SlideShare a Scribd company logo
1 of 8
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1480
SITUATION ALERT AND QUALITY OF SERVICE USING COLLABORATIVE
FILTERING FOR WEB PROVISION RECOMMENDATION
*1Mrs. Tamilselvi. S, *2 Mrs. Anette Regina. I
*1M.phil Research Scholar, Department of computer Science Muthurangam Government Arts College
(Autonomous), Vellore, Tamilnadu, India.
*2Assistant Prof, Department of Computer Science Muthurangam Government Arts College (Autonomous), Vellore.
---------------------------------------------------------------------***--------------------------------------------------------------------
Abstract - Collaborative Filtering (CF) is widely employed
for making Web service recommendation. CF-based Web
service recommendation aims to predict missing QoS
(Quality-of-Service) values of Web services. Although several
CF-based Web service QoS prediction methods have been
proposed in recent years, the performance still needs
significant improvement. Firstly, existing QoS prediction
methods seldom consider personalized influence of users
and services when measuring the similarity between users
and between services. Secondly, Web service QoS factors,
such as response time and throughput, usually depends on
the locations of Web services and users. However, existing
Web service QoS prediction methods seldom took this
observation into consideration. In this paper, we propose a
location-aware personalized CF method for Web service
recommendation. The proposed method leverages both
locations of users and Web services when selecting similar
neighbors for the target user or service. The method also
includes an enhanced similarity measurement for users and
Web services, by taking into account the personalized
influence of them. To evaluate the performance of our
proposed method, we conduct a set of comprehensive
experiments using a real-world Web service dataset. The
experimental results indicate that our approach improves
the QoS prediction accuracy and computational efficiency
significantly, compared to previous CF-based methods.
Key Words: location based service, CF method, Qos
prediction method , CF based web service.
I. INTRODUCTION
The thesis is based on the sole interest of the
author for location-based matters. Twenty years ago, it
was not possible for an outsider in a foreign country or
city to quickly locate an ATM, get some cash and rush to a
McDonald's restaurant to grab a nice lunch without the
need to ask the locale for direction or running back and
forth aimlessly. However, nowadays, a foreigner can
confidently locate himself and get to his desired places in
short time, all thanks to the development of location-based
services.
Mobile communication systems were originally
created in order to serve communication purposes.
However, with the recent demand from users to have data
and transaction services implemented within their own
mobile devices, mobile communication service providers
have been investing great a amount of resources into
creating location sensitive service platforms. Such services
use voice or text sequences as input and return
geographical information or recommendations.
In order to create valuable outputs, location-
based services require properly functional recommender
systems to pick up the most suitable information among
vast amount of available data. Basically, a typical
recommender system combines knowledge about
customers ( personal preferences, buying habits...) service
items (prices, features...) and the interaction between
customers and the location-based service platforms
(ratings, likes, dislikes) to recommend services that users
are likely to find attractive.
However, location-based services are not free of
problems. Since they deal with a large amount of data and
some of the data is very valuable and sensitive, location-
based services have become favorite targets of hackers
and data thieves who are skillful and willing enough to get
themselves any piece data they want. In location-based
services, knowing a user's information usually means
knowing that customer's location and whereabouts, which
means jeopardizing the user's privacy and security. The
knowledge intended to help provide customers with
better choices now, having fallen into the wrong hands,
becomes an effective weapon against the customers and
the service providers themselves. In order to protect their
customers' data from intruders, location-based service
providers must know what threats they are dealing with
and design systems and mechanisms that are able to
protect their customers' information and privacy. Of the
available location-based service currently, the social
network named Foursquare has proved itself to be one of
the most successful participants of the location-based
playground. Foursquare has been able to see through the
market value of location data and therefore identified the
right sector of location-based service to do business with
and has managed to, to some considerable extend, satisfy
and attract users with timely and pleasant services as well
as resolve nuisances and threats that would occur.
Foursquare will be introduced in this thesis alongside
theories as examples.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1481
Motivation
In fact, countless people have been using location-
based products for a long time yet not being aware of the
true nature of what they are using. To some extents, this
lack of knowledge is dangerous because, since people have
no clear idea about several aspects of the services they are
using, they are exposed to location information security
breaches, which may result in disastrous outcomes to the
privacy, reputation or even physical well-being of the
naive users. In the thesis, an entire chapter is dedicated to
studying data security threats of LBSs. This means a
considerable amount of clear, simple yet refined
knowledge of LBS security that could be easily understood
by any average citizen who wants to know and try to
protect himself while using LBSs. In addition, the thesis
also includes a large section of business-related matters of
LBSs. In other words, anybody starting a business can
consider the thesis a reliable source of reference to get
some idea about what does it mean to do LBS business.
Finally, the thesis will come in handy for people who are
considering using the foursquare social network. The
thesis utilizes the features and characteristics of
Foursquare as the basis to compare, contrast and explain
several aspects of LBS, meaning that multiple important
points to be considered when deciding whether or not to
join Four square are included in or can be answered using
information provided in the thesis.
Fig1 : Structure Of Thesis
Existing system
QoS is usually defined as a set of non-functional
properties, such as response time, throughput, reliability,
and so on. Due to the paramount importance of QoS in
building successful service-oriented applications, QoS-
based Web service discovery and selection has garnered
much attention from both academia and industry. a user
prefers to select a Web service with the best QoS
performance, provided that a set of Web service
candidates satisfying his/her functional requirements are
discovered. In reality, however, it is neither easy nor
practical for a user to acquire the QoS for all Web service
candidates, due to the following reasons: Web service Qos
is highly depend on both users’ and Web services’
Proposed system
We proposed an enhanced measurement for
computing QoS similarity between different users and
between different services. The measurement takes into
account the personalized deviation of Web services’ QoS
and users’ QoS experiences, in order to improve the
accuracy of similarity computation. Based on the above
enhanced similarity measurement, we proposed a
location-aware CF-based Web service QoS prediction
method for service recommendation.
We conducted a set of comprehensive
experiments employing a real-world Web service dataset,
which demonstrated that the proposed Web service QoS
prediction method significantly outperforms previous
well-known methods. We also incorporate the locations of
both Web services and users into similar neighbor
selection, for both Web services and users. Comprehensive
experiments conducted on a real Web service dataset
indicate that our method significantly outperforms
previous CF-based Web service recommendation methods.
System Architecture
System Architecture
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1482
III. PREVIOUS IMPLEMENTATIONS
Empirical data collection – interview
Secondly, empirical data is collected through
personal interviews. No other information about the
interviewees, except their ideas is provided in the thesis
so as to protect the privacy of the interviewees. Interviews
are mainly done between the thesis author and location-
based service users and experts. To be specific, the thesis
author has chosen sixteen users and two former
employees of the social network Foursquare for interview.
The reason for interviewing users is that
empirical data is most usually applied in chapter 6 where
a customer-oriented study is conducted. This means those
customers' points of view matters most for the
development of the chapter. However, interviewees are
not randomly selected. Only people who are personally
known by the author to have spent a considerable amount
of time using location-based services and who have
exclusive original experience with such services are
invited for interview so as to keep the interview results in
high quality and reliability. In addition, idea exchanges and
interviews with some former employees of the social
network Foursquare also provide valuable, deep and
practical information and experience in the development
of location-based services. Interview based data is noted,
analyzed, refined and then combined with Theoretical
data from literature reviews to test whether such
theoretical data is correct and applicable or they are mere
unreasonable theories.
Research framework
IV. SYSTEM IMPLEMETNATION
Location based services infrastructure
In order for a LBS to function properly, the
combination of the below components is required:
Component of LBS
Users & Mobile devices: Users are the operators of the
mobile devices and the people who exploit the utilities of
other infrastructure components in order to get
information. Mobile devices are used to send requests to
and receive results from LBS. Mobile devices can be
mobile phones, PDAs, laptops, GPS devices or public
information stations.
Communication networks: The wireless network plays a
vital role in connecting users (through mobile devices)
and the LBS providers. The user's requests are sent via the
communication network into the Internet then to the LBS
provider and vice versa.
Positioning systems: Positioning systems gather and
input user's location information into the requests sent to
LBS providers. For cases in which the user wants to search
for a route, his position will be required to calculate the
way to his desired location. When the user demands
technical or medical care, his location information will
help the (technical/medical) service providers to provide
better and quicker services.
Service and content Providers: LBS providers
distribute the software and services that are able to
process the user's query and weaved responses to the
user. Content providers (map agencies, yellow pages)
store and distribute geographic data that can be requested
by the users or the LBS providers.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1483
Data collection in LBS
In LBS, location data is collected using different
positioning systems; each of the systems provides
different aspects and characteristics of spatial data.
However, there are basic requirements and general
components that make up a positioning system.
Coordinate systems allow LBS data providers to assign
different locations with different, unique "address" for the
sake of effective and easy geographical identification
process. To present locations on a flat space, the choice
most often falls the famous Latitude and Longitude model.
However, depending on different task requirements and
data aspects, other forms of coordinate systems are
created and widely used: the Cartesian coordinates, the
Shape of the Earth and Universal Polar Stereographic...
Scope:
This can be defined as the meaning of the coordinates
given. In practice, it would be better if location data
services give users names such as "University of..." or
"KFC" than showing coordinate numbers.
Coverage: The extent of geographical areas to which the
positioning system is able to reach. The coverage is
especially related to the scope of the system. However,
there are numerous cases in which the coverage level of a
system is smaller in area than what is defined by the
scope.
Precision:
Users and service providers using geographic data must
be aware of the fact that the ability of a positioning system
to accurately pin-point a location often varies depending
on reasons other than the system mechanism. Among the
factors that can lead to an inaccurate calculation are
environmental conditions (temperature, heat, wind
speed...). In short, customers of location data must be
ready to often face (from minor to serious) accuracy
problems when querying information about locations that
usually experience environmental turbulences
Cellular network-based positioning
Collaboration filtering algorithm
Int [] randoms = we.getRandomUsers (original);
Int [] lines = new Int [randoms.length];
Int [] columns = new int [randoms.length];
Arrays.sort(randoms);
Int counter = 0;
for
(
Int d : randoms){ lines[counter] = d/100;
columns[counter] = d%100;
counter++;
}
we.getRandomList(lines, columns, original, sheetData);
In the above getRandomList will generate 500
random numbers from that random numbers which rating
is to be picked up by using the division with 30 (number of
users). For example, if one of the random numbers is 307,
the user will be 10 th user (307 / 30 = 10) where 10 is
dividend and item will be 7 (307 % 30 = 7) where 7 will
be remainder. Here ‘lines’ represents the users and
‘columns’ represents the items. Lines[i] and columns[k]
together will represents ith user’s rating on k item. The
last line we.getRandomList(lines, columns, original,
sheetData);) is responsible for populating randomly
picked 500 ratings from ‘original’ list to ‘sheetData’
NBSSimblanceRow[] nbsSimilarRows = null;
NBSSimblanceRow oNBSSimblanceRow = null;
ArrayList<NBSSimblanceRow[]> listSimblances =
new
ArrayList<NBSSimblanceRow[]>();
For (Int i=0; i<30; i++)
{
nbsSimilarRows = new
NBSSimblanceRow[30];
For ( int j=0; j<30; j++)
{
oNBSSimblanceRow = new
NBSSimblanceRow();
nbsSimilarRows[j] = oNBSSimblanceRow;
}
listSimblances.add(nbsSimilarRows);
}
The first problem manifested itself during
adjusted-cosine similarity measurement calculation, in the
case when there was only one common user between
movies. Since we subtract the average rating for the user,
the adjusted-cosine similarity for items with only one
common user is 1, which is the highest possible value. As a
result, for such items, which are common in the Movielens
database, the most similar items end up being only these
items with one common user. The solution we
implemented was to specify a minimum number of users
(in this case, 5) that two movies needed to have in
common before they could be called similar.
In the above line of code, initialize arraylist which holds
the semblances is performed. then ‘listSimblances’ will
contain 30 entries in which each entry will contain 30
NBSSimblanceRow objects which are responsible for
holding the row number and its semblance with current
row. i.e, if 30 users are taken, then semblance list for the
1st row (user) will contain 30 NBSSimblanceRow objects
(including the self) each one containing its row number
and its semblance with the 1st row. we. Populate
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1484
Rows(listSimblances,sheetData); In the above line of code,
the semblances values are calculated and then populate in
‘listSimblances’
for(int i=0; i<30; i++)
{
nbsSimilarRows = listSimblances.get(i);
Arrays.sort(nbsSimilarRows, we. New
MyComparator());
}
In the above lines, we are sorting the obtained
semblances.
List sheetData1 = ((List) ((ArrayList)
sheetData).clone());
Hashtable table = new Hashtable ();
for( int i=4; i<30; i=i+4)
{
List s3 = we.populatePredictUJ(s heetData1,
listSimblances, i);
List s4 = new ArrayList ();
Double mae = we.getMAE(sheetData, original, s3);
BigDecimal z1 = new
BigDecimal(mae).setScale(2,BigDecimal.ROUND_
HALF_UP);
mae = z1.doubleValue();
System.out.println(" For neighbourset size -- " + i
+" MAE is " + mae);
table.put( new Double(i), mae) ;
}
The second challenge arose when we used weighted sum
to calculate the rating for test user-movie pairs. Since we
were storing only 50 similar movies for each movie, and
for each target movie, we only consider the similar movies
that the active user has seen, it was often the case with the
Movielens dataset that there weren't many such movies
for many of the users. This resulted in bad predictions
overall for large test sets. Because this was due to the
sparsity of the dataset itself, we couldn't come up with a
straightforward solution to this problem.
Neighborhood-based approach
Most collaborative filtering systems apply the so
called neighborhood-based technique. In the
neighborhood-based approach a number of users is
selected based on their similarity to the active user. A
prediction for the active user is made by calculating a
weighted average of the ratings of the selected users.
makes recommendations consider the example in movie
ratings table below. This shows the ratings of five movies
by five people. A “+” indicates that the person liked the
movie and a “-“ indicates that the person did not like the
movie. To predict if Ken would like the movie “Fargo”,
Ken’s ratings are compared to the ratings of the others. In
this case the ratings of Ken and Mike are identical and
because Mike liked Fargo, one might predict that Ken likes
the movie as well.
Movie ratings
Instead of just relying on the most similar person, a
prediction is normally based on the weighted average of
the recommendations of several people. The weight given
to a person’s ratings is determined by the correlation
between that person and the person for whom to make a
prediction. As a measure of correlation the Pearson
correlation coefficient can be used. In this example a
positive rating has the value 1 while a negative rating has
the value –1, but in other cases a rating could also be a
continuous number. The ratings of person X and Y of the
item k are written as and , while and are
the mean values of their ratings. The correlation between
X and Y is then given by:
In this formula k is an element of all the items that both X
and Y have rated. A prediction for the rating of person X of
the item i based on the ratings of people who have rated
item i is computed as follows:
Where Y consists of all the n people who have rated item i.
Note that a negative correlation can also be used as a
weight. For example, because Amy and Jef have a negative
correlation and Amy did not like “Farg” could be used as
an indication that Jef will enjoy “Fargo”.
The Pearson correlation coefficient is used by several
collaborative filtering systems including. GroupLens, a
system that filters articles on Usenet, was the first to
incorporate a neighborhood-based algorithm. In
GroupLens a prediction is made by computing the
weighted average of deviations from the neighbor’s mean:
To illustrate how a collaborative filtering system
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1485
Note that if no one has rated item i the prediction is equal
to the average of all the ratings person X has made. Ringo
recommends music albums and artists a person might be
interested in. Shardanand considers several collaborative
algorithms and reports that a constrained Pearson r
algorithm performs best for Ringo’s information domain.
The constrained Pearson measure is similar to the normal
Pearson measure but uses the mean value of possible
rating values (in this case the average is 4) instead of the
mean values of the ratings of person X and Y.
Pearson correlation coefficient for movie ratings
 Assuming is Every one of the names have seen
any of the above movie
 Let 1 denote seen
 Let 0 denote not seen
Correlation between two products
T(a, b) =
Na = Number of customer who Bought Product A!
Nb = Number of customer who Bought Product B!
Nc = Number of customer who Both Product A and Product
B!
Similarities between products
C( a, b )=
Selecting Neighborhoods
Many collaborative filtering systems have to be
able to handle a large number of users. Making a
prediction based on the ratings of thousands of people has
serious implications for run-time performance. Therefore,
when the number of users reaches a certain amount a
selection of the best neighbors has to be made. Two
techniques, correlation-thresholding and best-n-neighbor,
“Algorithms” : “RecommenderSystems”, “id” : “Example”}
0! 1! 1! 1!
1! 0! 1! 1!
0! 1! 0! 0!
1! 0! 1! 1!
1! 1! 1! 1!
1! 0! 1! 1!
1! 0! 0! 0!
1! 1! 1! 0!
1! 1! 0! 1!
BinaryValues
Recommendation!
Alice!
Bob!
John!
Jane!
Bill!
Steve!
Larry!
Don!
Jack!
14012
15
{ “Algorithms” : “Recommender Systems” , “Similarity” : “Tan
1! 1/3 –
0.33!
5/8 –
0.625!
5/8 –
0.625!
1/3 –
0.33!
1!
3/8 –
0.375!
3/8 –
0.375!
5/8 –
0.625!
3/8 –
0.375!
1!
5/7 –
0.714!
5/8 –
0.625!
3/8 –
0.375!
5/7 –
0.714! 1!
Tanimoto Coe
NA – Number
who bough
NB – Number o
bought P
Nc – Number o
bought both P
Prod
Friday 2 March 2012
16
{ “Algorithms” : “Recommender Systems” , “Similarity” : “Co
1! 0.507! 0.772! 0.772!
0.507! 1! 0.707! 0.707!
0.772! 0.707! 1! 0.833!
0.772! 0.707! 0.833! 1!
Cosine Co
NA – Numb
who bou
NB – Numbe
bough
Nc – Number
bought bot
Pr
Friday 2 March 2012
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1486
can be used to determine which neighbors to select. The
first technique selects only those neighbors whose
correlation is greater than a given threshold. The second
technique selects the best n neighbors with the highest
correlation.
Flowchart for finding best n neighbors
V EVALUATION RESULT
EXPERIMENTAL RESULT
The methodology followed for conducting the
study includes the specification of research design, sample
design, questionnaire design and data collection used for
analyzing the collected data.
7.1 Research design: The research design used for this
study is of the descriptive type. Descriptive research
studies are those studies which are concerned with
describing the characteristics of a particular individual or
a group.
7.2 Sample size: The sample size consisting of 45
respondents were selected for the study.
7.3 Sampling design: Since it is difficult to contact the
entire population, sampling technique was adopted. The
employees were interviewed using convenience sampling
techniques.
7.4 Questionnaire design: Questionnaire was designed in
consultation with the experts in such a manner that it
would facilitate the respondents to reveal maximum
information.
7.5 Data collection: The primary data was collected by
using questionnaires. The questionnaire has 28 questions
excluding marital status, age, factor prompted to join
reliance. A five point scale was used such as strongly
disagree, disagree, neutral, agree and strongly agree.
7.6 Limitations of the study
The limitations of the study are as follows:
 The size of the sample was only 45.
 Some of the respondents were not responding to
some of the questions posted.
 Due to the time constraint the research was not
carried out to the desired level.
Pie Chart result for Job Profile
Pie Chart result for Manager
Get a
Random
Permutation
Start
Define a hash
function h
such that
h(Ui
)=min.
ranked
Pass each user
through the
Hash function
to get the
After the
Clusters have
been formed,
Use
Covisitation to
find out
Stop
Cache the
Recommenda
tions in
Memory
M
e
m
or
y
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1487
Pie Chart result for Compensation
REFERENCES:
1. Y. Zhang and Y. Fang, „„A Fine-Grained
Reputation System forReliable Service Selection in
Peer-to-Peer Networks,‟‟ IEEE Trans. Parallel
Distrib. Syst., vol. 18, no. 8, pp. 1134-1145, Aug.
2007.
2. Z. Zheng, X. Wu, Y. Zhang, M.R. Lyu, and J. Wang,
„„QoS Ranking Prediction for Cloud Services,‟‟
IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6,
pp. 1213-1222, June 2013.
3. B. Mehta, C. Niederee, A. Stewart, C. Muscogiuri,
and E.J.Neuhold, “An Architecture for
Recommendation Based Service Mediation,”
Semantics of a Networked World, vol. 3226, pp.
250-262, 2004.
4. Jianxun Liu, Mingdong Tang, Member, IEEE, Zibin
Zheng, Member, IEEE, Xiaoqing (Frank) Liu,
Member, IEEE, Saixia Lyu, “Location-Aware and
Personalized Collaborative Filtering for Web
Service Recommendation”, Ieee Transactions On
Services Computing, 2015.
5. M. P. Papazoglou and D. Georgakopoulos,
“Service-Oriented computing,” Communications of
the ACM, 2003, pp. 46(10):24–28.
6. G. Kang, J. Liu, M. Tang, X.F. Liu, and K. K. Fletcher,
“Web Service Selection for Resolving Conflicting
Service Requests,” in Proc. 9th International
Conference on Web Services, Washington, DC, USA,
July, 2011, pp. 387-394.
7. Herlocker, J.L.,Konstan, J.A.,Borchers, A.,Riedl,
J.:Analgorithmic framework for performing
collaborative filtering. In: Proceedings of the 22nd
International ACM SIGIR Conference on Research
and Development in Information Retrieval
(SIGIR’99), pp. 230–237 (1999).
8. Hofmann, T.: Collaborative filtering via gaussian
probabilistic latent semantic analysis. In:
Proceedings of the 26th International ACM SIGIR
Conference on Research and Development in
Information Retrieval (SIGIR’03), pp. 259–266
(2003).
9. Hofmann, T.: Latent semantic models for
collaborative filtering. ACM Trans. Inf. Syst. 22(1),
89–115 (2004).
10. Hwang, S., Lim, E., Lee, C., Chen, C.: Dynamic web
service selection for reliable web service
composition. IEEE Trans. Serv. Comput. 1(2),
104–116 (2008).
11. Jin, R., Chai, J.Y., Si, L.: An automatic weighting
scheme for collaborative filtering. In: Proceedings
of the 27th International ACM SIGIR Conference
on Research and Development in Information
Retrieval (SIGIR’04), pp. 337–344 (2004).
12. Kang, G.,Liu, J.,Tang, M.,Liu,X., Cao,
B.,Xu,Y.:AWSR:activeweb service recommendation
based on usage history. In: Proceedings of the
19th International Conference on Web Services
(ICWS’12), pp. 186–193 (2012).
13. Karta, K.: An investigation on personalized
collaborative filtering for web service selection.
Honours Programme thesis, University of
Western Australia, Brisbane (2005).
14. Linden, G., Smith, B., York, J.: Amazon.com
recommendations: Item-to-item collaborative
filtering. IEEE Internet Comput. 7(1), 76–80
(2003).
15. Lo,W.,Yin, J.,Deng, S., Li,Y.,Wu, Z.:
Collaborativeweb serviceQoS prediction with
locationbased regularization. In: Proceedings of
the 19th International Conference on Web
Services (ICWS’12), pp. 464–471 (2012).
16. Ma, H., King, I., Lyu, M.R.: Effective missing data
prediction for collaborative filtering. In:
Proceedings of the 30th International ACM SIGIR
Conference on Research and Development in
Information Retrieval (SIGIR’07), pp. 39–46
(2007).
17. Manning, C.D., Raghavan, P., Schtze H.: An
Introduction to Information Retrieval. Cambridge
University Press, Cambridge (2009).

More Related Content

What's hot

AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...IJwest
 
A ranking mechanism for better retrieval of data from cloud
A ranking mechanism for better retrieval of data from cloudA ranking mechanism for better retrieval of data from cloud
A ranking mechanism for better retrieval of data from cloudeSAT Publishing House
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit SolutionAdrit Techno Solutions
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
A new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web servicesA new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web servicesIJECEIAES
 
Concepts and Derivatives of Web Services
Concepts and Derivatives of Web ServicesConcepts and Derivatives of Web Services
Concepts and Derivatives of Web ServicesIOSR Journals
 
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOST
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTMOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOST
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTijwscjournal
 
Mobile web service provisioning and
Mobile web service provisioning andMobile web service provisioning and
Mobile web service provisioning andijwscjournal
 
Metrolink Networks - Cloud Migration Case Study: SHBrooks
Metrolink Networks - Cloud Migration Case Study: SHBrooksMetrolink Networks - Cloud Migration Case Study: SHBrooks
Metrolink Networks - Cloud Migration Case Study: SHBrooksHusein Sharaf
 
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...IJECEIAES
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...Conference Papers
 
Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Conference Papers
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...IEEEFINALYEARPROJECTS
 
2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and AssertionsRudolf Husar
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Conference Papers
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSijwscjournal
 

What's hot (20)

AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...
AGENTS AND OWL-S BASED SEMANTIC WEB SERVICE DISCOVERY WITH USER PREFERENCE SU...
 
A ranking mechanism for better retrieval of data from cloud
A ranking mechanism for better retrieval of data from cloudA ranking mechanism for better retrieval of data from cloud
A ranking mechanism for better retrieval of data from cloud
 
Networking java titles Adrit Solution
Networking java titles Adrit SolutionNetworking java titles Adrit Solution
Networking java titles Adrit Solution
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
A new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web servicesA new approach to gather similar operations extracted from web services
A new approach to gather similar operations extracted from web services
 
Concepts and Derivatives of Web Services
Concepts and Derivatives of Web ServicesConcepts and Derivatives of Web Services
Concepts and Derivatives of Web Services
 
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOST
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOSTMOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOST
MOBILE WEB SERVICE PROVISIONING AND PERFORMANCE EVALUATION OF MOBILE HOST
 
Mobile web service provisioning and
Mobile web service provisioning andMobile web service provisioning and
Mobile web service provisioning and
 
Metrolink Networks - Cloud Migration Case Study: SHBrooks
Metrolink Networks - Cloud Migration Case Study: SHBrooksMetrolink Networks - Cloud Migration Case Study: SHBrooks
Metrolink Networks - Cloud Migration Case Study: SHBrooks
 
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
Prediction Based Efficient Resource Provisioning and Its Impact on QoS Parame...
 
The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...The design and implementation of trade finance application based on hyperledg...
The design and implementation of trade finance application based on hyperledg...
 
Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)Hybrid dental charting system (hy decs)
Hybrid dental charting system (hy decs)
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions2005-03-29 Web Services: ES Rationale and Assertions
2005-03-29 Web Services: ES Rationale and Assertions
 
Paper review
Paper review Paper review
Paper review
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...Novel character segmentation reconstruction approach for license plate recogn...
Novel character segmentation reconstruction approach for license plate recogn...
 
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONSA COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
A COMPREHENSIVE SOLUTION TO CLOUD TRAFFIC TRIBULATIONS
 

Similar to Location-Aware CF Method Improves Web Service QoS Prediction

Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesIRJET Journal
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsIRJET Journal
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud ComputingIRJET Journal
 
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
 
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...1crore projects
 
Multiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks ManagementMultiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks Managementrahulmonikasharma
 
Web Service Recommendation using Collaborative Filtering
Web Service Recommendation using Collaborative FilteringWeb Service Recommendation using Collaborative Filtering
Web Service Recommendation using Collaborative FilteringIRJET Journal
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET Journal
 
Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...IRJET Journal
 
Streamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AIStreamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AIIRJET Journal
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingIRJET Journal
 
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...IRJET Journal
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesIRJET Journal
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...IEEEGLOBALSOFTTECHNOLOGIES
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...IRJET Journal
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationswathi78
 
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationA Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationIRJET Journal
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...IEEEFINALYEARSTUDENTPROJECT
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...IEEEBEBTECHSTUDENTSPROJECTS
 

Similar to Location-Aware CF Method Improves Web Service QoS Prediction (20)

Evaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web ServicesEvaluation of a Framework for Integrated Web Services
Evaluation of a Framework for Integrated Web Services
 
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional DatasetsProjection Multi Scale Hashing Keyword Search in Multidimensional Datasets
Projection Multi Scale Hashing Keyword Search in Multidimensional Datasets
 
IRJET- An Overview on Mobile Cloud Computing
IRJET-  	  An Overview on Mobile Cloud ComputingIRJET-  	  An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
 
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
 
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
Location-Aware and Personalized Collaborative Filtering for Web Service Recom...
 
Multiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks ManagementMultiservice Delivery in Wireless Networks Management
Multiservice Delivery in Wireless Networks Management
 
Web Service Recommendation using Collaborative Filtering
Web Service Recommendation using Collaborative FilteringWeb Service Recommendation using Collaborative Filtering
Web Service Recommendation using Collaborative Filtering
 
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework EnvironmentIRJET- Pervasive Computing Service Discovery in Secure Framework Environment
IRJET- Pervasive Computing Service Discovery in Secure Framework Environment
 
E0341021025
E0341021025E0341021025
E0341021025
 
Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...Providing highly accurate service recommendation for semantic clustering over...
Providing highly accurate service recommendation for semantic clustering over...
 
Streamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AIStreamlining Home Service Website with Virtual Assistant AI
Streamlining Home Service Website with Virtual Assistant AI
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social NetworkingTravel Recommendation Approach using Collaboration Filter in Social Networking
Travel Recommendation Approach using Collaboration Filter in Social Networking
 
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
Study and Implementation of a Personalized Mobile Search Engine for Secure Se...
 
EPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phonesEPLQ:Efficient privacy preserving spatial range query for smart phones
EPLQ:Efficient privacy preserving spatial range query for smart phones
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
STUDY OF EVALUATION AND ASSESSMENT OF A CONSOLIDATED INTERNET SERVICE ARRANGE...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service RecommendationA Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
A Privacy-Preserving QoS Prediction Framework for Web Service Recommendation
 
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
2014 IEEE JAVA PARALLEL DISTRIBUTED PROJECT Web service recommendation via ex...
 
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
2014 IEEE JAVA SERVICE COMPUTING PROJECT Web service recommendation via explo...
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Location-Aware CF Method Improves Web Service QoS Prediction

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1480 SITUATION ALERT AND QUALITY OF SERVICE USING COLLABORATIVE FILTERING FOR WEB PROVISION RECOMMENDATION *1Mrs. Tamilselvi. S, *2 Mrs. Anette Regina. I *1M.phil Research Scholar, Department of computer Science Muthurangam Government Arts College (Autonomous), Vellore, Tamilnadu, India. *2Assistant Prof, Department of Computer Science Muthurangam Government Arts College (Autonomous), Vellore. ---------------------------------------------------------------------***-------------------------------------------------------------------- Abstract - Collaborative Filtering (CF) is widely employed for making Web service recommendation. CF-based Web service recommendation aims to predict missing QoS (Quality-of-Service) values of Web services. Although several CF-based Web service QoS prediction methods have been proposed in recent years, the performance still needs significant improvement. Firstly, existing QoS prediction methods seldom consider personalized influence of users and services when measuring the similarity between users and between services. Secondly, Web service QoS factors, such as response time and throughput, usually depends on the locations of Web services and users. However, existing Web service QoS prediction methods seldom took this observation into consideration. In this paper, we propose a location-aware personalized CF method for Web service recommendation. The proposed method leverages both locations of users and Web services when selecting similar neighbors for the target user or service. The method also includes an enhanced similarity measurement for users and Web services, by taking into account the personalized influence of them. To evaluate the performance of our proposed method, we conduct a set of comprehensive experiments using a real-world Web service dataset. The experimental results indicate that our approach improves the QoS prediction accuracy and computational efficiency significantly, compared to previous CF-based methods. Key Words: location based service, CF method, Qos prediction method , CF based web service. I. INTRODUCTION The thesis is based on the sole interest of the author for location-based matters. Twenty years ago, it was not possible for an outsider in a foreign country or city to quickly locate an ATM, get some cash and rush to a McDonald's restaurant to grab a nice lunch without the need to ask the locale for direction or running back and forth aimlessly. However, nowadays, a foreigner can confidently locate himself and get to his desired places in short time, all thanks to the development of location-based services. Mobile communication systems were originally created in order to serve communication purposes. However, with the recent demand from users to have data and transaction services implemented within their own mobile devices, mobile communication service providers have been investing great a amount of resources into creating location sensitive service platforms. Such services use voice or text sequences as input and return geographical information or recommendations. In order to create valuable outputs, location- based services require properly functional recommender systems to pick up the most suitable information among vast amount of available data. Basically, a typical recommender system combines knowledge about customers ( personal preferences, buying habits...) service items (prices, features...) and the interaction between customers and the location-based service platforms (ratings, likes, dislikes) to recommend services that users are likely to find attractive. However, location-based services are not free of problems. Since they deal with a large amount of data and some of the data is very valuable and sensitive, location- based services have become favorite targets of hackers and data thieves who are skillful and willing enough to get themselves any piece data they want. In location-based services, knowing a user's information usually means knowing that customer's location and whereabouts, which means jeopardizing the user's privacy and security. The knowledge intended to help provide customers with better choices now, having fallen into the wrong hands, becomes an effective weapon against the customers and the service providers themselves. In order to protect their customers' data from intruders, location-based service providers must know what threats they are dealing with and design systems and mechanisms that are able to protect their customers' information and privacy. Of the available location-based service currently, the social network named Foursquare has proved itself to be one of the most successful participants of the location-based playground. Foursquare has been able to see through the market value of location data and therefore identified the right sector of location-based service to do business with and has managed to, to some considerable extend, satisfy and attract users with timely and pleasant services as well as resolve nuisances and threats that would occur. Foursquare will be introduced in this thesis alongside theories as examples.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1481 Motivation In fact, countless people have been using location- based products for a long time yet not being aware of the true nature of what they are using. To some extents, this lack of knowledge is dangerous because, since people have no clear idea about several aspects of the services they are using, they are exposed to location information security breaches, which may result in disastrous outcomes to the privacy, reputation or even physical well-being of the naive users. In the thesis, an entire chapter is dedicated to studying data security threats of LBSs. This means a considerable amount of clear, simple yet refined knowledge of LBS security that could be easily understood by any average citizen who wants to know and try to protect himself while using LBSs. In addition, the thesis also includes a large section of business-related matters of LBSs. In other words, anybody starting a business can consider the thesis a reliable source of reference to get some idea about what does it mean to do LBS business. Finally, the thesis will come in handy for people who are considering using the foursquare social network. The thesis utilizes the features and characteristics of Foursquare as the basis to compare, contrast and explain several aspects of LBS, meaning that multiple important points to be considered when deciding whether or not to join Four square are included in or can be answered using information provided in the thesis. Fig1 : Structure Of Thesis Existing system QoS is usually defined as a set of non-functional properties, such as response time, throughput, reliability, and so on. Due to the paramount importance of QoS in building successful service-oriented applications, QoS- based Web service discovery and selection has garnered much attention from both academia and industry. a user prefers to select a Web service with the best QoS performance, provided that a set of Web service candidates satisfying his/her functional requirements are discovered. In reality, however, it is neither easy nor practical for a user to acquire the QoS for all Web service candidates, due to the following reasons: Web service Qos is highly depend on both users’ and Web services’ Proposed system We proposed an enhanced measurement for computing QoS similarity between different users and between different services. The measurement takes into account the personalized deviation of Web services’ QoS and users’ QoS experiences, in order to improve the accuracy of similarity computation. Based on the above enhanced similarity measurement, we proposed a location-aware CF-based Web service QoS prediction method for service recommendation. We conducted a set of comprehensive experiments employing a real-world Web service dataset, which demonstrated that the proposed Web service QoS prediction method significantly outperforms previous well-known methods. We also incorporate the locations of both Web services and users into similar neighbor selection, for both Web services and users. Comprehensive experiments conducted on a real Web service dataset indicate that our method significantly outperforms previous CF-based Web service recommendation methods. System Architecture System Architecture
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1482 III. PREVIOUS IMPLEMENTATIONS Empirical data collection – interview Secondly, empirical data is collected through personal interviews. No other information about the interviewees, except their ideas is provided in the thesis so as to protect the privacy of the interviewees. Interviews are mainly done between the thesis author and location- based service users and experts. To be specific, the thesis author has chosen sixteen users and two former employees of the social network Foursquare for interview. The reason for interviewing users is that empirical data is most usually applied in chapter 6 where a customer-oriented study is conducted. This means those customers' points of view matters most for the development of the chapter. However, interviewees are not randomly selected. Only people who are personally known by the author to have spent a considerable amount of time using location-based services and who have exclusive original experience with such services are invited for interview so as to keep the interview results in high quality and reliability. In addition, idea exchanges and interviews with some former employees of the social network Foursquare also provide valuable, deep and practical information and experience in the development of location-based services. Interview based data is noted, analyzed, refined and then combined with Theoretical data from literature reviews to test whether such theoretical data is correct and applicable or they are mere unreasonable theories. Research framework IV. SYSTEM IMPLEMETNATION Location based services infrastructure In order for a LBS to function properly, the combination of the below components is required: Component of LBS Users & Mobile devices: Users are the operators of the mobile devices and the people who exploit the utilities of other infrastructure components in order to get information. Mobile devices are used to send requests to and receive results from LBS. Mobile devices can be mobile phones, PDAs, laptops, GPS devices or public information stations. Communication networks: The wireless network plays a vital role in connecting users (through mobile devices) and the LBS providers. The user's requests are sent via the communication network into the Internet then to the LBS provider and vice versa. Positioning systems: Positioning systems gather and input user's location information into the requests sent to LBS providers. For cases in which the user wants to search for a route, his position will be required to calculate the way to his desired location. When the user demands technical or medical care, his location information will help the (technical/medical) service providers to provide better and quicker services. Service and content Providers: LBS providers distribute the software and services that are able to process the user's query and weaved responses to the user. Content providers (map agencies, yellow pages) store and distribute geographic data that can be requested by the users or the LBS providers.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1483 Data collection in LBS In LBS, location data is collected using different positioning systems; each of the systems provides different aspects and characteristics of spatial data. However, there are basic requirements and general components that make up a positioning system. Coordinate systems allow LBS data providers to assign different locations with different, unique "address" for the sake of effective and easy geographical identification process. To present locations on a flat space, the choice most often falls the famous Latitude and Longitude model. However, depending on different task requirements and data aspects, other forms of coordinate systems are created and widely used: the Cartesian coordinates, the Shape of the Earth and Universal Polar Stereographic... Scope: This can be defined as the meaning of the coordinates given. In practice, it would be better if location data services give users names such as "University of..." or "KFC" than showing coordinate numbers. Coverage: The extent of geographical areas to which the positioning system is able to reach. The coverage is especially related to the scope of the system. However, there are numerous cases in which the coverage level of a system is smaller in area than what is defined by the scope. Precision: Users and service providers using geographic data must be aware of the fact that the ability of a positioning system to accurately pin-point a location often varies depending on reasons other than the system mechanism. Among the factors that can lead to an inaccurate calculation are environmental conditions (temperature, heat, wind speed...). In short, customers of location data must be ready to often face (from minor to serious) accuracy problems when querying information about locations that usually experience environmental turbulences Cellular network-based positioning Collaboration filtering algorithm Int [] randoms = we.getRandomUsers (original); Int [] lines = new Int [randoms.length]; Int [] columns = new int [randoms.length]; Arrays.sort(randoms); Int counter = 0; for ( Int d : randoms){ lines[counter] = d/100; columns[counter] = d%100; counter++; } we.getRandomList(lines, columns, original, sheetData); In the above getRandomList will generate 500 random numbers from that random numbers which rating is to be picked up by using the division with 30 (number of users). For example, if one of the random numbers is 307, the user will be 10 th user (307 / 30 = 10) where 10 is dividend and item will be 7 (307 % 30 = 7) where 7 will be remainder. Here ‘lines’ represents the users and ‘columns’ represents the items. Lines[i] and columns[k] together will represents ith user’s rating on k item. The last line we.getRandomList(lines, columns, original, sheetData);) is responsible for populating randomly picked 500 ratings from ‘original’ list to ‘sheetData’ NBSSimblanceRow[] nbsSimilarRows = null; NBSSimblanceRow oNBSSimblanceRow = null; ArrayList<NBSSimblanceRow[]> listSimblances = new ArrayList<NBSSimblanceRow[]>(); For (Int i=0; i<30; i++) { nbsSimilarRows = new NBSSimblanceRow[30]; For ( int j=0; j<30; j++) { oNBSSimblanceRow = new NBSSimblanceRow(); nbsSimilarRows[j] = oNBSSimblanceRow; } listSimblances.add(nbsSimilarRows); } The first problem manifested itself during adjusted-cosine similarity measurement calculation, in the case when there was only one common user between movies. Since we subtract the average rating for the user, the adjusted-cosine similarity for items with only one common user is 1, which is the highest possible value. As a result, for such items, which are common in the Movielens database, the most similar items end up being only these items with one common user. The solution we implemented was to specify a minimum number of users (in this case, 5) that two movies needed to have in common before they could be called similar. In the above line of code, initialize arraylist which holds the semblances is performed. then ‘listSimblances’ will contain 30 entries in which each entry will contain 30 NBSSimblanceRow objects which are responsible for holding the row number and its semblance with current row. i.e, if 30 users are taken, then semblance list for the 1st row (user) will contain 30 NBSSimblanceRow objects (including the self) each one containing its row number and its semblance with the 1st row. we. Populate
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1484 Rows(listSimblances,sheetData); In the above line of code, the semblances values are calculated and then populate in ‘listSimblances’ for(int i=0; i<30; i++) { nbsSimilarRows = listSimblances.get(i); Arrays.sort(nbsSimilarRows, we. New MyComparator()); } In the above lines, we are sorting the obtained semblances. List sheetData1 = ((List) ((ArrayList) sheetData).clone()); Hashtable table = new Hashtable (); for( int i=4; i<30; i=i+4) { List s3 = we.populatePredictUJ(s heetData1, listSimblances, i); List s4 = new ArrayList (); Double mae = we.getMAE(sheetData, original, s3); BigDecimal z1 = new BigDecimal(mae).setScale(2,BigDecimal.ROUND_ HALF_UP); mae = z1.doubleValue(); System.out.println(" For neighbourset size -- " + i +" MAE is " + mae); table.put( new Double(i), mae) ; } The second challenge arose when we used weighted sum to calculate the rating for test user-movie pairs. Since we were storing only 50 similar movies for each movie, and for each target movie, we only consider the similar movies that the active user has seen, it was often the case with the Movielens dataset that there weren't many such movies for many of the users. This resulted in bad predictions overall for large test sets. Because this was due to the sparsity of the dataset itself, we couldn't come up with a straightforward solution to this problem. Neighborhood-based approach Most collaborative filtering systems apply the so called neighborhood-based technique. In the neighborhood-based approach a number of users is selected based on their similarity to the active user. A prediction for the active user is made by calculating a weighted average of the ratings of the selected users. makes recommendations consider the example in movie ratings table below. This shows the ratings of five movies by five people. A “+” indicates that the person liked the movie and a “-“ indicates that the person did not like the movie. To predict if Ken would like the movie “Fargo”, Ken’s ratings are compared to the ratings of the others. In this case the ratings of Ken and Mike are identical and because Mike liked Fargo, one might predict that Ken likes the movie as well. Movie ratings Instead of just relying on the most similar person, a prediction is normally based on the weighted average of the recommendations of several people. The weight given to a person’s ratings is determined by the correlation between that person and the person for whom to make a prediction. As a measure of correlation the Pearson correlation coefficient can be used. In this example a positive rating has the value 1 while a negative rating has the value –1, but in other cases a rating could also be a continuous number. The ratings of person X and Y of the item k are written as and , while and are the mean values of their ratings. The correlation between X and Y is then given by: In this formula k is an element of all the items that both X and Y have rated. A prediction for the rating of person X of the item i based on the ratings of people who have rated item i is computed as follows: Where Y consists of all the n people who have rated item i. Note that a negative correlation can also be used as a weight. For example, because Amy and Jef have a negative correlation and Amy did not like “Farg” could be used as an indication that Jef will enjoy “Fargo”. The Pearson correlation coefficient is used by several collaborative filtering systems including. GroupLens, a system that filters articles on Usenet, was the first to incorporate a neighborhood-based algorithm. In GroupLens a prediction is made by computing the weighted average of deviations from the neighbor’s mean: To illustrate how a collaborative filtering system
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1485 Note that if no one has rated item i the prediction is equal to the average of all the ratings person X has made. Ringo recommends music albums and artists a person might be interested in. Shardanand considers several collaborative algorithms and reports that a constrained Pearson r algorithm performs best for Ringo’s information domain. The constrained Pearson measure is similar to the normal Pearson measure but uses the mean value of possible rating values (in this case the average is 4) instead of the mean values of the ratings of person X and Y. Pearson correlation coefficient for movie ratings  Assuming is Every one of the names have seen any of the above movie  Let 1 denote seen  Let 0 denote not seen Correlation between two products T(a, b) = Na = Number of customer who Bought Product A! Nb = Number of customer who Bought Product B! Nc = Number of customer who Both Product A and Product B! Similarities between products C( a, b )= Selecting Neighborhoods Many collaborative filtering systems have to be able to handle a large number of users. Making a prediction based on the ratings of thousands of people has serious implications for run-time performance. Therefore, when the number of users reaches a certain amount a selection of the best neighbors has to be made. Two techniques, correlation-thresholding and best-n-neighbor, “Algorithms” : “RecommenderSystems”, “id” : “Example”} 0! 1! 1! 1! 1! 0! 1! 1! 0! 1! 0! 0! 1! 0! 1! 1! 1! 1! 1! 1! 1! 0! 1! 1! 1! 0! 0! 0! 1! 1! 1! 0! 1! 1! 0! 1! BinaryValues Recommendation! Alice! Bob! John! Jane! Bill! Steve! Larry! Don! Jack! 14012 15 { “Algorithms” : “Recommender Systems” , “Similarity” : “Tan 1! 1/3 – 0.33! 5/8 – 0.625! 5/8 – 0.625! 1/3 – 0.33! 1! 3/8 – 0.375! 3/8 – 0.375! 5/8 – 0.625! 3/8 – 0.375! 1! 5/7 – 0.714! 5/8 – 0.625! 3/8 – 0.375! 5/7 – 0.714! 1! Tanimoto Coe NA – Number who bough NB – Number o bought P Nc – Number o bought both P Prod Friday 2 March 2012 16 { “Algorithms” : “Recommender Systems” , “Similarity” : “Co 1! 0.507! 0.772! 0.772! 0.507! 1! 0.707! 0.707! 0.772! 0.707! 1! 0.833! 0.772! 0.707! 0.833! 1! Cosine Co NA – Numb who bou NB – Numbe bough Nc – Number bought bot Pr Friday 2 March 2012
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1486 can be used to determine which neighbors to select. The first technique selects only those neighbors whose correlation is greater than a given threshold. The second technique selects the best n neighbors with the highest correlation. Flowchart for finding best n neighbors V EVALUATION RESULT EXPERIMENTAL RESULT The methodology followed for conducting the study includes the specification of research design, sample design, questionnaire design and data collection used for analyzing the collected data. 7.1 Research design: The research design used for this study is of the descriptive type. Descriptive research studies are those studies which are concerned with describing the characteristics of a particular individual or a group. 7.2 Sample size: The sample size consisting of 45 respondents were selected for the study. 7.3 Sampling design: Since it is difficult to contact the entire population, sampling technique was adopted. The employees were interviewed using convenience sampling techniques. 7.4 Questionnaire design: Questionnaire was designed in consultation with the experts in such a manner that it would facilitate the respondents to reveal maximum information. 7.5 Data collection: The primary data was collected by using questionnaires. The questionnaire has 28 questions excluding marital status, age, factor prompted to join reliance. A five point scale was used such as strongly disagree, disagree, neutral, agree and strongly agree. 7.6 Limitations of the study The limitations of the study are as follows:  The size of the sample was only 45.  Some of the respondents were not responding to some of the questions posted.  Due to the time constraint the research was not carried out to the desired level. Pie Chart result for Job Profile Pie Chart result for Manager Get a Random Permutation Start Define a hash function h such that h(Ui )=min. ranked Pass each user through the Hash function to get the After the Clusters have been formed, Use Covisitation to find out Stop Cache the Recommenda tions in Memory M e m or y
  • 8. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 11 | Nov -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1487 Pie Chart result for Compensation REFERENCES: 1. Y. Zhang and Y. Fang, „„A Fine-Grained Reputation System forReliable Service Selection in Peer-to-Peer Networks,‟‟ IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1134-1145, Aug. 2007. 2. Z. Zheng, X. Wu, Y. Zhang, M.R. Lyu, and J. Wang, „„QoS Ranking Prediction for Cloud Services,‟‟ IEEE Trans. Parallel Distrib. Syst., vol. 24, no. 6, pp. 1213-1222, June 2013. 3. B. Mehta, C. Niederee, A. Stewart, C. Muscogiuri, and E.J.Neuhold, “An Architecture for Recommendation Based Service Mediation,” Semantics of a Networked World, vol. 3226, pp. 250-262, 2004. 4. Jianxun Liu, Mingdong Tang, Member, IEEE, Zibin Zheng, Member, IEEE, Xiaoqing (Frank) Liu, Member, IEEE, Saixia Lyu, “Location-Aware and Personalized Collaborative Filtering for Web Service Recommendation”, Ieee Transactions On Services Computing, 2015. 5. M. P. Papazoglou and D. Georgakopoulos, “Service-Oriented computing,” Communications of the ACM, 2003, pp. 46(10):24–28. 6. G. Kang, J. Liu, M. Tang, X.F. Liu, and K. K. Fletcher, “Web Service Selection for Resolving Conflicting Service Requests,” in Proc. 9th International Conference on Web Services, Washington, DC, USA, July, 2011, pp. 387-394. 7. Herlocker, J.L.,Konstan, J.A.,Borchers, A.,Riedl, J.:Analgorithmic framework for performing collaborative filtering. In: Proceedings of the 22nd International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’99), pp. 230–237 (1999). 8. Hofmann, T.: Collaborative filtering via gaussian probabilistic latent semantic analysis. In: Proceedings of the 26th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’03), pp. 259–266 (2003). 9. Hofmann, T.: Latent semantic models for collaborative filtering. ACM Trans. Inf. Syst. 22(1), 89–115 (2004). 10. Hwang, S., Lim, E., Lee, C., Chen, C.: Dynamic web service selection for reliable web service composition. IEEE Trans. Serv. Comput. 1(2), 104–116 (2008). 11. Jin, R., Chai, J.Y., Si, L.: An automatic weighting scheme for collaborative filtering. In: Proceedings of the 27th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’04), pp. 337–344 (2004). 12. Kang, G.,Liu, J.,Tang, M.,Liu,X., Cao, B.,Xu,Y.:AWSR:activeweb service recommendation based on usage history. In: Proceedings of the 19th International Conference on Web Services (ICWS’12), pp. 186–193 (2012). 13. Karta, K.: An investigation on personalized collaborative filtering for web service selection. Honours Programme thesis, University of Western Australia, Brisbane (2005). 14. Linden, G., Smith, B., York, J.: Amazon.com recommendations: Item-to-item collaborative filtering. IEEE Internet Comput. 7(1), 76–80 (2003). 15. Lo,W.,Yin, J.,Deng, S., Li,Y.,Wu, Z.: Collaborativeweb serviceQoS prediction with locationbased regularization. In: Proceedings of the 19th International Conference on Web Services (ICWS’12), pp. 464–471 (2012). 16. Ma, H., King, I., Lyu, M.R.: Effective missing data prediction for collaborative filtering. In: Proceedings of the 30th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR’07), pp. 39–46 (2007). 17. Manning, C.D., Raghavan, P., Schtze H.: An Introduction to Information Retrieval. Cambridge University Press, Cambridge (2009).