scholarly journals A Collaborative Filtering Algorithm with Intragroup Divergence for POI Group Recommendation

2021 ◽  
Vol 11 (12) ◽  
pp. 5416
Author(s):  
Yanheng Liu ◽  
Minghao Yin ◽  
Xu Zhou

The purpose of POI group recommendation is to generate a recommendation list of locations for a group of users. Most of the current studies first conduct personal recommendation and then use recommendation strategies to integrate individual recommendation results. Few studies consider the divergence of groups. To improve the precision of recommendations, we propose a POI group recommendation method based on collaborative filtering with intragroup divergence in this paper. Firstly, user preference vector is constructed based on the preference of the user on time and category. Furthermore, a computation method similar to TF-IDF is presented to compute the degree of preference of the user to the category. Secondly, we establish a group feature preference model, and the similarity of the group and other users’ feature preference is obtained based on the check-ins. Thirdly, the intragroup divergence of POIs is measured according to the POI preference of group members and their friends. Finally, the preference rating of the group for each location is calculated based on a collaborative filtering method and intragroup divergence computation, and the top-ranked score of locations are the recommendation results for the group. Experiments have been conducted on two LBSN datasets, and the experimental results on precision and recall show that the performance of the proposed method is superior to other methods.

2014 ◽  
Vol 651-653 ◽  
pp. 1761-1766
Author(s):  
Lei Zheng

In this paper detection method for the illegal access to the cloud infrastructure is proposed. Detection process is based on the collaborative filtering algorithm constructed on the cloud model. Here, first of all, the normal behavior of the user is formed in the shape of a cloud model, then these models are compared with each other by using the cosine similarity method and by applying the collaborative filtering method the deviations from the normal behavior are evaluated. If the deviation value is above than the threshold, the user who gained access to the system is evaluated as illegal, otherwise he is evaluated as a real user.


2016 ◽  
Vol 45 (2) ◽  
pp. 230-240 ◽  
Author(s):  
Jia Zhang ◽  
Yaojin Lin ◽  
Menglei Lin ◽  
Jinghua Liu

Sign in / Sign up

Export Citation Format

Share Document