Trust-Aware Personalized Route Query Using Extreme Learning Machine in Location-Based Social Networks
- 95 Downloads
The task of personalized route query is to find the optimal trip that contains the keywords specified by the query user and satisfies the travel distance constraints. The previous studies mostly focus on collaborative filtering by considering user similarity. Trust is one of the most important factors in decision-making that has been neglected by the existing studies of personalized route query. In this paper, we propose a new type of personalized route query by incorporating trust. We propose a social trust-based optimal trip selection (STOTS) framework for personalized route query. STOTS consists of three key components. The first component predicts social trust based on extreme learning machine (ELM), denoted STP-ELM, that exploits social information and user behavioral patterns as features. In the second component, we propose a novel model to incorporate social trust into personalized route query. Additionally, we propose an index to speed up query processing. In the third component, we propose an optimal route query algorithm called RouteHunter that aims to find an appropriate route satisfying the user-specified constraints. The experiment results show that (1) our social trust prediction approach based on ELM attains superior regression efficiency compared to other traditional methods; (2) our proposed index can efficiently accelerate personalized route query processing; and (3) our route query approach can achieve a better performance than the baseline approach. This paper studies a novel personalized route query incorporating social trust in location-based social networks. We propose a social trust-based optimal trip selection (STOTS) framework that uses ELM to evaluate social trust, applies a ranking model to incorporate social trust, and includes an algorithm to find the required route. Experimental results encouragingly demonstrate the efficiency and effectiveness of our proposed approach.
KeywordsExtreme learning machine Personalized route query Social trust Location-based social networks
This research is partially funded by the National Natural Science Foundation of China (Grant Nos. 61572119, 61622202, 61732003, 61729201, 61702086, and U1401256) and the Fundamental Research Funds for the Central Universities of China (Grant Nos. N150402005 and N171904007).
Compliance with Ethical Standards
Conflict of interest
The authors declare that they have no conflicts of interest.
Informed consent was obtained from all individual participants.
Human and Animal Rights
This article does not contain any studies involving human participants and/or animals by any of the authors.
- 1.Adwereboamah J, Hufstedler S. Predicting social trust with binary logistic regression. Research in Higher Education Journal 2015;27:6.Google Scholar
- 5.Cortes C, Vapnik V. Support-vector networks. Mach Learn 1995;20(3):273–297.Google Scholar
- 7.Deng C, Wang S, Li Z, Huang GB, Lin W. 2017. Content-insensitive blind image blurriness assessment using weibull statistics and sparse extreme learning machine. IEEE Trans Syst Man Cybern: Syst.Google Scholar
- 9.Falcone R, Castelfranchi C. Social trust: a cognitive approach. Trust and deception in virtual societies, p. 55–90. Springer; 2001.Google Scholar
- 13.Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. Proceedings of the 13th international conference on World Wide Web. p. 403–412. ACM; 2004.Google Scholar
- 15.Gutierrez-Garcia JO, Lpez-Neri E. Cognitive computing: a brief survey and open research challenges. International conference on applied computing and information technology/ international conference on computational science and intelligence. p. 328–333; 2015.Google Scholar
- 16.Hang CW, Wang Y, Singh MP. Operators for propagating trust and their evaluation in social networks. Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2. p. 1025–1032. International Foundation for Autonomous Agents and Multiagent Systems; 2009.Google Scholar
- 17.Heinermann J, Kramer O. 2014. Precise wind power prediction with SVM ensemble regression springer international publishing.Google Scholar
- 19.Huang GB, Siew CK. Extreme learning machine: Rbf network case. Control, automation, robotics and vision conference, 2004. ICARCV 2004 8th. vol. 2, p. 1029–1036. IEEE; 2004.Google Scholar
- 21.Huang GB, Zhu QY, Siew CK. Extreme learning machine: a new learning scheme of feedforward neural networks. IEEE international joint conference on Neural networks, 2004. Proceedings. 2004. vol. 2, p. 985–990. IEEE; 2004.Google Scholar
- 23.Jamali M, Ester M. Trustwalker: a random walk model for combining trust-based and item-based recommendation. Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. p. 397–406. ACM; 2009.Google Scholar
- 24.Jamali M, Ester M. A matrix factorization technique with trust propagation for recommendation in social networks. ACM Conference on recommender systems, p. 135–142; 2010.Google Scholar
- 25.Kurashima T, Iwata T, Irie G, Fujimura K. Travel route recommendation using geotags in photo sharing sites. Proceedings of the 19th ACM international conference on Information and knowledge management, p. 579–588. ACM; 2010.Google Scholar
- 26.Li F, Cheng D, Hadjieleftheriou M, Kollios G, Teng SH. On trip planning queries in spatial databases. International symposium on spatial and temporal databases, p. 273–290. Springer; 2005.Google Scholar
- 27.Liu G, Wang Y, Orgun MA, Liu H. Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks. 2012 IEEE 19th international conference on web services (ICWS). p. 384–391. IEEE; 2012.Google Scholar
- 32.Scott J. 2012. Social network analysis. Sage.Google Scholar
- 33.Tang M, Xu Y, Liu J, Zheng Z, Liu X. Trust-aware service recommendation via exploiting social networks. IEEE International conference on services computing, p. 376–383; 2013.Google Scholar
- 37.Wang H, Hernandez JM, Van MP. Betweenness centrality in a weighted network. Phys Rev E Stat Nonlin Soft Matter Phys 2008;77(4 Pt 2):046105.Google Scholar
- 39.Wang Y, Varadharajan V. Role-based recommendation and trust evaluation. The 9th IEEE international conference on E-commerce technology and the 4th IEEE international conference on enterprise computing, e-commerce, and e-services, 2007. CEC/EEE 2007, p. 278–288. IEEE; 2007.Google Scholar
- 44.Xu Y, Hu T, Li Y. A travel route recommendation algorithm with personal preference. 2016 12th international conference on natural computation, fuzzy systems and knowledge discovery (ICNC-FSKD), p. 390–396. IEEE; 2016.Google Scholar
- 45.Zeng Y, Chen X, Cao X, Qin S, Cavazza M, Xiang Y. Optimal route search with the coverage of users’ preferences. IJCAI, p. 2118–2124; 2015.Google Scholar
- 46.Zhang Z, Zhao X, Wang G. FE-ELM: a new friend recommendation model with extreme learning machine. Cogn Comput 2017;9 (3):1–12.Google Scholar
- 47.Zheng X, Wang Y, Orgun MA, Zhong Y, Liu G, et al. Trust prediction with propagation and similarity regularization. AAAI, p. 237–244; 2014.Google Scholar