Computer Science ›› 2022, Vol. 49 ›› Issue (5): 144-151.doi: 10.11896/jsjkx.210300217

• Database & Big Data & Data Science • Previous Articles     Next Articles

Social Trust Recommendation Algorithm Combining Item Similarity

YU Ai-xin, FENG Xiu-fang, SUN Jing-yu   

  1. College of Software,Taiyuan University of Technology,Taiyuan 030024,China
  • Received:2021-03-22 Revised:2021-09-13 Online:2022-05-15 Published:2022-05-06
  • About author:YU Ai-xin,born in 1996,postgraduate,is a member of China Computer Federation.Her main research interests include recommendation system and data mining.
    FENG Xiu-fang,born in 1966,Ph.D,professor,is a member of China Computer Federation.Her main research interests include artificial intelligence,Internet of things and cloud computing.
  • Supported by:
    Key Research and Development Plan of Shanxi Province(201903D121121).

Abstract: With the rapid development of Internet,it is difficult for users to find the content they are interested in from massive network data,while the recommendation system can solve this problem.Traditional recommendation systems only rely on user’s historical behavior data for recommendation,which has the problems of data sparsity and cold start.The integration of social network information into the recommendation system has been proven to effectively solve the problems of the traditional recommendation system and improve the quality of recommendation system.However,most recommendation systems based on social networks only focus on the one-way trust relationships between users,and ignore the influence of the trusted relationship and the item’s own factors on recommendation results.Therefore,a social trust recommendation algorithm,called SocialIS,which combines item similarity,is proposed.The influence of neighbor users on user when the user is truster and trustee is considered by SocialIS,and the Node2vec algorithm is used to train the item similarity vector containing the user’s preference,and then the graph neural network is used to learn the feature vector of the user and the item to predict the score.A large number of experiments are conducted on the Epinions and Ciao data sets,and the performance of the proposed algorithm is measured by error-based indicators (MAE and RMSE),and compared with other algorithms to verify its performance.Experimental results show that compared with other algorithms,the proposed algorithm had smaller scoring prediction error and better recommendation effect.

Key words: Node2vec, Graph neural network, Trust recommendation, Social network, Recommendation system

CLC Number: 

  • TP391
[1]ZHOU W Z,CAO D,XU Y F,et al.Review of Recommendation System Research[J].Journal of Hebei University of Science and Technology,2020,41(1):76-87.
[2]DU D F,XU T,LU Y N,et al.User Rating Prediction Based on Probability Matrix Decomposition under Trust Mechanism[J].Journal of Software,2018,29(12):3747-3763.
[3]WANG G X,LIU H P.Summary of personalized recommendation system[J].Computer Engineering and Applications,2012,48(7):66-76.
[4]JANNACH D,ZANKER M,FELFERNIG A,et al.Recommender Systems:An Introduction[M].Cambridge University Press,2010.
[5]MA W K,LI G,LI Z Y,et al.A Top-N personalized recommendation algorithm based on tags[J].Computer Science,2019,46(S2):224-229.
[6]CHEN H.The Impact of Comments and Recommendation System on Online Shopper Buying Behaviour[J].Journal of Networks,2012,7(2):345-350.
[7]GUO L,MA J,CHEN Z M.A social recommendation algorithm sensitive to the strength of trust relationship[J].Computer Research and Development,2013,50(9):1805-1813.
[8]LI Y S,SONG M N,E H H,et al.Social recommendation algorithm fusing user interest social network[J].Journal of China Universities of Posts & Telecommunications,2014,21(14):26-33.
[9]WANG W H,ZENG Y.Collaborative filtering recommendation algorithm based on clustering and user preference[J].Computer Engineering and Applications,2020,56(3):68-73.
[10]MA H,YANG H X,LYU M R,et al.SoRec:social recommendation using probabilistic matrix factorization[C]//Proceedings of the 17th ACM Conference on Information and Knowledge Management.Association for Computing Machinery,2008:931-940.
[11]JAMALI M,ESTER M.A matrix factorization technique with trust propagation for recommendation in social networks[C]//Proceedings of the fourth ACM conference on Recommender systems.Association for Computing Machinery,2010:135-142.
[12]XIANG C G,XIONG S H,WANG D,et al.Social Friend Re-commendation Algorithm Based onAssociation Rules and Simila-rity[J].Computer Engineering,2019,45(4):175-180.
[13]LONG Z Y,CHEN Z G,XU C L.Social Network Friend Re-commendation Algorithm Based on User Interaction[J].Compu-ter Engineering,2019,45(3):132-137.
[14]HAN N,QIAO S J,YUAN C A,et al.A Fast Parallel Community Detection Algorithm for Mobile Social Networks[J].Journal of Chongqing University of Technology(Natural Science),2020,34( 1):94-102.
[15]PAN Y T,HE F Z,YU H P.A social recommendation algo-rithm based on implicit similarity of trust relationships[J].Chinese Journal of Computers,2018,41(1):65-81.
[16]HUANG L W,JIANG B T,LV S Y,et al.Research review of recommendation system based on deep learning[J].Chinese Journal of Computers,2018,41(7):1619-1647.
[17]SALAKHUTDINOV R,MNIH A.Probabilistic Matrix Factorization[C]//Proceedings of the 20th International Conference on Neural Information Processing Systems.2007:1257-1264.
[18]MA H,ZHOU D,LIU C,et al.Recommendation system with social regularization[C]//Proceedings of the 4thACM International Conference on Web Search and Data Mining.Hong Kong,China,2011:287-296.
[19]YANG B,LEI Y,LIU J,et al.Social collaborative filtering bytrust[J].IEEE Transactions on Software Engineering,2016,39(8):1633-1647.
[20]FAN W Q,LI Q,CHENG M.Deep modeling of social relations for recommendation[C]//Proceedings of the AAAI Conference on Artificial Intelligence.2018:8075-8076.
[21]FAN W Q,MA Y,LI Q,et al.Graph Neural Networks for Social Recommendation[C]//The World Wide Web Conference.Association for Computing Machinery,2019:417-426.
[1] LI Yong, WU Jing-peng, ZHANG Zhong-ying, ZHANG Qiang. Link Prediction for Node Featureless Networks Based on Faster Attention Mechanism [J]. Computer Science, 2022, 49(4): 43-48.
[2] CHANG Ya-wen, YANG Bo, GAO Yue-lin, HUANG Jing-yun. Modeling and Analysis of WeChat Official Account Information Dissemination Based on SEIR [J]. Computer Science, 2022, 49(4): 56-66.
[3] ZUO Yuan-lin, GONG Yue-jiao, CHEN Wei-neng. Budget-aware Influence Maximization in Social Networks [J]. Computer Science, 2022, 49(4): 100-109.
[4] CAO He-xin, ZHAO Liang, LI Xue-feng. Technical Research of Graph Neural Network for Text-to-SQL Parsing [J]. Computer Science, 2022, 49(4): 110-115.
[5] MIAO Xu-peng, ZHOU Yue, SHAO Ying-xia, CUI Bin. GSO:A GNN-based Deep Learning Computation Graph Substitutions Optimization Framework [J]. Computer Science, 2022, 49(3): 86-91.
[6] GUO Lei, MA Ting-huai. Friend Closeness Based User Matching [J]. Computer Science, 2022, 49(3): 113-120.
[7] SHAO Yu, CHEN Ling, LIU Wei. Maximum Likelihood-based Method for Locating Source of Negative Influence Spreading Under Independent Cascade Model [J]. Computer Science, 2022, 49(2): 204-215.
[8] CHEN Jin-peng, HU Ha-lei, ZHANG Fan, CAO Yuan, SUN Peng-fei. Convolutional Sequential Recommendation with Temporal Feature and User Preference [J]. Computer Science, 2022, 49(1): 115-120.
[9] LIU Wen-yang, GUO Yan-bu, LI Wei-hua. Identifying Essential Proteins by Hybrid Deep Learning Model [J]. Computer Science, 2021, 48(8): 240-245.
[10] WANG Jian, WANG Yu-cui, HUANG Meng-jie. False Information in Social Networks:Definition,Detection and Control [J]. Computer Science, 2021, 48(8): 263-277.
[11] TAN Qi, ZHANG Feng-li, WANG Ting, WANG Rui-jin, ZHOU Shi-jie. Social Network User Influence Evaluation Algorithm Integrating Structure Centrality [J]. Computer Science, 2021, 48(7): 124-129.
[12] ZHAN Wan-jiang, HONG Zhi-lin, FANG Lu-ping, WU Zhe-fu, LYU Yue-hua. Collaborative Filtering Recommendation Algorithm Based on Adversarial Learning [J]. Computer Science, 2021, 48(7): 172-177.
[13] ZHANG Ren-zhi, ZHU Yan. Malicious User Detection Method for Social Network Based on Active Learning [J]. Computer Science, 2021, 48(6): 332-337.
[14] YU Sheng, LI Bin, SUN Xiao-bing, BO Li-li, ZHOU Cheng. Approach for Knowledge-driven Similar Bug Report Recommendation [J]. Computer Science, 2021, 48(5): 91-98.
[15] LI Si-di, GUO Bing-hui, YANG Xiao-bo. Study on Financial Credit Information Based on Graph Neural Network [J]. Computer Science, 2021, 48(4): 85-90.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] ZHAO Li-bo, LIU Qi, FU Fang-ling and HE Ling. Automatic Detection of Hypernasality Grades Based on Discrete Wavelet Transformation and Cepstrum Analysis[J]. Computer Science, 2018, 45(4): 278 -284 .
[2] LU Yan-li, LEI Ying-jie and ZHOU Wei. Generalized Intuitionistic Fuzzy Rough Set Model[J]. Computer Science, 2017, 44(7): 232 -236 .
[3] LIU Yi and GU Guo-sheng. New Mutual Authentication for Lightweight RFID Protocols[J]. Computer Science, 2017, 44(2): 206 -208 .
[4] XU Xin-li, LV Qi, WANG Wan-liang and HUANGFU Xiao-jie. Clustering Routing Algorithm for Heterogeneous Wireless Sensor Networks with Self-supplying Nodes[J]. Computer Science, 2017, 44(1): 134 -139 .
[5] FANG Juan and CHEN Xin. Research of Reconfigurable Cache Method for Power Calculation in CMP[J]. Computer Science, 2014, 41(Z6): 114 -117 .
[6] JIN Jing. Research on Optimization of Sorting Algorithm under MapReduce[J]. Computer Science, 2014, 41(12): 155 -159 .
[7] ZHAI Cui-hong and QIN Ke-yun. Approximate Reduction for Objects in Inconsistent Decision Tables[J]. Computer Science, 2014, 41(3): 245 -248 .
[8] HAO Yun-chao and WANG Xian-min. Parallel Acceleration Method for Very High Resolution Remote Sensing Image Registration[J]. Computer Science, 2015, 42(9): 29 -32 .
[9] XUE Ming XU De-gang. Anti Congestion Vehicle Path Planning Algorithm Based on Cloud Grid Integrated Scheduling[J]. Computer Science, 2015, 42(7): 295 -299 .
[10] LIU Chuan-ling,LEI Yan,YANG Jing-yu. Path Planning Method of Mobile Robot Based on Quantum Genetic Algorithm[J]. Computer Science, 2011, 38(8): 208 -211 .