You are on page 1of 7

International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248

Volume: 3 Issue: 12 332 – 338


_______________________________________________________________________________________________
Recommendation with User Trust and Item Rating

1 2
J.Anshiya, Mrs. T. R.Vithya,
M.Sc., M.Phil.,Department of Computer Science, M.Sc., M.Phil., Assistant Professor, Department of
Selvamm Arts and Science College (Autonomous) Computer Science, Selvamm Arts and Science College
Namakkal (Tk) (Dt) – 637003. (Autonomous) Namakkal (Tk) (Dt) – 637003

Abstract:- Recommender systems is becomes widespread and utilized in several fields for gathering the knowledge supported the user
necessities. It’s in the main wont to facilitate the user for accessing the method supported the relevant data. Several framework for
recommendation systems supported the various algorithms area unit revolve round the idea of accuracy solely however alternative necessary
feature like diversity of the recommendations area unit neglected. The main idea of these works is that not only incorporating demographic
information of users in profile matching process of CF-based algorithms is important weighting should be assigned to these features including
rating feature the motivation behind this idea is that “different users place different importance or priority on each feature of the user – profile.
For example if a male user prefers to be given recommendations based on the opinions of the other men then his feature weight for gender would
be higher than other features”. Here we apply improved invasive weed optimization (IIWO) algorithm for the same purpose with some little
changes in selecting the potential similar users as described in the previous sub section and in the evaluation criteria. After the optima weights
have been found the two profiles are compared according to equation based on the Euclidean distance of the two profiles.

__________________________________________________*****_________________________________________________
"data mining" was solely adscititious for selling reasons.
I. INTRODUCTION
Usually the additional general terms "(large scale)
1.1 BASICS OF DATA MINING information analysis", or "analytics" – or once concerning
Data mining (the analysis step of the "Knowledge actual strategies, computer science and machine learning are
Discovery in Databases" method, or KDD) Associate in additional acceptable.
Nursing knowledge base subfield of engineering science, is
The particular data processing task is that the
that the process method of discovering patterns in giant
automatic or semi-automatic analysis of huge quantities of
information sets involving strategies at the intersection of
knowledge to extract antecedent unknown fascinating
computer science, machine learning, statistics, and info
patterns like teams of knowledge records (cluster analysis),
systems. The goal of the info} mining method is to extract
uncommon records (anomaly detection) and dependencies
information from an information set and rework it into an
(association rule mining). This sometimes involves
obvious structure for any use. Apart from the raw analysis
victimisation info techniques like abstraction indices. These
step, it involves info and information management facet
patterns will then be seen as a form of outline of the
information pre-processing, model Associate in Nursing
computer file, and should be employed in any analysis or,
logical thinking issues, power metrics, quality issues, post-
for instance, in machine learning and prognosticative
processing of discovered structures, visualisation, and on-
analytics.
line change.
For example, the data mining step might identify
The term may be a name, as a result of the goal is multiple groups in the data, which can then be used to obtain
that the extraction of patterns and information from great more accurate prediction results by adecision support
deal of knowledge, not the extraction of knowledge itself It system. Neither the data collection, data preparation, nor
is also a bunk, and is usually additionally applied to any result interpretation and reporting are part of the data mining
variety of large-scale information or science (collection, step, but do belong to the overall KDD process as additional
extraction, storage, analysis, and statistics) yet as any steps. The related terms data dredging, data fishing, and data
application of laptop call web, together with computer snooping refer to the use of data mining methods to sample
science, machine learning, and business intelligence. the parts of a larger population data set that are (or may be) too
favoured book "Data mining: sensible machine learning small for reliable statistical inferences to be made about the
tools and techniques with Java" (which covers largely validity of any patterns discovered. These methods can,
machine learning material) was originally to be named however, be used in creating new hypotheses to test against
simply "Practical machine learning", and therefore the term the larger data population

332
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 332 – 338
_______________________________________________________________________________________________
Generally, data mining (sometimes called data or factors like economic indicators, competition, and client
knowledge discovery) is the process of analyzing data from demographics. And, it allows them to see the impact on
different perspectives and summarizing it into useful sales, client satisfaction, and company profits. Finally, it
information - information that can be used to increase allows them to "drill down" into outline info to look at detail
revenue, cuts costs, or both. Data mining software is one of transactional knowledge. With data processing, a distributor
a number of analytical tools for analyzing data. It allows might use location records of client purchases to send
users to analyze data from many different dimensions or targeted promotions supported a human purchase history. By
angles, categorize it, and summarize the relationships mining demographic knowledge from comment or assurance
identified. Technically, data mining is the process of finding cards, the distributor might develop product and promotions.
correlations or patterns among dozens of fields in large
relational databases. Information is we collecting:

Data are any facts, numbers, or text that can be We have been grouping a myriad of knowledge,
processed by a computer. Today, organizations are from easy numerical measurements and text documents, to
accumulating vast and growing amounts of data in different a lot of complicated info like spacial knowledge,
formats and different databases. This includes: transmission channels, and machine-readable text
 Operational or transactional data such as, sales, documents. Here may be a non-exclusive list of a range of
cost, inventory, payroll, and accounting knowledge collected in digital type in databases and in flat
 Nonoperational data, such as industry sales, files.
forecast data, and macro economic data
 Meta data - data about the data itself, such as The abundance of data, coupled with the need for
logical database design or data dictionary powerful data analysis tools, has been described as a data
definitions rich but information poor" situation. The fast-growing,
The patterns, associations, or relationships among tremendous amount of data, collected and stored in large
all this data can provide information. For example, analysis and numerous databases, has far exceeded our human
of retail point of sale transaction data can yield information ability for comprehension without powerful tools (Figure
on which products are selling and when. 1.2). As a result, data collected in large databases become
\data tombs" | data archives that are seldom revisited.
Consequently, important decisions are often made based
not on the information-rich data stored in databases but
rather on a decision maker's intuition, simply because the
decision maker does not have the tools to extract the
valuable knowledge embedded in the vast amounts of data.
In addition, consider current expert system technologies,
which typically rely on users or domain experts to manual
ly input knowledge into knowledge bases. Unfortunately,
this procedure is prone to biases and errors, and is
extremely time-consuming and costly. Data mining tools
which perform data analysis may uncover important data
Figure: data mining process patterns, contributing greatly to business strategies,
knowledge bases, and scientific and medical research. The
Information will be born-again into information
widening gap between data and information calls for a
concerning historical patterns and future trends. as an
systematic development of data mining tools which will
example, outline info on retail grocery sales will be analyzed
turn data tombs into \golden nuggets" of knowledge.
in lightweight of promotional efforts to supply information
of client shopping for behaviour. Thus, a manufacturer or Business dealings:
distributor might verify that things area unit most liable to
promotional efforts. Each transaction within the business is (often)
"memorized" for permanency. Such transactions square
Data processing is primarily used nowadays by measure typically time connected and may be inter-
firms with a robust client focus - retail, financial, business deals like purchases, exchanges, banking, stock,
communication, and selling organizations. It allows these etc., or intra-business operations like management of in-
firms to see relationships among "internal" factors like house wares and assets. Massive shops, for instance,
value, product positioning, or workers skills, and "external"
333
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 332 – 338
_______________________________________________________________________________________________
because of the widespread use of bar codes, store countless each second than what all NASA researchers and engineers
transactions daily representing typically terabytes of will address. Several satellite photos and knowledge square
knowledge. Cupboard space isn't the most important measure created public as presently as they're received
drawback, because the value of onerous disks is ceaselessly within the hopes that different researchers will analyze
dropping, however the effective use of the info in a very them.
affordable time-frame for competitive decision-making is
certainly the foremost vital drawback to resolve for Games:
businesses that struggle to survive in a very extremely
competitive world. Our society is aggregation an amazing quantity of
information and statistics regarding games, players and
Scientific data: athletes. From hockey scores, basketball passes and car-
racing lapses, to swimming times, boxes pushes and chess
Whether or not in a very Swiss nuclear accelerator positions, all the info square measure hold on.
laboratory investigation particles, within the Canadian Commentators and journalists square measure exploitation
forest learning readings from a brown bear radio collar, on this data for coverage, however trainers and athletes would
a South Pole iceberg gathering knowledge concerning wish to take advantage of this information to enhance
oceanic activity, or in associate degree yankee university performance and higher perceive opponents.
work human science, our society is amassing prodigious
amounts of scientific knowledge that require to be Digital media:
analyzed. Sadly, we are able to capture and store a lot of
new knowledge quicker than we are able to analyze the The proliferation of low cost scanners, desktop
previous knowledge already accumulated. video cameras and digital cameras is one among the causes
of the explosion in digital media repositories. Additionally,
Medical and private data: several radio stations, tv channels and film studios square
measure digitizing their audio and video collections to
From government census to personnel and client enhance the management of their transmission assets.
files, terribly massive collections of knowledge square Associations like the NHL and also the NBA have already
measure ceaselessly gathered concerning people and teams. started changing their Brobdingnagian game assortment into
Governments, corporations and organizations like digital forms.
hospitals, square measure reposition vital quantities of non-
public knowledge to assist them manage human resources, CAD and software package engineering data:
higher perceive a market, or just assist patronage. no matter
the privacy problems this kind of knowledge typically There square measure a large number of pc motor-
reveals, this info is collected, used and even shared. once assisted style (CAD) systems for architects to style buildings
related to with different knowledge this info will shed or engineers to conceive system elements or circuits. These
lightweight on client behaviour and also the like. systems square measure generating an amazing quantity of
information. Moreover, software package engineering may
Surveillance video and pictures: be a supply of respectable similar information with code,
operate libraries, objects, etc., which require powerful tools
With the superb collapse of video camera costs, for management and maintenance.
video cameras have become present. Video tapes from
police investigation cameras square measure typically Virtual Worlds:
recycled and so the content is lost. However, there's an
inclination these days to store the tapes and even modify There square measure several applications creating
them for future use and analysis. use of three-dimensional virtual areas. These areas and also
the objects they contain square measure represented with
Satellite sensing: special languages like VRML. Ideally, these virtual areas
square measure represented in such the simplest way that
there's a multitudinous variety of satellites round they'll share objects and places. There's a motivating
the globe: some square measure geo-stationary on top of a quantity of computer game object and house repositories
neighbourhood, and a few square measure orbiting round accessible. Management of those repositories in addition as
the Earth, however all square measure causation a non-stop content-based search and retrieval from these repositories
stream of knowledge to the surface. NASA, that controls an square measure still analysis problems, whereas the scale of
oversized variety of satellites, receives a lot of knowledge the collections continues to grow.
334
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 332 – 338
_______________________________________________________________________________________________
Text reports and memos (e-mail messages): Databases method contains of many steps leading from data
collections to some variety of new data. The unvaried
Most of the communications inside and between method consists of the subsequent steps:
corporations or analysis organizations or maybe personal Data cleaning: conjointly called information
folks, square measure supported reports and memos in cleansing, it's a innovate that noise information and
matter forms typically changed by e-mail. These messages immaterial information are far from the gathering.
square measure frequently hold on in digital kind for future Data integration: at this stage, multiple
use and reference making formidable digital libraries. information sources, typically heterogeneous, is also
combined during a common supply.
The World Wide net repositories: Data selection: at this step, the info relevant to the
analysis is set on and retrieved from the info assortment.
Since the origin of the globe Wide net in 1993, Data transformation: conjointly called
documents of all styles of formats, content and outline are information consolidation, it's a innovate that the chosen
collected and inter-connected with hyperlinks creating it the information is reworked into forms applicable for the mining
most important repository of information ever engineered. procedure.
Despite its dynamic and unstructured nature, its Data mining: it's the crucial step within which
heterogeneous characteristic, and its fairly often redundancy clever techniques are applied to extract patterns doubtless
and inconsistency, the globe Wide net is that the most helpful.
significant information assortment frequently used for Pattern evaluation: during this step, strictly
reference as a result of the broad kind of topics lined and fascinating patterns representing data are known supported
also the infinite contributions of resources and publishers. given measures.
Several believe that the globe wide net can become the Knowledge representation: is that the final
compilation of human data. innovate that the discovered data is visually diagrammatical
to the user. This essential step uses visual image techniques
What are Data Mining and Knowledge Discovery? to assist users perceive and interpret the info mining results.
It is common to mix a number of these steps along. as an
With the big quantity of knowledge keep in files,
example, information cleanup and information integration
databases, and different repositories, it's progressively
will be performed along as a pre-processing section to get a
necessary, if not necessary, to develop powerful means that
knowledge warehouse. Information choice and information
for analysis and maybe interpretation of such knowledge and
transformation may also be combined wherever the
for the extraction of fascinating information that might
consolidation of the info is that the results of the choice or,
facilitate in decision-making.
as for the case of information warehouses, the choice is
completed on reworked information.
II. EXISTING SYSTEM
Lifetime improvement has continually been a vital
issue as most of the wireless sensing element networks
(WSNs) operate in unattended atmosphere wherever human
access and observance square measure much impracticable.
Cluster is one amongst the foremost powerful techniques
which will prepare the system operation in associated
manner to attend the network quantifiability, minimize
energy consumption, and win prolonged network period of
time. to beat this issue, current researchers have triggered
the proposition of the many varied cluster algorithms.
Fig Knowledge Discovery
However, most of the projected algorithms overburden the
Data Mining, conjointly popularly called data cluster head (CH) throughout cluster formation. to beat this
Discovery in Databases (KDD), refers to the nontrivial drawback, several researchers have return up with the
extraction of implicit, antecedent unknown and doubtless thought of symbolic logic (FL), that is applied in WSN for
helpful data from information in databases. Whereas data deciding. These algorithms target the potency of CH that
processing and data discovery in databases (or KDD) are might be adoptive, flexible, and intelligent enough to
oftentimes treated as synonyms, data {processing} is really a distribute the load among the sensing element nodes which
part of the data discovery process.The data Discovery in will enhance the network period of time. However sadly,

335
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 332 – 338
_______________________________________________________________________________________________
most of the algorithms use type-1 Florida (T1FL) model. 2. Title: A Simple But Effective Method To Incorporate
During this paper, we tend to propose a cluster rule on the Trusted Neighbours In Recommender Systems
premise of interval type-2 Florida model, expecting to Year: 2003
handle unsure level call higher than T1FL model. Author: GuibingGuo, Jie Zhang, and Daniel Thalmann
Disadvantages Providing top quality recommendations is very
 There isn't any guarantee to the information life important for on-line systems to help users World Health
time. Organization face a massive variety of decisions in creating
 it consume the additional energy. effective choice selections. Cooperative filtering may be a
 Less economical ,slow performance. wide accepted technique to produce recommendations
supported ratings of comparable users. However it suffers
from many problems like information scantiness and cold
III. PROPOSED SYSTEM
begin. to deal with these problems, during this paper, we
 One of the vital issues for wireless sensing element
tend to propose an easy however effective technique,
networks is increasing the network time period.
particularly “Merge”, to include social trust data (i.e.
 Bunch is associate economical technique for prolonging
trustworthy neighbors expressly specified by users) in
the time period of wireless sensing element networks.
providing recommendations. Additional specifically, ratings
 This thesis propose a multihop bunch formula (MHC)
of a user’s trustworthy neighbor’s square measure
for energy saving in wireless sensingelement networks.
incorporate to represent the preference of the user and to
Advantages
find similar alternative users for generating
 The MHC protocol increase the life time of the
recommendations. Experimental results supported 3 real
information
information sets demonstrate that our technique is additional
 It isn't consume the a lot of energy.
effective than alternative approaches, each in accuracy and
 More economical and quick performance.
coverage of recommendations.
METHODOLOGIES V. RESEARCHMETHODOLOGY
 Networking Module. HYBRID GENETIC INVASIVE WEED
 Transmission State OPTIMIZATION (IWO)
 Packet Division Module. Recommender systems have become more and
 Clustering Phase more necessary to individual users and businesses for
 Energy Efficient Balancing Module. providing personalised recommendations. However,
whereas the bulk of algorithms planned in recommender
systems literature have targeted on up recommendation
IV. LITERATURE SURVEY
accuracy (as exemplified by the recent Netflix Prize
1. Title: Toward the Next Generation of Recommender
competition), another necessary side of advice quality, just
Systems: A Survey of The State-Of-The-Art And
like the vary of recommendations, have usually been
Possible Extensions
unmarked. During this paper, we’ve got a bent to introduce
Year: 2005
and explore variety of item ranking techniques which will
Author: G. Adomavicius and A. Tuzhilin
This thesis presents an outline of the sector of generate well additional numerous recommendations across
recommender systems and describes this generation of all users whereas maintaining comparable levels of advice
accuracy. Comprehensive empirical analysis consistently
advice strategies that area unit sometimes classified into the
shows the vary gains of the planned techniques exploitation
subsequent 3 main categories: content-based, cooperative,
and hybrid recommendation approaches. This paper many real- world rating information sets and totally different
additionally describes varied limitations of current rating prediction algorithms.
recommendation strategies and discusses potential METHODS
extensions which will improve recommendation capabilities REVIEWS EXTRACTION AND PREPROCESSING
and create recommender systems applicable to an excellent
Before the merchandise side Identification task
broader vary of applications. These extensions embrace,
there’s a awfully vital task known as knowledge
among others, Associate in nursing improvement of
preprocessing. Compared to regular text document the
understanding of users and things, incorporation of the
reviews are typically less formal and written in an
discourse data into the advice method, support for multi
advertisement hoc manner. If the sentiment analysis applied
criteria ratings, and a provision of additional versatile and
on raw review typically succeed terribly poor performance
fewer intrusive sorts of recommendations
in most case. Thus the preprocessing techniques on reviews

336
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 332 – 338
_______________________________________________________________________________________________
are necessary for getting satisfactory result on sentiment boost recommendation diversity is additionally strong with
analysis. There are numerous knowledge preprocessing regard to the “highly predicted” rating threshold worth.
ways are on the market.
1) Stemming: In stemming we’ll take away the In explicit, with a distinct threshold, the baseline
ending from every word like ignition etc. Eg. Running can recommendation accuracy and variety of the quality ranking
become run when stemming. approach are often terribly totally different, and the no. Of
actual recommendations that square measure created by the
2) In tokenization we’ll tokenize every sentence by system (i.e., just in case there’s a restricted range of things
house. Means that we’ll take away the areas. Additionally that square measure expected above the minimum threshold)
we are able to take away feeling icons like smiles. Stop would possibly modification. However, over again we’ve
word removation sort of a, an, the etc. got to watch identical consistent ability of the planned
POSTING THE OPINION ranking approaches to realize substantial diversity gains
In this module, we tend to get the opinions from with solely a little accuracy loss. Additionally note that
varied individuals concerning business, e-commerce and there’s AN implicit natural assumption of recommender
product through on-line. The opinions could also be of 2 systems property that’s related to some ranking approaches,
sorts. Direct opinion and comparative opinion. Direct i.e., the belief that recommender systems can use some
opinion is to post a comment concerning the parts and moderately high worth of threshold worth that well narrows
attributes of product directly. Comparative opinion is to post the set of potential recommendations to solely the relevant
a comment supported comparison of 2 or a lot of product. things for every user. If recommender systems aren’t
The comments could also be positive or negative. selective (i.e., if a large range of things square measure
IMPLEMENTATION AND RESULTS thought-about relevant to every user), then planned ranking
PERFORMANCE AND EVALUATION approach (such as supported reverse expected rating value)
In this section, we’ve got a bent to gift robustness would retain higher ability to produce a lot of combination
analysis of the planned techniques with regard to many diversity in recommendations than non personalised re-
parameters: range of neighbours employed in heuristic- ranking approaches (such as supported item popularity).
based CF, range of options employed in matrix resolving
CF, range of top-N recommendations provided to every
user, the worth of expected rating threshold, and therefore
the level of knowledge exiguity. We tend to tested the
heuristic-based technique with a distinct range of neighbours
(15, 20, 30, and fifty neighbours) and therefore the model-
based technique with a distinct range of options ( ).The
totally different parameter values might lead to slightly
different performance (as is documented in recommender
systems literature), the fundamental behaviour of the
planned techniques remains strong. In another words,
exploitation the advice ranking techniques with any of the
parameter values, it’s potential to induce substantial
diversity enhancements with solely a little accuracy loss. We
tend to additionally vary the amount of top-N Fig Proportion of long-tail items among recommended
recommendations provided by the system. items.

Note that, wherever it’s intuitively clear that top-1, VI. CONCLUSION
top-5, and top-10 recommendations will give totally The user needs square measure most vital think
different accuracy and variety levels (i.e., it’s heap of easier about the event of the business. Several ways square
to accurately advocate one relevant item than relevant 10 measure wont to satisfying the user needs. Recommender
things, and it’s heap of easier to possess a lot of combination system is one in every of the vital ways in satisfying the user
diversity once you will give a lot of recommendations), over needs and plenty of algorithms square measure planned for
again we’ve got to watch that, with any range of top-N up the advice quality. The item primarily based ranking
recommendations, the planned techniques exhibit sturdy and technique is additionally one in every of the prevailing
consistent behaviour, i.e., they allow to get substantial ways. Though the item primarily based ranking
diversity gains at a little accuracy loss. Additionally, our methodology improves the standard, the obtained ends up in
finding that the planned ranking approaches facilitate to the recommender system don’t seem to be economical one.

337
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________
International Journal on Future Revolution in Computer Science & Communication Engineering ISSN: 2454-4248
Volume: 3 Issue: 12 332 – 338
_______________________________________________________________________________________________
During this paper planned rule is that the combination of
improvement rule and novel ranking technique. The planned
rule during this paper is concentrated on the bound options
of the recommender systems like accuracy and variety of the
recommendations. The important world datasets is
employed for the simulation of the planned recommender
system and it’s compared with the prevailing system.

FUTUREWORK
There area unit many attainable future extensions
to our work. In TyCo, we tend to don’t specify the way to
cluster resources therefore on determine item teams and also
the corresponding user teams. One attainable future work is
to undertake completely different cluster strategies and see
however the advice results area unit affected. The way to
victimization parallel computing strategies (e.g., Map
Reduce) to handle the massive scale applications is
additionally one amongst the attainable future works.

REFERENCES
[1] G. Adomavicius and A. Tuzhilin, “Toward consequent
generation of recommender systems: A survey of the
progressive and attainable extensions,” IEEE
Transactions on data and knowledge Engineering
(TKDE), vol. 17, no. 6, pp. 734–749, 2005.
[2] GuibingGuo ?, Jie Zhang, and Daniel Thalmann “A
Simple but Effective Method to IncorporateTrusted
Neighbors in Recommender Systems” School of
Computer EngineeringNanyang Technological
University, Singapore, 2003.
[3] H. Ma, H. Yang, M. Lyu, and I. King, “Social
Recommendation Using Probabilistic Matrix
Factorization” in Proceedings of the thirty first
International ACM SIGIR Conference on analysis and
Development in data Retrieval (SIGIR), 2008, pp. 931–
940.
[4] H. Ma, D. Zhou, C. Liu, M. Lyu, and I. King,
“Recommender systems with social regularization,” in
Proceedings of the fourth ACM International Conference
on internet Search and data processing (WSDM), 2011,
pp. 287–296.
[5] Mohsen Jamali and Martin Ester “A Matrix Factorization
Technique with Trust Propagation for Recommendation
in Social Networks” RecSys2010, September 26–30,
2010, Barcelona, Spain.
[6] B. Yang, Y. Lei, D. Liu, and J. Liu, “Social cooperative
filtering by trust,” in Proceedings of the twenty third
International Joint Conference on Artificial Intelligence
(IJCAI), 2013, pp. 2747–2753.

338
IJFRCSCE | December 2017, Available @ http://www.ijfrcsce.org
_______________________________________________________________________________________

You might also like