Be - Pars

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 37

A PRELIMENERY REPORT ON

PARS: PREFERENCE AWARE RECOMMENDATION


SYSTEM

SUBMITTED TO THE SAVITRIBAI PHULE PUNEUNIVERSITY ,


PUNE IN THE PARTIAL FULFILLMENT OF THE
REQUIREMENTS FOR THE AWARD OF THE DEGREE

BACHELOR OF ENGINEERING (COMPUTER ENGINEERING)

SUBMITTED BY
KRUSHNA KOTGIRE (15U402)
VIJAY GALANDE (15U319)
AMOL KEDAR (15U529)
KARTIK FATING (15U323)

DEPARTMENT OF COMPUTER ENGINEERING

STESS SMT. KASHIBAINAVALECOLLEGE OF ENGINEERING

VADGAON BK, OFF SINHGAD ROAD, PUNE 411041

SAVITRIBAI PHULE PUNE UNIVERSITY

2017 -2018
CERTIFICATE
This is to certify that the seminar report entitled
PARS: PREFERENCE AWARE RECOMMENDATION SYSTEM

Submitted by
KRUSHNA KOTGIRE (15U402)
VIJAY GALANDE (15U319)
AMOL KEDAR (15U529)
KARTIK FATING (15U323)

Is a bonafide work carried out by him under the supervision of Prof. M.


R. Patil and it is approved for the partial fulfillment of the requirement of
University of Pune, for the award of the degree of Bachelor of Engi-
neering (Computer Engineering). This project work has not been earlier
submitted to any other Institute or University for the award of any degree.

Prof. M. R. Patil Dr. P. N. Mahalle

Guide Head
Department of Computer Department of Computer
Engineering Engineering

Dr. A. V. Deshpande
Principal
Smt.KashibaiNavaleCollege of Engineering Pune 41

Place:
Date

SKNCOE, Department of Computer Engineering 2017-18


I
ACKNOWLEDGEMENT

Online Preference Aware Recommender System will be a mobile and


website based application which will be based on data mining, text
min-ing and recommendation system.

Its main aim is to provide accurate recommendations to users based on


spatial and non- spatial properties of the user and item requested. Item
maybe a certain food item or a certain restaurant providing a type of item
.Users may be able to review both restaurants and items. The users re-
views would be examined to create a profile of the user. The product will
consider the users history (from the previous likings and reviews) and/or
location before providing a recommendation. The application will take the
users search request and provide the relevant recommendation.

KRUSHNA KOTGIRE (15U402)


VIJAY GALANDE (15U319)
AMOL KEDAR (15U529)
KARTIK FATING (15U323)

SKNCOE, Department of Computer Engineering 2017-18


II
ABSTRACT

The main aim of designing and developing this Online banking System
J2EE primarily based banking project is to provide secure and
efficient net banking facilities to the banking customers over the
internet. Java Server Pages, J2EE, Java, Enterprise Beans, Mysql
database used to develop this bank application where all banking
customers can login through the secured web page by their account
login id and password. Users will have all options and features in that
application like deposit money to bank account , withdraw money from
account, money transfer to others account without going into the bank
customer can perform all the functionalities of the bank over the web
application.
Contents
1 PROBLEM DEFINITION 1

2 Literature Survey 3

3 Software Requirements Specification 5


3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . 5
3.1.1 Project Scope . . . . . . . . . . . . . . . . . . . 5
3.1.2 Assumptions and Dependencies . . . . . . . . . 6
3.2 Functional Requirements . . . . . . . . . . . . . . . . . 7
3.3 External Interface Requirements . . . . . . . . . . . . . 8
3.3.1 User Interfaces . . . . . . . . . . . . . . . . . . 8
3.3.2 Hardware Interfaces . . . . . . . . . . . . . . . 8
3.3.3 Software Interfaces . . . . . . . . . . . . . . . . 8
3.4 Nonfunctional Requirements . . . . . . . . . . . . . . . 9
3.4.1 Performance Requirements . . . . . . . . . . . . 9
3.4.2 Safety and Security Requirements . . . . . . . . 9
3.4.3 Software Quality Attributes . . . . . . . . . . . 9
3.5 Analysis Models . . . . . . . . . . . . . . . . . . . . . 11
3.5.1 Waterfall Model . . . . . . . . . . . . . . . . . 11
3.5.2 Deployment Model . . . . . . . . . . . . . . . . 12
3.5.3 Data Flow Diagrams . . . . . . . . . . . . . . . 12
3.6 Entity Relationship Diagrams . . . . . . . . . . . . . . . 15

4 System Implementation Plan 16

5 System Design 17
5.1 System Architecture . . . . . . . . . . . . . . . . . . . . 17
5.2 Component Digram . . . . . . . . . . . . . . . . . . . . 19
5.3 UML Diagrams . . . . . . . . . . . . . . . . . . . . . . 20
5.4 State Chart Digram . . . . . . . . . . . . . . . . . . . . 20
5.5 Activity Digram . . . . . . . . . . . . . . . . . . . . . . 21

6 Other Specification 22
6.1 Advantages . . . . . . . . . . . . . . . . . . . . . . . . 22
6.2 Disadvantages . . . . . . . . . . . . . . . . . . . . . . . 22

7 Future Enhancement 23

SKNCOE, Department of Computer Engineering 2017-18


IV
8 Conclusion 24

9 Annex A: Assignments 25

SKNCOE, Department of Computer Engineering 2017-18


V
List of Figures
1 Waterfall Model . . . . . . . . . . . . . . . . . . . . . . 11
2 Deployment Model . . . . . . . . . . . . . . . . . . . . 12
3 DFD Level 0 . . . . . . . . . . . . . . . . . . . . . . . 12
4 DFD Level 1 . . . . . . . . . . . . . . . . . . . . . . . 13
5 DFD Level 2 . . . . . . . . . . . . . . . . . . . . . . . 14
6 Entuty Relationship . . . . . . . . . . . . . . . . . . . . 15
7 System Implementation Plan . . . . . . . . . . . . . . . 16
8 System Architecture . . . . . . . . . . . . . . . . . . . . 17
9 Component Digram . . . . . . . . . . . . . . . . . . . . 19
10 UML Digrams . . . . . . . . . . . . . . . . . . . . . . . 20
11 State Chart Digram . . . . . . . . . . . . . . . . . . . . 20
12 Activity Digram . . . . . . . . . . . . . . . . . . . . . . 21
13 IDEA Matrix . . . . . . . . . . . . . . . . . . . . . . . 26

SKNCOE, Department of Computer Engineering 2017-18


VI
1 PROBLEM DEFINITION

online banking helps the customer of a bank to access his


account from anywhere in the world. It helps the bank to handles
the customer requests more efficiently and effectively and saves
lot of time for the customer as he can get the information without
going to the bank. Online Banking can keep the information of
Account type , account opening form , Deposit fund , Withdrawal
and Searching the transaction ,Transaction reports.This project is
developed using spring mvc and MYSQL use for database.

.
Software Requirements Speci cation
3.1 Introduction
Online Bank Management System is very simple and entry level project developed in java
using spring technology. I have used database to store all the details of customer account in a
table. This system is a simple project and useful for those who want to learn jsp with spring.
I have implemented most of the feature of online banking in it. User can login,do withdrawal,
Request a Deposit amount, Transfer amount from one account to another account, check
his/her current balance, and view reports of all the transaction.

3.1.1 Project Scope

The scope of this project is limited to the activities of the operations unit of the banking system
which includes opening of Account, Deposit of funds, Online funds transfer, Cheque balance and
daily transaction statement.
previous likings and reviews) and/or location before providing a recom-
mendation. The application will take the users search request and
provide the relevant recommendation

3.1.2 Assumptions and Dependencies

The user is expected to have a PC with Windows XP/Vista/7 machine


with minimum 4GB RAM and 500 GB hard disk.

SKNCOE, Department of Computer Engineering 2017-18


6
3.2 Functional Requirements

System should allow user to login.


System should show welcome page only if user is authenticated.
System should ask user to upload data into system to train the net-
work System should show error message properly.
System should not ask username/password on every page.
System should not allow user to select prediction date if no input
data provided for training.
System should allow user to select data of prediction.
System should allow user to select result type like graphical or text.
System should send SMS message if demand is predicted more than
threshold.

SKNCOE, Department of Computer Engineering 2017-18


7
3.3 External Interface Requirements
3.3.1 User Interfaces

1. Welcome page
2. Registration form
3. Login Page
4. Search Restaurant
5. Output Recommendation page

3.3.2 Hardware Interfaces

Processor Intel Core2Duo, Pentium III/i3


Speed 2.4 GHz
RAM - 4 GB (min), Hard Disk - 500 GB

3.3.3 Software Interfaces

Operating System: Windows 7/8/10


Front End: Java 7 or more
Back End: MySql 6
JDK 1.7 or more
version Eclipse Marse

SKNCOE, Department of Computer Engineering 2017-18


8
3.4 Nonfunctional Requirements
3.4.1 Performance Requirements

For good performance most of the RAM should be used for our appli-
cation. JVM should be tuned on mobile to provide extra address space
to application. Application should use multithreading to complete its
task in short time

3.4.2 Safety and Security Requirements

Database data should be in encrypted format.

3.4.3 Software Quality Attributes

Quality attributes are the overall factors that affect run-time behavior,
system design, and user experience. They represent areas of concern
that have the potential for application wide impact across layers and
tiers. Some of these attributes are related to the overall system design,
while others are specific to run time, design time, or user centric issues.
The ex-tent to which the application possesses a desired combination of
quality attributes such as usability, performance, reliability, and
security indicates the success of the design and the overall quality of
the software applica-tion.

1. Reusability:
Reusability defines the capability for components and subsystems
to be suitable for use in other applications and in other scenarios.
Reusability minimizes the duplication of components and also the
implementation time.
2. Availability:
Availability defines the proportion of time that the system is func-
tional and working. It can be measured as a percentage of the total
system downtime over a predefined period. Availability will be af-
fected by system errors, infrastructure problems, malicious attacks,
and system load.

SKNCOE, Department of Computer Engineering 2017-18


9
3. Performance
Performance is an indication of the responsiveness of a system to
execute any action within a given time interval. It can be measured
in terms of latency or throughput. Latency is the time taken to
respond to any event. Throughput is the number of events that take
place within a given amount of time.
4. Reliability
Reliability is the ability of a system to remain operational over time.
Reliability is measured as the probability that a system will not fail
to perform its intended functions over a specified time interval.
5. Scalability
Scalability is ability of a system to either handle increases in load
without impact on the performance of the system, or the ability to
be readily enlarged.
6. Testability
Testability is a measure of how easy it is to create test criteria for
the system and its components, and to execute these tests in order
to determine if the criteria are met. Good testability makes it more
likely that faults in a system can be isolated in a timely and
effective manner.
7. Usability
Usability defines how well the application meets the requirements
of the user and consumer by being intuitive, easy to localize and
globalize, providing good access for disabled users, and resulting
in a good overall user experience.

SKNCOE, Department of Computer Engineering 2017-18


10
3.5 Analysis Models
3.5.1 Waterfall Model

Figure 1: Waterfall Model

SKNCOE, Department of Computer Engineering 2017-18


11
3.5.2 Deployment Model

Figure 2: Deployment Model

3.5.3 Data Flow Diagrams

DFD Level 0

Figure 3: DFD Level 0

SKNCOE, Department of Computer Engineering 2017-18


12
DFD Level 1

Figure 4: DFD Level 1

SKNCOE, Department of Computer Engineering 2017-18


13
DFD Level 2

Figure 5: DFD Level 2

SKNCOE, Department of Computer Engineering 2017-18


14
3.6 Entity Relationship Diagrams

Figure 6: Entuty Relationship

Admin – Analysis – Feedback


Admin – Views – items
Admin – Views – users
Feedback – Gives to – Hotel
Hotel – Has – Menu
Food item – Best – Hotel

SKNCOE, Department of Computer Engineering 2017-18


15
4 System Implementation Plan

Figure 7: System Implementation Plan

SKNCOE, Department of Computer Engineering 2017-18


16
5 System Design
5.1 System Architecture

Figure 8: System Architecture

1. Users:

The same application may be used by several users. In addition,


users that interact with the host application may be either registered or
anony-mous and may interact frequently or occasionally. This impacts
the archi-tecture of the recommender (requires different identification
means, e.g. comments, preference).

2. Application infrastructure:

The infrastructure the host application runs on puts strong constraints


on the types of recommendation algorithms that can be used and on
their specific implementation. In particular, the scalability of the
solution has to be carefully studied. Two main cases can be identified,
whether the application is accessed through a browser or if an
application runs locally on the user device.

SKNCOE, Department of Computer Engineering 2017-18


17
a. Recommender System: Recommendation percentage is calculated
based on users comments by Collaborative filtering algorithm. It could
be on the basis of service, cost, test or ambiance.

b. Algorithm (Collaborative filtering Algorithm):

Collaborative filtering, also referred to as social filtering, filters infor-


mation by using the recommendations of other people. It is based on
the idea that people who agreed in their evaluation of certain items in
the past are likely to agree again in the future. A person who wants to
visit restaurant for example, might ask for recommendations from
friends. The recommendations of some friends who have similar
interests are trusted more than recommendations from others. This
information is used in the decision on which restaurant to visit.
(T = Taste, S = Service, A = Ambiance and C = Cost)

Mopnar Algorithm:
MOPNAR is an extension of multi-objective evolutionary algorithm
(MOEA). It helps in mining with a low computational cost a reduced set of
positive and negative QARs that are easy to understand and have good
tradeoff be-tween the number of rules, support, and coverage of the dataset.
It reads the data from the input files and parse all the parameters from the
param-eters array

Porter Stemming Algorithm:


The Porter stemming algorithm (or Porter stemmer) is a process for re-
moving the commoner morphological and inflexional endings from
words in English. Its main use is as part of a term normalisation process
that is usually done when setting up Information Retrieval systems.

c. User Profile:

User profile contains user personal details and navigation to search for
Restaurant page, recommendation page, and profile page etc.

SKNCOE, Department of Computer Engineering 2017-18


18
3. Data:

The most important part of system. All the user data that needs to gen-
erate recommendation results is stored here. The amount of data is an
important factor to consider: too few data may lead to inaccurate recom-
mendations, whereas too much data may lead to useless processing. In
addition, data description may vary in terms of depth (degree of precision)
and breadth (variety of description). The risk with superficial description
is to propose items to users that do not correspond exactly to what they
expect. This leads to processing cost and may need to filter data.

5.2 Component Digram

Figure 9: Component Digram

SKNCOE, Department of Computer Engineering 2017-18


19
5.3 UML Diagrams

Figure 10: UML Digrams

5.4 State Chart Digram

Figure 11: State Chart Digram

SKNCOE, Department of Computer Engineering 2017-18


20
5.5 Activity Digram

Figure 12: Activity Digram

SKNCOE, Department of Computer Engineering 2017-18


21
6 Other Speci cation
6.1 Advantages
This system allows to search for a specific food item directly.
Allows users to write reviews about that place and food.

Each and every review is processed for both user and restaurants.
Ratings depend on the user/hotel review count which is distributed
amongst five parameters.
Along with user details it has an extra-ordinary feature of graphically
representing the users liking based on the reviews written by the user
Graphical bar chart display representation of restaurant parameters
of Taste, Service, Ambience, Cost which is calculated on reviews.
This recommender system is recommendate nearby restaurant.
This was helpful for the user who is new in that city like tourist.
It allows users to find restaurant by area or find where a specific food
item is best served which is rated by other fellow users, and also to find
a restaurant by category of food even without logging-in ie..

It allows users to add a food item which they liked at restaurant


while writing their review.

6.2 Disadvantages
User can give false reviews so rating of that restaurant can decreases.
Only that user access the website who has internet access in his sys-
tem.
User is well known about English language.

GPS system is present in user sysem.

SKNCOE, Department of Computer Engineering 2017-18


22
7 Future Enhancement
Letting users help other users with their reviews and liking for food,
will automatically increase the web to help in finding new and
interesting food items. The ability to find specific food items will
certainly help users to find a place to eat, where it is best served and
their craving would be quenched.

Alongside as the network of new restaurants will be added, more and


more new interesting places would be discovered and added to list, and
the ability of our system to give personalized recommendation, would
give other users the way to discover such new places and have a
wonder-ful experience.

Considering the technical aspects, as the data will increase and the scal-
ability of the system would be under question, it will be very affordable
and time efficient, as our system has the capability to have shards (nodes).

Therefore all of the data will be distributed amongst these nodes, and
there will be no need to transfer data from the existing machine to a
higher powered machine. And a persons craving for a specific food
item in their vicinity would be satisfied in a very true sense. This will
help in increas-ing business, as the system would be able to provide the
user with exactly what the user wants in majority of the cases, and this
will help in boosting business.

SKNCOE, Department of Computer Engineering 2017-18


23
8 Conclusion
To achieve our goal, we have divided the calculation process to
calcu-late the recommendation process for each user. Thus producing a
more personalized search result for a user. These recommendations are
gen-erated through the personal preferences of user. The user also gets
rec-ommendations for a specific item with the help of preference or
review based collaborative filtering. This help user to find places which
are more suitable to their preferences and comfort. This enables a
person to have a more comfortable and suitable dining experience and
also sharing their reviews to help others in the same manner.

SKNCOE, Department of Computer Engineering 2017-18


24
9 Annex A: Assignments
Q 1. FEASIBILITY STUDY:

The feasibility of the project is analyzed in this phase and business


pro-posal is put forth with a very general plan for the project and some
cost estimates. During system analysis the feasibility study of the
proposed system is to be carried out. This is to ensure that the proposed
system is not a burden to the company. Three key considerations
involved in the feasibility analysis are:

ECONOMICAL FEASIBILITY

TECHNICAL FEASIBILITY

SOCIAL FEASIBILITY

1. ECONOMICAL FEASIBILITY:

This study is carried out to check the economic impact that the system
will have on the organization. The amount of fund that the company can
pour into the research and development of the system is limited. The ex-
penditures must be justied. Thus, the developed system as well within the
budget and this was achieved because most of the technologies used are
freely available. Only the customized products had to be purchased.

2. TECHNICAL FEASIBILITY:

This study is carried out to check the technical feasibility, that is, the
technical requirements of the system. Any system developed must not
have a high demand on the available technical resources. This will lead
to high demands on the available technical resources. This will lead to
high demands being placed on the client. The developed system must
have a modest requirement, as only minimal or null changes are
required for implementing this system.

3. SOCIAL FEASIBILITY:

SKNCOE, Department of Computer Engineering 2017-18


25
Aspect of study is to check the level of acceptance of the system by
the user. This includes the process of training the user to use the system
eciently. The user must not feel threatened by the system, instead must
accept it as a necessity. The level of acceptance by the users solely de-
pends on the methods that are employed to educate the user about the
system and to make him familiar with it. His level of condence must be
raised so that he is also able to make some constructive criticism, which
is welcomed, as he is the nal user of the system.

Idea Matrix Can be represented as:

Increase:Increase the feasibility of the system, considering various


factors such as Technical Feasibility, Social Feasibility and
Econom-ical Feasibility.
Improve:Methods to improve feasibility of the system.
Deliver:Deliver solution to the problem in stipulated amount of time.
Evaluate:Find out various problems that can occur and how to
tackle those problems in optimal time.
Avoid:Do not make use of complex conditions if not required. If
used, it will decrease the feasibility of the system.

Figure 13: IDEA Matrix

SKNCOE, Department of Computer Engineering 2017-18


26
Q 2. PROBLEM SPECIFICATION:

P Problem:

: In computational complexity theory, P also known as PTIME is one


of the most fundamental complexity classes. It contains all decision
prob-lems that can be solved by a deterministic Turing machine using a
poly-nomial amount of computation time, or polynomial time.
Example: P is known to contain many natural problems, including the
decision versions of linear programming, calculating the greatest
common divisor, and nd-ing a maximum matching.

NP Problem:

A problem is assigned to the NP (nondeterministic polynomial time)


class if it is solvable in polynomial time by a nondeterministic Turing
machine. A P-problem (whose solution time is bounded by a polyno-
mial) is always also NP. Example: The decision version of the
travelling salesman problem is in NP. Given an input matrix of
distances between n cities, the problem is to determine if there is a
route visiting all cities with total distance less than k.

NP Hard Problem:

NP-hardness (non-deterministic polynomial-time hard), in


computational complexity theory, is a class of problems that are,
informally, at least as hard as the hardest problems in NP. More
precisely, a problem H is NP-hard when every problem L in NP can be
reduced in polynomial time to H. Example: x Optimization problem of
nding the least-cost cyclic route through all nodes of a weighted graph.
This is commonly known as the traveling salesman problem.

NP Complete Problem:

NP-complete problems are in NP, the set of all decision problems whose
solutions can be veried in polynomial time. A problem p in NP is NP-
complete if every other problem in NP can be transformed (or reduced) into
p in polynomial time. Example: The graph isomorphism problem,

SKNCOE, Department of Computer Engineering 2017-18


27
the graph theory problem of determining whether a graph isomorphism
exists between two graphs. Two graphs are isomorphic if one can be
transformed into the other simply by renaming vertices.

Consider these two problems:

1. Graph Isomorphism: Is graph G1 isomorphic to graph G2?


2. Sub graph Isomorphism: Is graph G1 isomorphic to a sub graph of
graph G2?

The Sub Graph Isomorphism problem is NP-complete.


Therefore, our system is NP-Complete and hence it is feasible.

SKNCOE, Department of Computer Engineering 2017-18


28
Q 3. MATHEMATICAL MODEL:

Objects
Input1: Ip1 = Username , Password
Input2: Ip2= Data
Output1: Op1 =Login
Output2: Op2 = User Data and Location Information
Output3: Op3 = Recommendate Restaurant
Functional Dependency:
Function 1 = F1 =Registration
Function 2 = F2 =Login

Function 3 = F3 =Data Collection


Function 4 = F4 =User Data and Location Information
Function 5 = F5 =Recommendate Restaurant

Function 6 = F6 =Logout

SKNCOE, Department of Computer Engineering 2017-18


29
References
[1] Md. Ahsan Habib, Md. AbdurRakib, and Muhammad AbulHasan. “
Location, Time, and Preference Aware Restaurant
Recommendation Method”19th International Conference on
Computer and Information Technology, December 18-20, 2016,
North South University, Dhaka, Bangladesh.

[2] Mohamed Sarwat , Justin J. Levandoski, Ahmed Eldawy and


Mohamed F. Mokbel “ LARS*: An Efficient and Scalable
Location-Aware Recommender System”TRANSACTIONS ON
KNOWLEDGE AND DATA ENGINEERING, VOL. 6, NO. 1,
NOVEMBER 2015

[3] Greg Linden, Brent Smith, and Jeremy York “ Amazon.com Rec-
ommendations Item-to-Item Collaborative Filtering”2014 IEEE
International Conference on Computer and Information Technology.

[4] Yashvardhan Sharma, Jigar Bhatt, RachitMagon “ A Multi Criteria


Review-Based Hotel Recommendation System”2015 IEEE Interna-
tional Conference on Computer and Information Technology.

[5] Veningston. K , R. Shanmugalakshmi “ Personalized Location


aware recommendation System ”2015 International Conference on
Advanced Computing and Communication Systems (ICACCS -
2015), Jan. 05 07, 2015, Coimbatore, INDIA.

[6] G. Adomavicius and A. Tuzhilin “ Toward the Next Generation of


Recommender Systems: A Survey of the State-of-the-Art and
Possible Extensions, ”IEEE Transactions on Knowledge and Data
Engineering, TKDE, vol. 17, no. 6, pp. 734749, 2005.

[7] J. J. Levandoski, M. Sarwat, A. Eldawy, and M. F. Mokbel “ LARS:


A Location-Aware Recommender System, ”in Proceedings of the

SKNCOE, Department of Computer Engineering 2017-18


30
International Conference on Data Engineering, ICDE, 2012.

[8] D. Jannach, T.U. Dortmund, and G. Friedrich “ Tutorial: Recom-


mender Systems, ”Proc. International Joint Conference on Artificial
Intelligence Beijing (IJCAI 13), August 2013.

[9] Y. Jiang, J. Liu, M. Tang, and X. F. Liu “ An effective Web service


recommendation method based on personalized collab-orative
filtering, ”Proc. 18th IEEE International Conference on Web
Services (ICWS 11), IEEE CPS, 2011, pp. 211-218, doi:
10.1109/ICWS.2011.38.

[10] L. Kuang, Y. Xia, and Y. Mao “ Personalized Services


Recommen-dation Based on Context-Aware QoS Prediction, ”Proc.
19th IEEE International Conference on Web Services (ICWS 12),
IEEE CPS, 2012, pp. 400-406, doi: 10.1109/ICWS.2012.12.

[11] Zhang, W. Dou, and J. Chen “ Selecting Top-k Composite Web


Services Using Preference-Aware Dominance Relationship, ”Proc.
IEEE 20th International Conference on Web Services (ICWS 13),
IEEE Press, June 2013, pp. 75-82, doi: 10.1109/ICWS.2013.20.

[12] Fattane Zarrinkalam and Mohsen Kahani “ A Multi-Criteria Hybrid


Citation Recommendation System Based on Linked Data, ”in 2012
2nd International eConference on Computer and Knowledge
Engineering (ICCKE) pp 283 288, October 18 - 19, 2012.

[13] R. Marcacini and S. O. Rezende “ Incremental Hierarchical Text


Clustering with Privileged Information, ”In Proc. of the 2013 ACM
Symposium on Document Engineering, 2013.

[14] Bidart R, Periera A. C.M., Almeida J. M, Lacerda “ City Recom-


mendation Based on User Communities, ”Web Congress (LA-
WEB), 2014 9th Latin American, pp. 50 58.

SKNCOE, Department of Computer Engineering 2017-18


31
[15] G. Adomavicius, and A. Tuzhilin “ Context-aware recommender
systems: Recommender systems handbook, ”Springer US, pp. 217-
253, 2011.

[16] Q. Liu, E. Chen, H. Xiong, C. Ding, and J. Chen “ Enhancing


Collaborative Filtering by User Interest Expansion via Personalized
Ranking, ”IEEE Transactions on Systems, Man, and Cybernetics
Part B: Cybernetics, vol. 42(1), February 2012, pp. 218-233, doi:
10.1109/TSMCB.2011.2163711.

[17] S. Zhang, W. Dou, and J. Chen “ Selecting Top-k Composite Web


Services Using Preference-Aware Dominance Relationship, ”Proc.
IEEE 20th International Conference on Web Services (ICWS 13),
IEEE Press, June 2013, pp. 75-82, doi: 10.1109/ICWS.2013.20.

SKNCOE, Department of Computer Engineering 2017-18


32

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy