0% Complete
English
صفحه اصلی
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A No-Code Platform for Developing Customizable Recommender Systems for Restaurants
نویسندگان :
Moein-Aldin AliHosseini
1
MohammadReza Sharbaf
2
1- دانشگاه اصفهان
2- دانشگاه اصفهان
کلمات کلیدی :
Model-Driven Development،No-Code Platforms،Electronic Commerce،Recommender Systems
چکیده :
Abstract—With the rapid growth of e-commerce and the increasing importance of recommender systems in enhancing customer experience, there is a pressing need for customized systems that can be quickly developed in collaboration with domain experts. In the restaurant industry, this need is particularly acute, as consumers seek personalized dining experiences that cater to their unique tastes and preferences. Effective recommender systems can assist restaurants not only in suggesting menu items based on individual customer profiles but also in adapting to local trends, dietary restrictions, and seasonal ingredients. In this paper, we introduce CURSOR, a novel nocode platform designed to automatically develop customizable recommender systems for restaurants. CURSOR enables businesses to design and deploy tailored systems without the need to hire specialized development teams. Our evaluation results demonstrate that CURSOR reduces development time, lowers costs, and enhances system performance for restaurants. The output from CURSOR enhances customer experience by providing personalized suggestions, which in turn increases satisfaction and encourages purchases.
لیست مقالات
لیست مقالات بایگانی شده
BMPA- DSL: Binary Marine Predators Algorithm to Identify Driver's Different Levels of Stress
Mahtab Vaezi - Mehdi Nasri - Farhad Azimifar - Mahdi Mosleh
A qualitative spoofing detection system based on LSTMs for IoMT
Iman Jafarian - Amirmasoud Sepehrian - Siavash Khorsandi
Enhancing Supervised Learning in Speech Emotion Recognition through Unsupervised Representations
Niloufar Faridani - Amirali Soltani Tehrani - Ramin Toosi
Establishing security using cryptography and biometric authentication to counter cyber-attacks
Mohammed ADIL AKABR - Mehdi Hamidkhani - Mostafa Sadeghi
طراحی و پیاده سازی بستر اجرای بازی جنگ سایبری
مریم نصراصفهانی - بهروز ترک لادانی - بهروز شاهقلی قهفرخی - حسین قجاوند بلتیجه - نوید شیرمحمدی - مهدی شمس - محمدامین آقاکبیری
Evaluating LLMs in Persian News Summarization
Arya VarastehNezhad - Reza Tavasoli - Mostafa Masumi - Seyed Soroush Majd - Mehrnoush Shamsfard
پیاده سازی موازی یک طرح (t,n)-تسهیم چند تصویر با استفاده از GPU
سعیده کبیری راد
Context Awareness Gate for Retrieval Augmented Generation
Mohammad Hassan Heydari - Arshia Hemmat - Erfan Naman - Afsaneh Fatemi
استخراج ویژگی مجموعه دادههای پزشکی دارای ابعاد بالا با استفاده از برنامه نویسی ژنتیک چند منظوره
سحر فقیهی راد - دکتر سیده نفیسه آل محمد سحر فقیهی راد - سیده نفیسه آل محمد -
To Kill a Mockingbird: Cryptanalysis of an Authenticated Key Exchange Scheme for Drones
Neda Toghraee - Hamid Mala
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.0.3