of the SqueezeNet architecture.For examining the enhanced encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique on the other techniques with increased precision and accuracy of 0.9551 and 0.9813 respectively.展开更多
Smart city-aspiring urban areas should have a number of necessary elements in place to achieve the intended objective.Precise controlling and management of traffic conditions,increased safety and surveillance,and enha...Smart city-aspiring urban areas should have a number of necessary elements in place to achieve the intended objective.Precise controlling and management of traffic conditions,increased safety and surveillance,and enhanced incident avoidance and management should be top priorities in smart city management.At the same time,Vehicle License Plate Number Recognition(VLPNR)has become a hot research topic,owing to several real-time applications like automated toll fee processing,traffic law enforcement,private space access control,and road traffic surveillance.Automated VLPNR is a computer vision-based technique which is employed in the recognition of automobiles based on vehicle number plates.The current research paper presents an effective Deep Learning(DL)-based VLPNR called DLVLPNR model to identify and recognize the alphanumeric characters present in license plate.The proposed model involves two main stages namely,license plate detection and Tesseract-based character recognition.The detection of alphanumeric characters present in license plate takes place with the help of fast RCNN with Inception V2 model.Then,the characters in the detected number plate are extracted using Tesseract Optical Character Recognition(OCR)model.The performance of DL-VLPNR model was tested in this paper using two benchmark databases,and the experimental outcome established the superior performance of the model compared to other methods.展开更多
Big data streams started becoming ubiquitous in recent years,thanks to rapid generation of massive volumes of data by different applications.It is challenging to apply existing data mining tools and techniques directl...Big data streams started becoming ubiquitous in recent years,thanks to rapid generation of massive volumes of data by different applications.It is challenging to apply existing data mining tools and techniques directly in these big data streams.At the same time,streaming data from several applications results in two major problems such as class imbalance and concept drift.The current research paper presents a new Multi-Objective Metaheuristic Optimization-based Big Data Analytics with Concept Drift Detection(MOMBD-CDD)method on High-Dimensional Streaming Data.The presented MOMBD-CDD model has different operational stages such as pre-processing,CDD,and classification.MOMBD-CDD model overcomes class imbalance problem by Synthetic Minority Over-sampling Technique(SMOTE).In order to determine the oversampling rates and neighboring point values of SMOTE,Glowworm Swarm Optimization(GSO)algorithm is employed.Besides,Statistical Test of Equal Proportions(STEPD),a CDD technique is also utilized.Finally,Bidirectional Long Short-Term Memory(Bi-LSTM)model is applied for classification.In order to improve classification performance and to compute the optimum parameters for Bi-LSTM model,GSO-based hyperparameter tuning process is carried out.The performance of the presented model was evaluated using high dimensional benchmark streaming datasets namely intrusion detection(NSL KDDCup)dataset and ECUE spam dataset.An extensive experimental validation process confirmed the effective outcome of MOMBD-CDD model.The proposed model attained high accuracy of 97.45%and 94.23%on the applied KDDCup99 Dataset and ECUE Spam datasets respectively.展开更多
Machine learning (ML) becomes a familiar topic among decisionmakers in several domains, particularly healthcare. Effective design of MLmodels assists to detect and classify the occurrence of diseases using healthcared...Machine learning (ML) becomes a familiar topic among decisionmakers in several domains, particularly healthcare. Effective design of MLmodels assists to detect and classify the occurrence of diseases using healthcaredata. Besides, the parameter tuning of the ML models is also essentialto accomplish effective classification results. This article develops a novelred colobuses monkey optimization with kernel extreme learning machine(RCMO-KELM) technique for epileptic seizure detection and classification.The proposed RCMO-KELM technique initially extracts the chaotic, time,and frequency domain features in the actual EEG signals. In addition, the minmax normalization approach is employed for the pre-processing of the EEGsignals. Moreover, KELM model is used for the detection and classificationof epileptic seizures utilizing EEG signal. Furthermore, the RCMO techniquewas utilized for the optimal parameter tuning of the KELM technique insuch a way that the overall detection outcomes can be considerably enhanced.The experimental result analysis of the RCMO-KELM technique has beenexamined using benchmark dataset and the results are inspected under severalaspects. The comparative result analysis reported the better outcomes of theRCMO-KELM technique over the recent approaches with the accuy of 0.956.展开更多
Two traditional recommendation techniques, content-based and collaborative filtering (CF), have been widely used in a broad range of domain areas. Both meth- ods have their advantages and disadvantages, and some of ...Two traditional recommendation techniques, content-based and collaborative filtering (CF), have been widely used in a broad range of domain areas. Both meth- ods have their advantages and disadvantages, and some of the defects can be resolved by integrating both techniques in a hybrid model to improve the quality of the recommendation. In this article, we will present a problem-oriented approach to design a hybrid immunizing solution for job recommen- dation problem from applicant's perspective. The proposed approach aims to recommend the best chances of opening jobs to the applicant who searches for job. It combines the artificial immune system (AIS), which has a powerful explo- ration capability in polynomial time, with the collaborative filtering, which can exploit the neighbors' interests. We will discuss the design issues, as well as the hybridization process that should be applied to the problem. Finally, experimental studies are conducted and the results show the importance of our approach for solving the job recommendation problem.展开更多
文摘The Internet of Things(IoT)is a smart networking infrastructure of physical devices,i.e.,things,that are embedded with sensors,actuators,software,and other technologies,to connect and share data with the respective server module.Although IoTs are cornerstones in different application domains,the device’s authenticity,i.e.,of server(s)and ordinary devices,is the most crucial issue and must be resolved on a priority basis.Therefore,various field-proven methodologies were presented to streamline the verification process of the communicating devices;however,location-aware authentication has not been reported as per our knowledge,which is a crucial metric,especially in scenarios where devices are mobile.This paper presents a lightweight and location-aware device-to-server authentication technique where the device’s membership with the nearest server is subjected to its location information along with other measures.Initially,Media Access Control(MAC)address and Advance Encryption Scheme(AES)along with a secret shared key,i.e.,λ_(i) of 128 bits,have been utilized by Trusted Authority(TA)to generate MaskIDs,which are used instead of the original ID,for every device,i.e.,server and member,and are shared in the offline phase.Secondly,TA shares a list of authentic devices,i.e.,server S_(j) and members C_(i),with every device in the IoT for the onward verification process,which is required to be executed before the initialization of the actual communication process.Additionally,every device should be located such that it lies within the coverage area of a server,and this location information is used in the authentication process.A thorough analytical analysis was carried out to check the susceptibility of the proposed and existing authentication approaches against well-known intruder attacks,i.e.,man-in-the-middle,masquerading,device,and server impersonations,etc.,especially in the IoT domain.Moreover,proposed authentication and existing state-of-the-art approaches have been simulated in the real environment of IoT to verify their performance,particularly in terms of various evaluation metrics,i.e.,processing,communication,and storage overheads.These results have verified the superiority of the proposed scheme against existing state-of-the-art approaches,preferably in terms of communication,storage,and processing costs.
基金the Deanship of Scientific Research at King Khalid University for funding this work underGrant Number(RGP 2/209/42)PrincessNourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R136)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR27).
文摘Proper waste management models using recent technologies like computer vision,machine learning(ML),and deep learning(DL)are needed to effectively handle the massive quantity of increasing waste.Therefore,waste classification becomes a crucial topic which helps to categorize waste into hazardous or non-hazardous ones and thereby assist in the decision making of the waste management process.This study concentrates on the design of hazardous waste detection and classification using ensemble learning(HWDC-EL)technique to reduce toxicity and improve human health.The goal of the HWDC-EL technique is to detect the multiple classes of wastes,particularly hazardous and non-hazardous wastes.The HWDC-EL technique involves the ensemble of three feature extractors using Model Averaging technique namely discrete local binary patterns(DLBP),EfficientNet,and DenseNet121.In addition,the flower pollination algorithm(FPA)based hyperparameter optimizers are used to optimally adjust the parameters involved in the EfficientNet and DenseNet121 models.Moreover,a weighted voting-based ensemble classifier is derived using three machine learning algorithms namely support vector machine(SVM),extreme learning machine(ELM),and gradient boosting tree(GBT).The performance of the HWDC-EL technique is tested using a benchmark Garbage dataset and it obtains a maximum accuracy of 98.85%.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R136)PrincessNourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4210118DSR28).
文摘Object detection(OD)in remote sensing images(RSI)acts as a vital part in numerous civilian and military application areas,like urban planning,geographic information system(GIS),and search and rescue functions.Vehicle recognition from RSIs remained a challenging process because of the difficulty of background data and the redundancy of recognition regions.The latest advancements in deep learning(DL)approaches permit the design of effectual OD approaches.This study develops an Artificial Ecosystem Optimizer with Deep Convolutional Neural Network for Vehicle Detection(AEODCNN-VD)model on Remote Sensing Images.The proposed AEODCNN-VD model focuses on the identification of vehicles accurately and rapidly.To detect vehicles,the presented AEODCNN-VD model employs single shot detector(SSD)with Inception network as a baseline model.In addition,Multiway Feature Pyramid Network(MFPN)is used for handling objects of varying sizes in RSIs.The features from the Inception model are passed into theMFPNformultiway andmultiscale feature fusion.Finally,the fused features are passed into bounding box and class prediction networks.For enhancing the detection efficiency of the AEODCNN-VD approach,AEO based hyperparameter optimizer is used,which is stimulated by the energy transfer strategies such as production,consumption,and decomposition in an ecosystem.The performance validation of the presentedmethod on benchmark datasets showed promising performance over recent DL models.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP 1/322/42)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R136)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.The authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:(22UQU4340237DSR09).
文摘Internet of things(IoT)and cloud computing(CC)becomes widespread in different application domains such as business,e-commerce,healthcare,etc.The recent developments of IoT technology have led to an increase in large amounts of data from various sources.In IoT enabled cloud environment,load scheduling remains a challenging process which is applied for ensuring network stability with maximum resource utilization.The load scheduling problem was regarded as an optimization problem that is solved by metaheuristics.In this view,this study develops a new Circle Chaotic Chameleon Swarm Optimization based Load Scheduling(C3SOA-LS)technique for IoT enabled cloud environment.The proposed C3SOA-LS technique intends to effectually schedule the tasks and balance the load uniformly in such a way that maximum resource utilization can be accomplished.Besides,the presented C3SOA-LS model involves the design of circle chaotic mapping(CCM)with the traditional chameleon swarm optimization(CSO)algorithm for improving the exploration process,shows the novelty of the work.The proposed C3SOA-LS model computes an objective with the minimization of energy consumption and makespan.The experimental outcome implied that the C3SOA-LS model has showcased improved performance and uniformly balances the load over other approaches.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP.1/283/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R136),Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Latest developments in computing and communication technologies are enabled the design of connected healthcare system which are mainly based on IoT and Edge technologies.Blockchain,data encryption,and deep learning(DL)models can be utilized to design efficient security solutions for IoT healthcare applications.In this aspect,this article introduces a Blockchain with privacy preserving image encryption and optimal deep learning(BPPIEODL)technique for IoT healthcare applications.The proposed BPPIE-ODL technique intends to securely transmit the encrypted medical images captured by IoT devices and performs classification process at the cloud server.The proposed BPPIE-ODL technique encompasses the design of dragonfly algorithm(DFA)with signcryption technique to encrypt the medical images captured by the IoT devices.Besides,blockchain(BC)can be utilized as a distributed data saving approach for generating a ledger,which permits access to the users and prevents third party’s access to encrypted data.In addition,the classification process includes SqueezeNet based feature extraction,softmax classifier(SMC),and Nadam based hyperparameter optimizer.The usage of Nadam model helps to optimally regulate the hyperparameters of the SqueezeNet architecture.For examining the enhanced encryption as well as classification performance of the BPPIE-ODL technique,a comprehensive experimental analysis is carried out.The simulation outcomes demonstrate the significant performance of the BPPIE-ODL technique on the other techniques with increased precision and accuracy of 0.9551 and 0.9813 respectively.
基金This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-track Research Funding Program。
文摘Smart city-aspiring urban areas should have a number of necessary elements in place to achieve the intended objective.Precise controlling and management of traffic conditions,increased safety and surveillance,and enhanced incident avoidance and management should be top priorities in smart city management.At the same time,Vehicle License Plate Number Recognition(VLPNR)has become a hot research topic,owing to several real-time applications like automated toll fee processing,traffic law enforcement,private space access control,and road traffic surveillance.Automated VLPNR is a computer vision-based technique which is employed in the recognition of automobiles based on vehicle number plates.The current research paper presents an effective Deep Learning(DL)-based VLPNR called DLVLPNR model to identify and recognize the alphanumeric characters present in license plate.The proposed model involves two main stages namely,license plate detection and Tesseract-based character recognition.The detection of alphanumeric characters present in license plate takes place with the help of fast RCNN with Inception V2 model.Then,the characters in the detected number plate are extracted using Tesseract Optical Character Recognition(OCR)model.The performance of DL-VLPNR model was tested in this paper using two benchmark databases,and the experimental outcome established the superior performance of the model compared to other methods.
文摘Big data streams started becoming ubiquitous in recent years,thanks to rapid generation of massive volumes of data by different applications.It is challenging to apply existing data mining tools and techniques directly in these big data streams.At the same time,streaming data from several applications results in two major problems such as class imbalance and concept drift.The current research paper presents a new Multi-Objective Metaheuristic Optimization-based Big Data Analytics with Concept Drift Detection(MOMBD-CDD)method on High-Dimensional Streaming Data.The presented MOMBD-CDD model has different operational stages such as pre-processing,CDD,and classification.MOMBD-CDD model overcomes class imbalance problem by Synthetic Minority Over-sampling Technique(SMOTE).In order to determine the oversampling rates and neighboring point values of SMOTE,Glowworm Swarm Optimization(GSO)algorithm is employed.Besides,Statistical Test of Equal Proportions(STEPD),a CDD technique is also utilized.Finally,Bidirectional Long Short-Term Memory(Bi-LSTM)model is applied for classification.In order to improve classification performance and to compute the optimum parameters for Bi-LSTM model,GSO-based hyperparameter tuning process is carried out.The performance of the presented model was evaluated using high dimensional benchmark streaming datasets namely intrusion detection(NSL KDDCup)dataset and ECUE spam dataset.An extensive experimental validation process confirmed the effective outcome of MOMBD-CDD model.The proposed model attained high accuracy of 97.45%and 94.23%on the applied KDDCup99 Dataset and ECUE Spam datasets respectively.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under Grant Number(RGP2/42/43)Princess Nourah bint Abdulrahman University Researchers Supporting Project Number(PNURSP2022R136)Princess Nourah bint Abdulrahman University,Riyadh,Saudi Arabia.
文摘Machine learning (ML) becomes a familiar topic among decisionmakers in several domains, particularly healthcare. Effective design of MLmodels assists to detect and classify the occurrence of diseases using healthcaredata. Besides, the parameter tuning of the ML models is also essentialto accomplish effective classification results. This article develops a novelred colobuses monkey optimization with kernel extreme learning machine(RCMO-KELM) technique for epileptic seizure detection and classification.The proposed RCMO-KELM technique initially extracts the chaotic, time,and frequency domain features in the actual EEG signals. In addition, the minmax normalization approach is employed for the pre-processing of the EEGsignals. Moreover, KELM model is used for the detection and classificationof epileptic seizures utilizing EEG signal. Furthermore, the RCMO techniquewas utilized for the optimal parameter tuning of the KELM technique insuch a way that the overall detection outcomes can be considerably enhanced.The experimental result analysis of the RCMO-KELM technique has beenexamined using benchmark dataset and the results are inspected under severalaspects. The comparative result analysis reported the better outcomes of theRCMO-KELM technique over the recent approaches with the accuy of 0.956.
文摘Two traditional recommendation techniques, content-based and collaborative filtering (CF), have been widely used in a broad range of domain areas. Both meth- ods have their advantages and disadvantages, and some of the defects can be resolved by integrating both techniques in a hybrid model to improve the quality of the recommendation. In this article, we will present a problem-oriented approach to design a hybrid immunizing solution for job recommen- dation problem from applicant's perspective. The proposed approach aims to recommend the best chances of opening jobs to the applicant who searches for job. It combines the artificial immune system (AIS), which has a powerful explo- ration capability in polynomial time, with the collaborative filtering, which can exploit the neighbors' interests. We will discuss the design issues, as well as the hybridization process that should be applied to the problem. Finally, experimental studies are conducted and the results show the importance of our approach for solving the job recommendation problem.