Computer Science ›› 2019, Vol. 46 ›› Issue (11A): 178-184.

• Data Science • Previous Articles     Next Articles

Recommendation Methods Considering User Indirect Trust and Gaussian Filling

ZHU Pei-pei, LONG Min   

  1. (School of Computer and Communication Engineering,Changsha University of Science and Technology,Changsha 410114,China)
  • Online:2019-11-10 Published:2019-11-20

Abstract: The existing recommendation algorithm introduces the user display trust,which can effectively improve the recommendation accuracy,but does not fully exploit the social relationship,and the indirect trust has richer potential value in the social information,further affecting the recommendation quality.Although there are related studies on indirect trust,the calculation is complicated and the path of trust transmission is not sufficient.Therefore,through the trust transfer network diagram,the ratio of each branch node to the total path node is multiplied by node-by-node to obtain the trust indirect value globally.Secondly,the information entropy is used to analyze the actual performance of the user’ssocial trust relationship,and the trust is adjusted to form the calculation model IpmTrust of indirect trust.And based on this model,a recommendation algorithm GITCF considering user indirect trust is designed.The algorithm uses the Gaussian model to fill the scoring matrix,and then uses the modified cosine to calculate the user similarity.After IpmTrust calculates the indirect trust,the user trust and the similarity are linearly weighted and merged.Finally,the improved neighbor prediction is used for recommendation.The experiment was carried out on the Matlab simulation platform.The RMSE and MAE evaluations were compared.The GITCF was compared with the exis-ting recommendation algorithms and the traditional recommendation algorithms.The GITCF is improved by nearly 7% compared with the existing recommendation recommendation,and is also higher than the trust-free ones.The experimental results show that the IpmTrust model has certain validity,and the recommended algorithm can improve the quality of recommendation results.

Key words: Recommendation algorithm, Indirect trust, User preference, Information entropy, Gaussian filling

CLC Number: 

  • TP391
[1]SARWAR B,KARYPIS G,KONSTAN J,et al.Item-based collaborative filtering recommendation algorithms[C]∥International Conference on World Wide Web.2001.
[3]YU C,XU J,DU X.Recommendation algorithm combining the user-based classified regression and the item-based filtering[C]∥International Conference on Electronic Commerce:the New E-commerce:Innovations for Conquering Current Barriers.2006.
[4]LIM K H,CHAN J,LECKIE C,et al.Personalized tour recommendation based on user interests and points of interest visit durations[C]∥International Conference on Artificial Intelligence.2015.
[7]ZHANG F,LONG B,FENG G.A User Trust-Based Collaborative Filtering Recommendation Algorithm[C]∥International Conference on Information & Communications Security.2009.
[9]KALAÏ A,ZAYANI C A,AMOUS I,et al.Social collaborative service recommendation approach based on user’s trust and domain specific expertise[J].Future Generation Computer Systems,2018(80):355-367.
[11]MA X,LU H W,GAN Z B,et al.An explicit trust and distrust clustering based collaborative filtering recommendation approach[J].Electronic Commerce Research and Applications,2017(25):29-39.
[12]CHEN H L.A Personalized Recommendation Algorithm Based on the Fusion of Trust Relation and Time Series[C]∥IEEE International Conference on Computational Science & Enginee-ring.IEEE,2017.
[16]XU X,YUAN D.A novel matrix factorization recommendation algorithm fusing social Trust and Behaviors in micro-blogs[C]∥IEEE International Conference on Cloud Computing & Big Data Analysis.IEEE,2017.
[17]LINGAM G,RANJAN R R,DVLN S.Learning automata-based trust model for user recommendations in online social networks[J].Computers and Electrical Engineering,2018,66.
[18]AZADJALAL M,MORADI P,ABDOLLAHPOURI A,et al.A trust-aware recommendation method based on Pareto dominance and confidence concepts[J].Knowledge-Based Systems,2017(116):130-143.
[19]YIN C Y,WANG J,PARK J H.An Improved Recommendation Algorithm for Big data Cloud Service based on the Trust in Socio-logy[J].Neurocomputing,2017(256):49-55.
[20]GOHARI F S,ALIEE F S,HAGHIGHI H A.A new confi-dence-based recommendation approach:Combining trust and certainty[J].Information Sciences,2018(422):21-50.
[21]MAZUMDER R,HASTIE T,TIBSHIRANI R.Spectral Regularization Algorithms for Learning Large Incomplete Matrices[J].Journal of Machine Learning Research,2010,11(11):2287-2322.
[26]GOLBECK J.Filmtrust:movie recommendations from semantic web-based social networks[C]∥Consumer Communications & Networking Conference.IEEE,2006.
[27]SALAKHUTDINOV R,MNIH A.Probabilistic Matrix Factorization[C]∥International Conference on Neural Information Processing Systems.Vanconver,Canada,2007.
[28]JAMALI M,ESTER M.A matrix factorization technique with trust propagation for recommendation in social networks[C]∥Proceedings of the 2010 ACM Conference on Recommender Systems(RecSys 2010).Barcelona,Spain:ACM,2010:26-30.
[30]ZHANG Z,LIU Y,JIN Z,et al.A Dynamic Trust based two-layer Neighbor Selection Scheme towards Online Recommender Systems[J].Neurocomputing,2018,285:94-103.
[1] KANG Lin-yao, TANG Bing, XIA Yan-min, ZHANG Li. GPU-accelerated Non-negative Matrix Factorization-based Parallel Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2019, 46(8): 106-110.
[2] WANG Ya-ge, KANG Xiao-dong, GUO Jun, HONG Rui, LI Bo, ZHANG Xiu-fang. Image Compression Method Combining Canny Edge Detection and SPIHT [J]. Computer Science, 2019, 46(6A): 222-225.
[3] ZHANG Fang, ZHAO Shu-liang, WU Yong-liang. Data Scaling Method for Multi-scale Data Mining [J]. Computer Science, 2019, 46(4): 57-65.
[4] ZHANG Hong-li, BAI Xiang-yu, LI Gai-mei. Personalized Recommendation Algorithm Based on Recent Neighborhood Recommendation and Combined with Context Awareness [J]. Computer Science, 2019, 46(4): 235-240.
[5] XU Jing-ce, LIANG Bing, LI Meng-nan, JI Wen, CHEN Yi-qiang. Profit Optimization for Multi-content Video Streaming over Mobile Network Based on User Preference [J]. Computer Science, 2019, 46(3): 103-107.
[6] DENG Xiu-qin, LIU Tai-heng, LIU Fu-chun, LONG Yong-hong. User Collaborative Filtering Recommendation Algorithm Based on All Weighted Matrix Factorization [J]. Computer Science, 2019, 46(11A): 199-203, 219.
[7] ZHOU Bo. Research on Relationship Between Bipartite Network Recommendation Algorithm and Collaborative Filtering Algorithm [J]. Computer Science, 2019, 46(11A): 163-166, 177.
[8] WEN Wen, LIN Ze-tian, CAI Rui-chu, HAO Zhi-feng, WANG Li-juan. Predicting User’s Dynamic Preference Based on Embedding Learning [J]. Computer Science, 2019, 46(10): 32-38.
[9] ZHENG Shu-fu,YU Gao-feng. Attribute Transfer and Knowledge Discovery Based on Formal Context [J]. Computer Science, 2018, 45(6A): 117-119.
[10] GUO Shuai, LIU Liang and QIN Xiao-lin. Spatial Keyword Range Query with User Preferences Constraint [J]. Computer Science, 2018, 45(4): 182-189.
[11] ZOU Na, TIAN Jin-wen. Research on Multi Feature Fusion Infrared Ship Wake Detection [J]. Computer Science, 2018, 45(11A): 172-175.
[12] WANG Feng, LIU Ji-chao, WEI Wei. Semi-supervised Feature Selection Algorithm Based on Information Entropy [J]. Computer Science, 2018, 45(11A): 427-430.
[13] TIAN Xian-zhong and SHEN Jie. Personalized Recommendation Based on Probabilistic Matrix Factorization in Big Data Environment [J]. Computer Science, 2017, 44(Z6): 438-441, 469.
[14] ZENG An, GAO Cheng-si and XU Xiao-qiang. Collaborative Filtering Algorithm Incorporating Time Factor and User Preference Properties [J]. Computer Science, 2017, 44(9): 243-249.
[15] ZENG An and XU Xiao-qiang. Hybrid Collaborative Filtering Recommendation Algorithm Based on Friendships and Tag [J]. Computer Science, 2017, 44(8): 246-251.
Full text



[1] DU Wei, DING Shi-fei. Overview on Multi-agent Reinforcement Learning[J]. Computer Science, 2019, 46(8): 1 -8 .
[2] GAO Li-zheng, ZHOU Gang, LUO Jun-yong, LAN Ming-jing. Survey on Meta-event Extraction[J]. Computer Science, 2019, 46(8): 9 -15 .
[3] CAI Li, LI Ying-zi, JIANG Fang, LIANG Yu. Study on Clustering Mining of Imbalanced Data Fusion Towards Urban Hotspots[J]. Computer Science, 2019, 46(8): 16 -22 .
[4] YANG Zhen, WANG Hong-jun. Important Location Identification of Mobile Users Based on Trajectory Division and Density Clustering Method[J]. Computer Science, 2019, 46(8): 23 -27 .
[5] DENG Cun-bin, YU Hui-qun, FAN Gui-sheng. Integrating Dynamic Collaborative Filtering and Deep Learning for Recommendation[J]. Computer Science, 2019, 46(8): 28 -34 .
[6] ZHONG Feng-yan, WANG Yan, LI Nian-shuang. Node Selection Scheme for Data Repair in Heterogeneous Distributed Storage Systems[J]. Computer Science, 2019, 46(8): 35 -41 .
[7] SUN Guo-dao, ZHOU Zhi-xiu, LI Si, LIU Yi-peng, LIANG Rong-hua. Spatio-Temporal Evolution of Geographical Topics[J]. Computer Science, 2019, 46(8): 42 -49 .
[8] ZHANG Hui-bing, ZHONG Hao, HU Xiao-li. User Reviews Clustering Method Based on Topic Analysis[J]. Computer Science, 2019, 46(8): 50 -55 .
[9] LI Bo-jia, ZHANG Yang-sen, CHEN Ruo-yu. Method for Generating Massive Data with Assignable Distribution[J]. Computer Science, 2019, 46(8): 56 -63 .
[10] LU Xian-guang, DU Xue-hui, WANG Wen-juan. Alert Correlation Algorithm Based on Improved FP Growth[J]. Computer Science, 2019, 46(8): 64 -70 .