Beruflich Dokumente
Kultur Dokumente
ON
MASTER OF ENGINEERING
(Computer Engineering)
BY
Exam No:11560
CERTIFICATE
Submitted by
NIVAS A. PATIL
Exam No:11560
is a bonafide work carried out under the supervision of Prof. Vanita Raut and it is submitted
towards the partial fulfillment of the requirement of Savitribai Phule Pune University, Pune
for the award of the degree of Master of Engineering (Computer Engineering).
External Examiner
(Name and Sign)
This is to certify that Mr. Nivas Patil has completed the dissertation work under my
guidance and supervision, and that I have verified the work for its originality in
documentation, problem statement, implementation, and results presented in the
dissertation. Any reproduction of other necessary work is with the prior permission
and has been given due ownership and has been included in the references.
Place: Wagholi,Pune.
Date:
Signature of Guide
I would take this opportunity to thank all those people who helped me in this dissertation
stage-II. First of all I am indebted to Prof. Vanita Raut who has guided me throughout the
preparation and presentation of this dissertation stage –II report and special thanks for her
unstained support throughout the completion of this dissertation stage-II report.
I would also like to acknowledge the whole faculty of Computer Department for their
encouragement, active involvement and continuous efforts in helping me from time to
time.
I am also very thankful to our principal sir, Dr. R. D. Kharadkar who has provided us such
facilities and training to ensure us a bright future.
RS - Recommender systems
NN- Nearest-Neighbor
MF- Matrix-Factorization
I
List of Figures
II
List of Tables
Social voting is an emerging new feature in online social networks. It poses unique challenges
and opportunities for recommendation. In this paper, we develop a set of matrix factorization
(MF) and nearest-neighbor (NN)-based recommender systems (RSs) that explore user social
network and group affiliation information for social voting recommendation. Through
experiments with real social voting traces, we demonstrate that social network and group
affiliation information can significantly improve the accuracy of popularity-based voting
recommendation, and social network information dominates group affiliation information in
NN-based approaches. We also observe that social and group information is much more
valuable to cold users than to heavy users. In our experiments, simple meta-path based NN
models outperform computation-intensive MF models in hot-voting recommendation, while
users’ interests for voting’s can be better mined by MF models. We further propose a hybrid
RS, bagging different single approaches to achieve the best top-k hit rate.
IV
CONTENTS
ABBREVIATIONS I
LIST OF FIGURES II
LIST OF TABLES III
ABSTRACT IV
1 INTRODUCTION 1
1.1 Basic Introduction 1
1.2 Background and Challenges 1
1.3 Motivation 2
1.4 Literature Survey 3
Public Auditing for Shared Data with Efficient User Revocation in
the Cloud 3
1.4.2 Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud
Storage 3
1.4.3 An Efficient Certificateless Encryption for Secure Data Sharing in
Public Clouds 4
1.4.4 Privacy Preserving Delegated Access Control in Public Clouds 4
1.4.5 A DFA-Based Functional Proxy Re-Encryption Scheme for Secure
Public Cloud Data Sharing 4
1.4.6 A Dynamic Secure Group Sharing Framework in Public Cloud Com-
puting 4
1.4.7 Public Integrity Auditing for Shared Dynamic Cloud Data with Group
User Revocation
5
1.4.8 Public Integrity Auditing for Dynamic Data Sharing With Multiuser
Modification 5
1.4.9 Privacy Preserving Ranked Multi-Keyword Search for Multiple Data
Owners in Cloud Computing . 5
1.4.10 Cost-Effective Authentic and Anonymous Data Sharing with For-
ward Security 6
2 PROBLEM DEFINITION AND SCOPE 7
2.1 Problem Definition 7
2.2 Objective and Goals 7
2.2.1 Objective 7
2.2.2 Goals 8
2.3 Statement of Scope 8
2.4 Technology and Associated Platform 9
2.4.1 Hardware Requirements 9
2.4.2 Software Requirements 9
3 DISSERTATION PLAN 10
3.1 Dissertation Plan 10
3.2 Implementation Plan 12
3.3 Implementation Details 13
3.4 Feasibility Study 13
3.5 Risk Analysis and Projection Table 14
3.6 Effort and Cost Estimation 15
3.6.1 Lines of Code (LOC) 15
3.6.2 Effort 15
3.6.3 Development Time 15
3.6.4 Number of People 15
4 SOFTWARE REQUIREMENT SPECIFICATIONS 16
4.1 Purpose 16
4.2 Design and Implementation Constraints 16
4.3 Assumptions and Dependencies 16
4.4 Usability 17
4.5 Interfaces 17
5 SYSTEM DESIGN AND IMPLEMENTATION 18
5.1 System Overview 18
5.2 System Architecture c c 18
5.3 Proposed System 21
5.4 Proposed Algorithm 22
5.4.1 Algorithms 22
5.5 UML DIAGRAM 24
5.5.1 Class Diagram 24
5.5.2 Component Diagram 25
5.5.3 Sequence Diagram 26
5.5.4 Deployment Diagram 27
5.6 Mathematical Module 28
6 TEST SPECIFICATION 29
6.1 Introduction 29
6.2 White Box Testing 30
6.3 Unit Testing 31
6.4 Unit testing limitations 32
6.5 Black Box Testing 33
6.5.1 Test design techniques 34
6.5.2 Acceptance Testing 34
6.5.3 Integration Testing 36
7 CONCLUSION 39
REFERENCES 41