AI Chat Paper
Note: Please note that the following content is generated by AMiner AI. SciOpen does not take any responsibility related to this content.
{{lang === 'zh_CN' ? '文章概述' : 'Summary'}}
{{lang === 'en_US' ? '中' : 'Eng'}}
Chat more with AI
PDF (893.8 KB)
Collect
Submit Manuscript AI Chat Paper
Show Outline
Outline
Show full outline
Hide outline
Outline
Show full outline
Hide outline
Open Access

Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence

Graduate School, Angeles University Foundation, Angeles City 2009, Philippines
Shandong Provincial University Laboratory for Protected Horticulture, Weifang University of Science and Technology, Weifang 262700, China
Show Author Information

Abstract

Personalized recommendation plays a critical role in providing decision-making support for product and service analysis in the field of business intelligence. Recently, deep neural network-based sequential recommendation models gained considerable attention. However, existing approaches pay little attention to users’ dynamically evolving interests, which are influenced by product attributes, especially product category. To overcome these challenges, we propose a dynamic personalized recommendation model: DynaPR. Specifically, we first embed product information and attribute information into a unified data space. Then, we exploit long short-term memory (LSTM) networks to characterize sequential behavior over multiple time periods and seize evolving interests by hierarchical LSTM networks. Finally, similarity values between users are measured through pairwise interest features, and personalized recommendation lists are generated. A series of experiments reveal the superiority of the proposed method compared with other advanced methods.

References

[1]
V. V. Mišić and G. Perakis, Data analytics in operations management: A review, Manuf. Serv. Oper. Manag., vol. 22, no. 1, pp. 158–169, 2020.
[2]
X. Zhou, W. Liang, K. Yan, W. Li, K. I. K. Wang, J. Ma, and Q. Jin, Edge-enabled two-stage scheduling based on deep reinforcement learning for Internet of everything, IEEE Internet Things J., vol. 10, no. 4, pp. 3295–3304, 2022.
[3]
X. Zhou, Y. Hu, J. Wu, W. Liang, J. Ma, and Q. Jin, Distribution bias aware collaborative generative adversarial network for imbalanced deep learning in industrial IoT, IEEE Trans. Ind. Inform., vol. 19, no. 1, pp. 570–580, 2022.
[4]
M. R. Llave, Business intelligence and analytics in small and medium-sized enterprises: A systematic literature review, Procedia Comput. Sci., vol. 121, pp. 194–205, 2017.
[5]
X. Zhou, W. Liang, W. Li, K. Yan, S. Shimizu, and K. I. K. Wang, Hierarchical adversarial attacks against graph-neural-network-based IoT network intrusion detection system, IEEE Internet Things J., vol. 9, no. 12, pp. 9310–9319, 2021.
[6]
X. Zhou, X. Xu, W. Liang, Z. Zeng, and Z. Yan, Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT, IEEE Internet Things J., vol. 8, no. 16, pp. 12588–12596, 2021.
[7]
X. Zhou, W. Liang, K. I. K. Wang, and L. T. Yang, Deep correlation mining based on hierarchical hybrid networks for heterogeneous big data recommendations, IEEE Trans. Comput. Soc. Syst., vol. 8, no. 1, pp. 171–178, 2021.
[8]
M. I. Jordan and T. M. Mitchell, Machine learning: Trends, perspectives, and prospects, Science, vol. 349, no. 6245, pp. 255–260, 2015.
[9]
L. Qi, Y. Yang, X. Zhou, W. Rafique, and J. Ma, Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Trans. Ind. Inform., vol. 18, no. 9, pp. 6503–6511, 2022.
[10]
H. J. Ye, X. Yang, X. Wang, and T. C. Stratopoulos, Monetization of digital content: Drivers of revenue on Q&A platforms, J. Manag. Inf. Syst., vol. 38, no. 2, pp. 457–483, 2021.
[11]
F. Wang, H. Zhu, G. Srivastava, S. Li, M. R. Khosravi, and L. Qi, Robust collaborative filtering recommendation with user-item-trust records, IEEE Trans. Comput. Soc. Syst., vol. 9, no. 4, pp. 986–996, 2022.
[12]
F. Wang, L. Wang, G. Li, Y. Wang, C. Lv, and L. Qi, Edge-cloud-enabled matrix factorization for diversified APIs recommendation in mashup creation, World Wide Web, vol. 25, no. 5, pp. 1809–1829, 2022.
[13]
J. Liu, C. Wu, Y. Xiong, and W. Liu, List-wise probabilistic matrix factorization for recommendation, Inf. Sci., vol. 278, pp. 434–447, 2014.
[14]
R. Salakhutdinov and A. Mnih, Probabilistic Matrix Factorization, in Proc. 20th Int Conf. on Neural Information Processing Systems, Red Hook, NY, USA, 2007, pp. 1257–1264.
[15]
Z. Cui, P. Zhao, Z. Hu, X. Cai, W. Zhang, and J. Chen, An improved matrix factorization based model for many-objective optimization recommendation, Inf. Sci., vol. 579, pp. 1–14, 2021.
[16]
W. C. Kang and J. McAuley, Self-attentive sequential recommendation, in Proc. 2018 IEEE Int. Conf. Data Mining, Singapore, Singapore, 2018, pp. 197–206.
[17]
R. He and J. McAuley, Fusing similarity models with Markov chains for sparse sequential recommendation, in Proc. 2016 IEEE 16th Int. Conf. Data Mining, Barcelona, Spain, 2017, pp. 191–200.
[18]
F. Xie, Z. Chen, H. Xu, X. Feng, and Q. Hou, TST: Threshold based similarity transitivity method in collaborative filtering with cloud computing, Tsinghua Science and Technology, vol. 18, no. 3, pp. 318–327, 2013.
[19]
B. Hidasi, A. Karatzoglou, L. Baltrunas, and D. Tikk, Session-based recommendations with recurrent neural networks, arXiv preprint arXiv: 1511.06939, 2015.
[20]
X. Chen, H. Xu, Y. Zhang, J. Tang, Y. Cao, Z. Qin, and H. Zha, Sequential recommendation with user memory networks, in Proc. Eleventh ACM Int. Conf. Web Search and Data Mining, Marina Del Rey, CA, USA, 2018, pp. 108–116.
[21]
L. Kong, G. Li, W. Rafique, S. Shen, Q. He, M. R. Khosravi, R. Wang, and L. Qi, Time-aware missing healthcare data prediction based on ARIMA model, IEEE/ACM Trans. Comput. Biol. Bioinform., 2022.
[22]
J. Zhang, Y. Wang, Z. Yuan, and Q. Jin, Personalized real-time movie recommendation system: Practical prototype and evaluation, Tsinghua Science and Technology, vol. 25, no. 2, pp. 180–191, 2019.
[23]
X. Ye and D. Liu, A cost-sensitive temporal-spatial three-way recommendation with multi-granularity decision, Inf. Sci., vol. 589, pp. 670–689, 2022.
[24]
S. Xu, H. Zhuang, F. Sun, S. Wang, T. Wu, and J. Dong, Recommendation algorithm of probabilistic matrix factorization based on directed trust, Comput. Electr. Eng., vol. 93, p. 107206, 2021.
[25]
T. X. Tuan and T. M. Phuong, 3D convolutional networks for session-based recommendation with content features, in Proc. Eleventh ACM Conf. Recommender Systems, Como, Italy, 2017, pp. 138–146.
[26]
J. You, Y. Wang, A. Pal, P. Eksombatchai, C. Rosenburg, and J. Leskovec, Hierarchical temporal convolutional networks for dynamic recommender systems, in Proc. World Wide Web Conf., New York, NY, USA, 2019, pp. 2236–2246.
[27]
Z. Yin and Y. Shen, On the dimensionality of word embedding, in Proc. 32th Int. Conf. on Neural Information Processing Systems, Red Hook, NY, USA, 2018, pp. 895–906. .
[28]
S. Wu, S. Shen, X. Xu, Y. Chen, X. Zhou, D. Liu, X. Xue, and L. Qi, Popularity-aware and diverse web APIs recommendation based on correlation graph, IEEE Trans. Comput. Soc. Syst., vol. 10, no. 2, pp. 771–782, 2023.
[29]
Y. Xu, Z. Feng, X. Xue, S. Chen, H. Wu, X. Zhou, M. Xing, and H. Chen, MemTrust: find deep trust in your mind, in Proc. 2021 IEEE Int. Conf. Web Services, Chicago, IL, USA, 2021, pp. 598–607.
[30]
J. C. W. Lin, Y. Shao, Y. Djenouri, and U. Yun, ASRNN: A recurrent neural network with an attention model for sequence labeling, Knowl. Based Syst., vol. 212, p. 106548, 2021.
[31]
H. Dai, J. Yu, M. Li, W. Wang, A. X. Liu, J. Ma, L. Qi, and G. Chen, Bloom filter with noisy coding framework for multi-set membership testing, IEEE Trans. Knowl. Data Eng., 2022.
[32]
S. Cheng, Y. Wu, Y. Li, F. Yao, and F. Min, TWD-SFNN: Three-way decisions with a single hidden layer feedforward neural network, Inf. Sci., vol. 579, pp. 15–32, 2021.
[33]
Y. Jin, W. Guo, and Y. Zhang, A time-aware dynamic service quality prediction approach for services, Tsinghua Science and Technology, vol. 25, no. 2, pp. 227–238, 2019.
[34]
Y. Yang, X. Yang, M. Heidari, M. A. Khan, G. Srivastava, M. Khosravi, and L. Qi, ASTREAM: data-stream-driven scalable anomaly detection with accuracy guarantee in IIoT environment, IEEE Trans. Netw. Sci. Eng., 2022.
[35]
C. Huang, Q. Zhang, D. Guo, X. Zhao, and X. Wang, Discovering association rules with graph patterns in temporal networks, Tsinghua Science and Technology, vol. 28, no. 2, pp. 344–359, 2022.
[36]
X. Xu, T. Gao, Y. Wang, and X. Xuan, Event temporal relation extraction with attention mechanism and graph neural network, Tsinghua Science and Technology, vol. 27, no. 1, pp. 79–90, 2021.
[37]
Y. Zhang, C. Yin, Z. Lu, D. Yan, M. Qiu, and Q. Tang, Recurrent Tensor Factorization for time-aware service recommendation, Appl. Soft Comput., vol. 85, p. 105762, 2019.
[38]
M. Ayub, M. Ali Ghazanfar, M. Maqsood, and A. Saleem, A Jaccard base similarity measure to improve performance of CF based recommender systems, in Proc. 2018 Int. Conf. Information Networking, Chiang Mai, Thailand, 2018, pp. 1–6.
[39]
E. B. Barker and J. Kelsey, Recommendation for random bit generator (RBG) constructions, Gaithersburg, MD, USA: NIST, 2012.
[40]
D. Ma, Y. Wang, J. Ma, and Q. Jin, SGNR: A social graph neural network based interactive recommendation scheme for E-commerce, Tsinghua Science and Technology, vol. 28, no. 4, pp. 786–798, 2023.
[41]
L. Qi, W. Lin, X. Zhang, W. Dou, X. Xu, and J. Chen, A correlation graph based approach for personalized and compatible web APIs recommendation in mobile APP development, IEEE Trans. Knowl. Data Eng., vol. 35, no. 6, pp. 5444–5457, 2023.
[42]
L. Zhang, C. Xu, Y. Gao, Y. Han, X. Du, and Z. Tian, Improved Dota2 lineup recommendation model based on a bidirectional LSTM, Tsinghua Science and Technology, vol. 25, no. 6, pp. 712–720, 2020.
[43]
M. Jamali and M. Ester, TrustWalker: a random walk model for combining trust-based and item-based recommendation, in Proc. 15th ACM SIGKDD Int. Conf. Knowledge discovery and data mining, Paris, France, 2009, pp. 397–406.
[44]
C. Yan, Y. Zhang, W. Zhong, C. Zhang, and B. Xin, A truncated SVD-based ARIMA model for multiple QoS prediction in mobile edge computing, Tsinghua Science and Technology, vol. 27, no. 2, pp. 315–324, 2021.
[45]
H. Dai, Y. Xu, G. Chen, W. Dou, C. Tian, X. Wu, and T. He, ROSE: robustly safe charging for wireless power transfer, IEEE Trans. Mob. Comput., vol. 21, no. 6, pp. 2180–2197, 2022.
[46]
R. Gu, Y. Chen, S. Liu, H. Dai, G. Chen, K. Zhang, Y. Che, and Y. Huang, Liquid: Intelligent resource estimation and network-efficient scheduling for deep learning jobs on distributed GPU clusters, IEEE Trans. Parallel Distributed Syst., vol. 33, no. 11, pp. 2808–2820, 2022.
[47]
H. Dai, X. Wang, X. Lin, R. Gu, S. Shi, Y. Liu, W. Dou, and G. Chen, Placing wireless chargers with limited mobility, IEEE Trans. Mob. Comput., vol. 22, no. 6, pp. 3589-3603, 2023.
[48]
R. Gu, K. Zhang, Z. Xu, Y. Che, B. Fan, H. Hou, H. Dai, L. Yi, Y. Ding, G. Chen et al., Fluid: Dataset abstraction and elastic acceleration for cloud-native deep learning training jobs, in Proc. 2022 IEEE 38th Int. Conf. Data Engineering, Kuala Lumpur, Malaysia, 2022, pp. 2182–2195.
[49]
Y. Li, J. Liu, B. Cao, and C. Wang, Joint optimization of radio and virtual machine resources with uncertain user demands in mobile cloud computing, IEEE Trans. Multimed., vol. 20, no. 9, pp. 2427–2438, 2018.
[50]
Y. Li, C. Liao, Y. Wang, and C. Wang, Energy-efficient optimal relay selection in cooperative cellular networks based on double auction, IEEE Trans. Wirel. Commun., vol. 14, no. 8, pp. 4093–4104, 2015.
[51]
Y. Li, S. Xia, M. Zheng, B. Cao, and Q. Liu, Lyapunov optimization-based trade-off policy for mobile cloud offloading in heterogeneous wireless networks, IEEE Trans. Cloud Comput., vol. 10, no. 1, pp. 491–505, 2022.
[52]
D. Zhou, X. Xue, and Z. Zhou, SLE2: the improved social learning evolution model of cloud manufacturing service ecosystem, IEEE Trans. Ind. Inform., vol. 18, no. 12, pp. 9017–9026, 2022.
[53]
X. Xue, S. Wang, L. Zhang, Z. Feng, and Y. Guo, Social learning evolution (SLE): Computational experiment-based modeling framework of social manufacturing, IEEE Trans. Ind. Inform., vol. 15, no. 6, pp. 3343–3355, 2019.
[54]
X. Xue, G. D. Li, D. Y. Zhou, Y. P. Zhang, L. Zhang, Y. Zhao, Z. Y. Feng, L. Z. Cui, Z. B. Zhou, X. Sun, X. D. Lu, and S. Z. Chen, The Research Roadmap of Service Ecosystem: A Crowd Intelligence Perspective, International Journal of Crowd Science, vol. 6, no. 4, pp. 195–222, 2022.
[55]
Z. Xie, Y. Huang, D. Yu, R. M. Parizi, Y. Zheng, and J. Pang, FedEE: A federated graph learning solution for extended enterprise collaboration, IEEE Trans. Ind. Inform., 2022.
[56]
D. Yu, Z. Zou, S. Chen, Y. Tao, B. Tian, W. Lv, and X. Cheng, Decentralized parallel SGD with privacy preservation in vehicular networks, IEEE Trans. Veh. Technol., vol. 70, no. 6, pp. 5211–5220, 2021.
[57]
L. Yang, Y. Zou, M. Xu, Y. Xu, D. Yu, and X. Cheng, Distributed consensus for blockchains in internet-of-things networks, Tsinghua Science and Technology, vol. 27, no. 5, pp. 817–831, 2022.
[58]
D. Yu, D. Wang, Q. Luo, Y. Zheng, G. Wang, and Z. Cai, Stable structural clustering in uncertain graphs, Inf. Sci., vol. 586, pp. 596–610, 2022.
[59]
Q. Luo, D. X. Yu, Z. P. Cai, X. M. Lin, G. H. Wang, X. Z. Cheng, Towards Maintenance of k-Hypercores in Large-Scale Dynamic Hypergraphs, VLDB, vol. 32, no. 3, pp. 647–664. 2023.
[60]
W. Wang, Y. Wang, P. Duan, T. Liu, X. Tong, and Z. Cai, A Triple Real-time Trajectory Privacy Protection mechanism Based on Edge computing and Blockchain in Mobile Crowdsourcing, IEEE Trans. Mob. Comput., 2022.
[61]
Q. Zhang, Y. Wang, G. Yin, X. Tong, A. M. V. V. Sai, and Z. Cai, Two-stage bilateral online priority assignment in spatio-temporal crowdsourcing, IEEE Trans. Serv. Comput., 2022.
[62]
Y. Xu, Z. Liu, C. Zhang, J. Ren, Y. Zhang, and X. Shen, Blockchain-based Trustworthy Energy Dispatching Approach for High Renewable Energy Penetrated Power Systems, IEEE Internet Things J., vol. 9, no. 12, pp. 10036–10047, 2022.
[63]
Y. Xu, C. Zhang, G. Wang, Z. Qin, and Q. Zeng, A blockchain-enabled deduplicatable data auditing mechanism for network storage services, IEEE Trans. Emerg. Top. Comput., vol. 9, no. 3, pp. 1421–1432, 2021.
[64]
C. Zhang, Y. Xu, Y. Hu, J. Wu, J. Ren, and Y. Zhang, A blockchain-based multi-cloud storage data auditing scheme to locate faults, IEEE Trans. Cloud Comput., vol. 10, no. 4, pp. 2252–2263, 2022.
[65]
Y. Xu, J. Ren, Y. Zhang, C. Zhang, B. Shen, and Y. Zhang, Blockchain empowered arbitrable data auditing scheme for network storage as a service, IEEE Trans. Serv. Comput., vol. 13, no. 2, pp. 289–300, 2020.
Tsinghua Science and Technology
Pages 185-196
Cite this article:
Yang X, Esquivel JA. Time-Aware LSTM Neural Networks for Dynamic Personalized Recommendation on Business Intelligence. Tsinghua Science and Technology, 2024, 29(1): 185-196. https://doi.org/10.26599/TST.2023.9010025

520

Views

74

Downloads

7

Crossref

6

Web of Science

6

Scopus

0

CSCD

Altmetrics

Received: 22 February 2023
Revised: 20 March 2023
Accepted: 30 March 2023
Published: 21 August 2023
© The author(s) 2024.

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return