SAVITRIBAI PHULE PUNE UNIVESITY. University recommendation system(urs)

Size: px
Start display at page:

Download "SAVITRIBAI PHULE PUNE UNIVESITY. University recommendation system(urs)"

Transcription

1 SAVITRIBAI PHULE PUNE UNIVESITY A PROJECT REPORT ON University recommendation system(urs) SUBMITTED TOWARDS THE PARTIAL FULFILLMENT OF THE REQUIREMENTS OF BACHELOR OF ENGINEERING(Computer Engineering) BY Ankita Dhanraj Marathe (B ) Harshada Karande (B ) Kalpana Bandal (B ) Nikita Dhanraj Marathe (B ) UNDER THE GUIDANCE OF Prof. L.B.Bhagawat Department Of Computer Engineering MAEERs MAHARASHTRA INSTITUTE OF TECHNOLOGY Kothrud, Pune

2 MAHARASHTRA INSTITUTE OF TECHNOLOGY PUNE DEPARTMENT OF COMPUTER ENGINEERING C E R T I F I C A T E This is to certify that (URS) Submitted by Ankita Dhanraj Marathe (B ) Harshada Karande (B ) Kalpana Bandal (B ) Nikita Dhanraj Marathe (B ) is a bonafide work carried out by Students under the supervision of Prof.L.B.Bhagwat and it is submitted towards the partial fulfillment of the requirement of Bachelor of Engineering (Computer Engineering). Prof.L.B.Bhagwat Dept. of Computer Engg. Dr V.Y. Kulkarni Head of Comp. Dept.

3 Abstract Recommendation System is a subclass of information filtering system which takes input from users and provides User with the most suitable output to fulfill his requirements. This system is used to present a new college admission system using data mining techniques for tackling college admission prediction problems. This System uses content-based filtering to provide aspiring students (Master of Science) with the most appropriate choices of colleges based on different parameters. The system analyses the student academics, merit, background, student records and the college admission criteria. Then it predicts the likelihood of colleges the student may enter. In addition to the high prediction accuracy is an advantage, as the system can predict suitable colleges that match the students profiles and the suitable track channels through which the students are advised to enter. Keywords:Recommendation System, Recommender, Content Filtering, MinHash Algorithm

4 ACKNOWLEDGEMENT It gives us great pleasure in presenting the preliminary project report on University recommendation System.We would like to take this opportunity to thank our internal guide Prof.L.B.Bhagwat for giving us all the help and guidance we needed. We are really grateful for her kind support. Her valuable suggestions were very helpful. We are also grateful to Dr. V. Y. Kulkarni, Head of Computer Engineering Department, Maharashtra Institute of Technology, Pune for her indispensable support, suggestions.we are grateful to him for giving his valuable time and knowledge. Ankita Dhanraj Marathe Harshada Karande Kalpana Bandal Nikita Dhanraj Marathe (B.E. Computer Engineering) i

5 Contents 1 Synopsis Group Id Project Title Project Option Internal Guide Technical Keywords (As per ACM Keywords) Problem Statement Abstract Goals and Objectives Relevant mathematics associated with the Project System Description: Names of Conferences / Journals where papers can be published Review of Conference/Journal Papers supporting Project idea Plan of Project Execution TECHNICAL KEYWORDS AREA OF PROJECT TECHNICAL KEYWORDS INTRODUCTION PROJECT IDEA MOTIVATION OF THE PROJECT ii

6 3.3 LITERATURE SURVEY PROBLEM DEFINITION AND SCOPE PROBLEM STATEMENT Goals and Objectives Statement of Scope MAJOR CONSTRAINTS METHODOLOGIES OF PROBLEM SOLVING AND EFFICIENCY ISSUES OUTCOME HARDWARE RESOURCES REQUIRED SOFTWARE RESOURCES REQUIRED PROJECT PLAN PROJECT ESTIMATES Reconciled Estimates Project Resources RISK MANAGEMENT W.R.T. NP HARD ANALYSIS Risk Identification Risk Analysis Overview of Risk Mitigation, Monitoring, Management PROJECT SCHEDULE Project task set Task network Timeline Chart Team Organization Team structure Management reporting and communication iii

7 6 SOFTWARE REQUIREMENT SPECIFICATION INTRODUCTION User profiles Use cases Use case view FUNCTIONAL MODEL AND DESCRIPTION Activity Diagram Sequence Diagram Non Functional Requirements Design Constraints Software Interface Description DETAILED DESIGN DOCUMENT USING APPENDIX A AND B INTRODUCTION ARCHITECTURAL DESIGN System Architecture The Recommendation Engine SOP Analyze Engine Wishlist Engine The package diagram The deployment diagram Data Design Internal software data structure Database description COMPONENT DESIGN Class Diagram iv

8 8 PROJECT IMPLEMENTATION INTRODUCTION TOOLS AND TECHNOLOGIES USED Tools used are as follows: Technologies used are as follows: METHODOLOGIES AND ALGORITHMS DETAILS Algorithm For Recommendation Engine Algorithm For SOP Engine Algorithm For WishList Engine VERIFICATION AND VALIDATION FOR ACCEPTANCE SOFTWARE TESTING TYPES OF TESTING USED TEST CASES AND TEST RESULTS RESULTS SCREEN SHOTS DEPLOYMENT AND MAINTENANCE INSTALLATION AND UN-INSTALLATION Installation USER HELP FUTURE ENHANCEMENT AND CONCLUSION FUTURE SCOPE CONCLUSION REFERENCES 76 BIBLIOGRAPHY 77 v

9 Annexure A LABORATORY ASSIGNMENTS ON PROJECT ANAL- YSIS OF ALGORITHM DESIGN 79 Annexure B LABORATORY ASSIGNMENTS ON PROJECT QUAL- ITY AND RELIABILITY TESTING OF PROJECT DESIGN 83 Annexure C PROJECT PLANNER 89 Annexure D TERM-II PROJECT LABORATORY ASSIGNMENTS 91 Annexure E INFORMATION OF PROJECT GROUP MEMBERS 96 vi

10 List of Figures 5.1 Waterfall model Task network Use Case diagram Activity diagram-urs Application Sequence diagram-urs Sequence diagram-urs system architecture Recommendation Systems package diagram deployment diagram Class Diagram B.1 Divide and Conquer Strategy C.1 Plan of Project vii

11 List of Tables 5.1 Risk Table Use Cases A.1 IDEA Matrix viii

12 Chapter 1 Synopsis 1

13 1.1 Group Id Group ID Project Title 1.3 Project Option Inhouse Project 1.4 Internal Guide Prof. L.B. Bhagwat 1.5 Technical Keywords (As per ACM Keywords) Recommendation System Recommender Content Filtering MinHash Algorithm 1.6 Problem Statement Develop a web based application which can be installed on the system and performs following operations: Recommend Universities for MS. The application will recommend universities based on registered students profiles. Perform SOP Analysis MIT, Pune. 2 Dept. of Computer Engg.

14 The application will also perform sentiment analysis on Statement of Purpose which is required for admissions in universities. Analyze Wishlist The application will allow user to create his wish list of universities wherein he can analyze on factors that are required for getting admitted to a particular university. 1.7 Abstract Recommendation System is a subclass of information filtering system which takes input from users and provides User with the most suitable output to fulfill his requirements. This system is used to present a new college admission system using data mining techniques for tackling college admission prediction problems. This System uses content-based filtering to provide aspiring students (Master of Science) with the most appropriate choices of colleges based on different parameters. The system analyses the student academics, merit, background, student records and the college admission criteria. Then it predicts the likelihood of colleges the student may enter. In addition to the high prediction accuracy is an advantage, as the system can predict suitable colleges that match the student s profiles and the suitable track channels through which the students are advised to enter. 1.8 Goals and Objectives To increase accessibility and stimulate people to pursue an education (choose for education). To inform and help them to choose the study and environment that fits them best (choose education). MIT, Pune. 3 Dept. of Computer Engg.

15 1.9 Relevant mathematics associated with the Project System Description: Input I=set of inputs I = Login, Student Details Login =Username, Password Username =Username1, Username2,,Username Password = Password1, Password2,passwordn Student Details =Score, Financial capability, Branch Score = Toe score, GRE score Output Recommended Universities Divide And Conquer Strategies The algorithmic strategy of LSH algorithm is Divide and Conquer.To achieve recommendation, the algorithm divides data into two sets, performs procedure and give jaccard coefficient as output. This process is continued for all sets. So we divide problem into multiple sets and achieve recommendation. Classes: 1. Admin() 2. Student() 3. Recoomendation() 4. Database() MIT, Pune. 4 Dept. of Computer Engg.

16 5. University() Success Conditions: Candidate gets universities recommended successfully. Failure Conditions: 1. Candidate doesnt get recommended universities. 2. Wrong input entered. 3. Desired output is not displayed. Mathematical formulation: 1) Jaccard similarity coefficient The Jaccard coefficient measures similarity between finite sample sets, and is defined as the size of the intersection divided by the size of the union of the sample sets: 1.10 Names of Conferences / Journals where papers can be published IEEE/ACM Conference/Journal 1 Conferences/workshops in IITs Central Universities or SPPU Conferences IEEE/ACM Conference/Journal 2 MIT, Pune. 5 Dept. of Computer Engg.

17 1.11 Review of Conference/Journal Papers supporting Project idea Dharmendra Pathak, Sandeep Matharia and C. N. S. Murthy, NOVA: Hybrid Book Recommendation Engine, IEEE, 2012 Adomavicius and A. Tuzhilin, Toward the next generation of recommender systems: A survey of the state-of the-art and possible extensions, IEEE. G. Linden, B. Smith, and J. York, Amazon recommendations: Itemto- item collaborative filtering, IEEE, Feb Michael Hashler, Recommender Lab: A Framework for Developing and Testing Recommendation Algorithms Nov R. Bell, Y. Koren, and C. Volinsky, Modeling relationships at multiple scales to improve accuracy of large recommender systems KDD 07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, ACM, 2007 O. Celma and P. Herrera, A new approach to evaluating novel recommendations, RecSys 08: Proceedings of the 2008 ACM conference on Recommender systems, New York, NY, USA, ACM, C. N. Ziegler, S. M. McNee, J. A. Konstan, and G. Lausen, Improving recommendation lists through topic diversification: Proceedings of the 14th international conference on World Wide Web, New York, USA, ACM, Robin Burke, Hybrid Recommender Systems: Survey and Experiments, California State University, Fullerton Department of Information Systems and Decision Sciences. MIT, Pune. 6 Dept. of Computer Engg.

18 Ahu Sieg, Bamshad Mobasher, Robin Burke, Ontology-Based Collaborative Recommendation Plan of Project Execution MIT, Pune. 7 Dept. of Computer Engg.

19 Chapter 2 TECHNICAL KEYWORDS 8

20 2.1 AREA OF PROJECT The area of our project is Data Mining( Information Retrieval ). 2.2 TECHNICAL KEYWORDS A.Hardware Router or LAN for Internet Connection PC with at least 2GB RAM, Dual Core processor and WindowOS B.Architecture Client Server Architecture. Database Connectivity. Technical Keywords (As per ACM Keywords) Recommendation System Recommender Content Filtering MinHash Algorithm MIT, Pune. 9 Dept. of Computer Engg.

21 Chapter 3 INTRODUCTION 10

22 3.1 PROJECT IDEA Proposed a recommendation system which gathers information from the user and uses this information to suggest most appropriate and beneficial choices to the user. Every year large no of students have to face the task of selecting the best university for pursuing their Master Of Science (MS) degree. This system helps to recommend to the student, university which is best for them. 3.2 MOTIVATION OF THE PROJECT There are mainly three reasons which motivated us to complete this project and they are as follows: Many factors are sometimes not even considered by students in selecting their respective universities as they are sometimes not available on the university website and students end up making wrong decisions. Few of such factors are mentioned below. Geographical Location. Cost of course per semester. Weather of the place. Rank of the universities. University Staff. Information available on the University website is difficult to understand as they have complex structure. Searching for so many Universities can be time consuming as they are not available on single platform. MIT, Pune. 11 Dept. of Computer Engg.

23 3.3 LITERATURE SURVEY Recommendation system Recommendation systems were evolved as intelligent algorithms, which can generate results in the form of recommendations to users. They reduce the overhead associated with making best choices among the plenty. Now, Recommender systems can be implemented in any domain from E-commerce to network security in the form of personalized services. They provide benefit to both the consumer and the manufacturer, by suggesting items to consumers, which can t be demanded until the recommendations. Every recommender system comprises of two entities, one is user and other is item. A user can be any customer or consumer of any product or items, who get the suggestions. Input to recommendation algorithm can be a database of user and items and output obliviously will be the recommendations. As in our case, inputs consist of database of students and database of universities and the output consists of recommendation of universities. Earlier System In earlier days, there were no systems or websites that recommends the things using user s data or their behavior. But now a days there are a few systems which recommend the user or their customers their favorite products or things. But in these systems the recommendation works on only one algorithm or it can recommend user by using only one type of the data they are accessing or using their ratings to the respective products. So if system doesn t get any information from user if user is new or he/she cannot rate any product or buy any product then that time system fails to generate recommendation of products. MIT, Pune. 12 Dept. of Computer Engg.

24 Referred Papers Following papers have been referred to develop. The system Fast Locality-Sensitive Hashing by Anirban Dasgupta, Ravi Kumar,Tams Sarls They proposed a new and simple method to speed up the widely-used Euclidean realization of LSH. In that paper they were proposed two new algorithms to speed up LSH for the Euclidean distance. Their algorithms exploit the property of being able to compute Hadamard transforms fast and consequently are able to reduce the hash index construction time to O(d log d + kl). Interesting future directions include using this algorithms for applications such as deduplication, clustering, similarity joins, all-pair similarity search, etc. We have referred this paper for developing our Recommendation Engine for finding similarities between student and university attributes. NOVA: Hybrid Book Recommendation Engine Dharmendra Pathak, Sandeep Matharia and C. N. S. Murthy Chameli This paper described NOVA, which is a book recommendation engine, based on a unique Hybrid recommendation algorithm, satisfies a user by providing best and efficient books recommendations. It also presents a comparative case study of conventional recommendation algorithms to NOVAs Hybrid books recommendation algorithm. Input to the Hybrid book recommendation algorithm can be classified into two parts: a) Book Database b) User Database. We have referred the above paper for content based filtering of user and university database. Similarly input to our Recommendation Engine can be classified into two parts: a) Student Database b) University Database. Web Product Ranking Using Opinion Mining by Yin-Fu Huang and Heng Lin MIT, Pune. 13 Dept. of Computer Engg.

25 In this paper, a product ranking system using opinion mining techniques to find favorable products for users is presented. Opinion mining was a hot research topic in recent years. Opinion mining is very suitable for the applications many users to discuss a single topic when a large number of sentences and reviews are on the criticism of a single topic or when exactly identifying the correct rate of a bias direction is required to improve accuracy. Here, product ranking system considers three issues while calculating product scores: 1) product reviews, 2) product popularity, and 3) product release month. Eventually, this system would provide users to specify product features in a query, and send back the ranking results of all matched products. We have the above paper for developing our SOP analysis engine which provides user s analysis on their provided SOP. Inspiration The factors which inspired us to develop this system are listed as below:- Many factors are sometimes not even considered by students in selecting their respective universities as they are sometimes not available on the university website and students end up making wrong decisions. Few of such factors are mentioned below. Geographical Location. Cost of course per semester. Weather of the place. Rank of the universities. University Staff. Information available on the University website is difficult to understand as they have complex structure. MIT, Pune. 14 Dept. of Computer Engg.

26 Searching for so many Universities can be time consuming as they are not available on single platform. MIT, Pune. 15 Dept. of Computer Engg.

27 Chapter 4 PROBLEM DEFINITION AND SCOPE 16

28 4.1 PROBLEM STATEMENT Proposed a recommendation system which gathers information from the user and uses this information to suggest most appropriate and beneficial choices to the user. Every year large no of students have to face the task of selecting the best university for pursuing their Master Of Science (MS) degree. This system helps to recommend to the student, university which is best for them. The system works in three stages: 1.The registration system. 2.The information system. 3.The recommender system Goals and Objectives To increase accessibility and stimulate people to pursue an education (choose for education). To inform and help them to choose the study and environment that fits them best (choose education) Statement of Scope The project basically focuses on the requirements of students appearing for GRE exam and suggests the most appropriate choices of universities. It uses collaborative filtering algorithm to suggest the list of choices. This approach tries to overcome the shortcomings of other approaches. The project takes care of the database so that it gets updated every year in order to make sure that the students get the proper results. 4.2 MAJOR CONSTRAINTS 1. The live currency converter will not worked unless provided Internet access. MIT, Pune. 17 Dept. of Computer Engg.

29 2. For to work efficiently both university and student details should be provided accurately and completely. 4.3 METHODOLOGIES OF PROBLEM SOLVING AND EFFICIENCY ISSUES A problem can be solved by many different solutions. The methodologies of problem solving considers the performance parameters for each approach. Thus considering the efficiency issues. Recommendation Engine We had to gather required universities data and store it in SQLyog for future use. We modified algorithm for Jaccard s coefficient score. We had algorithm which previously was used for finding similar documents from the set of documents. We modified it for finding similarities between student and university attributes. Based on the Jaccard s Coefficient score, the user is provided with the appropriate list of universities. SOP Analysis We had to download WordNet dictionary. Then we had to import positive, negative and negation word lists in our database (SQLyog). SentiWordNet from WordNet dictionary had to be imported in our web application in Eclipse Mars, for the method extract() to get the score of the word when called by SOP Analysis. Extract() method takes help of SentiWordNet dictionary to calculate the polarity of the word. It takes words as input and returns a score as output. The negation words are calculated and then score of the remaining words in the statement is calculated by calling the extract() method.the Final score is calculated as follows:- Final Score = Negation Score + Remaining words Score. WishList MIT, Pune. 18 Dept. of Computer Engg.

30 Firstly, user s details are fetched from database. Then University details are fetched which user has added in the WishList to be compared and analyzed. One by one similar attributes of both university and user profiles are compared and the result is displayed below on the screen. 4.4 OUTCOME System proposed web application which recommend the list of universities according to user profile for their higher education. 4.5 HARDWARE RESOURCES REQUIRED 1. PC with at least 2GB RAM, Dual Core processor and WindowOS 2. Router or LAN for Internet Connection 4.6 SOFTWARE RESOURCES REQUIRED Platform: Eclipse IDE Operating System: windows 7/8 Programming Language: Java, Jsp. MIT, Pune. 19 Dept. of Computer Engg.

31 Chapter 5 PROJECT PLAN 20

32 5.1 PROJECT ESTIMATES In The Waterfall approach, the whole process of software development is divided into separate phases. In Waterfall model, typically, the outcome of one phase acts as the input for the next phase sequentially. Figure 5.1: Waterfall model The sequential phases in Waterfall model are: Requirement Gathering and analysis: All possible requirements of the system to be developed are captured in this phase and documented in a requirement specification document. Hardware Requirements: * PC with at least 2GB RAM, Dual Core processor and WindowOS. * Router or LAN for Internet Connection MIT, Pune. 21 Dept. of Computer Engg.

33 Software Requirements: * Platform: Eclipse IDE * Operating System: windows 7/8 * Programming Language: Java, Jsp. System Design: The requirement specifications from first phase are studied in this phase and system design is prepared. System Design helps in specifying hardware and system requirements and also helps in defining overall system architecture. The App will be developed using Eclipse platform. The app is created using Java. Implementation: With inputs from system design, the system is first developed in small programs called units, which are integrated in the next phase. Each unit is developed and tested for its functionality which is referred to as Unit Testing. The following units were serially developed: 1. Login module. 2. Registration module. 3. Recommendation Manager. 4. Sop Analysis. 5. Wishlist analysis. Integration and Testing: All the units developed in the implementation phase are integrated into a system after testing of each unit. Post integration the entire system is tested for any faults and failures. MIT, Pune. 22 Dept. of Computer Engg.

34 Deployment of system: Once the functional and non functional testing is done, the product is deployed in the customer environment or released into the market. User can use this web application for their problem solution Maintenance: There are some issues which come up in the client environment. To fix those issues patches are released. Also to enhance the product some better versions are released. Waterfall Model Application Every software developed is different and requires a suitable SDLC approach to be followed based on the internal and external factors. Some situations where the use of Waterfall model is most appropriate are: Requirements are very well documented, clear and fixed. Product definition is stable. Technology is understood and is not dynamic. There are no ambiguous requirements. Ample resources with required expertise are available to support the product. The project is short Reconciled Estimates Cost Estimate The cost of creating a Website would be broken down as :- A basic must in creating a website is buying your own domain name. The prices for domains vary from registrar to registrar, and are around USD 10 or so per year. MIT, Pune. 23 Dept. of Computer Engg.

35 This is a monthly fee that you have to pay to the web host. Prices vary from web host to web host but are usually around USD 10 per month if your website is new and doesn t have much traffic or data. Time Estimate Time Estimates: 8 months Project Resources Hardware Resources: PC with at least 2GB RAM, Dual Core processor and WindowOS. Router or LAN for Internet Connection. Software Resources: Platform: Eclipse IDE (Eclipse Mars ) and SQLyog. Operating System: windows 7/8 Programming Language: Java, Jsp. Human Resources: The team includes four members who are involved in making the project. Our internal guide has helped us to solve our doubts and remove the errors in the project. 5.2 RISK MANAGEMENT W.R.T. NP HARD ANALYSIS Risk management is concerned with identifying risks and drawing up plans to minimize their effects on a project. A risk is a probability that some adverse circumstance will occur. MIT, Pune. 24 Dept. of Computer Engg.

36 5.2.1 Risk Identification Risk identification is the process of determining risks that could potentially prevent the program, enterprise, or investment from achieving its objectives. It includes documenting and communicating the concern. The major types of risks are:- Project risks affect schedule or resources Performance risk affects the quality or performance of the software being developed. Technology risk affects the technical aspects of the projects. For e.g. Database, function re-usability. The main areas of the project that involves significant risks are: Performance Risks It is vital that a project database should be updated regularly on the basis of new added universities and their true database. It is important to collect new student database to enhance project performance. Project Risks Project involves a branch of computer science (machine learning) that has captivated computer scientists for decades. Making a machine enough powerful to learn from a behavior and behave intelligently has been a challenge for scientists since decades. Our major concern in the project is to provide extremely relevant and filtered university results. It is a difficult task to collect a university database. Branches such as Machine learning are in their infancy. Irrelevant results of universities to users would not only lead to improper network usage but also waste user s time and money. MIT, Pune. 25 Dept. of Computer Engg.

37 5.2.2 Risk Analysis The risks for the Project can be analyzed within the constraints of time and quality ID Risk Description Probability Impact Quality Overall 1 Tampering or stealing the student profile Low High High 2 Internet Connectivity Low Low Low 3 University database updation High High High 4 Handling of database by different Admin Low High High Table 5.1: Risk Table Overview of Risk Mitigation, Monitoring, Management Following are the details for each risk. Risk ID 1 Risk Description Tampering or stealing the student profile will lead to identity theft and system hacking. Category Database Environment. Source Platform: SQLyog Probability Low Impact High Response Aggravate Strategy We have protected the student password in the database by using hash key generation. Risk Status Not occurred Risk ID 2 Risk Description Internet dis-connectivity can lead to user not able to access the website. Category Requirements Source Router or LAN cable Probability Low Impact Low Response Aggravate Strategy Use of good quality of Router or LAN cable. Risk Status Identified MIT, Pune. 26 Dept. of Computer Engg.

38 Risk ID 3 Risk Description University database updation. Category Requirements Source This was identified during early development. Probability High Impact High Response Accept Strategy We have made our System Live. Risk Status Identified Risk ID 4 Risk Description Handling of database by different Admin leading to data inconsistence. Category Development Source This was identified during early development. Probability Low Impact High Response Accept Strategy We have only one Admin to our system so as to maintain consistence in the database. Risk Status Identified 5.3 PROJECT SCHEDULE Project scheduling is crucial and important to complete project successfully. Implementing an effective schedule keeps projects on track by setting time frame and budget parameters, and helps ensure qualities of the finished project. Understanding the importance of project scheduling and its role in developing projects can help to complete tasks more efficiently Project task set Major Tasks in the Project stages are: Task 1: Selecting the project domain & the project. Task 2: Project Planning. Task 3: Study of tools and technology. Task 4: Designing of module 1 (Recommendation Engine). MIT, Pune. 27 Dept. of Computer Engg.

39 Task 5: Designing of module 2 (SOP Analysis). Task 6: Designing of module 3 (WishList). Task 7: Implementation and Coding. Task 8: Testing. Task 9: Deployment Task network Figure 5.2: Task network MIT, Pune. 28 Dept. of Computer Engg.

40 5.3.3 Timeline Chart See Table below MIT, Pune. 29 Dept. of Computer Engg.

41 5.4 Team Organization Team structure We have completed the journal, report and partial implementation of our project. The project was equally divided and distributed among the team members Management reporting and communication We had loads of project meetings to complete all of our tasks. We also meet our project guide frequently to discuss about our problems and take her guidance to solve problems. s, phone calls and messages were also used to communicate within the team. MIT, Pune. 30 Dept. of Computer Engg.

42 Chapter 6 SOFTWARE REQUIREMENT SPECIFICATION 31

43 6.1 INTRODUCTION People make decisions every day. There are too many choices and a little time to explore them all. Recommendation systems help people make decisions in these complex information spaces. Recommendation systems are a type of information filtering that presents lists of items (films, songs, books, videos, images, products, web pages...) which are likely of user interest. Amazon, Last.fm, Ulike, ilike, Netflix, Pandora are the most popular recommender systems all over the world. Simply they compare user interest acquired from his/her profile with some reference characteristics and predict the rating that the user would give. Those characteristics maybe from the item information(content-based approach) or the user s social profile (collaborative filtering approach). Definition Of Recommendation Systems Recommendation systems (RSs) are software tools and techniques providing suggestions for items to be of use to a user. The suggestions relate to various decision-making processes, such as what items to buy, what music to listen to or what online news to read. Item is a general term used to denote what the system recommends to users. Item can be a song, a book, a product to buy or as in our case a university to a student. Project Scope The project basically focuses on the requirements of students appearing for GRE exam and suggests the most appropriate choices of universities. It uses collaborative filtering algorithm to suggest the list of choices. This approach tries to overcome the shortcomings of other approaches. The project takes care of the database so that it gets updated every year in order to make sure that the students get the proper results. The requirements and rational for project scope are as followed. Functional Requirements MIT, Pune. 32 Dept. of Computer Engg.

44 1. Database connectivity for linking the front end to the back end. 2. Usage of Java Servlet Pages to display the user interface. Scenario: 1. Go to the application. 2. Connect to database. 3. log into system if already registered. 4. Whenever a login into system the it will shows the recommendation of university based on their profile User profiles Developer : They create the application and analyze user profile. They should be knowledgeable about end users. User : User should have the They should be knowledgeable about the application Use cases MIT, Pune. 33 Dept. of Computer Engg.

45 Sr. Use Cases Description Actors Assumptions No. 1 Use case 1 candidate registers itself, then creates profile and updates the profile candidate 2 Use Case 2 DB manager saves DB manager the database and retrieves the database 3 Use Case 3 Server recommends the universities, it analysis the wishlist and SOP 4 Use Case 3 The admin adds and updates the university detailes in the database if the candidate is already registered then it can login directly Database is filled by the user Server Database is accurately managed by the DB manager Admin Table 6.1: Use Cases University database is already available Use case view Use case diagram shows the overall functionality of the system. In our system there are three use case diagrams. MIT, Pune. 34 Dept. of Computer Engg.

46 Figure 6.1: Use Case diagram 6.2 FUNCTIONAL MODEL AND DESCRIPTION 1. Recommendation engine For proposing the recommendation the users information in the database is compared with the available dataset of universities. Based on the information he has provided, the system will scale his different attributes on multidimensional graph and the universities which have parameters closest to the parameters of the particular student will be suggested. 2. SOP Analysis Engine This part of the system is used for sentiment analysis of the user SOP. Many sub tasks will be performed in this engine. The tasks will be as follows:- a) Tokens formation. b) Removal of stop-words. MIT, Pune. 35 Dept. of Computer Engg.

47 Sometimes, some extremely common words which would appear to be of little value in helping select documents matching a user need are excluded from the vocabulary entirely. These words are called stop words. The general strategy for determining a stop list is to sort the terms by collection frequency (the total number of times each term appears in the document collection), and then to take the most frequent terms, often hand-filtered for their semantic content relative to the domain of the documents being indexed, as a stop list, the members of which are then discarded during indexing. c) Removal of stem-words. Then all the remaining words will be placed in the array. d) These words in the array will be compared with the list of positive and negative words contained in our database. And a score will be computed. Calculating the Opinion Strength: The polarity strength of opinion words could be calculated as follows. 3. Wishlist Engine The engine will allow user to create his wish list of universities wherein he can analyze on factors that are required for getting admitted to a particular university. MIT, Pune. 36 Dept. of Computer Engg.

48 6.2.1 Activity Diagram In activity diagram the overall flow of the system is shown. It contains the following sequence of action. Figure 6.2: Activity diagram-urs Application MIT, Pune. 37 Dept. of Computer Engg.

49 6.2.2 Sequence Diagram A Sequence diagram is an interaction diagram that shows how processes operate with one another and in what order. It contains the following sequence of action. Figure 6.3: Sequence diagram-urs Figure 6.4: Sequence diagram-urs MIT, Pune. 38 Dept. of Computer Engg.

50 6.2.3 Non Functional Requirements Interface Requirements: Your app s user interface is everything that the user can see and interact with. Android provides a variety of pre-built UI components such as structured layout objects and UI controls that allow you to build the graphical user interface for your app. Android also provides other UI modules for special interfaces such as dialogs, notifications, and menus. Performance Requirements: Choosing the right algorithms and data structures should always be the priority. do not allocate memory if you can avoid it To ensure your app performs well across a wide variety of devices, ensure your code is efficient at all levels and aggressively optimize your performance. Avoid Creating Unnecessary Objects Object creation is never free. A generational garbage collector with perthread allocation pools for temporary objects can make allocation cheaper, but allocating memory is always more expensive than not allocating memory. Prefer Static Over Virtual If you do not need to access an object s fields, make your method static. Invocations will be about 15%-20% faster. It s also good practice, because you can tell from the method signature that calling the method can t alter the object s state. MIT, Pune. 39 Dept. of Computer Engg.

51 Consider Package Instead of Private Access with Private Inner Classes Software quality attributes: Availability * It is the proportion of time a system is in a functioning condition. * Availability of a system is typically measured as a factor of its reliability as reliability increases, so does availability. * Reliability needs to be evaluated and improved related to both availability and the cost of ownership (due to cost of spare parts, maintenance man-hours, transport costs, storage cost, part obsolete risks etc.). * Fault tree analysis and related software are developed to calculate (analytic or by simulation) availability of a system or a functional failure condition within a system. * In our case, our web application is available at all times except at the time of currency converter is being used. * Portability Portability in high-level computer programming is the usability of the same software in different environments. The prerequisites for portability is the generalized abstraction between the application logic and system interfaces. Our application is only supported on Web application. * Reusability In computer science and software engineering, reusability is the use of existing assets in some form within the software product MIT, Pune. 40 Dept. of Computer Engg.

52 development process. Assets are products and by-products of the software development life cycle and include code, software components, test suites, designs and documentation. Subroutines or functions are the simplest form of reuse. A chunk of code is regularly organized using modules or namespaces into layers. The recommendation engine and wishlist module are reusable for other applications. * Scalability An algorithm, design, networking protocol, program, or other system is said to scale if it is suitably efficient and practical when applied to large situations (e.g. a large input data set, a large number of outputs or users, or a large number of participating nodes in the case of a distributed system). We can scale our application to mobile platform and the database ca also be deployed on cloud to scale the storage. Testability * Software testability is the degree to which a software artifact (i.e. a software system, software module, requirements- or design document) supports testing in a given test context. * It is an extrinsic property which results from interdependency of the software to be tested and the test goals, test methods used, and test resources (i.e., the test context). * Our app is being tested for the following things: Sop module has been tested for different sop. Wishlist module has been for different universities. MIT, Pune. 41 Dept. of Computer Engg.

53 The project GUI is tested. Usability * In Software engineering, usability is the degree to which a software can be used by specified consumers to achieve quantified objectives with effectiveness, efficiency, and satisfaction in a quantified context of use. * It includes methods of measuring usability, such as needs analysis and the study of the principles behind an object s perceived efficiency or elegance. * The primary notion of usability is: 1. More efficient to use, takes less time to accomplish a particular task. 2. Easier to operate application, no user manual is required to use the application. 3. The application is user friendly Design Constraints 1. The apache tomcat server version should be grater than The currency converter requires Internet connection at all times. 3. If the database of the university is not constantly updated then the user might not get the desired results. 4. The project does not counsel the students about the universities, it is only a recommender Software Interface Description System provides web interface to the user. MIT, Pune. 42 Dept. of Computer Engg.

54 The software interface(web page) provides various options and buttons such as connection, selection of appropriate framework such as mysql connectivity. MIT, Pune. 43 Dept. of Computer Engg.

55 Chapter 7 DETAILED DESIGN DOCUMENT USING APPENDIX A AND B 44

56 7.1 INTRODUCTION Detailed design document is a written description of a software product, that a software designer writes in order to give a software development team overall guidance to the architecture of the software project. This chapter would contain the following contents The architecture design uses information flowing characteristics, and maps them into the program structure. The transformation mapping method is applied to exhibit distinct boundaries between incoming and outgoing data. The data flow diagrams allocate control input, processing and output along three separate modules. The data design describes structures that reside within the software. Attributes and relationships between data objects dictate the choice of data structures. The component design describes each component of the diagrams.the diagrams would contain class diagram, interaction diagram.it would also contain the module processing i.e. the pseudo-code algorithm. 7.2 ARCHITECTURAL DESIGN System Architecture A system architecture or systems architecture is the conceptual model that defines the structure, behavior, and more views of a system. An architecture description is a formal description and representation of a system, organized in a way that supports reasoning about the structures and behaviors of the system The system is user-centric. It focuses on providing user (in our case the student appearing for the exam) the most appropriate choice of universities. The recommendation engine acts as the brain of the recommendation system along with the MIT, Pune. 45 Dept. of Computer Engg.

57 Figure 7.1: system architecture algorithm used to support the system. The main components of the system are: The Recommendation Engine This engine acts as the brain of the recommendation system. It maps the relevant attributes from the university database to the student database. Using the MinHash algorithm it calculates the Jaccards coefficient and based on this result it recommends the universities to the students. Input Set I : Fetched data Output Set O : recommendation Function F : recommend () Axioms : best possible result. MIT, Pune. 46 Dept. of Computer Engg.

58 Figure 7.2: Recommendation Systems SOP Analyze Engine This part of the system is used for sentiment analysis of the user SOP. This part of the system is used for sentiment analysis of the user SOP using dictionary based approach. For SOP Analysis WordNet dictionary is being used. Knowledge base contains WordNet dictionary for domain independent polarity classification for positive, negative and neutral opinion. Sentiment words are generally categorized into negative and negative categories. For this purpose we extract the semantic score of each opinion word using SentiWordNet dictionary containing the semantic score of the words Wishlist Engine The engine will allow user to create his wish list of universities wherein he can analyze on factors that are required for getting admitted to a particular university. MIT, Pune. 47 Dept. of Computer Engg.

59 7.2.5 The package diagram Figure 7.3: package diagram MIT, Pune. 48 Dept. of Computer Engg.

60 7.2.6 The deployment diagram Figure 7.4: deployment diagram 7.3 Data Design Internal software data structure Internal software data structure are the data structures passed that are passed amongst the components of the software In our project the database tables are the internal software that are passed to the software components are as follows:- The student database table is passed as the student profile to the recommendation module for the recommendation process the university database table is passed as the university profile to the recommendation module for the recommendation process to calculate the Jacquard s coefficient for the recommendation of the universities according to the student profile MIT, Pune. 49 Dept. of Computer Engg.

61 7.3.2 Database description UNIVERSITY DATABASE STUDENT DATABASE MIT, Pune. 50 Dept. of Computer Engg.

62 7.4 COMPONENT DESIGN Component-level design occurs after the first iteration of the architectural design It strives to create a design model from the analysis and architectural models The translation can open the door to subtle errors that are difficult to find and correct later Effective programmers should not waste their time debugging they should not introduce bugs to start with. Edsgar Dijkstra A component-level design can be represented using some intermediate representation (e.g. graphical, tabular, or text-based) that can be translated into source code The design of data structures, interfaces, and algorithms should conform to well-established guidelines to help us avoid the introduction of errors Class Diagram Class diagram are the most common diagram found in modeling object oriented systems. A class diagram shows set of classes interface and collaboration and their relationships. MIT, Pune. 51 Dept. of Computer Engg.

63 Figure 7.5: Class Diagram MIT, Pune. 52 Dept. of Computer Engg.

64 Chapter 8 PROJECT IMPLEMENTATION 53

65 8.1 INTRODUCTION The system is user-centric. It focuses on providing user the most appropriate choice of universities. The recommendation engine acts as the brain of the recommendation system along with the algorithm used to support the system. The main components of the system are: The extraction engine The recommendation engine The database The client The Extraction Engine This engine can be considered as the first module of the project. There are two ways to extract the required data from a particular website. One way is to extract the data manually and the other way is to use a crawler. The extraction of data manually can prove very tedious. So, we are using a certain extraction process. The Recommendation Engine This engine acts as the brain of the recommendation system. It maps the relevant attributes from the university database to the student database. Using the LSH algorithm it calculates the Jaccards coefficient and based on this result it recommends the universities to the students. The Database This part of the system holds significance because it stores all the information that is required for processing when the recommendation engine plays its part. This data which is stored in the database is collected by the extraction engine and is provided to the recommendation engine. Two databases are maintained. One is student database and the other is the university database. MIT, Pune. 54 Dept. of Computer Engg.

66 The Client The client side consists of the user interface, the browser and the user. The user interface helps the user to properly communicate with the system. 8.2 TOOLS AND TECHNOLOGIES USED Tools used are as follows: 1. Eclipse Mars SQLyog Tool. Eclipse Mars 4.5 Eclipse is an integrated development environment (IDE) used in computer programming. It contains a base workspace and an extensible plug-in system for customizing the environment. Eclipse is written mostly in Java and its primary use is for developing Java applications, but it may also be used to develop applications in other programming languages through the use of plugins. SQLyog SQLyog is a GUI tool for the RDBMS MySQL. It is developed by Webyog, Inc. based out of Bangalore, India and Santa Clara, California. SQLyog is being used by more than 30,000 customers worldwide. SQLyog is available in free as well as paid versions. The free version is known as Community Edition and is available as an open source project at Google Code. Paid versions are sold as Professional, Enterprise and Ultimate Editions. Uses MySQL C API to communicate with MySQL servers. No dependencies on database abstraction layers (like ODBC/JDBC). SQLyog works on the Windows platform starting from Windows XP/Windows 2003 to Windows Technologies used are as follows: Apache Tomcat MIT, Pune. 55 Dept. of Computer Engg.

67 Java Develpment Kit 7(JDK) JAVA. Apache Tomcat Apache Tomcat, often referred to as Tomcat, is an open-source web server developed by the Apache Software Foundation (ASF). Tomcat implements several Java EE specifications including Java Servlet, JavaServer Pages (JSP), Java EL, and WebSocket, and provides a pure Java HTTP web server environment in which Java code can run. Tomcat is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation, released under the Apache License 2.0 license, and is open-source software. Java Development Kit 7 (JDK) Java Development Kit (JDK) is an implementation of either one of the Java SE, Java EE or Java ME platforms released by Oracle Corporation in the form of a binary product aimed at Java developers on Solaris, Linux, Mac OS X or Windows. The JDK includes a private JVM and a few other resources to finish the development of a Java Application.Since the introduction of the Java platform, it has been by far the most widely used Software Development Kit (SDK). JAVA Java is a general-purpose computer programming language that is concurrent, classbased, object-oriented,and specifically designed to have as few implementation dependencies as possible. It is intended to let application developers write once, run anywhere (WORA), meaning that compiled Java code can run on all platforms that support Java without the need for recompilation. MIT, Pune. 56 Dept. of Computer Engg.

68 8.3 METHODOLOGIES AND ALGORITHMS DE- TAILS Algorithm For Recommendation Engine. We will be using MinHash Algorithm. In computer science, MinHash (or the minwise independent permutations locality sensitive hashing scheme) is a technique for quickly estimating how similar two sets are. The Algorithm for Recommendation Engine is:- 1. The Recommendation is done on the basis of the mapping between the attributes of user profile and the attributes of university profile stored in the database to compute the Jaccard s Coefficient score. 2. Based on the Jaccard s Coefficient score, the user is provided with the appropriate list of universities. 3. First we start by placing user s attributes in set A and set B consisting of university attribute. 4. Then we need to merge set A and set B into one single list. 5. Next step is generate a hash array using self defined hash function. The hash array will have size equal to the size of merge list. 6. A matrix is generated whose size of row is equal to number of sets and the size of column is equal to the size of merge list. Initial the values in the matrix will be a MAX integer. 7. Now filling of first row of the matrix is done by comparing the first element of merge list with the elements of the set A. We are performing content based comparison. If the first element of merge list matches with any element of set A then the hash value corresponding to the first element of merge list is placed MIT, Pune. 57 Dept. of Computer Engg.

69 in the place of first MAX value of first row. Then for filling second row of the matrix, again the merge list elements and set B elements are compared and corresponding hash values are placed if a match is found. 8. The next step is to compare column-wise hash values if two same hash values are found then the match counter is incremented. 9. Finally Jaccard s coefficient score is calculated as :- JC = the value of match counter / by the size of the column in matrix Algorithm For SOP Engine. This part of the system is used for sentiment analysis of user s SOP using dictionary based approach. For SOP analysis WordNet dictionary is being used. The Algorithm for SOP Analysis is:- 1. User is required to enter his/her SOP in the text box provided. 2. Identify Negation words from each statement of given SOP. 3. After Identifying negation word, score is calculated. The scores are assigned for the following three cases:- If word placed in the right side of identified negation word is negative like NOT Bad then the score is positive. Here, Not is identified negation word and bad is word placed in the right side of the negation word. A method called extract() is called to get the score of the word. It takes help of SentiWordNet dictionary to calculate the polarity of the word. The extract() method takes words as input and returns a score as output. If word placed in right side of the identified negation word is positive then the score is negative. Like Not Good, the score is positive. Again the extract() will be called to get the score of the word. MIT, Pune. 58 Dept. of Computer Engg.

70 If both the above cases fail then by default score is taken as negative. 4. The negation words are removed from the statement. 5. The score of the remaining words in the statement is calculated by calling the extract() method. 6. The Final score is calculated as follows:- Final Score = Negation Score + Remaining words Score Algorithm For WishList Engine. This part of the system is used for analyzing on factors that the user s profile is lacking, or stopping him/her from getting an admit from desired university. This system will help user improve his/her profile. The Algorithm for SOP Analysis is:- 1. Firstly, user s details are fetched from database. 2. Then University details are fetched which user has added in the WishList to be compared and analyzed. 3. One by one similar attributes of both university and user profiles are compared and the result is displayed below. 8.4 VERIFICATION AND VALIDATION FOR AC- CEPTANCE In software project management, software testing, and software engineering, verification and validation (V&V) is the process of checking that a software system meets specifications and that it fulfills its intended purpose. It may also be referred to as software quality control. It is normally the responsibility of software testers as part of the software development life cycle. MIT, Pune. 59 Dept. of Computer Engg.

71 Validation checks that the product design satisfies or fits the intended use (highlevel checking), i.e. the software meets the user requirements. This is done through dynamic testing and other forms of review. Verification and validation are not the same thing, although they are often confused. Boehmsuccinctly expressed the difference between Verification: Are we building the product right? Validation: Are we building the right product? According to the Capability Maturity Model Software Verification: The process of evaluating software to determine whether the products of a given development phase satisfy the conditions imposed at the start of that phase. Software Validation: The process of evaluating software during or at the end of the development process to determine whether it satisfies specified requirements. We have validate our system as it meets all the user requirements and dynamic testings have been performed. We have also done software verification as our software satisfies all the conditions imposed at the start of phases. MIT, Pune. 60 Dept. of Computer Engg.

72 Chapter 9 SOFTWARE TESTING 61

73 9.1 TYPES OF TESTING USED Since proposed application, we have done manual testing.there are different stages for manual testing such as unit testing, integration testing,system testing, and user acceptance testing. 1. Unit testing In computer programming, unit testing is a software testing method by which individual units of source code, sets of one or more computer program modules together with associated control data, usage procedures, and operating procedures, are tested to determine whether they are fit for use. In our program, we have units such as application divide into multiple modules or units such as Student login and registration,sop unit,recommendation unit which are tested by individual unit testing strategy. 2. Integration testing Integration testing (sometimes called integration and testing, abbreviated I&T) is the phase in software testing in which individual software modules are combined and tested as a group. It occurs after unit testing and before validation testing. In proposed system we have integrated the login and registration module to be tested as integration testing. Also system integrated the modules which the functionality of each parameter of recommendation module,sop,and wishlist module. 3. System testing System testing of software or hardware is testing conducted on a complete, integrated system to evaluate the system s compliance with its specified requirements. System testing falls within the scope of black-box testing, and as such, should require no knowledge of the inner design of the code or logic. In proposed application successfully performed the system testing in which MIT, Pune. 62 Dept. of Computer Engg.

74 the system was tested as a whole. 4. User Acceptance testing User acceptance testing (UAT) is the last phase of the software testing process. During UAT, actual software users test the software to make sure it can handle required tasks in real-world scenarios, according to specifications. We have successfully completed this testing. 9.2 TEST CASES AND TEST RESULTS Test Test module Test input Expected Result Actual Result Status Case id 1 Launch the Ap- URL for applica- The application The app starts pass plication. 2 Login or Registration. 3 Create university database. 4 Recommendation. tion Fill profile information university database parameter such as name,state,fees etc. student profile and university database database should be Successfully System should Shows recommended universities. starts when run. Filled up information such as name,marks, gender, etc when run. all information created properly and form submitted successfully. stored database Successfully at back end. list of university and their information. pass pass pass The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub-assemblies, assemblies and/or a finished product. It is the process of exercising software with the intent of ensuring that the Software system meets its requirements and user expectations and does not fail in an unacceptable manner. Test Cases :- Set of inputs, execution conditions and expected results carried out for some objec- MIT, Pune. 63 Dept. of Computer Engg.

75 tives: Login Testing GUI Testing :- GUI means graphical user interface to test the friendliness of that system. Here we testing for the object properties and if the screens are user under stable or not. MIT, Pune. 64 Dept. of Computer Engg.

76 MIT, Pune. 65 Dept. of Computer Engg.

77 Chapter 10 RESULTS 66

78 PROJECT 10.1 SCREEN SHOTS MIT, Pune. 67 Dept. of Computer Engg.

79 MIT, Pune. 68 Dept. of Computer Engg.

80 MIT, Pune. 69 Dept. of Computer Engg.

81 MIT, Pune. 70 Dept. of Computer Engg.

82 MIT, Pune. 71 Dept. of Computer Engg.

83 Chapter 11 DEPLOYMENT AND MAINTENANCE 72

84 11.1 INSTALLATION AND UN-INSTALLATION Installation 1. Install Java JDK Install Eclipse JAVA EE IDE. 3. Install Sqlyog. 4. Import the Existing Project. Goto file New Import. Select the project form workspace. It Display the Project workspace on Navigator. 5. Add Server. Right click new server. Select Tomcat v7.0 sever Finish. 6. Finally click on run button. MIT, Pune. 73 Dept. of Computer Engg.

85 11.2 USER HELP Our system is quite simple.we have made it very user-friendly.the user can easily navigate through the pages of the website. MIT, Pune. 74 Dept. of Computer Engg.

86 Chapter 12 FUTURE ENHANCEMENT AND CONCLUSION 75

87 12.1 FUTURE SCOPE Similar type of system can be implemented for fields like management, marketing, finance etc. Mobile application can be developed in the future for the same system. Cloud based approach for storing data can be used to improve the overall storage and processing of data. Students can be suggested to publish papers in various research areas in order to help them improve their profile CONCLUSION We have implemented a recommendation system based on MinHash algorithm. This system is user-centric. It provides the students with the proper choices of universities. Based on the calculation of Jaccards coefficient the system generates the results. MIT, Pune. 76 Dept. of Computer Engg.

88 Chapter 13 REFERENCES 77

89 Bibliography [1] Dharmendra Pathak, Sandeep Matharia and C. N. S. Murthy, NOVA: Hybrid Book Recommendation Engine, IEEE, 2012 [2] G. Adomavicius and A. Tuzhilin, Toward the next generation of recommender systems: A survey of the state-of the-art and possible extensions, IEEE. [3] G. Linden, B. Smith, and J. York, Amazon recommendations: Itemto- item collaborative filtering, IEEE, Feb [4] Michael Hashler, Recommender Lab: A Framework for Developing and Testing Recommendation Algorithms Nov [5] R. Bell, Y. Koren, and C. Volinsky, Modeling relationships at multiple scales to improve accuracy of large recommender systems KDD 07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, New York, NY, USA, ACM, 2007 [6] O. Celma and P. Herrera, A new approach to evaluating novel recommendations, RecSys 08: Proceedings of the 2008 ACM conference on Recommender systems, New York, NY, USA, ACM, [7] C. N. Ziegler, S. M. McNee, J. A. Konstan, and G. Lausen, Improving recommendation lists through topic diversification: Proceedings of the 14th international conference on World Wide Web, New York, USA, ACM,

90 [8] Robin Burke, Hybrid Recommender Systems: Survey and Experiments, California State University, Fullerton Department of Information Systems and Decision Sciences. [9] Ahu Sieg, Bamshad Mobasher, Robin Burke, Ontology-Based Collaborative Recommendation. MIT, Pune. 79 Dept. of Computer Engg.

91 Annexure A LABORATORY ASSIGNMENTS ON PROJECT ANALYSIS OF ALGORITHM DESIGN 80

92 To develop the problem under consideration and justify feasibilty using concepts of knowledge canvas and IDEA Matrix. IDEA Matrix is represented in the following form. Knowledge canvas represents about identification of opportunity for product. Feasibility is represented w.r.t. business perspective. I D E A Increase Drive Educate Accelerate Improve Deliver Evaluate Associate Ignore Decrease Eliminate Avoid Table A.1: IDEA Matrix Project problem statement feasibility assessment using NP-Hard, NP- Complete or satisfy ability issues using modern algebra and/or relevant mathematical models. Polynomial(P) and Non-Polynomial(NP) Polynomial Time: The class of polynomial- time solvable problems P includes all the sets in which membership may be decided by an algorithm whose running time is bounded by a polynomial. Example: * Linear Time-O(n) * Quadratic Time-O(n2) * Exponential Time-O(2n) * Logarithmic Time-O(logn) Non-Polynomial Time: The class non-deterministic polynomially acceptable problems, NP contains all sets in which membership can be verified in polynomial time. All problems from P is also NP. Examples: MIT, Pune. 81 Dept. of Computer Engg.

93 * Decision problem version of the integer factorisation problem * Graph isomorphism problem * A decision version of travelling salesman problem * The Boolean satisfiability problem Types of NP type problems: * NP-hard: In computational complexity theory, is a class of problems that are, informally, at least as hard as the hardest problems in NP. More precisely, a problem H is NP-hard when every problem L in NP can be reduced in polynomial time to H.As a consequence, finding a polynomial algorithm to solve any NP-hard problem would give polynomial algorithms for all the problems in NP, which is unlikely as many of them are considered hard. * NP-complete: In computational complexity theory, a decision problem is NP-complete when it is both in NP and NP-hard. The set of NP-complete problems is often denoted by NP-C or NPC. The abbreviation NP refers to nondeterministic polynomial time. class. Thus from the above definition our application of is P (Polynomial) Input x,output y, y=f(x) I:Set of Inputs={I1,I2,I3,I4} where, * I1: Login. MIT, Pune. 82 Dept. of Computer Engg.

94 * I2: User details. * I3: Universities provided by the user in the wishlist module. * I4: User provides its SOP to analysis in the SOP module. O: Set of Outputs={O1,O2,O3,O4} where, * O1: List of recommended universities. * O2: The analysis made on the SOP provided by the user. * O3: The analysis on the wishlist universities provided by the user. * O4: The currency converter provides the user with the desired conversion. F:Set of Functions={F1, F2, F3, F4, F5} where, * F1: The user logs in the web application. * F2: The application recommends the user with the universities. * F3: The user can add the universities it desires to the wishlist and the application will then analysis the wishlist. * F4: The user can get its SOP analyzed by the SOP analysis module. * F5: The user can get the any currency converted into any currency with the help of currency converter. MIT, Pune. 83 Dept. of Computer Engg.

95 Annexure B LABORATORY ASSIGNMENTS ON PROJECT QUALITY AND RELIABILITY TESTING OF PROJECT DESIGN 84

96 Use of divide and conquer strategies to exploit distributed/parallel/concurrent processing of the above to identify object, morphisms, overloading in functions (if any), and functional relations and any other dependencies (as per requirements). It can include Venn diagram, state diagram, function relations, i/o relations; use this to derive objects, morphism, overloading With this strategy, a problem is solved by splitting it into sub-problems, solving them independently, and merging their solutions into a solution for the whole problem. The sub-problems can be solved directly, or they can in turn be solved using the same divide-and-conquer strategy, leading to an overall recursive program structure. The potential concurrency in this strategy is not hard to see: Since the sub-problems are solved independently, their solutions can be computed concurrently, leading to a parallel program that is very similar to its sequential counterpart. The following figure illustrates the strategy and the potential concurrency. Identify Morphism Figure B.1: Divide and Conquer Strategy Much of the terminology of morphisms, as well as the intuition underlying them, comes from concrete categories, where the objects are simply sets with some additional structure, and morphisms are structure-preserving functions. A MIT, Pune. 85 Dept. of Computer Engg.

97 category C consists of two classes, one of objects and the other of morphisms. There are two objects that are associated to everymorphism, the source and the target. For many common categories, objects are sets (usually with more structure) and morphisms are functions from an object to another object. Therefore the source and the target of a morphism are often called respectively domain and codomain. A morphism f with source X and target Y is written f : X Y. Thus a morphism is represented by an arrow from its source to its target. In the category of smooth manifolds, morphisms are smooth functions and isomorphisms are called diffeomorphisms. Functional Dependency Function is named unit of group of statement this unit can be invoked from other part of program as and when required. Or it is relationship between an attribute Y and a determinant (1 or more attribute) X such that for a given value of a determinant the value of attributes uniquely defined. An FD XY indicates a relationship between sets of attributes X and Y, such that any two entities that share a value for X must also share a value for Y or they have some relations. FDs generalize the option of a key in relational databases, and as such, provide important semantic clues about data consistency. X is determinant X determines y Y is functionally dependent on x X- y RS has the following functional dependencies:- There is a dependency of the background page (database on server) on the content script until the content script passes the characters well as numeric MIT, Pune. 86 Dept. of Computer Engg.

98 from the web page to the browser, the background page does not give the alerts or any message to user. The background page can access the database of the user only when there exists a profile specific to the user. Students will be able to log in only after he has signed up earlier. The logins will be updated only after proper creation of the tables specific to each student during sign up. Testing of project problem statement using generated test data (using mathematical models, GUI, Function testing principles, if any) selection and appropriate use of testing tools, testing of UML diagram s reliability. Write also test cases [Black box testing] for each identified functions. You can use Mathematica or equivalent open source tool for generating test data. Software testing can be stated as process of validating and verifying that a computer program/application/product: Meets the requirements that guided its design and development. Works as expected. Can be implemented with the same characteristics. Satisfies the needs of stake holders. Software testing, depending on the testing methods employed, can be implemented at any time in the development process. Traditionally, most of the test efforts occur after the requirements have been defined and the coding process has been completed but in the agile approaches most of the test effort is ongoing. As such the methodology of test is governed by a chosen software development methodology. Types of testing: MIT, Pune. 87 Dept. of Computer Engg.

99 Unit testing: Unit testing is a software testing method by which individual units of source code, sets of one or more computer program modules together with associated control data, usage procedures, and operating procedures, are tested to determine whether they are fit for use. Intuitively, one can view a unit as the smallest testable part of an application. In procedural programming, a unit could be an entire module, but it is more commonly an individual function or procedure. In object-oriented programming, a unit is often an entire interface, such as a class, but could be an individual method. Unit tests are short code fragments created by programmers or occasionally by white box testers during the development process. It forms the basis for component testing. Integration testing: Integration testing is the phase in software testing in which individual software modules are combined and tested as a group. It occurs after unit testing and before validation testing. Integration testing takes as its input modules that have been unit tested, groups them in larger aggregates, applies tests defined in an integration test plan to those aggregates, and delivers as its output the integrated system ready for system testing. Acceptance testing: Acceptance testing is a test conducted to determine if the requirements of a specification or contract are met. It may involve chemical tests, physical tests, or performance tests. In systems engineering it may involve blackbox testing performed on a system (for example: a piece of software, lots of manufactured mechanical parts, or batches of chemical products) prior to its delivery. MIT, Pune. 88 Dept. of Computer Engg.

100 Test Cases 1. To test the authentication of user. 2. The error messages are shown upon validation errors. 3. Is the user data stored upon exist. 4. Is the SOP analysis working for numerous types of SOP. 5. Are the universities getting adding in the wishlist correctly. GUI testing GUI test is for testing if the GUI we have made for the application is working in the correct manner as desired. In our application we are going to have many buttons and lists so we will be checking if they are working properly. MIT, Pune. 89 Dept. of Computer Engg.

101 Annexure C PROJECT PLANNER 90

102 Figure C.1: Plan of Project MIT, Pune. 91 Dept. of Computer Engg.

103 Annexure D TERM-II PROJECT LABORATORY ASSIGNMENTS 92

104 1. Review of design and necessary corrective actions taking into consideration the feedback report of Term I assessment, and other competitions/conferences participated like IIT, Central Universities, University Conferences or equivalent centers of excellence etc. Based on the review of the software design we have made changes in the GUI of the project and made the GUI more attractive. We have changed the template of the web application to a more attractive template.we have added pictures to each universities and made the application more attractive. We have made added more modules to the software codes since the first term assessment.we have added more modules such SOP analysis, the currency converter and wishlist analysis. We have more data to our universities database i.e. we have added more universities to the universities table of the database to improve our accuracy of the web application. By adding universities with variety of profiles the accuracy of the application can be improved. The application is made more secure by adding more security measures to the students database.we have added the hash-key generation technique to make the passwords of the students in encrypted form. Hence we taken more security measures to make the application more secure. As per the feedback provided we have changed the admin login method. We have made the admin login and the user login through the same tab. 2. Project workstation selection, installations along with setup and installation report preparations. Hardware Requirements MIT, Pune. 93 Dept. of Computer Engg.

105 Dual Core Processor. 1 GB RAM. Internal Graphics Card. Internet access. Software Requirements Platform : Windows Run Time Environment : Java JDK1.7 Platform for Development :Eclipse Java EE IDE 3. Programming of the project functions, interfaces and GUI (if any) as per 1 st Term term-work submission using corrective actions recommended in Term-I assessment of Term-work. Following are Project Execution Steps: login into system Registration for new user. list of recommended universities. Sop analysis wish list MIT, Pune. 94 Dept. of Computer Engg.

106 4. Test Tool selection and testing of various test cases. Testing The purpose of testing is to discover errors. Testing is the process of trying to discover every conceivable fault or weakness in a work product. It provides a way to check the functionality of components, sub-assemblies, assemblies and/or a finished product. It is the process of exercising software with the intent of ensuring that the Software system meets its requirements and user expectations and does not fail in an unacceptable manner. Test Cases :- Set of inputs, execution conditions and expected results carried out for some objectives: Login Testing MIT, Pune. 95 Dept. of Computer Engg.

107 GUI Testing :- GUI means graphical user interface to test the friendliness of that system. Here we testing for the object properties and if the screens are user under stable or not. MIT, Pune. 96 Dept. of Computer Engg.

108 Annexure E INFORMATION OF PROJECT GROUP MEMBERS 97

109 1. Name : Ankita Dhanraj Marathe 2. Date of Birth :09/06/ Gender : Female 4. Permanent Address: Flat no.201, H2 Bldg Vanraji Heights, MIT Road Kothrud, Pune ankitamarathe94@gmail.com 6. Mobile/Contact No. : Paper Published : Yes MIT, Pune. 98 Dept. of Computer Engg.

110 1. Name : Nikita Dhanraj Marathe 2. Date of Birth :09/06/ Gender : Female 4. Permanent Address: Flat no.201, H2 Bldg Vanraji Heights, MIT Road Kothrud, Pune nmarathe1994@gmail.com 6. Mobile/Contact No. : Paper Published : Yes MIT, Pune. 99 Dept. of Computer Engg.

111 1. Name : Kalpana 2. Date of Birth :16/05/ Gender : Female 4. Permanent Address:RH-2,Sai kripa Soci,Opp Kunal Icon,Pimple Saudagar, Pune ideeagkg53@gmail.com 6. Mobile/Contact No. : Paper Published : Yes MIT, Pune. 100 Dept. of Computer Engg.

112 1. Name : Harshada Karande 2. Date of Birth :25/09/ Gender : Female 4. Permanent Address: Goghavari bangalo Sainarar Jalochi Baramati harshadakarande2509@gmail.com 6. Mobile/Contact No. : Paper Published : Yes MIT, Pune. 101 Dept. of Computer Engg.

A PROPOSED HYBRID BOOK RECOMMENDER SYSTEM

A PROPOSED HYBRID BOOK RECOMMENDER SYSTEM A PROPOSED HYBRID BOOK RECOMMENDER SYSTEM SUHAS PATIL [M.Tech Scholar, Department Of Computer Science &Engineering, RKDF IST, Bhopal, RGPV University, India] Dr.Varsha Namdeo [Assistant Professor, Department

More information

Individual Project. Agnieszka Jastrzębska Władysław Homenda Lucjan Stapp

Individual Project. Agnieszka Jastrzębska Władysław Homenda Lucjan Stapp Individual Project Individual Project Target: 1. Improvement of software development skill 2. to industrial method of building application in practical way Individual Project Slide 2/50 Individual Project

More information

Hybrid Recommendation System Using Clustering and Collaborative Filtering

Hybrid Recommendation System Using Clustering and Collaborative Filtering Hybrid Recommendation System Using Clustering and Collaborative Filtering Roshni Padate Assistant Professor roshni@frcrce.ac.in Priyanka Bane B.E. Student priyankabane56@gmail.com Jayesh Kudase B.E. Student

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information

Semantic Web Company. PoolParty - Server. PoolParty - Technical White Paper.

Semantic Web Company. PoolParty - Server. PoolParty - Technical White Paper. Semantic Web Company PoolParty - Server PoolParty - Technical White Paper http://www.poolparty.biz Table of Contents Introduction... 3 PoolParty Technical Overview... 3 PoolParty Components Overview...

More information

Navigation Using Twitter

Navigation Using Twitter Navigation Using Twitter Anmay Singh 1, Hrishikesh Rajpathak 2, Smit Bhagat 3, Komal Chavan 4 1, 2, 3, 4 Dept of Computer Engineering 1, 2, 3, 4 MAEER s MIT College of Engineering Abstract- Traffic congestion

More information

Software Design Description Report

Software Design Description Report 2015 Software Design Description Report CodeBenders Haldun Yıldız 1819663 Onur Aydınay 1819002 Deniz Can Yüksel 1819697 Ali Şihab Akcan 1818871 TABLE OF CONTENTS 1 Overview... 3 1.1 Scope... 3 1.2 Purpose...

More information

Keywords Data alignment, Data annotation, Web database, Search Result Record

Keywords Data alignment, Data annotation, Web database, Search Result Record Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web

More information

Sample Exam. Advanced Test Automation - Engineer

Sample Exam. Advanced Test Automation - Engineer Sample Exam Advanced Test Automation - Engineer Questions ASTQB Created - 2018 American Software Testing Qualifications Board Copyright Notice This document may be copied in its entirety, or extracts made,

More information

Senior Project: Calendar

Senior Project: Calendar Senior Project: Calendar By Jason Chin June 2, 2017 Contents 1 Introduction 1 2 Vision and Scope 2 2.1 Business Requirements...................... 2 2.1.1 Background........................ 2 2.1.2 Business

More information

Requirements Specification

Requirements Specification Requirements Specification Smart Scheduling Requested by: Dr. Robert Yoder Associate Professor of Computer Science Computer Science Department Head Siena College Tom Mottola Jason Czajkowski Brian Maxwell

More information

BACHELOR OF COMPUTER APPLICATION

BACHELOR OF COMPUTER APPLICATION SHREE M. & N. VIRANI SCIENCE COLLEGE RAJKOT PROJECT REPORT AS A PARTIAL REQUIREMENT FOR THE DEGREE OF BACHELOR OF COMPUTER APPLICATION YEAR: 2016 TRAFFIC POLICE GUIDED BY: Mr. PRAKASH GUJARATI SUBMITTED

More information

Business Requirements Document (BRD) Template

Business Requirements Document (BRD) Template Business Requirements Document (BRD) Template Following is a template for a business requirements document (BRD). The document includes many best practices in use today. Don t be limited by the template,

More information

SOFTWARE REUSABILITY: A FRAMEWORK USING SOFTWARE COMPONENTS AND REUSABLE ASSETS

SOFTWARE REUSABILITY: A FRAMEWORK USING SOFTWARE COMPONENTS AND REUSABLE ASSETS SOFTWARE REUSABILITY: A FRAMEWORK USING SOFTWARE COMPONENTS AND REUSABLE ASSETS 1 A.RAVI, 2 DR.K.NIRMALA 1 Research Scholar Ms university Tirunelveli. 2 Assoc. Prof., Department of Computer Science Quaid-E-Millath

More information

Middle East Technical University. Department of Computer Engineering

Middle East Technical University. Department of Computer Engineering Middle East Technical University Department of Computer Engineering TurkHITs Software Requirements Specifications v1.1 Group fourbytes Safa Öz - 1679463 Mert Bahadır - 1745785 Özge Çevik - 1679414 Sema

More information

SMART PROCTOR SYSTEM

SMART PROCTOR SYSTEM SMART PROCTOR SYSTEM Mr.S.S.Terdale 1, Mr.S.S.Kulkarni 2, Mr.S.M.Shinge 3, Mr.V.V.Sutar 4, Mr.P.B.Kumbhar 5, Mr.R.M.Patil 6 1,2,3,4,5,6 CSE Department, Sharad Institute of Technology College of Engineering

More information

Properties of High Quality Software. CSE219, Computer Science III Stony Brook University

Properties of High Quality Software. CSE219, Computer Science III Stony Brook University Properties of High Quality Software CSE219, Computer Science III Stony Brook University http://www.cs.stonybrook.edu/~cse219 Software Engineering Basics Important Principles for creating a Software Solution:

More information

Certified LabVIEW Architect Recertification Exam Test Booklet

Certified LabVIEW Architect Recertification Exam Test Booklet Certified LabVIEW Architect Recertification Exam Test Booklet Note: The use of the computer or any reference materials is NOT allowed during the exam. Instructions: If you did not receive this exam in

More information

*ANSWERS * **********************************

*ANSWERS * ********************************** CS/183/17/SS07 UNIVERSITY OF SURREY BSc Programmes in Computing Level 1 Examination CS183: Systems Analysis and Design Time allowed: 2 hours Spring Semester 2007 Answer ALL questions in Section A and TWO

More information

Auto Secured Text Monitor in Natural Scene Images

Auto Secured Text Monitor in Natural Scene Images IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 4, Ver. V (Jul.-Aug. 2016), PP 148-152 www.iosrjournals.org Auto Secured Text Monitor in Natural Scene

More information

X-S Framework Leveraging XML on Servlet Technology

X-S Framework Leveraging XML on Servlet Technology X-S Framework Leveraging XML on Servlet Technology Rajesh Kumar R Abstract This paper talks about a XML based web application framework that is based on Java Servlet Technology. This framework leverages

More information

Meta-Content framework for back index generation

Meta-Content framework for back index generation Meta-Content framework for back index generation Tripti Sharma, Assistant Professor Department of computer science Chhatrapati Shivaji Institute of Technology. Durg, India triptisharma@csitdurg.in Sarang

More information

"Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary

Charting the Course... ITIL 2011 Managing Across the Lifecycle ( MALC ) Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

COMMUNICATION SYSTEM FOR CSE DEPARTMENT

COMMUNICATION SYSTEM FOR CSE DEPARTMENT A Final Report On COMMUNICATION SYSTEM FOR CSE DEPARTMENT Submitted to the Department of Computer Science and Engineering Nepal Engineering College in Partial Fulfillment of the Requirements of the Course

More information

Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski. Version 1.1. Preventing Data Leakage via

Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski. Version 1.1. Preventing Data Leakage via Ben Gurion University Deutsche Telekom Labs Authors: Rostislav Pinski, Dmitry Kaganov, Eli Shtein, Alexander Gorohovski Version 1.1 1 1. Introduction...4-16 1.1 Vision...4 1.2 The Problem Domain...5-6

More information

A Web Application to Visualize Trends in Diabetes across the United States

A Web Application to Visualize Trends in Diabetes across the United States A Web Application to Visualize Trends in Diabetes across the United States Final Project Report Team: New Bee Team Members: Samyuktha Sridharan, Xuanyi Qi, Hanshu Lin Introduction This project develops

More information

VISUAL RERANKING USING MULTIPLE SEARCH ENGINES

VISUAL RERANKING USING MULTIPLE SEARCH ENGINES VISUAL RERANKING USING MULTIPLE SEARCH ENGINES By Dennis Lim Thye Loon A REPORT SUBMITTED TO Universiti Tunku Abdul Rahman in partial fulfillment of the requirements for the degree of Faculty of Information

More information

Centralized Access of User Data Channel with Push Notification

Centralized Access of User Data Channel with Push Notification Centralized Access of User Data Channel with Push Notification #1 #2 #3 #4 Abhishek PriyadarshiP P, Ritu KaramchandaniP P, Nikhil GuptaP P, Arsalan GundrooP P, Department of computer Engineering, D.Y.

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) Perfecto Coffee Xpress Consistent Perfection Team 5 Chloe Good Yekaterina Glazko Edwards Hays Yucheng Hsieh Atreya Lahiri Jaimin Patel Yun Shen Andrew

More information

Enhanced OpenID Protocol in Identity Management

Enhanced OpenID Protocol in Identity Management Enhanced OpenID Protocol in Identity Management Ronak R. Patel 1, Bhavesh Oza 2 1 PG Student, Department of Computer Engg, L.D.College of Engineering, Gujarat Technological University, Ahmedabad 2 Associate

More information

Joint Entity Resolution

Joint Entity Resolution Joint Entity Resolution Steven Euijong Whang, Hector Garcia-Molina Computer Science Department, Stanford University 353 Serra Mall, Stanford, CA 94305, USA {swhang, hector}@cs.stanford.edu No Institute

More information

Migration and Building of Data Centers in IBM SoftLayer

Migration and Building of Data Centers in IBM SoftLayer Migration and Building of Data Centers in IBM SoftLayer Advantages of IBM SoftLayer and RackWare Together IBM SoftLayer offers customers the advantage of migrating and building complex environments into

More information

Filtering Unwanted Messages from (OSN) User Wall s Using MLT

Filtering Unwanted Messages from (OSN) User Wall s Using MLT Filtering Unwanted Messages from (OSN) User Wall s Using MLT Prof.Sarika.N.Zaware 1, Anjiri Ambadkar 2, Nishigandha Bhor 3, Shiva Mamidi 4, Chetan Patil 5 1 Department of Computer Engineering, AISSMS IOIT,

More information

INTRODUCTION. Chapter GENERAL

INTRODUCTION. Chapter GENERAL Chapter 1 INTRODUCTION 1.1 GENERAL The World Wide Web (WWW) [1] is a system of interlinked hypertext documents accessed via the Internet. It is an interactive world of shared information through which

More information

Mapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer Alphy Jose*, Aby Abahai T ABSTRACT I.

Mapping Bug Reports to Relevant Files and Automated Bug Assigning to the Developer Alphy Jose*, Aby Abahai T ABSTRACT I. International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 1 ISSN : 2456-3307 Mapping Bug Reports to Relevant Files and Automated

More information

ISSN: [Kaur* et al., 6(10): October, 2017] Impact Factor: 4.116

ISSN: [Kaur* et al., 6(10): October, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY COMPARATIVE ANALYSIS OF SOFTWARE DEVELOPMENT MODELS Sandeep Kaur* *Department of computer Science & Engineering, Guru Nanak Dev

More information

NO DUE MANAGEMENT SYSTEM Ankit Kumar Choudhary, Saket singh, chandraleka

NO DUE MANAGEMENT SYSTEM Ankit Kumar Choudhary, Saket singh, chandraleka NO DUE MANAGEMENT SYSTEM Ankit Kumar Choudhary, Saket singh, chandraleka Under Graduate Student, Department of Information Technology, SRM University, Chennai, India Under Graduate Student, Department

More information

Case study on PhoneGap / Apache Cordova

Case study on PhoneGap / Apache Cordova Chapter 1 Case study on PhoneGap / Apache Cordova 1.1 Introduction to PhoneGap / Apache Cordova PhoneGap is a free and open source framework that allows you to create mobile applications in a cross platform

More information

Detection of Distinct URL and Removing DUST Using Multiple Alignments of Sequences

Detection of Distinct URL and Removing DUST Using Multiple Alignments of Sequences Detection of Distinct URL and Removing DUST Using Multiple Alignments of Sequences Prof. Sandhya Shinde 1, Ms. Rutuja Bidkar 2,Ms. Nisha Deore 3, Ms. Nikita Salunke 4, Ms. Neelay Shivsharan 5 1 Professor,

More information

1: Specifying Requirements with Use Case Diagrams

1: Specifying Requirements with Use Case Diagrams Outline UML Design Supplement 1: Specifying Requirements with Use Case Diagrams Introduction Use Case Diagrams Writing Use Cases Guidelines for Effective Use Cases Slide adapted from Eran Toch s lecture

More information

Passport Automation System

Passport Automation System 1.Objective: To develop the passport automation system software using UML language. It is the interface between applicant and authority responsible for issue the passport. It aims at improving efficiency

More information

For More Solved Assignments Visit - For More Ignou Solved Assignments Visit -

For More Solved Assignments Visit -  For More Ignou Solved Assignments Visit - For More Ignou Solved Assignments Visit - www.ignousolvedassignments.com Connect on Facebook : http://www.facebook.com/pages/ignousolvedassignmentscom/346544145433550 Subscribe and Get Solved Assignments

More information

Digitized Engineering Notebook

Digitized Engineering Notebook Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Syed Jalaluddin Governors State University

More information

User Centric Web Page Recommender System Based on User Profile and Geo-Location

User Centric Web Page Recommender System Based on User Profile and Geo-Location Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,

More information

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE

WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE WEB PAGE RE-RANKING TECHNIQUE IN SEARCH ENGINE Ms.S.Muthukakshmi 1, R. Surya 2, M. Umira Taj 3 Assistant Professor, Department of Information Technology, Sri Krishna College of Technology, Kovaipudur,

More information

Ontology Based Prediction of Difficult Keyword Queries

Ontology Based Prediction of Difficult Keyword Queries Ontology Based Prediction of Difficult Keyword Queries Lubna.C*, Kasim K Pursuing M.Tech (CSE)*, Associate Professor (CSE) MEA Engineering College, Perinthalmanna Kerala, India lubna9990@gmail.com, kasim_mlp@gmail.com

More information

Selection of UML Models for Test Case Generation: A Discussion on Techniques to Generate Test Cases

Selection of UML Models for Test Case Generation: A Discussion on Techniques to Generate Test Cases St. Cloud State University therepository at St. Cloud State Culminating Projects in Computer Science and Information Technology Department of Computer Science and Information Technology 6-2018 Selection

More information

Comparison of FP tree and Apriori Algorithm

Comparison of FP tree and Apriori Algorithm International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.78-82 Comparison of FP tree and Apriori Algorithm Prashasti

More information

Digitized Engineering Notebook

Digitized Engineering Notebook Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Sarath Garimella Governors State University

More information

3Lesson 3: Web Project Management Fundamentals Objectives

3Lesson 3: Web Project Management Fundamentals Objectives 3Lesson 3: Web Project Management Fundamentals Objectives By the end of this lesson, you will be able to: 1.1.11: Determine site project implementation factors (includes stakeholder input, time frame,

More information

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps

Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon. All Completed SRS2 Steps Software Requirements Document for Graffiti Author: Group 03 Yuly Suvorov, Luke Harvey, Ben Holland, Jordan Cook, Michael Higdon Version Date Author Change 0.1 09/13/ SM Initial Document 07 0.2 09/22/

More information

Generic Test Automation and Keyword Driven Approach

Generic Test Automation and Keyword Driven Approach www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 11 November, 2014 Page No. 9087-9091 Generic Test Automation and Keyword Driven Approach Bhagyashree

More information

Introducing Enterprise Architecture. into the Enterprise

Introducing Enterprise Architecture. into the Enterprise Introducing Enterprise Architecture into the Enterprise Washington - 21st October 2003 Chris Greenslade Chris@Architecting-the-Enterprise.com Introducing Enterprise Architecture 1 of 28 TA P16 1 Approach

More information

Pro Events. Functional Specification. Name: Jonathan Finlay. Student Number: C Course: Bachelor of Science (Honours) Software Development

Pro Events. Functional Specification. Name: Jonathan Finlay. Student Number: C Course: Bachelor of Science (Honours) Software Development Pro Events Functional Specification Name: Jonathan Finlay Student Number: C00193379 Course: Bachelor of Science (Honours) Software Development Tutor: Hisain Elshaafi Date: 13-11-17 Contents Introduction...

More information

Study on Recommendation Systems and their Evaluation Metrics PRESENTATION BY : KALHAN DHAR

Study on Recommendation Systems and their Evaluation Metrics PRESENTATION BY : KALHAN DHAR Study on Recommendation Systems and their Evaluation Metrics PRESENTATION BY : KALHAN DHAR Agenda Recommendation Systems Motivation Research Problem Approach Results References Business Motivation What

More information

Selenium Testing Training

Selenium Testing Training About Intellipaat Intellipaat is a fast-growing professional training provider that is offering training in over 150 most sought-after tools and technologies. We have a learner base of 600,000 in over

More information

Implementation of Databox

Implementation of Databox Implementation of Databox Prof. Shabana Sultana 1,Ms. Naureen Khader Sait 2,Ms. Shumela 3,Mr. Saraansh Dayal 4,Mr. Siddhartha Jha 5 Department of Computer Science and Engineering The National Institute

More information

OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis

OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis UNIT I INTRODUCTION OBJECT ORIENTED SYSTEM DEVELOPMENT Software Development Dynamic System Development Information system solution Steps in System Development Analysis Design Implementation Testing Maintenance

More information

SOFTWARE DESIGN DOCUMENT

SOFTWARE DESIGN DOCUMENT SOFTWARE DESIGN DOCUMENT Version: 1.1 Date: 22.12.2013 MobileLibrary Project Prepared By: HebeleGubeleGom Team Ali Sahin Ali Cinar Yunus Emre Avci Upol Ryskulova 1 Preface This document contains the system

More information

Digital Municipal. Computer Science and Engineering, St Joseph Engineering College, Vamanjoor, India

Digital Municipal. Computer Science and Engineering, St Joseph Engineering College, Vamanjoor, India International Journal of Internet of Things 2017, 6(2): 62-66 DOI: 10.5923/j.ijit.20170602.11 Digital Municipal Anusha Prakash, Arzoo V. Dadhania, Janice Carlin D Silva *, Sudhamshu Vidyananda, Gayana

More information

Alkan University College Student Information Management System

Alkan University College Student Information Management System American Journal of Operations Management and Information Systems 2016; 1(1): 1-6 http://www.sciencepublishinggroup.com/j/ajomis doi: 10.11648/j.ajomis.20160101.11 Alkan University College Student Information

More information

Research and Design of Key Technology of Vertical Search Engine for Educational Resources

Research and Design of Key Technology of Vertical Search Engine for Educational Resources 2017 International Conference on Arts and Design, Education and Social Sciences (ADESS 2017) ISBN: 978-1-60595-511-7 Research and Design of Key Technology of Vertical Search Engine for Educational Resources

More information

ResponseTek Listening Platform Release Notes Q4 16

ResponseTek Listening Platform Release Notes Q4 16 ResponseTek Listening Platform Release Notes Q4 16 Nov 23 rd, 2016 Table of Contents Release Highlights...3 Predictive Analytics Now Available...3 Text Analytics Now Supports Phrase-based Analysis...3

More information

GSU Event Portal. OPUS Open Portal to University Scholarship. Governors State University. Mounica Avuthu Governors State University

GSU Event Portal. OPUS Open Portal to University Scholarship. Governors State University. Mounica Avuthu Governors State University Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Summer 2016 GSU Event Portal Mounica Avuthu Governors State University Tanojkumar Mekala

More information

Chapter 4. Fundamental Concepts and Models

Chapter 4. Fundamental Concepts and Models Chapter 4. Fundamental Concepts and Models 4.1 Roles and Boundaries 4.2 Cloud Characteristics 4.3 Cloud Delivery Models 4.4 Cloud Deployment Models The upcoming sections cover introductory topic areas

More information

User-Centered Development

User-Centered Development Software Lifecycle CS470 User-Centered Development User-centered development refers to a design process for creating a system that meets the needs of the user Users should be included in the design process

More information

Research Article. August 2017

Research Article. August 2017 International Journals of Advanced Research in Computer Science and Software Engineering ISSN: 2277-128X (Volume-7, Issue-8) a Research Article August 2017 English-Marathi Cross Language Information Retrieval

More information

An Architecture For Computational Grids Based On Proxy Servers

An Architecture For Computational Grids Based On Proxy Servers An Architecture For Computational Grids Based On Proxy Servers P. V. C. Costa, S. D. Zorzo, H. C. Guardia {paulocosta,zorzo,helio}@dc.ufscar.br UFSCar Federal University of São Carlos, Brazil Abstract

More information

Introduction to Software Engineering

Introduction to Software Engineering Chapter 1 Introduction to Software Engineering Content 1. Introduction 2. Components 3. Layered Technologies 4. Generic View of Software Engineering 4. Generic View of Software Engineering 5. Study of

More information

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements

The Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed

More information

Why Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix

Why Information Architecture is Vital for Effective Information Management. J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix Why Information Architecture is Vital for Effective Information Management J. Kevin Parker, CIP, INFO CEO & Principal Architect at Kwestix J. Kevin Parker, CIP, INFO CEO & Principal Architect, Kwestix

More information

Overview of Web Mining Techniques and its Application towards Web

Overview of Web Mining Techniques and its Application towards Web Overview of Web Mining Techniques and its Application towards Web *Prof.Pooja Mehta Abstract The World Wide Web (WWW) acts as an interactive and popular way to transfer information. Due to the enormous

More information

Up and Running Software The Development Process

Up and Running Software The Development Process Up and Running Software The Development Process Success Determination, Adaptative Processes, and a Baseline Approach About This Document: Thank you for requesting more information about Up and Running

More information

Vision Document. Online E-commerce Music CD Store Version 2.0

Vision Document. Online E-commerce Music CD Store Version 2.0 Vision Document Online E-commerce Music CD Store Version 2.0 Submitted in partial fulfillment of the requirements of the degree of Master Software Engineering Reshma Sawant CIS 895 MSE Project Kansas State

More information

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING

CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING MAJOR: DEGREE: COMPUTER SCIENCE MASTER OF SCIENCE (M.S.) CONCENTRATIONS: HIGH-PERFORMANCE COMPUTING & BIOINFORMATICS CYBER-SECURITY & NETWORKING The Department of Computer Science offers a Master of Science

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION 2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,

More information

TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I. April 8, Version 1.0

TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I. April 8, Version 1.0 TEST ENGINE SYSTEM (TES) SOFTWARE PROJECT PLAN PHASE I April 8, 2003 Version 1.0 Team Members Page 1 of 16 Test Engine System Table of Contents 1.0 Introduction 1.1 Project scope 1.2 Major software functions

More information

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,

Rashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015, SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification

More information

Bridge Course On Software Testing

Bridge Course On Software Testing G. PULLAIAH COLLEGE OF ENGINEERING AND TECHNOLOGY Accredited by NAAC with A Grade of UGC, Approved by AICTE, New Delhi Permanently Affiliated to JNTUA, Ananthapuramu (Recognized by UGC under 2(f) and 12(B)

More information

Appendix A - Glossary(of OO software term s)

Appendix A - Glossary(of OO software term s) Appendix A - Glossary(of OO software term s) Abstract Class A class that does not supply an implementation for its entire interface, and so consequently, cannot be instantiated. ActiveX Microsoft s component

More information

Election Analysis and Prediction Using Big Data Analytics

Election Analysis and Prediction Using Big Data Analytics Election Analysis and Prediction Using Big Data Analytics Omkar Sawant, Chintaman Taral, Roopak Garbhe Students, Department Of Information Technology Vidyalankar Institute of Technology, Mumbai, India

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System and Software Architecture Description (SSAD) FlowerSeeker Team 05 Name Eder Figueroa Sophia Wu Doris Lam Hiram Garcia Roles Primary Role: Project Manager/ Implementer. Secondary Role: Tester. Primary

More information

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE

AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE AN IMPROVISED FREQUENT PATTERN TREE BASED ASSOCIATION RULE MINING TECHNIQUE WITH MINING FREQUENT ITEM SETS ALGORITHM AND A MODIFIED HEADER TABLE Vandit Agarwal 1, Mandhani Kushal 2 and Preetham Kumar 3

More information

Natural Language Processing on Hospitals: Sentimental Analysis and Feature Extraction #1 Atul Kamat, #2 Snehal Chavan, #3 Neil Bamb, #4 Hiral Athwani,

Natural Language Processing on Hospitals: Sentimental Analysis and Feature Extraction #1 Atul Kamat, #2 Snehal Chavan, #3 Neil Bamb, #4 Hiral Athwani, ISSN 2395-1621 Natural Language Processing on Hospitals: Sentimental Analysis and Feature Extraction #1 Atul Kamat, #2 Snehal Chavan, #3 Neil Bamb, #4 Hiral Athwani, #5 Prof. Shital A. Hande 2 chavansnehal247@gmail.com

More information

Digitized Engineering Notebook

Digitized Engineering Notebook Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Naga Venkata Sandeep Kavuru Governors State

More information

Software Design Document

Software Design Document Software Design Document author(s): Bart Maes Abstract: This document lays down the architecture and detailed design of the Salesmen project. This project is created by group 2 of the course Software Engineering

More information

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS

QM Chapter 1 Database Fundamentals Version 10 th Ed. Prepared by Dr Kamel Rouibah / Dept QM & IS QM 433 - Chapter 1 Database Fundamentals Version 10 th Ed Prepared by Dr Kamel Rouibah / Dept QM & IS www.cba.edu.kw/krouibah Dr K. Rouibah / dept QM & IS Chapter 1 (433) Database fundamentals 1 Objectives

More information

A WEB BASED OFFICE MARKET. CS 297 Project Report Presented to Dr. Christopher Pollett San José State University

A WEB BASED OFFICE MARKET. CS 297 Project Report Presented to Dr. Christopher Pollett San José State University A WEB BASED OFFICE MARKET CS 297 Project Report Presented to Dr. Christopher Pollett San José State University By Manodivya Kathiravan May 2016 INTRODUCTION This report describes preliminary work toward

More information

Requirements Elicitation

Requirements Elicitation Requirements Elicitation Introduction into Software Engineering Lecture 4 25. April 2007 Bernd Bruegge Applied Software Engineering Technische Universitaet Muenchen 1 Outline Motivation: Software Lifecycle

More information

Media Services Online Mohammed Abukhiran. Report 13 on the work of Week 13

Media Services Online Mohammed Abukhiran. Report 13 on the work of Week 13 Media Services Online Mohammed Abukhiran Report 13 on the work of Week 13 Berea College Nov 30, 2010 Application Development Project Concept Proposal Media Services at Berea College uses Voyger (Database

More information

Advanced Migration of Schema and Data across Multiple Databases

Advanced Migration of Schema and Data across Multiple Databases Advanced Migration of Schema and Data across Multiple Databases D.M.W.E. Dissanayake 139163B Faculty of Information Technology University of Moratuwa May 2017 Advanced Migration of Schema and Data across

More information

Remote Health Service System based on Struts2 and Hibernate

Remote Health Service System based on Struts2 and Hibernate St. Cloud State University therepository at St. Cloud State Culminating Projects in Computer Science and Information Technology Department of Computer Science and Information Technology 5-2017 Remote Health

More information

"Charting the Course... ITIL 2011 Service Offerings & Agreement (SOA) Certification Program. Course Summary

Charting the Course... ITIL 2011 Service Offerings & Agreement (SOA) Certification Program. Course Summary Course Summary Description ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many public and private organizations. Since early 1990, ITIL

More information

V. Thulasinath M.Tech, CSE Department, JNTU College of Engineering Anantapur, Andhra Pradesh, India

V. Thulasinath M.Tech, CSE Department, JNTU College of Engineering Anantapur, Andhra Pradesh, India International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 5 ISSN : 2456-3307 Natural Language Interface to Database Using Modified

More information

A Web Based Registration system for Higher Educational Institutions in Greece: the case of Energy Technology Department-TEI of Athens

A Web Based Registration system for Higher Educational Institutions in Greece: the case of Energy Technology Department-TEI of Athens A Web Based Registration system for Higher Educational Institutions in Greece: the case of Energy Technology Department-TEI of Athens S. ATHINEOS 1, D. KAROLIDIS 2, P. PRENTAKIS 2, M. SAMARAKOU 2 1 Department

More information

"Charting the Course... ITIL 2011 Operations Support Analysis (OSA) Certification Program. Course Summary

Charting the Course... ITIL 2011 Operations Support Analysis (OSA) Certification Program. Course Summary Description Course Summary ITIL is a set of best practices guidance that has become a worldwide-adopted framework for IT Service Management by many Public & Private Organizations. Since early 1990, ITIL

More information

S1 Informatic Engineering

S1 Informatic Engineering S1 Informatic Engineering Advanced Software Engineering Web App. Process and Architecture By: Egia Rosi Subhiyakto, M.Kom, M.CS Informatic Engineering Department egia@dsn.dinus.ac.id +6285640392988 SYLLABUS

More information

Know Your Personality

Know Your Personality Project Report On Know Your Personality Submitted By: Guided By 1. Jatin Kinra Mrs. Kapila pareek 2. Neha Agrawal Assistant Professor, 3. Shipra Bhatt IIIM, Jaipur. Team Number:-8 1 ACKNOWLEDGEMENT The

More information

Information Push Service of University Library in Network and Information Age

Information Push Service of University Library in Network and Information Age 2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang

More information

CONCEPTUAL DESIGN FOR SOFTWARE PRODUCTS: SERVICE REQUEST PORTAL. Tyler Munger Subhas Desa

CONCEPTUAL DESIGN FOR SOFTWARE PRODUCTS: SERVICE REQUEST PORTAL. Tyler Munger Subhas Desa CONCEPTUAL DESIGN FOR SOFTWARE PRODUCTS: SERVICE REQUEST PORTAL Tyler Munger Subhas Desa Real World Problem at Cisco Systems Smart Call Home (SCH) is a component of Cisco Smart Services that offers proactive

More information