{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T15:48:56Z","timestamp":1778082536534,"version":"3.51.4"},"reference-count":47,"publisher":"World Scientific Pub Co Pte Ltd","issue":"04","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Info. Know. Mgmt."],"published-print":{"date-parts":[[2022,12]]},"abstract":"<jats:p> Two famous matrix factorization techniques, the Singular Value Decomposition (SVD) and the Nonnegative Matrix Factorization (NMF), are popularly used by recommender system applications. Recommender system data matrices have many missing entries, and to make them suitable for factorization, the missing entries need to be filled. For matrix completion, we use mean, median and mode as three different cases of imputation. The natural clusters produced after factorization are used to formulate simple out-of-sample extension algorithms and methods to generate recommendation for a new user. Two cluster evaluation measures, Normalized Mutual Information (NMI) and Purity are used to evaluate the quality of clusters. <\/jats:p>","DOI":"10.1142\/s0219649222500514","type":"journal-article","created":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T09:25:32Z","timestamp":1655889932000},"source":"Crossref","is-referenced-by-count":11,"title":["Knowledge Discovery in a Recommender System: The Matrix Factorization Approach"],"prefix":"10.1142","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2376-5554","authenticated-orcid":false,"given":"Murchhana","family":"Tripathy","sequence":"first","affiliation":[{"name":"Information Systems & Technology, T A Pai Management\u00a0Institute, Manipal Academy of Higher Education, Manipal, India"},{"name":"Department of Mathematics, ITER, Siksha \u2018O\u2019 Anusandhan Deemed to be University, Odisha, India"},{"name":"Vignan\u2019s Foundation for Science, Technology & Research (Deemed to be University), Guntur, AP, India"}]},{"given":"Santilata","family":"Champati","sequence":"additional","affiliation":[{"name":"Information Systems & Technology, T A Pai Management\u00a0Institute, Manipal Academy of Higher Education, Manipal, India"},{"name":"Department of Mathematics, ITER, Siksha \u2018O\u2019 Anusandhan Deemed to be University, Odisha, India"},{"name":"Vignan\u2019s Foundation for Science, Technology & Research (Deemed to be University), Guntur, AP, India"}]},{"given":"Hemanta Kumar","family":"Bhuyan","sequence":"additional","affiliation":[{"name":"Information Systems & Technology, T A Pai Management\u00a0Institute, Manipal Academy of Higher Education, Manipal, India"},{"name":"Department of Mathematics, ITER, Siksha \u2018O\u2019 Anusandhan Deemed to be University, Odisha, India"},{"name":"Vignan\u2019s Foundation for Science, Technology & Research (Deemed to be University), Guntur, AP, India"}]}],"member":"219","published-online":{"date-parts":[[2022,6,22]]},"reference":[{"key":"S0219649222500514BIB001","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29659-3"},{"issue":"5","key":"S0219649222500514BIB002","first-page":"2721","volume":"9","author":"Aghdam MH","year":"2015","journal-title":"Applied Mathematics & Information Sciences"},{"key":"S0219649222500514BIB003","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhm.2019.01.003"},{"key":"S0219649222500514BIB004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35231-8_15"},{"key":"S0219649222500514BIB005","volume-title":"Proceedings of the 2nd Workshop on Online Misinformation-and Harm-Aware Recommender Systems (OHARS 2021)","author":"Badami M","year":"2021"},{"key":"S0219649222500514BIB006","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v28i1.8715"},{"key":"S0219649222500514BIB007","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-842X.2001.tb00294.x"},{"key":"S0219649222500514BIB008","first-page":"2439","volume-title":"2016 IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Benzi K","year":"2016"},{"key":"S0219649222500514BIB009","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2788138"},{"key":"S0219649222500514BIB010","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.4"},{"key":"S0219649222500514BIB011","doi-asserted-by":"publisher","DOI":"10.1145\/3411564.3411572"},{"key":"S0219649222500514BIB012","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2014.08.004"},{"key":"S0219649222500514BIB013","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2008.12.004"},{"key":"S0219649222500514BIB014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31454-4_6"},{"issue":"8","key":"S0219649222500514BIB015","first-page":"1377","volume":"10","author":"Ebadi A","year":"2016","journal-title":"International Journal of Computer and Information Engineering"},{"key":"S0219649222500514BIB016","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.58.110405.085530"},{"key":"S0219649222500514BIB017","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972801.18"},{"key":"S0219649222500514BIB018","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2891544"},{"key":"S0219649222500514BIB019","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"S0219649222500514BIB020","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2015.12.018"},{"key":"S0219649222500514BIB021","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598340483"},{"key":"S0219649222500514BIB022","doi-asserted-by":"publisher","DOI":"10.4097\/kjae.2013.64.5.402"},{"key":"S0219649222500514BIB023","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.263"},{"key":"S0219649222500514BIB024","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS0902217K"},{"key":"S0219649222500514BIB025","first-page":"31","volume-title":"Proceedings of KDD Cup and Workshop","author":"Kurucz M.","year":"2007"},{"key":"S0219649222500514BIB026","doi-asserted-by":"publisher","DOI":"10.1038\/44565"},{"key":"S0219649222500514BIB027","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btx613"},{"key":"S0219649222500514BIB028","doi-asserted-by":"publisher","DOI":"10.1109\/ICISE.2009.107"},{"key":"S0219649222500514BIB029","doi-asserted-by":"publisher","DOI":"10.1201\/9781315373515-7"},{"key":"S0219649222500514BIB030","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2014.2308433"},{"key":"S0219649222500514BIB031","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2009.4814447"},{"key":"S0219649222500514BIB033","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.09.058"},{"key":"S0219649222500514BIB034","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v24i1.7578"},{"key":"S0219649222500514BIB035","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3"},{"key":"S0219649222500514BIB037","first-page":"btab826","volume-title":"Bioinformatics","author":"Sadeghi S","year":"2021"},{"key":"S0219649222500514BIB038","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352887"},{"key":"S0219649222500514BIB039","first-page":"27","volume-title":"Fifth International Conference on Computer and Information Science","author":"Sarwar B","year":"2002"},{"key":"S0219649222500514BIB041","volume-title":"Linear Algebra and its Applications, Cengage Learning","author":"Strang G","year":"2006"},{"key":"S0219649222500514BIB042","doi-asserted-by":"publisher","DOI":"10.3233\/IDA-170878"},{"key":"S0219649222500514BIB043","doi-asserted-by":"publisher","DOI":"10.1109\/BIBM47256.2019.8983402"},{"key":"S0219649222500514BIB044","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.036"},{"key":"S0219649222500514BIB045","volume-title":"Proceeding of the 9th Hellenic European Research on Computer Mathematics and its Applications","author":"Vozalis M","year":"2009"},{"issue":"5","key":"S0219649222500514BIB046","first-page":"1708","volume":"15","author":"Weerasinghe AM","year":"2021","journal-title":"KSII Transactions on Internet & Information Systems"},{"key":"S0219649222500514BIB047","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2018.09.011"},{"key":"S0219649222500514BIB048","first-page":"549","volume-title":"Proceedings of the 2006 SIAM International Conference on Data Mining","author":"Zhang S","year":"2006"},{"key":"S0219649222500514BIB049","first-page":"1","author":"Zhang X","year":"2021","journal-title":"Cognitive Computation"},{"key":"S0219649222500514BIB050","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.11.016"}],"container-title":["Journal of Information &amp; Knowledge Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.worldscientific.com\/doi\/pdf\/10.1142\/S0219649222500514","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T08:40:29Z","timestamp":1665996029000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.worldscientific.com\/doi\/10.1142\/S0219649222500514"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":47,"journal-issue":{"issue":"04","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["10.1142\/S0219649222500514"],"URL":"https:\/\/doi.org\/10.1142\/s0219649222500514","relation":{},"ISSN":["0219-6492","1793-6926"],"issn-type":[{"value":"0219-6492","type":"print"},{"value":"1793-6926","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,22]]},"article-number":"2250051"}}