• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jia Dongyan and Zhang Fuzhi. A Collaborative Filtering Recommendation Algorithm Based on Double Neighbor Choosing Strategy[J]. Journal of Computer Research and Development, 2013, 50(5): 1076-1084.
Citation: Jia Dongyan and Zhang Fuzhi. A Collaborative Filtering Recommendation Algorithm Based on Double Neighbor Choosing Strategy[J]. Journal of Computer Research and Development, 2013, 50(5): 1076-1084.

A Collaborative Filtering Recommendation Algorithm Based on Double Neighbor Choosing Strategy

More Information
  • Published Date: May 14, 2013
  • Collaborative filtering is the most successful and widely used recommendation technology in E-commerce recommender system. It can recommend products for users by collecting the preference information of similar users. However, the traditional collaborative filtering recommendation algorithms have the disadvantages of lower recommendation precision and weaker capability of attack-resistance. In order to solve the problems, a collaborative filtering recommendation algorithm based on double neighbor choosing strategy is proposed. Firstly, on the basis of the computational result of user similarity, the preference similar users of target user are chosen dynamically. Then the trust computing model is designed to measure the trust relation between users according to the ratings of similar users. The trustworthy neighbor set of target user is selected in accordance with the degree of trust between users. Finally, a novel collaborative filtering recommendation algorithm based on the double neighbor choosing strategy is designed to generate recommendation for the target user. Using the MovieLens and Netflix dataset, the performance of the novel algorithm is compared with that of others from both sides of recommendation precision and the capability of attack-resistance. Experimental results show that compared with the existing algorithms, the proposed algorithm not only improves the recommendation precision, but also resists the malicious users effectively.
  • Related Articles

    [1]Wang Xianghai, Zhang Wenya, Xing Junyu, Lü Fang, Mu Zhenhua. High-order Caputo Fractional Order Differential Operator and Its Application in Image Enhancement[J]. Journal of Computer Research and Development, 2023, 60(2): 448-464. DOI: 10.7544/issn1000-1239.202110942
    [2]Liu Yanxiao, Wu Ping, Sun Qindong. Secret Image Sharing Schemes Based on Region Convolution Neural Network[J]. Journal of Computer Research and Development, 2021, 58(5): 1065-1074. DOI: 10.7544/issn1000-1239.2021.20200898
    [3]Ren Weixiang, Zhai Liming, Wang Lina, Jia Ju. Reference Image Generation Algorithm for JPEG Image Steganalysis Based on Convolutional Neural Network[J]. Journal of Computer Research and Development, 2019, 56(10): 2250-2261. DOI: 10.7544/issn1000-1239.2019.20190386
    [4]Wang Yilei, Zhuo Yifan, Wu Yingjie, Chen Mingqin. Question Answering Algorithm on Image Fragmentation Information Based on Deep Neural Network[J]. Journal of Computer Research and Development, 2018, 55(12): 2600-2610. DOI: 10.7544/issn1000-1239.2018.20180606
    [5]Zhou Yucong, Liu Yi, Wang Rui. Training Deep Neural Networks for Image Applications with Noisy Labels by Complementary Learning[J]. Journal of Computer Research and Development, 2017, 54(12): 2649-2659. DOI: 10.7544/issn1000-1239.2017.20170637
    [6]Shen Huanghui, Wang Zhensong, Zheng Weimin. An Efficient Memory Access Strategy for Transposition and Block Operation in Image Processing[J]. Journal of Computer Research and Development, 2013, 50(1): 188-196.
    [7]Ye Jianhong, Song Wen, Sun Shixin. Operating and Analyzing the Reproducibility of Empty Marking Nets[J]. Journal of Computer Research and Development, 2009, 46(8): 1378-1385.
    [8]Bai Chenggang, Su Liang, Zhao Yingchun, Guo Junhong, and Cai Kaiyuan. Is the Reliability of Web Services Related to the Change Rate of Operational Profiles[J]. Journal of Computer Research and Development, 2008, 45(12): 2044-2051.
    [9]Zheng Qingfang, Gao Wen. Adaptive Skin Detection in JPEG Compressed Images[J]. Journal of Computer Research and Development, 2006, 43(7): 1194-1200.
    [10]Bao Fumin, Li Aiguo, Qin Zheng. Image Fusion Using SGNN[J]. Journal of Computer Research and Development, 2005, 42(3).

Catalog

    Article views (1120) PDF downloads (1147) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return