SlideShare a Scribd company logo
A Study on Behavior Mining of Cloud
computing users



Shree Krishna Shrestha

12054071
Graduate School of Engineering
Muroran Institute of Technology, Muroran, Hokkaido, Japan

2014・02.14
CONTENTS
 Introduction

 Test-bed Cloud System: Jyaguchi Introduction
 Problem Definition
 Algorithm Description : 1. TWSMA

2.Recommendation
 Experiment and Results
 Conclusion
INTRODUCTION AND PURPOSE
 Purpose:
 A framework to recommend service
Method to mine services, based on the behavior of service user
 Method to Recommend Services based on the result data of mining of
services


 Jyaguchi:
 A cloud system proposed by Bishnu Prasad Gautam
 Based on service on demand and pay per use business model
TEST BED CLOUD SYSTEM :JYAGUCHI (OVERVIEW)
Jyaguchi is a SAAS based cloud that provides a platform to develop
application as service with multi-language support.
component
AddService
Component

component
Calculator
Service
Component

JavaScript

component
SubtractService
Component

Ruby

component
MultiplyService
Component

Python

Component
DivideService
Component

Groovy

Ref: As per the Definition of Inventor of Jyaguchi, Asst. Prof. Bishnu Prasad Guatam

Features
 Software as
Service(SaaS)
 Distributed
Resource
Management
Pay per use
Business Model
 Service on
Demand
TEST BED CLOUD SYSTEM: JYAGUCHI



Logs the activity of users with in Interface
MAJOR ISSUE IN MINING OF SERVICES
What is difference between
mining Item and Service?

Why current Item mining
cannot be used for Service
mining?

Usage Time
Service Mining
Mining for frequent service usage pattern considering not only service usage
frequency but also the service usage time
ALGORITHM FOR SERVICE MINING
 Propose an algorithm for service mining which consider the

time of service usage.

Time Weight Sequence Mining Algorithm
(TWSMA)
Create Multi-dimensional
Weighted Service
Sequence Database

Mining Multi-dimensional
Sequence
CREATION OF SERVICE WEIGHT INPUT
SEQUENCE
Input: Service Usage logs; Unit time u
Output: Multi-dimensional Weighted Service Sequence Database
(MDWSSDB)
1: Calculate service usage time from service usage logs for each service
on each position.
2: Create Multi-dimensional service usage time sequence from service
usage logs
3: Calculate , Service Count, for each service on each position
4: Calculate Absolute Service Weight, for each service on each position
5: Calculate Relative Service Weight for each service on each position
6: Make Weighted Sequence (ws) integrating service id sj with its Related
Service Weight.
7: Create MDWSSDB with integrating ws and associated user id.
CALCULATION OF RELATIVE SERVICE WEIGHT
Multi-dimensional service usage time sequence
Seq. id

User_id

Sequence

1

10

(2,6),(123,16),(456,31),(2,33),(456,35)

2

10

(2,21),(2,20),(2,22),(1,22),(2,21)

3

16

(2,1),(123,9),(456,1),(123,1),(456,15

4

15

(456,19),(456,24)(234,24),(456,43

5

15

(234,20),(234,11),(234,30),(456,38)

6

16

(456,19),(123,39),(456,30),(234,30)

Service Weight of service 2
for user 10,
ST2,10 = (6 + 33 + 21 + 20 +
(456, min
22 + 21) min = 12335)
T10 = (6 + 16 + 31
Service
Use time
+33+35+21+20+22+22+ 21)
ID
min = 227 min.

ASW2,10= 123/227 = 0.542
For unit time (ut) 5 min, service usage count for service 2 at position 1 and sequence
1 is (SC2,1,1) = 6/5 = 1.2
RSW2,1,1 = 1.2 * 0.542 = 0.650
EXAMPLE OF INPUT SEQUENCE
Jyaguchi log data
Seq. id

User_id

Sequence

1

10

(2,6),(123,16),(456,31),(2,33),(456,35)

2

10

(2,21),(2,20),(2,22),(1,22),(2,21)

3

16

(2,1),(123,9),(456,1),(123,1),(456,15

4

15

(456,19),(456,24)(234,24),(456,43

5

15

(234,20),(234,11),(234,30),(456,38)

6

16

(456,19),(123,39),(456,30),(234,30)

(456, 35)
Service
ID

Use time

Calculation of service weights
Seq. id

User_id

Sequence

1

10

(2,0.650),(123,0.224),(456,1.804),(2,3.577),(456,2.037)

2

10

(2,2.276),(2,2.168),(2,2.385),(1,0.427),(2,2.276)

3

16

(2,0.0014),(123,0.608),(456,0.089),(123,0.068),(456,1.344)

4

15

(456,2.253),(456,2.846)(234,1.954),(456,5.1)

5

15

(234,1.628),(234,0.895),(234,2.442),(456,4.507)

6

16

(456,1.702),(123,2.636),(456,2.688),(234,1.242)

(456, 2.037)
Service
ID

Service
weight
MINING MULTIDIMENSIONAL SEQUENCE
 Input: Multi-dimensional Weighted Service Sequence









Database: MDWSSDB; Minimum support min support
Output: The complete set of labeled frequent patterns
1: Calculate sequence database weight SDW of MDWSSDB
2: Calculate minimum weight Wm
3: Call ModiedPrexSpan
4: End if no frequent pattern is found or at end of database
5: Form Projected Sequence Database
6: Mine labeled frequent patterns from Projected Sequence
Database
MINING SEQUENTIAL PATTERN
Total Database Weight (SDW )= (0.650+0.224+1.804+...+1.242)=49.83
For min_support 5%
min_weight = 49.83*.05
= 2.49
Service id : 123
0.224+0.608+0.068+2.636
Total weight of service id 123 :3.53

User_i
Sequence
d
10
(2,0.650),(123,0.224),(456,1.804),(2,3.577),
(456,2.037)
2
10
(2,2.276),(2,2.168),(2,2.385),(1,0.427),(2,2.
276)
3
16
(2,0.0014),(123,0.608),(456,0.089),(123,0.0
68),(456,1.344)
Prefix
Postfix
4
15
(456,2.253),(456,2.846)(234,1.954),(456,5.
Prefix
Postfix
2
<_123,456,2,456>,<_2,2,1,2>,
1) <2>-projected database
<_123,456,123,456>
123
<_456,2,456>,
5
15
(234,1.628),(234,0.895),(234,2.442),(456,4.
<_456,123,456>, <_456,123,456>, <_456,234> 507)
123
<_456,2,456>, <_456,234>
<123>-projected database
6
16
(456,1.702),(123,2.636),(456,2.688),(234,1.
123,456 <_2,456>, <_123,456>
242)

2,123

Seq.
id
1

<_456,2,456>,<_456,123,456>,<_456>

Frequent Pattern : 123,456

<2,123>-projected database
MINING SEQUENTIAL PATTERN
For frequent service sequence<123; 456>
User_i
Sequence
d
10
(2,0.650),(123,0.224),(456,1.804),(2,3.577),
<123,
(456,2.037)
456>
2
10
(2,2.276),(2,2.168),(2,2.385),(1,0.427),(2,2.
276)
User_id 16 and * are found frequent
3
16
(2,0.0014),(123,0.608),(456,0.089),(123,0.0
68),(456,1.344)
from postfix database.
4
15
(456,2.253),(456,2.846)(234,1.954),(456,5.
1)
Prefix
Postfix
15
(234,1.628),(234,0.895),(234,2.442),(456,4.
2
<_123,456,2,456>,<_2,2,1,2>, 5
<2>-projected database
507)
<_123,456,123,456>
6
16
(456,1.702),(123,2.636),(456,2.688),(234,1.
123
<_456,2,456>, <_456,123,456>, <_456,234> 242)
<123>-projected database

Prefix

2,123

Labeled frequent
pattern
<10>;<16 (16; <123; 456>);
(*,<123; 456>)
>; <16>
Postfix

Seq.
id
1

<_456,2,456>,<_456,123,456>,<_456>

<2,123>-projected database
RECOMMENDATION OF SERVICES
 Based on result labelled Frequent pattern from TWSMA
 Categorized for 3 user group
1.

2.

3.

Anonymous Users/First time User Group,
Registered Users group without Previous History of Service
Usage (don’t have current service usage log).,
Registered Users group with Previous History of Service Usage
(have current service usage log).
RECOMMENDING SERVICE
Frequent Patterns
User_id

Sequence

support

10

2

3

*

234

3

15

234,456

2

*

456,234

2

16

456,123,456

2

*

2,123,,456

2
RECOMMENDING SERVICE
Frequent Patterns
User_id

Anonymous Users Group

Sequence

support

10

2

3

*

234

4

15

234,456

2

*

456,234

2

16

456,123,456

2

*

2,123,,456

2

Services with highest support

Recommended Service: 234
RECOMMENDING SERVICE
Frequent Patterns
User_id

First Time User user_id 14

Sequence

support

10

2

3

*

234

4

15

234,456

2

*

456,234

2

16

456,123,456

2

*

2,123,,456

2

Services with highest support

Recommended Service: 234
RECOMMENDING SERVICE
Frequent Patterns
User_id

Authorized User 10

Sequence

support

10

2

3

*

234

4

15

234,456

2

*

456,234

2

16

456,123,456

2

*

2,123,,456

2

Services with highest support of that
user

Recommended Service: 2
RECOMMENDING SERVICE

Frequent Patterns
User_id

Sequence

support

10

2

3

*

234

4

15

234,456
456,234

2

16

456,123,456

2

*

2,123,,456

2

Next service from the frequent pattern
with highest support

2

*

Authorized User 15 and has used
service 234

Recommended Service: 456
RECOMMENDING SERVICE

Frequent Patterns
User_id

Sequence

support

10

2

3

*

234

3

15

234,456

2

*

456,234
456,123,456

2

*

2,123,,456

2

- This sequence is not in frequent
pattern
- Drop 2 and search from remaining
sequence. i.e. 456, 123

2

16

Logged in user 16 who has used
service 2,456,123

Recommended Service: 234
EXPERIMENTS (TWSMA)
 Experiment Methodology

 Implemented on Jyaguchi system
 Used actual log of Jyaguchi Users
 Varied minimum support to find variation in No. of

patterns found and processing time.
 Comapred No. of patterns found and processing time
with seq-dim algorithm.
EXPERIMENT RESULTS (1)
• No. of patterns and Process time with no. of sequences for
varied minimum support
EXPERIMENT RESULTS (3)
• No. of patterns and Process time with no. of sequences for
varied minimum support
EXPERIMENTS (TWSMA)
 Precision and Recall based evaluation

 Experiment Methodology


Learning Phase:






Find frequent services from log data of prior to implementing TWSMA algorithm with
various minimum support
did an online survey among Jyaguchi Users about the favorite services.
found common services in between survey data and frequent services for various
minimum support which is used as relevant services.

Evaluation Phase




Users Use Jyaguchi system where services are recommended from 3 algorithms: 1.
TWSMA, 2. SEQ-DIM and 3. Random
Calculate Precision and Recall for each user.
Take average of Precision and Recall for various minimum support.
EXPERIMENT RESULTS (3)
Comparision of Precision and recall for Various minimum support for 3 algorithm

Minimum_support:7%

Minimum_support:10%
EXPERIMENT RESULTS (4)
Comparision of Precision and recall for Various minimum
support for 3 algorithm

Minimum_support:12%

Minimum_support:15%
CONCLUSION AND FUTURE WORKS
Conclusion
• proposed a framework for recommending services utilizing service usage
time as service weight.
• Implemented the algorithm in the Jyaguchi System.
• Evaluated the proposed framework on Jyaguchi System.

Future Tasks
• Implement and evaluate algorithm on other SAAS based Cloud system.
• Add the dimension of user profile for better recommendation
Thank you

More Related Content

What's hot

Efficient load rebalancing for distributed file system in Clouds
Efficient load rebalancing for distributed file system in CloudsEfficient load rebalancing for distributed file system in Clouds
Efficient load rebalancing for distributed file system in Clouds
IJERA Editor
 
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network CloudModeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
International Journal of Science and Research (IJSR)
 
SIMULATION AND PERFORMANCE ANALYSIS OF A LARGE SCALED INTERNET APPLICATION ...
SIMULATION AND PERFORMANCE ANALYSIS OF  A LARGE SCALED INTERNET APPLICATION  ...SIMULATION AND PERFORMANCE ANALYSIS OF  A LARGE SCALED INTERNET APPLICATION  ...
SIMULATION AND PERFORMANCE ANALYSIS OF A LARGE SCALED INTERNET APPLICATION ...ankit_saluja
 
Super Resolution with OCR Optimization
Super Resolution with OCR OptimizationSuper Resolution with OCR Optimization
Super Resolution with OCR Optimization
niveditJain
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET Journal
 
Optimizing Parallel Reduction in CUDA : NOTES
Optimizing Parallel Reduction in CUDA : NOTESOptimizing Parallel Reduction in CUDA : NOTES
Optimizing Parallel Reduction in CUDA : NOTES
Subhajit Sahu
 
Self learning cloud controllers
Self learning cloud controllersSelf learning cloud controllers
Self learning cloud controllersPooyan Jamshidi
 
Green scheduling
Green schedulingGreen scheduling
Green scheduling
Vincenzo De Maio
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Editor IJARCET
 
Introduction to CNN with Application to Object Recognition
Introduction to CNN with Application to Object RecognitionIntroduction to CNN with Application to Object Recognition
Introduction to CNN with Application to Object Recognition
Artifacia
 
Autonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based SoftwareAutonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based Software
Pooyan Jamshidi
 
ssnow_manuscript_postreview
ssnow_manuscript_postreviewssnow_manuscript_postreview
ssnow_manuscript_postreviewStephen Snow
 
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service CrawlingAn Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service Crawling
IDES Editor
 
FCN-Based 6D Robotic Grasping for Arbitrary Placed Objects
FCN-Based 6D Robotic Grasping for Arbitrary Placed ObjectsFCN-Based 6D Robotic Grasping for Arbitrary Placed Objects
FCN-Based 6D Robotic Grasping for Arbitrary Placed Objects
Kusano Hitoshi
 

What's hot (16)

Efficient load rebalancing for distributed file system in Clouds
Efficient load rebalancing for distributed file system in CloudsEfficient load rebalancing for distributed file system in Clouds
Efficient load rebalancing for distributed file system in Clouds
 
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network CloudModeling Local Broker Policy Based on Workload Profile in Network Cloud
Modeling Local Broker Policy Based on Workload Profile in Network Cloud
 
Slide tesi
Slide tesiSlide tesi
Slide tesi
 
SIMULATION AND PERFORMANCE ANALYSIS OF A LARGE SCALED INTERNET APPLICATION ...
SIMULATION AND PERFORMANCE ANALYSIS OF  A LARGE SCALED INTERNET APPLICATION  ...SIMULATION AND PERFORMANCE ANALYSIS OF  A LARGE SCALED INTERNET APPLICATION  ...
SIMULATION AND PERFORMANCE ANALYSIS OF A LARGE SCALED INTERNET APPLICATION ...
 
Super Resolution with OCR Optimization
Super Resolution with OCR OptimizationSuper Resolution with OCR Optimization
Super Resolution with OCR Optimization
 
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
IRJET-  	  Clustering the Real Time Moving Object Adjacent TrackingIRJET-  	  Clustering the Real Time Moving Object Adjacent Tracking
IRJET- Clustering the Real Time Moving Object Adjacent Tracking
 
.doc
.doc.doc
.doc
 
Optimizing Parallel Reduction in CUDA : NOTES
Optimizing Parallel Reduction in CUDA : NOTESOptimizing Parallel Reduction in CUDA : NOTES
Optimizing Parallel Reduction in CUDA : NOTES
 
Self learning cloud controllers
Self learning cloud controllersSelf learning cloud controllers
Self learning cloud controllers
 
Green scheduling
Green schedulingGreen scheduling
Green scheduling
 
Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240Ijarcet vol-2-issue-7-2236-2240
Ijarcet vol-2-issue-7-2236-2240
 
Introduction to CNN with Application to Object Recognition
Introduction to CNN with Application to Object RecognitionIntroduction to CNN with Application to Object Recognition
Introduction to CNN with Application to Object Recognition
 
Autonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based SoftwareAutonomic Resource Provisioning for Cloud-Based Software
Autonomic Resource Provisioning for Cloud-Based Software
 
ssnow_manuscript_postreview
ssnow_manuscript_postreviewssnow_manuscript_postreview
ssnow_manuscript_postreview
 
An Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service CrawlingAn Efficient Cloud based Approach for Service Crawling
An Efficient Cloud based Approach for Service Crawling
 
FCN-Based 6D Robotic Grasping for Arbitrary Placed Objects
FCN-Based 6D Robotic Grasping for Arbitrary Placed ObjectsFCN-Based 6D Robotic Grasping for Arbitrary Placed Objects
FCN-Based 6D Robotic Grasping for Arbitrary Placed Objects
 

Viewers also liked

I’d like you to meet my family
I’d like you to meet my familyI’d like you to meet my family
I’d like you to meet my familyebillock
 
Справка про Системный проект 2014
Справка про Системный проект 2014Справка про Системный проект 2014
Справка про Системный проект 2014Victor Gridnev
 
Boxes, Bathtubs and Bath-Puffs
Boxes, Bathtubs and Bath-PuffsBoxes, Bathtubs and Bath-Puffs
Boxes, Bathtubs and Bath-Puffs
Jordan Butler
 
The responder
The responderThe responder
The responder
Eddy Weiss
 
Gen-Fantastic Trip
Gen-Fantastic TripGen-Fantastic Trip
Gen-Fantastic Trip
desspigel
 
The worlds cities_in_2016_data_booklet
The worlds cities_in_2016_data_bookletThe worlds cities_in_2016_data_booklet
The worlds cities_in_2016_data_booklet
Victor Gridnev
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Stanford GSB Corporate Governance Research Initiative
 

Viewers also liked (8)

I’d like you to meet my family
I’d like you to meet my familyI’d like you to meet my family
I’d like you to meet my family
 
Справка про Системный проект 2014
Справка про Системный проект 2014Справка про Системный проект 2014
Справка про Системный проект 2014
 
Boxes, Bathtubs and Bath-Puffs
Boxes, Bathtubs and Bath-PuffsBoxes, Bathtubs and Bath-Puffs
Boxes, Bathtubs and Bath-Puffs
 
Fiscal Summit: Summary and Key Findings
Fiscal Summit: Summary and Key FindingsFiscal Summit: Summary and Key Findings
Fiscal Summit: Summary and Key Findings
 
The responder
The responderThe responder
The responder
 
Gen-Fantastic Trip
Gen-Fantastic TripGen-Fantastic Trip
Gen-Fantastic Trip
 
The worlds cities_in_2016_data_booklet
The worlds cities_in_2016_data_bookletThe worlds cities_in_2016_data_booklet
The worlds cities_in_2016_data_booklet
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similar to Shree krishna 20140214

Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)
Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)
Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)
Joget Workflow
 
Scaling Experimentation & Data Capture at Grab
Scaling Experimentation & Data Capture at GrabScaling Experimentation & Data Capture at Grab
Scaling Experimentation & Data Capture at Grab
Roman
 
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYFUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
ijwscjournal
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
ijcses
 
Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...
Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...
Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...
InfluxData
 
Second review presentation
Second review presentationSecond review presentation
Second review presentationArvind Krishnaa
 
automatic database schema generation
automatic database schema generationautomatic database schema generation
automatic database schema generation
soma Dileep kumar
 
Framework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareFramework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareIAEME Publication
 
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
IRJET Journal
 
Dr. Andreas Lattner- Setting up predictive services with Palladium
Dr. Andreas Lattner- Setting up predictive services with PalladiumDr. Andreas Lattner- Setting up predictive services with Palladium
Dr. Andreas Lattner- Setting up predictive services with Palladium
PyData
 
iiwas 2010
iiwas 2010iiwas 2010
iiwas 2010steccami
 
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
wafaa radwan
 
Summarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering TechniquesSummarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering Techniques
Nikos Katirtzis
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET Journal
 
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYFUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
ijwscjournal
 
Performance eng prakash.sahu
Performance eng prakash.sahuPerformance eng prakash.sahu
Performance eng prakash.sahu
Dr. Prakash Sahu
 
Ajila (1)
Ajila (1)Ajila (1)
Ajila (1)
akanksha kunwar
 
NEW LAUNCH! Introduction to AWS X-Ray
NEW LAUNCH! Introduction to AWS X-RayNEW LAUNCH! Introduction to AWS X-Ray
NEW LAUNCH! Introduction to AWS X-Ray
Amazon Web Services
 

Similar to Shree krishna 20140214 (20)

Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)
Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)
Joget Workflow Clustering and Performance Testing on Amazon Web Services (AWS)
 
Scaling Experimentation & Data Capture at Grab
Scaling Experimentation & Data Capture at GrabScaling Experimentation & Data Capture at Grab
Scaling Experimentation & Data Capture at Grab
 
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYFUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
 
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCERESEARCH ON DISTRIBUTED SOFTWARE TESTING  PLATFORM BASED ON CLOUD RESOURCE
RESEARCH ON DISTRIBUTED SOFTWARE TESTING PLATFORM BASED ON CLOUD RESOURCE
 
Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...
Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...
Phil Day [Configured Things] | Policy-Driven Real-Time Data Filtering from Io...
 
Second review presentation
Second review presentationSecond review presentation
Second review presentation
 
automatic database schema generation
automatic database schema generationautomatic database schema generation
automatic database schema generation
 
Framework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy softwareFramework for service oriented development of monolithic legacy software
Framework for service oriented development of monolithic legacy software
 
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
Scheduling of Heterogeneous Tasks in Cloud Computing using Multi Queue (MQ) A...
 
Dr. Andreas Lattner- Setting up predictive services with Palladium
Dr. Andreas Lattner- Setting up predictive services with PalladiumDr. Andreas Lattner- Setting up predictive services with Palladium
Dr. Andreas Lattner- Setting up predictive services with Palladium
 
iiwas 2010
iiwas 2010iiwas 2010
iiwas 2010
 
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
YAFA-SOA: a GA-based Optimizer for Optimizing Security and Cost in Service Co...
 
Summarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering TechniquesSummarizing Software API Usage Examples Using Clustering Techniques
Summarizing Software API Usage Examples Using Clustering Techniques
 
IRJET - Finger Vein Extraction and Authentication System for ATM
IRJET -  	  Finger Vein Extraction and Authentication System for ATMIRJET -  	  Finger Vein Extraction and Authentication System for ATM
IRJET - Finger Vein Extraction and Authentication System for ATM
 
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGYFUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
FUZZY-BASED ARCHITECTURE TO IMPLEMENT SERVICE SELECTION ADAPTATION STRATEGY
 
iiwas2009
iiwas2009iiwas2009
iiwas2009
 
Performance eng prakash.sahu
Performance eng prakash.sahuPerformance eng prakash.sahu
Performance eng prakash.sahu
 
Ajila (1)
Ajila (1)Ajila (1)
Ajila (1)
 
NEW LAUNCH! Introduction to AWS X-Ray
NEW LAUNCH! Introduction to AWS X-RayNEW LAUNCH! Introduction to AWS X-Ray
NEW LAUNCH! Introduction to AWS X-Ray
 
Webx 2010
Webx 2010Webx 2010
Webx 2010
 

Recently uploaded

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 

Recently uploaded (20)

State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 

Shree krishna 20140214

  • 1. A Study on Behavior Mining of Cloud computing users  Shree Krishna Shrestha 12054071 Graduate School of Engineering Muroran Institute of Technology, Muroran, Hokkaido, Japan 2014・02.14
  • 2. CONTENTS  Introduction  Test-bed Cloud System: Jyaguchi Introduction  Problem Definition  Algorithm Description : 1. TWSMA 2.Recommendation  Experiment and Results  Conclusion
  • 3. INTRODUCTION AND PURPOSE  Purpose:  A framework to recommend service Method to mine services, based on the behavior of service user  Method to Recommend Services based on the result data of mining of services   Jyaguchi:  A cloud system proposed by Bishnu Prasad Gautam  Based on service on demand and pay per use business model
  • 4. TEST BED CLOUD SYSTEM :JYAGUCHI (OVERVIEW) Jyaguchi is a SAAS based cloud that provides a platform to develop application as service with multi-language support. component AddService Component component Calculator Service Component JavaScript component SubtractService Component Ruby component MultiplyService Component Python Component DivideService Component Groovy Ref: As per the Definition of Inventor of Jyaguchi, Asst. Prof. Bishnu Prasad Guatam Features  Software as Service(SaaS)  Distributed Resource Management Pay per use Business Model  Service on Demand
  • 5. TEST BED CLOUD SYSTEM: JYAGUCHI  Logs the activity of users with in Interface
  • 6. MAJOR ISSUE IN MINING OF SERVICES What is difference between mining Item and Service? Why current Item mining cannot be used for Service mining? Usage Time Service Mining Mining for frequent service usage pattern considering not only service usage frequency but also the service usage time
  • 7. ALGORITHM FOR SERVICE MINING  Propose an algorithm for service mining which consider the time of service usage. Time Weight Sequence Mining Algorithm (TWSMA) Create Multi-dimensional Weighted Service Sequence Database Mining Multi-dimensional Sequence
  • 8. CREATION OF SERVICE WEIGHT INPUT SEQUENCE Input: Service Usage logs; Unit time u Output: Multi-dimensional Weighted Service Sequence Database (MDWSSDB) 1: Calculate service usage time from service usage logs for each service on each position. 2: Create Multi-dimensional service usage time sequence from service usage logs 3: Calculate , Service Count, for each service on each position 4: Calculate Absolute Service Weight, for each service on each position 5: Calculate Relative Service Weight for each service on each position 6: Make Weighted Sequence (ws) integrating service id sj with its Related Service Weight. 7: Create MDWSSDB with integrating ws and associated user id.
  • 9. CALCULATION OF RELATIVE SERVICE WEIGHT Multi-dimensional service usage time sequence Seq. id User_id Sequence 1 10 (2,6),(123,16),(456,31),(2,33),(456,35) 2 10 (2,21),(2,20),(2,22),(1,22),(2,21) 3 16 (2,1),(123,9),(456,1),(123,1),(456,15 4 15 (456,19),(456,24)(234,24),(456,43 5 15 (234,20),(234,11),(234,30),(456,38) 6 16 (456,19),(123,39),(456,30),(234,30) Service Weight of service 2 for user 10, ST2,10 = (6 + 33 + 21 + 20 + (456, min 22 + 21) min = 12335) T10 = (6 + 16 + 31 Service Use time +33+35+21+20+22+22+ 21) ID min = 227 min. ASW2,10= 123/227 = 0.542 For unit time (ut) 5 min, service usage count for service 2 at position 1 and sequence 1 is (SC2,1,1) = 6/5 = 1.2 RSW2,1,1 = 1.2 * 0.542 = 0.650
  • 10. EXAMPLE OF INPUT SEQUENCE Jyaguchi log data Seq. id User_id Sequence 1 10 (2,6),(123,16),(456,31),(2,33),(456,35) 2 10 (2,21),(2,20),(2,22),(1,22),(2,21) 3 16 (2,1),(123,9),(456,1),(123,1),(456,15 4 15 (456,19),(456,24)(234,24),(456,43 5 15 (234,20),(234,11),(234,30),(456,38) 6 16 (456,19),(123,39),(456,30),(234,30) (456, 35) Service ID Use time Calculation of service weights Seq. id User_id Sequence 1 10 (2,0.650),(123,0.224),(456,1.804),(2,3.577),(456,2.037) 2 10 (2,2.276),(2,2.168),(2,2.385),(1,0.427),(2,2.276) 3 16 (2,0.0014),(123,0.608),(456,0.089),(123,0.068),(456,1.344) 4 15 (456,2.253),(456,2.846)(234,1.954),(456,5.1) 5 15 (234,1.628),(234,0.895),(234,2.442),(456,4.507) 6 16 (456,1.702),(123,2.636),(456,2.688),(234,1.242) (456, 2.037) Service ID Service weight
  • 11. MINING MULTIDIMENSIONAL SEQUENCE  Input: Multi-dimensional Weighted Service Sequence        Database: MDWSSDB; Minimum support min support Output: The complete set of labeled frequent patterns 1: Calculate sequence database weight SDW of MDWSSDB 2: Calculate minimum weight Wm 3: Call ModiedPrexSpan 4: End if no frequent pattern is found or at end of database 5: Form Projected Sequence Database 6: Mine labeled frequent patterns from Projected Sequence Database
  • 12. MINING SEQUENTIAL PATTERN Total Database Weight (SDW )= (0.650+0.224+1.804+...+1.242)=49.83 For min_support 5% min_weight = 49.83*.05 = 2.49 Service id : 123 0.224+0.608+0.068+2.636 Total weight of service id 123 :3.53 User_i Sequence d 10 (2,0.650),(123,0.224),(456,1.804),(2,3.577), (456,2.037) 2 10 (2,2.276),(2,2.168),(2,2.385),(1,0.427),(2,2. 276) 3 16 (2,0.0014),(123,0.608),(456,0.089),(123,0.0 68),(456,1.344) Prefix Postfix 4 15 (456,2.253),(456,2.846)(234,1.954),(456,5. Prefix Postfix 2 <_123,456,2,456>,<_2,2,1,2>, 1) <2>-projected database <_123,456,123,456> 123 <_456,2,456>, 5 15 (234,1.628),(234,0.895),(234,2.442),(456,4. <_456,123,456>, <_456,123,456>, <_456,234> 507) 123 <_456,2,456>, <_456,234> <123>-projected database 6 16 (456,1.702),(123,2.636),(456,2.688),(234,1. 123,456 <_2,456>, <_123,456> 242) 2,123 Seq. id 1 <_456,2,456>,<_456,123,456>,<_456> Frequent Pattern : 123,456 <2,123>-projected database
  • 13. MINING SEQUENTIAL PATTERN For frequent service sequence<123; 456> User_i Sequence d 10 (2,0.650),(123,0.224),(456,1.804),(2,3.577), <123, (456,2.037) 456> 2 10 (2,2.276),(2,2.168),(2,2.385),(1,0.427),(2,2. 276) User_id 16 and * are found frequent 3 16 (2,0.0014),(123,0.608),(456,0.089),(123,0.0 68),(456,1.344) from postfix database. 4 15 (456,2.253),(456,2.846)(234,1.954),(456,5. 1) Prefix Postfix 15 (234,1.628),(234,0.895),(234,2.442),(456,4. 2 <_123,456,2,456>,<_2,2,1,2>, 5 <2>-projected database 507) <_123,456,123,456> 6 16 (456,1.702),(123,2.636),(456,2.688),(234,1. 123 <_456,2,456>, <_456,123,456>, <_456,234> 242) <123>-projected database Prefix 2,123 Labeled frequent pattern <10>;<16 (16; <123; 456>); (*,<123; 456>) >; <16> Postfix Seq. id 1 <_456,2,456>,<_456,123,456>,<_456> <2,123>-projected database
  • 14. RECOMMENDATION OF SERVICES  Based on result labelled Frequent pattern from TWSMA  Categorized for 3 user group 1. 2. 3. Anonymous Users/First time User Group, Registered Users group without Previous History of Service Usage (don’t have current service usage log)., Registered Users group with Previous History of Service Usage (have current service usage log).
  • 16. RECOMMENDING SERVICE Frequent Patterns User_id Anonymous Users Group Sequence support 10 2 3 * 234 4 15 234,456 2 * 456,234 2 16 456,123,456 2 * 2,123,,456 2 Services with highest support Recommended Service: 234
  • 17. RECOMMENDING SERVICE Frequent Patterns User_id First Time User user_id 14 Sequence support 10 2 3 * 234 4 15 234,456 2 * 456,234 2 16 456,123,456 2 * 2,123,,456 2 Services with highest support Recommended Service: 234
  • 18. RECOMMENDING SERVICE Frequent Patterns User_id Authorized User 10 Sequence support 10 2 3 * 234 4 15 234,456 2 * 456,234 2 16 456,123,456 2 * 2,123,,456 2 Services with highest support of that user Recommended Service: 2
  • 19. RECOMMENDING SERVICE Frequent Patterns User_id Sequence support 10 2 3 * 234 4 15 234,456 456,234 2 16 456,123,456 2 * 2,123,,456 2 Next service from the frequent pattern with highest support 2 * Authorized User 15 and has used service 234 Recommended Service: 456
  • 20. RECOMMENDING SERVICE Frequent Patterns User_id Sequence support 10 2 3 * 234 3 15 234,456 2 * 456,234 456,123,456 2 * 2,123,,456 2 - This sequence is not in frequent pattern - Drop 2 and search from remaining sequence. i.e. 456, 123 2 16 Logged in user 16 who has used service 2,456,123 Recommended Service: 234
  • 21. EXPERIMENTS (TWSMA)  Experiment Methodology  Implemented on Jyaguchi system  Used actual log of Jyaguchi Users  Varied minimum support to find variation in No. of patterns found and processing time.  Comapred No. of patterns found and processing time with seq-dim algorithm.
  • 22. EXPERIMENT RESULTS (1) • No. of patterns and Process time with no. of sequences for varied minimum support
  • 23. EXPERIMENT RESULTS (3) • No. of patterns and Process time with no. of sequences for varied minimum support
  • 24. EXPERIMENTS (TWSMA)  Precision and Recall based evaluation  Experiment Methodology  Learning Phase:     Find frequent services from log data of prior to implementing TWSMA algorithm with various minimum support did an online survey among Jyaguchi Users about the favorite services. found common services in between survey data and frequent services for various minimum support which is used as relevant services. Evaluation Phase    Users Use Jyaguchi system where services are recommended from 3 algorithms: 1. TWSMA, 2. SEQ-DIM and 3. Random Calculate Precision and Recall for each user. Take average of Precision and Recall for various minimum support.
  • 25. EXPERIMENT RESULTS (3) Comparision of Precision and recall for Various minimum support for 3 algorithm Minimum_support:7% Minimum_support:10%
  • 26. EXPERIMENT RESULTS (4) Comparision of Precision and recall for Various minimum support for 3 algorithm Minimum_support:12% Minimum_support:15%
  • 27. CONCLUSION AND FUTURE WORKS Conclusion • proposed a framework for recommending services utilizing service usage time as service weight. • Implemented the algorithm in the Jyaguchi System. • Evaluated the proposed framework on Jyaguchi System. Future Tasks • Implement and evaluate algorithm on other SAAS based Cloud system. • Add the dimension of user profile for better recommendation

Editor's Notes

  1. Ladies and gentleman, I am Shree Krishna currently studying on Master degree in Muroran Institute of Technology, Hokkaido, Japan. Today I am going to present on Recommendation of a Cloud Service Item Based on Service Utilization Patterns in Jyaguchi
  2. In this Presentation, I will firstly introduce my research and purpose of my research. Then I will briefly introduce Jyaguchi system which we had used as a testbed for our research. Then I will talk about problem in mining algorithm for mining service and describe our algorithm for service mining. Then I will discuss about the recommendation algorithm used for this research. Then I will explain experiments and results regarding our algorithms. Finally I will conclude our presentation.
  3. In this presentaion we will purpose an algorithm for mining service and recommendation of service based on the behaviour of service user in cloud system. We had defined mining of service as Service mining which is the mining for frequent service usage pattern considering not only service usage frequency but also the service usage time.For this particular purspose we had used a cloud system Jyaguchi which was proposed by Bishnu Prasad Gautam.
  4. Jyaguchi Systemis the system proposed and developed by prof. Bishnu Prasad Gautam during his Master Degree. This has lots of features among which I had listed four here.Another feature of this system is pay per Use Business Model. Unlike the system in which the softwares are installed and used in ersonal machine, all the services are run in the server computer and user pay for the time of that service used which is pay per use business model.Service on Demand is the feature which allows user of Jyaguchi to use the service at their favourable time from system. this sample uses four script languages.JavaScript for addingRuby for substractionPython for MultiplicationGroovy for division
  5. These are the user interfaces of Jyaguchi system. Left one is called as unified user interface which have clouds of services and other information boxes.………With leaving the Jyaguchi now I will talk about why service mining was needed.
  6. These days cloud computing is very hot topic. All big named company are shifting on clouds. Then the clouds which usage pay per use business model how can we recommendation system. Before answering this question, we should answer two question first.What is difference between mining of Item and mining of Service?Why current Item mining cannot be used for Service mining?The main difference is Usage time.The Items once bought are finished. It doesnot matter how long he used that item or when he used that item. So, most of the algorithm of item mining is based on frequency of item. But for services, usage time is very much important. The services are used for certain time and payment will be done for that period. So, service which have long period of use with its frequency of uses should be recommended for user. The solution for mining of services on those cloud systems is given by service mining which is Mining of services utilizing the frequency of uses and service usage time of users.
  7. For the service mining purpose we had purposed a new algorithm called TWSMA. It is not a completely new algorithm but a modification of a existing algorithms. We had modified the multidimensional sequence mining algorithm in a way that it takes count of service usage time also.This algorithm has mainly two partsCreation of service weightMining Multidimensional Sequence
  8. We will calculate the service weight of each service in each sequence. The weight of service in sequence is the time of service used by a user to the total time of that user in the system.Then calculated service weight with service id will make input sequence.
  9. Here is the example of input sequence. The first table has service id and respective usage time separated by commas. After calculating weight of each service in each position, Table2 is service weight input sequence where service_id and service weight are making set.User id is next dimension of this sequence
  10. With the frequent sequence and dimension, projected MD-database will be created.Got 10 and 16 for 2,123,456