ISR Case Study
ISR Case Study
ON
NETFLIX RECOMMENDATION SYSTEM
ACKNOWLEDGMENT I
ABSTRACT II
LIST OF FIGURES VI
LIST OF TABLES VII
1 INTRODUCTION 1
1.1 Background ..................................................................................................... 1
1.2 Relevance ........................................................................................................ 3
1.3 Organization of the Project Report........................................................... 3
2 LITERATURE SURVEY 5
3 PROJECT STATEMENT 9
3.1 Problem Definition .................................................................................... 9
3.2 Proposed Methodology ................................................................................... 9
5 SYSTEM DESIGN 19
5.1 System Architecture ................................................................................ 19
5.2 System Design ......................................................................................... 19
5.3 Data Flow Diagrams ............................................................................... 20
5.3.1 DFD Level 0 ................................................................................ 20
5.3.2 DFD Level 1 ................................................................................ 20
5.3.3 DFD Level 2 ................................................................................ 21
5.4 UML Diagrams ........................................................................................ 21
5.4.1 Use Case Diagram ....................................................................... 21
5.4.2 Activity Diagram ......................................................................... 22
5.4.3 Sequence Diagram............................................................................ 22
5.4.4 Component Diagram ................................................................... 22
5.4.5 Deployment Diagram .................................................................. 23
5.4.6 Package Diagram ......................................................................... 24
5.4.7 State Transition Diagram ............................................................ 24
6 IMPLEMENTATION 25
6.1 Implementation Detail ............................................................................. 25
6.2 Algorithm Details .................................................................................... 29
6.3 Tools and Technologies Used ...................................................................... 29
7 SOFTWARE TESTING 31
7.1 Type of Testing Used ................................................................................... 31
7.1.1 Performance Testing ........................................................................ 31
7.1.2 System Testing ............................................................................ 31
7.1.3 Recovery Testing ......................................................................... 31
7.1.4 Security Testing ........................................................................... 31
7.1.5 Integration Testing....................................................................... 32
7.2 Test Cases ................................................................................................ 32
8 RESULTS 33
8.1 Snapshot ........................................................................................................ 33
8.2 Results and Discussion............................................................................ 36
9 CONCLUSION 39
9.1 Conclusion .................................................................................................... 39
9.2 Future Scope ................................................................................................. 39
Appendix A REFERENCES 41
List of Figures
INTRODUCTION
1.1 Background
1
There has been a large number of studies into how to strengthen this service
much further and supply consumers with innovative and exciting factors that
characterize it apart from its contemporaries. As a result, there has been an
abundance of research towards enhancing the customer experience and providing
distinctive properties that can engage a bigger percentage of subscribers. This enables
the service to expand and then provide new services, making it far more accessible
for consumers to purchase from the convenience of their own residences.Recommender
systems predicated on the user’s requirements and past pur- chasing history are an
example of a beneficial deployment. That would be a very valuable and successful
method for adding an additional dimension to the service quality provided to each
consumer on the E-Commerce website. Recommender systems are incredibly
sophisticated and necessitate a comprehensive understand- ing of the customer’s
buying habits as well as the numerous items that have been originally purchased that
are unique to that individual. This results in a large number of possibilities, which
can be intimidating and make calculating sugges-
tions incredibly challenging.
As a result of the deployment of the bag of words technique in this method-
ology, natural language processing was already established. The bag of words is
little more than a customized lexicon associated with the implementation. The
different bags of words are employed in our method to separate the favorable and
unfavorable terms in the assessments. This enables us to evaluate whether the
feedback is fully favorable or negative in order to assess the performance of the
commodity. This technique is further strengthened by the implementation of phrase
frequency and inverse document frequency, which can be used to identify the
relevance of a specific word and it can be beneficial in removing sarcasm from
customer reviews.
The use of a Fuzzy artificial neural network enables for the classification of
customer reviews into five components of positivity and negativity. This provides a
commodity to be labelled with a variety of labels, which could also aid in the rec-
ommendation process based on the required specification. This is also augmented by
the implementation of collaborative filtering, which efficiently and successfully
2
serves to notify the cosine similarity among the couple elements, the initial of thatis
previously suggested products to users with similar, and the second of these is the
suggestion supplied by our system. These two aspects are successfully consoli- dated
to substantially enhance the accuracy of the product recommendation. This research has
successfully expanded the technique, as well as an adequate assess- ment of the
evaluation metrics, which has been successful and efficiently beneficial, as well as
future research directions.
1.2 Relevance
E-commerce platforms have been getting increasingly popular with a large number
of people utilizing this platform increasingly. This is due to the increased convenience
and ease of use offered by these platforms in shopping for essential items and other
products at the comfort of your home. This is allowed a lot of disabled individuals
and individuals with mobility issues to effectively stay athome and order various items
that are needed easily. This has also led to a large number of e-commerce platforms that
are vying for the attention of the users and trying to increase the user base to be able to
provide effective solutions with ease. One such implementation is the realization of
product recommendations to theuser based on the various product reviews that are
posted on the products. This is a highly complex task as a large number of reviews are
posted for a product with varying degrees of positivity or negativity. Therefore to
achieve effective product recommendation an effective approach has been outlined in
this research article through the utilization of machine learning approaches. The
presented technique implements the Bag of Words approach, Term Frequency, and
Inverse Document Frequency along with Fuzzy Artificial Neural Network and
Collaborative Filtering to achieve highly accurate product recommendations. The
approach has been qualified through extensive experimentation of precision and recall
metrics which indicate very high accuracy of execution of this recommender system.
3
Section 2: Literature Survey
Section 3: Problem Statement
Section 4: System Requirement & Specification
Section 5: System Design
Section 6: Implementation
Section 7: Software Testing
Section 8: Results
Section 9: Conclusion
Section 10: References
4
CHAPTER 2
LITERATURE SURVEY
This section of the literature survey eventually reveals some facts based on
thoughtful analysis of many authors work as follows.
Eriko Shibamoto [1] explains that taking images has become better in the recent
years due to the advancements and the improvements in the image capturing
technologies. There have been incremental updates that have been focusing on the
realization of handheld and smartphone cameras. Nowadays there are numerous
techniques that have allowed the inclusion of a camera in a smartphone and almost all
smartphones have a camera now. Therefore, the authors in this approach have been
focusing on the aspect of clicking images on the smartphone and allowing the
realization of an effective recommendation system based on the behavior of the
users.
Fenfang Xie [2] states that the smartphone have been proliferating in the recent
years. This can be owing to the increased conveniences offered by the smartphones for
each of the individuals. This has been evident in the increased use and the
manufacturing of smartphones that have been highly influential in the realization of
a large number of use cases for the smartphones. The increased adoption of the
smartphones have been crucial in the development of the various applications for
enabling increased functionality for the user. There are numerous applications on the
app store but the process of application recommendation can be improved further. For
this purpose the authors in this publication have proposed the useof graph based
neural networks to recommend apps to the user based on their interests.
Rui Liu [3] expresses that the increasing popularity of the smartphones have
been one of the defining features of this decade and have become almost universal in
its application and usage. The increased usage of smartphones has been critical towards
the development of better hardware and other features such as applica-
5
tions on the smartphone platform. Due to the constant usage of the devices there is a
lot of personal and private information on these devices that needs to be ef- fectively
secured. To achieve effective privacy and security of the user’s data on the
smartphones the authors have proposed the use of a crowdsourcing approach based on
recommendations. This approach identifies the user preferences which are used to
secure the data stored on the device and manage the permissions.
Dimas Indiarto Sumiko [4] narrates that the social media has turned into a necessity
nowadays with a large amount of reliance that is being put on these web services for
the purpose of communication. These web services such as social media networks have
been easy to use and convenient to achieve the communication with your loved ones
and family members. The social media outlets have a large base of regular users that
have been utilizing their services every single day. These social media networks have
been also providing the effective advertisements and other marketing strategies to the
users based on their preferences and other interests. This study details the customer
behavior with impulsive smartphone buying and correlating it with the YouTube
product recommendations.
Jinyang Liu [5] individuals all around the globe are already embracing smart-
phones currently, and a large number of consumers are employing smartphones
with Android operating systems and services. A numerous individuals are en-
gaging on the Android platform to develop and construct innovative solutions, but
their effort is fraught with challenges: completing a script document, or per- haps
even simply a code succession, is a challenging task which requires extensive
engineering expertise and interpretation. As a result, designing and developing
computer-based frameworks that assist programmers in their job has become a
major study area. Because API utilization is such an important component of
Android development, this article delves into the challenge of proposing API uti-
lizations to developers.
Pulkit Rustgi [6] highlights the existing authorization mechanism for Android
OS confidentiality protection, which is primarily reliant on individuals. Before or
after a software is implemented, users must determine what privileges it has per-
mission to. Application are welcome to answer users because for some materials
6
they believe they require. Authorization sought by these programs are frequently
provided to users via a dialogue box, with very few data supplied. This has been
ineffectual because consumers might not even fully comprehend the commodity to
which an application is asking access and/or simply lack the resources to investi-
gate the consequences of accepting a clearance query.
Yudai Kato [7] depicts the situation notwithstanding the significant advances in
information technology, anybody may readily communicate and exchange knowl-
edge irrespective of distance or location, and access a wealth of diverse material
via the World Wide Web. The equivalent may be true for visitor attractions.
Travelers must choose vital information from the large volume of tourist material,
and finding knowledge matched to their needs is quite challenging. As a result, by
using World Wide Web to supply travelers with useful sightseeing data is es-
sential. The authors have recommended using an effective technique that employs the
regularity of tourist visits for the objective of proposing a tourism sightseeing place
for this objective.
Nesrine Kadri [8] have created a healthier suggestion model based on smart-
phone sensor measurements. Drawing on WHO standards, this approach assesses the
condition of moderate physical activity for mobile phone users and determines whether
they are productive or not. The data was categorized into five groups by the
researchers, which included vigorous physical activities that used calories andother
sedentary activities. Machine learning methods outperformed deep learn- ing
systems in categorization. The challenge of uneven groupings throughout the
training process might be used to justify this. Researchers can use the suggestion
system once a week as a points of view. Researchers may further enhance the
findings and using another sensor smartphone information, the Global Navigation
Satellite system, to determine the kilometers range of vigorous exercise such as
walking and running.
Sushmita Roy [9] offers a movies recommendation engine consisting of multi-
ple Python language techniques. It accepts a collection of data containing various
movies published in recent years as source and generates suggestions based on sev- eral
methodologies. All of the recommender systems that have been adopted all
7
had their own set of benefits and drawbacks when it comes to accomplishing their goals.
The majority of the flaws in one strategy are addressed by a different strat- egy. A
successful recommendation engine must deliver both accurate and helpful suggestions,
as well as recommendations that differentiate from those provided by optimization
schemes.
Batuhan Asiroglu [10] argues that today’s product suggestion algorithms re-
quire information about the user’s prior buying habits. This indicates that the
system relies on huge amounts of information and a lot of computational capa-
bilities to develop machine learning methods. Furthermore, these algorithms will
not be able to propose consumer items if they do not even have information on the
user’s prior buying activity. The research team provide a cloth suggestion to a
consumer even without users past buying usage patterns. The researchers offer a
scalable integrated mechanism that uses only a single image to create a textile with
cheap cost and power efficiency.
Zhigao Che [11] describes the creation of an accurate Hadoop-based recommen-
dation engine. Employing crawler technique to gather job recruiting information from
the database, big data technique was utilized to cleanse and aggregate job procurement
data, which could be employed as high degree of influence for pur- suit of its
objectives based on student successes. In practice, it has been demon- strated that this
approach can successfully increase academic employment, assist businesses in
recruiting and selecting talent, enhance the capacity of workforce supervision,
monitoring, and service in educational establishments, as well as pro- vide information
and technology to colleges and universities to help them continue improving their
professional design, among other things.
8
CHAPTER 3
PROJECT STATEMENT
9
CHAPTER 4
4.1 Introduction
The purpose of this SRS document is to provide a detailed overview of our soft-
ware product “Smart Phone Recommendation using User Reviews and Product
Specifications”, its parameters and goals. This document describes the project’s
target audience and its user interface, hardware and software requirements. It
defines how our client, team and audience see the product and its functionality.
The main purpose of this system is to enhance the process of mobile
recommendation by using Natural Language Processing along with machine
learning
10
implementations such as Fuzzy Artificial Neural Networks and Collaborative
filtering.
The scope of this project includes project developer assisted by project guide.
The scope thus far has been the completion of the basic interfaces that will
be used to build the system. The constraints felt thus far by the developer have only
been our weekly story cards, the end-to-end side of the interface, and time to time
brushing on methodology of implementation which schedule the completion of the
project.
The major scope of this project is as follows
The User Interface must be easy to use and should be easily understood by a layman.
The interface must be clean and devoid of any artefacts and errors. The user should
be able to interact with the system with ease and the design should be simple and
coherent.
The proposed system has been deployed with the use of completely free or open
source software. The system does not employ any proprietary software or API’s to
achieve its goals. This is highly useful in the scenario of a crash or an unexpected
error as the system can be redeployed in a very short time due to the open source
nature of the system. All the resources that have been utilized for the development
of the methodology are freesoftware distributions which are very useful and efficient
in addition to being completely open source.
This project is for the user who is seeking the smart phone recommendation
system. This software is having following characteristics:
End User
11
Update profile if needed
System speed
IDE behaviour
4.2.1 Preprocessing
Input-Dataset
Priority –High
Stimulus: Words
Preprocessed list.
12
4.2.2 Bag of Words
Input-Preprocessed list.
Priority –High
4.2.3 TF-IDF
Input-Feature List
Priority –High
TF-IDF List.
Input-Feature List
Priority –High
13
4.2.4.2 Stimulus/Response Sequences
Probability List.
Input-Probability List
Priority –High
Mobile Recommendation.
14
4.3.2 Hardware Interfaces
Our system interacts with the secondary storage device while reading the dataset.
• Our system interacts with the Mysql Database server while performing database
operations.
Our system’s different modules are communicating with one another on the fol-
lowing scenarios
Accuracy: System should correctly recommend the movie, display the re- sult
accurately. System output should be in user required format. That means all
the intermediate steps need to be display properly.
15
4.4.2 Safety Requirements
The system need to be properly converted into executable file format so thatthe
source code of the system will preserved from any kind of intrusions.
The system need to be secured using the proper credentials and always the backup
of the system need to be kept to restore the whole system again in worst case scenario.
System is extensible.
1. Platform: JAVA
16
4.3.1 Hardware Requirements
The Proposed model follows the Waterfall model development cycle for the
development of the source code, as the whole process is working linearly in the
standalone application mode.
17
4.7 System Implementation Plan
18
CHAPTER 5
SYSTEM DESIGN
19
5.3 Data Flow Diagrams
20
5.3.3 DFD Level 2
21
5.4.2 Activity Diagram
22
5.1.1 Component Diagram
23
5.4.5 Package Diagram
24
CHAPTER 6
IMPLEMENTATION
The presented system for sentiment analysis has been depicted in the system
overview given in figure 6.1 above. The sequential steps to achieve the presented
approach have been elaborated in the section below.
Step 1: Data collection and Data feeding – The proposed technique requires the
input of a dataset review for the smartphones. For this purpose a dataset contain- ing
reviews has been extracted from the URL - https://www.kaggle.com/code/moh
itkumar409/smartphone-recommendation-system/notebook#Description:
This dataset consists of a number of different reviews for smartphones and the
requisite information about the reviews. The attributes include the author, country, date,
domain, extract (actual content of the review), language, product, score (rating given
for the product), score max (maximum rating given for the mobile, and source.
25
The dataset need to be preprocessed before providing it to the system to re-
duce the incidences of any error or redundancy that may impact the performance
negatively. The preprocessing approach has been elaborated in the next step ofthe
approach.
Step 2: Preprocessing – The preprocessing approach is the initial logical step
of the approach that is designed to facilitate the processing of the reviews beforeit
can be provided to the system. The extracted dataset achieved in the previous step
is provided as an input in this step of the procedure. The dataset is in the workbook
format, therefore the JXL library is being used to interface this file with the java code.
The dataset is then converted into a double dimension list that canbe easily processed
by the system.
The process of preprocessing is effective in realization of the conditioning of the
input reviews that are provided. This is highly crucial as the performance of the
execution depends on the effectively of this step of the procedure. The presence of
any unnecessary data can be detrimental to the system as it could result in an error
reducing the accuracy. The redundant data can also take longer to process which can be
problematic to achieve efficiency. The steps for preprocessing are defined below.
Special Symbol Removal – The input string containing the review is provided
to this initial step of the procedure where the special symbols are removed. These
special symbols are used to provide grammatical pauses and other nuances to the text.
This is redundant in our implementation and can be removed without any negative
effects to the review. These symbols, such as ?, , etc are removed from the review.
Stemming – This is the second step in the preprocessing approach where the special
symbol removed review is provided as an input. This step deals with making the
input lightweight which can considerably reduce the processing time of the system.
Majority of the words in the English language come from the same root word and just
differ from one another just by a postfix. These words are then stemmed to their specific
root words, which does not change the meaning of the word. For example, the word
sleeping will be truncated to sleep, which doesn’t
26
change the semantics of the word while making the review lightweight.
Stop Word Removal – The stemmed review is provided to this step of the
preprocessing for the purpose of stop word removal. In the English language, stop
words are words that are used to provide connection between two sentences or combine
two different parts of the same sentence. This is not required by our approach, and the
removal of the stopwords does not provide any penalty in terms of comprehension of
the sentences. Therefore, the words such as and, is, they are eliminated from the review
to achieved the preprocessed review which is provided to the next step for further
processing.
Step 3: Bag of Words – The preprocessed review is provided to this step of
the procedure for effective evaluation of the contents of the review. The content of
the reviews contain a large variety of words which can be Positive, negative or Neutral
in nature. These are useful in evaluation of the overall review and the emotion or the
sentiment of the review. This is one of the most integral parts of the sentiment
analysis module that enables the realization of the text that is being shared in the
reviews.
The bag of words is nothing but a curated dictionary of words that are used to
compare for their presence in the reviews. There are two bag of words or two
dictionaries that are used to achieve the evaluation, namely, the positive bag of words
and negative bag of words. The pseudo protocol used for the assessment determines a
separate list for each of the positive bags and the negative bags are derived from the
assessment of the preprocessed review and utilized further in the proposed system.
Step 4: Term Frequency and Inverse Document Frequency – The preprocessed
review is provided to this module for the realization of one of the central concepts of
Natural Language Processing that is implemented in the proposed system. The Term
Frequency and Inverse Document Frequency determine the amount of time a particular
word is encountered in the review. This is crucial to extract the impor- tance of the
particular word which can be useful in understanding the sentiment of the review.
The equation utilized for the same is provided in the equation 1 given below.
27
Numberof Documents
TF − IDF = TFXLog Numberof DocumentsContainingWordW
The Inverse Document Frequency provides the frequency of the particular word in
the collection of reviews that can be crucial in achieving the relevance of the word
in the reviews. This data is listed in the form of a double dimension list and
provided to the next step for the purpose of achieving the correlation. The algorithm
for the estimation of the TF-IDF for the reviews is mentioned below in algorithm
1 in algorithm section.
Step 5: Fuzzy Artificial Neural Network – This is one of the most important
steps in the proposed methodology wherein a double dimensional list is utilized to
effectively store the text of the product review as well as the score for correlation of
these values. The fuzzy classification is achieved on this list to effectively segregate the
smartphone review scores and effectively identify the difference between the maximum
and the minimum smartphone review scores. The difference achieved is then
effectively divided into 5 equal parts to achieve effective fuzzy classification labels.
These labels correspond to the fuzzy crisp values that are segregated as very high
medium-low and very low.
The neurons for the artificial neural network are then classified according to
the given rules above depending on the classified product reviews with labels provided
such as excellent satisfactory average disappointed and worst. These neurons are then
subjected to affective evaluation of the hidden layer and the resultant probability
achieved effectively determines the mobile recommendation for the desired level
according to the user.
Step 6: Collaborative Filtering – In this step of the approach, collaborative filtering
is achieved depending on the attributes and mobile recommendations according to those
attributes achieved previously. Another factor in consideration for the collaborative
filtering approach is the effective recommendation achieved by the recommender
system. These two factors are essentially utilized and their cosine similarity is
effectively determined but converted into an effective vector for the cosine angle
analysis. This allows for improvement in the recommendation systems and significantly
improves the execution performance and accuracy of the mobile recommendation
considerably. The resultant collaborative filtering index
28
utilized effectively extract the nearest coefficient in the form of the smartphone which
is provided as a recommendation to the user. The Collaborative Filtering step is
detailed in algorithm 2 in algorithm section.
1: Start
2: For i=0 to Size of CR
3: CRL of CRLi (CRL Current Recommendation List)
4: IF CRL ∈ PR
5: THEN — CRL – PR — < CFL [CFL - Collaborative Filtering Limit variable]
6: Set Collaborative Filtering index CFI
7: Create CFI List
8: END For
9: Return CFI
10: Stop
The presented approach for the purpose of achieving mobile recommendation has been
realized through the use of the java programming language. The NetBeans IDE is
being used to achieve the development of the system. The development
29
machine is powered by 8GB of RAM assisted by 1TB of storage and an Intel Core i5
processor. The database responsibilities and requirements are handled by the MySQL
Database server.
30
CHAPTER 7
SOFTWARE TESTING
The performance of the system is measured by the Precision and Recall for
the given dataset input
Checked the steadiness of the space provided by the system for the maximum
number of rows in the dataset. This is done by feeding the maximum number of
data rows to learn and so that set the threshold by the Virtual machine option of the
Netbeans IDE.
Our system can be recovered in span of 2 hour after crashing. Within two hour we
can install all the Software and deploy our system to work as in the past.
The System is well equipped to stand against the breakdown point of maximum
number of dataset rows decided by the IDE’s virtual machine settings, beyond that the
memory overflow exception may arise.
All the modules are independently handled developed and ran to get proper output
and finally they are integrated to get the whole output.
31
7.1.4.3 Black Box Testing
Compatibility analysis is done by passing the output of one module to another and
checking for estimated output of Mobile Recommendation.
When all the individual modules are integrated into our system, that yields a proper
system of Mobile Recommendation system that is cross examined for the desired
output.
32
CHAPTER 8
RESULTS
8.1 Snapshot
33
Figure 8.3: User Operation Frame
34
Figure 8.5: Search Frame
35
8.2 Results and Discussion
The presented approach for the purpose of achieving mobile recommenda- tion
has been realized through the use of the java programming language. The NetBeans
IDE is being used to achieve the development of the system. The de- velopment
machine is powered by 8GB of RAM assisted by 1TB of storage and an Intel
Core i5 processor. The database responsibilities and requirements are handled by
the MySQL Database server.
The evaluation of the presented approach has been performed to measure the
performance of the methodology. The performance evaluation is necessary to determine
the proper deployment of the various modules. For the assessment of the approach
the paradigm of Precision and Recall has been used.
Performance Evaluation based on Precision and Recall
The evaluation of the Precision and Recall has been initiated to determine
the accuracy of the system performance for mobile recommendation. The system
utilizes the review dataset for the smartphones as an input. The evaluation of the
recommendation has been performed through the combination of several modules, such
as Bag of Words, TF-IDF along with Fuzzy ANN and Collaborative filtering.
These modules must be implemented accurately and the output for the same must be
accurate from one module and another to achieve the accurate recommendation. The
performance for the analysis of the recommendation is performed through the use of
Precision and Recall metric.
Precision and Recall are extremely useful metrics that determine the execution
accuracy of the system. The precision metric is defined as the absolute accuracy of the
system and on the other hand the recall is considered as the relative accuracy of the
system.
For the evaluation purposes the precision as the ratio of number of accurate mobile
recommendations by the total number of reviews extracted. The recall metric is
considered as the ratio of accurate mobile recommendation, by the total number of
inaccurate mobile recommendations.
The Precision and Recall metrics have been mathematically illustrated below.
36
A = The number of accurate mobile recommendations for the given reviews
C = The number of accurate recommendations that are not done for the given
reviews
Figure 8.8: : Precision and Recall Measurement for the Mobile recommendation
Figure 8.9: Comparison of Precision and Recall for the Mobile recommendation
37
It can be noticed from the graphs that the performance indicated through the
values of Precision and Recall is quite good for the mobile recommendation achieved
through the use of Fuzzy ANN and Collaborative Filtering. The perfor- mance of the
system takes the smartphone reviews as an input and achieves highly satisfactory
performance. The precision and recall values of 88.25 and 90.08 are better than
expected for the first time implementation of such a system for the recommendation.
38
CHAPTER 9
CONCLUSION
9.1 Conclusion
39
APPEX A
REFERENCES
[2] F. Xie, Z. Cao, Y. Xu, L. Chen and Z. Zheng, ”Graph Neural Network and
Multi-view Learning Based Mobile Application Recommendation in Hetero-
geneous Graphs,” 2020 IEEE International Conference on Services Comput-
ing (SCC), 2020, pp. 100-107, doi: 10.1109/SCC49832.2020.00022.
40
Symposium on Integrated Network and Service Management (IM), 2019, pp. 737-
738.
[11] Z. Chen, W. Liang, X. Gao, Z. Zhou and M. Wu, ”Research on the Ac-
curate Recommendation Management System for Employment of College
Graduates on Hadoop,” 2019 5th International Conference on Big Data
and Information Analytics (BigDIA), 2019, pp. 19-22, doi: 10.1109/Big-
DIA.2019.8802855.
41