Flipkart Product Recommendation System: T. Keerthana, T. Bhavani, N. Suma Priya, V. Sai Prathyusha, K.Santhi Sri
Flipkart Product Recommendation System: T. Keerthana, T. Bhavani, N. Suma Priya, V. Sai Prathyusha, K.Santhi Sri
a user to derive personal preferences and social attributes of items in order to generate predictions.
opinions mined from local experts to facilitate When documents such as web pages, publications
personalized location recommendations [45] [46]. In and news are to be recommended. Content-based
this paper, we are targeting at a problem with limited filtering technique is the most successful. In content-
amount of user information[39]. User profiles, based filtering technique, recommendation is made
preferences, location histories, item ratings are not based on the user profiles using features extracted
available. Furthermore, in the mobile shopping from the content of the items the user has evaluated
website for coupon deals, the life span of deals is in the past. Collaborative filtering is a domain-
only several days. All these limitations and independent prediction technique for content that
constraints make it difficult to apply existing cannot easily and adequately be described by
techniques to build recommendation systems [47] metadata such as movies and music. Collaborative
[48]. Therefore, we are proposing a novel approach filtering technique works by building a database of
to analyze the purchase history of the user, find their preferences for items by users. It then matches users
purchase patterns related to the user behavior and with relevant interest and preferences by calculating
then predict information of the next possible purchase similarities between their profiles to make
in a particular location[40]. recommendations.
Collaborative filtering techniques can be
3. PROPOSED METHOD Model-based filtering technique
The proposed method uses the content based, Memory-based filtering technique
collaborative based and hybrid filtering techniques User-based technique
to achieve accurate recommendations. Content- Item-based technique
based technique is a domain-dependent algorithm
and it emphasizes more on the analysis of the
Fig.2.ProposedFramework
4. RESULTS strict setting is used in the experiment, such that the
To make recommendations to a particular user in the second part only contains 1 transaction. Assume that
test data set, the user’s transaction history is divided a user is located near a set of available coupon deals.
into two parts. The first part is considered as The experiment aims to predict the correct category
purchase history and it is used by the conditional of the user’s next purchase, so as to recommend the
probability model to make recommendations. The deals that are the most likely to be accepted.
second part is the next purchase after first part, and it
is considered as recommendation ground truth. A
Fig.3.Sample Code
[9]. Lakshman Narayana Vejendla and Bharathi C [17]. R S M Lakshmi Patibandla, Santhi Sri Kurra
R,(2017),“Identity Based Cryptography for and N.Veeranjaneyulu, (2015), “A Study on
Mobile ad hoc Networks”, Journal of Real-Time Business Intelligence and Big
Theoretical and Applied Information Data”,Information Engineering, Vol.4,pp.1-6.
Technology, Vol.95, Issue.5, pp.1173-1181. [18]. K. Santhisri and P.R.S.M. Lakshmi,(2015), “
EID: 2-s2.0-85015373447 Comparative Study on Various Security
[10]. Lakshman Narayana Vejendla and A Peda Algorithms in Cloud Computing”, Recent
Gopi, (2017),” Visual cryptography for gray Trends in Programming Languages
scale images with enhanced security ,Vol.2,No.1,pp.1-6.
mechanisms”, Traitement du Signal,Vol.35, [19]. K.Santhi Sri and PRSM Lakshmi,(2017),
No.3-4,pp.197-208. DOI: 10.3166/ts.34.197- “DDoS Attacks, Detection Parameters and
208 Mitigation in Cloud Environment”,
[11]. A Peda Gopi and Lakshman Narayana IJMTST,Vol.3,No.1,pp.79-82.
Vejendla, (2017),” Protected strength approach [20]. P.R.S.M.Lakshmi,K.Santhi Sri and Dr.N.
for image steganography”, Traitement du Veeranjaneyulu,(2017), “A Study on
Signal, Vol.35, No.3-4,pp.175-181. DOI: Deployment of Web Applications Require
10.3166/TS.34.175-181 Strong Consistency using Multiple Clouds”,
[12]. Lakshman Narayana Vejendla and A Peda IJMTST,Vol.3,No.1,pp.14-17.
Gopi, (2020),” Design and Analysis of CMOS [21]. P.R.S.M.Lakshmi,K.Santhi Sri and
LNA with Extended Bandwidth For RF M.V.Bhujanga Ra0,(2017), “Workload
Applications”, Journal of Xi'an University of Management through Load Balancing
Architecture & Technology, Vol. 12, Issue. Algorithm in Scalable Cloud”,
3,pp.3759-3765. IJASTEMS,Vol.3,No.1,pp.239-242.
https://doi.org/10.37896/JXAT12.03/319. [22]. K.Santhi Sri, P.R.S.M.Lakshmi, and
[13]. Chaitanya, K., and S. M.V.Bhujanga Ra0,(2017), “A Study of
Venkateswarlu,(2016),"DETECTION OF Security and Privacy Attacks in Cloud
BLACKHOLE & GREYHOLE ATTACKS IN Computing Environment”,
MANETs BASED ON IJASTEMS,Vol.3,No.1,pp. 235-238.
ACKNOWLEDGEMENT BASED [23]. R S M Lakshmi Patibandla and N.
APPROACH." Journal of Theoretical and Veeranjaneyulu, (2018), “Explanatory &
Applied Information Technology 89.1: 228. Complex Analysis of Structured Data to
[14]. Patibandla R.S.M.L., Kurra S.S., Mundukur Enrich Data in Analytical Appliance”,
N.B. (2012), “A Study on Scalability of International Journal for Modern Trends in
Services and Privacy Issues in Cloud Science and Technology, Vol. 04, Special
Computing”. In: Ramanujam R., Issue 01, pp. 147-151.
Ramaswamy S. (eds) Distributed Computing [24]. R S M Lakshmi Patibandla, Santhi Sri Kurra,
and Internet Technology. ICDCIT 2012. Ande Prasad and N.Veeranjaneyulu, (2015),
Lecture Notes in Computer Science, vol “Unstructured Data: Qualitative Analysis”, J.
7154. Springer, Berlin, Heidelberg of Computation In Biosciences And
[15]. Patibandla R.S.M.L., Veeranjaneyulu N. Engineering, Vol. 2,No.3,pp.1-4.
(2018), “Survey on Clustering Algorithms [25]. R S M Lakshmi Patibandla, Santhi Sri Kurra
for Unstructured Data”. In: Bhateja V., and H.-J. Kim,(2014), “Electronic resource
Coello Coello C., Satapathy S., Pattnaik P. management using cloud computing for
(eds) Intelligent Engineering Informatics. libraries”, International Journal of Applied
Advances in Intelligent Systems and Engineering Research, Vol.9,pp. 18141-18147.
Computing, vol 695. Springer, Singapore [26]. Ms.R.S.M.Lakshmi Patibandla Dr.Ande
[16]. Patibandla, R.S.M.L., Veeranjaneyulu, N. Prasad and Mr.Y.R.P.Shankar,(2013),
(2018), “Performance Analysis of Partition “SECURE ZONE IN CLOUD”, International
and Evolutionary Clustering Methods on Journal of Advances in Computer Networks
Various Cluster Validation Criteria”, Arab J and its Security, Vol.3,No.2,pp.153-157.
Sci Eng ,Vol.43, pp.4379–4390.