This document describes a proposed algorithm for improving recommendation systems for e-services. It involves the following key steps:
1. Clustering customer transaction histories to group similar purchase patterns and derive customer-based recommendations.
2. Using incremental association rule mining on the transaction data to detect frequently purchased item sets and relationships between items.
3. Developing a fuzzy model to classify customers and provide dynamic recommendations tailored to different customer types. The recommendations will be based on matching customer preferences and purchase histories to specific product sets.
4. The algorithm clusters transactions, mines association rules incrementally as new data is added, and generates recommendations by classifying customers and matching them to relevant product clusters. This provides a personalized and
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...IJDKP
Recommendation becomes a mainstream feature in nowadays e-commerce because of its significant
contributions in promoting revenue and customer satisfaction. Given hundreds of millions of user activity
logs and product items, accurate and efficient recommendation is a challenging computational task. This
paper introduces a new soft hierarchical clustering algorithm - Fuzzy Hierarchical Co-clustering (FHCC)
algorithm, and applies this algorithm to detect user-product joint groups from users’ behavior data for
collaborative filtering recommendation. Via FHCC, complex relations among different data sources can be
analyzed and understood comprehensively. Besides, FHCC is able to adapt to different types of
applications according to the accessibility of data sources by carefully adjust the weights of different data
sources. Experimental evaluations are performed on a benchmark rating dataset to extract user-product
co-clusters. The results show that our proposed approach provide more meaningful recommendation
results, and outperforms existing item-based and user-based collaborative filtering recommendations in
terms of accuracy and ranked position.
Structural Balance Theory Based Recommendation for Social Service PortalYogeshIJTSRD
There is enormous data present in our world. Therefore in order to access the most accurate information is becoming more difficult and complicated. As a result many relevant information gets missed which leads to much duplication of work and effort. Due to the huge search results, the user will generally have difficulty in identifying the relevant ones. To solve this problem, a recommendation system is used. A recommendation system is nothing but a filtering information system, which is used to predict the relevance of retrieved information according to the user’s needs for some criteria. Hence, it can provide the user with the results that best fit their needs. The services provided through the web normally provide huge records about any requested item or service. A proper recommendation system is used to separate this information result. A recommendation system can be improved further if supported with a level of trust information. That is, recommendations are prioritized according to their level of trust. Recommending appropriate needs social service to the target volunteers will become the key to ensure continuous success of social service. Today, many social service systems does not adopt any recommendation techniques. They provide advertisement or highlights request for a small commission. G. Banupriya | M. Anand "Structural Balance Theory-Based Recommendation for Social Service Portal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41216.pdf Paper URL: https://www.ijtsrd.comengineering/software-engineering/41216/structural-balance-theorybased-recommendation-for-social-service-portal/g-banupriya
Data mining is the analysis of (often large) observational data sets to find unsuspected relationships and to summarize the data in novel ways that are both understandable and useful to the data owner.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Incentive Compatible Privacy Preserving Data Analysisrupasri mupparthi
Now a days, data management applications have evolved from pure storage and retrieval of information to finding interesting patterns and associations from large amounts of data. With the advancement of Internet and networking technologies, more and more computing applications, including data mining programs, are required to be conducted among multiple data sources that scattered around different spots, and to jointly conduct the computation to reach a common result. However, due to legal constraints and competition edges, privacy issues arise in the area of distributed data mining, thus leading to the interests from research community of both data mining.
In this project each party participates in a protocol to learn the output of some function f over the joint inputs of the parties. We mainly focus on the DNCC model instead of considering a probabilistic extension. Deterministic Non Cooperative Computation needs to be extended to include the possibility of collusion.
FHCC: A SOFT HIERARCHICAL CLUSTERING APPROACH FOR COLLABORATIVE FILTERING REC...IJDKP
Recommendation becomes a mainstream feature in nowadays e-commerce because of its significant
contributions in promoting revenue and customer satisfaction. Given hundreds of millions of user activity
logs and product items, accurate and efficient recommendation is a challenging computational task. This
paper introduces a new soft hierarchical clustering algorithm - Fuzzy Hierarchical Co-clustering (FHCC)
algorithm, and applies this algorithm to detect user-product joint groups from users’ behavior data for
collaborative filtering recommendation. Via FHCC, complex relations among different data sources can be
analyzed and understood comprehensively. Besides, FHCC is able to adapt to different types of
applications according to the accessibility of data sources by carefully adjust the weights of different data
sources. Experimental evaluations are performed on a benchmark rating dataset to extract user-product
co-clusters. The results show that our proposed approach provide more meaningful recommendation
results, and outperforms existing item-based and user-based collaborative filtering recommendations in
terms of accuracy and ranked position.
Structural Balance Theory Based Recommendation for Social Service PortalYogeshIJTSRD
There is enormous data present in our world. Therefore in order to access the most accurate information is becoming more difficult and complicated. As a result many relevant information gets missed which leads to much duplication of work and effort. Due to the huge search results, the user will generally have difficulty in identifying the relevant ones. To solve this problem, a recommendation system is used. A recommendation system is nothing but a filtering information system, which is used to predict the relevance of retrieved information according to the user’s needs for some criteria. Hence, it can provide the user with the results that best fit their needs. The services provided through the web normally provide huge records about any requested item or service. A proper recommendation system is used to separate this information result. A recommendation system can be improved further if supported with a level of trust information. That is, recommendations are prioritized according to their level of trust. Recommending appropriate needs social service to the target volunteers will become the key to ensure continuous success of social service. Today, many social service systems does not adopt any recommendation techniques. They provide advertisement or highlights request for a small commission. G. Banupriya | M. Anand "Structural Balance Theory-Based Recommendation for Social Service Portal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41216.pdf Paper URL: https://www.ijtsrd.comengineering/software-engineering/41216/structural-balance-theorybased-recommendation-for-social-service-portal/g-banupriya
Data mining is the analysis of (often large) observational data sets to find unsuspected relationships and to summarize the data in novel ways that are both understandable and useful to the data owner.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Incentive Compatible Privacy Preserving Data Analysisrupasri mupparthi
Now a days, data management applications have evolved from pure storage and retrieval of information to finding interesting patterns and associations from large amounts of data. With the advancement of Internet and networking technologies, more and more computing applications, including data mining programs, are required to be conducted among multiple data sources that scattered around different spots, and to jointly conduct the computation to reach a common result. However, due to legal constraints and competition edges, privacy issues arise in the area of distributed data mining, thus leading to the interests from research community of both data mining.
In this project each party participates in a protocol to learn the output of some function f over the joint inputs of the parties. We mainly focus on the DNCC model instead of considering a probabilistic extension. Deterministic Non Cooperative Computation needs to be extended to include the possibility of collusion.
Discovering diamonds under coal piles: Revealing exclusive business intellige...IJERA Editor
Web Mining has gained prominence over the last decade. This rise is concomitant with the upsurge of pure
players, the multiple challenges of data deluge, the trend toward automation and integration within organization,
as well as a desire for hyper segmentation. Confronted, partly or totally, with these multiple issues, companies
recourse increasingly to replicate the data mining toolbox on web data. Although much is known about the
technical aspect of WM, little is known about the extent to which WM actually fits within a customer
relationship management system, designed at attracting and retaining the maximum amount of customers. An
exploratory study involving twelve senior professionals and scholars indicated that WM is well-suited to achieve
most of the customer relationship management objective, with regards to the profiling of existing web customers.
The results of this study suggest that the engineering of WM processes into analytic customer relationship
management systems, may yield highly beneficial returns, provided that some guidelines are scrupulously
followed.
PRE-RANKING DOCUMENTS VALORIZATION IN THE INFORMATION RETRIEVAL PROCESScsandit
In this short paper we present three methods to valorise score relevance of some documents
basing on their characteristics in order to enhance their ranking. Our framework is an
information retrieval system dedicated to children. The valorisation methods aim to increase the
relevance score of some documents by an additional value which is proportional to the number
of multimedia objects included, the number of objects linked to the user particulars and the
included topics. All of the three valorization methods use fuzzy rules to identify the valorization
value.
The development of data mining is inseparable from the recent developments in information technology that enables the accumulation of large amounts of data. For example, a shopping mall that records every sales transaction of goods using various POS (point of sales). Database data from these sales could reach a large storage capacity, even more being added each day, especially when the shopping center will develop into a nationwide network. The development of the internet at the moment also has a share large enough in the accumulation of data occurs. But the rapid growth of data accumulation it has created conditions that are often referred to as "data rich but information poor" because the data collected can not be used optimally for useful applications. Not infrequently the data set was left just seemed to be a "grave data". There are several techniques used in data mining which includes association, classification, and clustering. In this paper, the author will do a comparison between the performance of the technical classification methods naïve Bayes and C4.5 algorithms.
Frequent Item set Mining of Big Data for Social MediaIJERA Editor
Big data is a term for massive data sets having large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. Bigdata includes data from email, documents, pictures, audio, video files, and other sources that do not fit into a relational database. This unstructured data brings enormous challenges to Bigdata.The process of research into massive amounts of data to reveal hidden patterns and secret correlations named as big data analytics. Therefore, big data implementations need to be analyzed and executed as accurately as possible. The proposed model structures the unstructured data from social media in a structured form so that data can be queried efficiently by using Hadoop MapReduce framework. The Bigdata mining is essential in order to extract value from massive amount of data. MapReduce is efficient method to deal with Big data than traditional techniques.The proposed Linguistic string matching Knuth-Morris-Pratt algorithm and K-Means clustering algorithm gives proper platform to extract value from massive amount of data and recommendation for user.Linguistic matching techniques such as Knuth–Morris–Pratt string matching algorithm are very useful in giving proper matching output to user query. The K-Means algorithm is one which works on clustering data using vector space model. It can be an appropriate method to produce recommendation for user
A potential objective of every financial organization is to retain existing customers and attain new
prospective customers for long-term. The economic behaviour of customer and the nature of the
organization are controlled by a prescribed form called Know Your Customer (KYC) in manual banking.
Depositor customers in some sectors (business of Jewellery/Gold, Arms, Money exchanger etc) are with
high risk; whereas in some sectors (Transport Operators, Auto-delear, religious) are with medium risk;
and in remaining sectors (Retail, Corporate, Service, Farmer etc) belongs to low risk. Presently, credit risk
for counterparty can be broadly categorized under quantitative and qualitative factors. Although there are
many existing systems on customer retention as well as customer attrition systems in bank, these rigorous
methods suffers clear and defined approach to disburse loan in business sector. In the paper, we have used
records of business customers of a retail commercial bank in the city including rural and urban area of
(Tangail city) Bangladesh to analyse the major transactional determinants of customers and predicting of a
model for prospective sectors in retail bank. To achieve this, data mining approach is adopted for
analysing the challenging issues, where pruned decision tree classification technique has been used to
develop the model and finally tested its performance with Weka result. Moreover, this paper attempts to
build up a model to predict prospective business sectors in retail banking.
Missing data arise in almost all serious statistical analyses. In this post I discuss a variety of methods to handle missing data, including some relatively simple approaches that can often yield reasonable results.
A novel association rule mining and clustering based hybrid method for music ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
Machine learning based recommender system for e-commerceIAESIJAI
Nowadays, e-commerce is becoming an essential part of business for many reasons, including the simplicity, availability, richness and diversity of products and services, flexibility of payment methods and the convenience of shopping remotely without losing time. These benefits have greatly optimized the lives of users, especially with the technological development of mobile devices and the availability of the Internet anytime and anywhere. Because of their direct impact on the revenue of e-commerce companies, recommender systems are considered a must in this field. Recommender systems detect items that match the customer's needs based on the customer's previous actions and make them appear in an interesting way. Such a customized experience helps to increase customer engagement and purchase rates as the suggested items are tailored to the customer's interests. Therefore, perfecting recommendation systems that allow for more personalized and accurate item recommendations is a major challenge in the e-marketing world. In our study, we succeeded in developing an algorithm to suggest personal recommendations to customers using association rules via the Frequent-Pattern-Growth algorithm. Our technique generated good results with a high average probability of purchasing the next product suggested by the recommendation system.
Discovering diamonds under coal piles: Revealing exclusive business intellige...IJERA Editor
Web Mining has gained prominence over the last decade. This rise is concomitant with the upsurge of pure
players, the multiple challenges of data deluge, the trend toward automation and integration within organization,
as well as a desire for hyper segmentation. Confronted, partly or totally, with these multiple issues, companies
recourse increasingly to replicate the data mining toolbox on web data. Although much is known about the
technical aspect of WM, little is known about the extent to which WM actually fits within a customer
relationship management system, designed at attracting and retaining the maximum amount of customers. An
exploratory study involving twelve senior professionals and scholars indicated that WM is well-suited to achieve
most of the customer relationship management objective, with regards to the profiling of existing web customers.
The results of this study suggest that the engineering of WM processes into analytic customer relationship
management systems, may yield highly beneficial returns, provided that some guidelines are scrupulously
followed.
PRE-RANKING DOCUMENTS VALORIZATION IN THE INFORMATION RETRIEVAL PROCESScsandit
In this short paper we present three methods to valorise score relevance of some documents
basing on their characteristics in order to enhance their ranking. Our framework is an
information retrieval system dedicated to children. The valorisation methods aim to increase the
relevance score of some documents by an additional value which is proportional to the number
of multimedia objects included, the number of objects linked to the user particulars and the
included topics. All of the three valorization methods use fuzzy rules to identify the valorization
value.
The development of data mining is inseparable from the recent developments in information technology that enables the accumulation of large amounts of data. For example, a shopping mall that records every sales transaction of goods using various POS (point of sales). Database data from these sales could reach a large storage capacity, even more being added each day, especially when the shopping center will develop into a nationwide network. The development of the internet at the moment also has a share large enough in the accumulation of data occurs. But the rapid growth of data accumulation it has created conditions that are often referred to as "data rich but information poor" because the data collected can not be used optimally for useful applications. Not infrequently the data set was left just seemed to be a "grave data". There are several techniques used in data mining which includes association, classification, and clustering. In this paper, the author will do a comparison between the performance of the technical classification methods naïve Bayes and C4.5 algorithms.
Frequent Item set Mining of Big Data for Social MediaIJERA Editor
Big data is a term for massive data sets having large, more varied and complex structure with the difficulties of storing, analyzing and visualizing for further processes or results. Bigdata includes data from email, documents, pictures, audio, video files, and other sources that do not fit into a relational database. This unstructured data brings enormous challenges to Bigdata.The process of research into massive amounts of data to reveal hidden patterns and secret correlations named as big data analytics. Therefore, big data implementations need to be analyzed and executed as accurately as possible. The proposed model structures the unstructured data from social media in a structured form so that data can be queried efficiently by using Hadoop MapReduce framework. The Bigdata mining is essential in order to extract value from massive amount of data. MapReduce is efficient method to deal with Big data than traditional techniques.The proposed Linguistic string matching Knuth-Morris-Pratt algorithm and K-Means clustering algorithm gives proper platform to extract value from massive amount of data and recommendation for user.Linguistic matching techniques such as Knuth–Morris–Pratt string matching algorithm are very useful in giving proper matching output to user query. The K-Means algorithm is one which works on clustering data using vector space model. It can be an appropriate method to produce recommendation for user
A potential objective of every financial organization is to retain existing customers and attain new
prospective customers for long-term. The economic behaviour of customer and the nature of the
organization are controlled by a prescribed form called Know Your Customer (KYC) in manual banking.
Depositor customers in some sectors (business of Jewellery/Gold, Arms, Money exchanger etc) are with
high risk; whereas in some sectors (Transport Operators, Auto-delear, religious) are with medium risk;
and in remaining sectors (Retail, Corporate, Service, Farmer etc) belongs to low risk. Presently, credit risk
for counterparty can be broadly categorized under quantitative and qualitative factors. Although there are
many existing systems on customer retention as well as customer attrition systems in bank, these rigorous
methods suffers clear and defined approach to disburse loan in business sector. In the paper, we have used
records of business customers of a retail commercial bank in the city including rural and urban area of
(Tangail city) Bangladesh to analyse the major transactional determinants of customers and predicting of a
model for prospective sectors in retail bank. To achieve this, data mining approach is adopted for
analysing the challenging issues, where pruned decision tree classification technique has been used to
develop the model and finally tested its performance with Weka result. Moreover, this paper attempts to
build up a model to predict prospective business sectors in retail banking.
Missing data arise in almost all serious statistical analyses. In this post I discuss a variety of methods to handle missing data, including some relatively simple approaches that can often yield reasonable results.
A novel association rule mining and clustering based hybrid method for music ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A recommender system-using novel deep network collaborative filteringIAESIJAI
The recommendation model aims to predict the user’s preferred items among million through analyzing the user-item relations; furthermore, Collaborative Filtering has been utilized as one of the successful recommendation approaches in last few years; however, it has the issue of sparsity. This research work develops a deep network collaborative filtering (DeepNCF), which incorporates graph neural network (GNN), and novel network collaborative filtering (NCF) for performance enhancement. At first user-item dual network is constructed, thereafter-custom weighted dual mode modularity is developed for edge clustering. Furthermore, GNN is utilized for capturing the complex relation between user and item. DeepNCF is evaluated considering the two distinctive. The experimental analysis is carried out on two datasets for Amazon and movielens dataset for recall@20 and recall@50 and the normalized discounted cumulative gain (NDCG) metric is evaluated for Amazon Dataset for NDCG@20 and NDCG@50. The proposed method outperforms the most relevant research and is accurate enough to give personalized recommendations and diversity.
Machine learning based recommender system for e-commerceIAESIJAI
Nowadays, e-commerce is becoming an essential part of business for many reasons, including the simplicity, availability, richness and diversity of products and services, flexibility of payment methods and the convenience of shopping remotely without losing time. These benefits have greatly optimized the lives of users, especially with the technological development of mobile devices and the availability of the Internet anytime and anywhere. Because of their direct impact on the revenue of e-commerce companies, recommender systems are considered a must in this field. Recommender systems detect items that match the customer's needs based on the customer's previous actions and make them appear in an interesting way. Such a customized experience helps to increase customer engagement and purchase rates as the suggested items are tailored to the customer's interests. Therefore, perfecting recommendation systems that allow for more personalized and accurate item recommendations is a major challenge in the e-marketing world. In our study, we succeeded in developing an algorithm to suggest personal recommendations to customers using association rules via the Frequent-Pattern-Growth algorithm. Our technique generated good results with a high average probability of purchasing the next product suggested by the recommendation system.
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
Dr.G.Anandharaj1, Dr.P.Srimanchari2
1Associate Professor and Head, Department of Computer Science
Adhiparasakthi College of Arts and Science (Autonomous), Kalavai, Vellore (Dt) -632506
2 Assistant Professor and Head, Department of Computer Applications
Erode Arts and Science College (Autonomous), Erode (Dt) - 638001
ABSTRACT
In unpredictable increase in mobile apps, more and more threats migrate from outmoded PC client to mobile device. Compared
with traditional windows Intel alliance in PC, Android alliance dominates in Mobile Internet, the apps replace the PC client
software as the foremost target of hateful usage. In this paper, to improve the confidence status of recent mobile apps, we
propose a methodology to estimate mobile apps based on cloud computing platform and data mining. Compared with
traditional method, such as permission pattern based method, combines the dynamic and static analysis methods to
comprehensively evaluate an Android applications The Internet of Things (IoT) indicates a worldwide network of
interconnected items uniquely addressable, via standard communication protocols. Accordingly, preparing us for the
forthcoming invasion of things, a tool called data fusion can be used to manipulate and manage such data in order to improve
progression efficiency and provide advanced intelligence. In this paper, we propose an efficient multidimensional fusion
algorithm for IoT data based on partitioning. Finally, the attribute reduction and rule extraction methods are used to obtain the
synthesis results. By means of proving a few theorems and simulation, the correctness and effectiveness of this algorithm is
illustrated. This paper introduces and investigates large iterative multitier ensemble (LIME) classifiers specifically tailored for
big data. These classifiers are very hefty, but are quite easy to generate and use. They can be so large that it makes sense to use
them only for big data. Our experiments compare LIME classifiers with various vile classifiers and standard ordinary ensemble
Meta classifiers. The results obtained demonstrate that LIME classifiers can significantly increase the accuracy of
classifications. LIME classifiers made better than the base classifiers and standard ensemble Meta classifiers.
Keywords: LIME classifiers, ensemble Meta classifiers, Internet of Things, Big data
The Internet, which brought the most innovative
improvement on information society, web recommendation
systems based on web usage mining try to mine user’s behavior
patters from web access logs, and recommend pages or
suggestions to the user by matching the user’s browsing behavior
with the mined historical behavior patterns. In this paper we
propose a recommendation framework that considers different
application status and various contexts of each user. We
successfully implemented the proposed framework and show how
this system can improve the overall quality of web
recommendations.
I
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
Web is a rich domain of data and knowledge, which is spread over the world in unstructured manner. The
number of users is continuously access the information over the internet. Web mining is an application of data
mining where web related data is extracted and manipulated for extracting knowledge. The data mining is used
in the domain of web information mining is refers as web mining, that is further divided into three major
domains web uses mining, web content mining and web structure mining. The proposed work is intended to
work with web uses mining. The concept of web mining is to improve the user feedbacks and user navigation
pattern discovery for a CRM system. Finally a new algorithm HMM is used for finding the pattern in data,
which method promises to provide much accurate recommendation.
Recommender System (RS) has emerged as a significant research interest that aims to assist users to seek out items online by providing suggestions that closely match their interests. Recommender system, an information filtering technology employed in many items is presented in internet sites as per the interest of users, and is implemented in applications like movies, music, venue, books, research articles, tourism and social media normally. Recommender systems research is usually supported comparisons of predictive accuracy: the higher the evaluation scores, the higher the recommender. One amongst the leading approaches was the utilization of advice systems to proactively recommend scholarly papers to individual researchers. In today's world, time has more value and therefore the researchers haven't any much time to spend on trying to find the proper articles in line with their research domain. Recommender Systems are designed to suggest users the things that best fit the user needs and preferences. Recommender systems typically produce an inventory of recommendations in one among two ways -through collaborative or content-based filtering. Additionally, both the general public and also the non-public used descriptive metadata are used. The scope of the advice is therefore limited to variety of documents which are either publicly available or which are granted copyright permits. Recommendation systems (RS) support users and developers of varied computer and software systems to beat information overload, perform information discovery tasks and approximate computation, among others.
Enhanced Web Usage Mining Using Fuzzy Clustering and Collaborative Filtering ...inventionjournals
Information is overloaded in the Internet due to the unstable growth of information and it makes information search as complicate process. Recommendation System (RS) is the tool and largely used nowadays in many areas to generate interest items to users. With the development of e-commerce and information access, recommender systems have become a popular technique to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. As the exponential explosion of various contents generated on the Web, Recommendation techniques have become increasingly indispensable. Web recommendation systems assist the users to get the exact information and facilitate the information search easier. Web recommendation is one of the techniques of web personalization, which recommends web pages or items to the user based on the previous browsing history. But the tremendous growth in the amount of the available information and the number of visitors to web sites in recent years places some key challenges for recommender system. The recent recommender systems stuck with producing high quality recommendation with large information, resulting unwanted item instead of targeted item or product, and performing many recommendations per second for millions of user and items. To avoid these challenges a new recommender system technologies are needed that can quickly produce high quality recommendation, even for a very large scale problems. To address these issues we use two recommender system process using fuzzy clustering and collaborative filtering algorithms. Fuzzy clustering is used to predict the items or product that will be accessed in the future based on the previous action of user browsers behavior. Collaborative filtering recommendation process is used to produce the user expects result from the result of fuzzy clustering and collection of Web Database data items. Using this new recommendation system, it results the user expected product or item with minimum time. This system reduces the result of unrelated and unwanted item to user and provides the results with user interested domain.
Personalized E-commerce based recommendation systems using deep-learning tech...IAESIJAI
As technology is surpassing each day, with the variation of personalized drifts
relevant to the explicit behavior of users using the internet. Recommendation
systems use predictive mechanisms like predicting a rating that a customer
could give on a specific item. This establishes a ranked list of items according
to the preferences each user makes concerning exhibiting personalized
recommendations. The existing recommendation techniques are efficient in
systematically creating recommendation techniques. This approach
encounters many challenges such as determining the accuracy, scalability, and
data sparsity. Recently deep learning attains significant research to enhance
the performance to improvise feature specification in learning the efficiency
of retrieving the necessary information as well as a recommendation system
approach. Here, we provide a thorough review of the deep-learning
mechanism focused on the learning-rates-based prediction approach modeled
to articulate the widespread summary for the state-of-art techniques. The
novel techniques ensure the incorporation of innovative perspectives to
pertain to the unique and exciting growth in this field.
Recommendation System Using Social Networking ijcseit
With the proliferation of electronic commerce and knowledge economy environment both organizations and
individuals generate and consume a large amount of online information. With the huge availability of
product information on website, many times it becomes difficult for a consumer to locate item he wants to
buy. Recommendation Systems [RS] provide a solution to this. Many websites such as YouTube, e-Bay,
Amazon have come up with their own versions of Recommendation Systems. However Issues like lack of
data, changing data, changing user preferences and unpredictable items are faced by these
recommendation systems. In this paper we propose a model of Recommendation systems in e-commerce
domain which will address issues of cold start problem and change in user preference problem. Our work
proposes a novel recommendation system which incorporates user profile parameters obtained from Social
Networking website. Our proposed model SNetRS is a collaborative filtering based algorithm, which
focuses on user preferences obtained from FaceBook. We have taken domain of books to illustrate our
model.
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSeditorijettcs
Dr.T.Hemalatha#1, Dr.G.Rashita Banu#2, Dr.Murtaza Ali#3
#1.Assisstant.Professor,VelsUniversity,Chennai
#2Assistant Professor,Department of HIM&T,JazanUniversity,Jasan
#3HOD, Department of HIM&T JazanUniversity,Jasan
EXPLORING DATA MINING TECHNIQUES AND ITS APPLICATIONSeditorijettcs
Dr.T.Hemalatha#1, Dr.G.Rashita Banu#2, Dr.Murtaza Ali#3
#1.Assisstant.Professor,VelsUniversity,Chennai
#2Assistant Professor,Department of HIM&T,JazanUniversity,Jasan
#3HOD, Department of HIM&T JazanUniversity,Jasan
Similar to An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental Association Rule Mining (20)
Beaglebone Black Webcam Server For SecurityIJTET Journal
Web server security using BeagleBone Black is based on ARM Cortex-A8 processor and Linux operating system
is designed and implemented. In this project the server side consists of BeagleBone Black with angstrom OS and interfaced
with webcam. The client can access the web server by proper authentication. The web server displays the web page forms
like home, video, upload, settings and about. The home web page describes the functions of Web Pages. The video Web page
displays the saved videos in the server and client can view or download the videos. The upload web page is used by the client
to upload the files to server. The settings web page is used to change the username, password and date if needed. The about web page provides the description of the project
Biometrics Authentication Using Raspberry PiIJTET Journal
Biometric authentication is one of the most popular and accurate technology. Nowadays, it is used in many real time
applications. However, recognizing fingerprints in Linux based embedded computers (raspberry pi) is still a very complex problem.
This entire work is done on the Linux based embedded computer called raspberry pi , in which database creation and management
using postgresql, web page creation using PHP language, fingerprint reader access, authentication and recognition using python were
entirely done on raspberry pi This paper discusses on the standardized authentication model which is capable of extracting the
fingerprints of individual and store that in database . Then I use the final fingerprint to match with others in fingerprints present in the
database (postgresql) to show the capability of this model.
Conceal Traffic Pattern Discovery from Revealing Form of Ad Hoc NetworksIJTET Journal
Number of techniques has been planned supported packet secret writing to safeguard the
communication in MANETs. STARS functioning supported stastical characteristics of captured raw traffic.
STARS discover the relationships of offer to destination communication. To forestall STAR attack associate
offer hidding technique is introduced.The pattern aims to derive the source/destination probability distribution.
that's the probability for each node to entire traffic captured with link details message source/destination and
conjointly the end-to-end link probability distribution that's the probability for each strive of nodes to be
associate end-to-end communication strive. thence construct point-to-point traffic originate and then derive the
end-to-end traffic with a set of traffic filtering rules; thus actual traffic protected against revelation attack.
Through this protective mechanism efficiency of traffic enlarged by ninety fifth from attacked traffic. For a lot of
sweetening to avoid overall attacks second shortest path is chosen.
Node Failure Prevention by Using Energy Efficient Routing In Wireless Sensor ...IJTET Journal
The most necessary issue that has to be solved in coming up with an information transmission rule for
wireless unplanned networks is a way to save unplanned node energy whereas meeting the wants of applications
users because the unplanned nodes are battery restricted. Whereas satisfying the energy saving demand, it’s
conjointly necessary to realize the standard of service. Just in case of emergency work, it's necessary to deliver the
information on time. Achieving quality of service in is additionally necessary. So as to realize this demand, Power -
efficient Energy-Aware routing protocol for wireless unplanned networks is planned that saves the energy by
expeditiously choosing the energy economical path within the routing method. When supply finds route to
destination, it calculates α for every route. The worth α is predicated on largest minimum residual energy of the trail
and hop count of the trail. If a route has higher α, then that path is chosen for routing the information. The worth of α
are higher, if the most important of minimum residual energy of the trail is higher and also the range of hop count is
lower. Once the trail is chosen, knowledge is transferred on the trail. So as to extend the energy potency any
transmission power of the nodes is additionally adjusted supported the situation of their neighbour. If the neighbours
of a node are closely placed thereto node, then transmission vary of the node is diminished. Thus it's enough for the
node to own the transmission power to achieve the neighbour at intervals that vary. As a result transmission power
of the node is cut back that later on reduces the energy consumption of the node. Our planned work is simulated
through Network machine (NS-2). Existing AODV and Man-Min energy routing protocol conjointly simulated
through NS-2 for performance comparison. Packet Delivery quantitative relation, Energy Consumption and end-toend
delay.
Prevention of Malicious Nodes and Attacks in Manets Using Trust worthy MethodIJTET Journal
In Manet the first demand is co-operative communication among nodes. The malicious nodes might cause security issues like grey hole and cooperative attacks. To resolve these attack issue planning Dynamic supply routing mechanism, that is referred as cooperative bait detection theme (CBDS) that integrate the advantage of each proactive and reactive defence design is used. In region attacks, a node transmits a malicious broadcast informing that it's the shortest path to the destination, with the goal of intercepting messages. During this case, a malicious node (so-called region node) will attract all packets by victimisation solid Route Reply (RREP) packet to incorrectly claim that “fake” shortest route to the destination then discard these packets while not forwarding them to the destination. In grey hole attacks, the malicious node isn't abs initio recognized in and of itself since it turns malicious solely at a later time, preventing a trust-based security resolution from detective work its presence within the network. It then by selection discards/forwards the info packets once packets undergo it. During this we have a tendency to focus is on detective work grey hole/collaborative region attacks employing a dynamic supply routing (DSR)-based routing technique.
Effective Pipeline Monitoring Technology in Wireless Sensor NetworksIJTET Journal
Wireless detector nodes are a promising technology to play three-dimensional applications. Even it
will sight correct lead to could on top of ground and underground. In solid underground watching system makes
some challenges are there to propagating the signals. The detector node is moving entire the underground
pipeline and sending information to relay node that's placed within the on top of ground. If any relay node is
unsuccessful during this condition suggests that it'll not sending the info. In this watching system can specially
designed as a heterogeneous networks. Every high power relay nodes most covers minimum 2 low power relay
node. If any relay node is unsuccessful within the network, the constellation can modification mechanically
supported the heterogeneous network. The high power relay node is change the unsuccessful node and sending
the condition of pipeline. The benefits are thought-about to be extremely distributed, improved packet delivery
Raspberry Pi Based Client-Server Synchronization Using GPRSIJTET Journal
A low cost Internet-based attendance record embedded system for students which uses wireless technology to
transfer data between the client and server is designed. The proposed system consist of a Raspberry Pi which acts as a
client which stores the details of the students in the database by using user login system using web. When the user logs
into the database the data is sent through GPRS to the server machine which maintains the records of the employees and
the attendance is updated in the server database. The GPRS module provides a bidirectional real-time data transfer
between the client and server. This system can be implemented to any real time application so as to retrieve information
from a data source of the client system and send a file to the remote server through GPRS. The main aim is to avoid the
limitations in Ethernet connection and design a low cost and efficient attendance record system where the data is
transferred in a secure way from the client database and updated in the server database using GPRS technology
ECG Steganography and Hash Function Based Privacy Protection of Patients Medi...IJTET Journal
Data hiding can hide sensitive information into signals for covert communication. Most data hiding
techniques will distort the signal in order to insert additional messages. The distortion is often small; the irreversibility is
not admissible to some sensitive techniques. Most of the applications, lossless data hiding is desired to extract the
embedded data and the original host signal. The project proposes the enhancement of protection system for secret data
communication through encrypted data concealment in ECG signals of the patient. The proposed encryption technique
used to encrypt the confidential data into unreadable form and not only enhances the safety of secret carrier information by
making the information inaccessible to any intruder having a random method. For that we use twelve square ciphering
techniques. The technique is used make the communication between the sender and the receiver to be authenticated is hash
function. To evaluate the effectiveness of ECG wave at the proposed technique, distortion measurement techniques of two
are used, the percentage residue difference (PWD) and wavelets weighted PRD. Proposed technique provides high security protection for patient data with low distortion is proven in this proposed system.
An Efficient Decoding Algorithm for Concatenated Turbo-Crc CodesIJTET Journal
In this paper, a hybrid turbo decoding algorithm is used, in which the outer code, Cyclic Redundancy Check code is
not used for detection of errors as usual but for error correction and improvement. This algorithm effectively combines the iterative
decoding algorithm with Rate-Compatible Insertion Convolution Turbo Decoding, where the CRC code and the turbo code are
regarded as an integrated whole in the Decoding process. Altogether we propose an effective error detecting method based on
normalized Euclidean distance to compensate for the loss of error detection capability which should have been provided by CRC
code. Simulation results show that with the proposed approach, 0.5-2dB performance gain can be achieved for the code blocks
with short information length
Improved Trans-Z-source Inverter for Automobile ApplicationIJTET Journal
In this paper a new technology is proposed with a replacement of conventional voltage source/current
source inverter with Improved Trans-Z-source inverter in automobile applications. The improved Trans-Z-source
inverter has a high boost inversion capability and continues input current. Also this new inverter can suppress the
resonant current at the startup; this resonant current in the startup may lead the device to permanent damage. In
improved Trans-Z-source inverter a couple inductor is needed, instead of this coupled inductor a transformer is used.
By using a transformer with sufficient turns ratio the size can be reduced. The turn’s ratio of the transformer decides
the input voltage of the inverter. In this paper operating principle, comparison with conventional inverters, working
with automobiles simulation results, THD analysis, Hardware implementation using ATMEGA 328 P are included.
Wind Energy Conversion System Using PMSG with T-Source Three Phase Matrix Con...IJTET Journal
This paper presents an analysis of a PMSG wind power system using T-Sourcethree phase matrix converter. PMSG using T-Source three phase matrix converterhas advantages that it can provide any desired AC output voltage regardless of DC input with regulation in shoot-through time. In this control system T-Source capacitor voltage can be kept stable with variations in the shoot-through time, maximum power from the wind turbine to be delivered. Inaddition, of a new future, the converter employs a safe-commutation strategy toconduct along a continuous current flow, which results in theelimination of voltage spikes on switches without the need for a snubber circuit. With the use of matrix converter the surely need forrectifier circuit and passive components to store energy arereduced. The MATLAB/Simulinkmodel of the overall system is carried out and theoretical wind energy conversion output load voltage calculations are madeand feasibility of the new topology has been verified and that theconverter can produce an output voltage and output current. This proposed method has greater efficiency and lower cost.
Comprehensive Path Quality Measurement in Wireless Sensor NetworksIJTET Journal
A wireless sensor network mostly relies on multi-hop transmissions to deliver a data packet. It is of essential importance to measure the quality of multi-hop paths and such information shall be utilized in designing efficient routing strategies. Existing metrics like ETF, ETX mainly focus on quantifying the link performance in between the nodes while overlooking the forwarding capabilities inside the sensor nodes. By combining the QoF measurements within a node and over a link, we are able to comprehensively measure the intact path quality in designing efficient multihop routing protocols. We propose QoF, Quality of Forwarding, a new metric which explores the performance in the gray zone inside a node left unattended in previous studies. We implement QoF and build a modified Collection Tree Protocol.
Optimizing Data Confidentiality using Integrated Multi Query ServicesIJTET Journal
Query services have experienced terribly massive growth within past few years for that reason large usage of services need to balance outsourcing data management to Cloud service providers that provide query services to the client for data owners, therefore data owner needs data confidentiality as well as query privacy to be guaranteed attributable to disloyal behavior of cloud service provider consequently enhancing data confidentiality must not be compromise the query processed performance. It is not significant to provide slow query services as the result of security along with privacy assurance. We propose the random space perturbation data perturbation method to provide secure with kNN(k-nearest-neighbor) range query services for protecting data in the cloud and Frequency Structured R-Tree (FSR-Tree) efficient range query. Our schemes enhance data confidentiality without compromising the FSR-TREE query processing performance that also increases the user experience.
Foliage Measurement Using Image Processing TechniquesIJTET Journal
Automatic detection of fruit and leaf diseases is essential to automatically detect the symptoms of diseases as early as they appear on the growing stage. This system helps to detect the diseases on fruit during farming , right from plan and easily monitoring the diseases of grapes leaf and apple fruit. By using this system we can avoid the economical loss due to various diseases in agriculture production. K-means clustering technique is used for segmentation. The features are extracted from the segmented image and artificial neural network is used for training the image database and classified their performance to the respective disease categories. The experimental results express that what type of disease can be affected in the fruit and leaf .
Harmonic Mitigation Method for the DC-AC Converter in a Single Phase SystemIJTET Journal
This project suggest a sine-wave modulation technique is to achieve a low total harmonic distortion of Buck-Boost converter connected to a changing polarity inverter in a system. The suggested technique improves the harmonic content of the output. In addition, a proportional-resonant Integral controller is used along with harmonic compensation techniques for eliminating the DC component in the system. Also, the performance of the Proposed controller is analyzed when it connecting to the converter. The design of Buck-Boost converter is fed by modulated sine wave Pulse width modulation technique are proposed to mitigate the low order harmonics and to control the output current. So, that the output complies within the standard limit without use of low pass filter.
Comparative Study on NDCT with Different Shell Supporting StructuresIJTET Journal
Natural draft cooling towers are very essential in modern days in thermal and nuclear power stations. These are the hyperbolic shells of revolution in form and are supported on inclined columns. Several types of shell supporting structures such as A,V,X,Y are being used for construction of NDCT’s. Wind loading on NDCT governs critical cases and requires attention. In this paper a comparative study on reinforcement details has been done on NDCT’s with X and Y shell supporting structures. For this purpose 166m cooling tower with X and Y supporting structures being analyzed and design for wind (BS & IS code methods), seismic loads using SAP2000.
Experimental Investigation of Lateral Pressure on Vertical Formwork Systems u...IJTET Journal
The modeling of pressure distribution of fresh concrete poured in vertical formwork are rather dynamic than complex. Many researchers had worked on the pressure distribution modeling of concrete and formulated empirical relationship factors like formwork height, rate of pour, consistency classes of concrete. However, in the current scenario, most of high rise construction uses self compacting concrete(SCC) which is a special concrete which utilizes not only mineral and chemical admixtures but also varied aggregate proportions and hence modeling pressure distribution of SCC over other concrete in vertical formwork systems is necessitated. This research seeks to bridge the gap between the theoretical formulation of pressure distribution with the actual modeled (scaled) vertical formwork systems. The pressure distribution of SCC in the laboratory will be determined using pressure sensors, modeled and analyzed.
A Five – Level Integrated AC – DC ConverterIJTET Journal
This paper presents the implementation of a new five – level integrated AC – DC converter with high input power factor and reduced input current harmonics complied with IEC1000-3-2 harmonic standards for electrical equipments. The proposed topology is a combination of boost input power factor pre – regulator and five – level DC – DC converter. The single – stage PFC (SSPFC) approach used in this topology is an alternative solution to low – power and cost – effective applications.
A Comprehensive Approach for Multi Biometric Recognition Using Sclera Vein an...IJTET Journal
Sclera and finger print vein fusion is a new biometric approach for uniquely identifying humans. First, Sclera vein is identified and refined using image enhancement techniques. Then Y shape feature extraction algorithm is used to obtain Y shape pattern which are then fused with finger vein pattern. Second, Finger vein pattern is obtained using CCD camera by passing infrared light through the finger. The obtained image is then enhanced. A line shape feature extraction algorithm is used to get line patterns from enhanced finger vein image. Finally Sclera vein image pattern and Finger vein image pattern were combined to get the final fused image. The image thus obtained can be used to uniquely identify a person. The proposed multimodal system will produce accurate results as it combines two main traits of an individual. Therefore, it can be used in human identification and authentication systems.
Study of Eccentrically Braced Outrigger Frame under Seismic ExitationIJTET Journal
Outrigger braced structures has efficient structural form consist of a central core, comprising braced frames with
horizontal cantilever ”outrigger” trusses or girders connecting the core to the outer column. When the structure is loaded
horizontally, vertical plane rotation of the core is restrained by the outriggers through tension in windward column and
compression in leeward column. The effective structural depth of the building is greatly increased, thus augmenting the lateral
stiffness of the building and reducing the lateral deflections and moments in core. In effect, the outriggers join the columns to the
core to make the structure behave as a partly composite cantilever. By providing eccentrically braced system in outrigger frame by
varying the size of links and analyzing it. Push over analysis is carried out by varying the link size using computer programs, Sap
2007 to understand their seismic performance. The ductile behavior of eccentrically braced frame is highly desirable for structures
subjected to strong ground motion. Maximum stiffness, strength, ductility and energy dissipation capacity are provided by
eccentrically braced frame. Studies were conducted on the use of outrigger frame for the high steel building subjected to
earthquake load. Braces are designed not to buckle, regardless of the severity of lateral loading on the frame. Thus eccentrically
braced frame ensures safety against collapse.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
An Improvised Fuzzy Preference Tree Of CRS For E-Services Using Incremental Association Rule Mining
1. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
18
An Improvised Fuzzy Preference Tree Of CRS For E-
Services Using Incremental Association Rule Mining
Roshni.K1
1
Arunai Engineering College, CSE,
kroshni30@gmail.com
Dhanalakshmi.S2
2
Arunai Engineering College, CSE
dhanalakshmi1984@gmail.com
Abstract—Web mining is the amalgamation of information accumulated by traditional data mining methodologies and
techniques with information collected over the World Wide Web. A Recommendation system is a profound application that
comforts the user in a decision-making process, where they lack of personal experience to choose an item from the
confound set of alternative products or services. The key challenge in the development of recommender system is to
overcome the problems like single level recommendation and static recommendation, which are exists in the real world e-
services. The goal is to achieve and enhance predicting algorithm to discover the frequent items, which are feasible to be
purchasable. At this point, we examine the prior buying patterns of the customers and use the knowledge thus procured, to
achieve an item set, which co-ordinates with the purchasing mentality of a particular set of customers. Potential
recommendation is concerned as a link structure among the items within E-commerce website, which supports the new
customers to find related products in a hurry. In Existing system, a fuzzy set consists of user preference and item features
alone, so the recommendations to the customers are irrelevant and anonymous. In this paper, we suggest a
recommendation technique, which practices the wild spreading and data sharing competency of a huge customer linkage
and also this method follows a fuzzy tree- structured model, in which fuzzy set techniques are utilized to express user
preferences and purchased items are in a clustered form to develop a user convenient recommendations. Here, an
incremental association rule mining is employed to find interesting relation between variables in a large database.
Index Terms— Recommender System; Fuzzy Set; Fuzzy Tree-Structured User Preference; Incremental Association Rule
Mining.
—————————— ——————————
1 INTRODUCTION
ITH the recent explosive growth of the amount of content on
the Internet, the users are facing difficulties to determine and
utilize information and also content providers to sort out and
catalogue documents. Data mining or Knowledge Discovery is the
process of analyzing data from different perspectives and
summarizing it into useful data. This data can be applied to increase
revenue, cut costs or both. Online libraries, other large manuscript
repositories and search engines are springing up so quickly; it is hard
and costlier to sort out every document physically. In order to deal
with this issue, we looking forward a robotic method of working
with web documents. So that they can be easily browsed, structured
and cataloged with negligible human intervention.
Developing improved methods of accomplishing machine
learning techniques on this huge amount of non-tabular, semi-
structured web data are thus extremely suitable. The goal of
clustering is to split the given data set into groups called clusters,
such that items in the same cluster are similar to each other and
dissimilar items are in other clumps. In the classification we attempt
to predefine the category by assigning a data item based on a model
that is produced from pre-classified training data.
In actual operation, the bundling and organizing data are fall in
the field of knowledge discovery in databases or data mining.
Exercise Data mining techniques to a content of web page is termed
as web content mining, which is a new sub-sphere of web mining,
somewhat framed upon the sanctioned area of data rescue. The
vector - space model is employed to present text and web document
information for clustering and categorization. Each term of this
model becomes a characteristic dimension. The values designated to
each dimension is representing number of times a similar term is
noticeable on it or it may be the weight of other frequency
information , such as the number of times that term is appears on
other documents. This model allows the use of traditional machine
learning methodologies that understand with numerical feature
vectors in a Euclidean feature space. Simply, it removes content such
as order and document the terms appear.
Graphs are essential and efficient mathematical constructs for
representing relationships and morphological data. Many problems
are using graphs to screen out the compression, traffic flow analysis,
resource allotment, etc. In extension to problems, a few algorithms
can made to process graphs, the same would be wishing for many
applications. The inquiry has been done in the space of graph
similarity in order to carry out the additional information is accepted
by graphical representations. For dealing with the graphs,
mathematical framework is introduced. Few application domains like
face and fingerprint recognition as well as exception detection in
communication networks, similar to a graph techniques have been
used.
This composition is developed with popular sub-categories of
Data Mining: - ―Market Basket Analysis (MBA)‖, which is a
modeling technique providing vision into the customer purchasing
patterns. A market basket is collected on the item-sets which buy in a
single trip to the shop. MBA basically finds the relationship between
W
2. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
19
the items purchased in this basket. The marketing tool is employed to
figure out the frequent item sets in a large number of transactions. So
it is called as ―Frequent Item-set Mining‖.
Clustering is the action of grouping same elements together with
a strong criteria and threshold values. The items which are grouped
into a cluster are very closely related to each other and those in
different clusters don‘t exhibit a close relationship. So it can be
described as Intra cluster dissimilarity, it should be as low as possible
and Inter cluster similarity should also be very low. Incremental
association rule mining is the action of seeking the relationship
between the items with criteria of customer purchasing patterns.
Depending on the transactions performed by the customer the
frequent items and relationship between those items were found out.
2 RELATED WORK
In general, there is a encompassing literature on measuring the
similarity between recommendation systems. This section reviews
several related work in order to explore the strengths and limitations
of previous methods, and to spot the difficulties in E-services.
Greg Linden, Brent Smith, Jeremy York [1] to generate a list of
recommended items, a recommendation algorithm is used. This
algorithm finds the set of customers who purchased and the items
rated are overlie the other customers purchased and rated items. But
the recommendation is not scalable over very large customer set and
product catalogs.
GediminasAdomavicius, Alexander Tuzhilin [2] Advanced
recommendation algorithm is used to advance the user behavior
representing methods and the sequence of an items is to be
recommended. Capabilities of recommendation systems were
improved, but not accurate recommendations due to marginal
number of ratings.
SilvanaAciar, Debbie Zhang, Simeon Simoff, and John
Debenham [3] to tackle the difficulty of using a customer view
regarding the products, articulated online in free-form text, an
informed recommender is created to produce product
recommendations. The Textual information is used to make
recommendations. Recommendations are produced based on review
comments.
Zan Huang, Hsinchun Chen [4] Collaborative filtering
recommendation algorithm is compared with E-commerce data sets.
A Meta level guideline is developed to recommend a suitable
recommendation algorithm to demonstrate certain characteristics in
the given applications. Six types of representative CF algorithms and
different E-commerce was evaluated to assess the algorithm's
effectiveness with additional data.
A. C. M. Fong, Baoyao Zhou, S. C. Hui, Se, Guan Y. Hong [5]
Web recommender systems has become trendy for several consumers
who not only do procure online, but also finds related information on
products and services prior to the commit to purchase. User behavior
knowledge base was constructed, which uses the fuzzy logic. It
represents the real-life sequential concepts and significant resources
for cyclic pattern-based web access activities.
Alexandros Nanopoulos [6] Item recommendation in
collaborative tagging system problems is considered, so three-mode
tensor model was proposed to capture the three-way correlations
between users, tags and items. To improve the quality of
recommendations, multi way analysis was used to expose latent
correlations.
Hyea Kyeong Kim, Young U. Ryu, Yoonho Cho, and Jae
Kyeong Kim [7] nowadays the size of the consumer networks
becomes extremely large, critical scalability problems occurs in the
traditional global processing method of CF, but it may not be helpful
in real-time environment. In preference-based customer network,
customer recommendation system was used in local processing
method to form a content recommendation of social network.
Qi Liu, Enhong Chen, HuiXiong, Chris H. Q. Ding, Jian
Chen [8] this paper presents an iExpand, which develop the
consumer latent interests in developing an item-oriented model-
based collaborative framework. IExpand model was used to capture
every user‘s interests and then personalized ranking strategy was
developed to predict a user‘s likely interest development.
3 PROPOSED ALGORITHM
Here, we have to develop a fuzzy model for classifying the
customers in order to provide dynamic recommendations
accordingly. Items and customers have been clustered to derive
customer based recommendations. Incremental association rule
mining is used to detect frequent items which are purchased by the
customers. This section will discuss issues relating to
recommendation systems and various other implementation issues.
A. USER INTERFACE
In the industrial design, field of human–machine interaction
plays an important role. It is the space where interaction between
humans and machines occurs. The main goal of interaction will be
effective operation at the user interface. The user can manipulate a
system with the help of inputs and should perform either login or
register operation for to proceed further stages.
B. CLUSTERING TRANSACTION HISTORY
To produce a clustered set of transactions, transaction history
database has been used. The cluster transactions are derived from
finding the frequent items which are purchased by customers. This
transaction contains the previous transactions made by customers.
This transaction consists of two phases; they are allocation phase and
refinement phase.
Allocation Phase: In the allocation phase, each transaction ‘T‘ is
read in sequence. The transaction ‘T‘ can be assigned to an existing
cluster or a new cluster will be created to accommodate ‘T‘ for
minimizing the total cost of clustering. For each transaction, the
initially allocated cluster identifier is written back to the database.
The decision of whether to include the transaction in one of the
existing clusters or to create a new one is made by calculating the
cost of clustering. The cost consists of intra-cluster dissimilarity and
inter-cluster similarity explained in system design.
Refinement Phase: In the refinement phase, the small large ratio (SL
ratio) of all the transactions is calculated as follows.
3. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
20
SLR= (no. of small items) / (no. of large items).
The SL ratio of each transaction, thus calculated is then compared
with the SLR threshold. If the SLR of the transaction exceeds the
threshold, then the transactions are moved to the excess pool. The
above process is explained in detail at the system design.
C. INCREMENTAL ASSOCIATION RULE MINING
The transaction history database will contain the preceding
transactions made by the customers. The particulars consist of
customer identification, the set of objects bought along with the
transaction identification. This phase has two sub phases they are,
original database history and updating frequent & promising frequent
item sets.
Original Database History: A dynamic database may permit to
insert new transactions. This may, not only invalidate existing
association rules, but also activates new association rules.
Maintaining association rules for a dynamic database is an important
issue. Thus, a new algorithm is to deal with such updating situation
is proposed.
Updating frequent and promising frequent item sets: When a new
transactions are added to an original database, an old frequent k-item
could become an infrequent k-item and an old promising frequent k-
item could become a frequent k-item. This introduces all existing
association rules would become Weaker. To deal with this problem,
all k-items must be updated when new transactions are added to an
original database.
D. RECOMMENDATIONS
In this section, all the recommendations are separated out,
according to the types of Customers whom their Purchase items, a
preferable range of Products and wish items are alike to the
particular customer type Set. Then, recommended items are supplied
to the customer from the matching type set.
4 SYSTEM DESIGN
Figure 1 demonstrates the framework of our proposed approach.
The system architecture reveals the step-by-step process of
generating a dynamic recommendation.
A. User Interface
The first step in the proposed approach is to authenticate the
customer which aims to classify the customer. Allowing the users to
manipulate a system. The user will perform either login or register
operation. During the user manipulations, the users are classified by
user preferences. The customer details are stored into the database.
After these operations get over he will go to the next stage. The
transaction database will commence its action in this stage.
B. Combined Mining
In this section, it consists of three parts. They are combined rule
cluster, combined rule pair and combined association rule mining. To
generate a dynamic recommendations for the customers, then follow
the below steps
Combined Rule Cluster: In this part, transactions database is taken
as input. The aim of the combined rule cluster is to produce the
cluster set of transactions. Each transaction t is read in sequence. To
minimize the total cost of cluster or new cluster, each transaction
‗T‘ can be assigned to an existing cluster or a new cluster will be
created to accommodate ‗T‘. For each transaction, cluster identifier
is initially allocated and written back to the database. A new cluster
will be create depends on either calculating the cost of clustering or
transaction in one of the existing clusters will decide. The cost
consists of intra-cluster dissimilarity and inter-cluster similarity
which are calculated as follows.
Fig. 1. System Architecture
Intra-cluster dissimilarity: Intra-cluster dissimilarity tells us how
different the transactions are within a cluster.
Intra (U)= |Ukj=1 sm (Cj, E)|
Where
Intra (U) – Intra cluster dissimilarity
Sm-small items
Cj – j the cluster
E – Maximum ceiling
The maximum ceiling is the maximum number of transactions
that might contain an item to call it a small item. Thus intra cluster
dissimilarity is the union of distinct small items present in all the
4. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
21
clusters.
Inter-cluster similarity: Inter-cluster similarity, on the other hand
briefs us on the pair wise similarity between transactions present in
different clusters. As their purpose is simple, these parameters need
to be kept to a minimum for the clustering to be efficient. The
incoming transactions are first assigned to one of the existing
clusters or a new cluster is created to accommodate the incoming
transaction. The decision on whether or not to create a new cluster is
based on the cost parameter, i.e., a new cluster is created to
accommodate the transaction if it reduces the overall cost of
clustering.
Inter (U) = Σkj=1|La (Cj, S)| - |Ukj=1 La (Cj, S)|
Where
Inter (U) – Inter cluster dissimilarity
La – Large items
Cj – j the cluster
S – Minimum support
Minimum support indicates the minimum number of transactions
in which an item should be present to claim to be a large item. The
total cost is calculated by the following formula
Cost =w* Intra (U)+Inter (U)
Where
w - Item
Intra (U) - Intra cluster dissimilarity
Inter (U) – Inter cluster similarity
A new transaction is first put into each of the existing clusters
and the cost is calculated for each cluster. Then a new cluster is
created to accommodate the transaction and the cost is calculated.
The transaction is then finally assigned to the cluster with the lowest
cost value as follows.
For every new non-clustered transaction or every cluster ‗c‘, a
transaction is assigned to the cluster ‗c‘, and then the cost is
calculated and compared with the best cost. If the cost is improved,
then the current cost is assigned to the best cost and best cluster.
Therefore a new cluster is created for the current transaction and the
cost of cluster is also calculated.
Combined rule pair: The SLR is calculated as explained in
refinement phase. An attempt is then made to accommodate these
transactions in a different cluster and examine the SLR of these
transactions in the new cluster doesn‘t exceed the threshold. If not
these transactions are deemed outliers and they are eliminated from
consideration. The process is explained as; calculate the S-L ratio of
every transaction, then moves all the transactions whose S-L ratio
exceeds the threshold to the excess pool. Shuffle the transactions in
the excess pool to different clusters such that the S-L ratio value
stays below the threshold. Delete the remaining transactions from the
excess pool. The clustering process is thus complete, incorporating
both the allocation and refinement phases.
Combined rule mining: Incremental association rule mining is used
to produce frequent item sets and promised frequent item sets. As
explained in original database transactions, a new algorithm assumes
the statistics of new transactions slowly changed from original
transactions. According to the assumption, the statistics of old
transactions, obtained from previous mining, can be utilized for
approximating the new transactions. Therefore, Support count of
item sets gathered from previous mining may slightly differs from
support count of item sets after inserting new transactions into an
original database that contains old transactions. The new algorithm
uses maximum support count of 1-item sets gathered from previous
mining to calculate infrequent item sets of an original database that
will capable of being frequent item sets when new transactions are
placed into the original database. With maximum support count and
maximum size of new transactions, now it allowed to pushing into an
original database, support count for infrequent item sets that will be
qualified for frequent item sets, i.e. min_PL is shown in equation:
Min_supDB- [(maxsupp / total size) * inc_size] <=
min_PL<min_supDB
Where in_sup (DB) is minimum support count for an original
database, maxsupp is a maximum support count of item sets, the
current size is a number of transactions of an original database and
inc_size is a maximum number of new transactions. Here, a
promising frequent item sets is defined as follows.
A promising frequent item set is an infrequent item set that
satisfies the equation. In this paper, apriori algorithm is applied to
find all possible frequent k- item sets and promising frequent k-item
sets. Apriori scans all transactions in original database for each
iterate with two step process, which are joining and prune step.
Unlike typical apriori algorithm, items in both frequent k- item sets
and promising frequent k-item sets can be joined together in the joint
step. For a frequent item, its support count must be higher than a
user-specified minimum support count threshold and for a promising
frequent item; its support count must be higher than min_PL but less
than the user-specified minimum support count.
As explained in updating frequent and promising frequent items,
it updates all old items. The size of an updated database increases
when new transactions are placed into an original database. Thus,
min_PL must be recalculated in order to associate with the new size
of an updated database. min_PL (update) is computed as the follows:
Min_PL U db=min_supDB U db– (max supp / total size * inc_size)
Then, if any k-item has support count greater than or equal to
min_sup (DBUdb), this item set is moved to a frequent k-item of an
updated database. In the other case, if any k-item has support count
less than min_sup (DBUdb) but it is greater or equal to min_PL
(update), this k-item is moved to a promise frequent item sets of an
updated database. The following algorithms are developed to update
frequent and promising frequent k-terms of an updated database.
Then a decision process will be taken place.
5. INTERNATIONAL JOURNAL FOR TRENDS IN ENGINEERING & TECHNOLOGY
VOLUME 4 ISSUE 1 – APRIL 2015 - ISSN: 2349 - 9303
22
C. Product Recommendation
After decision making, the recommendation is clarified that
Includes the Product rate, preferable range of products and changes
in the Wish List of Customer type set. Lastly recommended items are
supplied to the customers. To maintain the transaction history, all the
transactions are stored into the databases.
5 DISCUSSIONS
Dynamic product recommendations are provided to each
customer for helping to purchase an item. The customers are
classified by the clustering process and threshold value was found.
Incremental association rule mining is used to find frequently
purchased items and promising frequent items. The transaction
history of the customers is stored in the database for producing
dynamic recommendation.
6 RESULTS
To generate the dynamic recommendations, we used incremental
association rule mining and SLR is calculated. Transaction History
of the customers is maintained in the databases. To classify the
customer, cluster process has been used. In cluster process, we had
discussed the intra cluster dissimilarity and the inter cluster
similarity. After cluster formation, the threshold value is found by
calculating the SLR. Based on the threshold value of items,
recommendations are generated.
7 CONCLUSION
With the help of Incremental Association Rule Mining and
Transaction Clustering, we introduced a method to design an
improved and well structured website design for an E-shop in the
design phase. Taking for granted that the two inceptions, least
support and assurance will not change. The promising frequent
algorithm can guarantee to find frequent item sets. Efficient
clustering process is used for data items to reduce the SL ratio in
each group. The process is able to cluster the data items very
efficiently. This process not only incurs an execution time but also
Guides the clustering results to a very good quality.
REFERENCES
[1]Greg Linden, Brent Smith, and Jeremy York, ―Amazon.com
Recommendations Item-to-Item Collaborative Filtering‖, IEEE
Computer Society, Jan 2003.
[2]Gediminas Adomavicius, and Alexander Tuzhilin, A., ―Toward the
Next Generation of Recommender Systems: A Survey of the State-of-
the-Art and Possible Extensions.‖ IEEE Transactions on Knowledge and
Data Engineering, Vol. 17, No. 6, June 2005.
[3]SilvanaAciar, Debbie Zhang, Simeon Simoff, and John Debenham,
―Informed Recommender: Basing Recommendations on Consumer
Product Reviews.‖, IEEE Computer Society , June 2007.
[4]Zan Huang, Daniel Zeng and Hsinchun Chen, ―A Comparison of
Collaborative-Filtering Recommendation Algorithms for E-commerce‖,
IEEE Computer Society, October 2007.
[5]A. C. M. Fong, Baoyao Zhou, S. C. Hui, Guan Y. Hong and The Anh
Do, ―Web Content Recommender System based on Consumer Behavior
Modeling.‖, IEEE Transactions on Consumer Electronics, Vol. 57, No. 2,
May 2011.
[6]Alexandros Nanopoulos, ―Item Recommendation in Collaborative
Tagging Systems.‖ IEEE Transactions on Systems, Man and
Cybernetics-Part A: Systems and Humans, Vol. 41, No. 4, July 2011.
[7]Hyea Kyeong Kim, Young U. Ryu, Yoonho Cho, and Jae Kyeong
Kim, ―Customer-Driven Content Recommendation over a Network of
Customers.‖ IEEE Transactions on Systems, Man and Cybernetics-Part
A: Systems and Humans, Vol. 42, No. 1, January 2012.
[8]Qi Liu, Enhong Chen, HuiXiong, Chris H. Q. Ding, and Jian Chen,
―Enhancing Collaborative Filtering by User Interest Expansion via
Personalized Ranking.‖ , IEEE Transactions on Systems Man and
Cybernetics-Part B: Cybernetics, Vol. 42, No. 1, February 2012.
[9]Q. Shambour and J. Lu, ―A trust-semantic fusion-based
recommendation approach for e-business applications,‖ Decision
Support Systems, vol. 54, pp. 768-780, 2012.
[10]X. Yuan, J.-H. Lee, S.-J.Kim, and Y.-H.Kim, ―Toward a user-
oriented recommendation system for real estate websites,‖ Information
Systems, vol. 38, pp. 231-243,2013.