J4 ›› 2013, Vol. 48 ›› Issue (11): 73-79.

• Articles • Previous Articles     Next Articles

The method of latent friend recommendation based on the trust relations

HUANG Liang, DU Yong-ping   

  1. College of Computer Science, Beijing University of Technology, Beijing 100124, China
  • Received:2013-09-02 Online:2013-11-20 Published:2013-11-25

Abstract:

E-commerce has greatly changed people′s daily activity and consumption behavior. Mining the potential platform friends effectively has become an important demand for services in the e-commerce. We present an approach for the friend recommendation by the consideration of user interest factors and trust factors. The mixed trust network is designed and built and it contains the authority value and the trust information between the users. In order to achieve personalized friend recommendation, the trust evaluation value and the similarity value based on the interest are combined to measure the association between the users. The experiment on the Epinions dataset is carried  and the  precision, recall and F-value are used as the evaluation metric. Compared to other system of precision 10%~15% and recall 10%~20%,  the best performance of precision 22.47% and recall 21.15%. The results show that the proposed method effectively improves the recommended performance.

Key words: authority trust; trust computing; friend recommendation

CLC Number: 

  • TP391
[1] LIU Ya-hui1, 2, LIU Chun-yang3*, ZHANG Tie-ying1, CHENG Xue-qi1. An overview of graph indexing technology [J]. J4, 2013, 48(11): 44-52.
[2] YU Ran 1,2, LIU Chun-yang3*, JIN Xiao-long 1, WANG Yuan-zhuo 1, CHENG Xue-qi 1. Chinese spam microblog filtering based on the fusion of
multi-angle features
[J]. J4, 2013, 48(11): 53-58.
[3] ZHENG Jian-xing, ZHANG Bo-feng*, YUE Xiao-dong, CHENG Ze-yu. Research on themes recommendation in microblogging
scenario based on neighbor-user profile
[J]. J4, 2013, 48(11): 59-65.
[4] PENG Qing-xi, QIAN Tie-yun. Store review spam detection based on quantitative sentiment [J]. J4, 2013, 48(11): 66-72.
[5] ZHANG Nai-zhou1, CAO Wei 2, CHEN Ke-rui 1, LI Shi-jun3. A temporal-aware model for search engine [J]. J4, 2013, 48(11): 80-86.
[6] CHEN Ke-rui, PAN Jun. Multi-source data fusion based on the expand vector space model [J]. J4, 2013, 48(11): 87-92.
[7] FANG Zhi-jun, LIU Xin-yun, WU Shi-qian, ZHENG Wen-juan. The multi-scale retinex algorithm for image enhancement based on
sub-band weighting fusion
[J]. J4, 2013, 48(11): 93-98.
[8] LIU Wu-ying, YI Mian-zhu, ZHANG Xing. A space-time-efficient multi-category text categorization algorithm [J]. J4, 2013, 48(11): 99-104.
[9] LI Yu-Qian, LIU Lin, LI Jin-Bing. Superposition principle of gray histograms in video analysis [J]. J4, 2009, 44(11): 63-67.
[10] XIE Hua, LIN Chang-Yuan, LIN Xue-Fang. Onedirection rough relations and security of data communication [J]. J4, 2009, 44(9): 93-96.
[11] XU Jie-ping1, YIN Hong-yu1, FAN Zi-wen2. Study on cover songs identification based on phrase content [J]. J4, 2013, 48(7): 68-71.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!