Cao: Personalized Web Service Recommendation Method Based on Hybrid Social Network and Multi-Objective Immune Optimization

# Personalized Web Service Recommendation Method Based on Hybrid Social Network and Multi-Objective Immune Optimization

Abstract: To alleviate the cold-start problem and data sparsity in web service recommendation and meet the personalized needs of users, this paper proposes a personalized web service recommendation method based on a hybrid social network and multi-objective immune optimization. The network adds the element of the service provider, which can provide more real information and help alleviate the cold-start problem. Then, according to the proposed service recommendation framework, multi-objective immune optimization is used to fuse multiple attributes and provide personalized web services for users without adjusting any weight coefficients. Experiments were conducted on real data sets, and the results show that the proposed method has high accuracy and a low recall rate, which is helpful to improving personalized recommendation.

Keywords: Cold Boot , Hybrid Social Networks , Personalized Recommendation , Multi-Objective Immune Optimization , Service Providers , Web Service Recommendation

## 1. Introduction

With the increasing number of network services, there are many services with the same function but different qualities-of-service (QoS), while users are left with no choice. Service recommendation can actively recommend to users unused web services with good service quality or high praise from other users, which effectively filters out many web services that are not be praised by users and narrows down the selection space. Service recommendation has attracted extensive attention from scholars at home and abroad [1-3]. However, how to infer the user’s evaluation or the QoS when the user has not used the web service is a challenging problem. The existing web service recommendation methods are mainly based on collaborative filtering, and they are mainly divided into neighbor-based methods and model-based methods. On this basis, the context-aware method and the content-based method were developed [4,5].

Neighbor-based methods, also known as memory-based methods, mine similarity patterns between users or web services based on historical data and then make recommendations based on the experience results of similar users or similar services. Generally, methods based on the nearest neighbor have strong interpretability in theory and have played a great role in promoting the development of web service recommendation. However, in practice, because the historical data is usually very sparse, it is difficult to identify similar users or similar web services, and thus it is difficult to obtain high recommendation accuracy.

Model-based methods learn the potential patterns hidden in the data from the historical QoS or rating data, construct a prediction model to predict the unknown QoS or rating data, and then make a recommendation according to the prediction results. Zhang et al. [6] analyzed the potential characteristics among users, services, and time, and proposed a time-aware personalized QoS prediction method. Yu et al. [7] assumed that the QoS matrix was a low rank or approximately a low rank, and they proposed a trace norm regularized matrix decomposition method to predict the unknown QoS, and the web service recommendation is made according to the prediction results. Zheng et al. [8] integrated a similar user method and matrix decomposition method for personalized QoS value prediction. Kirchner et al. [9] proposed a web service recommendation model based on classification and a web service recommendation model based on regression, and they analyzed their respective adaptation situations. Xie et al. [10] used an asymmetric matrix to represent the potential association between users and web services and to alleviate the problem of data sparseness to further improve web service recommendation prediction accuracy. The model-based methods further improve the accuracy of web service recommendation; however, such methods often have high computational complexity, and there is a trade-off between model complexity and prediction accuracy.

To further improve the quality of recommendation results, information sources outside the user item matrix are also included in the collaborative filtering algorithm. Deng et al. [11] used a model-based collaborative filtering method to evaluate the trust degree among users in social networks, and then an extended random walk algorithm was designed to recommend web services. Wang et al. [12] used a cumulative sum control chart to detect malicious feedback scores, and they proposed bloom filtering to prevent malicious feedback scores and improve recommendation performance. Guo et al. [13] proposed a QoS prediction model using tensor decomposition based on service collaboration called Service-oriented Tensor. This prediction approach analyzes service collaboration from other similar services and relevant users by using a three-order tensor. Gonsalves and Patil [14] proposed a location-based QoS prediction method and used the k-nearest neighbor algorithm and support vector machine (SVM) as a collaborative filtering framework for web service recommendation. The method of context awareness is usually based on a collaborative filtering method. Generally, the prediction accuracy and recommendation quality have been improved in terms of their respective concerns and perceptions. Web service positioning (WSP) gives the specific function description of the service and publishes the service that conforms to the service level agreement; it can provide support for personalized recommendation and avoid taking the same approach as non-rated services.

This paper proposes a recommendation framework and algorithm based on a hybrid social network (HSN), which integrates service, WSP in the social network, user-user trust, and user-service trust. The trust between users and the WSP and the connection between WSP and service provide an HSN. Because the trust relationship between users and the provision of the WSP service contains rich information, it provides a reliable basis for improving the recommendation performance and improving the cold-start problem.

## 2. Hybrid Social Networks with Trust

The HSN model is constructed with trust, as shown in Fig. 1, and it is divided into two layers: the cloud layer and the user layer. The network consists of three types of nodes (users, web services, and WSP) and two types of contact (trust and provide). The links included are (1) user-service trust, (2) user-WSP trust, (3) WSP-service provision, and (4) user-user trust. The existence of a connection between two nodes means that there is trust or a connection is provided. The value range of the trust value is [0, 1], and a value of 0 means that there is no connection. The value provided is either 0 or 1.

Fig. 1.

HSN with trust.

In the user layer of the social network, the user is the node, and the trust relationship between users is the edge, which forms a user social network based on trust. It has the characteristics of domain relevance and transitivity.

(1) Domain relevance: According to the functional domain, users have different trust values for the same user.

(2) Transitivity: The trust between users is transitive.

The HSN is combined with the social network, service, and WSP, and an HSN is formed. While maintaining the characteristics of social network, it also has the characteristics of heterogeneity, personalization, mutual independence, and authenticity.

(1) Heterogeneity: The network contains different types of nodes and connections, reflecting the heterogeneity of network structure.

(2) Personalization: The trust value of users to the service and WSP reflects the personalized cognition of users.

(3) Mutual independence: It is assumed that WSPs are independent of each other and will not share user information.

(4) Authenticity: The information provided by the WSP is real and easy to obtain, which enhances the recommendation reliability.

##### 2.1 Network Composition

The HSN is a directed graph, which can be formalized as [TeX:] $$=(F, P, C, E, W, t)$$. Here, F, P, and C represent the set of nodes in the graph; F is the service collection published in the registry, [TeX:] $$\left(f_{1}, f_{2}, \cdots, f_{m}\right)$$; P is the set of WSPs providing F, [TeX:] $$\left(p_{1}, p_{2}, \cdots, p_{n}\right)$$; C is the collection of all users in the registry, [TeX:] $$\left(c_{1}, c_{2}, \cdots, c_{o}\right)$$ ; E is the set of directed edges in the graph [TeX:] $$E=:<E_{1}$$ ; and [TeX:] $$E_{2}>\cdot E_{1}$$ denote the WSP service providing the connection. When [TeX:] $$p_{i}$$ provides service [TeX:] $$f_{j}$$, the value of the edge is 1; when there is no relationship provided, then there is no edge [TeX:] $$E_{2}$$, which indicates the trust relationship between nodes. In [TeX:] $$E_{2}=\left(T_{1}, T_{2}, T_{3}\right)$$, [TeX:] $$T_{1}$$ is the user-user-user-user trust, [TeX:] $$T_{2}$$ is the user-service trust, and [TeX:] $$T_{3}$$ is the user-WSP trust. W represents the weight set of all edges in HSN, and t marks a time window. In a certain period of time, the trust value is constant.

##### 2.2.1 User-user trust

To recommend services with specific functions to the current user C, the premise of identifying the user group as C trust is that the user group with a high similarity to C is in the domain related to the recommendation task. Suppose you want to recommend a weather service for C, then a user who has used a weather-related service and has a high similarity with C is found, and that user's view on the weather field is credible. The trust value for trusted users [TeX:] $$c_{i}$$ is expressed as follows:

##### (1)
[TeX:] $$T_{1}\left(C, c_{i}\right)=\operatorname{sim}\left(C, c_{i}\right),$$

where [TeX:] $$c_{i} \in C_{t}$$, [TeX:] $$c_{i}$$ belongs to the trustable set [TeX:] $$C_{t}$$.

Here, [TeX:] $$C_{t}=\left\{c_{i} \mid \operatorname{sim}\left(C, c_{i}\right) \geq \sigma, f\left(c_{i}, D(f)\right)=1\right\} \cdot \operatorname{sim}\left(C, c_{i}\right) \geq \sigma$$ means that the similarity threshold is set to [TeX:] $$\sigma$$, [TeX:] $$\sigma>0$$. [TeX:] $$f\left(u_{i}, D(f)\right)=1$$ indicates that [TeX:] $$c_{i}$$ has used a service related to [TeX:] $$f$$, and [TeX:] $$f$$ indicates a domain related to [TeX:] $$D(f)$$. The similarity [TeX:] $$\left(c_{i}, c_{j}\right)$$ is calculated by the Pearson correlation coefficient as follows:

##### (2)
[TeX:] $$\operatorname{sim}\left(c_{i}, c_{j}\right)=\frac{\sum_{f \in f_{c}}\left(T_{2}\left(c_{i}, f\right)-\overline{T_{c_{i}}}\right)\left(T_{2}\left(c_{j}, f\right)-\overline{T_{c_{j}}}\right)}{\sqrt{\sum_{f \in f_{\varepsilon}}\left(T_{2}\left(c_{i}, f\right)-\overline{T_{c_{i}}}\right)^{2}} \cdot \sqrt{\sum_{f \in f_{g}}\left(T_{2}\left(c_{j}, f\right)-\overline{T_{c_{j}}}\right)^{2}}}$$

Here, [TeX:] $$f_{g}$$ is the intersection of the services called by [TeX:] $$c_{i}$$ and [TeX:] $$c_{j}$$, [TeX:] $$\overline{T_{c_{i}}}$$ and [TeX:] $$\overline{T_{c_{j}}}$$ are the average trust values of [TeX:] $$c_{i}$$ and [TeX:] $$c_{j}$$ called services, and the value range is [-1, 1]. When a negative value is taken, it is considered that there is no edge connection between users. The similarity between two users satisfies the symmetry below.

##### (3)
[TeX:] $$\operatorname{sim}\left(c_{i}, c_{j}\right)=\operatorname{sim}\left(c_{j}, c_{i}\right)$$

After obtaining the specified recommendation task, the similarity between any two users is calculated to form a weighted user social network to obtain trusted user groups.

When traversing the social network, if there is no edge directly connected between two users, but there is path reachability, then the indirect trust can be calculated by Formula (4).

##### (4)
[TeX:] $$T_{1}\left(c_{i}, c_{k}\right)=T_{1}\left(c_{i}, c_{j}\right) \cdot T_{1}\left(c_{j}, c_{k}\right)$$

It is defined that the stage of the path between two users does not exceed the constant l. According to the small-world characteristics of social networks, l is set to 6. When there are multiple paths, the path with the largest indirect trust value is selected.

##### 2.2.2 User-service trust

The user-service trust value measurement includes direct trust and indirect trust. Direct trust is the normalization of user experience and feedback on QoS indicators. According to the personalized characteristics of users, different weights [TeX:] $$\lambda_{i}$$ are set for each QoS to form the direct trust value, which can be expressed as follows:

##### (5)
[TeX:] $$T_{2}(C, f)=\sum_{i=1}^{q} \lambda_{i} \cdot \operatorname{QoS}_{i}^{C},$$

where [TeX:] $$\sum_{i=1}^{q} \lambda_{i}=1$$[TeX:] $$0 \leq \lambda_{\{i \leq 1_{0}$$

Here, [TeX:] $$\operatorname{QoS}_{i}^{C}$$ is the evaluation value of C pairs of i QoS, and there are q indicators in total. Different users have different evaluations on the same QoS, which reflects the personalized characteristics of users [15].

The direct trust value changes dynamically with the increase of the number of users calling services. The calculation is as follows:

##### (6)
[TeX:] $$T_{2}^{d}(C, f)=\frac{\sum_{i=1}^{N} T_{2}(C, f)}{N},$$

where N is the total number of times the user calls the service, and [TeX:] $$T_{2}^{d}(C, f)$$ is the average trust value after the user has called many times. The calculation of indirect trust value refers to the evaluation of service [TeX:] $$f$$ by C trusted user groups, which is the average product of the trust value between C and [TeX:] $$c_{i}$$ and the direct trust value of [TeX:] $$c_{i}$$ to [TeX:] $$f$$, as shown in Formula (7).

##### (7)
[TeX:] $$T_{2}^{i d}(C, f)=\frac{\sum_{i=1}^{n} T_{1}\left(C, c_{i}\right) \cdot T_{2}^{d}\left(c_{i}, f\right)}{n}$$

Here, [TeX:] $$T_{1}\left(C, c_{i}\right) \geq \sigma$$and [TeX:] $$\sigma>0$$, which denotes that [TeX:] $$\mathcal{C}_{i}$$ is a C trusted user. In our experiment, [TeX:] $$\sigma$$ was set as 0.3. Besides, [TeX:] $$n$$ is the number of users trusted by C.

When there is no direct trust value between users and services, C traverses the social network. When there is a path reachable between C and the user group, it is determined to be a trusted user group according to Formula (1). Suppose that [TeX:] $$c^{\prime}$$ is a trusted user and the nodes from C to [TeX:] $$c^{\prime}$$ pass through [TeX:] $$c_{i+1}, \cdots, c_{i+n}$$ in turn, then the trust value is calculated as follows:

##### (8)
[TeX:] $$T_{2, p}(C, f)=T_{1}\left(C, c_{i+1}\right) \cdots T_{1}\left(c_{i+n}, c^{\prime}\right) \cdot T_{2}\left(c^{\prime}, f\right)$$

where [TeX:] $$T_{1}\left(C, c_{i+1}\right) \cdots T_{1}\left(c_{i+n}, c^{\prime}\right) \geq \sigma$$ and [TeX:] $$\sigma>0$$, which represents the threshold to be met by C trusted users. When there are multiple paths between C and [TeX:] $$c^{\prime}$$, the user-service trust value is defined as the average trust value of multiple paths as follows:

##### (9)
[TeX:] $$T_{2}(C, f)=\sum_{p=1}^{P} T_{2, p}(C, f) / P$$

There are P paths.

If there is a direct path between C and [TeX:] $$c^{\prime}$$, then the trust value is not affected by the complex path, although there are other more complex paths (such as loops in the path).

##### 2.2.3 User-WSP trust

For a service, WSP is the effective information. As important information of the service, a calculation method of the user-WSP trust value is proposed to provide the basis for the recommendation. The frequency of WSP usage reflects the implicit preference of users to select services. The frequency of users calling on the WSP can be used as the basis of the WSP trust value calculation. The quantitative relationship of service WSP follows a power-law distribution. The WS-Dream-QoSDataset2 data set can be taken as an example (shown in Fig. 2). Based on the quantitative relationship between the service and the WSP, it is assumed that the frequency of WSP usage follows a power-law distribution, and there are a few WSPs frequently used. The usage frequency of user [TeX:] $$c^{\prime}$$ to [TeX:] $$p_{j}$$ is the ratio of [TeX:] $$c^{\prime}$$ using [TeX:] $$p_{j}$$ times and [TeX:] $$c^{\prime}$$ using all WSPs, which is expressed as follows:

##### (10)
[TeX:] $$\operatorname{Fre}\left(c_{i}, p_{j}\right)=q_{i, j} / \sum_{j=1}^{N} q_{i, j}$$

Here, N is the number of WSPs, and [TeX:] $$q_{i, j}$$ is [TeX:] $$c_{i}$$ and [TeX:] $$p_{j}$$ times of use.

The frequency of the user WSP usage is converted into the user WSP score. Using the linear function, the value range of the converted score is [0, 5]. For all the WSPs in descending order, the scores of [TeX:] $$c_{i}$$ pairs of j-WSP are as follows:

##### (11)
[TeX:] $$r\left(c_{i}, p_{j}\right)=5\left(1-\sum_{j^{\prime}=1}^{j-1} \operatorname{Fre}\left(c_{i}, p_{j^{\prime}}\right)\right)$$

Fig. 2.

Power law distribution of the service WSP number.

The trust value of the WSP can be obtained by normalizing the rating value as follows:

##### (12)
[TeX:] $$T_{3}\left(c_{i}, p_{j}\right)=\frac{r\left(c_{i}, p_{j}\right)-\min _{i, j} r\left(c_{i}, p_{j}\right)}{\max _{i, j} r\left(c_{i}, p_{j}\right)-\min _{i, j} r\left(c_{i}, p_{j}\right)}$$

The Pearson correlation coefficient is used to calculate the similarity between any two users in the WSP selection to recommend the WSP for users.

##### (13)
[TeX:] $$g\left(c_{i}, c_{j} \mid \mathrm{WSP}\right)=\frac{\sum_{k=1}^{t}\left(r\left(c_{i}, p_{k}\right)-\overline{r\left(c_{i}, p\right)}\right)\left(r\left(c_{j}, p_{k}\right)-\overline{r\left(c_{j}, p\right)}\right)}{\sqrt{\sum_{k=1}^{t}\left(r\left(c_{i}, p_{k}\right)-\overline{r\left(c_{i}, p\right)}\right)^{2} \sum_{k=1}^{t}\left(r\left(c_{j}, p_{k}\right)-\bar{r}\left(c_{j}, p\right)\right)^{2}}}$$

Here, t is the number of WSPs jointly called by users [TeX:] $$c_{i}$$ and [TeX:] $$c_{j}$$.

According to the user WSP trust, the user-service trust value is predicted.

##### (14)
[TeX:] $$T_{2}(C, f)=\frac{m_{j} T_{3}\left(C, p_{j}\right)+\sum_{i=1}^{N} T_{2}\left(C, f_{i}\right)}{m_{j}+N}$$

This is the number of services provided by N for C calling [TeX:] $$p_{j}$$, and [TeX:] $$m_{j}$$ is the number of calls C to [TeX:] $$p_{j}$$.The more times the WSP is called, the more trust users have in it, and the more trust they have on other services provided by the WSP.

## 3. Service Recommendation Based on Multi-Objective Immune Optimization

To avoid the process of adjusting the weight coefficient, the proposed method regards the content attribute, user preference, and user sentiment classification as three functions and simultaneously optimizes them. The purpose is to improve one objective function without damaging the value of another. In this process, each generated recommendation list has different trade-offs among the attributes of the web service recommendation points of interest, user preferences, and user sentiment classification affected by geographic information. Therefore, a web service recommendation method based on multi-objective immune optimization can provide different recommendation lists for different users. Each list has different trade-offs between different objective functions, which allows the list to compromise between different preferences. This provides users with more options to choose from, and users can choose the best list from these non-dominated lists.

##### 3.1 Objective Function Design

Most of the existing literature has used a weight coefficient to roughly evaluate the impact of each factor on the user's location, and the top ranked sites constitute the location recommendation list. In this way, the importance of the influence of each factor depends on the size of the coefficient before each factor. The existing algorithms do not provide each user with a unique weight vector, but rather the whole system uses the same weight vector. This rough consideration assumes that all users’ preferences for different factors are the same, which does not meet the requirements of personalized recommendation. Therefore, the proposed method comprehensively considers the currently active user preferences, sentiment classification, and the probability density function of the currently active user’s registered geographic information.

##### (15)
[TeX:] $$\left\{\begin{array}{l} \max -\frac{1}{N} \sum_{i=1}^{n} \sum_{G_{k} \in G_{M}} \log P\left(f_{i k}=1 \mid c_{i}, G_{k}\right) \\ \max -\frac{1}{N} \sum_{j=1}^{n} \sum_{G_{k} \in G_{j j}} \log P\left(h_{j p}=1 \mid l_{j}, G_{k}\right) \\ \max \quad I \end{array}\right.$$

Here, N is the length of the final recommended list.

The location aware service recommended by the proposed method needs to satisfy the user's maximum preference ([TeX:] $$\max I$$), that is, the favorite location to go to. Moreover, the association between comments and users and between comments and locations should be closer, that is, the probability density functions [TeX:] $$P\left(h_{f f}=1 \mid c_{i}, G_{F}\right)$$ and [TeX:] $$P\left(h_{j p}=1 \mid l_{j}, G_{p}\right)$$ should be the largest.

##### 3.2 A Personalized Web Service Recommendation Method Based on Multi-Objective Immune Optimization

Based on the content-aware interest points of a deep convolution neural network to determine the service recommendation framework, the non-dominated neighbor immune algorithm (NNIA) is used to solve the multi-objective optimization problem of attributes, user preferences, and user sentiment classification of service recommendation interest points to obtain the recommendation list.

The NNIA simulates the mechanism of coexistence of diverse antibodies and the activation of a few antibodies in the biological immune system, selects relatively isolated non-dominated individuals to activate, performs proportional cloning according to the crowding distance of activated antibodies, increases the search for sparse regions in the Pareto front in the genetic operation process, and obtains a uniform distribution and good diversity. The pseudo code of the NNIA algorithm is given below.

##### Algorithm 1
Pseudo code of the NNIA algorithm

The Pareto optimal solution set is obtained by solving the multi-objective function problem by the NNIA algorithm, and personalized web service recommendation can be obtained.

## 4. Experiment

4.1 Experimental Environment and Configuration

A real data set, WS-Dream-QoSDataset2, was used to remove the WSPs that only provided one service to form a new data set. It included 339 users, 4,000 services, and 883 WSPs. To form a candidate service set with a total number of 138, service filtering searched for services containing "search" by keywords with the query function. Since each user called the candidate service in the data set, the size of the candidate user set was 339 after user filtering.

A user-service trust matrix was established to normalize QoS value. The weights of the response time and throughput were set to 0.6 and 0.6 to form a matrix [TeX:] $$\boldsymbol{T}^{\prime}$$ of 339×138.

The WSP service supply matrix was established, information from the data set was extracted, and the 883×4000 0–1 matrix [TeX:] $$\boldsymbol{P}$$ was formed.

The user-user trust matrix was established according to the user-service trust value to form the 339×339 matrix [TeX:] $$\boldsymbol{U}_{T}{ }^{\prime}$$.

The user-WSP trust matrix was established according to the power-law distribution of WSP usage times, and the usage frequency of WSP was simulated. According to Formula (11) and Formula (12), the score and trust value of user WSP were calculated to form matrix [TeX:] $$\boldsymbol{U}_{p^{㇆}}$$.

##### 4.2 Measurement Criteria

The accuracy Precision, recall Recall, and F value F-score were used to evaluate the performance of the recommended method. For target users [TeX:] $$u_{i}$$, Precision and Recall were defined as

##### (16)
[TeX:] $$\text { Pr ecision }=\frac{\text { The number of user acceptance in the recommended list }}{\text { The number of user acceptance in the test set }}$$

and

##### (17)
[TeX:] $$\text { Recall }=\frac{\text { The number of user acceptance in the recommen ded list }}{\text { Quantity in recommended list }} \text { . }$$

When the length of recommendation list changes, the accuracy rate and recall rate are often negatively correlated. Generally, as the length of recommendation list increases, the accuracy rate of test set decreases while the recall rate increases. In this way, when the length of the recommendation list is not fixed, the reconciliation index F-score is defined as follows:

##### (18)
[TeX:] $$F-\text { score }=\frac{2 * \text { Pr ecision }^{*} \text { Recall }}{\text { Precision }+\text { Recall }} .$$

Each data set was divided into three groups, including a training set, an effective set, and a test set. In the experiment, 80% of the data set was used as the training set, 10% as the verification set to adjust the super-parameters, and the remainder was the test set.

Moreover, the parameters of the multi-objective immune optimization algorithm were as follows: the length of the candidate list was 100, the number of iterations was 300, the maximum size of active population was 30, the scale of clone population was 150, the maximum size of the dominant population was 60, the crossover probability was 0.8, and the mutation probability was 0.1.

##### 4.3 Sensitivity Analysis of Model Parameters

In the proposed method, the weight parameter [TeX:] $$\beta$$, which is used to control the influence of position proximity, has a great influence on its performance, and thus it is necessary to conduct in-depth analysis on [TeX:] $$\beta$$. The value of [TeX:] $$\beta$$ varied from 0 to 1, and the recommended results obtained by the proposed method are shown in Fig. 3.

As shown above, when [TeX:] $$\beta=0$$, the recommendation accuracy was the lowest due to not considering the geographical proximity; similarly, when [TeX:] $$\beta=1$$, the result was not accurate because too many geographical proximity factors were considered. Therefore, when [TeX:] $$\beta=0.5$$, the accuracy of the proposed method was the best. The proposed method had high accuracy and low recall rate, and it had an ideal performance.

##### 4.4 Analysis of the Experimental Results

The proposed method can solve the cold-start problem by fusing user preference, sentiment classification, and location interest point attribute information. The results are shown in Fig. 4.

As shown above, compared with the other recommendation algorithms, the proposed method performed the best in solving the cold-start problem. For the cold-start problem, the recommendation accuracy of all the algorithms decreased in varying degrees. For example, the recommendation accuracy of methods from prior work [10,13] dropped sharply, while the accuracy of methods from another study [14] decreased slightly, because these algorithms did not consider the content information of the review text.

Fig. 3.

The effect of parameter β on the recommendation performance of the proposed method: (a) precision, (b) recall, and (c) F-score.

Compared with the other methods, the performance degradation of the proposed method and the method from a prior study [14] was relatively small, and the performance of the proposed method was reduced even less. Because the content of the comment text was considered in the method from a prior study [14], only k-nearest neighbor algorithm and SVM were used as the collaborative filtering framework for web service recommendation. Context awareness methods are usually based on a collaborative filtering method. Web service positioning gives the specific function description of the service and publishes the service that conforms to the service level agreement; it can provide support for personalized recommendation and avoid taking the same approach to non-rated services. However, such methods often have high computational complexity, and there is a trade-off between model complexity and prediction accuracy.

Fig. 4.

Performance comparison of the cold-start problem: (a) precision and (b) recall.

It can be concluded from the results that the proposed method contained rich information due to the trust relationship between users and the provision of the WSP service, which provides a reliable basis for improving the recommendation performance and improving the cold-start problem. Therefore, the proposed method showed a better performance than the other methods.

## 5. Conclusion

Because trust can reflect the characteristics of personalized selection service, the combination of trust and HSN can alleviate common cold-start problems and matrix sparseness in recommendation. This paper establishes a web service recommendation framework based on HSN and proposes a personalized web service recommendation method based on an HSN and multi-objective immune optimization. Web service positioning is integrated into the social network, user, and user service. The trust between users and WSP and the connection between WSP and service provide an HSN. Moreover, the multi-objective immune optimization method can provide a long enough recommendation list to ensure the diversity of service recommendations.

There are still some areas worthy of further study, such as constructing a social network and a web service social network, taking a community structure as the center, recommending services for users, analyzing the game and sharing relationship between WSPs and applying them to recommendations. Besides, providers are common, and thus the method proposed in this paper should be extended to the research on the recommendation of general items.

## Acknowledgement

This work was supported by 2017 Hunan Natural Science Fund Project (No. 2017JJ5008).

## Biography

##### Huashan Cao
https://orcid.org/0000-0002-7227-628X

He was born in 1982, has got his master's degree. He is currently a lecturer at Hunan Mass Media Vocational and Technical College. His main research interests include artificial intelligence and web recommendation.

## References

• 1 S. Badsha, X. Yi, I. Khalil, D. Liu, S. Nepal, K. Y. Lam, "Privacy preserving user based web service recommendations," IEEE Access, vol. 6, pp. 56647-56657, 2018.doi:[[[10.1109/ACCESS..2871447]]]
• 2 T. Cheng, J. Wen, Q. Xiong, J. Zeng, W. Zhou, X. Cai, "Personalized Web service recommendation based on QoS prediction and hierarchical tensor decomposition," IEEE Access, vol. 7, pp. 62221-62230, 2019.doi:[[[10.1109/ACCESS..2909548]]]
• 3 S. Chen, Y. Peng, H. Mi, C. Wang, Z. Huang, "A cluster feature based approach for QoS prediction in Web service recommendation," in Proceedings of 2018 IEEE Symposium on Service-Oriented System Engineering (SOSE), Bamberg, Germany, pp.246-251. https://doi.org/10.1109/SOSE..00041, 2018;pp. 246-251. https://doi.org/10.1109/SOSE.2018.00041. custom:[[[-]]]
• 4 J. Li, J. Lin, "Research on the influence of sampling methods for the accuracy of Web services QoS prediction," IEEE Access, vol. 7, pp. 39990-39999, 2019.doi:[[[10.1109/ACCESS..2906769]]]
• 5 K. Fletcher, "Regularizing matrix factorization with implicit user preference embeddings for web API recommendation," in Proceedings of 2019 IEEE International Conference on Services Computing (SCC), Milan, Italy, pp.1-8. https://doi.org/10.1109/SCC..00014, 2019;pp. 1-8. https://doi.org/10.1109/SCC.2019.00014. custom:[[[-]]]
• 6 Y. Zhang, Z. Zheng, M. R. Lyu, "WSPred: a time-aware personalized QoS prediction framework for web services," in Proceedings of 2011 IEEE 22nd International Symposium on Software Reliability Engineering, Hiroshima, Japan, 2011;pp. 210-219. custom:[[[-]]]
• 7 Q. Yu, Z. Zheng, H. Wang, "Trace norm regularized matrix factorization for service recommendation," in Proceedings of 2013 IEEE 20th International Conference on W eb Services, Santa Clara, CA, 2013;pp. 34-41. custom:[[[-]]]
• 8 Z. Zheng, H. Ma, M. R. Lyu, I. King, "Collaborative web service QoS prediction via neighborhood integrated matrix factorization," IEEE Transactions on Services Computing, vol. 6, no. 3, pp. 289-299, 2012.custom:[[[-]]]
• 9 J. Kirchner, A. Heberle, W. Lowe, "Classification vs. Regression-Machine learning approaches for service recommendation based on measured consumer experiences," in Proceedings of 2015 IEEE World Congress on Services, New York, NY, 2015;pp. 278-285. custom:[[[-]]]
• 10 Q. Xie, S. Zhao, Z. Zheng, J. Zhu, M. R. Lyu, "Asymmetric correlation regularized matrix factorization for web service recommendation," in 2016 IEEE International Conference on Web Services (ICWS), San Francisco, CA, 2016;pp. 204-211. custom:[[[-]]]
• 11 S. Deng, L. Huang, G. Xu, "Social network-based service recommendation with trust enhancement," Expert Systems with Applications, vol. 41, no. 18, pp. 8075-8084, 2014.custom:[[[-]]]
• 12 S. Wang, Z. Zheng, Z. Wu, M. R. Lyu, F. Y ang, "Reputation measurement and malicious feedback rating prevention in web service recommendation systems," IEEE Transactions on Services Computing, vol. 8, no. 5, pp. 755-767, 2015.custom:[[[-]]]
• 13 L. Guo, D. Mu, X. Cai, G. Tian, F. Hao, "Personalized QoS prediction for service recommendation with a service-oriented tensor model," IEEE Access, vol. 7, pp. 55721-55731, 2019.doi:[[[10.1109/ACCESS..2912505]]]
• 14 B. Gonsalves, V. Patil, "Improved web service recommendation via exploiting location and QoS information," in Proceedings of 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, India, 2016;pp. 1-5. custom:[[[-]]]
• 15 L. Yao, Q. Z. Sheng, A. H. Ngu, J. Yu, A. Segev, "Unified collaborative and content-based web service recommendation," IEEE Transactions on Services Computing, vol. 8, no. 3, pp. 453-466, 2015.custom:[[[-]]]