SlideShare a Scribd company logo
1 of 4
Download to read offline
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1118
ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3
International Journal of Trend in Scientific
Research and Development (IJTSRD)
International Open Access Journal
Social Group Recommendation based on Big Data
Ms. Nikita S. Mohite, Mr. H. P. Khandagale
Computer Science and Technology, Department of Technology,
Shivaji University, Kolhapur, Maharashtra, India
ABSTRACT
Current life involves physical enjoyment, social
activities and content, profile and cyber resources.
Now it is easy to merge computing, networking and
society with physical systems to create new
revolutionary science, technical capabilities and better
quality of life. That all possible through Cyber
Physical Social Content and Profile Based System
(CPSCPs).In this propose system, a group-centric
intelligent recommender system named as GroRec,
which integrates social, mobile and big data
technologies to provide effective, objective and
accurate recommendation services. This provides
group recommendation in CPSCPs domain. In which
activity oriented cluster discovery, the revision of
rating information for improved accuracy and cluster
preferences modelling that supports descent context
mining from multiple sources. Group
recommendation is based on profile and content based
approach. Our main goal is make several interactions
with group members by using specific technique and
methods. The recommender system is economical,
objective and correct.
Keywords: Big data, Data mining, Big data analysis,
Recommended services, CPSCPs
I. INTRODUCTION
Now a day’s peoples are mostly connected with
Internet of things, this help to interact with whole
world. Ios use for network connectivity which enables
objects to connect and exchange data. A social
network services (SNS) is online platform that people
use to build social networks with other people who
share similar personal or career interests, activities,
background or real life connection. In particular,
through advanced mobile and sensing technologies,
social data can easily be collected as records of social
events, which can be analysed to yield a better
understanding of users’ daily activities, social circles,
living habits, etc.
CPSS is a kind of common complex system that is
constituted by physical system, and its social system
including human beings, and cyber system that
connects both of them with each other. CPSS provide
the individual centric approach it is difficult to
provide users with timely and suitable
recommendations.
In our proposed system CPSCPs (Cyber-Physical-
Social-Content-Profile based systems) is major
objective. It involves Cyber components are about the
computing, communication, and controls that are
discrete, logical, and switched. Physical components
are about natural and human-made physical systems,
which are governed by the laws of physics and
operated in continuous time. Physical based system
includes the place and time of the user. Social
components include the daily activities of users,
communication network with others. User profile
became central feature of social networking sites,
allowing users to compile list of “friends” and search
for other users with similar interest. In content based
system content based filtering is used. The
information source that content based systems are
mostly used with words which are occurred in text
documents. Content based filtering recommends items
based on comparison between the content of the items
and user profile.
In social network system used discontinuous nature of
data collection due to this sparsity problem is
occurred. To address this challenge we propose
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1119
group-centric intelligent recommender system in
which multi-dimensional resources are invoked. The
system collects high dimensional data from user’s
profile, groups are recommended based on the
similarity of user behavior.
II. LITERATURE SURVEY
“Data Mining for the Internet of Things :-Literature
Review and Challenges ", Feng Chen, Pan Deng, Jiafu
Wan, Daqiang Zhang, Athanasios V. Vasilakos and
Xiaohui Rong [5] ,in this paper, they reviewed data
mining in knowledge view, technique view, and
application view, including classification, clustering,
association analysis, time series analysis and outlier
analysis.
“Cyber-physical-social System in Intelligent
Transportation”, G. Xiong, F. Zhu, X. Liu, X. Dong,
W. Huang, S. Chen, and K. Zhao[11],in this paper,
they closely analysed an artificial system,
computational experiments and parallel execution
(ACP) methodology is introduced based on which
data-driven models are applied to social system. The
ACP proven effective framework and scientific
foundation. The result of CPSS and ACP are applied
and verified in traffic areas such as management plan
optimization, large scale evacuation and public traffic
scheduling, manufacturing and transformation. There
are achievements in both research and application in
2010 a new department, CPSS is founded in IEEE
“Intelligent Systems” and “CPSS based
Transportation”.
“A CPSS Approach for Emergency Evacuation in
Building Fires”, Y. Hu, F.-Y. Wang, and X. Liu [12],
in this they propose a cyber- physical-social systems
(CPSS) approach based (ACP) methodology using
artificial systems, computational experiments, and
parallel execution. CPSS provides a tool to verify or
evaluate emergency evacuation plan. It used in the
significantly improve fire emergency management
and public safety in building fire. CPSS is one which
integrate with human and social characteristics and
bridge the physical world, cyberspace, and human
society together. It exists in newly rising network
society “A group recommendation system with
consideration of interactions among group members”,
Yen-Liang Chen, Li-Chen Cheng, Ching-Nan
Chuang, [14], in this paper, they closely reviewed
group recommendation system. The system is
designed based on the framework of collaborative
filtering for this they especially use genetic algorithm
to predict the possible interactions among group
members so that we can correctly estimate the rating
that a group of members might give to an item. The
experimental results show that the proposed system
can give satisfactory and high quality group
recommendations. This group recommendation
system applied in online store sales and are effective
way to increase customer satisfaction and
consequently customer loyalty.
III. NEED OF WORK
Social-Network-services (SNS) is a web based service
that allowed individuals to connect with public or
semi-public profile within bounded system. In SNS
users created profile with specific content pattern. The
purpose of this system is to communication with
social media and share users post. So the SNS
platform is used in the CPSS.
Recently, the physical system and its cyber system of
CPS are designed, built and used by human beings in
their social and natural environments, the social
system must be of the same importance as its CPS;
these indivisible three parts (cyber, physical, and
social system) constitute the entity named as cyber-
physical-social system (CPSS).Physical & social
system and their cyber systems can understand each
other, their stepwise interaction helps improve each
other, and gradually the effective control and safe,
reliable and efficient operation of CPSS will be
realized. This can improve the perception, analysis
and control ability of those complex CPSSs, and their
effective control and the safe, reliable and efficient
operation can be achieved. CPSS to achieve the
reliable and efficient operation and optimization target
in normal situation.
SNS and CPSS integrated into our proposed system
named as CPSCPs (Cyber-Physical-Social-Content-
Profile based system) in which content based system
content is going to be refer and profile is refer in
profile based system.
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1120
IV. OUTLINE OF PROPOSED WORK
Fig : Architecture Diagram of Proposed Work
The proposed system will be consist of 6 modules:-
1. Login Module:-
Login module is a web application where user can
login. If user is existing user then they can login with
the help of user-id and password. If user don’t have
the authentication then user click on new user
registration.
2. New User Registration:-
It is necessary to register the new user and get the user
name and password for login. In this registration form
person fill the all personal information like name,
DOB, age, current location, school name, etc.
3. Core Module:-
Core module consists of Big data for efficient storage
of multidimensional data. Big data is a term used for a
collection of data sets so large and complex that it is
difficult to process using traditional applications/tools.
The unstructured data can be structured by using Big
data technology.
3.1 Group Discovery supported behavioural
Similarity:-
In Group Recommendation, the cluster discovery
module is meant to speedily and accurately discover
teams from high-dimensional information supported
the similarity of user behaviour.
3.2 Method of Rating Revision supported
Emotional Offset selection through LDA:-
In Group Recommendation, rating information are
revised in accordance with their emotional options
that are extracted from user reviews through
sentiment analysis. Considering that user reviews will
embrace a major emotional offset, sentiment analysis
is a crucial suggests that of calculative this offset to
revise the initial ratings. The rating revision module is
that the foundation for guaranteeing the objectiveness
of the recommender, thereby raising the accuracy of
the advice results. LDA (Latent Diritchlet Allocation)
is used in sentimental analysis for finding the topic
from posts. While doing the sentimental analysis the
topic searching part from user reviews are done. This
will help for the formation of group based on reviews.
4. Filtering Of Data:-
In the filtering of data format we filter all cyber-
physical-social-content-profile and make in standard
format with similarities and store again on our
database for making the group with similar data. For
this purpose we will use KNN, K-means,
collaborative filtering.
5. Multiple Group Formation:-
To making the group on the basis of behavioural and
content base using rollup and cube for similar
properties and similar attributes of people.
6. Group Recommendation:-
Whenever new user login then their activities are
matched with our existing groups. Then our system
will be sending recommendation for that person to
add it.
CONCLUSION
SNS provides individual centric recommendation, this
make complex, non-efficient system. So to address
this problem we comes with Group centric
recommendation based on CPSCPs. This provide
effective, objective and accurate recommendation
services in CPSCPs. Our proposed system provides
group recommendation system based on behavior
similarity and emotional offset among users. This help
to reduce complexity of conventional individual
centric recommender systems. The emotional offset
extracted from reviews, sentiment analysis is
International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470
@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1121
proposed to revise user rating for improved result of
rating data. Cluster data is achieve by applying KNN,
K-means, collaborative filtering, content based
filtering. This group recommendation system gives
efficient, effective and accurate results.
REFERENCES
1. Alexander W. Schneider and Boltzmannstr,
“Using Web Analytics Data to support Social
Software Users”, 2010, srvmatthes5.in.tum.de.
2. Gautam Shroff, Lipika Dey and Puneet Agrawal,
“Social Business Intelligence Using Big Data”,
2013.
3. V. Jude Nirmal and D.I. George Amalarethinam,
“Parallel Implementation of Big Data Pre-
Processing Algorithms for Sentiment Analysis of
Social Networking Data”, IJFMA Vol. 6, No. 2,
2015, 149-159, ISSN: 2320 –3242 (P), 2320 –
3250 (online) Published on22 January 2015.
4. R. Balaji Ganesh & S. Appavu, “An Intelligent
Video Surveillance Framework with Big Data
Management for Indian Road Traffic System”,
IJCA (0975 – 8887) Volume 123 – No.10, August
2015.
5. Feng Chen, Pan Deng, Jiafu Wan, Daqiang Zhang,
Athanasios V. Vasilakos and Xiaohui Rong, “Data
Mining for the Internet of Things: Literature
Review and Challenges”, Hindawi Publishing
Corporation, International Journal of Distributed
Sensor Networks, Article ID 431047, March 2015.
6. Somesh S Chavadi and Dr. Asha T, “Text Mining
Approach for Big Data Analysis Using Clustering
and Classification Methodologies”, IJETAE,
Volume 4, Issue 8, August 2014.
7. Catherine Dwyer, Yi Zhang and Starr Roxanne
Hiltz, “Using Web Analytics to Measure the
Activity in a Research-Oriented Online
Community, Paper Submit to the Tenth Americas
Conference on Information Systems”, New York,
, August 2004, pp 2668-78.
8. Sana Siddiqui and Imran Qadri, “Mining Web Log
Files for Web Analytics and Usage Patterns to
Improve Web Organization”, Siddiqui et al.,
IJARCSSE 4(6), June - 2014, pp. 794-802.
9. Vatsal Shah, “Big Video Data Analytics using
Hadoop”, IJARCSSE, Vol 5, issue 7, July 2015.
10. F.-Y. Wang, “The emergence of intelligent
enterprises: From CPS to CPSS,” Intelligent
Systems, IEEE, vol. 25, no. 4, pp. 85–88, 2010.
11. G. Xiong, F. Zhu, X. Liu, X. Dong, W. Huang, S.
Chen, and K. Zhao, “Cyber-physical-social system
in intelligent transportation,” Auto-matica Sinica,
IEEE/CAA Journal of, vol. 2, no. 3, pp. 320–333,
2015.
12. Y. Hu, F.-Y. Wang, and X. Liu, “A CPSS
approach for emergency evacuation in building
fires,” IEEE Intelligent Systems, no. 3, pp. 48–52,
2014.
13. A. Sheth, P. Anantharam, and C. Henson,
“Physical-cyber-social computing: An early 21st
century approach,” Intelligent Systems, IEEE, vol.
28, no. 1, pp. 78–82, 2013.
14. Y.-L. Chen, L.-C. Cheng, and C.-N. Chuang, “A
group recommendation system with consideration
of interactions among group members,” Expert
systems with applications, vol. 34, no. 3, pp.
2082– 2090, 2008.
15. H. Ning, H. Liu, J. Ma, L. T. Yang, and R. Huang,
“Cybermatics: Cyber–physical–social–thinking
hyperspace based science and technology,” Future
Generate. Compute. System, 2015.

More Related Content

What's hot

iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images onIaetsd Iaetsd
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...IJASCSE
 
Sna based reasoning for multiagent
Sna based reasoning for multiagentSna based reasoning for multiagent
Sna based reasoning for multiagentijaia
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...IJERA Editor
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsIRJET Journal
 
Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions R A Akerkar
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataIOSR Journals
 
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING ijcsit
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Waqas Tariq
 
An Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real KnowledgeAn Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real KnowledgeIJEACS
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgeRishikesh Pathak
 
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...IJECEIAES
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
 
Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...IJMIT JOURNAL
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
 

What's hot (19)

iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
 
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
Enhanced Performance of Search Engine with Multitype Feature Co-Selection of ...
 
Sna based reasoning for multiagent
Sna based reasoning for multiagentSna based reasoning for multiagent
Sna based reasoning for multiagent
 
Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...Proactive Intelligent Home System Using Contextual Information and Neural Net...
Proactive Intelligent Home System Using Contextual Information and Neural Net...
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions Harvesting Intelligence from User Interactions
Harvesting Intelligence from User Interactions
 
nm
nmnm
nm
 
A Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media DataA Review: Text Classification on Social Media Data
A Review: Text Classification on Social Media Data
 
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
APPLYING THE TECHNOLOGY ACCEPTANCE MODEL TO UNDERSTAND SOCIAL NETWORKING
 
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
Hybrid Personalized Recommender System Using Modified Fuzzy C-Means Clusterin...
 
An Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real KnowledgeAn Extensible Web Mining Framework for Real Knowledge
An Extensible Web Mining Framework for Real Knowledge
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Ac02411221125
Ac02411221125Ac02411221125
Ac02411221125
 
Personalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledgePersonalized web search using browsing history and domain knowledge
Personalized web search using browsing history and domain knowledge
 
Ce4201528546
Ce4201528546Ce4201528546
Ce4201528546
 
Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...Integrated approach to detect spam in social media networks using hybrid feat...
Integrated approach to detect spam in social media networks using hybrid feat...
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...Classification-based Retrieval Methods to Enhance Information Discovery on th...
Classification-based Retrieval Methods to Enhance Information Discovery on th...
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMM
 

Similar to Social Group Recommendation based on Big Data

Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...AIRCC Publishing Corporation
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...ijcsit
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfAmber Ford
 
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET Journal
 
Recommender systems: a novel approach based on singular value decomposition
Recommender systems: a novel approach based on singular  value decompositionRecommender systems: a novel approach based on singular  value decomposition
Recommender systems: a novel approach based on singular value decompositionIJECEIAES
 
Detailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation techniqueDetailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation techniqueIAEME Publication
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)paperpublications3
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVpkaviya
 
Improving Knowledge Handling by building intellegent social systems
Improving Knowledge Handling by building intellegent social systemsImproving Knowledge Handling by building intellegent social systems
Improving Knowledge Handling by building intellegent social systemsnazeeh
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
A recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filteringA recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filteringIAESIJAI
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking ijcseit
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxturveycharlyn
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.Lanujessy
 
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...Andrew Parish
 
Hybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemHybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemBouneffouf Djallel
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environmentpaperpublications3
 

Similar to Social Group Recommendation based on Big Data (20)

Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
Increasing the Investment’s Opportunities in Kingdom of Saudi Arabia By Study...
 
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
INCREASING THE INVESTMENT’S OPPORTUNITIES IN KINGDOM OF SAUDI ARABIA BY STUDY...
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
 
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdfA Literature Survey on Recommendation Systems for Scientific Articles.pdf
A Literature Survey on Recommendation Systems for Scientific Articles.pdf
 
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...IRJET- Predicting Social Network Communities Structure Changes and Detection ...
IRJET- Predicting Social Network Communities Structure Changes and Detection ...
 
Recommender systems: a novel approach based on singular value decomposition
Recommender systems: a novel approach based on singular  value decompositionRecommender systems: a novel approach based on singular  value decomposition
Recommender systems: a novel approach based on singular value decomposition
 
Detailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation techniqueDetailed structure applicable to hybrid recommendation technique
Detailed structure applicable to hybrid recommendation technique
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
 
CS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IVCS6010 Social Network Analysis Unit IV
CS6010 Social Network Analysis Unit IV
 
Improving Knowledge Handling by building intellegent social systems
Improving Knowledge Handling by building intellegent social systemsImproving Knowledge Handling by building intellegent social systems
Improving Knowledge Handling by building intellegent social systems
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
A recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filteringA recommender system-using novel deep network collaborative filtering
A recommender system-using novel deep network collaborative filtering
 
Recommendation System Using Social Networking
Recommendation System Using Social Networking Recommendation System Using Social Networking
Recommendation System Using Social Networking
 
Towards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docxTowards Decision Support and Goal AchievementIdentifying Ac.docx
Towards Decision Support and Goal AchievementIdentifying Ac.docx
 
INFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.LINFORMATION RETRIEVAL Anandraj.L
INFORMATION RETRIEVAL Anandraj.L
 
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
A Novel Technique For Creative Problem-Solving By Using Q-Learning And Associ...
 
Hybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender systemHybrid-e-greedy for mobile context-aware recommender system
Hybrid-e-greedy for mobile context-aware recommender system
 
A Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based EnvironmentA Novel Frame Work System Used In Mobile with Cloud Based Environment
A Novel Frame Work System Used In Mobile with Cloud Based Environment
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 

Social Group Recommendation based on Big Data

  • 1. @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1118 ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume - 2 | Issue – 3 International Journal of Trend in Scientific Research and Development (IJTSRD) International Open Access Journal Social Group Recommendation based on Big Data Ms. Nikita S. Mohite, Mr. H. P. Khandagale Computer Science and Technology, Department of Technology, Shivaji University, Kolhapur, Maharashtra, India ABSTRACT Current life involves physical enjoyment, social activities and content, profile and cyber resources. Now it is easy to merge computing, networking and society with physical systems to create new revolutionary science, technical capabilities and better quality of life. That all possible through Cyber Physical Social Content and Profile Based System (CPSCPs).In this propose system, a group-centric intelligent recommender system named as GroRec, which integrates social, mobile and big data technologies to provide effective, objective and accurate recommendation services. This provides group recommendation in CPSCPs domain. In which activity oriented cluster discovery, the revision of rating information for improved accuracy and cluster preferences modelling that supports descent context mining from multiple sources. Group recommendation is based on profile and content based approach. Our main goal is make several interactions with group members by using specific technique and methods. The recommender system is economical, objective and correct. Keywords: Big data, Data mining, Big data analysis, Recommended services, CPSCPs I. INTRODUCTION Now a day’s peoples are mostly connected with Internet of things, this help to interact with whole world. Ios use for network connectivity which enables objects to connect and exchange data. A social network services (SNS) is online platform that people use to build social networks with other people who share similar personal or career interests, activities, background or real life connection. In particular, through advanced mobile and sensing technologies, social data can easily be collected as records of social events, which can be analysed to yield a better understanding of users’ daily activities, social circles, living habits, etc. CPSS is a kind of common complex system that is constituted by physical system, and its social system including human beings, and cyber system that connects both of them with each other. CPSS provide the individual centric approach it is difficult to provide users with timely and suitable recommendations. In our proposed system CPSCPs (Cyber-Physical- Social-Content-Profile based systems) is major objective. It involves Cyber components are about the computing, communication, and controls that are discrete, logical, and switched. Physical components are about natural and human-made physical systems, which are governed by the laws of physics and operated in continuous time. Physical based system includes the place and time of the user. Social components include the daily activities of users, communication network with others. User profile became central feature of social networking sites, allowing users to compile list of “friends” and search for other users with similar interest. In content based system content based filtering is used. The information source that content based systems are mostly used with words which are occurred in text documents. Content based filtering recommends items based on comparison between the content of the items and user profile. In social network system used discontinuous nature of data collection due to this sparsity problem is occurred. To address this challenge we propose
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1119 group-centric intelligent recommender system in which multi-dimensional resources are invoked. The system collects high dimensional data from user’s profile, groups are recommended based on the similarity of user behavior. II. LITERATURE SURVEY “Data Mining for the Internet of Things :-Literature Review and Challenges ", Feng Chen, Pan Deng, Jiafu Wan, Daqiang Zhang, Athanasios V. Vasilakos and Xiaohui Rong [5] ,in this paper, they reviewed data mining in knowledge view, technique view, and application view, including classification, clustering, association analysis, time series analysis and outlier analysis. “Cyber-physical-social System in Intelligent Transportation”, G. Xiong, F. Zhu, X. Liu, X. Dong, W. Huang, S. Chen, and K. Zhao[11],in this paper, they closely analysed an artificial system, computational experiments and parallel execution (ACP) methodology is introduced based on which data-driven models are applied to social system. The ACP proven effective framework and scientific foundation. The result of CPSS and ACP are applied and verified in traffic areas such as management plan optimization, large scale evacuation and public traffic scheduling, manufacturing and transformation. There are achievements in both research and application in 2010 a new department, CPSS is founded in IEEE “Intelligent Systems” and “CPSS based Transportation”. “A CPSS Approach for Emergency Evacuation in Building Fires”, Y. Hu, F.-Y. Wang, and X. Liu [12], in this they propose a cyber- physical-social systems (CPSS) approach based (ACP) methodology using artificial systems, computational experiments, and parallel execution. CPSS provides a tool to verify or evaluate emergency evacuation plan. It used in the significantly improve fire emergency management and public safety in building fire. CPSS is one which integrate with human and social characteristics and bridge the physical world, cyberspace, and human society together. It exists in newly rising network society “A group recommendation system with consideration of interactions among group members”, Yen-Liang Chen, Li-Chen Cheng, Ching-Nan Chuang, [14], in this paper, they closely reviewed group recommendation system. The system is designed based on the framework of collaborative filtering for this they especially use genetic algorithm to predict the possible interactions among group members so that we can correctly estimate the rating that a group of members might give to an item. The experimental results show that the proposed system can give satisfactory and high quality group recommendations. This group recommendation system applied in online store sales and are effective way to increase customer satisfaction and consequently customer loyalty. III. NEED OF WORK Social-Network-services (SNS) is a web based service that allowed individuals to connect with public or semi-public profile within bounded system. In SNS users created profile with specific content pattern. The purpose of this system is to communication with social media and share users post. So the SNS platform is used in the CPSS. Recently, the physical system and its cyber system of CPS are designed, built and used by human beings in their social and natural environments, the social system must be of the same importance as its CPS; these indivisible three parts (cyber, physical, and social system) constitute the entity named as cyber- physical-social system (CPSS).Physical & social system and their cyber systems can understand each other, their stepwise interaction helps improve each other, and gradually the effective control and safe, reliable and efficient operation of CPSS will be realized. This can improve the perception, analysis and control ability of those complex CPSSs, and their effective control and the safe, reliable and efficient operation can be achieved. CPSS to achieve the reliable and efficient operation and optimization target in normal situation. SNS and CPSS integrated into our proposed system named as CPSCPs (Cyber-Physical-Social-Content- Profile based system) in which content based system content is going to be refer and profile is refer in profile based system.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1120 IV. OUTLINE OF PROPOSED WORK Fig : Architecture Diagram of Proposed Work The proposed system will be consist of 6 modules:- 1. Login Module:- Login module is a web application where user can login. If user is existing user then they can login with the help of user-id and password. If user don’t have the authentication then user click on new user registration. 2. New User Registration:- It is necessary to register the new user and get the user name and password for login. In this registration form person fill the all personal information like name, DOB, age, current location, school name, etc. 3. Core Module:- Core module consists of Big data for efficient storage of multidimensional data. Big data is a term used for a collection of data sets so large and complex that it is difficult to process using traditional applications/tools. The unstructured data can be structured by using Big data technology. 3.1 Group Discovery supported behavioural Similarity:- In Group Recommendation, the cluster discovery module is meant to speedily and accurately discover teams from high-dimensional information supported the similarity of user behaviour. 3.2 Method of Rating Revision supported Emotional Offset selection through LDA:- In Group Recommendation, rating information are revised in accordance with their emotional options that are extracted from user reviews through sentiment analysis. Considering that user reviews will embrace a major emotional offset, sentiment analysis is a crucial suggests that of calculative this offset to revise the initial ratings. The rating revision module is that the foundation for guaranteeing the objectiveness of the recommender, thereby raising the accuracy of the advice results. LDA (Latent Diritchlet Allocation) is used in sentimental analysis for finding the topic from posts. While doing the sentimental analysis the topic searching part from user reviews are done. This will help for the formation of group based on reviews. 4. Filtering Of Data:- In the filtering of data format we filter all cyber- physical-social-content-profile and make in standard format with similarities and store again on our database for making the group with similar data. For this purpose we will use KNN, K-means, collaborative filtering. 5. Multiple Group Formation:- To making the group on the basis of behavioural and content base using rollup and cube for similar properties and similar attributes of people. 6. Group Recommendation:- Whenever new user login then their activities are matched with our existing groups. Then our system will be sending recommendation for that person to add it. CONCLUSION SNS provides individual centric recommendation, this make complex, non-efficient system. So to address this problem we comes with Group centric recommendation based on CPSCPs. This provide effective, objective and accurate recommendation services in CPSCPs. Our proposed system provides group recommendation system based on behavior similarity and emotional offset among users. This help to reduce complexity of conventional individual centric recommender systems. The emotional offset extracted from reviews, sentiment analysis is
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456-6470 @ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 3 | Mar-Apr 2018 Page: 1121 proposed to revise user rating for improved result of rating data. Cluster data is achieve by applying KNN, K-means, collaborative filtering, content based filtering. This group recommendation system gives efficient, effective and accurate results. REFERENCES 1. Alexander W. Schneider and Boltzmannstr, “Using Web Analytics Data to support Social Software Users”, 2010, srvmatthes5.in.tum.de. 2. Gautam Shroff, Lipika Dey and Puneet Agrawal, “Social Business Intelligence Using Big Data”, 2013. 3. V. Jude Nirmal and D.I. George Amalarethinam, “Parallel Implementation of Big Data Pre- Processing Algorithms for Sentiment Analysis of Social Networking Data”, IJFMA Vol. 6, No. 2, 2015, 149-159, ISSN: 2320 –3242 (P), 2320 – 3250 (online) Published on22 January 2015. 4. R. Balaji Ganesh & S. Appavu, “An Intelligent Video Surveillance Framework with Big Data Management for Indian Road Traffic System”, IJCA (0975 – 8887) Volume 123 – No.10, August 2015. 5. Feng Chen, Pan Deng, Jiafu Wan, Daqiang Zhang, Athanasios V. Vasilakos and Xiaohui Rong, “Data Mining for the Internet of Things: Literature Review and Challenges”, Hindawi Publishing Corporation, International Journal of Distributed Sensor Networks, Article ID 431047, March 2015. 6. Somesh S Chavadi and Dr. Asha T, “Text Mining Approach for Big Data Analysis Using Clustering and Classification Methodologies”, IJETAE, Volume 4, Issue 8, August 2014. 7. Catherine Dwyer, Yi Zhang and Starr Roxanne Hiltz, “Using Web Analytics to Measure the Activity in a Research-Oriented Online Community, Paper Submit to the Tenth Americas Conference on Information Systems”, New York, , August 2004, pp 2668-78. 8. Sana Siddiqui and Imran Qadri, “Mining Web Log Files for Web Analytics and Usage Patterns to Improve Web Organization”, Siddiqui et al., IJARCSSE 4(6), June - 2014, pp. 794-802. 9. Vatsal Shah, “Big Video Data Analytics using Hadoop”, IJARCSSE, Vol 5, issue 7, July 2015. 10. F.-Y. Wang, “The emergence of intelligent enterprises: From CPS to CPSS,” Intelligent Systems, IEEE, vol. 25, no. 4, pp. 85–88, 2010. 11. G. Xiong, F. Zhu, X. Liu, X. Dong, W. Huang, S. Chen, and K. Zhao, “Cyber-physical-social system in intelligent transportation,” Auto-matica Sinica, IEEE/CAA Journal of, vol. 2, no. 3, pp. 320–333, 2015. 12. Y. Hu, F.-Y. Wang, and X. Liu, “A CPSS approach for emergency evacuation in building fires,” IEEE Intelligent Systems, no. 3, pp. 48–52, 2014. 13. A. Sheth, P. Anantharam, and C. Henson, “Physical-cyber-social computing: An early 21st century approach,” Intelligent Systems, IEEE, vol. 28, no. 1, pp. 78–82, 2013. 14. Y.-L. Chen, L.-C. Cheng, and C.-N. Chuang, “A group recommendation system with consideration of interactions among group members,” Expert systems with applications, vol. 34, no. 3, pp. 2082– 2090, 2008. 15. H. Ning, H. Liu, J. Ma, L. T. Yang, and R. Huang, “Cybermatics: Cyber–physical–social–thinking hyperspace based science and technology,” Future Generate. Compute. System, 2015.