当前位置:网站首页>Neuralcf neural collaborative filtering network
Neuralcf neural collaborative filtering network
2022-07-29 06:46:00 【yc_ ZZ】
NeuralCF
One 、 summary
CF( Collaborative filtering ) Combined with deep learning
Review matrix decomposition

Background of the model
The model structure of matrix decomposition is relatively simple , It is obtained by inner product of user hidden vector and item hidden vector “ Similarity degree ”, Here, similarity refers to the prediction of the score . In particular, the output layer cannot effectively fit the optimization objectives , The model is easy to be in the state of under fitting ( Under fitting means that the degree of model fitting is not high ). Therefore, on this basis NeuralCF Model .
Two 、NeuralCF The structure of the original model
NeuralCF use “ Multilayer neural network + Output layer ” Instead of the simple inner product operation in the matrix decomposition model
Advantage is :
1、 Let the user vector and the item vector intersect more fully , Get more valuable feature combination information
2、 Introduce more nonlinear features , Make the model more expressive 
3、 ... and 、 Introduction of hybrid model
GMF- Generalized matrix factorization

Here we explain the user hidden vector P u = P T v u U P_{u}=P^{T}v^{U}_{u} Pu=PTvuU , Item implicit vector isomorphism 
class GMF(nn.Module):
def __init__(self,user_num, item_num, factor_num):
super(GMF,self).__init__()
self.embed_user_GMF = nn.Embedding(user_num,factor_num)
self.embed_item_GMF = nn.Embedding(item_num,factor_num)
self.predict_layer = nn.Linear(factor_num,1)
self._init_weight_()
def _init_weight_(self):
nn.init.normal_(self.embed_item_GMF.weight,std=0.01)
nn.init.normal_(self.embed_user_GMF.weight,std=0.01)
def forward(self,user,item):
embed_user_GMF = self.embed_user_GMF(user)
embed_item_GMF = self.embed_item_GMF(item)
output_GMF = embed_user_GMF*embed_item_GMF
prediction = self.predict_layer(output_GMF)
return prediction.view(-1)
MLP( Multilayer perceptron )
Usually , Each layer is fully connected to the next layer , The output of each artificial neuron on one layer becomes the input of several artificial neurons on the next layer .MLP There are at least three layers of artificial neurons , As shown in the figure below .
The formula is as follows :

Four 、Neural CF hybrid model
In order to make the fusion model more flexible , We allow GMF and MLP Learning independent embeddedness , And combine the two models by connecting their final hidden layer output .
The formula is as follows :
边栏推荐
- 9、 Networking technology
- centos 部署postgresql 13
- CNAME记录和A记录的区别
- 一文看懂网络安全五年之巨变
- Hongke automation SoftPLC | modk operation environment and construction steps (1) -- Introduction to operation environment
- 网络工具中的“瑞士军刀”-nc
- day12_多线程
- day17_ Under collection
- 失效的访问控制
- Hongke automation SoftPLC | Hongke kPa modk operation environment and construction steps (3) -- modk routine test
猜你喜欢

Hongke share | let you have a comprehensive understanding of "can bus errors" (IV) -- producing and recording can errors in practice

How to use SFTP command to access SFTP server on the development board

Hongke shares | how to test and verify complex FPGA designs (1) -- entity or block oriented simulation

8、 Network security

JMM 内存模型概念

FIR filter design (1) -- using the FDATool toolbox of MATLAB to design FIR filter parameters

4、 LAN and man

比较单片机3种时钟电路方案

Hongke share | bring you a comprehensive understanding of "can bus error" (II) -- can error types

Hongke automation SoftPLC | Hongke kPa modk operation environment and construction steps (2) -- modk operation environment construction
随机推荐
IGMP protocol software development experiment
Understand the great changes of network security in five years
day10_ Exception handling & enumeration
Merkletree builds QT implementation UI
Base64与File之间的相互转化
如何画出优秀的架构图
20个hacker神器
MQTT服务器搭建以及使用MQTT.fx测试
What is DNS amplification attack
NLP-分词
day12_ Multithreading
Ultra low cost DDoS attacks are coming. See how WAF protects Jedi
PhantomReference 虚引用代码演示
Complex floating point multiplication of vivado IP core floating point
8、 Network security
Multiple IO usage
Hog+svm for pedestrian detection
5G服务化接口和参考点
day02_ Basic grammar
OpenResty的核心与cosocket