The scope of CE is expanding in line with technological advances. Online education,
which has access to a wealth of resources and is not time or location-bound, is steadily
rising to prominence. On the other hand, the abundance of educational resources also
results in information overload, making it challenging for standard search engines
to offer individualized services to users. Therefore, the study constructed a recommendation
model based on the L$^{2}$R$^{2}$SN algorithm and a DR model for CE courses based
on TR to enhance the users’ online learning experiences and realize customized suggestions
for users.
3.1 Recommendation Model Building based on L2R2SN Algorithm
Traditional recommendation algorithms analyze the rating matrix of users and items
to generate recommendations. This approach, which only considers the binary relationship
between users and items, results in the recommended content relying mainly on machines,
which affects the accuracy of the recommendation results. Sorting learning is a machine
learning technique that predicts the order relationship between samples by sorting
them. It is used primarily in the information retrieval field. Adding list-level sorting
learning to recommendation algorithms can calculate the users' item preferences, prevent
content recommendations that rely heavily on machines, and improve the rationality
and accuracy of the recommendation results. Assuming there are $m$ users who have
rated $n$ projects excessively, the project set is represented by $I=\left\{i1,i2,\ldots
,in\right\}$. The user set is represented by $U=\left\{u1,u2,\ldots ,um\right\}$,
and the user's rating on the project is represented by $V$, where $rui$ represents
any rating value in $V$. Fig. 1 shows the model for ranking learning.
Fig. 1. Schematic diagram of the sorting learning model.
The Plackett-Luce model is a classical list-level sorting learning (LLSL) algorithm
that can directly optimize the sorting order of a list of items, describe the permutation
probability distribution, and directly obtain a recommendation list that satisfies
the user’s preferences by optimizing the evaluation metric or constructing a loss
function. The Plackett-Luce model can capture the degree of user preference for different
projects, and consider the relative relationship between projects and the overall
ranking results. The model has good interpretability and robustness, and is suitable
for innovative hanging recommendation and ranking tasks. In the Plackett-Luce model,
for any permutation, the sum of the probabilities of one full permutation of all items
selected is equal to one, and the probability of the permutation is expressed as Eq.
(1).
where$\pi u$ denotes an arrangement of items; $wi$ denotes the probability of an item
being selected; $\pi ui$ denotes the arrangement position of an item; $P(\pi u)$ denotes
the probability of selecting $\pi u$. On the other hand, the list-level sorting-based
learning algorithm does not model and incorporate the interactions in human society
into the algorithm, so the recommendation results are inaccurate, and the time efficiency
of the algorithm is constrained. The L$^{2}$R$^{2}$SN algorithm is a recommendation
model based on LLSL that utilizes personalized networks to determine the relationship
traits of users and friends from the interaction relationships, along with the resemblance
traits of items. The acquired characteristics are then added to the fundamentals of
the LLSL recommendation model. The L$^{2}$R$^{2}$SN algorithm is trained iteratively
by constructing an efficient objective loss function and using a gradient descent
strategy. In the L$^{2}$R$^{2}$SN algorithm, only items with the highest probability
of being selected are chosen, as expressed in Eq. (2).
where $\phi (.)$ is chosen as the $\exp (.)$ exponential function. The social characteristics
of users on social networks and the social information between items are considered
in the L$^{2}$R$^{2}$SN algorithm to model the social relationships of users in everyday
life. Social characteristics on social networks encompass personal profiles, posts,
comments, likes, private messages, shared links, following status, and frequency of
social activities. These characteristics can provide insight into an individual's
personality, interests, and level of activity and interaction within the online world.
Objective evaluation of these traits can be valuable when analyzing social behavior
in cyberspace. Social information in course recommendations typically refers to users'
behavior and interactions on social media platforms. This includes their social relationships
with other users, interactions with courses, and the communication impact of such
social information in social networks. The data can be used to improve the personalized
level of course recommendations and enhance the overall appeal of the results. The
social relationships among users were simulated using the user set $F(u)$ that comprises
individuals within the same community as well as WeChat friends and other acquaintances
of the target user $u$ within the social network. The user relationship is set when
selecting the user trust set, and the difference between the ratings of two items
is limited to less than 1 to represent the similarity between items. The user trust
set and the item similarity set are expressed as Eq. (3).
where $v$ represents the user's rating of a project, $rvi$ and $rui$ denotes the trusting
user’s rating of item $i$ and the target user’s rating of item $i$, respectively.
Fig. 2 shows the user-item relationship scores.
Fig. 2. Example of a User Project Relationship Rating.
The closer the predicted value is to the genuine value, the smaller the loss function
value. Eq. (4) depicts the target loss function of the L$^{2}$R$^{2}$SN algorithm.
where $\xi $ represents the loss function; $g(.)$ denotes the $Sig\mathrm{mod}$ logic
function, which can limit the range of predicted values. $\lambda $ is a regularization
factor; $\alpha $ and $\beta $ represent parameters, and $\lambda (\left\| U\right\|
_{F}^{2}+\left\| V\right\| _{F}^{2})$ can avoid overfitting. In summary, the L2R2SN
algorithm effectively addresses the cold start issue by merging the user and social
relationship traits. By analyzing the user characteristics, it predicts courses that
may interest users and provides preliminary personalized suggestions. In addition,
it uses social network data to bridge the gap in interactive data between the users
and courses, solving the data sparsity problem to some extent.
3.2 TR-based DR Models for CE Courses
Recommendation engines (DR) analyze the user’s previous behavior to determine their
preferences and forecast their likelihood of being interested in the material. The
aim of DR is to provide personalized services to users by predicting what they are
likely to be interested in. For example, Fig. 3 shows a generic process for personalized recommendation systems.
Fig. 3. General Model for Personalized Recommendation Systems.
Fig. 4. User Trust Mobile Network.
TR is considered to exist between two people when one person's behavior can influence
another’s. In a trustworthy mobile network, users act as nodes, and trust is unidirectional.
Fig. 4 shows a trustworthy mobile network. The nodes represent users, and the data on the
node connections represent trust values.
Assuming a user set $U=\left\{u1,u2,\ldots ,uN\right\}$, project set $I=\left\{i1,i2,\ldots
,iM\right\}$, and user $u$'s project rating $i$ is used to represent $Ru,i$. The task
of this study is to predict $Ru,i$. For any two items, the introduction of rules is
considered in the calculation of item similarity, and the importance value between
the two items is calculated by $\chi ^{2}test$ to eliminate the chance of rules, which
is expressed as Eq. (5).
where $O11$ denotes the number of users who have a common rating for items $i$ and
$j$; $O12$ and $O21$ denote the number of users who have a rating for item $i$ only
and item $j$ only, respectively, and $O22$ denotes the number of users who have no
rating for either item $i$ or $j$; $m$ represents the number of users. For each item,
the most relevant item can be selected based on the importance value to construct
its vector. The similarity between items can then be calculated using cosine similarity.
The probability of user $u$ wandering to user $v$ node at step $k$ in the trust mobile
network is expressed as Eq. (6).
where $P(S=v)$ denotes the selection of user $v$ as the next wandering node from the
set of users with TR with user $t$. $tt,v$ denotes the trust value between user $t$
and user $v$. Staying at this node with probability $\phi v,i,k$ and selecting an
alternative item score to return, the decision to continue selecting the next user
as a wandering node is made with probability $1-\phi v,i,k$. Each user on the wandering
path has a certain probability of selecting it as an alternative user for this wandering,
as shown in Eq. (7).
where $P(u\approx u',i\approx i')$ is the probability of selecting item $i'$ as an
alternative item and user $u'$ as an alternative user. Eq. (8) expresses the rating of item $i'$ by user $u'$.
The probability of selecting an alternative item $i'$ on the selected alternative
user $u'$ is expressed as Eq. (9).
where $sim(i,l)$ represents the similarity between the two items. The variance is
calculated from the values returned by the model for each tour, as shown in Eq. (10).
When the variance converges, the wandering comes to an end. Several wandering processes
are needed to predict the rating of item $i$ by user $u$. The ratings of alternative
items by alternative users returned by each wandering are then weighted in accordance
with the corresponding probabilities, and the outcome is the predicted rating, as
expressed in Eq. (11).
The professional-attribute matrix is formed, and the professional category data is
considered a vector on $p$-dimensional space. The similarity between the course vector
and the professional category is calculated as shown in Eq. (12).
where $zj$ and $ci$ denote the professional class vector and the course vector, respectively.
Using the cache algorithm, courses are divided into pools of professional courses
based on similarity, and the similarity between courses and professional classes is
calculated using Eq. (12). The similarity matrix is updated to group the courses into the pool with the highest
similarity. User trust-based CR rating prediction first predicts the ratings within
the course pool based on the current user’s rated data. In the absence of ratings,
the prediction selects the current user whom the current user most trusts to wander
one step to make a predicted rating (Eq. (13)).
where $a$ denotes the node on the path during the search from user $v$ to user $u$.
User $v$‘s rating prediction for $i$ is expressed as Eq. (14).
where $\overline{r}v$ and $\overline{r}u$ denote the mean of all ratings of $v$ and
$u$, respectively; $R$ denotes the set of users for whom maximum trust exists between
users $v$ and $u$, and $ru,i$ denotes the rating of $i$ by user $u$. Fig. 5 presents the precise steps in the trust-based DR model developed for CE courses.
Fig. 5. Flow chart of a dynamic recommendation model for community education courses based on trust relationships.