Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 493-496.

• Big Date & Date Mining • Previous Articles     Next Articles

Coordination Filtering Personalized Recommendation Algorithm Considering Average
Preference Weight and Popularity Division

HE Ji-xing,CHEN Wen-bin,MOU Bin-hao   

  1. School of Computer Science,Southwest Petroleum University,Chengdu 610500,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: This paper presented a new recommendation algorithm which takes into account the average preference weight.The algorithm is divided into three stages:neighborhood computing,data set partitioning and preference prediction.In the neighborhood calculation,the KNN based on the Euclidean distance is used to determine the neighborhood.At the same time,the data set is divided into the data set and the non-popular data set according to the popularity threshold of the data set itself.When the score is predicted,the existing neighborhood selects part of the project accor-ding to the popularity degree,and predicts the user’s average preference weight based on the preference similarity of the item set.The results show that on the Movielens 100K data set,the new algorithm is superior to the typical cosine recommendation algorithm,the person recommendation algorithm,the collaborative filtering algorithm based on the project preference coordination filtering algorithm and the user attribute weighted active neighbor existing algorithms in MAE.

Key words: Average preference weight, Coordination filtering, KNN, Neighborhood calculation, Personalized recommended algorithm, Popularity division

CLC Number: 

  • TP391
[1]李容,李明奇,郭文强.基于改进相似度的协同过滤算法研究[J].计算机科学,2016,43(12):206-208.
[2]徐蕾,杨成,姜春晓,等.协同过滤推荐系统中的用户博弈[J].计算机学报,2016,39(6):1176-1189.
[3]XUE G R,LIN C,YANG Q,et al.Scalable collaborative filtering using cluster-based smoothing[C]∥International ACM Sigir Conference on Research & Development in Information Retrieval.2005:114-121.
[4]姚彬修,倪建成,于苹苹,等.基于多源信息相似度的微博用户推荐算法[J].计算机应用,2017,37(5):1382-1386.
[5]于洪涛,周倩楠,张付志.基于项目流行度和新颖度分类特征的托攻击检测算法[J].工程科学与技术,2017,49(1):176-183.
[6]SHI Y,LARSON M,HANJALIC A.Exploiting user similarity based on rated-item pools for improved user-based collaborative filtering[C]∥Proceedings of the Third ACM Conference on Recommender Systems.ACM,2009:125-132.
[7]BANDA L,BHARADWAJ K K.Evaluation of Collaborative Filtering Based on Tagging with Diffusion Similarity Using Gradual Decay Approach[M]∥Advanced Computing,Networking and Informatics- Volume 1.Springer International Publi-shing,2014:421-428.
[8]黄文明,莫阳.基于文本加权KNN算法的中文垃圾短信过滤[J].计算机工程,2017,43(3):193-199.
[9]郑洁,钱育蓉,杨兴耀,等.基于信任和项目偏好的协调过滤算法[J].计算机应用,201636(10):2784-2788.
[10]王吉源,黎晨,王婵娟.用户属性加权活跃近邻的协同过滤算法[J].计算机应用研究,2016,(12):3625-3629.
[11]SHANG M S,JIN C H,ZHOU T,et al.Collaborative filtering based on multi-channel diffusion [J].Physica A Statistical Mechanics & Its Applications,2009,388(23):4867-4871.
[12]王伟,徐平平,王华君,等.基于概率回归模型和K-最近邻的电子商务个性化推荐方案[J].湘潭大学自科学报,2016,38(1):97-100.
[13]BOBADILLA J,ORTEGA F,HERNANDO A.Recommender systems survey [J].Knowledge-Based Systems,2013,46(1):109-132.
[14]徐雅斌,孙晓晨.位置社交网络的个性化位置推荐[J].北京邮电大学学报,2015,38(5):118-124.
[1] ZHANG Ren-jie, CHEN Wei, HANG Meng-xin, WU Li-fa. Detection of Abnormal Flow of Imbalanced Samples Based on Variational Autoencoder [J]. Computer Science, 2021, 48(7): 62-69.
[2] ZHAO Zhi-qiang, YI Xiu-shuang, LI Jie, WANG Xing-wei. Research on DoS Intrusion Detection Technology of IPv6 Network Based on GR-AD-KNN Algorithm [J]. Computer Science, 2021, 48(6A): 524-528.
[3] HUANG Ming, SUN Lin-fu, REN Chun-hua , WU Qi-shi. Improved KNN Time Series Analysis Method [J]. Computer Science, 2021, 48(6): 71-78.
[4] HE Miao-miao, GUO Wei-bin. Inductive Learning Algorithm of Graph Node Embedding Based on KNN and Matrix Transform [J]. Computer Science, 2021, 48(3): 201-205.
[5] BAO Zong-ming, GONG Sheng-rong, ZHONG Shan, YAN Ran, DAI Xing-hua. Person Re-identification Algorithm Based on Bidirectional KNN Ranking Optimization [J]. Computer Science, 2019, 46(11): 267-271.
[6] LI Si-yao, ZHOU Hai-fang, FANG Min-quan. Research of Image Classification Algorithm Based on GPU [J]. Computer Science, 2018, 45(6A): 143-145.
[7] CHEN Jing-jie and CHE Jie. Fuel Flow Missing-value Imputation Method Based on Standardized Euclidean Distance [J]. Computer Science, 2017, 44(Z6): 109-111.
[8] FENG Fei, JIANG Bao-hua, LIU Pei-xue and CHEN Yu-jie. Application of Improved 2DPCA Algorithm in Face Recognition [J]. Computer Science, 2017, 44(Z11): 267-268.
[9] XUE Zhong-bin, BAI Li-guang, HE Ning, ZHOU Xuan, ZHOU Xin and WANG Shan. Throughput Oriented Real-time Query Processing Algorithm for Moving Objects in Road Network [J]. Computer Science, 2017, 44(3): 16-19.
[10] WANG Li, WANG Xin and MA Chao-dong. Distributed Caching Strategy for Data Exchange Program Based on Ontology and KNN Algorithm [J]. Computer Science, 2016, 43(Z11): 316-319.
[11] HUA Hui-you, CHEN Qi-mai, LIU Hai, ZHANG Yang and YUAN Pei-quan. Hybrid Kmeans with KNN for Network Intrusion Detection Algorithm [J]. Computer Science, 2016, 43(3): 158-162.
[12] WANG Pei-zhong, ZHENG Nan-shan and ZHANG Yan-zhe. Indoor Positioning Algorithm Based on Dynamic K Value and AP MAC Address Match [J]. Computer Science, 2016, 43(1): 163-165.
[13] WANG Fei, QIN Xiao-lin, LIU Liang and SHEN Yao. Algorithm for k-Nearest Neighbor Join Based on Data Stream [J]. Computer Science, 2015, 42(5): 204-210.
[14] XU Xiao-dan, YAO Ming-hai, LIU Hua-wen and ZHENG Zhong-long. Pre-processing Method of Multi-label Classification Based on kNN [J]. Computer Science, 2015, 42(5): 106-108.
[15] QIAN Yan-yan, LI Yong-zhong and YU Xi-ya. Intrusion Detection Method Based on Multi-label and Semi-supervised Learning [J]. Computer Science, 2015, 42(2): 134-136.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!