You are on page 1of 17

The Design and Implementation of Feature-Grading

Recommendation System for E-Commerce











Abstract
we present a novel approach named Feature-Grading which is a comprehensive algorithm used
to make recommendation of commodities in e-commerce business. It is a technique based on the
integration of feature mining, sentimental analysis, and the records of customer historical
behaviors. The overall process of Feature-Grading can be separated into 5 key steps: 1.Extracting
overall feature set of a group category of commodities; 2.Extracting modifier set and negative
words set; 3.Acquiring specific feature set and feature assessment set; 4.Acquiring specific
feature weight set; 5.Acquiring item weight set. After these 5 steps, we are able to grade and rank
all the items with an acquired grading equation. Then the needed as well as top ranking items can
be recommended. Moreover, we utilize the real information of mobiles and their reviews from
the famous e-commerce website Amazon.cn as our experimental data and discuss some
important results which reveal that the Feature-Grading really works well. At last, we also briefly
introduce the prototype recommendation system we developed on the basis of Feature-Grading.











Introduction
the e-commerce, there are two major approaches for customers to meet items face-to-face. One is
called Customer-active which is achieved by customers themselves through some search
engines. The other way is accomplished by merchants with a kind of recommendation system to
recommend commodities. We call it Items-active. For Customer-active, what a customer
enters in search engines reveals what he/she wants. Existing search engines for commodities
utilizes the similar techniques as those for normal web pages which is based on key-words
matching, meaning that items saved in the database should be tagged with enough key words.
Most of such key words, however, are manually appended by merchants. This mechanism is very
low-efficient. It is easy to neglect some vital features as well. If there is a system which can
automatically mine out the key features, (i.e. the key words), of a group category of items, then it
is possible to complete the marking process with less manual operation so as to improve
comprehensive efficiency. This should be our first mission, since the mining of features not only
benefits the existing Customer-active searching approaches, but also acts as the fundamental of
our proposed recommendation algorithm.








Aims and objectives:
Feature-Grading Recommendation System for E-Commerce In this system these
algorithms is that the challenges of providing recommendation in the domains where no
sufficient historical data exist for measuring similarity between products or users. We present
feature-based recommendation algorithms that overcome the limitations of the existing top-N
recommendation algorithms. The experimental evaluation of the proposed algorithms in the real
life data sets shows a great promise. The pilot project deploying the proposed feature-based
recommendation algorithms in the on-line retail web site shows 75% increase inthe
recommendation revenue .
SQL Injection
This approach is used for preventing the SQL Injection attack.

The new approach is made for SQLIA To track the SQL injection is based on signature
based method includes 3 modules to address security problem related to input validation.
SQL injection is an injection attack that exploits security vulnerability occurring in the database
layer of an application.
The objectives of the project are enhancing data mine capability of the audit module to analyze
user access and operation mode, optimizing every program module and guarding against
database intrusion operation for ensuring web database security operation.
Some sql Injection for examplesThe standard sql query format is:
Select * from table where UserName=ram and Password=ravi;
Malicious user inject the following sql injection in this field as
UserName: ram
Password : anything or 1=1
Select * from table where UserName=ram and Password=anything or 1=1;

Literature survey
The explosive growth of the world-wide-web and the emergence of e-commerce has led to the
development of recommender systems . Recommender systems are personalized information
filtering technology used to either predict whether a particular user will like a particular item
(prediction problem) or to identify a set of N items that will be of interest to a certain user (top-N
recommendation problem). In recent years, recommender systems have been used in a number of
different applications such as recommending products a customer will most likely buy; movies,
TV programs, or music a user will find enjoyable; identifying web-pages that will be of interest;
or even suggesting alternate ways of searching for information. An excellent survey of different
recommender systems for various applications can be found in Over the years, various
approaches for building recommender systems have been developed that utilize either
demographic, content, or historical information . Among them, collaborative filtering (CF),
which relies on historical information, is probably the most successful and widely used technique
for building recommender systems. The first system to generate automated recommendations
was the GroupLens system it pro- vided users with personalized recommendations on Usenet
postings. The recommendations for each individual were obtained by identifying a neighborhood
of similar users and recommending the articles that this group of users found useful. Two
approaches have been developed for building CF-based top-N recommender systems. The first
approach, referred to as user-based , relies on the fact that each person belongs in a larger group
of similarly-behaving individuals. As a result, items (e.g., products, movies, books, etc.)
frequently purchased/liked by the various members of the group can be used to form the basis of
the recommended items. The second approach, known as model-based analyzes the historical
information to identify relations between the different items such that the purchase of an item (or
a set of items) often leads to the purchase of another item (or a set of items),and then use these
relations to determine the recommended items.






















Problem statement
The explosive growth of the world-wide-web and the emergence of e-commerce has led to the
development of recommender systems [16]. Recommender systems are personalized information
filtering technology used to either predict whether a particular user will like a particular item
(prediction problem) or to identify a set of N items that will be of interest to a certain user (top-N
recommendation problem).

















Project Requirements
R Re es so ou ur rc ce es s ( (H Ha ar rd dw wa ar re e & & S So of ft tw wa ar re e U Us se ed d) )


Hard ware Specification:

Processor : Intel P-4 or Higher.

Processor Speed : 250 MHz to 833MHz.

RAM : 256MB.or above.

Hard Disk : 2GB to 30GB.

Key Board : 104 keys. or other








Software Specification:

Operating System : Windows 98/XP/vista /seven.

Database : Microsoft Sql Server2005 .

Language : ASP.NET/C#
































Feature Grading Algorithm


































Extract overall of
class
Extracting
negative word
set
Specific feature
set and feature
assessment
Acquiring specific
Feature Weight
set
Acquiring item
weight set
Recommendation


DFD 1.0
































Customer Feature
Set
Feature-
Grading
Recommendation


DFD 1.1
























Customer
Feedback
System
1.0
Customer Feature
Set

Customer Feature
Set

System
2.0
Find negative
Word set
System
3.0
Recommendation


Use Case Diagram:





















Customer Feedback

Customer Feature Set

Find negative Word set

Recommendation

Acquiring Weigh Set

Activity Diagram :





















Customer Feedback

Customer Feature Set

Find negative Word set

Recommendation

Acquiring Weigh Set

Conclusion
a recommendation algorithm called Feature-Grading and further introduced its corresponding
prototype system. We mainly focused on the design of 5 process of this algorithm and also
discussed some key results after experiments. These results revealed that the Feature-Grading
method works very well. It overcome some drawbacks of existing recommendation systems and
extended their ability as well. Our future efforts will be spent on the improvements of
sentimental analysis of reviews. We plan to expand the handle range from simple sentence to
compound sentence, including transitional sentence, comparative sentence, and imperative
sentence and so on.















REFERENCES

1. C. Anley. Advanced SQL Injection In SQL Server Applications. White paper, Next
Generation Security Software Ltd., 2002.

2. S. W. Boyd and A. D. Keromytis. SQLrand: Preventing SQL Injection Attacks. In Proc.
of the 2nd Applied Cryptography and Network Security Conf. (ACNS 04), pages 292
302, Jun. 2004.

3. G. T. Buehrer, B. W. Weide, and P. A. G. Sivilotti. Using Parse Tree Validation to
Prevent SQL Injection Attacks. In Proc. of the 5th Intl. Workshop on Software
Engineering and Middleware (SEM 05), pages 106113, Sep. 2005.

4. W. R. Cook and S. Rai. Safe Query Objects: Statically Typed Objects as Remotely
Executable Queries. In Proc. of the 27th Intl. Conference on Software Engineering (ICSE
2005), pages 97106, May 2005.

5. T. O. Foundation. Top ten most critical web application vulnerabilities, 2005. http:
//www.owasp.org/documentation/topten.html.

6. C. Gould, Z. Su, and P. Devanbu. JDBC Checker: A Static Analysis Tool for SQL/JDBC
Applications. In Proc. of the 26th Intl. Conference on Software Engineering (ICSE 04)
Formal Demos, pages 697698, May 2004.

7. V. Haldar, D. Chandra, and M. Franz. Dynamic Taint Propagation for Java. In Proc. of
the 21st Annual Computer Security Applications Conference, pages 303311, Dec. 2005.

8. W. G. Halfond and A. Orso. AMNESIA: Analysis and Monitoring for NEutralizing SQL-
Injection Attacks. In Proc. of the IEEE and ACM Intl. Conference on Automated
Software Engineering (ASE 2005), pages 174183, Long Beach, CA, USA, Nov. 2005.

9. W. G. Halfond, J. Viegas, and A. Orso. A Classification of SQL-Injection Attacks and
Countermeasures. In Proc. of the Intl. Symposium on Secure Software Engineering, Mar.
2006.

10. M. Howard and D. LeBlanc. Writing Secure Code. Microsoft Press, Redmond,
Washington, Second Edition, 2003.


11.P. Resnick, N. Iacovous, M. Suchak, P. Bergstrom, and J. Riedl, GroupLens: An Open
Architecture for Collaborative Filtering of
Netnews, In Proceedings of CSCW94, Chapel Hill, NC.
[12] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl., Analysis of Recommendation Algorithms
for E-Commerce, In Proceedings of
ACM E-Commerce, 2000.
[3] W. Hill, L. Stead, M. Rosenstein, and G. Furnas, Recommending and Evaluating Choices in
a Virtual Community of Use, In Proceedings of CHI95.




14.2. WEBSITES

www.Google.com

www.wikepadia.com

You might also like