SlideShare a Scribd company logo
1 of 27
Social Trust-Aware Recommendation System: A T-index Approach Alireza Zarghami  Soude Fazeli Nima Dokoohaki Mihhail Matskin Presented at Workshop on Web Personalization, Reputation and Recommender Systems ( WPRRS’09 ) In conjunction with  IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology ( WI’09  and IAT’09). September 2009
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Agenda
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Collaborative Filtering heuristics
[object Object],[object Object],[object Object],[object Object],[object Object],Contribution
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],TopTrustee/ T-index
TopTrustee Idea Depicted ,[object Object],[object Object]
T-index Idea Depicted ,[object Object],[object Object],[object Object],[object Object],[object Object]
Ontological Model ,[object Object],[object Object]
User Ontology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Item Ontology ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Trust Metric and Calculation
Transposure of Trustee Rating ,[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],Trust Computation
[object Object],[object Object],Trust Propagation
Collecting Recommendation for users ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Recommendation – traversal path length ,[object Object],[object Object]
Recommendation Prediction ,[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Experiment - Dataset
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Experiment  Types / Parameters
Coverage
MAE
Indegree distribution most trustworthy users
Trust network visualization Configuration: n=3 m=3 T-index=0
Trust network visualization Configuration: n=3 m=3 T-index=100
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Conclusion
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Questions
[object Object],[object Object],[object Object],[object Object],Presenter

More Related Content

What's hot

INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossainwebuploader
 
Data Mining In Social Networks Using K-Means Clustering Algorithm
Data Mining In Social Networks Using K-Means Clustering AlgorithmData Mining In Social Networks Using K-Means Clustering Algorithm
Data Mining In Social Networks Using K-Means Clustering Algorithmnishant24894
 
Hybrid sentiment and network analysis of social opinion polarization icoict
Hybrid sentiment and network analysis of social opinion polarization   icoictHybrid sentiment and network analysis of social opinion polarization   icoict
Hybrid sentiment and network analysis of social opinion polarization icoictAndry Alamsyah
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS IAEME Publication
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...ecwayerode
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering ShowcaseTucker Truesdale
 
The Influence of Multimedia on Recommender System User's Perceptions of Syste...
The Influence of Multimedia on Recommender System User's Perceptions of Syste...The Influence of Multimedia on Recommender System User's Perceptions of Syste...
The Influence of Multimedia on Recommender System User's Perceptions of Syste...Ashley Farrell
 
Survey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POISurvey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POIIRJET Journal
 
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...pharmaindexing
 
Finding Pattern in Dynamic Network Analysis
Finding Pattern in Dynamic Network AnalysisFinding Pattern in Dynamic Network Analysis
Finding Pattern in Dynamic Network AnalysisAndry Alamsyah
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET Journal
 
IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...
IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...
IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...IRJET Journal
 
Questions about questions
Questions about questionsQuestions about questions
Questions about questionsmoresmile
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSijait
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYaciijournal
 
Automatic vs. human question answering over multimedia meeting recordings
Automatic vs. human question answering over multimedia meeting recordingsAutomatic vs. human question answering over multimedia meeting recordings
Automatic vs. human question answering over multimedia meeting recordingsLê Anh
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanvenkatramanJ4
 

What's hot (20)

INFO4990_Hossain
INFO4990_HossainINFO4990_Hossain
INFO4990_Hossain
 
Data Mining In Social Networks Using K-Means Clustering Algorithm
Data Mining In Social Networks Using K-Means Clustering AlgorithmData Mining In Social Networks Using K-Means Clustering Algorithm
Data Mining In Social Networks Using K-Means Clustering Algorithm
 
Hybrid sentiment and network analysis of social opinion polarization icoict
Hybrid sentiment and network analysis of social opinion polarization   icoictHybrid sentiment and network analysis of social opinion polarization   icoict
Hybrid sentiment and network analysis of social opinion polarization icoict
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
 
Java on exploiting transient social contact patterns for data forwarding in ...
Java  on exploiting transient social contact patterns for data forwarding in ...Java  on exploiting transient social contact patterns for data forwarding in ...
Java on exploiting transient social contact patterns for data forwarding in ...
 
Final Poster for Engineering Showcase
Final Poster for Engineering ShowcaseFinal Poster for Engineering Showcase
Final Poster for Engineering Showcase
 
56
5656
56
 
The Influence of Multimedia on Recommender System User's Perceptions of Syste...
The Influence of Multimedia on Recommender System User's Perceptions of Syste...The Influence of Multimedia on Recommender System User's Perceptions of Syste...
The Influence of Multimedia on Recommender System User's Perceptions of Syste...
 
Survey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POISurvey on Location Based Recommendation System Using POI
Survey on Location Based Recommendation System Using POI
 
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
TWO WAY CHAINED PACKETS MARKING TECHNIQUE FOR SECURE COMMUNICATION IN WIRELES...
 
Finding Pattern in Dynamic Network Analysis
Finding Pattern in Dynamic Network AnalysisFinding Pattern in Dynamic Network Analysis
Finding Pattern in Dynamic Network Analysis
 
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality DataIRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
IRJET- Quantify Mutually Dependent Privacy Risks with Locality Data
 
IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...
IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...
IRJET - Sentiment Analysis for Marketing and Product Review using a Hybrid Ap...
 
Abstract
AbstractAbstract
Abstract
 
Questions about questions
Questions about questionsQuestions about questions
Questions about questions
 
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERSA QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
A QUERY LEARNING ROUTING APPROACH BASED ON SEMANTIC CLUSTERS
 
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEYTRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
TRUST METRICS IN RECOMMENDER SYSTEMS: A SURVEY
 
Automatic vs. human question answering over multimedia meeting recordings
Automatic vs. human question answering over multimedia meeting recordingsAutomatic vs. human question answering over multimedia meeting recordings
Automatic vs. human question answering over multimedia meeting recordings
 
[IJET-V2I2P3] Authors:Vijay Choure, Kavita Mahajan ,Nikhil Patil, Aishwarya N...
[IJET-V2I2P3] Authors:Vijay Choure, Kavita Mahajan ,Nikhil Patil, Aishwarya N...[IJET-V2I2P3] Authors:Vijay Choure, Kavita Mahajan ,Nikhil Patil, Aishwarya N...
[IJET-V2I2P3] Authors:Vijay Choure, Kavita Mahajan ,Nikhil Patil, Aishwarya N...
 
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatramanOdsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
Odsc 2018 detection_classification_of_fake_news_using_cnn_venkatraman
 

Viewers also liked

Recommendation system
Recommendation system Recommendation system
Recommendation system Vikrant Arya
 
Recommendation system based on adaptive ontological graphs and weighted ranking
Recommendation system based on adaptive ontological graphs and weighted rankingRecommendation system based on adaptive ontological graphs and weighted ranking
Recommendation system based on adaptive ontological graphs and weighted rankingvikramadityajakkula
 
Complete Project of Biomass Briquetting Machine
Complete Project of Biomass Briquetting MachineComplete Project of Biomass Briquetting Machine
Complete Project of Biomass Briquetting MachineDeepi Makwana
 
Minha querida mãe
Minha querida mãeMinha querida mãe
Minha querida mãeAna Almeida
 
P China2004
P China2004P China2004
P China2004Alicia_C
 
Librarians learn web day 3
Librarians learn web day 3Librarians learn web day 3
Librarians learn web day 3Robin Hastings
 
1 1 M O R T A Y F I L E MÓ N
1 1  M O R T A  Y  F I L E MÓ N1 1  M O R T A  Y  F I L E MÓ N
1 1 M O R T A Y F I L E MÓ NMAQTIRIRI
 
Wave accounting-by-wang-ming
Wave accounting-by-wang-mingWave accounting-by-wang-ming
Wave accounting-by-wang-mingnotarazi
 
a mi perrita luna
a mi perrita lunaa mi perrita luna
a mi perrita lunapepe_linea
 
Fallas2008 Desfiles
Fallas2008 DesfilesFallas2008 Desfiles
Fallas2008 Desfilespepe_linea
 
Web 2.0 For Teachers
Web 2.0 For TeachersWeb 2.0 For Teachers
Web 2.0 For TeachersPaty.Savage
 
26022009 Skit Slides Web
26022009 Skit Slides Web26022009 Skit Slides Web
26022009 Skit Slides Webzaidi rozan
 
Solo tech presentation for nagw
Solo tech presentation for nagwSolo tech presentation for nagw
Solo tech presentation for nagwRobin Hastings
 
51 60 book 1 sight words
51 60  book 1  sight words51 60  book 1  sight words
51 60 book 1 sight wordstwaterman
 
Project management for nagw
Project management for nagwProject management for nagw
Project management for nagwRobin Hastings
 
Malaysia Boleh
Malaysia BolehMalaysia Boleh
Malaysia Bolehnotarazi
 

Viewers also liked (20)

Recommendation system
Recommendation system Recommendation system
Recommendation system
 
Recommendation system based on adaptive ontological graphs and weighted ranking
Recommendation system based on adaptive ontological graphs and weighted rankingRecommendation system based on adaptive ontological graphs and weighted ranking
Recommendation system based on adaptive ontological graphs and weighted ranking
 
Complete Project of Biomass Briquetting Machine
Complete Project of Biomass Briquetting MachineComplete Project of Biomass Briquetting Machine
Complete Project of Biomass Briquetting Machine
 
Minha querida mãe
Minha querida mãeMinha querida mãe
Minha querida mãe
 
P China2004
P China2004P China2004
P China2004
 
Librarians learn web day 3
Librarians learn web day 3Librarians learn web day 3
Librarians learn web day 3
 
1 1 M O R T A Y F I L E MÓ N
1 1  M O R T A  Y  F I L E MÓ N1 1  M O R T A  Y  F I L E MÓ N
1 1 M O R T A Y F I L E MÓ N
 
Wave accounting-by-wang-ming
Wave accounting-by-wang-mingWave accounting-by-wang-ming
Wave accounting-by-wang-ming
 
a mi perrita luna
a mi perrita lunaa mi perrita luna
a mi perrita luna
 
Fallas2008 Desfiles
Fallas2008 DesfilesFallas2008 Desfiles
Fallas2008 Desfiles
 
Web 2.0 For Teachers
Web 2.0 For TeachersWeb 2.0 For Teachers
Web 2.0 For Teachers
 
26022009 Skit Slides Web
26022009 Skit Slides Web26022009 Skit Slides Web
26022009 Skit Slides Web
 
American Ideals
American IdealsAmerican Ideals
American Ideals
 
Solo tech presentation for nagw
Solo tech presentation for nagwSolo tech presentation for nagw
Solo tech presentation for nagw
 
51 60 book 1 sight words
51 60  book 1  sight words51 60  book 1  sight words
51 60 book 1 sight words
 
The Apostle Paul
The Apostle PaulThe Apostle Paul
The Apostle Paul
 
Project management for nagw
Project management for nagwProject management for nagw
Project management for nagw
 
Malaysia Boleh
Malaysia BolehMalaysia Boleh
Malaysia Boleh
 
Open Id
Open IdOpen Id
Open Id
 
Fotos Prueba de mercado Bisuarias
Fotos Prueba de mercado BisuariasFotos Prueba de mercado Bisuarias
Fotos Prueba de mercado Bisuarias
 

Similar to Social Trust-aware Recommendation System: A T-Index Approach

Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...Nima Dokoohaki
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKcscpconf
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networksijeei-iaes
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETSTRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETSIAEME Publication
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESIAEME Publication
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemTUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemCSCJournals
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peerSnehith
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd Iaetsd
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGijp2p
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manetIAEME Publication
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...IDES Editor
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
An efficient distributed trust model for wireless
An efficient distributed trust model for wirelessAn efficient distributed trust model for wireless
An efficient distributed trust model for wirelessjpstudcorner
 

Similar to Social Trust-aware Recommendation System: A T-Index Approach (20)

Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
Achieving Optimal Privacy in Trust-Aware Collaborative Filtering Recommender ...
 
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORKTRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
TRUST ORIENTED SECURITY FRAMEWORK FOR AD HOC NETWORK
 
Modelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless NetworksModelling of A Trust and Reputation Model in Wireless Networks
Modelling of A Trust and Reputation Model in Wireless Networks
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETSTRUST MODEL WITH DEFENSE SCHEME IN MANETS
TRUST MODEL WITH DEFENSE SCHEME IN MANETS
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
 
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULESAN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
AN INDEPENDENT TRUST MODEL FOR MANET BASED ON FUZZY LOGIC RULES
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemTUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management System
 
A novel approach for trust management for peer peer
A novel approach for trust management for peer peerA novel approach for trust management for peer peer
A novel approach for trust management for peer peer
 
Iaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system usingIaetsd organizing the trust model in peer-to-peer system using
Iaetsd organizing the trust model in peer-to-peer system using
 
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPINGIMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
IMPROVING HYBRID REPUTATION MODEL THROUGH DYNAMIC REGROUPING
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
A survey on trust based routing in manet
A survey on trust based routing in manetA survey on trust based routing in manet
A survey on trust based routing in manet
 
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
ATMC: Anonymity and Trust Management Scheme Applied to Clustered Wireless Sen...
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
An efficient distributed trust model for wireless
An efficient distributed trust model for wirelessAn efficient distributed trust model for wireless
An efficient distributed trust model for wireless
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 

Social Trust-aware Recommendation System: A T-Index Approach

  • 1. Social Trust-Aware Recommendation System: A T-index Approach Alireza Zarghami Soude Fazeli Nima Dokoohaki Mihhail Matskin Presented at Workshop on Web Personalization, Reputation and Recommender Systems ( WPRRS’09 ) In conjunction with IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology ( WI’09 and IAT’09). September 2009
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 21. MAE
  • 22. Indegree distribution most trustworthy users
  • 23. Trust network visualization Configuration: n=3 m=3 T-index=0
  • 24. Trust network visualization Configuration: n=3 m=3 T-index=100
  • 25.
  • 26.
  • 27.

Editor's Notes

  1. 25 minutes = 20 minutes pres. + 5 minutes questions.
  2. CF algorithm generally make recommendations based on similarity between users. As mentioned, similarity measure is not sufficient when user profiles are sparse. A connection between how similar two users are and how much they trust each other, is discussed trust can be considered as a measure for expressing the relationship between two users in recommendation systems They depict that trust can be aggregated for all of the users in a social network, and the “importance”of a certain user is predicated by using a graph walking algorithm
  3. Coverage measures the percentage of items that a recommender system can provide predictions for
  4. Mean Absolute Error (MAE) measures the average absolute difference between a predicted rating made for a specific user and the user’s actual rating
  5. Distribution of Indegree for the first ten of most trustworthy users with and without T-index. Indegree depicts incoming edges to a node as a user who is trusted by others. It is observed that by employing T-index, more centric users can be found which results in more clusters . Therefore, node’s weights in terms of incoming trust relationships are more balanced in trust graph of users, by utilizing Tindex.