SlideShare a Scribd company logo
1 of 2
Trust-based Recommendation System (Algorithm) for Tourism System<br />Random walk system (RW)<br />We first describe a recommendation system based on random walks. Given a voting network G = (N, V+, V−, E) and a source s ∈ V‾, the random walk system simulates the following: <br />Start a walker at node s and, at each step, choose an outgoing edge uniformly at random and follows it to the destination node. Continue this random walk until a node with a +/- vote is reached, or until a node with no outgoing edges is reached (note this walk may never terminate). <br />Let ps be the probability that the random walk terminates at a node with positive vote and qs be the probability that the random walk terminates at node with negative vote. Let rs = ps − qs. The random walk recommendation system recommends sgn(rs) to s. <br />Algorithm<br />Input: G = (N, V+, V−,E), s ∈ V‾.<br />Output: recommendation ∈ {−, 0, +}.<br />Let S ⊆ V‾ be the set of nonvoters that cannot reach any voter.<br />For each v ∈ N, create a variable rv ∈R. Solve the following from rv:<br />rv ={      0, if v ∈ S<br />  1, if v ∈ V+<br />−1, if v ∈ V−<br />Output sgn(rs).<br />Algorithm Explanation:<br />Definition 1: A voting network is a directed annotated multigraph G = (N, V+, V−,E) where N is a set of nodes, V+, V− ⊆ N are disjoint subsets of positive and negative voters, and E ⊆ N2 is a multiset of edges with parallel edges allowed but no self-loops.<br />When V+ and V− are clear from context, we denote the set of voters by V = V+ ∪ V− and the set of nonvoters by<br />V = N - V. <br />Definition 2: A recommendation system R takes as input a voting network G and source s ∈ V and outputs recommendation R(G, s) ∈ {−, 0,+}.<br />We denote by sgn: R -> {−, 0,+} the function that computes the sign of its input. <br />Given a multiset of recommendations, S ⊆ {−, 0,+}, we define the majority MAJ(S) to be: + if more than half the elements of S are +; − if more than half of S are −; and 0 otherwise.<br />Reference: Reid Andersen, Christian Borgs, Jennifer Chayes, Uriel Feige, Abraham Flaxman, Adam Kalai, Vahab Mirrokni, and Moshe Tennenholtz, Trust-based recommendation systems: an axiomatic approach, WWW '08: Proceeding of the 17th international conference on World Wide Web (New York, NY, USA), ACM, 2008, pp. 199-208.<br />
Trust Based Recommendation Systems For Tourism System   Zaffar Ahmed Shaikh

More Related Content

More from Zaffar Ahmed Shaikh

Role of ICT in Shaping the Future of Pakistani Higher Education System
Role of ICT in Shaping the Future of Pakistani Higher Education SystemRole of ICT in Shaping the Future of Pakistani Higher Education System
Role of ICT in Shaping the Future of Pakistani Higher Education SystemZaffar Ahmed Shaikh
 
Role of Teacher in Personal Learning Environments
Role of Teacher in Personal Learning EnvironmentsRole of Teacher in Personal Learning Environments
Role of Teacher in Personal Learning EnvironmentsZaffar Ahmed Shaikh
 
Presentation - Role of Teacher in Personal Learning Environments
Presentation - Role of Teacher in Personal Learning EnvironmentsPresentation - Role of Teacher in Personal Learning Environments
Presentation - Role of Teacher in Personal Learning EnvironmentsZaffar Ahmed Shaikh
 
Introduction to Social Computing - Book Chapter
Introduction to Social Computing - Book ChapterIntroduction to Social Computing - Book Chapter
Introduction to Social Computing - Book ChapterZaffar Ahmed Shaikh
 
Chapter 2 Cover Updated By Zaffar Ahmed Shaikh
Chapter 2 Cover Updated By Zaffar Ahmed ShaikhChapter 2 Cover Updated By Zaffar Ahmed Shaikh
Chapter 2 Cover Updated By Zaffar Ahmed ShaikhZaffar Ahmed Shaikh
 
Chapter 1 Cover Updated By Zaffar Ahmed Shaikh
Chapter 1 Cover Updated By Zaffar Ahmed ShaikhChapter 1 Cover Updated By Zaffar Ahmed Shaikh
Chapter 1 Cover Updated By Zaffar Ahmed ShaikhZaffar Ahmed Shaikh
 
Nearest Neighbor Algorithm Zaffar Ahmed
Nearest Neighbor Algorithm  Zaffar AhmedNearest Neighbor Algorithm  Zaffar Ahmed
Nearest Neighbor Algorithm Zaffar AhmedZaffar Ahmed Shaikh
 
Social Computing Applications Infrastructure
Social Computing Applications InfrastructureSocial Computing Applications Infrastructure
Social Computing Applications InfrastructureZaffar Ahmed Shaikh
 
Zaffar+Ahmed+ +Collaborative+Filtering
Zaffar+Ahmed+ +Collaborative+FilteringZaffar+Ahmed+ +Collaborative+Filtering
Zaffar+Ahmed+ +Collaborative+FilteringZaffar Ahmed Shaikh
 

More from Zaffar Ahmed Shaikh (11)

Role of ICT in Shaping the Future of Pakistani Higher Education System
Role of ICT in Shaping the Future of Pakistani Higher Education SystemRole of ICT in Shaping the Future of Pakistani Higher Education System
Role of ICT in Shaping the Future of Pakistani Higher Education System
 
Role of Teacher in Personal Learning Environments
Role of Teacher in Personal Learning EnvironmentsRole of Teacher in Personal Learning Environments
Role of Teacher in Personal Learning Environments
 
Presentation - Role of Teacher in Personal Learning Environments
Presentation - Role of Teacher in Personal Learning EnvironmentsPresentation - Role of Teacher in Personal Learning Environments
Presentation - Role of Teacher in Personal Learning Environments
 
Network Theory
Network TheoryNetwork Theory
Network Theory
 
Introduction to Social Computing - Book Chapter
Introduction to Social Computing - Book ChapterIntroduction to Social Computing - Book Chapter
Introduction to Social Computing - Book Chapter
 
Chapter 2 Cover Updated By Zaffar Ahmed Shaikh
Chapter 2 Cover Updated By Zaffar Ahmed ShaikhChapter 2 Cover Updated By Zaffar Ahmed Shaikh
Chapter 2 Cover Updated By Zaffar Ahmed Shaikh
 
Chapter 1 Cover Updated By Zaffar Ahmed Shaikh
Chapter 1 Cover Updated By Zaffar Ahmed ShaikhChapter 1 Cover Updated By Zaffar Ahmed Shaikh
Chapter 1 Cover Updated By Zaffar Ahmed Shaikh
 
Prediction Markets
Prediction MarketsPrediction Markets
Prediction Markets
 
Nearest Neighbor Algorithm Zaffar Ahmed
Nearest Neighbor Algorithm  Zaffar AhmedNearest Neighbor Algorithm  Zaffar Ahmed
Nearest Neighbor Algorithm Zaffar Ahmed
 
Social Computing Applications Infrastructure
Social Computing Applications InfrastructureSocial Computing Applications Infrastructure
Social Computing Applications Infrastructure
 
Zaffar+Ahmed+ +Collaborative+Filtering
Zaffar+Ahmed+ +Collaborative+FilteringZaffar+Ahmed+ +Collaborative+Filtering
Zaffar+Ahmed+ +Collaborative+Filtering
 

Recently uploaded

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

Trust Based Recommendation Systems For Tourism System Zaffar Ahmed Shaikh

  • 1. Trust-based Recommendation System (Algorithm) for Tourism System<br />Random walk system (RW)<br />We first describe a recommendation system based on random walks. Given a voting network G = (N, V+, V−, E) and a source s ∈ V‾, the random walk system simulates the following: <br />Start a walker at node s and, at each step, choose an outgoing edge uniformly at random and follows it to the destination node. Continue this random walk until a node with a +/- vote is reached, or until a node with no outgoing edges is reached (note this walk may never terminate). <br />Let ps be the probability that the random walk terminates at a node with positive vote and qs be the probability that the random walk terminates at node with negative vote. Let rs = ps − qs. The random walk recommendation system recommends sgn(rs) to s. <br />Algorithm<br />Input: G = (N, V+, V−,E), s ∈ V‾.<br />Output: recommendation ∈ {−, 0, +}.<br />Let S ⊆ V‾ be the set of nonvoters that cannot reach any voter.<br />For each v ∈ N, create a variable rv ∈R. Solve the following from rv:<br />rv ={ 0, if v ∈ S<br /> 1, if v ∈ V+<br />−1, if v ∈ V−<br />Output sgn(rs).<br />Algorithm Explanation:<br />Definition 1: A voting network is a directed annotated multigraph G = (N, V+, V−,E) where N is a set of nodes, V+, V− ⊆ N are disjoint subsets of positive and negative voters, and E ⊆ N2 is a multiset of edges with parallel edges allowed but no self-loops.<br />When V+ and V− are clear from context, we denote the set of voters by V = V+ ∪ V− and the set of nonvoters by<br />V = N - V. <br />Definition 2: A recommendation system R takes as input a voting network G and source s ∈ V and outputs recommendation R(G, s) ∈ {−, 0,+}.<br />We denote by sgn: R -> {−, 0,+} the function that computes the sign of its input. <br />Given a multiset of recommendations, S ⊆ {−, 0,+}, we define the majority MAJ(S) to be: + if more than half the elements of S are +; − if more than half of S are −; and 0 otherwise.<br />Reference: Reid Andersen, Christian Borgs, Jennifer Chayes, Uriel Feige, Abraham Flaxman, Adam Kalai, Vahab Mirrokni, and Moshe Tennenholtz, Trust-based recommendation systems: an axiomatic approach, WWW '08: Proceeding of the 17th international conference on World Wide Web (New York, NY, USA), ACM, 2008, pp. 199-208.<br />