Académique Documents
Professionnel Documents
Culture Documents
1. INTRODUCTION
In recent years, online social networks (OSNs) have been massively growing, where users
can share and consume all kinds of multimedia contents. As a result, given the numerous
different genres of videos in social media, how to discover the videos of personal interest
and recommend them to individual users are of great significance. Recommendation is
foreseen to be one of the most important services that can provide such personalized
multimedia contents to users. There are several successful video recommendation
algorithms and systems that have been developed and exploited. For example, Google has
adopted content-based filtering (CB) recommender system in its AdWords services. The
Google search engine returns search results with keyword related advertisements.
However, those advertisements are always neglected by end users. This is mainly because
of the biased decisions of users’ favorite content. Unfortunately, Google AdWords had
been removed from the right side of the page. Amazon and Taobao have achieved great
success in recent years.
1.1. Objectives
With the accurate classification rules, the context details are not necessary to compute,
and the huge network overhead is reduced. Moreover, user contexts, user relationships,
and user profiles are collected from video-sharing websites to generate multimedia
recommendation rules based on the Hadoop platform.
When a new user request arrives, the rules will be extended and optimized to make real-
time recommendation. The results show that the proposed approach can recommend
desired services with high precision, high recall, and low response delay.
1
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Noise and inconsistencies inherent to the data, and illustrates the difficulty of the
task.
That the proposed approach can recommend desired services with high precision,
high recall, and low response delay
Howe ver, these recommendations are not accurate and are always not consistent with
the end users’ interests. To improve this, some websites also provide users with search
engine to search their desired videos quickly. However, searching is based on the
keywords. Online Trading is being hosted on Stand Alone Server.
That the proposed approach can recommend desired services with high precision, high
recall, and low response delay. User clusters are collected instead of detailed user
profiles. To avoid the explosion of network overhead, user-behavior-based clustering is
performed first, and the collectors calculate user clusters according to the clustering rules
and then report the user cluster to the recommender only.
Machine learning approach that explores the characteristics of pre classified users.
3
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
3. Literature Survey
Abstract
From social media has emerged continuous needs for automatic travel
recommendations. Collaborative filtering (CF) is the most well-known approach.
However, existing approaches generally suffer from various weaknesses. For
example , sparsity can significantly degrade the performance of traditional CF. If a
user only visits very few locations, accurate similar user identification becomes very
challenging due to lack of sufficient information for effective inference. Moreover,
existing recommendation approaches often ignore rich user information like textual
descriptions of photos which can reflect users' travel preferences. The topic model
(TM) method is an effective way to solve the “sparsity problem,” but is still far from
satisfactory. In this paper, an author topic model-based collaborative filtering
(ATCF) method is proposed to facilitate comprehensive points of interest (POIs)
recommendations for social users. In our approach, user preference topics, such as
cultural, cityscape, or landmark, are extracted from the geo-tag constrained textual
description of photos via the author topic model instead of only from the geo-tags
(GPS locations). Advantages and superior performance of our approach are
demonstrated by extensive experiments on a large collection of data.
Abstract:
4
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Abstract
Recommender systems have received considerable attention in recent years. Yet with
the development of information technology and social media, the risk in revealing
private data to service providers has been a growing concern to more and more users.
Trade-offs between quality and privacy in recommender systems naturally arise. In
this paper, we present a privacy preserving recommendation framework based on
groups. The main idea is to use groups as a natural middleware to preserve users’
privacy. A distributed preference exchange algorithm is proposed to ensure the
anonymity of data, wherein the effective size of the anonymity set asymptotically
approaches the group size with time. We construct a hybrid collaborative filtering
model based on Markov random walks to provide recommendations and predictions
to group members. Experimental results on the Movie Lens dataset show that our
proposed methods outperform the baseline methods, L+ and Item Rank, two state-of-
the-art personalized recommendation algorithms, for both recommendation precision
and hit rate despite the absence of personal preference information.
4) Title: Differentially private recommender systems- building privacy into the net
Abstract
5
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
these recommendations are associated with privacy risks. The main contribution of this
6
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
links in the social graph. More precisely, we quantify the loss in utility when existing
differential privacy.
7
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
8
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
System Architecture:
9
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
2. What can I do now? – The interface should always help the user understand hiscurrent
options- what functions are available, what links are live, what content is relevant.
3. Where have I been; where am I going? – The interface must facilitate navigation.Hence
it must provide a “map” of where the user has been and what paths may be taken to move
elsewhere in the WebApp.
4.3.2 Design goals – the following are the design goals that are applicable to virtually
every WebApp regardless of application domain, size, or complexity.
1. Simplicity
2. Consistency
3. Identity
10
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
System analysis and design are the application of the system approach to problem solving
generally using computers. To reconstruct a system the analyst must consider its elements
output and inputs, processors, controls feedback and environment.
Feasibility is the determination of whether or not a project is worth doing. The process
followed in making this determination is called feasibility Study. In the conduct of the
feasibility study, the analyst will usually consider seven distinct, but inter-related types of
feasibility.
This is considered with specifying equipment and software that will successful satisfy the
user requirement the technical needs of the system may vary considerably but might
include
11
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Economic analysis is the most frequently used technique for evaluating the effectiveness
of a proposed system. More commonly known as cost / benefit analysis. The procedure is
to determine the benefits and savings are expected form a proposed system and a compare
them with costs. It benefits outweigh costs; a decision is taken to design and implement
the system will have to be made if it is to have a chance of being approved. There is an
ongoing effort that improves in accuracy at each phase of the system life cycle.
It is mainly related to human organization and political aspects. These points are
considered are
Identify realistic, measurable target values for each service level. These include
service hours, service availability, responsiveness, throughput and reliability. Security
includes defining priority and frequency of backup of data, recovery, fall back and
contingency planning and access restrictions. Access restrictions should deal with what
data needs protected; what data should be restricted to a particular user role; and level of
restriction required, e.g. physical, password, view only. Non-functional requirements may
cover the system as a whole or relate to specific functional requirements.
Availability : The system has to be available anywhere and anytime whenever the user
requires the use of the system. Here we consider the issue of the service level agreement
with various domains in order to embed our system with theirs. So as for as now we have
created our own domain called as Exclusivebuy.com where we demonstrate our Opass
password authentication attack prevention mechanism.
13
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Documentation: the documentation is carried out for every stage in order to summarize
and record the result of every stage since the time the system development was started.
Efficiency: The efficiency of the system is now related in terms of the number of users
able to login. We have not provided the factor of simultaneous login because our system
is built under the cost constraint and this can be further extended and developed.
Failure management: At times of system failure the users may be puzzled about what is
the problem that is taking place in the system. So we have created various exceptions in
order to provide notifications to the users to help them assist and guide them in rectifying
the errors.
Security: We are developing our system with the view of making the password
authentication in various websites and domain. So sufficient security is provided to our
system in order to make it safe for the users Usability by target user community: The
usability factor can be extended to all the domains where the password authentication
phase is used and thus the security of the password and the confidence of the password
being safe from the hackers and phishing software’s is enhanced.
These are constraints on the services or functions offered by the system. They
include timing constraints, constraints on the development process etc. Few of them are:
Communication Interfaces: The application requires an internet connection to perform
browsing and downloading files from the internet.
Safety requirements: Application ensures that it does not download malicious and
infected links from web sites.
Software quality attributes: The source code of the application is going to be open as
this is going to be open source software. It will be free for further modifications and
improvements.
14
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
A data flow diagram (DFD) is a graphical representation of the “flow” of data through an
information system. A data flow diagram can also be used for the visualization of data
processing (structured design). It is common practice for a designer to draw a context-
level DFD first which shows the interaction between the system and outside entities.
DFD's show the flow of data from external entities into the system, how the data moves
from one process to another, as well as its logical storage.
15
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
16
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
17
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
18
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
19
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
5. Implementation
Member user is an end user who can register by themselves. Once they are registered
each user will have a user id and password, by which they can enter into their session and
start watching the video.
Whenever the member is watching the video, details will be stored in server DB which
will be used in Recommendation process.
Moreover, to reduce the load on server we will be implementing load balancing technique
using Main cloud and sub cloud concept.
Admin Session
Login
Create Cluster
Change Password
User Session
User Registration
Login
22
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
b. Context Clustering
c. Recommendation Rules
Change Password
5.2. Modules:
Module 1:
import java.io.IOException;
import java.io.PrintWriter;
import java.sql.Connection;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletContext;
import javax.servlet.http.HttpServlet;
23
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import com.dao.Admin_DAO;
contextClust("navya","30","Bangalore","IT&q
uot;,"test10.flv");
fileRecommend();
24
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
for(int i=0;i<arrayList.size();i++)
int count=1;
String s = arrayList.get(i).toString();
25
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
int st = Integer.parseInt(start);
int ed = Integer.parseInt(end);
while(ed>=st)
st =st+count;
26
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
"+prof);
break;
HashMap<String,ArrayList> mp = Admin_DAO.getRecomm();
27
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
printMap(map);
28
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
if(val>=Global.K)
System.out.println("-- -- -- -- -- -- -- -- -- -- -- -- -- -");
arrayList.add(entry.getKey());
29
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Module 2:
if(videoType.equals("Recommended"))
String c_code="";
int d = Integer.parseInt(date[1])-1;
30
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
***********");
System.out.println(sqlfrt);
resultSet = statement.executeQuery(sqlfrt);
while(resultSet.next())
c_code=resultSet.getString(1);
31
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
***********");
System.out.println(sql);
resultSet = statement.executeQuery(sql);
while(resultSet.next())
files.add(resultSet.getString(1));
32
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
files.clear();
33
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
if(val>=Global.K)
System.out.println("-- -- -- -- -- -- -- -- -- -- -- -- -- -");
int clus_code =
Admin_DAO.getCode(entry.getKey());
34
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Module 3.
processingServerId);
flag =User_DAO.checkVideoInLocalVB(con,processingServerId,fileName);
processingServerIP=User_DAO.getProcessServerIPaddress(con,processingServ
erId);
processingServerPort = User_DAO.getProcessServerPort(con,
processingServerId);
processingServerName = User_DAO.getProcessServerName(con,
35
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
processingServerId);
//processingServerUrl="http://192.168.1.16:8080/AMES_LocalVB1/video
.jsp?file="+fileame;processingServerUrl="http://"+process
ingServerIP+":"+processingServerPort+"/"+processingS
erverNam
e+"/video.jsp?file="+fileName;
:\n"+processingServerUrl);
VB[Server Id : "+processingServerId+"].");
response.sendRedirect(processingServerUrl);
VB[SubVB Id : "+subVbId+"].");
flag = User_DAO.checkVideoInSubVB(con,subVbId,
fileName);
//flag = true;
36
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
boolean b = UserDAO.inserTrans(uid,
VB[SubVbId : "+subVbId+"].");
out.println( "<html><head>" );
out.println("<br><title>Please
Wait...</title>");
content=\"0\">" );
out.println("<center>");
out.println("<font color='white'
size='5'>");
out.println( "Wait,Please.....<br>" );
VB....." );
out.println( "<br><br>" );
out.print( "<img
src='Res/Images/loading.gif'></img><br><br>
");
out.println("<font color='red'
size='5'>");
37
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
button.......<br> " );
out.println("</font>");
out.println("<fontcolor='white'
size='5'>");
out.println("</font>");
out.println( "<br>");
out.println("</center>");
out.println("<div class='button'>");
out.close();
Execution steps
Please copy the Supporting_Files from Supporting Files folder and paste it in
(C:\WINDOWS) Directory.
Note:
Before run this Project, Please copy the Images folder from this project and paste
it in (C :) Directory.
To check whether tomcat in started or not. Just open your browser and type
http://localhost:8080; Tomcat home page will be open.
************************************************************************
38
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Login Details
User Id :
Password :
User Id :
Password :
* There is no user id and password for end users. Just type
http://localhost:8085/AdSense/adsense.jsp in your
Browser. Then end user page will open.
39
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
6. TESTING
Testing is a development procedure where programmers create tests as they develop
software. The tests are simple short tests that test functionally of a particular unit or
module of their code, such as a class or function.
Using open source libraries like cunit, oppunit and nun it (for C, C++ and C#) these tests
can be automatically run and any problems found quickly. As the tests are developed in
parallel with the source unit test demonstrates its correctness.
Validation testing is a concern which overlaps with integration testing. Ensuring that the
application fulfils its specification is a major criterion for the construction ofan
integration test. Validation testing also overlaps to a large extent with SystemTesting,
where the application is tested with respect to its typical working environment.
Consequently for many processes no clear division between validation and system testing
can be made. Specific tests which can be performed in either orboth stages include the
following.
Regression Testing: Where this version of the software is tested with the
automated test harness used with previous versions to ensure that the required
features of the previous version are skill working in the new version.
Recovery Testing: Where the software is deliberately interrupted in a number of
ways off, to ensure that the appropriate techniques for restoring anylost data will
function.
Security Testing: Where unauthorized attempts to operate the software, orparts of
it, attempted it might also include attempts to obtain access the data, orharm the
software installation or even the system software. As with all types of security
determined will be able to obtain unauthorized access and the best that can be
achieved is to make this process as difficult as possible.
Stress Testing: Where abnormal demands are made upon the software by
increasing the rate at which it is asked to accept, or the rate t which it is asked to
produce information. More complex tests may attempt to crate very large data sets
or cause the soft wares to make excessive demands on the operating system.
40
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
The completion of the system is achieved only after it has been thoroughly tested. Though
this gives a feel that project is completed there cannot be any project without going
through this stage. Hence in this stage it is decided whether this project can undergo real
time environment execution without any breakdowns, therefore the package can be
rejected even at this stage.
41
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
organization may be separate from the development team. There are various roles for
testing team members. Information derived from software testing may be used to correct
the process by which software is developed.
Testing is a set of activities that can be planned in advance and conducted systematically.
The proposed system is tested in parallel with the software that consists of its own phases
of its analysis, implementation, testing and maintenance. Following are the tests
conducted on the system.
During this implementation of the system each module of the system was tested
separately to uncover errors within its boundaries. User interface is used as a guide in the
process
Ideally, each test case is independent from the others: substitutes like method
stubs, mock objects, fakes and test harnesses can be used to assist testing a module in
isolation. Unit tests are typically written and run by software developers to ensure that
code meets its design and behaves as intended. Its implementation can vary from being
very manual (pencil and paper) to being formalized as part of build automation.
42
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
This module introduces the technique of functional (black box) unit testing to
verify the correctness of classes. It shows how to design unit test cases based on a class
specification within a contract programming approach. The laboratory exercises then
guide students through creating and running tester classes in Java from a test case design,
utilizing the Joint unit test framework. It also contains a worked example on how to unit
test GUI and event handling classes.
43
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Test cases are constructed to test that all components within assemblages interact
correctly, for example across procedure calls or process activations, and this is done after
testing individual modules, i.e. unit testing. The overall idea is a "building block"
approach, in which verified assemblages are added to a verified base which is then used
to support the integration testing of further assemblages.
This software has been tested with realistic data given by the client and produced results.
Then the client satisfying all the requirements specified by them has also developed the
software within the time limitations specified. A demonstration has been given to the
client and the end user giving all the operational features.
6.6.1Test plan
Features to be tested.
Approach to be tested.
Test deliverables.
44
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
All the functional features specified in the required document will be tested. Test
coverage in the test plan states what requirements will be verified during what stages of
the product life. Test Coverage is derived from design specifications and other
requirements, such as safety standards or regulatory codes, where each requirement or
specification of the design ideally will have one or more corresponding means of
verification.
Test coverage for different product life stages may overlap, but will not
necessarily be exactly the same for all stages. For example, some requirements may be
verified during Design Verification test, but not repeated during Acceptance test. Test
coverage also feeds back into the design process, since the product may have to be
designed to allow test access.
Test methods in the test plan state how test coverage will be implemented. Test
methods may be determined by standards, regulatory agencies, or contractual agreement,
or may have to be created new. Test methods also specify test equipment to be used in the
performance of the tests and establish pass/fail criteria. Test methods used to verify
hardware design requirements can range from very simple steps, such as visual
inspection, to elaborate test procedures that are documented separately.
For unit testing structured testing based on branch coverage criteria will be used. The goal
is to achieve branch coverage of more than 95% system testing will be functional in
nature. A test plan documents the strategy that will be used to verify and ensure that a
product or system meets its design specifications and other requirements. A test plan is
usually prepared by or with significant input from Test Engineers.
Depending on the product and the responsibility of the organization to which the test
plan applies, a test plan may include one or more of the following:
45
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
46
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
To evaluate the performance of our recommendation system, training data and test data
about users and videos should be gathered. We collect numerous user context vectors
extracted from our own data sets. This datasets contain user’s social profiles and
multimedia content they shared. We also extract public information from own dataset, a ,
such as video attributes, popular videos. After pre-processing, around 100 video items,
64*64 user context vectors with dimension are stored. Moreover after recommendation
load balancing starts through various cloud storage.
8. CONCLUSION
We have proposed a cloud-assisted recommender system for videos. Based on the
MapReduce platform, we have analyzed three kinds of user behaviors, including user
contexts, interest groups, and user profiles. Along with different characteristics of the
three kinds of information, we adopt SCA, graph partition, and k-means separately.
Distinguishing with other recommender systems, we have stored recommendation rules
instead of recommending lists. Additionally, a graph based rule reordering method is used
in real-time recommending. Evaluation shows that the proposed system provides higher
quality of recommendation with lower training latency and recommending latency.
47
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
9. APPENDIX
9.1 SOURCE CODE
import java.sql.Connection;
import java.sql.ResultSet;
import java.sql.Statement;
import java.util.ArrayList;
import java.util.HashMap;
private Admin_DAO(){}
if(adminDAO==null)
else
return adminDAO;
boolean flag=false;
48
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
try
statement = con.createStatement();
while(resultSet.next())
flag=true;
try
statement = con.createStatement();
while(resultSet.next())
list.add(resultSet.getString(2));
49
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
try
statement = con.createStatement();
while(resultSet.next())
list.add(resultSet.getString(2));
return list;
try
{
50
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
statement = con.createStatement();
while(resultSet.next())
list.add(resultSet.getString(2));
boolean flag=false;
try
statement = con.createStatement();
while(resultSet.next())
flag=true;
m_user
Fields
m_age
Fields
m_location
Fields
52
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
m_profession
Fields
m_context_cluster
Fields
m_Video(upload)
Fields
53
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
m_videobase
Fields
m_sub_vb
Fields
m_local_vb
Fields
54
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
m_process_server
Fields
m_Video_trans
Fields
9.3 Screenshots
55
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
User Register
56
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
57
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Create Clustering
58
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
59
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
60
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
61
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
62
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
9.3 Java
Initially the language was called as “oak” but it was renamed as “Java” in 1995. The
primary motivation of this language was the need for a platform-independent (i.e.,
architecture neutral) language that could be used to create software to be embedded in
various consumer electronic devices.
9.3 Servlets
63
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Servlets are objects that conform to a specific interface that can be plugged into a Java-
based server. Servlets are to the server-side what applets are to the client-side -- object
byte codes that can be dynamically loaded off the net. They differ from applets in that
they are faceless objects (without graphics or a GUI component). They serve as platform-
independent, dynamically loadable, plug gable helper byte code objects on the server side
that can be used to dynamically extend server-side functionality.
Java Server Pages technology lets you put snippets of servlet code directly into a text-
based document. A JSP page is a text-based document that contains two types of text:
static template data, which can be expressed in any text-based format such as HTML,
WML, and XML, and JSP elements, which determine how the page constructs dynamic
content.
Java Server Page™ (JSP): An extensible Web technology that uses template data, custom
elements, scripting languages, and server-side Java objects to return dynamic content to a
client. Typically the template data is HTML or XML elements, and in many cases the
client is a Web browser.
Java Server Pages (JSP) lets you separate the dynamic part of your pages from the static
HTML. You simply write the regular HTML in the normal manner, using whatever Web-
page-building tools you normally use. You then enclose the code for the dynamic parts in
special tags, most of which start with "<%" and end with "%>". For example, here is a
section of a JSP page that results in something like "Thanks for ordering Core Web
Programming.
Internet protocols
o SSL 3.0—Secure Socket Layer. A security protocol that provides privacy over the
Internet. The protocol allows client-server applications to communicate in a way
that cannot be eavesdropped or tampered with. Servers are always authenticated
and clients are optionally authenticated.
Remote Method Invocation (RMI) is a set of APIs that allow developers to build
distributed applications in the Java programming language. RMI uses Java language
interfaces to define remote objects and a combination of Java serialization technology and
the Java Remote Method Protocol (JRMP) to turn local method invocations into remote
65
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
method invocations. The J2EE platform supports the JRMP protocol, the transport
mechanism for communication between objects in the Java language in different address
spaces.
9.7 MySQL
MySQL is a relational database management system, which organizes data in the form of
tables. MySQL is one of many databases servers based on RDBMS model, which
manages a seer of data that attends three specific things-data structures, data integrity and
data manipulation. With MySQL cooperative server technology we can realize the
benefits of open, relational systems for all the applications. MySQL makes efficient use
of all systems resources, on all hardware architecture; to deliver unmatched performance,
price performance and scalability. Any DBMS to be called as RDBMS has to satisfy
Dr.E.F.Codd’s rules.
The MySQL RDBMS is available on wide range of platforms ranging from PCs to super
computers and as a multi user loadable module for Novel NetWare, if you develop
application on system you can run the same application on other systems without any
modifications.
MYSQL IS COMPATIBLE:
MySQL commands can be used for communicating with IBM DB2 mainframe
RDBMS that is different from MySQL , that is MySQL compatible with DB2
.MySQL RDBMS is a high performance fault tolerant DBMS , which is specially
designed for online transaction processing and for handling large database
applications..
MySQL commands can be used for communicating with IBM DB2 mainframe
RDBMS that is different from MySQL , that is MySQL compatible with DB2
66
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
FEATURES OF MYSQL
Client/server architecture.
Data independence.
Parallel processing support for speed up data entry and online transaction
processing used for applications.
9. REFERENCES
Z. Wang, W. Zhu and P. Cui, “Social media recommendation,” SocialMedia
Retrieval. Springer London, pp. 23-42, 2013.
C. Ming, S. James and Z. Jie, “Connection discovery using big data ofuser-shared
images in social media,” Multimedia, IEEE Transactions on.vol. 17, no. 9, pp.
1417-1428, 2015.
“YouTube wins its first Emmy for video recommendations you can’t resist,” The
Verge. [Online]. Available:http://www.theverge.com/2013/8/1/4578544/youtube-
wins-first-emmy-for-video-recommendations-youcant-resist.
67
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
Cynthia Dwork, Frank McSherry, Kobbi Nissim, and Adam Smith. “Calibrating
noise to sensitivity in private data analysis,” in Theory of Cryptography
Conference, Springer, pp. 265-284, 2006.
68
Dept. of CSE, DSCE, Bangalore – 78
Video Recommendation Based on Cloud 2017
69
Dept. of CSE, DSCE, Bangalore – 78