SlideShare a Scribd company logo
1 of 4
A Cocktail Approach for Travel Package Recommendation 
A Cocktail Approach for Travel Package Recommendation 
ABSTRACT: 
Recent years have witnessed an increased interest in recommender systems. Despite significant 
progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides 
a study of exploiting online travel information for personalized travel package recommendation. 
A critical challenge along this line is to address the unique characteristics of tra vel data, which 
distinguish travel packages from traditional items for recommendation. To that end, in this paper, 
we first analyze the characteristics of the existing travel packages and develop a tourist-area-season 
topic (TAST) model. This TAST model can represent travel packages and tourists by 
different topic distributions, where the topic extraction is conditioned on both the tourists and the 
intrinsic features (i.e., locations, travel seasons) of the landscapes. Then, based on this topic 
model representation, we propose a cocktail approach to generate the lists for personalized travel 
package recommendation. Furthermore, we extend the TAST model to the tourist-relation-area-season 
topic (TRAST) model for capturing the latent relationships among the to urists in each 
travel group. Finally, we evaluate the TAST model, the TRAST model, and the cocktail 
recommendation approach on the real-world travel package data. Experimental results show that 
the TAST model can effectively capture the unique characterist ics of the travel data and the 
cocktail approach is, thus, much more effective than traditional recommendation techniques for 
travel package recommendation. Also, by considering tourist relationships, the TRAST model 
can be used as an effective assessment for travel group formation. 
There are many technical and domain challenges inherent in designing and implementing an 
effective recommender system for personalized travel package recommendation. 
1. Travel data are much fewer and sparser than traditional items, such as movies for 
recommendation, because the costs for a travel are much more expensive than for 
watching a movie. 
2. Every travel package consists of many landscapes (places of interest and attractions), 
and, thus, has intrinsic complex spatio-temporal relationships. For example, a travel 
Contact: 9703109334, 9533694296 
EXISTING SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A Cocktail Approach for Travel Package Recommendation 
package only includes the landscapes which are geographically colocated together. Also, 
different travel packages are usually developed for different travel seasons. Therefore, the 
landscapes in a travel package usually have spatial temporal autocorrelations. 
3. Traditional recommender systems usually rely on user explicit ratings. However, for 
travel data, the user ratings are usually not conveniently available. 
DISADVANTAGES OF EXISTING SYSTEM: 
 Recommendation has a long period of stable value. 
 To replace the old ones based on the interests of the tourists. 
 A values of travel packages can easily depreciate over time and a package usually 
only lasts for a certain period of time 
In this paper, we aim to make personalized travel package recommendations for the tourists. 
Thus, the users are the tourists and the items are the existing packages, and we exploit a real-world 
travel data set provided by a travels for building recommender systems. we develop a 
tourist-area-season topic (TAST) model, which can represent travel packages and tourists by 
different topic distributions. In the TAST model, the extraction of topics is conditioned on both 
the tourists and the intrinsic features (i.e., locations, travel seasons) of the landscapes. Based on 
this TAST model, a cocktail approach is developed for personalized travel package 
recommendation by considering some additional factors including the seasonal behaviors of 
tourists, the prices of travel packages, and the cold start problem of new packages. 
ADVANTAGES OF PROPOSED SYSTEM: 
 Represent the content of the travel packages and the interests of the tourists. 
 TAST model can effectively capture the unique characteristics of travel data. 
 The cocktail recommendation approach performs much better than traditional techniques. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A Cocktail Approach for Travel Package Recommendation 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
A Cocktail Approach for Travel Package Recommendation 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Qi Liu, Enhong Chen, Hui Xiong, Yong Ge, Zhongmou Li, and Xiang Wu ,“A Cocktail 
Approach for Travel Package Recommendation”, IEEE TRANSACTIONS, VOL. 26, NO. 2, 
FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

Similar to a cocktail approach for travel package recommendation

IRJET- Travelmate Travel Package Recommendation System
IRJET-  	  Travelmate Travel Package Recommendation SystemIRJET-  	  Travelmate Travel Package Recommendation System
IRJET- Travelmate Travel Package Recommendation SystemIRJET Journal
 
A survey on a cocktail approach for travel package recommendation
A survey on a cocktail approach for travel package recommendationA survey on a cocktail approach for travel package recommendation
A survey on a cocktail approach for travel package recommendationeSAT Journals
 
Travel route scheduling based on user’s preferences using simulated annealing
Travel route scheduling based on user’s preferences using simulated annealingTravel route scheduling based on user’s preferences using simulated annealing
Travel route scheduling based on user’s preferences using simulated annealingIJECEIAES
 
EFFICIENT AND END TO END TOUR SYSTEM
EFFICIENT AND END TO END TOUR SYSTEMEFFICIENT AND END TO END TOUR SYSTEM
EFFICIENT AND END TO END TOUR SYSTEMIRJET Journal
 
A Review on Tourist Analyzer
A Review on Tourist AnalyzerA Review on Tourist Analyzer
A Review on Tourist AnalyzerIRJET Journal
 
Hybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selectionHybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selectionIAEME Publication
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...IJSRD
 
IRJET- Location-Based Route Recommendation System with Effective Query Keywords
IRJET- Location-Based Route Recommendation System with Effective Query KeywordsIRJET- Location-Based Route Recommendation System with Effective Query Keywords
IRJET- Location-Based Route Recommendation System with Effective Query KeywordsIRJET Journal
 
Personalized travel sequence recommendation on multi source big social media
Personalized travel sequence recommendation on multi source big social mediaPersonalized travel sequence recommendation on multi source big social media
Personalized travel sequence recommendation on multi source big social mediaShakas Technologies
 
Prod Ser Man Exam Dec 07 Inc Gline Ans
Prod Ser Man Exam Dec 07 Inc Gline AnsProd Ser Man Exam Dec 07 Inc Gline Ans
Prod Ser Man Exam Dec 07 Inc Gline AnsTonyversity
 
Designing The Tourist Agency Of The Future
Designing The Tourist Agency Of The FutureDesigning The Tourist Agency Of The Future
Designing The Tourist Agency Of The FutureThomas Cook Belgium
 
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...IRJET Journal
 
Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...
Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...
Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...ijtsrd
 
IRJET- Analysis of Trajectories
IRJET- Analysis of TrajectoriesIRJET- Analysis of Trajectories
IRJET- Analysis of TrajectoriesIRJET Journal
 
A Web Application for Recommending Personalized Mobile Tourist Routes
A Web Application for Recommending Personalized Mobile Tourist RoutesA Web Application for Recommending Personalized Mobile Tourist Routes
A Web Application for Recommending Personalized Mobile Tourist RoutesTrieu Nguyen
 
Personalized Route Recommendation for self-drive tourists based on V2V commun...
Personalized Route Recommendation for self-drive tourists based on V2V commun...Personalized Route Recommendation for self-drive tourists based on V2V commun...
Personalized Route Recommendation for self-drive tourists based on V2V commun...IRJET Journal
 
Smart Tourism Recommender System
Smart Tourism Recommender SystemSmart Tourism Recommender System
Smart Tourism Recommender SystemIRJET Journal
 

Similar to a cocktail approach for travel package recommendation (20)

IRJET- Travelmate Travel Package Recommendation System
IRJET-  	  Travelmate Travel Package Recommendation SystemIRJET-  	  Travelmate Travel Package Recommendation System
IRJET- Travelmate Travel Package Recommendation System
 
A survey on a cocktail approach for travel package recommendation
A survey on a cocktail approach for travel package recommendationA survey on a cocktail approach for travel package recommendation
A survey on a cocktail approach for travel package recommendation
 
Tourist Analyzer
Tourist AnalyzerTourist Analyzer
Tourist Analyzer
 
Travel route scheduling based on user’s preferences using simulated annealing
Travel route scheduling based on user’s preferences using simulated annealingTravel route scheduling based on user’s preferences using simulated annealing
Travel route scheduling based on user’s preferences using simulated annealing
 
EFFICIENT AND END TO END TOUR SYSTEM
EFFICIENT AND END TO END TOUR SYSTEMEFFICIENT AND END TO END TOUR SYSTEM
EFFICIENT AND END TO END TOUR SYSTEM
 
A Review on Tourist Analyzer
A Review on Tourist AnalyzerA Review on Tourist Analyzer
A Review on Tourist Analyzer
 
ICTTT2015
ICTTT2015ICTTT2015
ICTTT2015
 
Hybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selectionHybrid recommendation technique for automated personalized poi selection
Hybrid recommendation technique for automated personalized poi selection
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
 
IRJET- Location-Based Route Recommendation System with Effective Query Keywords
IRJET- Location-Based Route Recommendation System with Effective Query KeywordsIRJET- Location-Based Route Recommendation System with Effective Query Keywords
IRJET- Location-Based Route Recommendation System with Effective Query Keywords
 
Personalized travel sequence recommendation on multi source big social media
Personalized travel sequence recommendation on multi source big social mediaPersonalized travel sequence recommendation on multi source big social media
Personalized travel sequence recommendation on multi source big social media
 
Prod Ser Man Exam Dec 07 Inc Gline Ans
Prod Ser Man Exam Dec 07 Inc Gline AnsProd Ser Man Exam Dec 07 Inc Gline Ans
Prod Ser Man Exam Dec 07 Inc Gline Ans
 
Designing The Tourist Agency Of The Future
Designing The Tourist Agency Of The FutureDesigning The Tourist Agency Of The Future
Designing The Tourist Agency Of The Future
 
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
IRJET- Intelligent Globetrotting Information System using Association Rule Mi...
 
Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...
Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...
Survey: Optimal Travel Route Discovery based on Topic Interest and Image Attr...
 
IRJET- Analysis of Trajectories
IRJET- Analysis of TrajectoriesIRJET- Analysis of Trajectories
IRJET- Analysis of Trajectories
 
A Web Application for Recommending Personalized Mobile Tourist Routes
A Web Application for Recommending Personalized Mobile Tourist RoutesA Web Application for Recommending Personalized Mobile Tourist Routes
A Web Application for Recommending Personalized Mobile Tourist Routes
 
Personalized Route Recommendation for self-drive tourists based on V2V commun...
Personalized Route Recommendation for self-drive tourists based on V2V commun...Personalized Route Recommendation for self-drive tourists based on V2V commun...
Personalized Route Recommendation for self-drive tourists based on V2V commun...
 
Smart Tourism Recommender System
Smart Tourism Recommender SystemSmart Tourism Recommender System
Smart Tourism Recommender System
 
Ijet v3 i1p4
Ijet v3 i1p4Ijet v3 i1p4
Ijet v3 i1p4
 

More from swathi78

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasesswathi78
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...swathi78
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationswathi78
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service compositionswathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...swathi78
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksswathi78
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingswathi78
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networksswathi78
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingswathi78
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signaturesswathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...swathi78
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksswathi78
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...swathi78
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networksswathi78
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionswathi78
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engineswathi78
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...swathi78
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemswathi78
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesswathi78
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...swathi78
 

More from swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 

Recently uploaded

Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesRashidFaridChishti
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network DevicesChandrakantDivate1
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdfAldoGarca30
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information SystemsAnge Felix NSANZIYERA
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsmeharikiros2
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptAfnanAhmad53
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxMustafa Ahmed
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 

Recently uploaded (20)

Signal Processing and Linear System Analysis
Signal Processing and Linear System AnalysisSignal Processing and Linear System Analysis
Signal Processing and Linear System Analysis
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Augmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptxAugmented Reality (AR) with Augin Software.pptx
Augmented Reality (AR) with Augin Software.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 

a cocktail approach for travel package recommendation

  • 1. A Cocktail Approach for Travel Package Recommendation A Cocktail Approach for Travel Package Recommendation ABSTRACT: Recent years have witnessed an increased interest in recommender systems. Despite significant progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to address the unique characteristics of tra vel data, which distinguish travel packages from traditional items for recommendation. To that end, in this paper, we first analyze the characteristics of the existing travel packages and develop a tourist-area-season topic (TAST) model. This TAST model can represent travel packages and tourists by different topic distributions, where the topic extraction is conditioned on both the tourists and the intrinsic features (i.e., locations, travel seasons) of the landscapes. Then, based on this topic model representation, we propose a cocktail approach to generate the lists for personalized travel package recommendation. Furthermore, we extend the TAST model to the tourist-relation-area-season topic (TRAST) model for capturing the latent relationships among the to urists in each travel group. Finally, we evaluate the TAST model, the TRAST model, and the cocktail recommendation approach on the real-world travel package data. Experimental results show that the TAST model can effectively capture the unique characterist ics of the travel data and the cocktail approach is, thus, much more effective than traditional recommendation techniques for travel package recommendation. Also, by considering tourist relationships, the TRAST model can be used as an effective assessment for travel group formation. There are many technical and domain challenges inherent in designing and implementing an effective recommender system for personalized travel package recommendation. 1. Travel data are much fewer and sparser than traditional items, such as movies for recommendation, because the costs for a travel are much more expensive than for watching a movie. 2. Every travel package consists of many landscapes (places of interest and attractions), and, thus, has intrinsic complex spatio-temporal relationships. For example, a travel Contact: 9703109334, 9533694296 EXISTING SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. A Cocktail Approach for Travel Package Recommendation package only includes the landscapes which are geographically colocated together. Also, different travel packages are usually developed for different travel seasons. Therefore, the landscapes in a travel package usually have spatial temporal autocorrelations. 3. Traditional recommender systems usually rely on user explicit ratings. However, for travel data, the user ratings are usually not conveniently available. DISADVANTAGES OF EXISTING SYSTEM:  Recommendation has a long period of stable value.  To replace the old ones based on the interests of the tourists.  A values of travel packages can easily depreciate over time and a package usually only lasts for a certain period of time In this paper, we aim to make personalized travel package recommendations for the tourists. Thus, the users are the tourists and the items are the existing packages, and we exploit a real-world travel data set provided by a travels for building recommender systems. we develop a tourist-area-season topic (TAST) model, which can represent travel packages and tourists by different topic distributions. In the TAST model, the extraction of topics is conditioned on both the tourists and the intrinsic features (i.e., locations, travel seasons) of the landscapes. Based on this TAST model, a cocktail approach is developed for personalized travel package recommendation by considering some additional factors including the seasonal behaviors of tourists, the prices of travel packages, and the cold start problem of new packages. ADVANTAGES OF PROPOSED SYSTEM:  Represent the content of the travel packages and the interests of the tourists.  TAST model can effectively capture the unique characteristics of travel data.  The cocktail recommendation approach performs much better than traditional techniques. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. A Cocktail Approach for Travel Package Recommendation SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. A Cocktail Approach for Travel Package Recommendation SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7.  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Qi Liu, Enhong Chen, Hui Xiong, Yong Ge, Zhongmou Li, and Xiang Wu ,“A Cocktail Approach for Travel Package Recommendation”, IEEE TRANSACTIONS, VOL. 26, NO. 2, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in