Computer Science ›› 2019, Vol. 46 ›› Issue (6): 75-79.doi: 10.11896/j.issn.1002-137X.2019.06.010

Previous Articles     Next Articles

Recommendation Strategy Based on Trust Model via Emotional Analysis of Online Comment

LU Zhu-bing1, LI Yu-zhou2   

  1. (College of Economics and Management,Southwest University,Chongqing 400715,China)1
    (College of Computer and Information Science,Southwest University,Chongqing 400715,China)2
  • Received:2018-11-10 Published:2019-06-24

Abstract: Personalized recommendation technology has become a very effective approach to cope with “information overload” in E-commerce.Aiming at the problems of data sparseness and cold-start in traditional collaborative filtering recommender system,which have led to the decline of the accuracy in recommendation,weakened user’s confidence towards the system,this paper proposed a new recommendation strategy using trust theory in sociology to offer users better personalized service. From this perspective,user’s online comments to the items that they have experienced are analyzed,the user’s emotional tendency is extracted,and it is effectively quantified.The trust relationship between users is grown by analyzing the similarity of user’s emotional tendency.At the same time,users’ rating data are combined to compensate for the lack of recommendation factor caused by similarity as the only preference weight.The work in this paper includes three parts:analysis and quantification of user emotional tendency based on online reviews,mo-deling of trust relationship based on similarity between emotion and design of recommendation strategy based on trust relationship.Experiments show that the proposed recommendation strategy can effectively reduce the average absolute error value called MAE,which means the recommendation accuracy is improved.At the same time,the coverage rate is also effective increased,which means that the system has more items to recommend.Additionally,the management mechanism of trust relationship can also greatly enhance user’s personalized experience of the system and user’s confidence to the system.

Key words: Collaborative filtering, Data sparsity, Trust relationship, Emotion analysis, Similarity

CLC Number: 

  • TP391
[1]HERLOCKER J L,KONSTAN J A,TERVEEN L G.Evaluating collaborative filtering recommender systems[J].ACM Transactions on Information System,2004,22(1):5-53.
[2]CAO D,HE X N,MIAO L H,et al.Attentive Group Recommendation[C]∥Proceedings of SIGIR’18Ann Arbor.MI,USA,ACM,2018:645-654.
[3]CHEN J,ZHANG H,HE X,et al.Attentive collaborative filtering:Multimedia recommendation with item- and component le-vel attention[C]∥Proceedings of SIGIR’17.MI,USA,ACM,2017:335-344.
[4]HE X,LIAO L,ZHANG H,et al.Neuralcollaborative filtering[C]∥Proceedings of 26th International Conference of World Wide Web.USA,IEEE Press,2017:173-182.
[5]GE M,DELGADO-BATTENFEL D,JANNACH D.Beyond accuracy Evaluating recommender systems by coverage and serendipity[C]∥RecSys the 2010 ACM Conference on Recommender Systems.Barcelona,ACM,2010:257-260.
[6]XING C X,GAO F R,ZHAN S N,et al.A Collaborative Filtering Recommendation Algorithm Incorporated with User Inte-rest Change[J].Journal of Computer Research and Development,2007,44(2):296-301.(in Chinese)
邢春晓,高凤荣,战思南,等,适应用户兴趣变化的协同过滤推荐算法[J].计算机研究与发展,2007,44(2):296-301.
[7]DU Y P,HUANG L,HE M.Collaborative Filteration Recom-mendation Algorithm Based on Trust Computation[J].Pattern Recognition & Artificial Intelligence,2014,27(5):417-425.(in Chinese)
杜永萍,黄亮,何明.融合信任计算的协同过滤推荐方法[J]模式识别与人工智能,2014,27(5):417-425.
[8]LIN J H,YAN X H,HUANG B.Collaborative Filtering Recommendation Algorithm Based on Trust Users[J].Computer Systems&Applications,2017,26(6):124-130.(in Chinese)
林建辉,严宣辉,黄波.融合信任用户的协同过滤推荐算法[J].计算机系统应用,2017,26(6):124-130.
[9]LU Z B,TANG Y.A Trust Network-based Collaborative Filtering Recommendation Strategy[J].Journal of Southwest China Normal University(Natural Science Edition),2008,33(2):123-126.(in Chinese)
卢竹兵,唐雁.一种基于信任网络的协同过滤推荐策略[J].西南师范大学学报(自然科学版),2008,33(2):123-126.
[10]ZHANG Y,LIAN D F,YANG G W.Discrete personalized ran-king for fast collaborativefiltering from implicit feedback[C]∥Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence.USA,AAAI Press,2017:1669-1675.
[11]CHENG Z Y,DING Y,HE X N,et al.A3NCF:An Adaptive Aspect Attention Model for Rating Prediction[C]∥Proceedings of the 27th International Joint Conference on Artificial Intelligence(IJCAI’18).Sweden,2018:3748-3754.
[12]GAO Y F.Design and Implementation of Recommendation Algorithm Based on Review Analysis[D].Shanghai:East China Normal University,2016.(in Chinese)
高祎璠.基于评论分析的推荐算法的设计与实现[D].上海:华东师范大学,2016.
[13]ZHOU G Q,LIU X,YANG X H.User Collaborative Recommendation Model Based on Emotional Weight[J].Journal of Chinese Computer Systems,2016,37(5):938-942.(in Chinese)
周国强,刘旭,杨锡慧.基于情感权重的用户协同推荐模型[J].小型微型计算机系统,2016,37(5):938-942.
[14]YOU H.A Sociological Research on the Relationship between Emotion and Trust[D].Wuhan:Wuhan University,2009.(in Chinese)
游泓.情感与信任关系的社会学研究[D].武汉:武汉大学,2009.
[15]MC K,NIGHT D H,CHERVANY N L.The Meaning of Trust[C]∥Technical Report MISRC Working Paper Series 96 04 University of Minnesota.Management Information System Research Center,1996.
[16]GABBETTA D.Can we Trust?[C]∥Trust: Making and Breaking Cooperative Relations.BasilBlackwell,Oxford,1990:213-238.
[17]WANG Y,VASSILEVA J.Trust and reputation model in peer-to-peer networks.[C]∥Proceedings of the 3rd International Conference on Peer-to-Peer Computing.IEEE Press,2003:150-157.
[18]CHANG T M,HSIAO W F.LDA-based personalized document recommendation[C]∥Proceeding of the PACIS’13.Jeju Island,Korea:Journal of the Association for Information System,2013.
[19]LIU B,HU M Q,CHENG J S.Opinion observer:analyzingand comparing opinions on the Web[C]∥Proceedings of the 14th International Conference on World Wide Web.Japan,ACM Press,2005:342-351.
[20]PENG M,XI J J,DAI X Y,et al.Collaborative Filtering Recommendation Based on Sentiment Analysis and LDA Topic Model[J].Journal of Chinese Information Processing,2017,31(2):194-203.(in Chinese)
彭敏,席俊杰,代心媛,等.基于情感分析和LDA主题模型的协同过滤推荐算法[J].中文信息学报,2017,31(2):194-203.
[21]LIU H,YANG H,LI W,et al.CRO:A System for Online Review Structurization[C]∥Proceeding of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.NewYork,ACM Press.2008:1085-1088.
[22]BLAZE M,KANNAN S,LEE I,et al.Dynamic Trust Management[J].Computer,2009,42(2):44-52.
[23]MCAULEY J,LESKOVEC J.Hidden factors and hidden topics:understandingrating dimensions with review text[C]∥Procee-dings of the 7th ACM Conference on Recommender System.ACM Press,2013:165-172.
[24]YANG W,SONG J J,TANG J Q.A Study on the Classification Approach for Chinese MicroBlog Subjective and Objective Sentences.Journal of Chongqing University of Technology(Natural Science),2013,27(1):51-56. (in Chinese)
杨武,宋静静,唐继强.中文微博情感分析中主客观句分类方法.重庆理工大学学报(自然科学版),2013,27(1):51-56.
[1] HU Ping, QIN Ke-yun. Similarity Construction Method for Pythagorean Fuzzy Set Based on Fuzzy Equivalence [J]. Computer Science, 2021, 48(1): 152-156.
[2] MA Li-bo, QIN Xiao-lin. Topic-Location-Category Aware Point-of-interest Recommendation [J]. Computer Science, 2020, 47(9): 81-87.
[3] LIU Jing, FANG Xian-wen. Mining Method of Business Process Change Based on Cost Alignment [J]. Computer Science, 2020, 47(7): 78-83.
[4] LI Zhang-wei, XIAO Lu-qian, HAO Xiao-hu, ZHOU Xiao-gen, ZHANG Gui-jun. Multimodal Optimization Algorithm for Protein Conformation Space [J]. Computer Science, 2020, 47(7): 161-165.
[5] WANG Meng, DING Zhi-jun. New Device Fingerprint Feature Selection and Model Construction Method [J]. Computer Science, 2020, 47(7): 257-262.
[6] LUO Jia-lei and MENG Li-min. Signal Timing Scheme Recommendation Algorithm Based on Intersection Similarity [J]. Computer Science, 2020, 47(6A): 66-69.
[7] LI Jin-xia, ZHAO Zhi-gang, LI Qiang, LV Hui-xian and LI Ming-sheng. Improved Locality and Similarity Preserving Feature Selection Algorithm [J]. Computer Science, 2020, 47(6A): 480-484.
[8] SHU Yun-feng and WANG Zhong-qing. Research on Chinese Patent Summarization Based on Patented Structure [J]. Computer Science, 2020, 47(6A): 45-48.
[9] MO Cai-wang, CHANG Kan, LI Heng-xin, LI Ming-hong, QIN Tuan-fa. Color Image Super-resolution Algorithm Based on Inter-channel Correlation and Nonlocal Self-similarity [J]. Computer Science, 2020, 47(6): 138-143.
[10] YUAN Rong, SONG Yu-rong, MENG Fan-rong. Link Prediction Method Based on Weighted Network Topology Weight [J]. Computer Science, 2020, 47(5): 265-270.
[11] ZHU Lei, HU Qin-han, ZHAO Lei, YANG Ji-wen. Collaborative Filtering Algorithm Based on Rating Preference and Item Attributes [J]. Computer Science, 2020, 47(4): 67-73.
[12] ZHAO Nan, PI Wen-chao, XU Chang-qiao. Video Recommendation Algorithm for Multidimensional Feature Analysis and Filtering [J]. Computer Science, 2020, 47(4): 103-107.
[13] ZHANG Yun-fan,ZHOU Yu,HUANG Zhi-qiu. Semantic Similarity Based API Usage Pattern Recommendation [J]. Computer Science, 2020, 47(3): 34-40.
[14] ZHONG Ya,GUO Yuan-bo,LIU Chun-hui,LI Tao. User Attributes Profiling Method and Application in Insider Threat Detection [J]. Computer Science, 2020, 47(3): 292-297.
[15] FENG Chen-jiao,LIANG Ji-ye,SONG Peng,WANG Zhi-qiang. New Similarity Measure Based on Extremely Rating Behavior [J]. Computer Science, 2020, 47(2): 31-36.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .