Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 402-408.

• Big Data & Data Mining • Previous Articles     Next Articles

Service Recommendation Method Based on Social Network Trust Relationships

WANG Jia-lei, GUO Yao, LIU Zhi-hong   

  1. School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: With the advent of service computing,many different electronic services have emerged.Users often have to find what they need from a large number of services,which is a formidable task.Hence,it is necessary to put forward an efficient recommendation algorithm.The traditional cooperative recommendation system has some problems,such as cold start,sparsity of data and poor real-time performance,which lead to poor recommendation results under the circumstances with less scoring data.In order to get a better recommendation result,this paper introduced trust transfer in social networks and utilized it to establish a trust transfer model to obtain trust among users.On the other hand,based on the score data,the similarity between users in the system is calculated.On the basis of similarity between users’ trust and preference,according to the characteristics of social networks,users’ trust and preference are dynamically combined to obtain comprehensive recommendation weights.The comprehensive recommendation weights can replace the traditional similarity measurement standards for user-based collaborative filtering recommendation.This method was verified through the Epinions data set and can further improve the recommendation effect and.

Key words: Recommendation system, Trust network, Collaborative filtering, Cold start

CLC Number: 

  • TP393
[1]ADOMAVICIUS G,TUZHILIN A.Toward the next generation of recommender systems:a survey of the state-of-the-art and possible extensions[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(6):734-749.
[2]LIU G,WANG Y,ORGUN M A,et al.A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks[C]∥IEEE International Conference on Services Computing.IEEE Computer Society,2010:130-137.
[3]GARTRELL M,XING X,LV Q,et al.Enhancing group recommendation by incorporating social relationship interactions[C]∥International ACM Siggroup Conference on Supporting Group Work.2010:97-106.
[4]TANG M,XU Y,LIU J,et al.Combining Global and Local Trust for Service Recommendation[C]∥IEEE International Conference on Web Services.IEEE Computer Society,2014:305-312.
[5]ZHAO T,MCAULEY J,KING I.Leveraging Social Connections to Improve Personalized Ranking for Collaborative Filtering[C]∥ACM.2014:261-270.
[6]HWANG C S,CHEN Y P.Using Trust in Collaborative Filtering Recommendation[M]∥New Trends in Applied Artificial Intelligence.Berlin:Springer,2007:1052-1060.
[7]HANG C W.Probabilistic Trust Models for Social and Service Networks[D].North Carolina State University,2013.
[8]JAMALI M,ESTER M.TrustWalker:a random walk model for combining trust-based and item-based recommendation[C]∥Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2009:397-406.
[9]ZIEGLER C N,LAUSEN G.Propagation Models for Trust and Distrust in Social Networks[M].Kluwer Academic Publishers,2005.
[10]TANG J,GAO H,LIU H,et al.eTrust:understanding trust evolution in an online world[C]∥ACM SIGKDD International Conference on Knowledge Discovery and Data Mining.ACM,2012:253-261.
[11]DENG S,HUANG L,XU G,et al.On Deep Learning for Trust-Aware Recommendations in Social Networks[J].IEEE Transactions on Neural Networks & Learning Systems,2016,28(5):1164-1177.
[12]YANG B,LEI Y,LIU J,et al.Social Collaborative Filtering by Trust[J].IEEE Transactions on Pattern Analysis & Machine Intelligence,2017,39(8):1633-1647.
[13]XIONG L,WANG L,HUANG Y.An Approach for Top-k Re-commendation Based on Trust Information[C]∥Conference on Service-Oriented Computing and Applications.IEEE Computer Society,2017:198-205.
[14]GUO L,ZHANG C,FANG Y.A Trust-Based Privacy-Preserving Friend Recommendation Scheme for Online Social Networks[J].IEEE Transactions on Dependable & Secure Computing,2015,12(4):413-427.
[15]宗刚,孙玮,任蓉.基于信任机制的复杂网络知识传播模型的研究[J].价值工程,2009,28(12):94-97.
[16]牛常勇,刘国枢.基于局部全局相似度的SVD的协同过滤算法[J].计算机工程与设计,2016,37(9):2497-2501.
[17]REAL R,VARGAS J M.The Probabilistic Basis of Jaccard’s Index of Similarity[J].Systematic Biology,1996,45(3):380-385.
[1] WANG Han, XIA Hong-bin. Collaborative Filtering Recommendation Algorithm Mixing LDA Model and List-wise Model [J]. Computer Science, 2019, 46(9): 216-222.
[2] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation [J]. Computer Science, 2019, 46(8): 28-34.
[3] ZHANG Yan-hong, ZHANG Chun-guang, ZHOU Xiang-zhen, WANG Yi-ou. Diverse Video Recommender Algorithm Based on Multi-property Fuzzy Aggregate of Items [J]. Computer Science, 2019, 46(8): 78-83.
[4] GUO Xu, ZHU Jing-hua. Deep Neural Network Recommendation Model Based on User Vectorization Representation and Attention Mechanism [J]. Computer Science, 2019, 46(8): 111-115.
[5] KANG Lin-yao, TANG Bing, XIA Yan-min, ZHANG Li. GPU-accelerated Non-negative Matrix Factorization-based Parallel Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2019, 46(8): 106-110.
[6] SHI Xiao-ling, CHEN Zhi, YANG Li-gong, SHEN Wei. Matrix Factorization Recommendation Algorithm Based on Adaptive Weighted Samples [J]. Computer Science, 2019, 46(6A): 488-492.
[7] WANG Xu, PANG Wei, WANG Zhe. MetaStruct-CF:A Meta Structure Based Collaborative Filtering Algorithm in Heterogeneous Information Networks [J]. Computer Science, 2019, 46(6A): 397-401.
[8] LIU Qing-qing, LUO Yong-long, WANG Yi-fei, ZHENG Xiao-yao, CHEN Wen. Hybrid Recommendation Algorithm Based on SVD Filling [J]. Computer Science, 2019, 46(6A): 468-472.
[9] LU Zhu-bing, LI Yu-zhou. Recommendation Strategy Based on Trust Model via Emotional Analysis of Online Comment [J]. Computer Science, 2019, 46(6): 75-79.
[10] SU Chang, WU Peng-fei, XIE Xian-zhong, LI Ning. Point of Interest Recommendation Based on User’s Interest and Geographic Factors [J]. Computer Science, 2019, 46(4): 228-234.
[11] WANG Yong, WANG Yong-dong, DENG Jiang-zhou, ZHANG Pu. Recommendation Algorithm Based on Jensen-Shannon Divergence [J]. Computer Science, 2019, 46(2): 210-214.
[12] ZENG An, NIE Wen-jun. Stock Recommendation System Based on Deep Bidirectional LSTM [J]. Computer Science, 2019, 46(10): 84-89.
[13] ZENG Xu-yu, YANG Yan, WANG Shu-ying, HE Tai-jun, CHEN Jian-bo. Hybrid Recommendation Algorithm Based on Deep Learning [J]. Computer Science, 2019, 46(1): 126-130.
[14] LIU Hui-ting, CHENG Lei, GUO Xiao-xue, ZHAO Peng. Real-time Personalized Micro-blog Recommendation System [J]. Computer Science, 2018, 45(9): 253-259, 265.
[15] ZHANG Hong-bo, WANG Jia-lei, ZHANG Li-juan, LIU Zhi-hong. Trust Network Based Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2018, 45(8): 146-150.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .