SlideShare a Scribd company logo
Heterogeneous Information Network Embedding for
Recommendation
ABSTRACT:
Due to the flexibility in modelling data heterogeneity, heterogeneous information
network (HIN) has been adopted to characterize complex and heterogeneous
auxiliary data in recommender systems, called HIN based recommendation. It is
challenging to develop effective methods for HIN based recommendation in both
extraction and exploitation of the information from HINs. Most of HIN based
recommendation methods rely on path based similarity, which cannot fully mine
latent structure features of users and items. In this paper, we propose a novel
heterogeneous network embedding based approach for HIN based
recommendation, called HERec. To embed HINs, we design a meta-path based
random walk strategy to generate meaningful node sequences for network
embedding. The learned node embeddings are first transformed by a set of fusion
functions, and subsequently integrated into an extended matrix factorization (MF)
model. The extended MF model together with fusion functions are jointly
optimized for the rating prediction task. Extensive experiments on three real-world
datasets demonstrate the effectiveness of the HERec model. Moreover, we show
the capability of the HERec model for the cold-start problem, and reveal that the
transformed embedding information from HINs can improve the recommendation
performance.
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
 System : Pentium Dual Core.
 Hard Disk : 120 GB.
 Monitor : 15’’ LED
 Input Devices : Keyboard, Mouse
 Ram : 1 GB
SOFTWARE REQUIREMENTS:
 Operating system : Windows 7.
 Coding Language : JAVA.
 Tool : Netbeans 7.2.1
 Database : MYSQL
REFERENCE:
Chuan Shi, Member, IEEE, Binbin Hu, Wayne Xin Zhao Member, IEEE and
Philip S. Yu, Fellow, IEEE, “Heterogeneous Information Network Embedding for
Recommendation”, IEEE Transactions on Knowledge and Data Engineering,
Volume: 31 , Issue: 2 , Feb. 1 2019.

More Related Content

What's hot

Multiple Sequence Alignment Tool Using NCBI COBALT
Multiple Sequence Alignment Tool Using NCBI COBALTMultiple Sequence Alignment Tool Using NCBI COBALT
Multiple Sequence Alignment Tool Using NCBI COBALT
Mohsin Raza
 
multiple sequence alignment
multiple sequence alignmentmultiple sequence alignment
multiple sequence alignment
harshita agarwal
 
Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data Fusion
IRJET Journal
 
Master Thesis Abstract
Master Thesis AbstractMaster Thesis Abstract
Master Thesis AbstractBruno Dzogovic
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysis
inventy
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
Dinusha Dilanka
 
Network topology
Network topologyNetwork topology
Network topology
SupriyaDebnath6
 
Clustal W - Multiple Sequence alignment
Clustal W - Multiple Sequence alignment   Clustal W - Multiple Sequence alignment
Clustal W - Multiple Sequence alignment
The Oxford College Engineering
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
IOSR Journals
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
IJERA Editor
 
New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...
TELKOMNIKA JOURNAL
 
Multiple Sequence Alignment
Multiple Sequence AlignmentMultiple Sequence Alignment
Multiple Sequence Alignment
Meghaj Mallick
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detection
ieeepondy
 
Formal Models for Context Aware Computing
Formal Models for Context Aware ComputingFormal Models for Context Aware Computing
Formal Models for Context Aware Computing
Editor IJCATR
 
Computer network topology
Computer network topologyComputer network topology
Computer network topology
MH Shihab
 
Network topologies
Network topologiesNetwork topologies
Network topologies
abyeeng
 
Drug discovery presentation
Drug discovery presentationDrug discovery presentation
Drug discovery presentation
Theertha Raveendran
 

What's hot (19)

Multiple Sequence Alignment Tool Using NCBI COBALT
Multiple Sequence Alignment Tool Using NCBI COBALTMultiple Sequence Alignment Tool Using NCBI COBALT
Multiple Sequence Alignment Tool Using NCBI COBALT
 
multiple sequence alignment
multiple sequence alignmentmultiple sequence alignment
multiple sequence alignment
 
Cross Domain Data Fusion
Cross Domain Data FusionCross Domain Data Fusion
Cross Domain Data Fusion
 
Master Thesis Abstract
Master Thesis AbstractMaster Thesis Abstract
Master Thesis Abstract
 
Web Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering AnalysisWeb Based Fuzzy Clustering Analysis
Web Based Fuzzy Clustering Analysis
 
pmic7074
pmic7074pmic7074
pmic7074
 
Performance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning AlgorithmsPerformance Comparision of Machine Learning Algorithms
Performance Comparision of Machine Learning Algorithms
 
Network topology
Network topologyNetwork topology
Network topology
 
Clustal W - Multiple Sequence alignment
Clustal W - Multiple Sequence alignment   Clustal W - Multiple Sequence alignment
Clustal W - Multiple Sequence alignment
 
Comparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data AnalysisComparison Between Clustering Algorithms for Microarray Data Analysis
Comparison Between Clustering Algorithms for Microarray Data Analysis
 
Dp33701704
Dp33701704Dp33701704
Dp33701704
 
New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...New prediction method for data spreading in social networks based on machine ...
New prediction method for data spreading in social networks based on machine ...
 
Multiple Sequence Alignment
Multiple Sequence AlignmentMultiple Sequence Alignment
Multiple Sequence Alignment
 
Progressive duplicate detection
Progressive duplicate detectionProgressive duplicate detection
Progressive duplicate detection
 
Bioinformatics
BioinformaticsBioinformatics
Bioinformatics
 
Formal Models for Context Aware Computing
Formal Models for Context Aware ComputingFormal Models for Context Aware Computing
Formal Models for Context Aware Computing
 
Computer network topology
Computer network topologyComputer network topology
Computer network topology
 
Network topologies
Network topologiesNetwork topologies
Network topologies
 
Drug discovery presentation
Drug discovery presentationDrug discovery presentation
Drug discovery presentation
 

Similar to Heterogeneous Information Network Embedding for Recommendation

An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...
An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...
An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...
IJCI JOURNAL
 
Introduction_PPT.pptx
Introduction_PPT.pptxIntroduction_PPT.pptx
Introduction_PPT.pptx
tariqqureshi33
 
Evaluation of Different Machine.pptx
Evaluation of Different Machine.pptxEvaluation of Different Machine.pptx
Evaluation of Different Machine.pptx
tariqqureshi33
 
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MININGPATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
IJDKP
 
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
RSIS International
 
Automated-tuned hyper-parameter deep neural network by using arithmetic optim...
Automated-tuned hyper-parameter deep neural network by using arithmetic optim...Automated-tuned hyper-parameter deep neural network by using arithmetic optim...
Automated-tuned hyper-parameter deep neural network by using arithmetic optim...
IJECEIAES
 
COMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATA
COMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATACOMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATA
COMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATA
cscpconf
 
Combined mining approach to generate patterns for complex data
Combined mining approach to generate patterns for complex dataCombined mining approach to generate patterns for complex data
Combined mining approach to generate patterns for complex data
csandit
 
Clustering heterogeneous categorical data using enhanced mini batch K-means ...
Clustering heterogeneous categorical data using enhanced mini  batch K-means ...Clustering heterogeneous categorical data using enhanced mini  batch K-means ...
Clustering heterogeneous categorical data using enhanced mini batch K-means ...
IJECEIAES
 
Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...
TELKOMNIKA JOURNAL
 
E0322035037
E0322035037E0322035037
E0322035037
inventionjournals
 
Sensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approachSensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approach
IJECEIAES
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
IJSRD
 
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
ssuser4b1f48
 
Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013
Yueshen Xu
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Shakas Technologies
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Shakas Technologies
 
Keyword Query Routing
Keyword Query RoutingKeyword Query Routing
Keyword Query Routing
SWAMI06
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
redpel dot com
 

Similar to Heterogeneous Information Network Embedding for Recommendation (20)

An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...
An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...
An Ensemble Approach To Improve Homomorphic Encrypted Data Classification Per...
 
50120140506002
5012014050600250120140506002
50120140506002
 
Introduction_PPT.pptx
Introduction_PPT.pptxIntroduction_PPT.pptx
Introduction_PPT.pptx
 
Evaluation of Different Machine.pptx
Evaluation of Different Machine.pptxEvaluation of Different Machine.pptx
Evaluation of Different Machine.pptx
 
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MININGPATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
PATTERN GENERATION FOR COMPLEX DATA USING HYBRID MINING
 
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
Efficient Image Retrieval by Multi-view Alignment Technique with Non Negative...
 
Automated-tuned hyper-parameter deep neural network by using arithmetic optim...
Automated-tuned hyper-parameter deep neural network by using arithmetic optim...Automated-tuned hyper-parameter deep neural network by using arithmetic optim...
Automated-tuned hyper-parameter deep neural network by using arithmetic optim...
 
COMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATA
COMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATACOMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATA
COMBINED MINING APPROACH TO GENERATE PATTERNS FOR COMPLEX DATA
 
Combined mining approach to generate patterns for complex data
Combined mining approach to generate patterns for complex dataCombined mining approach to generate patterns for complex data
Combined mining approach to generate patterns for complex data
 
Clustering heterogeneous categorical data using enhanced mini batch K-means ...
Clustering heterogeneous categorical data using enhanced mini  batch K-means ...Clustering heterogeneous categorical data using enhanced mini  batch K-means ...
Clustering heterogeneous categorical data using enhanced mini batch K-means ...
 
Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...Big data cloud-based recommendation system using NLP techniques with machine ...
Big data cloud-based recommendation system using NLP techniques with machine ...
 
E0322035037
E0322035037E0322035037
E0322035037
 
Sensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approachSensing complicated meanings from unstructured data: a novel hybrid approach
Sensing complicated meanings from unstructured data: a novel hybrid approach
 
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
A Novel Approach for Travel Package Recommendation Using Probabilistic Matrix...
 
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...NS-CUK Seminar: H.B.Kim,  Review on "metapath2vec: Scalable representation le...
NS-CUK Seminar: H.B.Kim, Review on "metapath2vec: Scalable representation le...
 
Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013Summary on the Conference of WISE 2013
Summary on the Conference of WISE 2013
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
 
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docxAbnormal Traffic Detection Based on Attention and Big Step Convolution.docx
Abnormal Traffic Detection Based on Attention and Big Step Convolution.docx
 
Keyword Query Routing
Keyword Query RoutingKeyword Query Routing
Keyword Query Routing
 
Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...Concept of node usage probability from complex networks and its applications ...
Concept of node usage probability from complex networks and its applications ...
 

More from JAYAPRAKASH JPINFOTECH

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
JAYAPRAKASH JPINFOTECH
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
JAYAPRAKASH JPINFOTECH
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
JAYAPRAKASH JPINFOTECH
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
JAYAPRAKASH JPINFOTECH
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
JAYAPRAKASH JPINFOTECH
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine Learning
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
JAYAPRAKASH JPINFOTECH
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
JAYAPRAKASH JPINFOTECH
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
JAYAPRAKASH JPINFOTECH
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of Fertilizers
JAYAPRAKASH JPINFOTECH
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender System
JAYAPRAKASH JPINFOTECH
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
JAYAPRAKASH JPINFOTECH
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
JAYAPRAKASH JPINFOTECH
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETs
JAYAPRAKASH JPINFOTECH
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
JAYAPRAKASH JPINFOTECH
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
JAYAPRAKASH JPINFOTECH
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
JAYAPRAKASH JPINFOTECH
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
JAYAPRAKASH JPINFOTECH
 

More from JAYAPRAKASH JPINFOTECH (20)

Java Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdfJava Web Application Project Titles 2023-2024.pdf
Java Web Application Project Titles 2023-2024.pdf
 
Dot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdfDot Net Final Year IEEE Project Titles.pdf
Dot Net Final Year IEEE Project Titles.pdf
 
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdfMATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
MATLAB Final Year IEEE Project Titles 2023 - 2024.pdf
 
Python IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdfPython IEEE Project Titles 2023 - 2024.pdf
Python IEEE Project Titles 2023 - 2024.pdf
 
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...Python ieee project titles 2021 -  2022 | Machine Learning Final Year Project...
Python ieee project titles 2021 - 2022 | Machine Learning Final Year Project...
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
Sentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine LearningSentiment Classification using N-gram IDF and Automated Machine Learning
Sentiment Classification using N-gram IDF and Automated Machine Learning
 
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
Privacy-Preserving Social Media DataPublishing for Personalized Ranking-Based...
 
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep LearningFunkR-pDAE: Personalized Project Recommendation Using Deep Learning
FunkR-pDAE: Personalized Project Recommendation Using Deep Learning
 
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
Discovering the Type 2 Diabetes in Electronic Health Records using the Sparse...
 
Crop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of FertilizersCrop Yield Prediction and Efficient use of Fertilizers
Crop Yield Prediction and Efficient use of Fertilizers
 
Collaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender SystemCollaborative Filtering-based Electricity Plan Recommender System
Collaborative Filtering-based Electricity Plan Recommender System
 
Achieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data MarketsAchieving Data Truthfulness and Privacy Preservation in Data Markets
Achieving Data Truthfulness and Privacy Preservation in Data Markets
 
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
V2V Routing in a VANET Based on the Auto regressive Integrated Moving Average...
 
Towards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETsTowards Fast and Reliable Multi-hop Routing in VANETs
Towards Fast and Reliable Multi-hop Routing in VANETs
 
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
Selective Authentication Based Geographic Opportunistic Routing in Wireless S...
 
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc NetworksRobust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
Robust Defense Scheme Against Selective DropAttack in Wireless Ad Hoc Networks
 
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
Privacy-Preserving Cloud-based Road Condition Monitoring with Source Authenti...
 
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc NetworksNovel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
Novel Intrusion Detection and Prevention for Mobile Ad Hoc Networks
 
Node-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor NetworksNode-Level Trust Evaluation in Wireless Sensor Networks
Node-Level Trust Evaluation in Wireless Sensor Networks
 

Recently uploaded

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

Heterogeneous Information Network Embedding for Recommendation

  • 1. Heterogeneous Information Network Embedding for Recommendation ABSTRACT: Due to the flexibility in modelling data heterogeneity, heterogeneous information network (HIN) has been adopted to characterize complex and heterogeneous auxiliary data in recommender systems, called HIN based recommendation. It is challenging to develop effective methods for HIN based recommendation in both extraction and exploitation of the information from HINs. Most of HIN based recommendation methods rely on path based similarity, which cannot fully mine latent structure features of users and items. In this paper, we propose a novel heterogeneous network embedding based approach for HIN based recommendation, called HERec. To embed HINs, we design a meta-path based random walk strategy to generate meaningful node sequences for network embedding. The learned node embeddings are first transformed by a set of fusion functions, and subsequently integrated into an extended matrix factorization (MF) model. The extended MF model together with fusion functions are jointly optimized for the rating prediction task. Extensive experiments on three real-world datasets demonstrate the effectiveness of the HERec model. Moreover, we show the capability of the HERec model for the cold-start problem, and reveal that the transformed embedding information from HINs can improve the recommendation performance. SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 2.  System : Pentium Dual Core.  Hard Disk : 120 GB.  Monitor : 15’’ LED  Input Devices : Keyboard, Mouse  Ram : 1 GB SOFTWARE REQUIREMENTS:  Operating system : Windows 7.  Coding Language : JAVA.  Tool : Netbeans 7.2.1  Database : MYSQL REFERENCE: Chuan Shi, Member, IEEE, Binbin Hu, Wayne Xin Zhao Member, IEEE and Philip S. Yu, Fellow, IEEE, “Heterogeneous Information Network Embedding for Recommendation”, IEEE Transactions on Knowledge and Data Engineering, Volume: 31 , Issue: 2 , Feb. 1 2019.